CN108271213A - Communication control method, unauthorized transmission method and device - Google Patents
Communication control method, unauthorized transmission method and device Download PDFInfo
- Publication number
- CN108271213A CN108271213A CN201710005280.9A CN201710005280A CN108271213A CN 108271213 A CN108271213 A CN 108271213A CN 201710005280 A CN201710005280 A CN 201710005280A CN 108271213 A CN108271213 A CN 108271213A
- Authority
- CN
- China
- Prior art keywords
- numerology
- random access
- mark
- parameter
- terminal device
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 177
- 238000004891 communication Methods 0.000 title claims abstract description 32
- 230000005540 biological transmission Effects 0.000 title claims description 116
- 230000011664 signaling Effects 0.000 claims description 34
- 241000208340 Araliaceae Species 0.000 claims description 13
- 235000005035 Panax pseudoginseng ssp. pseudoginseng Nutrition 0.000 claims description 13
- 235000003140 Panax quinquefolius Nutrition 0.000 claims description 13
- 235000008434 ginseng Nutrition 0.000 claims description 13
- 238000010586 diagram Methods 0.000 description 23
- 230000006870 function Effects 0.000 description 14
- 230000004069 differentiation Effects 0.000 description 10
- 230000000694 effects Effects 0.000 description 9
- 230000014509 gene expression Effects 0.000 description 9
- 241000209094 Oryza Species 0.000 description 8
- 235000007164 Oryza sativa Nutrition 0.000 description 8
- 235000021186 dishes Nutrition 0.000 description 8
- 238000005516 engineering process Methods 0.000 description 8
- 235000009566 rice Nutrition 0.000 description 8
- 238000003860 storage Methods 0.000 description 7
- 238000010295 mobile communication Methods 0.000 description 6
- 238000007726 management method Methods 0.000 description 5
- 230000007246 mechanism Effects 0.000 description 5
- 230000003287 optical effect Effects 0.000 description 5
- 230000006399 behavior Effects 0.000 description 4
- 230000003993 interaction Effects 0.000 description 4
- 238000006243 chemical reaction Methods 0.000 description 3
- 238000011144 upstream manufacturing Methods 0.000 description 3
- 238000011217 control strategy Methods 0.000 description 2
- 125000004122 cyclic group Chemical group 0.000 description 2
- 230000005611 electricity Effects 0.000 description 2
- 230000000977 initiatory effect Effects 0.000 description 2
- 230000007774 longterm Effects 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 238000013468 resource allocation Methods 0.000 description 2
- 241001269238 Data Species 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 239000003795 chemical substances by application Substances 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 239000013256 coordination polymer Substances 0.000 description 1
- 239000006185 dispersion Substances 0.000 description 1
- 230000014759 maintenance of location Effects 0.000 description 1
- 239000013307 optical fiber Substances 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W74/00—Wireless channel access
- H04W74/08—Non-scheduled access, e.g. ALOHA
- H04W74/0833—Random access procedures, e.g. with 4-step access
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W28/00—Network traffic management; Network resource management
- H04W28/02—Traffic management, e.g. flow control or congestion control
- H04W28/0289—Congestion control
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The embodiment of the invention discloses a kind of communication control method and devices.Method therein includes:Access network equipment sends wireless access control message to terminal device, and the wireless access control message includes:The random access control parameter of at least two Numerology, the random access control parameter are used to carry out congestion control when carrying out random access to the terminal device;The access network equipment receives the random access request that the terminal device is sent according to the random access control parameter of the one of which Numerology selected at least two Numerology.Also disclose corresponding device.Access network equipment provides the random access control parameter of various selectable Numerology, is serviced so as to which different Numerology may be selected in terminal device, access network equipment optimizes random access congestion control policy.
Description
Technical field
The present invention relates to a kind of field of communication technology more particularly to communication control method, unauthorized transmission method and devices.
Background technology
In fourth generation mobile communication technology (4th- Generation, 4G) in system, only support a kind of Numerology, i.e.,
The length of Transmission Time Interval (Transmission Time Interval, TTI) and subcarrier spacing etc. are all fixed.When
The interface-free resources of wireless access network (Radio Access Network, RAN) side can be carried out by limited time when random access
Congestion control, since 4G systems only support a kind of Numerology, congestion control just for a kind of Numerology into
Row.
But in the 5th third-generation mobile communication technology (5th- Generation, 5G) service quality can be supported in system
(Quality of Service, QoS) huge type of service of differentiation, such as large-scale machines class communication (Massive
Machine Type Communication, mMTC) business, superelevation reliably with the communication (Ultra-Reliable of low latency
And Low Latency Communications, URLLC) business and enhanced mobile broadband (Enhanced Mobile
Broadband, eMBB) business, multimedia broadcast multi-broadcasting business (Multimedia Broadcast Multicast
Service, MBMS), in order to meet the needs of these differentiation, different business in 5G mobile communication system as shown in Figure 1
The Transmission Time Interval and subcarrier spacing schematic diagram that type uses, technology (New Radio, NR) is eated dishes without rice or wine by a new generation will be simultaneously
Support multiple Numerology.
Long term evolution (Long Term Evolution, LTE) system has had been incorporated into many mechanism, realizes and is sent out in congestion
When raw, network admittance control and Congestion Avoidance are carried out, these mechanism are all based on a kind of Numerology and carry out, without considering
It can be serviced in 5G systems using a variety of Numerology, how random access congestion carried out under a variety of Numerology
Control.
Unauthorized transmission mode refers to that access network equipment pre-allocates a part of resource in advance, and then multiple terminals are set
It is standby when transmitting upstream data, it does not need to that access network equipment is asked to distribute resource again, but directly these resources is carried out
Data are transmitted in competition.Current unauthorized (Grant-Free) transmission is also based on a kind of Numerology and carries out resource instruction,
Without considering to be serviced using a variety of Numerology in 5G systems, how to be provided under a variety of Numerology
Source indicates.
Invention content
The embodiment of the present invention provides a kind of communication control method and device, to solve under a variety of Numerology how into
The problem of row random access congestion control.
In a first aspect, a kind of communication control method is provided, the method includes:Access network equipment transmission wirelessly connects
Enter control message to terminal device, the wireless access control message includes:The random access control of at least two Numerology
Parameter processed, the random access control parameter are used to carry out congestion control when carrying out random access to the terminal device;It is described
Access network equipment receives the terminal device according to the one of which selected at least two Numerology
The random access request that the random access control parameter of Numerology is sent.
In the realization method, access network equipment provides the random access control parameter of a variety of Numerology for eventually
End equipment selects, and the random access congestion control factor that a kind of Numerology may be selected in terminal device carries out random access, connects
Enter the random access control parameter that web network equipment provides various selectable Numerology, so as to which terminal device may be selected
Different Numerology are serviced, and access network equipment optimizes random access congestion control policy.
According to a kind of realization method of first aspect, the method further includes:Determine at least two Numerology
Random access control parameter.
According to another realization method of first aspect, the random access control parameter includes:Random access congestion control
The factor processed, the random access congestion control factor are corresponding with terminal equipment type or services/bearer parameter;The business/hold
Parameter is carried to include:The type of service of the terminal device, the mark of logic channel, the mark of logic channel collection, data are wirelessly held
The mark of load, the identifying of Data Radio Bearer collection, the mark of network slice belonging to the business of the terminal device or network are cut
The mark of piece collection.
In the realization method, access network equipment provides the random access control parameter of a variety of Numerology for eventually
End equipment selects, and terminal device can select corresponding one kind according to the terminal equipment type or services/bearer parameter of itself
The random access control parameter of Numerology is taken so as to which different Numerology may be selected in different terminal devices
Business, the congestion control that can be become more meticulous for different business/carrying.
According to another realization method of first aspect, the mark of the network slice can be set by core net for terminal
The mark that back-up is matched, such as network slice selection auxiliary information or session management network slice selection auxiliary information slice/clothes
Service type is either sliced differentiation number or new mark or is the mark that terminal device distributes by access net.
According to another realization method of first aspect, each wireless access control message needs to carry out including a kind of
The random access control parameter of the Numerology of congestion control;Or the wireless access control message includes Numerology's
List, the list of the Numerology include the random access congestion control factor of at least two Numerology
With the correspondence of the terminal equipment type or services/bearer parameter;Or the wireless access control message includes
Numerology bitmaps, the Numerology bitmaps are used to indicate whether at least two Numerology is gathered around
Plug control, the wireless access control message further include the random access congestion control for needing the Numerology for carrying out congestion control
The factor processed.
In the realization method, the sending method or message format of wireless access control message can be diversified, can once send out
The random access control parameter of Numerology a kind of is sent, also can once send the random access control ginseng of all Numerology
Number, the random access control parameter of all Numerology can be represented with tabular form, need to carry out congestion control
Numerology can be represented with bitmap.
According to another realization method of first aspect, with a kind of corresponding all terminal equipment types of Numerology
Or services/bearer parameter corresponds to a random access congestion control factor;Or with a kind of Numerology corresponding each ends
End equipment type or services/bearer parameter correspond to a random access congestion control factor.
In the realization method, pair of terminal equipment type or services/bearer parameter and the random access congestion control factor
Should be related to can diversification.
According to another realization method of first aspect, the method further includes:The access network equipment passes through nothing
Line resources control RRC signaling sends bearing parameter correspondence notification message to the terminal device, and the bearing parameter corresponds to
Relationship notification message includes:The mark of at least one logic channel and the correspondence of the mark of the logic channel collection or extremely
The mark of a few Data Radio Bearer is cut with the correspondence of the mark of Data Radio Bearer collection, and/or at least one network
The correspondence of the mark of piece and the mark of network slice collection.
In the realization method, by the mark of the corresponding logic channel collection of the mark of multiple logic channels or will be multiple
The mark of the corresponding Data Radio Bearer collection of mark of Data Radio Bearer or the mark for being sliced multiple networks correspond to one
The mark of network slice collection, can save the signaling overheads that access network equipment sends random access control parameter.
According to another realization method of first aspect, the wireless access control message further includes:Described at least two
The load information of each Numerology in Numerology.
In the realization method, wireless access congestion control also considers the load of Numerology, according to the difference of load,
Terminal device uses different Numerology so that congestion control more becomes more meticulous.
Second aspect provides a kind of access network equipment, which, which has, realizes in the above method
The function of access network equipment behavior.The function can also be performed corresponding soft by hardware realization by hardware
Part is realized.The hardware or software include the one or more and corresponding module of above-mentioned function.
In a kind of possible realization method, the access network equipment includes:Transmitting element, for sending wireless access
Control message includes to terminal device, the wireless access control message:The random access control of at least two Numerology
Parameter, the random access control parameter are used to carry out congestion control when carrying out random access to the terminal device;It receives single
Member, for receiving the terminal device according to the one of which Numerology's selected at least two Numerology
The random access request that random access control parameter is sent.
In alternatively possible realization method, the terminal device includes:Receiver, transmitter, memory and processor;
Wherein, batch processing code is stored in memory, and processor is used to call the program code stored in memory, performed following
Operation:Wireless access control message is sent to terminal device by the transmitter, the wireless access control message includes:Extremely
The random access control parameter of few two kinds of Numerology, the random access control parameter are used to carry out the terminal device
Congestion control is carried out during random access;The terminal device is received according to described at least two by the receiver
The random access request that the random access control parameter of the one of which Numerology selected in Numerology is sent.
Based on same inventive concept, the principle and advantageous effect solved the problems, such as due to the device may refer to above-mentioned first
Each possible embodiment and caused advantageous effect of aspect and first aspect, therefore the implementation of the device may refer to
The implementation of method, overlaps will not be repeated.
The third aspect provides a kind of communication control method, the method includes:
Terminal device receives the wireless access control message that access network equipment is sent, the wireless access control message
Including:The random access control parameter of at least two Numerology, the random access control parameter are used for the terminal
Equipment carries out carrying out congestion control during random access;The terminal device selects one kind at least two Numerology
The random access control parameter of Numerology;The terminal device is according to a kind of selected random access of Numerology
Control parameter sends random access request to the access network equipment.
In the realization method, access network equipment provides the random access control parameter of a variety of Numerology for eventually
End equipment selects, and the random access congestion control factor that a kind of Numerology may be selected in terminal device carries out random access, connects
Enter the random access control parameter that web network equipment provides various selectable Numerology, so as to which terminal device may be selected
Different Numerology are serviced, and access network equipment optimizes random access congestion control policy, terminal device
Selection diversification.
According to a kind of realization method of the third aspect, the random access control parameter includes:Random access congestion control
The factor, the random access congestion control factor are corresponding with terminal equipment type or services/bearer parameter;The services/bearer
Parameter includes:The type of service of the terminal device, the mark of logic channel, the mark of logic channel collection, Data Radio Bearer
Mark, the identifying of Data Radio Bearer collection, the mark of network slice belonging to the business of the terminal device or network slice
The mark of collection.
In the realization method, access network equipment provides the random access control parameter of a variety of Numerology for eventually
End equipment selects, and terminal device can select corresponding one kind according to the terminal equipment type or services/bearer parameter of itself
The random access control parameter of Numerology is taken so as to which different Numerology may be selected in different terminal devices
Business, the congestion control that can be become more meticulous for different business/carrying.
According to another realization method of first aspect, the mark of the network slice can be set by core net for terminal
The mark that back-up is matched, such as network slice selection auxiliary information or session management network slice selection auxiliary information slice/clothes
Service type is either sliced differentiation number or new mark or is the mark that terminal device distributes by access net.
According to another realization method of the third aspect, each wireless access control message needs to carry out including a kind of
The random access control parameter of the Numerology of congestion control;Or the wireless access control message includes Numerology's
List, the list of the Numerology include the random access congestion control factor of at least two Numerology
With the correspondence of the terminal equipment type or services/bearer parameter;Or the wireless access control message includes
Numerology bitmaps, the Numerology bitmaps are used to indicate whether at least two Numerology is gathered around
Plug control, the wireless access control message further include the random access congestion control for needing the Numerology for carrying out congestion control
The factor processed.
In the realization method, the mode or message format of the wireless access control message that terminal device receives can be various
Change, can once send the random access control parameter of Numerology a kind of, also can once send all Numerology with
Machine accesses control parameter, and the random access control parameter of all Numerology can be represented with tabular form, needs to carry out congestion
The Numerology of control can be represented with bitmap.
According to another realization method of the third aspect, with a kind of corresponding all terminal equipment types of Numerology
Or services/bearer parameter corresponds to a random access congestion control factor;Or with a kind of Numerology corresponding each ends
End equipment type or services/bearer parameter correspond to a random access congestion control factor.
In the realization method, pair of terminal equipment type or services/bearer parameter and the random access congestion control factor
Should be related to can diversification.
According to another realization method of the third aspect, the processor is additionally operable to perform following operation:The terminal is set
The bearing parameter correspondence notice that the standby reception access network equipment is sent by radio resource control RRC signaling disappears
Breath, the bearing parameter correspondence notification message include:The mark of at least one logic channel and the logic channel collection
The correspondence of the mark of the correspondence of mark or at least one Data Radio Bearer and the mark of Data Radio Bearer collection,
And/or the correspondence of the mark of at least one network slice and the mark of network slice collection.
In the realization method, by the mark of the corresponding logic channel collection of the mark of multiple logic channels or will be multiple
The mark of the corresponding Data Radio Bearer collection of mark of Data Radio Bearer or the mark for being sliced multiple networks correspond to one
The mark of network slice collection, terminal device are sliced according to the mark of logic channel collection, the mark of Data Radio Bearer collection or network
The mark of collection obtains the corresponding random access congestion control factor, performs easier.
According to another realization method of the third aspect, the wireless access control message further includes:Described at least two
The load information of each Numerology in Numerology.
In the realization method, wireless access congestion control also considers the load of Numerology, according to the difference of load,
Terminal device uses different Numerology so that congestion control more becomes more meticulous.
Fourth aspect provides a kind of terminal device, which, which has, realizes terminal device behavior in the above method
Function.The function by hardware can also be performed corresponding software and be realized by hardware realization.The hardware is soft
Part includes the one or more and corresponding module of above-mentioned function.
In a kind of possible realization method, the terminal device includes:Receiving unit, for receiving access network equipment
The wireless access control message of transmission, the wireless access control message include:The random access of at least two Numerology
Control parameter, the random access control parameter are used to carry out congestion control when carrying out random access to the terminal device;Choosing
Unit is selected, for selecting the random access control parameter of Numerology a kind of at least two Numerology;It connects
Enter unit, for being sent out according to the random access control parameter of selected Numerology a kind of to the access network equipment
Send random access request.
In alternatively possible realization method, the terminal device includes:Receiver, transmitter, memory and processor;
Wherein, batch processing code is stored in memory, and processor is used to call the program code stored in memory, performed following
Operation:The wireless access control message of access network equipment transmission, the wireless access control message are received by receiver
Including:The random access control parameter of at least two Numerology, the random access control parameter are used for the terminal
Equipment carries out carrying out congestion control during random access;Select a kind of Numerology's at least two Numerology
Random access control parameter;According to the random access control parameter of selected Numerology a kind of, pass through the transmitter
Random access request is sent to the access network equipment.
Based on same inventive concept, the principle and advantageous effect solved the problems, such as due to the device may refer to above-mentioned first
Each possible embodiment and caused advantageous effect of aspect and first aspect, therefore the implementation of the device may refer to
The implementation of method, overlaps will not be repeated.
The embodiment of the present invention also provides a kind of unauthorized transmission method and device, to solve under a variety of Numerology such as
What carries out the problem of resource instruction.
5th aspect, provides a kind of unauthorized transmission method, the method includes:Access network equipment sends non-award
Transfer resource configuration message is weighed to terminal device, the unauthorized transfer resource configuration message includes:At least two
The unauthorized transfer resource configuration parameter of Numerology, the unauthorized transfer resource configuration parameter include unauthorized transmission and provide
Source and/or the configuration instruction of the unauthorized transfer resource;The access network equipment receives the terminal device according to institute
The unauthorized transfer resource configuration parameter for stating the one of which Numerology selected at least two Numerology is awarded non-
The data transfer request sent on power transfer resource.
In the realization method, access network equipment provides the unauthorized transfer resource configuration ginseng of a variety of Numerology
Number is selected for terminal device, and the unauthorized transfer resource configuration parameter that a kind of Numerology may be selected in terminal device carries out non-award
Power transmission, access network equipment provide the unauthorized transfer resource configuration parameter of various selectable Numerology, from
And terminal device may be selected different Numerology and be serviced, access network equipment optimizes unauthorized transfer resource and matches
Put strategy.
According to a kind of realization method of the 5th aspect, the unauthorized transfer resource configuration parameter includes unauthorized transmission and provides
Source and/or the configuration instruction of the unauthorized transfer resource, configuration instruction and the terminal device class of the unauthorized transfer resource
Type or services/bearer parameter correspond to, wherein, the services/bearer parameter includes:Type of service, the logic of the terminal device
The mark of channel, the mark of logic channel collection, the identifying of the mark of Data Radio Bearer or Data Radio Bearer collection, the end
The mark of network slice belonging to the business of end equipment or the mark of network slice collection.
In the realization method, the unauthorized configured transmission that access network equipment provides a variety of Numerology supplies terminal
Equipment selects, and terminal device can select corresponding one kind according to the terminal equipment type or services/bearer parameter of itself
The unauthorized transmission configuration parameter of Numerology is taken so as to which different Numerology may be selected in different terminal devices
Business, the unauthorized transmission that can be become more meticulous for different business/carrying.
According to another realization method of the 5th aspect, the mark of the network slice can be set by core net for terminal
The mark that back-up is matched, such as network slice selection auxiliary information or session management network slice selection auxiliary information slice/clothes
Service type is either sliced differentiation number or new mark or is the mark that terminal device distributes by access net.
According to another realization method of the 5th aspect, each unauthorized transfer resource configuration message includes one kind
The unauthorized transfer resource configuration parameter of Numerology;Or the unauthorized transfer resource configuration message includes Numerology
List, the list of the Numerology include at least two Numerology the unauthorized transfer resource and/
Or the correspondence of the configuration instruction of the unauthorized transfer resource and the terminal equipment type or services/bearer parameter;Or
The unauthorized transfer resource configuration message includes Numerology bitmaps, and the Numerology bitmaps are used to indicate terminal and set
Adoptable at least two Numerology during standby transmission data, the unauthorized transfer resource configuration message further include each
The unauthorized transfer resource configuration parameter of Numerology.
In the realization method, the sending method or message format of unauthorized transfer resource configuration message can be diversified, can
The unauthorized transfer resource configuration parameter of Numerology a kind of is once sent, also can once send the non-of all Numerology
Authorized transmissions resource configuration parameter, parameter, which is configured, in the unauthorized transfer resource of all Numerology to be represented with tabular form,
Adoptable Numerology can be represented with bitmap during terminal device transmission data.
According to another realization method of the 5th aspect, with a kind of corresponding all terminal equipment types of Numerology
Or services/bearer parameter corresponds to the configuration instruction of a unauthorized transfer resource;It is or corresponding each with a kind of Numerology
A terminal equipment type or services/bearer parameter correspond to the configuration instruction of a unauthorized transfer resource.
In the realization method, terminal equipment type or services/bearer parameter and the configuration instruction of unauthorized transfer resource
Correspondence can diversification.
According to another realization method of the 5th aspect, the method further includes:The access network equipment passes through nothing
Line resources control RRC signaling sends bearing parameter correspondence notification message, the bearing parameter correspondence to terminal device
Notification message includes:The mark of at least one logic channel and the correspondence of the mark of the logic channel collection, and/or at least
The mark of one Data Radio Bearer is sliced with the correspondence of the mark of Data Radio Bearer collection, and/or at least one network
Mark with the network slice collection mark correspondence.
In the realization method, by the mark of the corresponding logic channel collection of the mark of multiple logic channels or will be multiple
The mark of the corresponding Data Radio Bearer collection of mark of Data Radio Bearer or the mark for being sliced multiple networks correspond to one
The mark of network slice collection can save the signaling overheads that access network equipment sends unauthorized transfer resource configuration parameter.
According to another realization method of the 5th aspect, the unauthorized transfer resource configuration message further includes:It is described extremely
The load information of each Numerology in few two kinds of Numerology.
In the realization method, unauthorized to transmit the load for also considering Numerology, according to the difference of load, terminal is set
It is standby to use different Numerology so that unauthorized transmission more becomes more meticulous.
6th aspect, provides a kind of access network equipment, which, which has, realizes in the above method
The function of access network equipment behavior.The function can also be performed corresponding soft by hardware realization by hardware
Part is realized.The hardware or software include the one or more and corresponding module of above-mentioned function.
In a kind of possible realization method, the access network equipment includes:Transmitting element, for sending unauthorized biography
Defeated resource distribution message includes to terminal device, the unauthorized transfer resource configuration message:At least two Numerology's
Parameter is configured in unauthorized transfer resource;Receiving unit, for receiving the terminal device according to described at least two
Parameter is configured in unauthorized transfer resource in the unauthorized transfer resource of the one of which Numerology selected in Numerology
The data transfer request of upper transmission.
In alternatively possible realization method, the access network equipment includes:Receiver, transmitter, memory and
Processor;Wherein, batch processing code is stored in memory, and processor is used to call the program code stored in memory,
Perform following operate:Unauthorized transfer resource is sent by the transmitter, message is configured to terminal device, the unauthorized biography
Defeated resource distribution message includes:The unauthorized transfer resource configuration parameter of at least two Numerology;Pass through the receiver
The terminal device is received according to the unauthorized of the one of which Numerology selected at least two Numerology
The data transfer request that transfer resource configuration parameter is sent on unauthorized transfer resource.
Based on same inventive concept, the principle and advantageous effect solved the problems, such as due to the device may refer to above-mentioned first
Each possible embodiment and caused advantageous effect of aspect and first aspect, therefore the implementation of the device may refer to
The implementation of method, overlaps will not be repeated.
7th aspect, provides a kind of unauthorized transmission method, the method includes:Terminal device receives access net network
The unauthorized transfer resource configuration message that equipment is sent, the unauthorized transfer resource configuration message include:At least two
The unauthorized transfer resource configuration parameter of Numerology, the unauthorized transfer resource configuration parameter include unauthorized transmission and provide
Source and/or the configuration instruction of the unauthorized transfer resource;The terminal device selects at least two Numerology
Select the unauthorized transfer resource of Numerology a kind of and/or the configuration instruction of unauthorized transfer resource;The terminal device root
According to the unauthorized transfer resource of selected Numerology a kind of and/or the configuration instruction of unauthorized transfer resource, awarded non-
It weighs to transmit to the access network equipment transmission data on transfer resource and ask.
In the realization method, access network equipment provides the unauthorized transfer resource configuration ginseng of a variety of Numerology
Number is selected for terminal device, and the unauthorized transfer resource configuration parameter that a kind of Numerology may be selected in terminal device carries out non-award
Power transmission, access network equipment provide the unauthorized transfer resource configuration parameter of various selectable Numerology, from
And terminal device may be selected different Numerology and be serviced, access network equipment optimizes unauthorized transfer resource and matches
Put strategy, the unauthorized transfer resource configuration parameter diversification of terminal device.
According to a kind of realization method of the 7th aspect, the configuration instruction and terminal equipment type of the unauthorized transfer resource
Or services/bearer parameter corresponds to, wherein, the services/bearer parameter includes:The type of service of the terminal device, logic letter
The mark in road, the mark of logic channel collection, the mark of Data Radio Bearer, the identifying of Data Radio Bearer collection, the terminal is set
The mark of network slice belonging to standby business or the mark of network slice collection.
In the realization method, access network equipment provides the unauthorized transfer resource configuration ginseng of a variety of Numerology
Number is selected for terminal device, and terminal device can select corresponding one according to the terminal equipment type or services/bearer parameter of itself
The unauthorized transfer resource configuration parameter of kind Numerology, so as to which different Numerology may be selected in different terminal devices
It is serviced, the unauthorized transmission that can be become more meticulous for different business/carrying.
According to another realization method of the 7th aspect, the mark of the network slice can be set by core net for terminal
The mark that back-up is matched, such as network slice selection auxiliary information or session management network slice selection auxiliary information slice/clothes
Service type is either sliced differentiation number or new mark or is the mark that terminal device distributes by access net.
According to another realization method of the 7th aspect, each unauthorized transfer resource configuration message includes one kind
The unauthorized transfer resource configuration parameter of Numerology;Or the unauthorized transfer resource configuration message includes Numerology
List, the list of the Numerology include at least two Numerology the unauthorized transfer resource and/
Or the correspondence of the configuration instruction of the unauthorized transfer resource and the terminal equipment type or services/bearer parameter;Or
The unauthorized transfer resource configuration message includes Numerology bitmaps, and the Numerology bitmaps are used to indicate terminal and set
Adoptable at least two Numerology during standby transmission data, the unauthorized transfer resource configuration message further include each
The unauthorized transfer resource configuration parameter of Numerology.
In the realization method, the sending method or message format of unauthorized transfer resource configuration message can be diversified, can
The unauthorized transfer resource configuration parameter of Numerology a kind of is once sent, also can once send the non-of all Numerology
Authorized transmissions resource configuration parameter, parameter, which is configured, in the unauthorized transfer resource of all Numerology to be represented with tabular form,
Adoptable Numerology can be represented with bitmap during terminal device transmission data.
According to another realization method of the 7th aspect, with a kind of corresponding all terminal equipment types of Numerology
Or services/bearer parameter corresponds to the configuration instruction of a unauthorized transfer resource;It is or corresponding each with a kind of Numerology
A terminal equipment type or services/bearer parameter correspond to the configuration instruction of a unauthorized transfer resource.
In the realization method, terminal equipment type or services/bearer parameter and the configuration instruction of unauthorized transfer resource
Correspondence can diversification.
According to another realization method of the 7th aspect, the method further includes:The terminal device receives the access
The bearing parameter correspondence notification message that web network equipment is sent by radio resource control RRC signaling, the bearing parameter
Correspondence notification message includes:The correspondence of the mark of at least one logic channel and the mark of the logic channel collection,
And/or the correspondence of the mark of at least one Data Radio Bearer and the mark of Data Radio Bearer collection, and/or at least one
The correspondence of the mark of network slice and the mark of network slice collection.
In the realization method, by the mark of the corresponding logic channel collection of the mark of multiple logic channels or will be multiple
The mark of the corresponding Data Radio Bearer collection of mark of Data Radio Bearer or the mark for being sliced multiple networks correspond to one
The mark of network slice collection, terminal device are sliced according to the mark of logic channel collection, the mark of Data Radio Bearer collection or network
The mark of collection obtains corresponding unauthorized transfer resource configuration parameter, performs easier.
According to another realization method of the 7th aspect, the unauthorized transfer resource configuration message further includes:It is described extremely
The load information of each Numerology in few two kinds of Numerology.
In the realization method, unauthorized to transmit the load for also considering Numerology, according to the difference of load, terminal is set
It is standby to use different Numerology so that unauthorized transmission more becomes more meticulous.
Eighth aspect provides a kind of terminal device, which, which has, realizes terminal device behavior in the above method
Function.The function by hardware can also be performed corresponding software and be realized by hardware realization.The hardware is soft
Part includes the one or more and corresponding module of above-mentioned function.
In a kind of possible realization method, the terminal device includes:Receiving unit, for receiving access network equipment
The unauthorized transfer resource configuration message sent, the unauthorized transfer resource configuration message include:At least two
The unauthorized transfer resource configuration parameter of Numerology, the unauthorized transfer resource configuration parameter include unauthorized transmission and provide
Source and/or the configuration instruction of the unauthorized transfer resource;Selecting unit, for being selected at least two Numerology
Select the unauthorized transfer resource of Numerology a kind of and/or the configuration instruction of unauthorized transfer resource;Transmission unit, for root
According to the unauthorized transfer resource of selected Numerology a kind of and/or the configuration instruction of unauthorized transfer resource, awarded non-
It weighs to transmit to the access network equipment transmission data on transfer resource and ask.
In alternatively possible realization method, the terminal device includes:Receiver, transmitter, memory and processor;
Wherein, batch processing code is stored in memory, and processor is used to call the program code stored in memory, performed following
Operation:Message is configured in the unauthorized transfer resource that access network equipment transmission is received by the receiver, described unauthorized
Transfer resource configuration message includes:The unauthorized transfer resource configuration parameter of at least two Numerology, the unauthorized biography
Defeated resource configuration parameter includes the configuration instruction of unauthorized transfer resource and/or the unauthorized transfer resource;It is described at least
The configuration of the unauthorized transfer resource and/or unauthorized transfer resource of a kind of Numerology is selected to refer in two kinds of Numerology
Show;According to the configuration instruction of the unauthorized transfer resource of selected Numerology a kind of and/or unauthorized transfer resource,
It is transmitted and asked to the access network equipment transmission data by the transmitter on unauthorized transfer resource.
Based on same inventive concept, the principle and advantageous effect solved the problems, such as due to the device may refer to above-mentioned first
Each possible embodiment and caused advantageous effect of aspect and first aspect, therefore the implementation of the device may refer to
The implementation of method, overlaps will not be repeated.
Description of the drawings
Fig. 1 is the Transmission Time Interval that different service types use in 5G mobile communication system and subcarrier spacing signal
Figure;
Fig. 2 be the present embodiments relate to a kind of communication system architecture schematic diagram;
Fig. 3 is a kind of interaction schematic diagram of communication control method provided in an embodiment of the present invention;
Fig. 4 is a kind of structure diagram of access network equipment provided in an embodiment of the present invention;
Fig. 5 is a kind of structure diagram of terminal device provided in an embodiment of the present invention;
Fig. 6 is the structure diagram of another access network equipment provided in an embodiment of the present invention;
Fig. 7 is the structure diagram of another terminal device provided in an embodiment of the present invention;
Fig. 8 is a kind of interaction schematic diagram of unauthorized transmission method provided in an embodiment of the present invention;
Fig. 9 is the structure diagram of another access network equipment provided in an embodiment of the present invention;
Figure 10 is the structure diagram of another terminal device provided in an embodiment of the present invention;
Figure 11 is the structure diagram of another access network equipment provided in an embodiment of the present invention;
Figure 12 is the structure diagram of another terminal device provided in an embodiment of the present invention.
Specific embodiment
Fig. 2 be the present embodiments relate to a kind of communication system architecture schematic diagram.The system includes terminal device and net
Network equipment, wherein, the network equipment includes access network equipment and core web network equipment (not shown) again.The embodiment of the present invention
Terminal device can be led to through wireless access network (Radio Access Network, RAN) and one or more core nets
Letter, terminal device can refer to the accession to terminal, subscriber unit, subscriber station, movement station, mobile station, remote station, remote terminal, movement
Equipment, user terminal, terminal, wireless telecom equipment, user agent or user apparatus.Access terminal can be cellular phone, nothing
Rope phone, session initiation protocol (Session Initiation Protocol, referred to as " SIP ") phone, wireless local loop
(Wireless Local Loop, referred to as " WLL ") stands, personal digital assistant (Personal Digital Assistant,
Referred to as " PDA "), there is the handheld device of wireless communication function, computing device or be connected to the other of radio modem
Processing equipment, mobile unit, wearable device, the UE in following 5G networks etc..
The access network equipment of the embodiment of the present invention the, for example, it may be base station (Base in gsm system or CDMA
Transceiver Station, referred to as " BTS ") or WCDMA system in base station (NodeB, referred to as " NB "),
Can also be evolved base station (Evolutional Node B, referred to as " eNB " or " eNodeB ") in LTE system or
The network equipment can be relay station, access point, mobile unit, wearable device, can also be Wireless Fidelity (Wireless-
Fidelity, Wi-Fi) website, can be next generation communication base station, such as the wireless access network equipment (New of 5G
Radio, NR or " a new generation eat dishes without rice or wine technology "), base station or small station, micro- station.
Specifically, in fig. 2, for using base station as access network equipment, base station 102 may include mutiple antennas group.
Each antenna sets can include one or more antennas, for example, an antenna sets may include antenna 104 and 106, another antenna
Group may include antenna 108 and 110, and additional group may include antenna 112 and 114.2 days are shown for each antenna sets in Fig. 2
Line, however more or fewer antennas can be used for each group.Base station 102 can additionally include transmitter chain and receiver
Chain, it will appreciated by the skilled person that they may each comprise sends and receives relevant multiple components with signal, such as
Processor, modulator, multiplexer, demodulator, demultiplexer or antenna etc..
Base station 102 can communicate with one or more terminal devices, such as terminal device 116 and terminal device 122.So
And, it will be understood that it base station 102 can be with any number of terminal equipment in communication similar to terminal device 116 or 122.Such as Fig. 2
Shown, terminal device 116 communicates with antenna 112 and 114, wherein antenna 112 and 114 by forward link 118 to terminal device
116 send information, and pass through reverse link 120 and receive information from terminal device 116.In addition, terminal device 122 and antenna 104
With 106 communications, wherein antenna 104 and 106 sends information, and pass through reverse link by forward link 124 to terminal device 122
126 receive information from terminal device 122.In frequency division duplex (Frequency Division Duplex, FDD) system, example
Such as, the available different frequency bands used in reverse link 120 of forward link 118, forward link 124 is available and reverse link
Different frequency bands used in 126.In addition, in time division duplex (Time Division Duplex, TDD) system, forward link
118 and reverse link 120 common frequency band can be used, common frequency band can be used in forward link 124 and reverse link 126.
It is designed to every group of antenna of communication and/or region is known as the sector of base station 102.For example, antenna sets can be set
It is calculated as and the terminal equipment in communication in the sector of 102 overlay area of base station.Distinguished in base station 102 by forward link 118 and 124
During being communicated with terminal device 116 and 122, the transmitting antenna of base station 102 can be improved using beam forming before to
The signal-to-noise ratio of link 118 and 124.In addition, signal is sent to its all access terminal equipment by individual antenna with base station
Mode is compared, and is sent in base station 102 using the terminal device 116 and 122 of beam forming random dispersion into associated coverage
During signal, the mobile equipment in neighboring community can be by less interference.
In given time, base station 102, terminal device 116 or terminal device 122 can be radio communication transmitter and/
Or radio communication receiver.When sending out data, radio communication transmitter can encode data for transmission.Tool
Body, radio communication transmitter can obtain, such as generate, received from other communication devices or preserve in memory etc., it
The data bit of the certain amount of radio communication receiver is sent to by channel.This data bit may include in data
In transmission block or multiple transmission blocks, transmission block can be segmented to generate multiple code blocks.
Referring to Fig. 3, Fig. 3 is a kind of interaction schematic diagram of communication control method provided in an embodiment of the present invention, this method
Include the following steps:
S101, access network equipment send bearing parameter to terminal device by radio resource control RRC signaling and correspond to
Relationship notification message.
For the terminal device of disconnected state (Inactive), since it also maintains data surface logic channel (Logical
Channel) which network slice (Network information or Data Radio Bearer information or each business belong to
Slice information), and in order to save access network equipment for each logic channel, Data Radio Bearer or network slice
The signaling overheads of wireless access control message or random access control parameter is sent, each logic can be directed in the present embodiment
Channel set, each Data Radio Bearer collection or network slice collection carry out access control.Wherein, logic channel refers to access net net
Network equipment can be that terminal device establishes different carryings, each corresponding logic channel of carrying, in this case, medium access control
System (Media Access Control, MAC) layer obtains being known which logic channel is this data be sent to after data
Corresponding radio link layer control protocol (Radio Link Control, RLC) layer.Network slice refers to the logic of a customization
On complete network, this is primarily to the different business demand of reply or tenant's demand, such as the industry of URLLC and mMTC
Business demand difference is very big, it may be necessary to which different topologys and modes of operation could meet, therefore network can be the two business
Two customization networks in logic are generated respectively, so as to meet corresponding demand respectively.Terminal device is sliced by some network
Multiple wireless data carrying/logic channels can be established when service.
Therefore, which includes:The mark and logic channel of at least one logic channel
The mark of the correspondence of the mark of collection or at least one Data Radio Bearer is corresponding with the mark of Data Radio Bearer collection to close
The correspondence of the mark of system, and/or at least one network slice and the mark of network slice collection.The RRC signaling includes:State
Convert message, RRC pauses request message, RRC release messages etc..
It should be noted that the step is optional step, it is represented by dotted lines in figure.It is alternatively:
Terminal device stores the correspondence of the mark of at least one logic channel and the mark of logic channel collection or at least one number
The mark being sliced according to the correspondence of the mark of the mark and Data Radio Bearer collection of radio bearer, and/or at least one network
With the correspondence of the mark of network slice collection.And the step can also perform after step s 102, and it is suitable not limit its execution
Sequence.By establishing logic channel collection, Data Radio Bearer collection or network slice collection, access network equipment can be saved for every
A logic channel, Data Radio Bearer or network slice send the signaling overheads of wireless access control message.
S102, the access network equipment send wireless access control message to the terminal device.
Access network equipment can broadcast the wireless access control message to all terminal devices, can also pass through RRC
Signaling sends the wireless access control message to corresponding terminal device.The RRC signaling includes:RRC release messages, state conversion
Message, attach request allow message etc..Terminal device receives the wireless access control message that access network equipment is sent.This disappears
Breath can be directed to the access control of the terminal device of any state, and the state of terminal device includes Idle state, connected state, disconnected
State, wherein, for the terminal device of connected state, terminal device can cause Radio Link to lose under connected state due to signal
(Radio Link Failure, RLF) is lost, in this case, terminal device is also required to access net again using random access
Network.
In the present embodiment, the wireless access control message includes:The random access control of at least two Numerology
Parameter, the random access control parameter are used to carry out congestion control when carrying out random access to the terminal device.Wherein, no
Interface-free resources with Numerology correspond to different parameters of eating dishes without rice or wine, such as subcarrier spacing, TTI, cyclic prefix (Cyclic
Prefix, CP) length etc. or these parameters combination.Access network equipment in wireless access control message by wrapping
The random access control parameter of two or more Numerology is included, terminal device can select one of which Numerology's
Random access control parameter carries out random access, then access network equipment optimizes the access strategy of all terminal devices, protects
Card terminal device can be accessed smoothly as possible.
Further, since 5G systems support the huge type of service of differentiation, in order to meet the needs of these differentiation,
Different terminal equipment type or services/bearer use different Transmission Time Interval and subcarrier spacing in 5G mobile communication system
Deng, therefore different terminal equipment types or services/bearer need that different Numerology is used to be serviced to meet it
QoS demand.Therefore, which can include:The random access control parameter of at least two Numerology,
Wherein, the random access control parameter of each Numerology includes:The random access congestion control factor, the random access are gathered around
It is corresponding with terminal equipment type or services/bearer parameter to fill in controlling elements;The services/bearer parameter includes:The terminal is set
Standby type of service, the mark (such as logic channel ID) of logic channel, the mark of logic channel collection, Data Radio Bearer mark
Know (such as Data Radio Bearer ID), the identifying of Data Radio Bearer collection, the network slice belonging to the business of the terminal device
Mark (such as network slice ID) or network slice collection mark, the mark of the network slice can be by core net
The mark of terminal device distribution, such as network slice selection auxiliary information (network slice selection
Assistance information, NSSAI) or session management network slice selection auxiliary information (session
Management-network slice selection assistance information, SM-NSSAI) slice/service
Type (slice/service type) or slice distinguish number (slice differentiator, SD) or new mark
Know or by mark of the access net for terminal device distribution.Access network equipment send random access control message to
Some specific terminal device or broadcast random access control message are given all in the terminal device intercepted, random access control
Message can be used for multiple terminal devices according to the terminal equipment type of multiple terminal devices or a variety of industry of multiple terminal devices
Business/bearing parameter carries out the selection of random access control parameter, can be used for a terminal device according to the terminal device
One or more services/bearer parameters carry out the selection of random access control parameter.
Wherein, there are many modes of the type of service of distinguishing terminal equipment, the first be distinguish in application layer (such as
QQ or Baidu), if be exactly for second user under Inactive states, logic channel or carrying can be passed through
It distinguishes (data of e.g. carrying 1 still carry 2 data).The range of terminal equipment type is that comparison is wide, such as
Terminal equipment type can refer to mobile phone user or vehicle to extraneous information exchange (Vehicle to X, V2X) user, Huo Zheqi
He.
The random access congestion control factor is a specific value (being, for example, 0.4), and terminal device is carrying out random access
When, a random number is generated, if this random number is smaller than 0.4, then random access is then carried out, if bigger than 0.4, then then
It is unable to random access.In the mechanism 1 of the prior art described above, what all types of service used is all same random
The congestion control factor is accessed, the present embodiment can be directed to different terminal equipment types or services/bearer parameter setting is different
The random access congestion control factor (such as the random access congestion control factor of URLLC business connects for the random of 1, mMTC business
It is 0.4 to enter the congestion control factor, it is evident that URLLC business has higher priority), then can then it reach for difference
Services/bearer do the purpose of different random access congestion controls.
Optionally, it can also include the steps of before step S102:The access network equipment determine it is described at least
The random access control parameter of two kinds of Numerology.
In the present embodiment, the random access control parameter of Numerology can be represented in the form of structure.Each
Numerology has corresponding random access channel (Random Access Channel, RACH) resource, the RACH resource packet
It includes:The time/frequency source block of the corresponding parameters of eating dishes without rice or wine of the Numerology, the structure parameter of Numerology are used as carry out one
The selection gist of the corresponding parameters of eating dishes without rice or wine of kind Numerology.
As a kind of realization method, each wireless access control message can need to carry out congestion control including a kind of
Numerology random access control parameter, i.e., the random access control parameter of a variety of Numerology is by a plurality of nothing
Multiple cells (Information Element, IE) that line is accessed in control message or a wireless access control information are sent
's.For carrying out random access congestion control according to type of service (service), lower shown congestion control architecture body
(1) example:
Congestion control architecture body (one) example:
In the structure, BarringPerNumerology-Category-r15 represent a kind of Numerology with
Machine accesses control parameter;Numerology-Category-r15 is a parameter newly added (compared to the mechanism 1 of the prior art
Numerology structures), integer of the value between [1, maxNumerology-Cat-r15], wherein
MaxNumerology-Cat-r15 refers to the maximum value of the number for the Numerology that system is supported, therefore, terminal device choosing
The value of some specific Numerology-Category-r15 is selected, then refers to terminal device and is corresponded to according to any Numerology
Random access control parameter carry out random access, if being successfully accessed, obtain the corresponding interface-free resources of the Numerology into
Row data transmission;Numerology-BarringConfig-r15 then refers to the random access control parameter of some Numerology;
As-Service-List represents type of service list;It is corresponding that ac-service-BarringConfig-r15 refers to type of service
Random access control parameter, the random access control parameter include:Ac-BarringFactor-r13, the i.e. control of random access congestion
The factor processed;Ac-BarringTime represents the lag time delay after random access, and before random access, terminal device will generate one
Random number between a [0,1], if the random number is less than the ac-BarringFactor that access network equipment is sent, then it is assumed that should
Access attempts success;Otherwise, which thinks that access attempts fail, and will generate the random number between one [0,1] again,
Opening timing device Tbarring (" Tbarring "=(0.7+0.6*rand) * ac-BarringTime), will not within the time
It can again attempt to access network;The load of Numerology-Load, Numerology, according to the difference of load, terminal device is adopted
With different Numerology so that congestion control more becomes more meticulous, and the class value { 100, p05 ... p95 } on the right of the parameter is
Optional load value, access network equipment select corresponding current load value in the class value, need to illustrate according to present load
, which can be included in wireless access control message, can also be sent to terminal by individual message and set
It is standby.
As another realization method, each wireless access control message can also be only included under a kind of Numerology
The corresponding random access control parameter of one services/bearer parameter, the example of lower shown structure (two):
The example of congestion control architecture body (two)
In the structure, BarringPerNumerology-Category-r15 expressions only include one kind
Numerology, barringPerService-Category-r15 expression only include a kind of corresponding random access of Service
Control parameter, the meaning of other parameter are identical with above described structure.
As another realization method, wireless access control message can also be the list including Numerology, described
The list of Numerology includes the random access congestion control factor of at least two Numerology and the end
The correspondence of end equipment type or services/bearer parameter.For carrying out random access congestion control according to type of service,
The example of congestion control architecture body (three) shown in lower:
The example of congestion control architecture body (three)
In the structure, BarringPerNumerology-List is an integer from 1 to maxNumerology
Value list, expression are a Numerology lists, and As-Service-List represents that its type of service is also a list.Its
His meaning of parameter is identical with above described structure.
And below in exemplary structure, Numerology is a list, and all Numerology are directed to one
Kind type of service carries out congestion control.The example of congestion control architecture body (four) as follows:
The example of congestion control architecture body (four)
As another realization method, multiple Numerology that the wireless access control message includes can also be one
A bitmap, the bitmap of Numerology are used to indicate whether a variety of Numerology need to carry out congestion control, certainly, the nothing
Line access control message further includes the random access control parameter for needing the Numerology for carrying out congestion control.As follows
The example of congestion control architecture body (five):
The example of congestion control architecture body (five)
In the structure, the value of As-BarringForSpecialNumerology is a bit string (BIT
STRING), such as the message includes 5 kinds of Numerology in total, and 1 represents that the Numerology needs to carry out congestion control, 0 table
Show that the Numerology does not need to carry out congestion control, then 11001 the 1st, 2,5 kind of Numerology of expression need to carry out congestion control
System, the 3rd, 4 kind of Numerology does not need to carry out congestion control, if terminal device uses the 3rd, 4 kind of Numerology, then to this
The services/bearer of terminal device or the terminal device does not need to carry out congestion control.Such as the business for extremely low time delay, it adopts
Numerology may need to carry out congestion control, and otherwise its RACH resource is preempted, and self time-delay just meets not
;And MTC service is insensitive to time delay, can not carry out congestion control to it.
As another realization method, need to carry out the terminal equipment type of congestion control or services/bearer parameter also may be used
To be a bitmap, the example of congestion control architecture body (six) as follows:
The example of congestion control architecture body (six)
In the structure, BarringPerNumerology-List represents the list of a Numerology, As-
The value of BarringForSpecialService is a bit string (BIT STRING), represents the business under each Numerology
Whether type, which needs to carry out congestion control, is represented in the form of bitmap.Such as terminal device one shares 5 kinds of types of service,
The bitmap of 5bit can be generated for this 5 kinds of types of service, 1 represents that the type of service can be accessed by limitation, and 0 represents not connect by limitation
Enter, then if bitmap is 00110, then type of service 1,2,5 are not influenced by Access Control Policy, and type of service 3, and 4 are connect
Enter control strategy influence;Its bitmap it is also possible that:Corresponding digital 0 represents that the type of service can be accessed by limitation, number
Word 1 represents not limited access, then if bitmap is 11001, then type of service 1,2,5 are not influenced by Access Control Policy,
And type of service 3,4 are influenced by Access Control Policy.The meaning of the other parameter of the structure is identical with aforementioned structure body.
Further, all terminal equipment types corresponding with a kind of Numerology or services/bearer parameter are corresponding
One random access congestion control factor;Or each terminal equipment type corresponding with a kind of Numerology or business/hold
It carries parameter and corresponds to a random access congestion control factor.The correspondence is adapted to a kind of structure of any of the above.
For example, the example of congestion control architecture body (seven) as follows:
The example of congestion control architecture body (seven)
In the structure, the value of As-BarringForSpecialService is a bit string (BIT STRING), table
Whether show the type of service under each Numerology to need to carry out congestion control is represented in the form of bitmap.But institute
Some Service using a kind of wireless access control parameter, are only whether to use the bitmap according to Service to determine.
S103, the terminal device select a kind of the random of Numerology to connect at least two Numerology
Enter control parameter.
After terminal device receives the random access control parameter of a variety of Numerology, selection is a kind of wherein
The random access control parameter of Numerology.Before random access, terminal device will generate the random number between one [0,1],
If the random number is less than the random access congestion control factor in random access control parameter, then it is assumed that access attempts success;
Otherwise, which thinks that access attempts fail, and will generate the random number between one [0,1], opening timing device again
Tbarring (" Tbarring "=(0.7+0.6*rand) * ac-BarringTime), will not again attempt within the time
Network is accessed, after timer time arrival, one random access control parameter of reselection.
Further, terminal device is according to itself terminal equipment type or services/bearer parameter and according to receiving
A variety of Numerology random access control parameter, obtain with the terminal equipment type or services/bearer parameter pair of itself
The random access control parameter answered.
S104, the terminal device connect according to the random access control parameter of selected Numerology a kind of to described
Enter web network equipment and send random access request.
Specifically, as previously described, terminal device is when carrying out random access, generates a random number, if this with
Machine number is smaller than the selected random access congestion control factor, then random access is then carried out, if connect at random than selected
It is big to enter the congestion control factor, then be then unable to random access.When carrying out random access, using selected Numerology's
RACH resource carries out random access.The access network equipment receives the terminal device according to described at least two of selection
The random access request that the random access control parameter of one of which Numerology in Numerology is sent carries out random
Access.
The advantageous effect of the scheme using the embodiment is exemplified below:Short TTI (such as:0.1ms)
Business of the Numerology commonly used to service URLLC, that is, the business of extremely low time delay, but if in the Numerology
On identical congestion control scheme is used to URLLC and big connection business (mMTC), then URLLC user random access when
Time can be seized, and since the number of users of MTC is big, so the congestion of the Numerology can be caused, make by MTC service
Network (collision) can not successfully be accessed by obtaining URLLC, so as to reach QoS demand.But if we are at this
Numerology is upper to use different business different congestion controls, i.e. access network equipment notifies terminal device according to not
The same adoptable Numerology of type of service, other types of service such as mMTC use others Numerology, i.e., not
It can select the TTI of 0.1ms, then ensure that URLLC business can smoothly access network.
A kind of wireless access jamming control method provided according to embodiments of the present invention, access network equipment provide a variety of
The random access control parameter of selectable Numerology for terminal device select, so as to terminal device may be selected it is different
Numerology is serviced, and access network equipment optimizes random access congestion control policy;And terminal device can basis
The terminal equipment type or services/bearer parameter of itself select the random access control parameter of corresponding Numerology a kind of,
Terminal device can be directed to the congestion control that different business/carrying can become more meticulous.
Referring to Fig. 4, Fig. 4 is a kind of structure diagram of access network equipment provided in an embodiment of the present invention.This connects
Enter web network equipment 1000 to include:Transmitting element 11 and receiving unit 12;Wherein:
Transmitting element 11, for sending wireless access control message to terminal device, the wireless access control message package
It includes:The random access control parameter of at least two Numerology, the random access control parameter are used to set the terminal
It is standby to carry out carrying out congestion control during random access;
Receiving unit 12 selects wherein for receiving the terminal device according at least two Numerology
The random access request that the random access control parameter of Numerology a kind of is sent.
In the realization method, access network equipment provides the random access control parameter of a variety of Numerology for eventually
End equipment selects, and the random access congestion control factor that a kind of Numerology may be selected in terminal device carries out random access, connects
Enter the random access control parameter that web network equipment provides various selectable Numerology, so as to which terminal device may be selected
Different Numerology are serviced, and access network equipment optimizes random access congestion control policy.
Further, the access network equipment may also include:Determination unit (not shown);
The determination unit, for determining the random access control parameter of at least two Numerology.
Further, the random access control parameter includes:The random access congestion control factor, the random access are gathered around
It is corresponding with terminal equipment type or services/bearer parameter to fill in controlling elements;
The services/bearer parameter includes:The type of service of the terminal device, the mark of logic channel, logic channel
The mark of collection, the mark of Data Radio Bearer, the identifying of Data Radio Bearer collection, the network belonging to the business of the terminal device
The mark of mark or network the slice collection of slice.
In the realization method, access network equipment provides the random access control parameter of a variety of Numerology for eventually
End equipment selects, and terminal device can select corresponding one kind according to the terminal equipment type or services/bearer parameter of itself
The random access control parameter of Numerology is taken so as to which different Numerology may be selected in different terminal devices
Business, the congestion control that can be become more meticulous for different business/carrying.
Further, each wireless access control message includes a kind of Numerology for needing to carry out congestion control
Random access control parameter;Or
The wireless access control message includes the list of Numerology, and the list of the Numerology is including described
The random access congestion control factor of at least two Numerology and the terminal equipment type or services/bearer parameter
Correspondence;Or
The wireless access control message includes Numerology bitmaps, and the Numerology bitmaps are used to indicate described
Whether at least two Numerology need to carry out congestion control, and the wireless access control message, which further includes, to be needed to carry out congestion
The random access congestion control factor of the Numerology of control.
In the realization method, the sending method or message format of wireless access control message can be diversified, can once send out
The random access control parameter of Numerology a kind of is sent, also can once send the random access control ginseng of all Numerology
Number, the random access control parameter of all Numerology can be represented with tabular form, need to carry out congestion control
Numerology can be represented with bitmap.
Further, all terminal equipment types corresponding with a kind of Numerology or services/bearer parameter are corresponding
One random access congestion control factor;Or each terminal equipment type corresponding with a kind of Numerology or business/hold
It carries parameter and corresponds to a random access congestion control factor.
In the realization method, pair of terminal equipment type or services/bearer parameter and the random access congestion control factor
Should be related to can diversification.
Optionally, the transmitting element 11 is additionally operable to send to the terminal device by radio resource control RRC signaling
Bearing parameter correspondence notification message, the bearing parameter correspondence notification message include:At least one logic channel
Mark is wirelessly held with the correspondence of the mark of the logic channel collection or the mark of at least one Data Radio Bearer with data
It carries the correspondence of the mark of collection, and/or the mark of at least one network slice is corresponding with the mark of network slice collection
Relationship.
In the realization method, by the mark of the corresponding logic channel collection of the mark of multiple logic channels or will be multiple
The mark of the corresponding Data Radio Bearer collection of mark of Data Radio Bearer or the mark for being sliced multiple networks correspond to one
The mark of network slice collection, can save the signaling overheads that access network equipment sends random access control parameter.
Further, the wireless access control message further includes:Each at least two Numerology
The load information of Numerology.
In the realization method, wireless access congestion control also considers the load of Numerology, according to the difference of load,
Terminal device uses different Numerology so that congestion control more becomes more meticulous.
A kind of access network equipment provided according to embodiments of the present invention, access network equipment provide various selectable
Numerology random access control parameter for terminal device select, so as to terminal device may be selected it is different
Numerology is serviced, and access network equipment optimizes random access congestion control policy;And terminal device can basis
The terminal equipment type or services/bearer parameter of itself select the random access control parameter of corresponding Numerology a kind of,
Terminal device can be directed to the congestion control that different business/carrying can become more meticulous.
Referring to Fig. 5, Fig. 5 is a kind of structure diagram of terminal device provided in an embodiment of the present invention.The terminal device
2000 include:Receiving unit 21, selecting unit 22 and access unit 23;Wherein:
Receiving unit 21, for receiving the wireless access control message of access network equipment transmission, the wireless access
Control message includes:The random access control parameter of at least two Numerology, the random access control parameter for pair
The terminal device carries out carrying out congestion control during random access;
Selecting unit 22, for selecting a kind of random access of Numerology at least two Numerology
Control parameter;
Access unit 23, for the random access control parameter according to a kind of selected Numerology to the access
Web network equipment sends random access request.
Further, the random access control parameter includes:The random access congestion control factor, the random access are gathered around
It is corresponding with terminal equipment type or services/bearer parameter to fill in controlling elements;
The services/bearer parameter includes:The type of service of the terminal device, the mark of logic channel, logic channel
The mark of collection, the mark of Data Radio Bearer, the identifying of Data Radio Bearer collection, the network belonging to the business of the terminal device
The mark of mark or network the slice collection of slice.
Further, each wireless access control message includes a kind of Numerology for needing to carry out congestion control
Random access control parameter;Or
The wireless access control message includes the list of Numerology, and the list of the Numerology is including described
The random access congestion control factor of at least two Numerology and the terminal equipment type or services/bearer parameter
Correspondence;Or
The wireless access control message includes Numerology bitmaps, and the Numerology bitmaps are used to indicate described
Whether at least two Numerology need to carry out congestion control, and the wireless access control message, which further includes, to be needed to carry out congestion
The random access congestion control factor of the Numerology of control.
Further, all terminal equipment types corresponding with a kind of Numerology or services/bearer parameter are corresponding
One random access congestion control factor;Or each terminal equipment type corresponding with a kind of Numerology or business/hold
It carries parameter and corresponds to a random access congestion control factor.
Further, the receiving unit 21, which is additionally operable to receive the access network equipment, passes through wireless heterogeneous networks
The bearing parameter correspondence notification message that RRC signaling is sent, the bearing parameter correspondence notification message include:At least one
Mark and the correspondence of mark of the logic channel collection or the mark of at least one Data Radio Bearer of a logic channel
Collect with the mark that the correspondence of the mark of Data Radio Bearer collection, and/or at least one network are sliced and network slice
Mark correspondence.
Further, the wireless access control message further includes:Each at least two Numerology
The load information of Numerology.
A kind of terminal device provided according to embodiments of the present invention, access network equipment provide various selectable
The random access control parameter of Numerology is selected for terminal device, so as to which different Numerology may be selected in terminal device
It is serviced, access network equipment optimizes random access congestion control policy, terminal device random access control parameter
Selection diversification;And terminal device can select corresponding one kind according to the terminal equipment type or services/bearer parameter of itself
The random access control parameter of Numerology, terminal device can be directed to the congestion control that different business/carrying can become more meticulous
System.
Referring to Fig. 6, Fig. 6 is the structure diagram of another access network equipment provided in an embodiment of the present invention, it should
Access network equipment 3000 can include transmitter 31, receiver 32, processor 33 and memory 34, and transmitter 31 receives
Device 32, processor 33 and memory 34 connect bus 35 respectively.
Processor 33 controls the operation of access network equipment 3000, and processor 33 can also be known as central processing unit
(Central Processing Unit, CPU).Processor 33 may be a kind of IC chip, have the processing energy of signal
Power.Processor 33 can also be general processor, digital signal processor (Digital Signal Processing, DSP),
Application-specific integrated circuit (Application Specific Integrated Circuit, ASIC), field programmable gate array
(Field-Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor
Logical device, discrete hardware components.General processor can be microprocessor or the processor can also be any conventional
Processor etc..
Wherein, batch processing code is stored in memory 34, and processor 33 is used to call the journey stored in memory 34
Sequence code, for performing the following operations:
Wireless access control message is sent to terminal device by transmitter, the wireless access control message includes:Extremely
The random access control parameter of few two kinds of Numerology, the random access control parameter are used to carry out the terminal device
Congestion control is carried out during random access;
The terminal device is received by the receiver to select wherein according at least two Numerology
The random access request that the random access control parameter of Numerology a kind of is sent.
In one implementation, the random access control parameter includes:The random access congestion control factor, it is described with
The machine access congestion control factor is corresponding with terminal equipment type or services/bearer parameter;
The services/bearer parameter includes:The type of service of the terminal device, the mark of logic channel, logic channel
The mark of collection, the mark of Data Radio Bearer, the identifying of Data Radio Bearer collection, the network belonging to the business of the terminal device
The mark of mark or network the slice collection of slice.
In the realization method, access network equipment provides the random access control parameter of a variety of Numerology for eventually
End equipment selects, and terminal device can select corresponding one kind according to the terminal equipment type or services/bearer parameter of itself
The random access control parameter of Numerology is taken so as to which different Numerology may be selected in different terminal devices
Business, the congestion control that can be become more meticulous for different business/carrying.
In another implementation, each wireless access control message needs to carry out congestion control including a kind of
The random access control parameter of Numerology;Or
The wireless access control message includes the list of Numerology, and the list of the Numerology is including described
The correspondence of the random access congestion control factor and the terminal equipment type or services/bearer parameter;Or
The wireless access control message includes Numerology bitmaps, and the Numerology bitmaps are used to indicate
Whether Numerology needs to carry out congestion control, and the wireless access control message, which further includes, to be needed to carry out congestion control
The random access congestion control factor of Numerology.
In the realization method, the sending method or message format of wireless access control message can be diversified, can once send out
The random access control parameter of Numerology a kind of is sent, also can once send the random access control ginseng of all Numerology
Number, the random access control parameter of all Numerology can be represented with tabular form, need to carry out congestion control
Numerology can be represented with bitmap.
In another realization method, all terminal equipment types corresponding with a kind of Numerology or business/hold
It carries parameter and corresponds to a random access congestion control factor;Or
Each terminal equipment type corresponding with a kind of Numerology or corresponding one of services/bearer parameter connect at random
Enter the congestion control factor.
In the realization method, pair of terminal equipment type or services/bearer parameter and the random access congestion control factor
Should be related to can diversification.
In another realization method, the processor 33 is additionally operable to perform following operation:
The transmitter is controlled to send bearing parameter correspondence to terminal device by radio resource control RRC signaling to lead to
Know message, the bearing parameter correspondence notification message includes:The mark of at least one logic channel and the logic channel
The mark of the correspondence of the mark of collection or at least one Data Radio Bearer is corresponding with the mark of Data Radio Bearer collection to close
The correspondence of the mark of system, and/or at least one network slice and the mark of network slice collection.
In the realization method, by the mark of the corresponding logic channel collection of the mark of multiple logic channels or will be multiple
The mark of the corresponding Data Radio Bearer collection of mark of Data Radio Bearer or the mark for being sliced multiple networks correspond to one
The mark of network slice collection, can save the signaling overheads that access network equipment sends random access control parameter.
In another realization method, the wireless access control message further includes:At least two Numerology
In each Numerology load information.
In the realization method, wireless access congestion control also considers the load of Numerology, according to the difference of load,
Terminal device uses different Numerology so that congestion control more becomes more meticulous.
A kind of access network equipment provided according to embodiments of the present invention, access network equipment provide a variety of
The random access control parameter of Numerology is selected for terminal device, and a kind of the random of Numerology may be selected in terminal device
It accesses the congestion control factor and carries out random access, access network equipment provides the random of various selectable Numerology
Control parameter is accessed, is serviced so as to which different Numerology may be selected in terminal device, access network equipment optimizes
Random access congestion control policy.
Referring to Fig. 7, Fig. 7 is the structure diagram of another terminal device provided in an embodiment of the present invention, which sets
Standby 4000 can include transmitter 41, receiver 42, processor 43 and memory 44, transmitter 41, receiver 42, processor 43
Bus 45 is connected respectively with memory 44.
The operation of 43 control terminal equipment 4000 of processor, processor 43 can also be known as central processing unit (Central
Processing Unit, CPU).Processor 43 may be a kind of IC chip, have the processing capacity of signal.Processor
43 can also be general processor, digital signal processor (Digital Signal Processing, DSP), special integrated electricity
Road (Application Specific Integrated Circuit, ASIC), field programmable gate array (Field-
Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor logic,
Discrete hardware components.General processor can be microprocessor or the processor can also be any conventional processor etc..
Wherein, batch processing code is stored in memory 44, and processor 43 is used to call the journey stored in memory 44
Sequence code, for performing the following operations:
The wireless access control message of access network equipment transmission is received by receiver, the wireless access control disappears
Breath includes:The random access control parameter of at least two Numerology, the random access control parameter were used for the end
End equipment carries out carrying out congestion control during random access;
The random access control parameter of Numerology a kind of is selected at least two Numerology;
According to the random access control parameter of selected Numerology a kind of, by the transmitter to the access
Web network equipment sends random access request.
In one implementation, the random access control parameter includes:The random access congestion control factor, it is described with
The machine access congestion control factor is corresponding with terminal equipment type or services/bearer parameter;
The services/bearer parameter includes:The type of service of the terminal device, the mark of logic channel, logic channel
The mark of collection, the mark of Data Radio Bearer, the identifying of Data Radio Bearer collection, the network belonging to the business of the terminal device
The mark of mark or network the slice collection of slice.
In another realization method, each wireless access control message needs to carry out congestion control including a kind of
The random access control parameter of Numerology;Or
The wireless access control message includes the list of Numerology, and the list of the Numerology is including described
The random access congestion control factor of at least two Numerology and the terminal equipment type or services/bearer parameter
Correspondence;Or
The wireless access control message includes Numerology bitmaps, and the Numerology bitmaps are used to indicate described
Whether at least two Numerology need to carry out congestion control, and the wireless access control message, which further includes, to be needed to carry out congestion
The random access congestion control factor of the Numerology of control.
In another realization method, all terminal equipment types corresponding with a kind of Numerology or business/hold
It carries parameter and corresponds to a random access congestion control factor;Or
Each terminal equipment type corresponding with a kind of Numerology or corresponding one of services/bearer parameter connect at random
Enter the congestion control factor.
In another realization method, the processor 43 is additionally operable to perform following operation:
The carrying sent by the receiver reception access network equipment by radio resource control RRC signaling
Parameter correspondence notification message, the bearing parameter correspondence notification message include:The mark of at least one logic channel
With the correspondence of the mark of the logic channel collection or the mark of at least one Data Radio Bearer and Data Radio Bearer collection
Mark correspondence, and/or at least one network slice mark with the network slice collection mark correspondence.
Another realization method, the wireless access control message further include:In at least two Numerology
The load information of each Numerology.
A kind of terminal device provided according to embodiments of the present invention, access network equipment provide a variety of Numerology's
Random access control parameter is selected for terminal device, and the random access congestion control of Numerology a kind of may be selected in terminal device
The factor carries out random access, and access network equipment provides the random access control ginseng of various selectable Numerology
Number is serviced so as to which different Numerology may be selected in terminal device, and access network equipment optimizes random access and gathers around
Fill in control strategy, the selection diversification of terminal device.
It is similar with wireless access congestion control, different unauthorized transfer resources is had on different Numerology,
For different services/bearers, need to transmit number according to different unauthorized transfer resource configuration instructions on Numerology
According to specifically see the description of the following examples:
Referring to Fig. 8, Fig. 8 is a kind of interaction schematic diagram of unauthorized transmission method provided in an embodiment of the present invention.The party
Method includes the following steps:
S201, access network equipment send bearing parameter to terminal device by radio resource control RRC signaling and correspond to
Relationship notification message.
For the terminal device of disconnected state, since it also maintains data surface logical channel information or data are wireless
Carrying information or each business belong to the information of which network slice, and are directed to save access network equipment
Each logic channel, Data Radio Bearer or network slice send unauthorized transfer resource configuration message or unauthorized transfer resource
The signaling overheads of parameter is configured, is needed in the present embodiment for each logic channel collection, each Data Radio Bearer collection or net
Network slice collection carries out unauthorized transfer resource configuration.Wherein, logic channel refers to that access network equipment can be terminal device
Different carryings is established, each corresponding logic channel of carrying, in this case, media access control layer obtains data later just
Know and this data is sent to the corresponding radio link layer control protocol layer of which logic channel.Network slice refers to that one is determined
The complete network in logic of system, this primarily to the different business demand of reply or tenant's demand, such as URLLC and
The business demand otherness of mMTC is very big, it may be necessary to which different topologys and mode of operation could meet, therefore network can be this
Two business generate two customization networks in logic respectively, so as to meet corresponding demand respectively.Terminal device is by some
Multiple wireless data carrying/logic channels can be established when network slice service.
The bearing parameter correspondence notification message includes:The mark of at least one logic channel and the mark of logic channel collection
The correspondence of the mark of the mark of the correspondence of knowledge or at least one Data Radio Bearer and Data Radio Bearer collection and/
Or the correspondence of the mark of at least one network slice and the mark of network slice collection.
The RRC signaling includes:State conversion message, RRC pauses request message, RRC release messages etc..
It should be noted that the step is optional step, it is represented by dotted lines in figure.It is alternatively:
Terminal device stores the correspondence of the mark of at least one logic channel and the mark of logic channel collection or at least one number
The mark being sliced according to the correspondence of the mark of the mark and Data Radio Bearer collection of radio bearer, and/or at least one network
With the correspondence of the mark of network slice collection.And the step can also perform after step S202, and it is suitable not limit its execution
Sequence.By establishing logic channel collection, Data Radio Bearer collection or network slice collection, access network equipment can be saved for every
A logic channel, Data Radio Bearer or network slice send the signaling overheads of unauthorized transfer resource configuration message.
S202, the access network equipment send unauthorized transfer resource and message are configured to the terminal device.
Traditional data transfer mode:Terminal device will transmit upstream data, then be set firstly the need of to access net network
Standby request resource after access network equipment receives request, can be that terminal device distributes resource, then tell terminal device,
Terminal device can carry out transmitting uplink data in corresponding resource in this way.And the unauthorized transmission mode of the present embodiment refers to
Be that access network equipment pre-allocates a part of resource in advance, when then multiple terminal devices will transmit upstream data, be not required to
Access network equipment to be asked to distribute resource again, but is directly at war with to these resources, transmits data.The present embodiment
In, message is configured to terminal device by sending unauthorized transfer resource in access network equipment, and terminal device non-is awarded according to this
It weighs transfer resource configuration message and obtains unauthorized transfer resource.
Access network equipment can broadcast the wireless access control message to all terminal devices, can also pass through RRC
Signaling sends the wireless access control message to corresponding terminal device.The RRC signaling includes:RRC release messages, state conversion
Message, attach request allow message etc..Terminal device receives the unauthorized transfer resource configuration that access network equipment is sent and disappears
Breath.The terminal device is usually the terminal device of disconnected state.
In the present embodiment, the unauthorized transfer resource configuration message includes:At least two Numerology's is unauthorized
Transfer resource is configured parameter, and the unauthorized transfer resource configuration parameter includes unauthorized transfer resource and/or described unauthorized
The configuration instruction of transfer resource.Wherein, the interface-free resources of different Numerology correspond to different parameters of eating dishes without rice or wine, such as subcarrier
The combination of interval, Transmission Time Interval, circulating prefix-length etc. or these parameters.Access network equipment non-by awarding
Power transfer resource configuration message includes the unauthorized transfer resource configuration parameter of two or more Numerology, terminal device
It can select the unauthorized transfer resource of one of which Numerology that parameter is configured to carry out data transmission, access network equipment
Optimize the unauthorized transfer resource configuration strategy of all terminal devices.
Further, since 5G systems support the huge type of service of differentiation, in order to meet the needs of these differentiation,
Unauthorized transmission is carried out in 5G mobile communication system, different terminal equipment type and/or services/bearer use different transmission
Time interval and subcarrier spacing etc., therefore, different terminal equipment types and/or services/bearer can use different
Numerology is serviced to meet its QoS demand.Therefore, the configuration instruction and terminal device of the unauthorized transfer resource
Type or services/bearer parameter correspond to, wherein, the services/bearer parameter includes:The type of service of the terminal device is patrolled
(such as data are wireless for volume mark (such as logic channel ID) of channel, the mark of logic channel collection, the mark of Data Radio Bearer
Carrying ID) or the identifying of Data Radio Bearer collection, the mark or network of network slice belonging to the business of the terminal device
The mark of collection is sliced, the mark of the network slice can be cut by the mark that core net is terminal device distribution, such as network
Piece selection auxiliary information (network slice selection assistance information, NSSAI) or session
Manage network slice selection auxiliary information (session management-network slice selection
Assistance information, SM-NSSAI) slice/service type (slice/service type) or slice area
Branch (slice differentiator, SD) or new mark or the mark distributed by access net for terminal device
Know.Access network equipment sends unauthorized transfer resource configuration message to some specific terminal device or the unauthorized biography of broadcast
For defeated resource distribution message to all in the terminal device intercepted, which can be used for multiple terminals
Equipment carries out unauthorized according to multiple business/bearing parameter of the terminal equipment type or multiple terminal devices of multiple terminal devices
The selection of the resource distribution of transmission can be used for a terminal device according to one or more business of the terminal device/hold
Carry the selection that parameter carries out the resource distribution of unauthorized transmission.
It should be noted that unauthorized transfer resource can inform terminal device, and therefore, unauthorized transmission money
Source configuration parameter can only include the configuration instruction of unauthorized transfer resource.
Wherein, there are many modes of differentiated service type, the first be distinguish in application layer (be, for example, QQ or
Baidu), if be exactly for second user under Inactive states, can by logic channel or carrying distinguish
(data of e.g. carrying 1 still carry 2 data).The range of terminal equipment type is that comparison is wide, such as terminal device
Type can refer to mobile phone user either V2X user or other.
Optionally, it can also include the steps of before step S202:The access network equipment determines at least two
The unauthorized transfer resource configuration parameter of Numerology.
In the present embodiment, the unauthorized transmission configuration parameter of Numerology can be represented in the form of structure.Each
Numerology has corresponding unauthorized transfer resource, which includes:The corresponding skies of the Numerology
The time/frequency source block of mouthful parameter, the structure parameter of Numerology are used as carrying out that a kind of Numerology is corresponding to eat dishes without rice or wine to join
Several selection gists.
As a kind of realization method, each unauthorized transfer resource configuration message can include a kind of Numerology
Unauthorized transmission configuration parameter, i.e., the unauthorized transmission configuration parameter of a variety of Numerology is by a plurality of unauthorized transmission
Multiple cells (Information Element, IE) in resource distribution message or a unauthorized transfer resource configuration information
It sends.For carrying out unauthorized transfer resource configuration according to type of service (service), unauthorized transmission as follows
The example (one) of resource allocation structure body:
The example (one) of unauthorized transfer resource configuration structure entity
In the structure, GFPerNumerology-Category-r15 represents a kind of unauthorized biography of Numerology
Transmission & distribution put parameter;Numerology-Category-r15 is a parameter newly added (compared to the mechanism 1 of the prior art
Numerology structures), integer of the value between [1, maxNumerology-Cat-r15], wherein
MaxNumerology-Cat-r15 refers to the maximum value of the number for the Numerology that system is supported, therefore, terminal device choosing
The value of some specific Numerology-Category-r15 is selected, then refers to terminal device and is corresponded to according to any Numerology
Unauthorized transmission configuration parameter carry out unauthorized transmission, if configuration successful, obtain that the Numerology is corresponding to eat dishes without rice or wine to provide
Source carries out data transmission;Numerology-GFConfig-r15 then refers to the unauthorized transmission configuration parameter of some Numerology;
As-Service-List represents type of service list;It is corresponding unauthorized that ac-service-GFConfig-r15 refers to type of service
Transmission configuration parameter, the unauthorized transmission configuration parameter include:Ac-GFFactor-r13, i.e. unauthorized transfer resource configuration because
Son;Ac-GFTime represents that, if do not succeeded using GF transmissions for the first time, GF transmits the stand-by period needed to distance next time,
It is unsuccessfully opening timing device TGF (" TGF "=(0.7+0.6*rand) * ac-GFTime) to send, will not be again within the time
It attempts to carry out GF;The load of Numerology-Load, Numerology, according to the difference of load, terminal device is using different
Numerology so that unauthorized transfer resource configuration more becomes more meticulous, the class value { 100, p05 ... p95 } on the right of the parameter
For optional load value, access network equipment selects corresponding current load value in the class value, needs according to present load
Bright, which can be included in unauthorized transfer resource configuration message, can also be sent by individual message
To terminal device.
As another realization method, each unauthorized transfer resource configuration message can also only include one kind
The corresponding unauthorized transmission configuration parameter of a services/bearer parameter under Numerology, unauthorized transmission as follows
The example (two) of resource allocation structure body:
The example (two) of unauthorized transfer resource configuration structure entity
In the structure, GFPerNumerology-Category-r15 expressions only include a kind of Numerology,
GFPerService-Category-r15 expressions only include a kind of corresponding unauthorized transmission configuration parameters of Service, other ginsengs
Several meanings is identical with above described structure.
As another realization method, unauthorized transfer resource configuration message can also be the row including Numerology
Table, the list of the Numerology include the unauthorized transfer resource configuration factor of at least two Numerology
With the correspondence of the terminal equipment type or services/bearer parameter.To carry out unauthorized transfer resource according to type of service
For configuration, the example (three) of unauthorized transfer resource configuration structure entity as follows:
The example (three) of unauthorized transfer resource configuration structure entity
In the structure, GFPerNumerology-List is the integer value row from 1 to maxNumerology
Table, expression are a Numerology lists, and As-Service-List represents that its type of service is also a list.Other ginsengs
Several meanings is identical with above described structure.
And below in exemplary structure, Numerology is a list, and all Numerology are directed to one
Kind type of service carries out unauthorized transfer resource configuration.The example of unauthorized transfer resource configuration structure entity as follows
(4):
The example (four) of unauthorized transfer resource configuration structure entity
As another realization method, multiple Numerology that the unauthorized transfer resource configuration message includes may be used also
To be a bitmap, the bitmap of Numerology is used to indicate whether a variety of Numerology need to carry out unauthorized transmission money
Source is configured, and certainly, which further includes the non-of the Numerology that needs to carry out unauthorized transmission
Parameter is configured in authorized transmissions.The example (five) of unauthorized transfer resource configuration structure entity as follows:
The example (five) of unauthorized transfer resource configuration structure entity
In the structure, the value of As-GFForSpecialNumerology is a bit string (BIT STRING), such as
The message includes 5 kinds of Numerology in total, and 1 represents that the Numerology needs to carry out unauthorized transfer resource configuration, and 0 represents
The Numerology does not need to carry out unauthorized transfer resource configuration, then 11001 expression the 1st, 2,5 kind of Numerology need into
The unauthorized transfer resource configuration of row, the 3rd, 4 kind of Numerology does not need to carry out unauthorized transfer resource configuration, if terminal device
Using the 3rd, 4 kind of Numerology, then the services/bearer of the terminal device or the terminal device is not needed to carry out unauthorized biography
Defeated resource distribution.Such as the business for extremely low time delay, the Numerology used may need to carry out unauthorized transmission
Resource distribution, otherwise its unauthorized transfer resource be preempted, self time-delay just can not meet;And MTC service is unwise to time delay
Sense, can not carry out it unauthorized transfer resource configuration.
As another realization method, need to carry out the terminal equipment type of unauthorized transfer resource configuration or business/hold
It can also be a bitmap to carry parameter, the example (six) of unauthorized transfer resource configuration structure entity as follows:
The example (six) of unauthorized transfer resource configuration structure entity
In the structure, GFPerNumerology-List represents the list of a Numerology, As-
The value of GFForSpecialService is a bit string (BIT STRING), represents the type of service under each Numerology
Whether need to carry out unauthorized transfer resource to be configured is represented in the form of bitmap.Such as terminal device one shares 5 kinds of industry
Service type can generate the bitmap of 5bit for this 5 kinds of types of service, and 1 represents that the type of service needs to carry out unauthorized transmission money
Source is configured, and 0 represents not needing to carry out unauthorized transfer resource configuration, then if bitmap is 00110, then type of service 1,2,5
It is not influenced by unauthorized transfer resource configuration strategy, and type of service 3,4 are influenced by unauthorized transfer resource configuration strategy;Its position
Figure it is also possible that:Corresponding digital 0 expression type of service needs to carry out unauthorized transfer resource configuration, digital 1 table
Show and do not need to carry out unauthorized transfer resource configuration, then if bitmap is 11001, then type of service 1,2,5 by not unauthorized
Transfer resource configuration strategy influences, and type of service 3, and 4 are influenced by unauthorized transfer resource configuration strategy.The structure other
The meaning of parameter is identical with aforementioned structure body.
Further, all terminal equipment types corresponding with a kind of Numerology or services/bearer parameter are corresponding
One unauthorized transfer resource configuration instruction;Or each terminal equipment type corresponding with a kind of Numerology or business/
Bearing parameter corresponds to a unauthorized transfer resource configuration instruction.The correspondence is adapted to a kind of structure of any of the above.
For example, the example (seven) of unauthorized transfer resource configuration structure entity as follows:
In the structure, the value of As-GFForSpecialService is a bit string (BIT STRING), represents every
Whether the type of service under kind Numerology, which needs to carry out unauthorized transfer resource to be configured, is represented in the form of bitmap.
But all Service are only whether to use the position according to Service using a kind of unauthorized transfer resource configuration parameter
Figure determines.
The example (seven) of unauthorized transfer resource configuration structure entity
S203, the terminal device select that a kind of Numerology's is unauthorized at least two Numerology
The configuration instruction of transfer resource and/or unauthorized transfer resource.
After terminal device receives the unauthorized transfer resource configuration parameter of a variety of Numerology, selection is a kind of wherein
The unauthorized transfer resource configuration parameter of Numerology.
Further, terminal device is according to itself terminal equipment type or services/bearer parameter and according to receiving
A variety of Numerology unauthorized transfer resource configuration parameter, obtain with the terminal equipment type or services/bearer of itself
The corresponding unauthorized transfer resource configuration parameter of parameter.
S204, the terminal device according to the unauthorized transfer resource of selected Numerology a kind of and/or non-are awarded
The configuration instruction of transfer resource is weighed, transmits and asks to the access network equipment transmission data on unauthorized transfer resource.
The interface-free resources of unauthorized transfer resource, that is, Numerology, it is signified according to the configuration instruction of unauthorized transfer resource
Show the Numerology of use, terminal device is in the corresponding interface-free resources transmitting datas of the Numerology.
A kind of unauthorized transmission method provided according to embodiments of the present invention, access network equipment provide plurality of optional
The unauthorized transfer resource configuration parameter of the Numerology selected, carries out so as to which different Numerology may be selected in terminal device
Service, access network equipment optimize unauthorized transfer resource configuration strategy.
Referring to Fig. 9, Fig. 9 is the structure diagram of another access network equipment provided in an embodiment of the present invention.It should
Access network equipment 5000 includes transmitting element 51 and receiving unit 52;Wherein:
Transmitting element 51, for sending unauthorized transfer resource configuration message to terminal device, the unauthorized transmission money
Source configuration message includes:The unauthorized transfer resource configuration parameter of at least two Numerology;
Receiving unit 52 selects wherein for receiving the terminal device according at least two Numerology
The data transfer request that the unauthorized transfer resource configuration parameter of Numerology a kind of is sent on unauthorized transfer resource.
In the realization method, access network equipment provides the unauthorized transfer resource configuration ginseng of a variety of Numerology
Number is selected for terminal device, and the unauthorized transfer resource configuration parameter that a kind of Numerology may be selected in terminal device carries out non-award
Power transmission, access network equipment provide the unauthorized transfer resource configuration parameter of various selectable Numerology, from
And terminal device may be selected different Numerology and be serviced, access network equipment optimizes unauthorized transfer resource and matches
Put strategy.
In one implementation, the unauthorized transfer resource configuration parameter includes unauthorized transfer resource and/or institute
State the configuration instruction of unauthorized transfer resource, the configuration instruction of the unauthorized transfer resource and terminal equipment type or business/
Bearing parameter corresponds to, wherein, the services/bearer parameter includes:The type of service of the terminal device, the mark of logic channel
Knowledge, the identifying of the mark of logic channel collection, the mark of Data Radio Bearer or Data Radio Bearer collection, the terminal device
The mark of network slice belonging to business or the mark of network slice collection.
In the realization method, the unauthorized configured transmission that access network equipment provides a variety of Numerology supplies terminal
Equipment selects, and terminal device can select corresponding one kind according to the terminal equipment type or services/bearer parameter of itself
The unauthorized transmission configuration parameter of Numerology is taken so as to which different Numerology may be selected in different terminal devices
Business, the unauthorized transmission that can be become more meticulous for different business/carrying.
In a kind of realization method is separately made, each unauthorized transfer resource configuration message includes a kind of Numerology
Unauthorized transfer resource configuration parameter;Or
The unauthorized transfer resource configuration message includes the list of Numerology, the list packet of the Numerology
The configuration for including the unauthorized transfer resource, and/or the unauthorized transfer resource of at least two Numerology refers to
Show the correspondence with the terminal equipment type or services/bearer parameter;Or
The unauthorized transfer resource configuration message includes Numerology bitmaps, and the Numerology bitmaps are used to refer to
Show adoptable at least two Numerology during terminal device transmission data, the unauthorized transfer resource configuration message is also wrapped
Include the unauthorized transfer resource configuration parameter of each Numerology.
In the realization method, the sending method or message format of unauthorized transfer resource configuration message can be diversified, can
The unauthorized transfer resource configuration parameter of Numerology a kind of is once sent, also can once send the non-of all Numerology
Authorized transmissions resource configuration parameter, parameter, which is configured, in the unauthorized transfer resource of all Numerology to be represented with tabular form,
Adoptable Numerology can be represented with bitmap during terminal device transmission data.
In another realization method, all terminal equipment types corresponding with a kind of Numerology or business/hold
Carry the configuration instruction that parameter corresponds to a unauthorized transfer resource;Or
Each terminal equipment type corresponding with a kind of Numerology or services/bearer parameter it is corresponding one it is unauthorized
The configuration instruction of transfer resource.
In the realization method, terminal equipment type or services/bearer parameter and the configuration instruction of unauthorized transfer resource
Correspondence can diversification.
In another realization method, the transmitting element 51 is additionally operable to through radio resource control RRC signaling to terminal
Equipment sends bearing parameter correspondence notification message, and the bearing parameter correspondence notification message includes:It is at least one to patrol
Collect the mark of channel and the correspondence of mark of the logic channel collection, and/or the mark of at least one Data Radio Bearer
Collect with the mark that the correspondence of the mark of Data Radio Bearer collection, and/or at least one network are sliced and network slice
Mark correspondence.
In the realization method, by the mark of the corresponding logic channel collection of the mark of multiple logic channels or will be multiple
The mark of the corresponding Data Radio Bearer collection of mark of Data Radio Bearer or the mark for being sliced multiple networks correspond to one
The mark of network slice collection can save the signaling overheads that access network equipment sends unauthorized transfer resource configuration parameter.
In another realization method, the unauthorized transfer resource configuration message further includes:Described at least two
The load information of each Numerology in Numerology.
In the realization method, unauthorized to transmit the load for also considering Numerology, according to the difference of load, terminal is set
It is standby to use different Numerology so that unauthorized transmission more becomes more meticulous.
A kind of access network equipment provided according to embodiments of the present invention, access network equipment provide a variety of
The unauthorized transfer resource configuration parameter of Numerology is selected for terminal device, and a kind of Numerology may be selected in terminal device
Unauthorized transfer resource configuration parameter carry out unauthorized transmission, access network equipment provides various selectable
The unauthorized transfer resource configuration parameter of Numerology, is taken so as to which different Numerology may be selected in terminal device
Business, access network equipment optimize unauthorized transfer resource configuration strategy.
Referring to Fig. 10, Figure 10 is the structure diagram of another terminal device provided in an embodiment of the present invention.The terminal
Equipment 6000 includes:Receiving unit 61, selecting unit 62 and transmission unit 63;Wherein:
Receiving unit 61, message is configured in the unauthorized transfer resource for receiving access network equipment transmission, described non-
Authorized transmissions resource distribution message includes:The unauthorized transfer resource configuration parameter of at least two Numerology, it is described non-to award
Weigh the configuration instruction that transfer resource configuration parameter includes unauthorized transfer resource and/or the unauthorized transfer resource;
Selecting unit 62, for selecting the unauthorized biography of Numerology a kind of at least two Numerology
The configuration instruction of defeated resource and/or unauthorized transfer resource;
Transmission unit 63, for the unauthorized transfer resource according to a kind of selected Numerology and/or unauthorized
The configuration instruction of transfer resource is transmitted to the access network equipment transmission data on unauthorized transfer resource and is asked.
In a kind of realization method, configuration instruction and terminal equipment type or the services/bearer of the unauthorized transfer resource
Parameter corresponds to, wherein, the services/bearer parameter includes:The type of service of the terminal device, is patrolled at the mark of logic channel
The mark of volume channel set, the mark of Data Radio Bearer, Data Radio Bearer collection identify, belonging to the business of the terminal device
Network slice mark or network slice collection mark.
In another realization method, each unauthorized transfer resource configuration message includes a kind of the non-of Numerology
Authorized transmissions resource configuration parameter;Or
The unauthorized transfer resource configuration message includes the list of Numerology, the list packet of the Numerology
The configuration for including the unauthorized transfer resource, and/or the unauthorized transfer resource of at least two Numerology refers to
Show the correspondence with the terminal equipment type or services/bearer parameter;Or
The unauthorized transfer resource configuration message includes Numerology bitmaps, and the Numerology bitmaps are used to refer to
Show adoptable at least two Numerology during terminal device transmission data, the unauthorized transfer resource configuration message is also wrapped
Include the unauthorized transfer resource configuration parameter of each Numerology.
In another realization method, all terminal equipment types corresponding with a kind of Numerology or business/hold
Carry the configuration instruction that parameter corresponds to a unauthorized transfer resource;Or
Each terminal equipment type corresponding with a kind of Numerology or services/bearer parameter it is corresponding one it is unauthorized
The configuration instruction of transfer resource.
In another realization method, the receiving unit 61 be additionally operable to receive the access network equipment pass through it is wireless
The bearing parameter correspondence notification message that resources control RRC signaling is sent, the bearing parameter correspondence notification message packet
It includes:The mark of at least one logic channel and the correspondence of the mark of the logic channel collection, and/or at least one data without
The mark of line carrying and the mark and institute of the correspondence of the mark of Data Radio Bearer collection, and/or at least one network slice
State the correspondence of the mark of network slice collection.
In another realization method, the unauthorized transfer resource configuration message further includes:Described at least two
The load information of each Numerology in Numerology.
A kind of terminal device provided according to embodiments of the present invention, access network equipment provide a variety of Numerology's
Unauthorized transfer resource configuration parameter is selected for terminal device, and the unauthorized transmission of Numerology a kind of may be selected in terminal device
Resource configuration parameter carries out unauthorized transmission, and access network equipment provides the unauthorized of various selectable Numerology
Parameter is configured in transfer resource, is serviced so as to which different Numerology may be selected in terminal device, access network equipment is excellent
Unauthorized transfer resource configuration strategy, the unauthorized transfer resource configuration parameter diversification of terminal device are changed..
The structure diagram that 1, Figure 11 is another access network equipment provided in an embodiment of the present invention is please referred to Fig.1,
The access network equipment 7000 can include transmitter 71, receiver 72, processor 73 and memory 74, and transmitter 71 connects
It receives device 72, processor 73 and memory 74 and connects bus 75 respectively.
Processor 73 controls the operation of access network equipment 7000, and processor 73 can also be known as central processing unit
(Central Processing Unit, CPU).Processor 73 may be a kind of IC chip, have the processing energy of signal
Power.Processor 73 can also be general processor, digital signal processor (Digital Signal Processing, DSP),
Application-specific integrated circuit (Application Specific Integrated Circuit, ASIC), field programmable gate array
(Field-Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor
Logical device, discrete hardware components.General processor can be microprocessor or the processor can also be any conventional
Processor etc..
Wherein, batch processing code is stored in memory 74, and processor 73 is used to call the journey stored in memory 74
Sequence code, for performing the following operations:
Unauthorized transfer resource is sent by transmitter, message is configured to terminal device, the unauthorized transfer resource configuration
Message includes:The unauthorized transfer resource configuration parameter of at least two Numerology, the unauthorized transfer resource configuration ginseng
Number includes the configuration instruction of unauthorized transfer resource and/or the unauthorized transfer resource;
The terminal device is received by the receiver to select wherein according at least two Numerology
The data transfer request that the unauthorized transfer resource configuration parameter of Numerology a kind of is sent on unauthorized transfer resource.
In the realization method, access network equipment provides the unauthorized transfer resource configuration ginseng of a variety of Numerology
Number is selected for terminal device, and the unauthorized transfer resource configuration parameter that a kind of Numerology may be selected in terminal device carries out non-award
Power transmission, access network equipment provide the unauthorized transfer resource configuration parameter of various selectable Numerology, from
And terminal device may be selected different Numerology and be serviced, access network equipment optimizes unauthorized transfer resource and matches
Put strategy.
In one implementation, the unauthorized transfer resource configuration parameter includes unauthorized transfer resource and/or institute
State the configuration instruction of unauthorized transfer resource, the configuration instruction of the unauthorized transfer resource and terminal equipment type or business/
Bearing parameter corresponds to, wherein, the services/bearer parameter includes:The type of service of the terminal device, the mark of logic channel
Knowledge, the identifying of the mark of logic channel collection, the mark of Data Radio Bearer or Data Radio Bearer collection, the terminal device
The mark of network slice belonging to business or the mark of network slice collection.
In the realization method, the unauthorized configured transmission that access network equipment provides a variety of Numerology supplies terminal
Equipment selects, and terminal device can select corresponding one kind according to the terminal equipment type or services/bearer parameter of itself
The unauthorized transmission configuration parameter of Numerology is taken so as to which different Numerology may be selected in different terminal devices
Business, the unauthorized transmission that can be become more meticulous for different business/carrying.
In another implementation, each unauthorized transfer resource configuration message includes a kind of Numerology's
Parameter is configured in unauthorized transfer resource;Or
The unauthorized transfer resource configuration message includes the list of Numerology, the list packet of the Numerology
The configuration for including the unauthorized transfer resource, and/or the unauthorized transfer resource of at least two Numerology refers to
Show the correspondence with the terminal equipment type or services/bearer parameter;Or
The unauthorized transfer resource configuration message includes Numerology bitmaps, and the Numerology bitmaps are used to refer to
Show adoptable at least two Numerology during terminal device transmission data, the unauthorized transfer resource configuration message is also wrapped
Include the unauthorized transfer resource configuration parameter of each Numerology.
In the realization method, the sending method or message format of unauthorized transfer resource configuration message can be diversified, can
The unauthorized transfer resource configuration parameter of Numerology a kind of is once sent, also can once send the non-of all Numerology
Authorized transmissions resource configuration parameter, parameter, which is configured, in the unauthorized transfer resource of all Numerology to be represented with tabular form,
Adoptable Numerology can be represented with bitmap during terminal device transmission data.
In another realization method, all terminal equipment types corresponding with a kind of Numerology or business/hold
Carry the configuration instruction that parameter corresponds to a unauthorized transfer resource;Or
Each terminal equipment type corresponding with a kind of Numerology or services/bearer parameter it is corresponding one it is unauthorized
The configuration instruction of transfer resource.
In the realization method, terminal equipment type or services/bearer parameter and the configuration instruction of unauthorized transfer resource
Correspondence can diversification.
In another realization method, the processor 73 is additionally operable to perform following operation:
Bearing parameter correspondence is sent by the transmitter to terminal device with radio resource control RRC signaling to notify
Message, the bearing parameter correspondence notification message include:The mark of at least one logic channel and the logic channel collection
Mark correspondence, and/or at least one Data Radio Bearer mark it is corresponding with the mark of Data Radio Bearer collection
The correspondence of relationship, and/or the mark of at least one network slice and the mark of network slice collection.
In the realization method, by the mark of the corresponding logic channel collection of the mark of multiple logic channels or will be multiple
The mark of the corresponding Data Radio Bearer collection of mark of Data Radio Bearer or the mark for being sliced multiple networks correspond to one
The mark of network slice collection can save the signaling overheads that access network equipment sends unauthorized transfer resource configuration parameter.
In another realization method, the unauthorized transfer resource configuration message further includes:Described at least two
The load information of each Numerology in Numerology.
In the realization method, unauthorized to transmit the load for also considering Numerology, according to the difference of load, terminal is set
It is standby to use different Numerology so that unauthorized transmission more becomes more meticulous.
A kind of access network equipment provided according to embodiments of the present invention, access network equipment provide a variety of
The unauthorized transfer resource configuration parameter of Numerology is selected for terminal device, and a kind of Numerology may be selected in terminal device
Unauthorized transfer resource configuration parameter carry out unauthorized transmission, access network equipment provides various selectable
The unauthorized transfer resource configuration parameter of Numerology, is taken so as to which different Numerology may be selected in terminal device
Business, access network equipment optimize unauthorized transfer resource configuration strategy.
Please refer to Fig.1 the structure diagram that 2, Figure 12 is another terminal device provided in an embodiment of the present invention, the terminal
Equipment 8000 can include transmitter 81, receiver 82, processor 83 and memory 84, transmitter 81, receiver 82, processor
83 and memory 84 connect bus 85 respectively.
The operation of 83 control terminal equipment 8000 of processor, processor 83 can also be known as central processing unit (Central
Processing Unit, CPU).Processor 83 may be a kind of IC chip, have the processing capacity of signal.Processor
83 can also be general processor, digital signal processor (Digital Signal Processing, DSP), special integrated electricity
Road (Application Specific Integrated Circuit, ASIC), field programmable gate array (Field-
Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor logic,
Discrete hardware components.General processor can be microprocessor or the processor can also be any conventional processor etc..
Wherein, batch processing code is stored in memory 84, and processor 83 is used to call the journey stored in memory 84
Sequence code, for performing the following operations:
Message, the unauthorized biography is configured in the unauthorized transfer resource that access network equipment transmission is received by receiver
Defeated resource distribution message includes:The unauthorized transfer resource configuration parameter of at least two Numerology, the unauthorized transmission
Resource configuration parameter includes the configuration instruction of unauthorized transfer resource and/or the unauthorized transfer resource;
The unauthorized transfer resource of Numerology a kind of is selected at least two Numerology and/or non-is awarded
Weigh the configuration instruction of transfer resource;
Referred to according to the configuration of the unauthorized transfer resource of selected Numerology a kind of and/or unauthorized transfer resource
Show, transmitted and asked to the access network equipment transmission data by the transmitter on unauthorized transfer resource.
In one implementation, the configuration instruction of the unauthorized transfer resource and terminal equipment type or business/hold
Parameter is carried to correspond to, wherein, the services/bearer parameter includes:The type of service of the terminal device, the mark of logic channel,
The mark of logic channel collection, the mark of Data Radio Bearer, the identifying of Data Radio Bearer collection, the business of terminal device institute
The mark of the network slice of category or the mark of network slice collection.
In another implementation, each unauthorized transfer resource configuration message includes a kind of Numerology's
Parameter is configured in unauthorized transfer resource;Or
The unauthorized transfer resource configuration message includes the list of Numerology, the list packet of the Numerology
The configuration for including the unauthorized transfer resource, and/or the unauthorized transfer resource of at least two Numerology refers to
Show the correspondence with the terminal equipment type or services/bearer parameter;Or
The unauthorized transfer resource configuration message includes Numerology bitmaps, and the Numerology bitmaps are used to refer to
Show adoptable at least two Numerology during terminal device transmission data, the unauthorized transfer resource configuration message is also wrapped
Include the unauthorized transfer resource configuration parameter of each Numerology.
In another realization method, all terminal equipment types corresponding with a kind of Numerology or business/hold
Carry the configuration instruction that parameter corresponds to a unauthorized transfer resource;Or
Each terminal equipment type corresponding with a kind of Numerology or services/bearer parameter it is corresponding one it is unauthorized
The configuration instruction of transfer resource.
In another realization method, the processor 83 is additionally operable to perform following operation:
The carrying sent by the receiver reception access network equipment by radio resource control RRC signaling
Parameter correspondence notification message, the bearing parameter correspondence notification message include:The mark of at least one logic channel
It is wirelessly held with data with the correspondence of the mark of the logic channel collection, and/or the mark of at least one Data Radio Bearer
It carries the correspondence of the mark of collection, and/or the mark of at least one network slice is corresponding with the mark of network slice collection
Relationship.
In another realization method, the unauthorized transfer resource configuration message further includes:Described at least two
The load information of each Numerology in Numerology.
A kind of terminal device provided according to embodiments of the present invention, access network equipment provide a variety of Numerology's
Unauthorized transfer resource configuration parameter is selected for terminal device, and the unauthorized transmission of Numerology a kind of may be selected in terminal device
Resource configuration parameter carries out unauthorized transmission, and access network equipment provides the unauthorized of various selectable Numerology
Parameter is configured in transfer resource, is serviced so as to which different Numerology may be selected in terminal device, access network equipment is excellent
Unauthorized transfer resource configuration strategy, the unauthorized transfer resource configuration parameter diversification of terminal device are changed.
Term " first ", " second ", " third " and " the 4th " in the specification of the present invention, claims and attached drawing
Etc. being for distinguishing different objects rather than for describing particular order.In addition, term " comprising " and " having " and they appoint
What is deformed, it is intended that covers non-exclusive include.Such as contain the process of series of steps or unit, method, system,
The step of product or equipment are not limited to list or unit, but optionally further include the step of not listing or list
Member is optionally further included for other intrinsic steps of these processes, method, system, product or equipment or unit.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, there is no the portion being described in detail in some embodiment
Point, it may refer to the associated description of other embodiment.
Through the above description of the embodiments, it is apparent to those skilled in the art that the present invention can be with
It is realized with hardware realization or firmware realization or combination thereof mode.It when implemented in software, can be by above-mentioned function
Storage is transmitted in computer-readable medium or as one or more instructions on computer-readable medium or code.Meter
Calculation machine readable medium includes computer storage media and communication media, and wherein communication media includes being convenient for from a place to another
Any medium of a place transmission computer program.Storage medium can be any usable medium that computer can access.With
For this but it is not limited to:Computer-readable medium can include random access memory (Random Access Memory,
RAM), read-only memory (Read-Only Memory, ROM), Electrically Erasable Programmable Read-Only Memory (Electrically
Erasable Programmable Read-Only Memory, EEPROM), CD-ROM (Compact Disc Read-
Only Memory, CD-ROM) or other optical disc storages, magnetic disk storage medium or other magnetic storage apparatus or can be used in
Carry or storage with instruction or data structure form desired program code simultaneously can by computer access any other
Medium.In addition.Any connection can be suitably become computer-readable medium.For example, if software is using coaxial cable, light
Fine optical cable, twisted-pair feeder, Digital Subscriber Line (Digital Subscriber Line, DSL) or such as infrared ray, radio and
The wireless technology of microwave etc is transmitted from website, server or other remote sources, then coaxial cable, optical fiber cable, double
The wireless technology of twisted wire, DSL or such as infrared ray, wireless and microwave etc is included in the fixing of affiliated medium.Such as this hair
Used in bright, disk (Disk) and dish (disc) including compress optical disc (CD), laser disc, optical disc, Digital Versatile Disc (DVD),
Floppy disk and Blu-ray Disc, the usually magnetic replicate data of which disk, and dish is then with laser come optical replicate data.Group above
Conjunction should also be as being included within the protection domain of computer-readable medium.
Claims (24)
1. a kind of communication control method, which is characterized in that the method includes:
Access network equipment sends wireless access control message to terminal device, and the wireless access control message includes:Extremely
The random access control parameter of few two kinds of Numerology, the random access control parameter are used to carry out the terminal device
Congestion control is carried out during random access;
The access network equipment receives the terminal device and is selected wherein according at least two Numerology
The random access request that the random access control parameter of Numerology a kind of is sent.
2. according to the method described in claim 1, it is characterized in that, the random access control parameter includes:Random access is gathered around
Controlling elements are filled in, the random access congestion control factor is corresponding with terminal equipment type or services/bearer parameter;
The services/bearer parameter includes:The type of service of the terminal device, the mark of logic channel, logic channel collection
Mark, the identifying of the mark of Data Radio Bearer, Data Radio Bearer collection, the network slice belonging to the business of the terminal device
Mark or network slice collection mark.
3. according to the method described in claim 2, it is characterized in that, each wireless access control message includes a kind of needs
Carry out the random access control parameter of the Numerology of congestion control;Or
The wireless access control message includes the list of Numerology, the list of the Numerology include it is described at least
Pair of the random access congestion control factor of two kinds of Numerology and the terminal equipment type or services/bearer parameter
It should be related to;Or
The wireless access control message includes Numerology bitmaps, the Numerology bitmaps be used to indicate it is described at least
Whether two kinds of Numerology need to carry out congestion control, and the wireless access control message, which further includes, to be needed to carry out congestion control
Numerology the random access congestion control factor.
4. according to the method in claim 2 or 3, which is characterized in that with a kind of corresponding all terminals of Numerology
Device type or services/bearer parameter correspond to a random access congestion control factor;Or
Each terminal equipment type corresponding with a kind of Numerology or the corresponding random access of services/bearer parameter are gathered around
Fill in controlling elements.
5. method according to any one of claims 1 to 4, which is characterized in that the method further includes:
The access network equipment sends bearing parameter to the terminal device by radio resource control RRC signaling and corresponds to pass
It is notification message, the bearing parameter correspondence notification message includes:The mark of at least one logic channel and the logic
Pair of the mark of the correspondence of the mark of channel set or at least one Data Radio Bearer and the mark of Data Radio Bearer collection
It should be related to, and/or what at least one network was sliced identifies the correspondence of mark collected with network slice.
6. method according to any one of claims 1 to 5, which is characterized in that the wireless access control message further includes:
The load information of each Numerology at least two Numerology.
7. a kind of communication control method, which is characterized in that the method includes:
Terminal device receives the wireless access control message that access network equipment is sent, the wireless access control message package
It includes:The random access control parameter of at least two Numerology, the random access control parameter are used to set the terminal
It is standby to carry out carrying out congestion control during random access;
The terminal device selects the random access of Numerology a kind of to control ginseng at least two Numerology
Number;
The terminal device accesses net network according to the random access control parameter of selected Numerology a kind of to described
Equipment sends random access request.
8. the method according to the description of claim 7 is characterized in that the random access control parameter includes:Random access is gathered around
Controlling elements are filled in, the random access congestion control factor is corresponding with terminal equipment type or services/bearer parameter;
The services/bearer parameter includes:The type of service of the terminal device, the mark of logic channel, logic channel collection
Mark, the identifying of the mark of Data Radio Bearer, Data Radio Bearer collection, the network slice belonging to the business of the terminal device
Mark or network slice collection mark.
9. according to the method described in claim 8, it is characterized in that, each wireless access control message includes a kind of needs
Carry out the random access control parameter of the Numerology of congestion control;Or
The wireless access control message includes the list of Numerology, the list of the Numerology include it is described at least
Pair of the random access congestion control factor of two kinds of Numerology and the terminal equipment type or services/bearer parameter
It should be related to;Or
The wireless access control message includes Numerology bitmaps, the Numerology bitmaps be used to indicate it is described at least
Whether two kinds of Numerology need to carry out congestion control, and the wireless access control message, which further includes, to be needed to carry out congestion control
Numerology the random access congestion control factor.
10. method according to claim 8 or claim 9, which is characterized in that with a kind of corresponding all terminals of Numerology
Device type or services/bearer parameter correspond to a random access congestion control factor;Or
Each terminal equipment type corresponding with a kind of Numerology or the corresponding random access of services/bearer parameter are gathered around
Fill in controlling elements.
11. according to claim 7 to 10 any one of them method, which is characterized in that the method further includes:
The terminal device receives the bearing parameter pair that the access network equipment is sent by radio resource control RRC signaling
It should be related to notification message, the bearing parameter correspondence notification message includes:The mark of at least one logic channel with it is described
The mark of the correspondence of the mark of logic channel collection or at least one Data Radio Bearer and the mark of Data Radio Bearer collection
Correspondence, and/or at least one network slice mark with the network slice collection mark correspondence.
12. according to claim 7 to 11 any one of them method, which is characterized in that the wireless access control message is also wrapped
It includes:The load information of each Numerology at least two Numerology.
13. a kind of access network equipment, which is characterized in that the access network equipment includes:Receiver, is deposited transmitter
Reservoir and processor;Wherein, batch processing code is stored in memory, and processor is used to call the program stored in memory
Code performs following operate:
Wireless access control message is sent to terminal device by the transmitter, the wireless access control message includes:Extremely
The random access control parameter of few two kinds of Numerology, the random access control parameter are used to carry out the terminal device
Congestion control is carried out during random access;
The terminal device is received according to the one of which selected at least two Numerology by the receiver
The random access request that the random access control parameter of Numerology is sent.
14. access network equipment according to claim 13, which is characterized in that the random access control parameter packet
It includes:The random access congestion control factor, the random access congestion control factor and terminal equipment type or services/bearer parameter
It is corresponding;
The services/bearer parameter includes:The type of service of the terminal device, the mark of logic channel, logic channel collection
Mark, the identifying of the mark of Data Radio Bearer, Data Radio Bearer collection, the network slice belonging to the business of the terminal device
Mark or network slice collection mark.
15. access network equipment according to claim 14, which is characterized in that each wireless access control message
Including a kind of random access control parameter for the Numerology for needing to carry out congestion control;Or
The wireless access control message includes the list of Numerology, the list of the Numerology include it is described at least
Pair of the random access congestion control factor of two kinds of Numerology and the terminal equipment type or services/bearer parameter
It should be related to;Or
The wireless access control message includes Numerology bitmaps, the Numerology bitmaps be used to indicate it is described at least
Whether two kinds of Numerology need to carry out congestion control, and the wireless access control message, which further includes, to be needed to carry out congestion control
Numerology the random access congestion control factor.
16. the access network equipment according to claims 14 or 15, which is characterized in that opposite with a kind of Numerology
All terminal equipment types or services/bearer parameter answered correspond to a random access congestion control factor;Or
Each terminal equipment type corresponding with a kind of Numerology or the corresponding random access of services/bearer parameter are gathered around
Fill in controlling elements.
17. according to claim 13 to 16 any one of them access network equipment, which is characterized in that the processor is also used
It is operated as follows in performing:
Bearing parameter correspondence is sent by the transmitter to the terminal device with radio resource control RRC signaling to notify
Message, the bearing parameter correspondence notification message include:The mark of at least one logic channel and the logic channel collection
Mark correspondence or at least one Data Radio Bearer mark it is corresponding with the mark of Data Radio Bearer collection close
The correspondence of the mark of system, and/or at least one network slice and the mark of network slice collection.
18. according to claim 13 to 17 any one of them access network equipment, which is characterized in that the wireless access control
Message processed further includes:The load information of each Numerology at least two Numerology.
19. a kind of terminal device, which is characterized in that the terminal device includes:Receiver, transmitter, memory and processor;
Wherein, batch processing code is stored in memory, and processor is used to call the program code stored in memory, performed following
Operation:
The wireless access control message of access network equipment transmission is received by the receiver, the wireless access control disappears
Breath includes:The random access control parameter of at least two Numerology, the random access control parameter were used for the end
End equipment carries out carrying out congestion control during random access;
The random access control parameter of Numerology a kind of is selected at least two Numerology;
According to the random access control parameter of selected Numerology a kind of, net net is accessed to described by the transmitter
Network equipment sends random access request.
20. terminal device according to claim 19, which is characterized in that the random access control parameter includes:At random
The congestion control factor is accessed, the random access congestion control factor is corresponding with terminal equipment type or services/bearer parameter;
The services/bearer parameter includes:The type of service of the terminal device, the mark of logic channel, logic channel collection
Mark, the identifying of the mark of Data Radio Bearer, Data Radio Bearer collection, the network slice belonging to the business of the terminal device
Mark or network slice collection mark.
21. terminal device according to claim 20, which is characterized in that each wireless access control message includes one
Kind needs to carry out the random access control parameter of the Numerology of congestion control;Or
The wireless access control message includes the list of Numerology, the list of the Numerology include it is described at least
Pair of the random access congestion control factor of two kinds of Numerology and the terminal equipment type or services/bearer parameter
It should be related to;Or
The wireless access control message includes Numerology bitmaps, the Numerology bitmaps be used to indicate it is described at least
Whether two kinds of Numerology need to carry out congestion control, and the wireless access control message, which further includes, to be needed to carry out congestion control
Numerology the random access congestion control factor.
22. the terminal device according to claim 20 or 21, which is characterized in that with a kind of corresponding institutes of Numerology
There are terminal equipment type or services/bearer parameter to correspond to a random access congestion control factor;Or
Each terminal equipment type corresponding with a kind of Numerology or the corresponding random access of services/bearer parameter are gathered around
Fill in controlling elements.
23. according to claim 19 to 22 any one of them terminal device, which is characterized in that the processor is additionally operable to perform
Following operation:
The bearing parameter sent by the receiver reception access network equipment by radio resource control RRC signaling
Correspondence notification message, the bearing parameter correspondence notification message include:The mark of at least one logic channel and institute
State the correspondence of the mark of logic channel collection or the mark of at least one Data Radio Bearer and the mark of Data Radio Bearer collection
The correspondence of the mark of the correspondence of knowledge, and/or at least one network slice and the mark of network slice collection.
24. according to claim 19 to 23 any one of them terminal device, which is characterized in that the wireless access control message
It further includes:The load information of each Numerology at least two Numerology.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710005280.9A CN108271213B (en) | 2017-01-04 | 2017-01-04 | Communication control method, unauthorized transmission method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710005280.9A CN108271213B (en) | 2017-01-04 | 2017-01-04 | Communication control method, unauthorized transmission method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108271213A true CN108271213A (en) | 2018-07-10 |
CN108271213B CN108271213B (en) | 2021-06-22 |
Family
ID=62770722
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710005280.9A Active CN108271213B (en) | 2017-01-04 | 2017-01-04 | Communication control method, unauthorized transmission method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108271213B (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2020038431A1 (en) * | 2018-08-23 | 2020-02-27 | 华为技术有限公司 | V2x communication method and apparatus |
CN112887106A (en) * | 2018-09-30 | 2021-06-01 | Oppo广东移动通信有限公司 | Communication method and device and communication equipment |
WO2022022635A1 (en) * | 2020-07-31 | 2022-02-03 | 维沃移动通信有限公司 | Access control method and apparatus, and terminal and network device |
CN114339616A (en) * | 2020-09-30 | 2022-04-12 | 维沃移动通信有限公司 | Congestion control method, device and equipment for broadcast multicast service |
WO2023019542A1 (en) * | 2021-08-20 | 2023-02-23 | Zte Corporation | Systems and methods for initial access |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101064864A (en) * | 2006-04-28 | 2007-10-31 | 大唐移动通信设备有限公司 | Method for counting and access controlling in MBMS service |
CN101272608A (en) * | 2007-03-21 | 2008-09-24 | 华为技术有限公司 | Interception reference signal transmission method and device |
CN104662964A (en) * | 2013-02-06 | 2015-05-27 | 华为技术有限公司 | Network access control method, device and system |
CN105594251A (en) * | 2013-08-09 | 2016-05-18 | 松下电器(美国)知识产权公司 | Efficient status reporting for ues in dual connectivity during mobility |
US20160164793A1 (en) * | 2013-07-24 | 2016-06-09 | Prateek Basu Mallick | Efficient discard mechanism in small cell deployment |
-
2017
- 2017-01-04 CN CN201710005280.9A patent/CN108271213B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101064864A (en) * | 2006-04-28 | 2007-10-31 | 大唐移动通信设备有限公司 | Method for counting and access controlling in MBMS service |
CN101272608A (en) * | 2007-03-21 | 2008-09-24 | 华为技术有限公司 | Interception reference signal transmission method and device |
CN104662964A (en) * | 2013-02-06 | 2015-05-27 | 华为技术有限公司 | Network access control method, device and system |
US20160164793A1 (en) * | 2013-07-24 | 2016-06-09 | Prateek Basu Mallick | Efficient discard mechanism in small cell deployment |
CN105594251A (en) * | 2013-08-09 | 2016-05-18 | 松下电器(美国)知识产权公司 | Efficient status reporting for ues in dual connectivity during mobility |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2020038431A1 (en) * | 2018-08-23 | 2020-02-27 | 华为技术有限公司 | V2x communication method and apparatus |
CN110858958A (en) * | 2018-08-23 | 2020-03-03 | 华为技术有限公司 | Communication method and device of V2X |
CN110858958B (en) * | 2018-08-23 | 2021-09-07 | 华为技术有限公司 | Communication method and device of V2X |
CN112887106A (en) * | 2018-09-30 | 2021-06-01 | Oppo广东移动通信有限公司 | Communication method and device and communication equipment |
WO2022022635A1 (en) * | 2020-07-31 | 2022-02-03 | 维沃移动通信有限公司 | Access control method and apparatus, and terminal and network device |
CN114071646A (en) * | 2020-07-31 | 2022-02-18 | 维沃移动通信有限公司 | Access control method, device, terminal and network equipment |
CN114071646B (en) * | 2020-07-31 | 2023-04-07 | 维沃移动通信有限公司 | Access control method, device, terminal and network equipment |
CN114339616A (en) * | 2020-09-30 | 2022-04-12 | 维沃移动通信有限公司 | Congestion control method, device and equipment for broadcast multicast service |
CN114339616B (en) * | 2020-09-30 | 2023-03-10 | 维沃移动通信有限公司 | Congestion control method, device and equipment for broadcast multicast service |
WO2023019542A1 (en) * | 2021-08-20 | 2023-02-23 | Zte Corporation | Systems and methods for initial access |
Also Published As
Publication number | Publication date |
---|---|
CN108271213B (en) | 2021-06-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11564072B2 (en) | Method for selecting, in selection period, subframe excluding subframe relating to subframe in which transmission has been performed during sensing period in wireless communication system, and terminal using same | |
US10536826B2 (en) | Method for selecting resource to be used for performing V2X communication within range satisfying latency requirement in wireless communication system, and terminal using same | |
CN113301661B (en) | Random access backoff method and system | |
CN108271213A (en) | Communication control method, unauthorized transmission method and device | |
US20110317777A1 (en) | Controlling Transmissions on Composite Carriers | |
WO2016134532A1 (en) | Data transmission method and apparatus, user equipment and system | |
CN108260105A (en) | A kind of D2D communication means and equipment | |
KR20200032198A (en) | Resource selection method of a terminal for V2X communication in a wireless communication system and a terminal using the method | |
JP2019536304A (en) | Beam management method, terminal device and network device | |
EP3226606B1 (en) | Method for ran-wlan aggregation | |
US20210112546A1 (en) | Resource allocation method, node, and storage medium | |
CN109525993B (en) | Method and apparatus for dynamically allocating resources in integrated access and backhaul wireless communication networks | |
CN109428680A (en) | The method and apparatus for sending or receiving upstream data | |
CN110463119A (en) | For enhancing the extension scheduling request (SR) of scheduling information instruction | |
CN103974341A (en) | Control apparatus, representative base station and base station control method | |
CN110663281A (en) | Method for allocating resources to base station terminal in wireless communication system and communication device using the same | |
JP2021524702A (en) | Data transmission method and related equipment | |
CN111052848A (en) | Method for operating a cellular radio communication network entity and cellular radio communication network entity | |
WO2002056627A1 (en) | Method for reporting status information between a mobile station and a radio access network | |
CN101083609A (en) | Terminal equipment accessing method, system and a terminal equipment | |
KR20180081372A (en) | Method and apparatus for user equipment operation for supporting multiple service in wireless communication system supporting communication between user equipments | |
CN101473671A (en) | A method and apparatus for dynamic adjustment of orthogonal frequency-division multiplexing during congested conditions | |
CN113766516B (en) | Uplink configuration method, system, base station and storage medium | |
CN107547172B (en) | Control information sending and receiving method, device, base station and terminal | |
KR101908066B1 (en) | Base station and bearer split method by the same |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |