CN108271213A - Communication control method, unauthorized transmission method and device - Google Patents

Communication control method, unauthorized transmission method and device Download PDF

Info

Publication number
CN108271213A
CN108271213A CN201710005280.9A CN201710005280A CN108271213A CN 108271213 A CN108271213 A CN 108271213A CN 201710005280 A CN201710005280 A CN 201710005280A CN 108271213 A CN108271213 A CN 108271213A
Authority
CN
China
Prior art keywords
numerology
random access
mark
parameter
terminal device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710005280.9A
Other languages
Chinese (zh)
Other versions
CN108271213B (en
Inventor
晋英豪
李宏
谭巍
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN201710005280.9A priority Critical patent/CN108271213B/en
Publication of CN108271213A publication Critical patent/CN108271213A/en
Application granted granted Critical
Publication of CN108271213B publication Critical patent/CN108271213B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA
    • H04W74/0833Random access procedures, e.g. with 4-step access
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/0289Congestion control

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the invention discloses a kind of communication control method and devices.Method therein includes:Access network equipment sends wireless access control message to terminal device, and the wireless access control message includes:The random access control parameter of at least two Numerology, the random access control parameter are used to carry out congestion control when carrying out random access to the terminal device;The access network equipment receives the random access request that the terminal device is sent according to the random access control parameter of the one of which Numerology selected at least two Numerology.Also disclose corresponding device.Access network equipment provides the random access control parameter of various selectable Numerology, is serviced so as to which different Numerology may be selected in terminal device, access network equipment optimizes random access congestion control policy.

Description

Communication control method, unauthorized transmission method and device
Technical field
The present invention relates to a kind of field of communication technology more particularly to communication control method, unauthorized transmission method and devices.
Background technology
In fourth generation mobile communication technology (4th- Generation, 4G) in system, only support a kind of Numerology, i.e., The length of Transmission Time Interval (Transmission Time Interval, TTI) and subcarrier spacing etc. are all fixed.When The interface-free resources of wireless access network (Radio Access Network, RAN) side can be carried out by limited time when random access Congestion control, since 4G systems only support a kind of Numerology, congestion control just for a kind of Numerology into Row.
But in the 5th third-generation mobile communication technology (5th- Generation, 5G) service quality can be supported in system (Quality of Service, QoS) huge type of service of differentiation, such as large-scale machines class communication (Massive Machine Type Communication, mMTC) business, superelevation reliably with the communication (Ultra-Reliable of low latency And Low Latency Communications, URLLC) business and enhanced mobile broadband (Enhanced Mobile Broadband, eMBB) business, multimedia broadcast multi-broadcasting business (Multimedia Broadcast Multicast Service, MBMS), in order to meet the needs of these differentiation, different business in 5G mobile communication system as shown in Figure 1 The Transmission Time Interval and subcarrier spacing schematic diagram that type uses, technology (New Radio, NR) is eated dishes without rice or wine by a new generation will be simultaneously Support multiple Numerology.
Long term evolution (Long Term Evolution, LTE) system has had been incorporated into many mechanism, realizes and is sent out in congestion When raw, network admittance control and Congestion Avoidance are carried out, these mechanism are all based on a kind of Numerology and carry out, without considering It can be serviced in 5G systems using a variety of Numerology, how random access congestion carried out under a variety of Numerology Control.
Unauthorized transmission mode refers to that access network equipment pre-allocates a part of resource in advance, and then multiple terminals are set It is standby when transmitting upstream data, it does not need to that access network equipment is asked to distribute resource again, but directly these resources is carried out Data are transmitted in competition.Current unauthorized (Grant-Free) transmission is also based on a kind of Numerology and carries out resource instruction, Without considering to be serviced using a variety of Numerology in 5G systems, how to be provided under a variety of Numerology Source indicates.
Invention content
The embodiment of the present invention provides a kind of communication control method and device, to solve under a variety of Numerology how into The problem of row random access congestion control.
In a first aspect, a kind of communication control method is provided, the method includes:Access network equipment transmission wirelessly connects Enter control message to terminal device, the wireless access control message includes:The random access control of at least two Numerology Parameter processed, the random access control parameter are used to carry out congestion control when carrying out random access to the terminal device;It is described Access network equipment receives the terminal device according to the one of which selected at least two Numerology The random access request that the random access control parameter of Numerology is sent.
In the realization method, access network equipment provides the random access control parameter of a variety of Numerology for eventually End equipment selects, and the random access congestion control factor that a kind of Numerology may be selected in terminal device carries out random access, connects Enter the random access control parameter that web network equipment provides various selectable Numerology, so as to which terminal device may be selected Different Numerology are serviced, and access network equipment optimizes random access congestion control policy.
According to a kind of realization method of first aspect, the method further includes:Determine at least two Numerology Random access control parameter.
According to another realization method of first aspect, the random access control parameter includes:Random access congestion control The factor processed, the random access congestion control factor are corresponding with terminal equipment type or services/bearer parameter;The business/hold Parameter is carried to include:The type of service of the terminal device, the mark of logic channel, the mark of logic channel collection, data are wirelessly held The mark of load, the identifying of Data Radio Bearer collection, the mark of network slice belonging to the business of the terminal device or network are cut The mark of piece collection.
In the realization method, access network equipment provides the random access control parameter of a variety of Numerology for eventually End equipment selects, and terminal device can select corresponding one kind according to the terminal equipment type or services/bearer parameter of itself The random access control parameter of Numerology is taken so as to which different Numerology may be selected in different terminal devices Business, the congestion control that can be become more meticulous for different business/carrying.
According to another realization method of first aspect, the mark of the network slice can be set by core net for terminal The mark that back-up is matched, such as network slice selection auxiliary information or session management network slice selection auxiliary information slice/clothes Service type is either sliced differentiation number or new mark or is the mark that terminal device distributes by access net.
According to another realization method of first aspect, each wireless access control message needs to carry out including a kind of The random access control parameter of the Numerology of congestion control;Or the wireless access control message includes Numerology's List, the list of the Numerology include the random access congestion control factor of at least two Numerology With the correspondence of the terminal equipment type or services/bearer parameter;Or the wireless access control message includes Numerology bitmaps, the Numerology bitmaps are used to indicate whether at least two Numerology is gathered around Plug control, the wireless access control message further include the random access congestion control for needing the Numerology for carrying out congestion control The factor processed.
In the realization method, the sending method or message format of wireless access control message can be diversified, can once send out The random access control parameter of Numerology a kind of is sent, also can once send the random access control ginseng of all Numerology Number, the random access control parameter of all Numerology can be represented with tabular form, need to carry out congestion control Numerology can be represented with bitmap.
According to another realization method of first aspect, with a kind of corresponding all terminal equipment types of Numerology Or services/bearer parameter corresponds to a random access congestion control factor;Or with a kind of Numerology corresponding each ends End equipment type or services/bearer parameter correspond to a random access congestion control factor.
In the realization method, pair of terminal equipment type or services/bearer parameter and the random access congestion control factor Should be related to can diversification.
According to another realization method of first aspect, the method further includes:The access network equipment passes through nothing Line resources control RRC signaling sends bearing parameter correspondence notification message to the terminal device, and the bearing parameter corresponds to Relationship notification message includes:The mark of at least one logic channel and the correspondence of the mark of the logic channel collection or extremely The mark of a few Data Radio Bearer is cut with the correspondence of the mark of Data Radio Bearer collection, and/or at least one network The correspondence of the mark of piece and the mark of network slice collection.
In the realization method, by the mark of the corresponding logic channel collection of the mark of multiple logic channels or will be multiple The mark of the corresponding Data Radio Bearer collection of mark of Data Radio Bearer or the mark for being sliced multiple networks correspond to one The mark of network slice collection, can save the signaling overheads that access network equipment sends random access control parameter.
According to another realization method of first aspect, the wireless access control message further includes:Described at least two The load information of each Numerology in Numerology.
In the realization method, wireless access congestion control also considers the load of Numerology, according to the difference of load, Terminal device uses different Numerology so that congestion control more becomes more meticulous.
Second aspect provides a kind of access network equipment, which, which has, realizes in the above method The function of access network equipment behavior.The function can also be performed corresponding soft by hardware realization by hardware Part is realized.The hardware or software include the one or more and corresponding module of above-mentioned function.
In a kind of possible realization method, the access network equipment includes:Transmitting element, for sending wireless access Control message includes to terminal device, the wireless access control message:The random access control of at least two Numerology Parameter, the random access control parameter are used to carry out congestion control when carrying out random access to the terminal device;It receives single Member, for receiving the terminal device according to the one of which Numerology's selected at least two Numerology The random access request that random access control parameter is sent.
In alternatively possible realization method, the terminal device includes:Receiver, transmitter, memory and processor; Wherein, batch processing code is stored in memory, and processor is used to call the program code stored in memory, performed following Operation:Wireless access control message is sent to terminal device by the transmitter, the wireless access control message includes:Extremely The random access control parameter of few two kinds of Numerology, the random access control parameter are used to carry out the terminal device Congestion control is carried out during random access;The terminal device is received according to described at least two by the receiver The random access request that the random access control parameter of the one of which Numerology selected in Numerology is sent.
Based on same inventive concept, the principle and advantageous effect solved the problems, such as due to the device may refer to above-mentioned first Each possible embodiment and caused advantageous effect of aspect and first aspect, therefore the implementation of the device may refer to The implementation of method, overlaps will not be repeated.
The third aspect provides a kind of communication control method, the method includes:
Terminal device receives the wireless access control message that access network equipment is sent, the wireless access control message Including:The random access control parameter of at least two Numerology, the random access control parameter are used for the terminal Equipment carries out carrying out congestion control during random access;The terminal device selects one kind at least two Numerology The random access control parameter of Numerology;The terminal device is according to a kind of selected random access of Numerology Control parameter sends random access request to the access network equipment.
In the realization method, access network equipment provides the random access control parameter of a variety of Numerology for eventually End equipment selects, and the random access congestion control factor that a kind of Numerology may be selected in terminal device carries out random access, connects Enter the random access control parameter that web network equipment provides various selectable Numerology, so as to which terminal device may be selected Different Numerology are serviced, and access network equipment optimizes random access congestion control policy, terminal device Selection diversification.
According to a kind of realization method of the third aspect, the random access control parameter includes:Random access congestion control The factor, the random access congestion control factor are corresponding with terminal equipment type or services/bearer parameter;The services/bearer Parameter includes:The type of service of the terminal device, the mark of logic channel, the mark of logic channel collection, Data Radio Bearer Mark, the identifying of Data Radio Bearer collection, the mark of network slice belonging to the business of the terminal device or network slice The mark of collection.
In the realization method, access network equipment provides the random access control parameter of a variety of Numerology for eventually End equipment selects, and terminal device can select corresponding one kind according to the terminal equipment type or services/bearer parameter of itself The random access control parameter of Numerology is taken so as to which different Numerology may be selected in different terminal devices Business, the congestion control that can be become more meticulous for different business/carrying.
According to another realization method of first aspect, the mark of the network slice can be set by core net for terminal The mark that back-up is matched, such as network slice selection auxiliary information or session management network slice selection auxiliary information slice/clothes Service type is either sliced differentiation number or new mark or is the mark that terminal device distributes by access net.
According to another realization method of the third aspect, each wireless access control message needs to carry out including a kind of The random access control parameter of the Numerology of congestion control;Or the wireless access control message includes Numerology's List, the list of the Numerology include the random access congestion control factor of at least two Numerology With the correspondence of the terminal equipment type or services/bearer parameter;Or the wireless access control message includes Numerology bitmaps, the Numerology bitmaps are used to indicate whether at least two Numerology is gathered around Plug control, the wireless access control message further include the random access congestion control for needing the Numerology for carrying out congestion control The factor processed.
In the realization method, the mode or message format of the wireless access control message that terminal device receives can be various Change, can once send the random access control parameter of Numerology a kind of, also can once send all Numerology with Machine accesses control parameter, and the random access control parameter of all Numerology can be represented with tabular form, needs to carry out congestion The Numerology of control can be represented with bitmap.
According to another realization method of the third aspect, with a kind of corresponding all terminal equipment types of Numerology Or services/bearer parameter corresponds to a random access congestion control factor;Or with a kind of Numerology corresponding each ends End equipment type or services/bearer parameter correspond to a random access congestion control factor.
In the realization method, pair of terminal equipment type or services/bearer parameter and the random access congestion control factor Should be related to can diversification.
According to another realization method of the third aspect, the processor is additionally operable to perform following operation:The terminal is set The bearing parameter correspondence notice that the standby reception access network equipment is sent by radio resource control RRC signaling disappears Breath, the bearing parameter correspondence notification message include:The mark of at least one logic channel and the logic channel collection The correspondence of the mark of the correspondence of mark or at least one Data Radio Bearer and the mark of Data Radio Bearer collection, And/or the correspondence of the mark of at least one network slice and the mark of network slice collection.
In the realization method, by the mark of the corresponding logic channel collection of the mark of multiple logic channels or will be multiple The mark of the corresponding Data Radio Bearer collection of mark of Data Radio Bearer or the mark for being sliced multiple networks correspond to one The mark of network slice collection, terminal device are sliced according to the mark of logic channel collection, the mark of Data Radio Bearer collection or network The mark of collection obtains the corresponding random access congestion control factor, performs easier.
According to another realization method of the third aspect, the wireless access control message further includes:Described at least two The load information of each Numerology in Numerology.
In the realization method, wireless access congestion control also considers the load of Numerology, according to the difference of load, Terminal device uses different Numerology so that congestion control more becomes more meticulous.
Fourth aspect provides a kind of terminal device, which, which has, realizes terminal device behavior in the above method Function.The function by hardware can also be performed corresponding software and be realized by hardware realization.The hardware is soft Part includes the one or more and corresponding module of above-mentioned function.
In a kind of possible realization method, the terminal device includes:Receiving unit, for receiving access network equipment The wireless access control message of transmission, the wireless access control message include:The random access of at least two Numerology Control parameter, the random access control parameter are used to carry out congestion control when carrying out random access to the terminal device;Choosing Unit is selected, for selecting the random access control parameter of Numerology a kind of at least two Numerology;It connects Enter unit, for being sent out according to the random access control parameter of selected Numerology a kind of to the access network equipment Send random access request.
In alternatively possible realization method, the terminal device includes:Receiver, transmitter, memory and processor; Wherein, batch processing code is stored in memory, and processor is used to call the program code stored in memory, performed following Operation:The wireless access control message of access network equipment transmission, the wireless access control message are received by receiver Including:The random access control parameter of at least two Numerology, the random access control parameter are used for the terminal Equipment carries out carrying out congestion control during random access;Select a kind of Numerology's at least two Numerology Random access control parameter;According to the random access control parameter of selected Numerology a kind of, pass through the transmitter Random access request is sent to the access network equipment.
Based on same inventive concept, the principle and advantageous effect solved the problems, such as due to the device may refer to above-mentioned first Each possible embodiment and caused advantageous effect of aspect and first aspect, therefore the implementation of the device may refer to The implementation of method, overlaps will not be repeated.
The embodiment of the present invention also provides a kind of unauthorized transmission method and device, to solve under a variety of Numerology such as What carries out the problem of resource instruction.
5th aspect, provides a kind of unauthorized transmission method, the method includes:Access network equipment sends non-award Transfer resource configuration message is weighed to terminal device, the unauthorized transfer resource configuration message includes:At least two The unauthorized transfer resource configuration parameter of Numerology, the unauthorized transfer resource configuration parameter include unauthorized transmission and provide Source and/or the configuration instruction of the unauthorized transfer resource;The access network equipment receives the terminal device according to institute The unauthorized transfer resource configuration parameter for stating the one of which Numerology selected at least two Numerology is awarded non- The data transfer request sent on power transfer resource.
In the realization method, access network equipment provides the unauthorized transfer resource configuration ginseng of a variety of Numerology Number is selected for terminal device, and the unauthorized transfer resource configuration parameter that a kind of Numerology may be selected in terminal device carries out non-award Power transmission, access network equipment provide the unauthorized transfer resource configuration parameter of various selectable Numerology, from And terminal device may be selected different Numerology and be serviced, access network equipment optimizes unauthorized transfer resource and matches Put strategy.
According to a kind of realization method of the 5th aspect, the unauthorized transfer resource configuration parameter includes unauthorized transmission and provides Source and/or the configuration instruction of the unauthorized transfer resource, configuration instruction and the terminal device class of the unauthorized transfer resource Type or services/bearer parameter correspond to, wherein, the services/bearer parameter includes:Type of service, the logic of the terminal device The mark of channel, the mark of logic channel collection, the identifying of the mark of Data Radio Bearer or Data Radio Bearer collection, the end The mark of network slice belonging to the business of end equipment or the mark of network slice collection.
In the realization method, the unauthorized configured transmission that access network equipment provides a variety of Numerology supplies terminal Equipment selects, and terminal device can select corresponding one kind according to the terminal equipment type or services/bearer parameter of itself The unauthorized transmission configuration parameter of Numerology is taken so as to which different Numerology may be selected in different terminal devices Business, the unauthorized transmission that can be become more meticulous for different business/carrying.
According to another realization method of the 5th aspect, the mark of the network slice can be set by core net for terminal The mark that back-up is matched, such as network slice selection auxiliary information or session management network slice selection auxiliary information slice/clothes Service type is either sliced differentiation number or new mark or is the mark that terminal device distributes by access net.
According to another realization method of the 5th aspect, each unauthorized transfer resource configuration message includes one kind The unauthorized transfer resource configuration parameter of Numerology;Or the unauthorized transfer resource configuration message includes Numerology List, the list of the Numerology include at least two Numerology the unauthorized transfer resource and/ Or the correspondence of the configuration instruction of the unauthorized transfer resource and the terminal equipment type or services/bearer parameter;Or The unauthorized transfer resource configuration message includes Numerology bitmaps, and the Numerology bitmaps are used to indicate terminal and set Adoptable at least two Numerology during standby transmission data, the unauthorized transfer resource configuration message further include each The unauthorized transfer resource configuration parameter of Numerology.
In the realization method, the sending method or message format of unauthorized transfer resource configuration message can be diversified, can The unauthorized transfer resource configuration parameter of Numerology a kind of is once sent, also can once send the non-of all Numerology Authorized transmissions resource configuration parameter, parameter, which is configured, in the unauthorized transfer resource of all Numerology to be represented with tabular form, Adoptable Numerology can be represented with bitmap during terminal device transmission data.
According to another realization method of the 5th aspect, with a kind of corresponding all terminal equipment types of Numerology Or services/bearer parameter corresponds to the configuration instruction of a unauthorized transfer resource;It is or corresponding each with a kind of Numerology A terminal equipment type or services/bearer parameter correspond to the configuration instruction of a unauthorized transfer resource.
In the realization method, terminal equipment type or services/bearer parameter and the configuration instruction of unauthorized transfer resource Correspondence can diversification.
According to another realization method of the 5th aspect, the method further includes:The access network equipment passes through nothing Line resources control RRC signaling sends bearing parameter correspondence notification message, the bearing parameter correspondence to terminal device Notification message includes:The mark of at least one logic channel and the correspondence of the mark of the logic channel collection, and/or at least The mark of one Data Radio Bearer is sliced with the correspondence of the mark of Data Radio Bearer collection, and/or at least one network Mark with the network slice collection mark correspondence.
In the realization method, by the mark of the corresponding logic channel collection of the mark of multiple logic channels or will be multiple The mark of the corresponding Data Radio Bearer collection of mark of Data Radio Bearer or the mark for being sliced multiple networks correspond to one The mark of network slice collection can save the signaling overheads that access network equipment sends unauthorized transfer resource configuration parameter.
According to another realization method of the 5th aspect, the unauthorized transfer resource configuration message further includes:It is described extremely The load information of each Numerology in few two kinds of Numerology.
In the realization method, unauthorized to transmit the load for also considering Numerology, according to the difference of load, terminal is set It is standby to use different Numerology so that unauthorized transmission more becomes more meticulous.
6th aspect, provides a kind of access network equipment, which, which has, realizes in the above method The function of access network equipment behavior.The function can also be performed corresponding soft by hardware realization by hardware Part is realized.The hardware or software include the one or more and corresponding module of above-mentioned function.
In a kind of possible realization method, the access network equipment includes:Transmitting element, for sending unauthorized biography Defeated resource distribution message includes to terminal device, the unauthorized transfer resource configuration message:At least two Numerology's Parameter is configured in unauthorized transfer resource;Receiving unit, for receiving the terminal device according to described at least two Parameter is configured in unauthorized transfer resource in the unauthorized transfer resource of the one of which Numerology selected in Numerology The data transfer request of upper transmission.
In alternatively possible realization method, the access network equipment includes:Receiver, transmitter, memory and Processor;Wherein, batch processing code is stored in memory, and processor is used to call the program code stored in memory, Perform following operate:Unauthorized transfer resource is sent by the transmitter, message is configured to terminal device, the unauthorized biography Defeated resource distribution message includes:The unauthorized transfer resource configuration parameter of at least two Numerology;Pass through the receiver The terminal device is received according to the unauthorized of the one of which Numerology selected at least two Numerology The data transfer request that transfer resource configuration parameter is sent on unauthorized transfer resource.
Based on same inventive concept, the principle and advantageous effect solved the problems, such as due to the device may refer to above-mentioned first Each possible embodiment and caused advantageous effect of aspect and first aspect, therefore the implementation of the device may refer to The implementation of method, overlaps will not be repeated.
7th aspect, provides a kind of unauthorized transmission method, the method includes:Terminal device receives access net network The unauthorized transfer resource configuration message that equipment is sent, the unauthorized transfer resource configuration message include:At least two The unauthorized transfer resource configuration parameter of Numerology, the unauthorized transfer resource configuration parameter include unauthorized transmission and provide Source and/or the configuration instruction of the unauthorized transfer resource;The terminal device selects at least two Numerology Select the unauthorized transfer resource of Numerology a kind of and/or the configuration instruction of unauthorized transfer resource;The terminal device root According to the unauthorized transfer resource of selected Numerology a kind of and/or the configuration instruction of unauthorized transfer resource, awarded non- It weighs to transmit to the access network equipment transmission data on transfer resource and ask.
In the realization method, access network equipment provides the unauthorized transfer resource configuration ginseng of a variety of Numerology Number is selected for terminal device, and the unauthorized transfer resource configuration parameter that a kind of Numerology may be selected in terminal device carries out non-award Power transmission, access network equipment provide the unauthorized transfer resource configuration parameter of various selectable Numerology, from And terminal device may be selected different Numerology and be serviced, access network equipment optimizes unauthorized transfer resource and matches Put strategy, the unauthorized transfer resource configuration parameter diversification of terminal device.
According to a kind of realization method of the 7th aspect, the configuration instruction and terminal equipment type of the unauthorized transfer resource Or services/bearer parameter corresponds to, wherein, the services/bearer parameter includes:The type of service of the terminal device, logic letter The mark in road, the mark of logic channel collection, the mark of Data Radio Bearer, the identifying of Data Radio Bearer collection, the terminal is set The mark of network slice belonging to standby business or the mark of network slice collection.
In the realization method, access network equipment provides the unauthorized transfer resource configuration ginseng of a variety of Numerology Number is selected for terminal device, and terminal device can select corresponding one according to the terminal equipment type or services/bearer parameter of itself The unauthorized transfer resource configuration parameter of kind Numerology, so as to which different Numerology may be selected in different terminal devices It is serviced, the unauthorized transmission that can be become more meticulous for different business/carrying.
According to another realization method of the 7th aspect, the mark of the network slice can be set by core net for terminal The mark that back-up is matched, such as network slice selection auxiliary information or session management network slice selection auxiliary information slice/clothes Service type is either sliced differentiation number or new mark or is the mark that terminal device distributes by access net.
According to another realization method of the 7th aspect, each unauthorized transfer resource configuration message includes one kind The unauthorized transfer resource configuration parameter of Numerology;Or the unauthorized transfer resource configuration message includes Numerology List, the list of the Numerology include at least two Numerology the unauthorized transfer resource and/ Or the correspondence of the configuration instruction of the unauthorized transfer resource and the terminal equipment type or services/bearer parameter;Or The unauthorized transfer resource configuration message includes Numerology bitmaps, and the Numerology bitmaps are used to indicate terminal and set Adoptable at least two Numerology during standby transmission data, the unauthorized transfer resource configuration message further include each The unauthorized transfer resource configuration parameter of Numerology.
In the realization method, the sending method or message format of unauthorized transfer resource configuration message can be diversified, can The unauthorized transfer resource configuration parameter of Numerology a kind of is once sent, also can once send the non-of all Numerology Authorized transmissions resource configuration parameter, parameter, which is configured, in the unauthorized transfer resource of all Numerology to be represented with tabular form, Adoptable Numerology can be represented with bitmap during terminal device transmission data.
According to another realization method of the 7th aspect, with a kind of corresponding all terminal equipment types of Numerology Or services/bearer parameter corresponds to the configuration instruction of a unauthorized transfer resource;It is or corresponding each with a kind of Numerology A terminal equipment type or services/bearer parameter correspond to the configuration instruction of a unauthorized transfer resource.
In the realization method, terminal equipment type or services/bearer parameter and the configuration instruction of unauthorized transfer resource Correspondence can diversification.
According to another realization method of the 7th aspect, the method further includes:The terminal device receives the access The bearing parameter correspondence notification message that web network equipment is sent by radio resource control RRC signaling, the bearing parameter Correspondence notification message includes:The correspondence of the mark of at least one logic channel and the mark of the logic channel collection, And/or the correspondence of the mark of at least one Data Radio Bearer and the mark of Data Radio Bearer collection, and/or at least one The correspondence of the mark of network slice and the mark of network slice collection.
In the realization method, by the mark of the corresponding logic channel collection of the mark of multiple logic channels or will be multiple The mark of the corresponding Data Radio Bearer collection of mark of Data Radio Bearer or the mark for being sliced multiple networks correspond to one The mark of network slice collection, terminal device are sliced according to the mark of logic channel collection, the mark of Data Radio Bearer collection or network The mark of collection obtains corresponding unauthorized transfer resource configuration parameter, performs easier.
According to another realization method of the 7th aspect, the unauthorized transfer resource configuration message further includes:It is described extremely The load information of each Numerology in few two kinds of Numerology.
In the realization method, unauthorized to transmit the load for also considering Numerology, according to the difference of load, terminal is set It is standby to use different Numerology so that unauthorized transmission more becomes more meticulous.
Eighth aspect provides a kind of terminal device, which, which has, realizes terminal device behavior in the above method Function.The function by hardware can also be performed corresponding software and be realized by hardware realization.The hardware is soft Part includes the one or more and corresponding module of above-mentioned function.
In a kind of possible realization method, the terminal device includes:Receiving unit, for receiving access network equipment The unauthorized transfer resource configuration message sent, the unauthorized transfer resource configuration message include:At least two The unauthorized transfer resource configuration parameter of Numerology, the unauthorized transfer resource configuration parameter include unauthorized transmission and provide Source and/or the configuration instruction of the unauthorized transfer resource;Selecting unit, for being selected at least two Numerology Select the unauthorized transfer resource of Numerology a kind of and/or the configuration instruction of unauthorized transfer resource;Transmission unit, for root According to the unauthorized transfer resource of selected Numerology a kind of and/or the configuration instruction of unauthorized transfer resource, awarded non- It weighs to transmit to the access network equipment transmission data on transfer resource and ask.
In alternatively possible realization method, the terminal device includes:Receiver, transmitter, memory and processor; Wherein, batch processing code is stored in memory, and processor is used to call the program code stored in memory, performed following Operation:Message is configured in the unauthorized transfer resource that access network equipment transmission is received by the receiver, described unauthorized Transfer resource configuration message includes:The unauthorized transfer resource configuration parameter of at least two Numerology, the unauthorized biography Defeated resource configuration parameter includes the configuration instruction of unauthorized transfer resource and/or the unauthorized transfer resource;It is described at least The configuration of the unauthorized transfer resource and/or unauthorized transfer resource of a kind of Numerology is selected to refer in two kinds of Numerology Show;According to the configuration instruction of the unauthorized transfer resource of selected Numerology a kind of and/or unauthorized transfer resource, It is transmitted and asked to the access network equipment transmission data by the transmitter on unauthorized transfer resource.
Based on same inventive concept, the principle and advantageous effect solved the problems, such as due to the device may refer to above-mentioned first Each possible embodiment and caused advantageous effect of aspect and first aspect, therefore the implementation of the device may refer to The implementation of method, overlaps will not be repeated.
Description of the drawings
Fig. 1 is the Transmission Time Interval that different service types use in 5G mobile communication system and subcarrier spacing signal Figure;
Fig. 2 be the present embodiments relate to a kind of communication system architecture schematic diagram;
Fig. 3 is a kind of interaction schematic diagram of communication control method provided in an embodiment of the present invention;
Fig. 4 is a kind of structure diagram of access network equipment provided in an embodiment of the present invention;
Fig. 5 is a kind of structure diagram of terminal device provided in an embodiment of the present invention;
Fig. 6 is the structure diagram of another access network equipment provided in an embodiment of the present invention;
Fig. 7 is the structure diagram of another terminal device provided in an embodiment of the present invention;
Fig. 8 is a kind of interaction schematic diagram of unauthorized transmission method provided in an embodiment of the present invention;
Fig. 9 is the structure diagram of another access network equipment provided in an embodiment of the present invention;
Figure 10 is the structure diagram of another terminal device provided in an embodiment of the present invention;
Figure 11 is the structure diagram of another access network equipment provided in an embodiment of the present invention;
Figure 12 is the structure diagram of another terminal device provided in an embodiment of the present invention.
Specific embodiment
Fig. 2 be the present embodiments relate to a kind of communication system architecture schematic diagram.The system includes terminal device and net Network equipment, wherein, the network equipment includes access network equipment and core web network equipment (not shown) again.The embodiment of the present invention Terminal device can be led to through wireless access network (Radio Access Network, RAN) and one or more core nets Letter, terminal device can refer to the accession to terminal, subscriber unit, subscriber station, movement station, mobile station, remote station, remote terminal, movement Equipment, user terminal, terminal, wireless telecom equipment, user agent or user apparatus.Access terminal can be cellular phone, nothing Rope phone, session initiation protocol (Session Initiation Protocol, referred to as " SIP ") phone, wireless local loop (Wireless Local Loop, referred to as " WLL ") stands, personal digital assistant (Personal Digital Assistant, Referred to as " PDA "), there is the handheld device of wireless communication function, computing device or be connected to the other of radio modem Processing equipment, mobile unit, wearable device, the UE in following 5G networks etc..
The access network equipment of the embodiment of the present invention the, for example, it may be base station (Base in gsm system or CDMA Transceiver Station, referred to as " BTS ") or WCDMA system in base station (NodeB, referred to as " NB "), Can also be evolved base station (Evolutional Node B, referred to as " eNB " or " eNodeB ") in LTE system or The network equipment can be relay station, access point, mobile unit, wearable device, can also be Wireless Fidelity (Wireless- Fidelity, Wi-Fi) website, can be next generation communication base station, such as the wireless access network equipment (New of 5G Radio, NR or " a new generation eat dishes without rice or wine technology "), base station or small station, micro- station.
Specifically, in fig. 2, for using base station as access network equipment, base station 102 may include mutiple antennas group. Each antenna sets can include one or more antennas, for example, an antenna sets may include antenna 104 and 106, another antenna Group may include antenna 108 and 110, and additional group may include antenna 112 and 114.2 days are shown for each antenna sets in Fig. 2 Line, however more or fewer antennas can be used for each group.Base station 102 can additionally include transmitter chain and receiver Chain, it will appreciated by the skilled person that they may each comprise sends and receives relevant multiple components with signal, such as Processor, modulator, multiplexer, demodulator, demultiplexer or antenna etc..
Base station 102 can communicate with one or more terminal devices, such as terminal device 116 and terminal device 122.So And, it will be understood that it base station 102 can be with any number of terminal equipment in communication similar to terminal device 116 or 122.Such as Fig. 2 Shown, terminal device 116 communicates with antenna 112 and 114, wherein antenna 112 and 114 by forward link 118 to terminal device 116 send information, and pass through reverse link 120 and receive information from terminal device 116.In addition, terminal device 122 and antenna 104 With 106 communications, wherein antenna 104 and 106 sends information, and pass through reverse link by forward link 124 to terminal device 122 126 receive information from terminal device 122.In frequency division duplex (Frequency Division Duplex, FDD) system, example Such as, the available different frequency bands used in reverse link 120 of forward link 118, forward link 124 is available and reverse link Different frequency bands used in 126.In addition, in time division duplex (Time Division Duplex, TDD) system, forward link 118 and reverse link 120 common frequency band can be used, common frequency band can be used in forward link 124 and reverse link 126.
It is designed to every group of antenna of communication and/or region is known as the sector of base station 102.For example, antenna sets can be set It is calculated as and the terminal equipment in communication in the sector of 102 overlay area of base station.Distinguished in base station 102 by forward link 118 and 124 During being communicated with terminal device 116 and 122, the transmitting antenna of base station 102 can be improved using beam forming before to The signal-to-noise ratio of link 118 and 124.In addition, signal is sent to its all access terminal equipment by individual antenna with base station Mode is compared, and is sent in base station 102 using the terminal device 116 and 122 of beam forming random dispersion into associated coverage During signal, the mobile equipment in neighboring community can be by less interference.
In given time, base station 102, terminal device 116 or terminal device 122 can be radio communication transmitter and/ Or radio communication receiver.When sending out data, radio communication transmitter can encode data for transmission.Tool Body, radio communication transmitter can obtain, such as generate, received from other communication devices or preserve in memory etc., it The data bit of the certain amount of radio communication receiver is sent to by channel.This data bit may include in data In transmission block or multiple transmission blocks, transmission block can be segmented to generate multiple code blocks.
Referring to Fig. 3, Fig. 3 is a kind of interaction schematic diagram of communication control method provided in an embodiment of the present invention, this method Include the following steps:
S101, access network equipment send bearing parameter to terminal device by radio resource control RRC signaling and correspond to Relationship notification message.
For the terminal device of disconnected state (Inactive), since it also maintains data surface logic channel (Logical Channel) which network slice (Network information or Data Radio Bearer information or each business belong to Slice information), and in order to save access network equipment for each logic channel, Data Radio Bearer or network slice The signaling overheads of wireless access control message or random access control parameter is sent, each logic can be directed in the present embodiment Channel set, each Data Radio Bearer collection or network slice collection carry out access control.Wherein, logic channel refers to access net net Network equipment can be that terminal device establishes different carryings, each corresponding logic channel of carrying, in this case, medium access control System (Media Access Control, MAC) layer obtains being known which logic channel is this data be sent to after data Corresponding radio link layer control protocol (Radio Link Control, RLC) layer.Network slice refers to the logic of a customization On complete network, this is primarily to the different business demand of reply or tenant's demand, such as the industry of URLLC and mMTC Business demand difference is very big, it may be necessary to which different topologys and modes of operation could meet, therefore network can be the two business Two customization networks in logic are generated respectively, so as to meet corresponding demand respectively.Terminal device is sliced by some network Multiple wireless data carrying/logic channels can be established when service.
Therefore, which includes:The mark and logic channel of at least one logic channel The mark of the correspondence of the mark of collection or at least one Data Radio Bearer is corresponding with the mark of Data Radio Bearer collection to close The correspondence of the mark of system, and/or at least one network slice and the mark of network slice collection.The RRC signaling includes:State Convert message, RRC pauses request message, RRC release messages etc..
It should be noted that the step is optional step, it is represented by dotted lines in figure.It is alternatively: Terminal device stores the correspondence of the mark of at least one logic channel and the mark of logic channel collection or at least one number The mark being sliced according to the correspondence of the mark of the mark and Data Radio Bearer collection of radio bearer, and/or at least one network With the correspondence of the mark of network slice collection.And the step can also perform after step s 102, and it is suitable not limit its execution Sequence.By establishing logic channel collection, Data Radio Bearer collection or network slice collection, access network equipment can be saved for every A logic channel, Data Radio Bearer or network slice send the signaling overheads of wireless access control message.
S102, the access network equipment send wireless access control message to the terminal device.
Access network equipment can broadcast the wireless access control message to all terminal devices, can also pass through RRC Signaling sends the wireless access control message to corresponding terminal device.The RRC signaling includes:RRC release messages, state conversion Message, attach request allow message etc..Terminal device receives the wireless access control message that access network equipment is sent.This disappears Breath can be directed to the access control of the terminal device of any state, and the state of terminal device includes Idle state, connected state, disconnected State, wherein, for the terminal device of connected state, terminal device can cause Radio Link to lose under connected state due to signal (Radio Link Failure, RLF) is lost, in this case, terminal device is also required to access net again using random access Network.
In the present embodiment, the wireless access control message includes:The random access control of at least two Numerology Parameter, the random access control parameter are used to carry out congestion control when carrying out random access to the terminal device.Wherein, no Interface-free resources with Numerology correspond to different parameters of eating dishes without rice or wine, such as subcarrier spacing, TTI, cyclic prefix (Cyclic Prefix, CP) length etc. or these parameters combination.Access network equipment in wireless access control message by wrapping The random access control parameter of two or more Numerology is included, terminal device can select one of which Numerology's Random access control parameter carries out random access, then access network equipment optimizes the access strategy of all terminal devices, protects Card terminal device can be accessed smoothly as possible.
Further, since 5G systems support the huge type of service of differentiation, in order to meet the needs of these differentiation, Different terminal equipment type or services/bearer use different Transmission Time Interval and subcarrier spacing in 5G mobile communication system Deng, therefore different terminal equipment types or services/bearer need that different Numerology is used to be serviced to meet it QoS demand.Therefore, which can include:The random access control parameter of at least two Numerology, Wherein, the random access control parameter of each Numerology includes:The random access congestion control factor, the random access are gathered around It is corresponding with terminal equipment type or services/bearer parameter to fill in controlling elements;The services/bearer parameter includes:The terminal is set Standby type of service, the mark (such as logic channel ID) of logic channel, the mark of logic channel collection, Data Radio Bearer mark Know (such as Data Radio Bearer ID), the identifying of Data Radio Bearer collection, the network slice belonging to the business of the terminal device Mark (such as network slice ID) or network slice collection mark, the mark of the network slice can be by core net The mark of terminal device distribution, such as network slice selection auxiliary information (network slice selection Assistance information, NSSAI) or session management network slice selection auxiliary information (session Management-network slice selection assistance information, SM-NSSAI) slice/service Type (slice/service type) or slice distinguish number (slice differentiator, SD) or new mark Know or by mark of the access net for terminal device distribution.Access network equipment send random access control message to Some specific terminal device or broadcast random access control message are given all in the terminal device intercepted, random access control Message can be used for multiple terminal devices according to the terminal equipment type of multiple terminal devices or a variety of industry of multiple terminal devices Business/bearing parameter carries out the selection of random access control parameter, can be used for a terminal device according to the terminal device One or more services/bearer parameters carry out the selection of random access control parameter.
Wherein, there are many modes of the type of service of distinguishing terminal equipment, the first be distinguish in application layer (such as QQ or Baidu), if be exactly for second user under Inactive states, logic channel or carrying can be passed through It distinguishes (data of e.g. carrying 1 still carry 2 data).The range of terminal equipment type is that comparison is wide, such as Terminal equipment type can refer to mobile phone user or vehicle to extraneous information exchange (Vehicle to X, V2X) user, Huo Zheqi He.
The random access congestion control factor is a specific value (being, for example, 0.4), and terminal device is carrying out random access When, a random number is generated, if this random number is smaller than 0.4, then random access is then carried out, if bigger than 0.4, then then It is unable to random access.In the mechanism 1 of the prior art described above, what all types of service used is all same random The congestion control factor is accessed, the present embodiment can be directed to different terminal equipment types or services/bearer parameter setting is different The random access congestion control factor (such as the random access congestion control factor of URLLC business connects for the random of 1, mMTC business It is 0.4 to enter the congestion control factor, it is evident that URLLC business has higher priority), then can then it reach for difference Services/bearer do the purpose of different random access congestion controls.
Optionally, it can also include the steps of before step S102:The access network equipment determine it is described at least The random access control parameter of two kinds of Numerology.
In the present embodiment, the random access control parameter of Numerology can be represented in the form of structure.Each Numerology has corresponding random access channel (Random Access Channel, RACH) resource, the RACH resource packet It includes:The time/frequency source block of the corresponding parameters of eating dishes without rice or wine of the Numerology, the structure parameter of Numerology are used as carry out one The selection gist of the corresponding parameters of eating dishes without rice or wine of kind Numerology.
As a kind of realization method, each wireless access control message can need to carry out congestion control including a kind of Numerology random access control parameter, i.e., the random access control parameter of a variety of Numerology is by a plurality of nothing Multiple cells (Information Element, IE) that line is accessed in control message or a wireless access control information are sent 's.For carrying out random access congestion control according to type of service (service), lower shown congestion control architecture body (1) example:
Congestion control architecture body (one) example:
In the structure, BarringPerNumerology-Category-r15 represent a kind of Numerology with Machine accesses control parameter;Numerology-Category-r15 is a parameter newly added (compared to the mechanism 1 of the prior art Numerology structures), integer of the value between [1, maxNumerology-Cat-r15], wherein MaxNumerology-Cat-r15 refers to the maximum value of the number for the Numerology that system is supported, therefore, terminal device choosing The value of some specific Numerology-Category-r15 is selected, then refers to terminal device and is corresponded to according to any Numerology Random access control parameter carry out random access, if being successfully accessed, obtain the corresponding interface-free resources of the Numerology into Row data transmission;Numerology-BarringConfig-r15 then refers to the random access control parameter of some Numerology; As-Service-List represents type of service list;It is corresponding that ac-service-BarringConfig-r15 refers to type of service Random access control parameter, the random access control parameter include:Ac-BarringFactor-r13, the i.e. control of random access congestion The factor processed;Ac-BarringTime represents the lag time delay after random access, and before random access, terminal device will generate one Random number between a [0,1], if the random number is less than the ac-BarringFactor that access network equipment is sent, then it is assumed that should Access attempts success;Otherwise, which thinks that access attempts fail, and will generate the random number between one [0,1] again, Opening timing device Tbarring (" Tbarring "=(0.7+0.6*rand) * ac-BarringTime), will not within the time It can again attempt to access network;The load of Numerology-Load, Numerology, according to the difference of load, terminal device is adopted With different Numerology so that congestion control more becomes more meticulous, and the class value { 100, p05 ... p95 } on the right of the parameter is Optional load value, access network equipment select corresponding current load value in the class value, need to illustrate according to present load , which can be included in wireless access control message, can also be sent to terminal by individual message and set It is standby.
As another realization method, each wireless access control message can also be only included under a kind of Numerology The corresponding random access control parameter of one services/bearer parameter, the example of lower shown structure (two):
The example of congestion control architecture body (two)
In the structure, BarringPerNumerology-Category-r15 expressions only include one kind Numerology, barringPerService-Category-r15 expression only include a kind of corresponding random access of Service Control parameter, the meaning of other parameter are identical with above described structure.
As another realization method, wireless access control message can also be the list including Numerology, described The list of Numerology includes the random access congestion control factor of at least two Numerology and the end The correspondence of end equipment type or services/bearer parameter.For carrying out random access congestion control according to type of service, The example of congestion control architecture body (three) shown in lower:
The example of congestion control architecture body (three)
In the structure, BarringPerNumerology-List is an integer from 1 to maxNumerology Value list, expression are a Numerology lists, and As-Service-List represents that its type of service is also a list.Its His meaning of parameter is identical with above described structure.
And below in exemplary structure, Numerology is a list, and all Numerology are directed to one Kind type of service carries out congestion control.The example of congestion control architecture body (four) as follows:
The example of congestion control architecture body (four)
As another realization method, multiple Numerology that the wireless access control message includes can also be one A bitmap, the bitmap of Numerology are used to indicate whether a variety of Numerology need to carry out congestion control, certainly, the nothing Line access control message further includes the random access control parameter for needing the Numerology for carrying out congestion control.As follows The example of congestion control architecture body (five):
The example of congestion control architecture body (five)
In the structure, the value of As-BarringForSpecialNumerology is a bit string (BIT STRING), such as the message includes 5 kinds of Numerology in total, and 1 represents that the Numerology needs to carry out congestion control, 0 table Show that the Numerology does not need to carry out congestion control, then 11001 the 1st, 2,5 kind of Numerology of expression need to carry out congestion control System, the 3rd, 4 kind of Numerology does not need to carry out congestion control, if terminal device uses the 3rd, 4 kind of Numerology, then to this The services/bearer of terminal device or the terminal device does not need to carry out congestion control.Such as the business for extremely low time delay, it adopts Numerology may need to carry out congestion control, and otherwise its RACH resource is preempted, and self time-delay just meets not ;And MTC service is insensitive to time delay, can not carry out congestion control to it.
As another realization method, need to carry out the terminal equipment type of congestion control or services/bearer parameter also may be used To be a bitmap, the example of congestion control architecture body (six) as follows:
The example of congestion control architecture body (six)
In the structure, BarringPerNumerology-List represents the list of a Numerology, As- The value of BarringForSpecialService is a bit string (BIT STRING), represents the business under each Numerology Whether type, which needs to carry out congestion control, is represented in the form of bitmap.Such as terminal device one shares 5 kinds of types of service, The bitmap of 5bit can be generated for this 5 kinds of types of service, 1 represents that the type of service can be accessed by limitation, and 0 represents not connect by limitation Enter, then if bitmap is 00110, then type of service 1,2,5 are not influenced by Access Control Policy, and type of service 3, and 4 are connect Enter control strategy influence;Its bitmap it is also possible that:Corresponding digital 0 represents that the type of service can be accessed by limitation, number Word 1 represents not limited access, then if bitmap is 11001, then type of service 1,2,5 are not influenced by Access Control Policy, And type of service 3,4 are influenced by Access Control Policy.The meaning of the other parameter of the structure is identical with aforementioned structure body.
Further, all terminal equipment types corresponding with a kind of Numerology or services/bearer parameter are corresponding One random access congestion control factor;Or each terminal equipment type corresponding with a kind of Numerology or business/hold It carries parameter and corresponds to a random access congestion control factor.The correspondence is adapted to a kind of structure of any of the above.
For example, the example of congestion control architecture body (seven) as follows:
The example of congestion control architecture body (seven)
In the structure, the value of As-BarringForSpecialService is a bit string (BIT STRING), table Whether show the type of service under each Numerology to need to carry out congestion control is represented in the form of bitmap.But institute Some Service using a kind of wireless access control parameter, are only whether to use the bitmap according to Service to determine.
S103, the terminal device select a kind of the random of Numerology to connect at least two Numerology Enter control parameter.
After terminal device receives the random access control parameter of a variety of Numerology, selection is a kind of wherein The random access control parameter of Numerology.Before random access, terminal device will generate the random number between one [0,1], If the random number is less than the random access congestion control factor in random access control parameter, then it is assumed that access attempts success; Otherwise, which thinks that access attempts fail, and will generate the random number between one [0,1], opening timing device again Tbarring (" Tbarring "=(0.7+0.6*rand) * ac-BarringTime), will not again attempt within the time Network is accessed, after timer time arrival, one random access control parameter of reselection.
Further, terminal device is according to itself terminal equipment type or services/bearer parameter and according to receiving A variety of Numerology random access control parameter, obtain with the terminal equipment type or services/bearer parameter pair of itself The random access control parameter answered.
S104, the terminal device connect according to the random access control parameter of selected Numerology a kind of to described Enter web network equipment and send random access request.
Specifically, as previously described, terminal device is when carrying out random access, generates a random number, if this with Machine number is smaller than the selected random access congestion control factor, then random access is then carried out, if connect at random than selected It is big to enter the congestion control factor, then be then unable to random access.When carrying out random access, using selected Numerology's RACH resource carries out random access.The access network equipment receives the terminal device according to described at least two of selection The random access request that the random access control parameter of one of which Numerology in Numerology is sent carries out random Access.
The advantageous effect of the scheme using the embodiment is exemplified below:Short TTI (such as:0.1ms) Business of the Numerology commonly used to service URLLC, that is, the business of extremely low time delay, but if in the Numerology On identical congestion control scheme is used to URLLC and big connection business (mMTC), then URLLC user random access when Time can be seized, and since the number of users of MTC is big, so the congestion of the Numerology can be caused, make by MTC service Network (collision) can not successfully be accessed by obtaining URLLC, so as to reach QoS demand.But if we are at this Numerology is upper to use different business different congestion controls, i.e. access network equipment notifies terminal device according to not The same adoptable Numerology of type of service, other types of service such as mMTC use others Numerology, i.e., not It can select the TTI of 0.1ms, then ensure that URLLC business can smoothly access network.
A kind of wireless access jamming control method provided according to embodiments of the present invention, access network equipment provide a variety of The random access control parameter of selectable Numerology for terminal device select, so as to terminal device may be selected it is different Numerology is serviced, and access network equipment optimizes random access congestion control policy;And terminal device can basis The terminal equipment type or services/bearer parameter of itself select the random access control parameter of corresponding Numerology a kind of, Terminal device can be directed to the congestion control that different business/carrying can become more meticulous.
Referring to Fig. 4, Fig. 4 is a kind of structure diagram of access network equipment provided in an embodiment of the present invention.This connects Enter web network equipment 1000 to include:Transmitting element 11 and receiving unit 12;Wherein:
Transmitting element 11, for sending wireless access control message to terminal device, the wireless access control message package It includes:The random access control parameter of at least two Numerology, the random access control parameter are used to set the terminal It is standby to carry out carrying out congestion control during random access;
Receiving unit 12 selects wherein for receiving the terminal device according at least two Numerology The random access request that the random access control parameter of Numerology a kind of is sent.
In the realization method, access network equipment provides the random access control parameter of a variety of Numerology for eventually End equipment selects, and the random access congestion control factor that a kind of Numerology may be selected in terminal device carries out random access, connects Enter the random access control parameter that web network equipment provides various selectable Numerology, so as to which terminal device may be selected Different Numerology are serviced, and access network equipment optimizes random access congestion control policy.
Further, the access network equipment may also include:Determination unit (not shown);
The determination unit, for determining the random access control parameter of at least two Numerology.
Further, the random access control parameter includes:The random access congestion control factor, the random access are gathered around It is corresponding with terminal equipment type or services/bearer parameter to fill in controlling elements;
The services/bearer parameter includes:The type of service of the terminal device, the mark of logic channel, logic channel The mark of collection, the mark of Data Radio Bearer, the identifying of Data Radio Bearer collection, the network belonging to the business of the terminal device The mark of mark or network the slice collection of slice.
In the realization method, access network equipment provides the random access control parameter of a variety of Numerology for eventually End equipment selects, and terminal device can select corresponding one kind according to the terminal equipment type or services/bearer parameter of itself The random access control parameter of Numerology is taken so as to which different Numerology may be selected in different terminal devices Business, the congestion control that can be become more meticulous for different business/carrying.
Further, each wireless access control message includes a kind of Numerology for needing to carry out congestion control Random access control parameter;Or
The wireless access control message includes the list of Numerology, and the list of the Numerology is including described The random access congestion control factor of at least two Numerology and the terminal equipment type or services/bearer parameter Correspondence;Or
The wireless access control message includes Numerology bitmaps, and the Numerology bitmaps are used to indicate described Whether at least two Numerology need to carry out congestion control, and the wireless access control message, which further includes, to be needed to carry out congestion The random access congestion control factor of the Numerology of control.
In the realization method, the sending method or message format of wireless access control message can be diversified, can once send out The random access control parameter of Numerology a kind of is sent, also can once send the random access control ginseng of all Numerology Number, the random access control parameter of all Numerology can be represented with tabular form, need to carry out congestion control Numerology can be represented with bitmap.
Further, all terminal equipment types corresponding with a kind of Numerology or services/bearer parameter are corresponding One random access congestion control factor;Or each terminal equipment type corresponding with a kind of Numerology or business/hold It carries parameter and corresponds to a random access congestion control factor.
In the realization method, pair of terminal equipment type or services/bearer parameter and the random access congestion control factor Should be related to can diversification.
Optionally, the transmitting element 11 is additionally operable to send to the terminal device by radio resource control RRC signaling Bearing parameter correspondence notification message, the bearing parameter correspondence notification message include:At least one logic channel Mark is wirelessly held with the correspondence of the mark of the logic channel collection or the mark of at least one Data Radio Bearer with data It carries the correspondence of the mark of collection, and/or the mark of at least one network slice is corresponding with the mark of network slice collection Relationship.
In the realization method, by the mark of the corresponding logic channel collection of the mark of multiple logic channels or will be multiple The mark of the corresponding Data Radio Bearer collection of mark of Data Radio Bearer or the mark for being sliced multiple networks correspond to one The mark of network slice collection, can save the signaling overheads that access network equipment sends random access control parameter.
Further, the wireless access control message further includes:Each at least two Numerology The load information of Numerology.
In the realization method, wireless access congestion control also considers the load of Numerology, according to the difference of load, Terminal device uses different Numerology so that congestion control more becomes more meticulous.
A kind of access network equipment provided according to embodiments of the present invention, access network equipment provide various selectable Numerology random access control parameter for terminal device select, so as to terminal device may be selected it is different Numerology is serviced, and access network equipment optimizes random access congestion control policy;And terminal device can basis The terminal equipment type or services/bearer parameter of itself select the random access control parameter of corresponding Numerology a kind of, Terminal device can be directed to the congestion control that different business/carrying can become more meticulous.
Referring to Fig. 5, Fig. 5 is a kind of structure diagram of terminal device provided in an embodiment of the present invention.The terminal device 2000 include:Receiving unit 21, selecting unit 22 and access unit 23;Wherein:
Receiving unit 21, for receiving the wireless access control message of access network equipment transmission, the wireless access Control message includes:The random access control parameter of at least two Numerology, the random access control parameter for pair The terminal device carries out carrying out congestion control during random access;
Selecting unit 22, for selecting a kind of random access of Numerology at least two Numerology Control parameter;
Access unit 23, for the random access control parameter according to a kind of selected Numerology to the access Web network equipment sends random access request.
Further, the random access control parameter includes:The random access congestion control factor, the random access are gathered around It is corresponding with terminal equipment type or services/bearer parameter to fill in controlling elements;
The services/bearer parameter includes:The type of service of the terminal device, the mark of logic channel, logic channel The mark of collection, the mark of Data Radio Bearer, the identifying of Data Radio Bearer collection, the network belonging to the business of the terminal device The mark of mark or network the slice collection of slice.
Further, each wireless access control message includes a kind of Numerology for needing to carry out congestion control Random access control parameter;Or
The wireless access control message includes the list of Numerology, and the list of the Numerology is including described The random access congestion control factor of at least two Numerology and the terminal equipment type or services/bearer parameter Correspondence;Or
The wireless access control message includes Numerology bitmaps, and the Numerology bitmaps are used to indicate described Whether at least two Numerology need to carry out congestion control, and the wireless access control message, which further includes, to be needed to carry out congestion The random access congestion control factor of the Numerology of control.
Further, all terminal equipment types corresponding with a kind of Numerology or services/bearer parameter are corresponding One random access congestion control factor;Or each terminal equipment type corresponding with a kind of Numerology or business/hold It carries parameter and corresponds to a random access congestion control factor.
Further, the receiving unit 21, which is additionally operable to receive the access network equipment, passes through wireless heterogeneous networks The bearing parameter correspondence notification message that RRC signaling is sent, the bearing parameter correspondence notification message include:At least one Mark and the correspondence of mark of the logic channel collection or the mark of at least one Data Radio Bearer of a logic channel Collect with the mark that the correspondence of the mark of Data Radio Bearer collection, and/or at least one network are sliced and network slice Mark correspondence.
Further, the wireless access control message further includes:Each at least two Numerology The load information of Numerology.
A kind of terminal device provided according to embodiments of the present invention, access network equipment provide various selectable The random access control parameter of Numerology is selected for terminal device, so as to which different Numerology may be selected in terminal device It is serviced, access network equipment optimizes random access congestion control policy, terminal device random access control parameter Selection diversification;And terminal device can select corresponding one kind according to the terminal equipment type or services/bearer parameter of itself The random access control parameter of Numerology, terminal device can be directed to the congestion control that different business/carrying can become more meticulous System.
Referring to Fig. 6, Fig. 6 is the structure diagram of another access network equipment provided in an embodiment of the present invention, it should Access network equipment 3000 can include transmitter 31, receiver 32, processor 33 and memory 34, and transmitter 31 receives Device 32, processor 33 and memory 34 connect bus 35 respectively.
Processor 33 controls the operation of access network equipment 3000, and processor 33 can also be known as central processing unit (Central Processing Unit, CPU).Processor 33 may be a kind of IC chip, have the processing energy of signal Power.Processor 33 can also be general processor, digital signal processor (Digital Signal Processing, DSP), Application-specific integrated circuit (Application Specific Integrated Circuit, ASIC), field programmable gate array (Field-Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor Logical device, discrete hardware components.General processor can be microprocessor or the processor can also be any conventional Processor etc..
Wherein, batch processing code is stored in memory 34, and processor 33 is used to call the journey stored in memory 34 Sequence code, for performing the following operations:
Wireless access control message is sent to terminal device by transmitter, the wireless access control message includes:Extremely The random access control parameter of few two kinds of Numerology, the random access control parameter are used to carry out the terminal device Congestion control is carried out during random access;
The terminal device is received by the receiver to select wherein according at least two Numerology The random access request that the random access control parameter of Numerology a kind of is sent.
In one implementation, the random access control parameter includes:The random access congestion control factor, it is described with The machine access congestion control factor is corresponding with terminal equipment type or services/bearer parameter;
The services/bearer parameter includes:The type of service of the terminal device, the mark of logic channel, logic channel The mark of collection, the mark of Data Radio Bearer, the identifying of Data Radio Bearer collection, the network belonging to the business of the terminal device The mark of mark or network the slice collection of slice.
In the realization method, access network equipment provides the random access control parameter of a variety of Numerology for eventually End equipment selects, and terminal device can select corresponding one kind according to the terminal equipment type or services/bearer parameter of itself The random access control parameter of Numerology is taken so as to which different Numerology may be selected in different terminal devices Business, the congestion control that can be become more meticulous for different business/carrying.
In another implementation, each wireless access control message needs to carry out congestion control including a kind of The random access control parameter of Numerology;Or
The wireless access control message includes the list of Numerology, and the list of the Numerology is including described The correspondence of the random access congestion control factor and the terminal equipment type or services/bearer parameter;Or
The wireless access control message includes Numerology bitmaps, and the Numerology bitmaps are used to indicate Whether Numerology needs to carry out congestion control, and the wireless access control message, which further includes, to be needed to carry out congestion control The random access congestion control factor of Numerology.
In the realization method, the sending method or message format of wireless access control message can be diversified, can once send out The random access control parameter of Numerology a kind of is sent, also can once send the random access control ginseng of all Numerology Number, the random access control parameter of all Numerology can be represented with tabular form, need to carry out congestion control Numerology can be represented with bitmap.
In another realization method, all terminal equipment types corresponding with a kind of Numerology or business/hold It carries parameter and corresponds to a random access congestion control factor;Or
Each terminal equipment type corresponding with a kind of Numerology or corresponding one of services/bearer parameter connect at random Enter the congestion control factor.
In the realization method, pair of terminal equipment type or services/bearer parameter and the random access congestion control factor Should be related to can diversification.
In another realization method, the processor 33 is additionally operable to perform following operation:
The transmitter is controlled to send bearing parameter correspondence to terminal device by radio resource control RRC signaling to lead to Know message, the bearing parameter correspondence notification message includes:The mark of at least one logic channel and the logic channel The mark of the correspondence of the mark of collection or at least one Data Radio Bearer is corresponding with the mark of Data Radio Bearer collection to close The correspondence of the mark of system, and/or at least one network slice and the mark of network slice collection.
In the realization method, by the mark of the corresponding logic channel collection of the mark of multiple logic channels or will be multiple The mark of the corresponding Data Radio Bearer collection of mark of Data Radio Bearer or the mark for being sliced multiple networks correspond to one The mark of network slice collection, can save the signaling overheads that access network equipment sends random access control parameter.
In another realization method, the wireless access control message further includes:At least two Numerology In each Numerology load information.
In the realization method, wireless access congestion control also considers the load of Numerology, according to the difference of load, Terminal device uses different Numerology so that congestion control more becomes more meticulous.
A kind of access network equipment provided according to embodiments of the present invention, access network equipment provide a variety of The random access control parameter of Numerology is selected for terminal device, and a kind of the random of Numerology may be selected in terminal device It accesses the congestion control factor and carries out random access, access network equipment provides the random of various selectable Numerology Control parameter is accessed, is serviced so as to which different Numerology may be selected in terminal device, access network equipment optimizes Random access congestion control policy.
Referring to Fig. 7, Fig. 7 is the structure diagram of another terminal device provided in an embodiment of the present invention, which sets Standby 4000 can include transmitter 41, receiver 42, processor 43 and memory 44, transmitter 41, receiver 42, processor 43 Bus 45 is connected respectively with memory 44.
The operation of 43 control terminal equipment 4000 of processor, processor 43 can also be known as central processing unit (Central Processing Unit, CPU).Processor 43 may be a kind of IC chip, have the processing capacity of signal.Processor 43 can also be general processor, digital signal processor (Digital Signal Processing, DSP), special integrated electricity Road (Application Specific Integrated Circuit, ASIC), field programmable gate array (Field- Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor logic, Discrete hardware components.General processor can be microprocessor or the processor can also be any conventional processor etc..
Wherein, batch processing code is stored in memory 44, and processor 43 is used to call the journey stored in memory 44 Sequence code, for performing the following operations:
The wireless access control message of access network equipment transmission is received by receiver, the wireless access control disappears Breath includes:The random access control parameter of at least two Numerology, the random access control parameter were used for the end End equipment carries out carrying out congestion control during random access;
The random access control parameter of Numerology a kind of is selected at least two Numerology;
According to the random access control parameter of selected Numerology a kind of, by the transmitter to the access Web network equipment sends random access request.
In one implementation, the random access control parameter includes:The random access congestion control factor, it is described with The machine access congestion control factor is corresponding with terminal equipment type or services/bearer parameter;
The services/bearer parameter includes:The type of service of the terminal device, the mark of logic channel, logic channel The mark of collection, the mark of Data Radio Bearer, the identifying of Data Radio Bearer collection, the network belonging to the business of the terminal device The mark of mark or network the slice collection of slice.
In another realization method, each wireless access control message needs to carry out congestion control including a kind of The random access control parameter of Numerology;Or
The wireless access control message includes the list of Numerology, and the list of the Numerology is including described The random access congestion control factor of at least two Numerology and the terminal equipment type or services/bearer parameter Correspondence;Or
The wireless access control message includes Numerology bitmaps, and the Numerology bitmaps are used to indicate described Whether at least two Numerology need to carry out congestion control, and the wireless access control message, which further includes, to be needed to carry out congestion The random access congestion control factor of the Numerology of control.
In another realization method, all terminal equipment types corresponding with a kind of Numerology or business/hold It carries parameter and corresponds to a random access congestion control factor;Or
Each terminal equipment type corresponding with a kind of Numerology or corresponding one of services/bearer parameter connect at random Enter the congestion control factor.
In another realization method, the processor 43 is additionally operable to perform following operation:
The carrying sent by the receiver reception access network equipment by radio resource control RRC signaling Parameter correspondence notification message, the bearing parameter correspondence notification message include:The mark of at least one logic channel With the correspondence of the mark of the logic channel collection or the mark of at least one Data Radio Bearer and Data Radio Bearer collection Mark correspondence, and/or at least one network slice mark with the network slice collection mark correspondence.
Another realization method, the wireless access control message further include:In at least two Numerology The load information of each Numerology.
A kind of terminal device provided according to embodiments of the present invention, access network equipment provide a variety of Numerology's Random access control parameter is selected for terminal device, and the random access congestion control of Numerology a kind of may be selected in terminal device The factor carries out random access, and access network equipment provides the random access control ginseng of various selectable Numerology Number is serviced so as to which different Numerology may be selected in terminal device, and access network equipment optimizes random access and gathers around Fill in control strategy, the selection diversification of terminal device.
It is similar with wireless access congestion control, different unauthorized transfer resources is had on different Numerology, For different services/bearers, need to transmit number according to different unauthorized transfer resource configuration instructions on Numerology According to specifically see the description of the following examples:
Referring to Fig. 8, Fig. 8 is a kind of interaction schematic diagram of unauthorized transmission method provided in an embodiment of the present invention.The party Method includes the following steps:
S201, access network equipment send bearing parameter to terminal device by radio resource control RRC signaling and correspond to Relationship notification message.
For the terminal device of disconnected state, since it also maintains data surface logical channel information or data are wireless Carrying information or each business belong to the information of which network slice, and are directed to save access network equipment Each logic channel, Data Radio Bearer or network slice send unauthorized transfer resource configuration message or unauthorized transfer resource The signaling overheads of parameter is configured, is needed in the present embodiment for each logic channel collection, each Data Radio Bearer collection or net Network slice collection carries out unauthorized transfer resource configuration.Wherein, logic channel refers to that access network equipment can be terminal device Different carryings is established, each corresponding logic channel of carrying, in this case, media access control layer obtains data later just Know and this data is sent to the corresponding radio link layer control protocol layer of which logic channel.Network slice refers to that one is determined The complete network in logic of system, this primarily to the different business demand of reply or tenant's demand, such as URLLC and The business demand otherness of mMTC is very big, it may be necessary to which different topologys and mode of operation could meet, therefore network can be this Two business generate two customization networks in logic respectively, so as to meet corresponding demand respectively.Terminal device is by some Multiple wireless data carrying/logic channels can be established when network slice service.
The bearing parameter correspondence notification message includes:The mark of at least one logic channel and the mark of logic channel collection The correspondence of the mark of the mark of the correspondence of knowledge or at least one Data Radio Bearer and Data Radio Bearer collection and/ Or the correspondence of the mark of at least one network slice and the mark of network slice collection.
The RRC signaling includes:State conversion message, RRC pauses request message, RRC release messages etc..
It should be noted that the step is optional step, it is represented by dotted lines in figure.It is alternatively: Terminal device stores the correspondence of the mark of at least one logic channel and the mark of logic channel collection or at least one number The mark being sliced according to the correspondence of the mark of the mark and Data Radio Bearer collection of radio bearer, and/or at least one network With the correspondence of the mark of network slice collection.And the step can also perform after step S202, and it is suitable not limit its execution Sequence.By establishing logic channel collection, Data Radio Bearer collection or network slice collection, access network equipment can be saved for every A logic channel, Data Radio Bearer or network slice send the signaling overheads of unauthorized transfer resource configuration message.
S202, the access network equipment send unauthorized transfer resource and message are configured to the terminal device.
Traditional data transfer mode:Terminal device will transmit upstream data, then be set firstly the need of to access net network Standby request resource after access network equipment receives request, can be that terminal device distributes resource, then tell terminal device, Terminal device can carry out transmitting uplink data in corresponding resource in this way.And the unauthorized transmission mode of the present embodiment refers to Be that access network equipment pre-allocates a part of resource in advance, when then multiple terminal devices will transmit upstream data, be not required to Access network equipment to be asked to distribute resource again, but is directly at war with to these resources, transmits data.The present embodiment In, message is configured to terminal device by sending unauthorized transfer resource in access network equipment, and terminal device non-is awarded according to this It weighs transfer resource configuration message and obtains unauthorized transfer resource.
Access network equipment can broadcast the wireless access control message to all terminal devices, can also pass through RRC Signaling sends the wireless access control message to corresponding terminal device.The RRC signaling includes:RRC release messages, state conversion Message, attach request allow message etc..Terminal device receives the unauthorized transfer resource configuration that access network equipment is sent and disappears Breath.The terminal device is usually the terminal device of disconnected state.
In the present embodiment, the unauthorized transfer resource configuration message includes:At least two Numerology's is unauthorized Transfer resource is configured parameter, and the unauthorized transfer resource configuration parameter includes unauthorized transfer resource and/or described unauthorized The configuration instruction of transfer resource.Wherein, the interface-free resources of different Numerology correspond to different parameters of eating dishes without rice or wine, such as subcarrier The combination of interval, Transmission Time Interval, circulating prefix-length etc. or these parameters.Access network equipment non-by awarding Power transfer resource configuration message includes the unauthorized transfer resource configuration parameter of two or more Numerology, terminal device It can select the unauthorized transfer resource of one of which Numerology that parameter is configured to carry out data transmission, access network equipment Optimize the unauthorized transfer resource configuration strategy of all terminal devices.
Further, since 5G systems support the huge type of service of differentiation, in order to meet the needs of these differentiation, Unauthorized transmission is carried out in 5G mobile communication system, different terminal equipment type and/or services/bearer use different transmission Time interval and subcarrier spacing etc., therefore, different terminal equipment types and/or services/bearer can use different Numerology is serviced to meet its QoS demand.Therefore, the configuration instruction and terminal device of the unauthorized transfer resource Type or services/bearer parameter correspond to, wherein, the services/bearer parameter includes:The type of service of the terminal device is patrolled (such as data are wireless for volume mark (such as logic channel ID) of channel, the mark of logic channel collection, the mark of Data Radio Bearer Carrying ID) or the identifying of Data Radio Bearer collection, the mark or network of network slice belonging to the business of the terminal device The mark of collection is sliced, the mark of the network slice can be cut by the mark that core net is terminal device distribution, such as network Piece selection auxiliary information (network slice selection assistance information, NSSAI) or session Manage network slice selection auxiliary information (session management-network slice selection Assistance information, SM-NSSAI) slice/service type (slice/service type) or slice area Branch (slice differentiator, SD) or new mark or the mark distributed by access net for terminal device Know.Access network equipment sends unauthorized transfer resource configuration message to some specific terminal device or the unauthorized biography of broadcast For defeated resource distribution message to all in the terminal device intercepted, which can be used for multiple terminals Equipment carries out unauthorized according to multiple business/bearing parameter of the terminal equipment type or multiple terminal devices of multiple terminal devices The selection of the resource distribution of transmission can be used for a terminal device according to one or more business of the terminal device/hold Carry the selection that parameter carries out the resource distribution of unauthorized transmission.
It should be noted that unauthorized transfer resource can inform terminal device, and therefore, unauthorized transmission money Source configuration parameter can only include the configuration instruction of unauthorized transfer resource.
Wherein, there are many modes of differentiated service type, the first be distinguish in application layer (be, for example, QQ or Baidu), if be exactly for second user under Inactive states, can by logic channel or carrying distinguish (data of e.g. carrying 1 still carry 2 data).The range of terminal equipment type is that comparison is wide, such as terminal device Type can refer to mobile phone user either V2X user or other.
Optionally, it can also include the steps of before step S202:The access network equipment determines at least two The unauthorized transfer resource configuration parameter of Numerology.
In the present embodiment, the unauthorized transmission configuration parameter of Numerology can be represented in the form of structure.Each Numerology has corresponding unauthorized transfer resource, which includes:The corresponding skies of the Numerology The time/frequency source block of mouthful parameter, the structure parameter of Numerology are used as carrying out that a kind of Numerology is corresponding to eat dishes without rice or wine to join Several selection gists.
As a kind of realization method, each unauthorized transfer resource configuration message can include a kind of Numerology Unauthorized transmission configuration parameter, i.e., the unauthorized transmission configuration parameter of a variety of Numerology is by a plurality of unauthorized transmission Multiple cells (Information Element, IE) in resource distribution message or a unauthorized transfer resource configuration information It sends.For carrying out unauthorized transfer resource configuration according to type of service (service), unauthorized transmission as follows The example (one) of resource allocation structure body:
The example (one) of unauthorized transfer resource configuration structure entity
In the structure, GFPerNumerology-Category-r15 represents a kind of unauthorized biography of Numerology Transmission & distribution put parameter;Numerology-Category-r15 is a parameter newly added (compared to the mechanism 1 of the prior art Numerology structures), integer of the value between [1, maxNumerology-Cat-r15], wherein MaxNumerology-Cat-r15 refers to the maximum value of the number for the Numerology that system is supported, therefore, terminal device choosing The value of some specific Numerology-Category-r15 is selected, then refers to terminal device and is corresponded to according to any Numerology Unauthorized transmission configuration parameter carry out unauthorized transmission, if configuration successful, obtain that the Numerology is corresponding to eat dishes without rice or wine to provide Source carries out data transmission;Numerology-GFConfig-r15 then refers to the unauthorized transmission configuration parameter of some Numerology; As-Service-List represents type of service list;It is corresponding unauthorized that ac-service-GFConfig-r15 refers to type of service Transmission configuration parameter, the unauthorized transmission configuration parameter include:Ac-GFFactor-r13, i.e. unauthorized transfer resource configuration because Son;Ac-GFTime represents that, if do not succeeded using GF transmissions for the first time, GF transmits the stand-by period needed to distance next time, It is unsuccessfully opening timing device TGF (" TGF "=(0.7+0.6*rand) * ac-GFTime) to send, will not be again within the time It attempts to carry out GF;The load of Numerology-Load, Numerology, according to the difference of load, terminal device is using different Numerology so that unauthorized transfer resource configuration more becomes more meticulous, the class value { 100, p05 ... p95 } on the right of the parameter For optional load value, access network equipment selects corresponding current load value in the class value, needs according to present load Bright, which can be included in unauthorized transfer resource configuration message, can also be sent by individual message To terminal device.
As another realization method, each unauthorized transfer resource configuration message can also only include one kind The corresponding unauthorized transmission configuration parameter of a services/bearer parameter under Numerology, unauthorized transmission as follows The example (two) of resource allocation structure body:
The example (two) of unauthorized transfer resource configuration structure entity
In the structure, GFPerNumerology-Category-r15 expressions only include a kind of Numerology, GFPerService-Category-r15 expressions only include a kind of corresponding unauthorized transmission configuration parameters of Service, other ginsengs Several meanings is identical with above described structure.
As another realization method, unauthorized transfer resource configuration message can also be the row including Numerology Table, the list of the Numerology include the unauthorized transfer resource configuration factor of at least two Numerology With the correspondence of the terminal equipment type or services/bearer parameter.To carry out unauthorized transfer resource according to type of service For configuration, the example (three) of unauthorized transfer resource configuration structure entity as follows:
The example (three) of unauthorized transfer resource configuration structure entity
In the structure, GFPerNumerology-List is the integer value row from 1 to maxNumerology Table, expression are a Numerology lists, and As-Service-List represents that its type of service is also a list.Other ginsengs Several meanings is identical with above described structure.
And below in exemplary structure, Numerology is a list, and all Numerology are directed to one Kind type of service carries out unauthorized transfer resource configuration.The example of unauthorized transfer resource configuration structure entity as follows (4):
The example (four) of unauthorized transfer resource configuration structure entity
As another realization method, multiple Numerology that the unauthorized transfer resource configuration message includes may be used also To be a bitmap, the bitmap of Numerology is used to indicate whether a variety of Numerology need to carry out unauthorized transmission money Source is configured, and certainly, which further includes the non-of the Numerology that needs to carry out unauthorized transmission Parameter is configured in authorized transmissions.The example (five) of unauthorized transfer resource configuration structure entity as follows:
The example (five) of unauthorized transfer resource configuration structure entity
In the structure, the value of As-GFForSpecialNumerology is a bit string (BIT STRING), such as The message includes 5 kinds of Numerology in total, and 1 represents that the Numerology needs to carry out unauthorized transfer resource configuration, and 0 represents The Numerology does not need to carry out unauthorized transfer resource configuration, then 11001 expression the 1st, 2,5 kind of Numerology need into The unauthorized transfer resource configuration of row, the 3rd, 4 kind of Numerology does not need to carry out unauthorized transfer resource configuration, if terminal device Using the 3rd, 4 kind of Numerology, then the services/bearer of the terminal device or the terminal device is not needed to carry out unauthorized biography Defeated resource distribution.Such as the business for extremely low time delay, the Numerology used may need to carry out unauthorized transmission Resource distribution, otherwise its unauthorized transfer resource be preempted, self time-delay just can not meet;And MTC service is unwise to time delay Sense, can not carry out it unauthorized transfer resource configuration.
As another realization method, need to carry out the terminal equipment type of unauthorized transfer resource configuration or business/hold It can also be a bitmap to carry parameter, the example (six) of unauthorized transfer resource configuration structure entity as follows:
The example (six) of unauthorized transfer resource configuration structure entity
In the structure, GFPerNumerology-List represents the list of a Numerology, As- The value of GFForSpecialService is a bit string (BIT STRING), represents the type of service under each Numerology Whether need to carry out unauthorized transfer resource to be configured is represented in the form of bitmap.Such as terminal device one shares 5 kinds of industry Service type can generate the bitmap of 5bit for this 5 kinds of types of service, and 1 represents that the type of service needs to carry out unauthorized transmission money Source is configured, and 0 represents not needing to carry out unauthorized transfer resource configuration, then if bitmap is 00110, then type of service 1,2,5 It is not influenced by unauthorized transfer resource configuration strategy, and type of service 3,4 are influenced by unauthorized transfer resource configuration strategy;Its position Figure it is also possible that:Corresponding digital 0 expression type of service needs to carry out unauthorized transfer resource configuration, digital 1 table Show and do not need to carry out unauthorized transfer resource configuration, then if bitmap is 11001, then type of service 1,2,5 by not unauthorized Transfer resource configuration strategy influences, and type of service 3, and 4 are influenced by unauthorized transfer resource configuration strategy.The structure other The meaning of parameter is identical with aforementioned structure body.
Further, all terminal equipment types corresponding with a kind of Numerology or services/bearer parameter are corresponding One unauthorized transfer resource configuration instruction;Or each terminal equipment type corresponding with a kind of Numerology or business/ Bearing parameter corresponds to a unauthorized transfer resource configuration instruction.The correspondence is adapted to a kind of structure of any of the above.
For example, the example (seven) of unauthorized transfer resource configuration structure entity as follows:
In the structure, the value of As-GFForSpecialService is a bit string (BIT STRING), represents every Whether the type of service under kind Numerology, which needs to carry out unauthorized transfer resource to be configured, is represented in the form of bitmap. But all Service are only whether to use the position according to Service using a kind of unauthorized transfer resource configuration parameter Figure determines.
The example (seven) of unauthorized transfer resource configuration structure entity
S203, the terminal device select that a kind of Numerology's is unauthorized at least two Numerology The configuration instruction of transfer resource and/or unauthorized transfer resource.
After terminal device receives the unauthorized transfer resource configuration parameter of a variety of Numerology, selection is a kind of wherein The unauthorized transfer resource configuration parameter of Numerology.
Further, terminal device is according to itself terminal equipment type or services/bearer parameter and according to receiving A variety of Numerology unauthorized transfer resource configuration parameter, obtain with the terminal equipment type or services/bearer of itself The corresponding unauthorized transfer resource configuration parameter of parameter.
S204, the terminal device according to the unauthorized transfer resource of selected Numerology a kind of and/or non-are awarded The configuration instruction of transfer resource is weighed, transmits and asks to the access network equipment transmission data on unauthorized transfer resource.
The interface-free resources of unauthorized transfer resource, that is, Numerology, it is signified according to the configuration instruction of unauthorized transfer resource Show the Numerology of use, terminal device is in the corresponding interface-free resources transmitting datas of the Numerology.
A kind of unauthorized transmission method provided according to embodiments of the present invention, access network equipment provide plurality of optional The unauthorized transfer resource configuration parameter of the Numerology selected, carries out so as to which different Numerology may be selected in terminal device Service, access network equipment optimize unauthorized transfer resource configuration strategy.
Referring to Fig. 9, Fig. 9 is the structure diagram of another access network equipment provided in an embodiment of the present invention.It should Access network equipment 5000 includes transmitting element 51 and receiving unit 52;Wherein:
Transmitting element 51, for sending unauthorized transfer resource configuration message to terminal device, the unauthorized transmission money Source configuration message includes:The unauthorized transfer resource configuration parameter of at least two Numerology;
Receiving unit 52 selects wherein for receiving the terminal device according at least two Numerology The data transfer request that the unauthorized transfer resource configuration parameter of Numerology a kind of is sent on unauthorized transfer resource.
In the realization method, access network equipment provides the unauthorized transfer resource configuration ginseng of a variety of Numerology Number is selected for terminal device, and the unauthorized transfer resource configuration parameter that a kind of Numerology may be selected in terminal device carries out non-award Power transmission, access network equipment provide the unauthorized transfer resource configuration parameter of various selectable Numerology, from And terminal device may be selected different Numerology and be serviced, access network equipment optimizes unauthorized transfer resource and matches Put strategy.
In one implementation, the unauthorized transfer resource configuration parameter includes unauthorized transfer resource and/or institute State the configuration instruction of unauthorized transfer resource, the configuration instruction of the unauthorized transfer resource and terminal equipment type or business/ Bearing parameter corresponds to, wherein, the services/bearer parameter includes:The type of service of the terminal device, the mark of logic channel Knowledge, the identifying of the mark of logic channel collection, the mark of Data Radio Bearer or Data Radio Bearer collection, the terminal device The mark of network slice belonging to business or the mark of network slice collection.
In the realization method, the unauthorized configured transmission that access network equipment provides a variety of Numerology supplies terminal Equipment selects, and terminal device can select corresponding one kind according to the terminal equipment type or services/bearer parameter of itself The unauthorized transmission configuration parameter of Numerology is taken so as to which different Numerology may be selected in different terminal devices Business, the unauthorized transmission that can be become more meticulous for different business/carrying.
In a kind of realization method is separately made, each unauthorized transfer resource configuration message includes a kind of Numerology Unauthorized transfer resource configuration parameter;Or
The unauthorized transfer resource configuration message includes the list of Numerology, the list packet of the Numerology The configuration for including the unauthorized transfer resource, and/or the unauthorized transfer resource of at least two Numerology refers to Show the correspondence with the terminal equipment type or services/bearer parameter;Or
The unauthorized transfer resource configuration message includes Numerology bitmaps, and the Numerology bitmaps are used to refer to Show adoptable at least two Numerology during terminal device transmission data, the unauthorized transfer resource configuration message is also wrapped Include the unauthorized transfer resource configuration parameter of each Numerology.
In the realization method, the sending method or message format of unauthorized transfer resource configuration message can be diversified, can The unauthorized transfer resource configuration parameter of Numerology a kind of is once sent, also can once send the non-of all Numerology Authorized transmissions resource configuration parameter, parameter, which is configured, in the unauthorized transfer resource of all Numerology to be represented with tabular form, Adoptable Numerology can be represented with bitmap during terminal device transmission data.
In another realization method, all terminal equipment types corresponding with a kind of Numerology or business/hold Carry the configuration instruction that parameter corresponds to a unauthorized transfer resource;Or
Each terminal equipment type corresponding with a kind of Numerology or services/bearer parameter it is corresponding one it is unauthorized The configuration instruction of transfer resource.
In the realization method, terminal equipment type or services/bearer parameter and the configuration instruction of unauthorized transfer resource Correspondence can diversification.
In another realization method, the transmitting element 51 is additionally operable to through radio resource control RRC signaling to terminal Equipment sends bearing parameter correspondence notification message, and the bearing parameter correspondence notification message includes:It is at least one to patrol Collect the mark of channel and the correspondence of mark of the logic channel collection, and/or the mark of at least one Data Radio Bearer Collect with the mark that the correspondence of the mark of Data Radio Bearer collection, and/or at least one network are sliced and network slice Mark correspondence.
In the realization method, by the mark of the corresponding logic channel collection of the mark of multiple logic channels or will be multiple The mark of the corresponding Data Radio Bearer collection of mark of Data Radio Bearer or the mark for being sliced multiple networks correspond to one The mark of network slice collection can save the signaling overheads that access network equipment sends unauthorized transfer resource configuration parameter.
In another realization method, the unauthorized transfer resource configuration message further includes:Described at least two The load information of each Numerology in Numerology.
In the realization method, unauthorized to transmit the load for also considering Numerology, according to the difference of load, terminal is set It is standby to use different Numerology so that unauthorized transmission more becomes more meticulous.
A kind of access network equipment provided according to embodiments of the present invention, access network equipment provide a variety of The unauthorized transfer resource configuration parameter of Numerology is selected for terminal device, and a kind of Numerology may be selected in terminal device Unauthorized transfer resource configuration parameter carry out unauthorized transmission, access network equipment provides various selectable The unauthorized transfer resource configuration parameter of Numerology, is taken so as to which different Numerology may be selected in terminal device Business, access network equipment optimize unauthorized transfer resource configuration strategy.
Referring to Fig. 10, Figure 10 is the structure diagram of another terminal device provided in an embodiment of the present invention.The terminal Equipment 6000 includes:Receiving unit 61, selecting unit 62 and transmission unit 63;Wherein:
Receiving unit 61, message is configured in the unauthorized transfer resource for receiving access network equipment transmission, described non- Authorized transmissions resource distribution message includes:The unauthorized transfer resource configuration parameter of at least two Numerology, it is described non-to award Weigh the configuration instruction that transfer resource configuration parameter includes unauthorized transfer resource and/or the unauthorized transfer resource;
Selecting unit 62, for selecting the unauthorized biography of Numerology a kind of at least two Numerology The configuration instruction of defeated resource and/or unauthorized transfer resource;
Transmission unit 63, for the unauthorized transfer resource according to a kind of selected Numerology and/or unauthorized The configuration instruction of transfer resource is transmitted to the access network equipment transmission data on unauthorized transfer resource and is asked.
In a kind of realization method, configuration instruction and terminal equipment type or the services/bearer of the unauthorized transfer resource Parameter corresponds to, wherein, the services/bearer parameter includes:The type of service of the terminal device, is patrolled at the mark of logic channel The mark of volume channel set, the mark of Data Radio Bearer, Data Radio Bearer collection identify, belonging to the business of the terminal device Network slice mark or network slice collection mark.
In another realization method, each unauthorized transfer resource configuration message includes a kind of the non-of Numerology Authorized transmissions resource configuration parameter;Or
The unauthorized transfer resource configuration message includes the list of Numerology, the list packet of the Numerology The configuration for including the unauthorized transfer resource, and/or the unauthorized transfer resource of at least two Numerology refers to Show the correspondence with the terminal equipment type or services/bearer parameter;Or
The unauthorized transfer resource configuration message includes Numerology bitmaps, and the Numerology bitmaps are used to refer to Show adoptable at least two Numerology during terminal device transmission data, the unauthorized transfer resource configuration message is also wrapped Include the unauthorized transfer resource configuration parameter of each Numerology.
In another realization method, all terminal equipment types corresponding with a kind of Numerology or business/hold Carry the configuration instruction that parameter corresponds to a unauthorized transfer resource;Or
Each terminal equipment type corresponding with a kind of Numerology or services/bearer parameter it is corresponding one it is unauthorized The configuration instruction of transfer resource.
In another realization method, the receiving unit 61 be additionally operable to receive the access network equipment pass through it is wireless The bearing parameter correspondence notification message that resources control RRC signaling is sent, the bearing parameter correspondence notification message packet It includes:The mark of at least one logic channel and the correspondence of the mark of the logic channel collection, and/or at least one data without The mark of line carrying and the mark and institute of the correspondence of the mark of Data Radio Bearer collection, and/or at least one network slice State the correspondence of the mark of network slice collection.
In another realization method, the unauthorized transfer resource configuration message further includes:Described at least two The load information of each Numerology in Numerology.
A kind of terminal device provided according to embodiments of the present invention, access network equipment provide a variety of Numerology's Unauthorized transfer resource configuration parameter is selected for terminal device, and the unauthorized transmission of Numerology a kind of may be selected in terminal device Resource configuration parameter carries out unauthorized transmission, and access network equipment provides the unauthorized of various selectable Numerology Parameter is configured in transfer resource, is serviced so as to which different Numerology may be selected in terminal device, access network equipment is excellent Unauthorized transfer resource configuration strategy, the unauthorized transfer resource configuration parameter diversification of terminal device are changed..
The structure diagram that 1, Figure 11 is another access network equipment provided in an embodiment of the present invention is please referred to Fig.1, The access network equipment 7000 can include transmitter 71, receiver 72, processor 73 and memory 74, and transmitter 71 connects It receives device 72, processor 73 and memory 74 and connects bus 75 respectively.
Processor 73 controls the operation of access network equipment 7000, and processor 73 can also be known as central processing unit (Central Processing Unit, CPU).Processor 73 may be a kind of IC chip, have the processing energy of signal Power.Processor 73 can also be general processor, digital signal processor (Digital Signal Processing, DSP), Application-specific integrated circuit (Application Specific Integrated Circuit, ASIC), field programmable gate array (Field-Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor Logical device, discrete hardware components.General processor can be microprocessor or the processor can also be any conventional Processor etc..
Wherein, batch processing code is stored in memory 74, and processor 73 is used to call the journey stored in memory 74 Sequence code, for performing the following operations:
Unauthorized transfer resource is sent by transmitter, message is configured to terminal device, the unauthorized transfer resource configuration Message includes:The unauthorized transfer resource configuration parameter of at least two Numerology, the unauthorized transfer resource configuration ginseng Number includes the configuration instruction of unauthorized transfer resource and/or the unauthorized transfer resource;
The terminal device is received by the receiver to select wherein according at least two Numerology The data transfer request that the unauthorized transfer resource configuration parameter of Numerology a kind of is sent on unauthorized transfer resource.
In the realization method, access network equipment provides the unauthorized transfer resource configuration ginseng of a variety of Numerology Number is selected for terminal device, and the unauthorized transfer resource configuration parameter that a kind of Numerology may be selected in terminal device carries out non-award Power transmission, access network equipment provide the unauthorized transfer resource configuration parameter of various selectable Numerology, from And terminal device may be selected different Numerology and be serviced, access network equipment optimizes unauthorized transfer resource and matches Put strategy.
In one implementation, the unauthorized transfer resource configuration parameter includes unauthorized transfer resource and/or institute State the configuration instruction of unauthorized transfer resource, the configuration instruction of the unauthorized transfer resource and terminal equipment type or business/ Bearing parameter corresponds to, wherein, the services/bearer parameter includes:The type of service of the terminal device, the mark of logic channel Knowledge, the identifying of the mark of logic channel collection, the mark of Data Radio Bearer or Data Radio Bearer collection, the terminal device The mark of network slice belonging to business or the mark of network slice collection.
In the realization method, the unauthorized configured transmission that access network equipment provides a variety of Numerology supplies terminal Equipment selects, and terminal device can select corresponding one kind according to the terminal equipment type or services/bearer parameter of itself The unauthorized transmission configuration parameter of Numerology is taken so as to which different Numerology may be selected in different terminal devices Business, the unauthorized transmission that can be become more meticulous for different business/carrying.
In another implementation, each unauthorized transfer resource configuration message includes a kind of Numerology's Parameter is configured in unauthorized transfer resource;Or
The unauthorized transfer resource configuration message includes the list of Numerology, the list packet of the Numerology The configuration for including the unauthorized transfer resource, and/or the unauthorized transfer resource of at least two Numerology refers to Show the correspondence with the terminal equipment type or services/bearer parameter;Or
The unauthorized transfer resource configuration message includes Numerology bitmaps, and the Numerology bitmaps are used to refer to Show adoptable at least two Numerology during terminal device transmission data, the unauthorized transfer resource configuration message is also wrapped Include the unauthorized transfer resource configuration parameter of each Numerology.
In the realization method, the sending method or message format of unauthorized transfer resource configuration message can be diversified, can The unauthorized transfer resource configuration parameter of Numerology a kind of is once sent, also can once send the non-of all Numerology Authorized transmissions resource configuration parameter, parameter, which is configured, in the unauthorized transfer resource of all Numerology to be represented with tabular form, Adoptable Numerology can be represented with bitmap during terminal device transmission data.
In another realization method, all terminal equipment types corresponding with a kind of Numerology or business/hold Carry the configuration instruction that parameter corresponds to a unauthorized transfer resource;Or
Each terminal equipment type corresponding with a kind of Numerology or services/bearer parameter it is corresponding one it is unauthorized The configuration instruction of transfer resource.
In the realization method, terminal equipment type or services/bearer parameter and the configuration instruction of unauthorized transfer resource Correspondence can diversification.
In another realization method, the processor 73 is additionally operable to perform following operation:
Bearing parameter correspondence is sent by the transmitter to terminal device with radio resource control RRC signaling to notify Message, the bearing parameter correspondence notification message include:The mark of at least one logic channel and the logic channel collection Mark correspondence, and/or at least one Data Radio Bearer mark it is corresponding with the mark of Data Radio Bearer collection The correspondence of relationship, and/or the mark of at least one network slice and the mark of network slice collection.
In the realization method, by the mark of the corresponding logic channel collection of the mark of multiple logic channels or will be multiple The mark of the corresponding Data Radio Bearer collection of mark of Data Radio Bearer or the mark for being sliced multiple networks correspond to one The mark of network slice collection can save the signaling overheads that access network equipment sends unauthorized transfer resource configuration parameter.
In another realization method, the unauthorized transfer resource configuration message further includes:Described at least two The load information of each Numerology in Numerology.
In the realization method, unauthorized to transmit the load for also considering Numerology, according to the difference of load, terminal is set It is standby to use different Numerology so that unauthorized transmission more becomes more meticulous.
A kind of access network equipment provided according to embodiments of the present invention, access network equipment provide a variety of The unauthorized transfer resource configuration parameter of Numerology is selected for terminal device, and a kind of Numerology may be selected in terminal device Unauthorized transfer resource configuration parameter carry out unauthorized transmission, access network equipment provides various selectable The unauthorized transfer resource configuration parameter of Numerology, is taken so as to which different Numerology may be selected in terminal device Business, access network equipment optimize unauthorized transfer resource configuration strategy.
Please refer to Fig.1 the structure diagram that 2, Figure 12 is another terminal device provided in an embodiment of the present invention, the terminal Equipment 8000 can include transmitter 81, receiver 82, processor 83 and memory 84, transmitter 81, receiver 82, processor 83 and memory 84 connect bus 85 respectively.
The operation of 83 control terminal equipment 8000 of processor, processor 83 can also be known as central processing unit (Central Processing Unit, CPU).Processor 83 may be a kind of IC chip, have the processing capacity of signal.Processor 83 can also be general processor, digital signal processor (Digital Signal Processing, DSP), special integrated electricity Road (Application Specific Integrated Circuit, ASIC), field programmable gate array (Field- Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor logic, Discrete hardware components.General processor can be microprocessor or the processor can also be any conventional processor etc..
Wherein, batch processing code is stored in memory 84, and processor 83 is used to call the journey stored in memory 84 Sequence code, for performing the following operations:
Message, the unauthorized biography is configured in the unauthorized transfer resource that access network equipment transmission is received by receiver Defeated resource distribution message includes:The unauthorized transfer resource configuration parameter of at least two Numerology, the unauthorized transmission Resource configuration parameter includes the configuration instruction of unauthorized transfer resource and/or the unauthorized transfer resource;
The unauthorized transfer resource of Numerology a kind of is selected at least two Numerology and/or non-is awarded Weigh the configuration instruction of transfer resource;
Referred to according to the configuration of the unauthorized transfer resource of selected Numerology a kind of and/or unauthorized transfer resource Show, transmitted and asked to the access network equipment transmission data by the transmitter on unauthorized transfer resource.
In one implementation, the configuration instruction of the unauthorized transfer resource and terminal equipment type or business/hold Parameter is carried to correspond to, wherein, the services/bearer parameter includes:The type of service of the terminal device, the mark of logic channel, The mark of logic channel collection, the mark of Data Radio Bearer, the identifying of Data Radio Bearer collection, the business of terminal device institute The mark of the network slice of category or the mark of network slice collection.
In another implementation, each unauthorized transfer resource configuration message includes a kind of Numerology's Parameter is configured in unauthorized transfer resource;Or
The unauthorized transfer resource configuration message includes the list of Numerology, the list packet of the Numerology The configuration for including the unauthorized transfer resource, and/or the unauthorized transfer resource of at least two Numerology refers to Show the correspondence with the terminal equipment type or services/bearer parameter;Or
The unauthorized transfer resource configuration message includes Numerology bitmaps, and the Numerology bitmaps are used to refer to Show adoptable at least two Numerology during terminal device transmission data, the unauthorized transfer resource configuration message is also wrapped Include the unauthorized transfer resource configuration parameter of each Numerology.
In another realization method, all terminal equipment types corresponding with a kind of Numerology or business/hold Carry the configuration instruction that parameter corresponds to a unauthorized transfer resource;Or
Each terminal equipment type corresponding with a kind of Numerology or services/bearer parameter it is corresponding one it is unauthorized The configuration instruction of transfer resource.
In another realization method, the processor 83 is additionally operable to perform following operation:
The carrying sent by the receiver reception access network equipment by radio resource control RRC signaling Parameter correspondence notification message, the bearing parameter correspondence notification message include:The mark of at least one logic channel It is wirelessly held with data with the correspondence of the mark of the logic channel collection, and/or the mark of at least one Data Radio Bearer It carries the correspondence of the mark of collection, and/or the mark of at least one network slice is corresponding with the mark of network slice collection Relationship.
In another realization method, the unauthorized transfer resource configuration message further includes:Described at least two The load information of each Numerology in Numerology.
A kind of terminal device provided according to embodiments of the present invention, access network equipment provide a variety of Numerology's Unauthorized transfer resource configuration parameter is selected for terminal device, and the unauthorized transmission of Numerology a kind of may be selected in terminal device Resource configuration parameter carries out unauthorized transmission, and access network equipment provides the unauthorized of various selectable Numerology Parameter is configured in transfer resource, is serviced so as to which different Numerology may be selected in terminal device, access network equipment is excellent Unauthorized transfer resource configuration strategy, the unauthorized transfer resource configuration parameter diversification of terminal device are changed.
Term " first ", " second ", " third " and " the 4th " in the specification of the present invention, claims and attached drawing Etc. being for distinguishing different objects rather than for describing particular order.In addition, term " comprising " and " having " and they appoint What is deformed, it is intended that covers non-exclusive include.Such as contain the process of series of steps or unit, method, system, The step of product or equipment are not limited to list or unit, but optionally further include the step of not listing or list Member is optionally further included for other intrinsic steps of these processes, method, system, product or equipment or unit.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, there is no the portion being described in detail in some embodiment Point, it may refer to the associated description of other embodiment.
Through the above description of the embodiments, it is apparent to those skilled in the art that the present invention can be with It is realized with hardware realization or firmware realization or combination thereof mode.It when implemented in software, can be by above-mentioned function Storage is transmitted in computer-readable medium or as one or more instructions on computer-readable medium or code.Meter Calculation machine readable medium includes computer storage media and communication media, and wherein communication media includes being convenient for from a place to another Any medium of a place transmission computer program.Storage medium can be any usable medium that computer can access.With For this but it is not limited to:Computer-readable medium can include random access memory (Random Access Memory, RAM), read-only memory (Read-Only Memory, ROM), Electrically Erasable Programmable Read-Only Memory (Electrically Erasable Programmable Read-Only Memory, EEPROM), CD-ROM (Compact Disc Read- Only Memory, CD-ROM) or other optical disc storages, magnetic disk storage medium or other magnetic storage apparatus or can be used in Carry or storage with instruction or data structure form desired program code simultaneously can by computer access any other Medium.In addition.Any connection can be suitably become computer-readable medium.For example, if software is using coaxial cable, light Fine optical cable, twisted-pair feeder, Digital Subscriber Line (Digital Subscriber Line, DSL) or such as infrared ray, radio and The wireless technology of microwave etc is transmitted from website, server or other remote sources, then coaxial cable, optical fiber cable, double The wireless technology of twisted wire, DSL or such as infrared ray, wireless and microwave etc is included in the fixing of affiliated medium.Such as this hair Used in bright, disk (Disk) and dish (disc) including compress optical disc (CD), laser disc, optical disc, Digital Versatile Disc (DVD), Floppy disk and Blu-ray Disc, the usually magnetic replicate data of which disk, and dish is then with laser come optical replicate data.Group above Conjunction should also be as being included within the protection domain of computer-readable medium.

Claims (24)

1. a kind of communication control method, which is characterized in that the method includes:
Access network equipment sends wireless access control message to terminal device, and the wireless access control message includes:Extremely The random access control parameter of few two kinds of Numerology, the random access control parameter are used to carry out the terminal device Congestion control is carried out during random access;
The access network equipment receives the terminal device and is selected wherein according at least two Numerology The random access request that the random access control parameter of Numerology a kind of is sent.
2. according to the method described in claim 1, it is characterized in that, the random access control parameter includes:Random access is gathered around Controlling elements are filled in, the random access congestion control factor is corresponding with terminal equipment type or services/bearer parameter;
The services/bearer parameter includes:The type of service of the terminal device, the mark of logic channel, logic channel collection Mark, the identifying of the mark of Data Radio Bearer, Data Radio Bearer collection, the network slice belonging to the business of the terminal device Mark or network slice collection mark.
3. according to the method described in claim 2, it is characterized in that, each wireless access control message includes a kind of needs Carry out the random access control parameter of the Numerology of congestion control;Or
The wireless access control message includes the list of Numerology, the list of the Numerology include it is described at least Pair of the random access congestion control factor of two kinds of Numerology and the terminal equipment type or services/bearer parameter It should be related to;Or
The wireless access control message includes Numerology bitmaps, the Numerology bitmaps be used to indicate it is described at least Whether two kinds of Numerology need to carry out congestion control, and the wireless access control message, which further includes, to be needed to carry out congestion control Numerology the random access congestion control factor.
4. according to the method in claim 2 or 3, which is characterized in that with a kind of corresponding all terminals of Numerology Device type or services/bearer parameter correspond to a random access congestion control factor;Or
Each terminal equipment type corresponding with a kind of Numerology or the corresponding random access of services/bearer parameter are gathered around Fill in controlling elements.
5. method according to any one of claims 1 to 4, which is characterized in that the method further includes:
The access network equipment sends bearing parameter to the terminal device by radio resource control RRC signaling and corresponds to pass It is notification message, the bearing parameter correspondence notification message includes:The mark of at least one logic channel and the logic Pair of the mark of the correspondence of the mark of channel set or at least one Data Radio Bearer and the mark of Data Radio Bearer collection It should be related to, and/or what at least one network was sliced identifies the correspondence of mark collected with network slice.
6. method according to any one of claims 1 to 5, which is characterized in that the wireless access control message further includes: The load information of each Numerology at least two Numerology.
7. a kind of communication control method, which is characterized in that the method includes:
Terminal device receives the wireless access control message that access network equipment is sent, the wireless access control message package It includes:The random access control parameter of at least two Numerology, the random access control parameter are used to set the terminal It is standby to carry out carrying out congestion control during random access;
The terminal device selects the random access of Numerology a kind of to control ginseng at least two Numerology Number;
The terminal device accesses net network according to the random access control parameter of selected Numerology a kind of to described Equipment sends random access request.
8. the method according to the description of claim 7 is characterized in that the random access control parameter includes:Random access is gathered around Controlling elements are filled in, the random access congestion control factor is corresponding with terminal equipment type or services/bearer parameter;
The services/bearer parameter includes:The type of service of the terminal device, the mark of logic channel, logic channel collection Mark, the identifying of the mark of Data Radio Bearer, Data Radio Bearer collection, the network slice belonging to the business of the terminal device Mark or network slice collection mark.
9. according to the method described in claim 8, it is characterized in that, each wireless access control message includes a kind of needs Carry out the random access control parameter of the Numerology of congestion control;Or
The wireless access control message includes the list of Numerology, the list of the Numerology include it is described at least Pair of the random access congestion control factor of two kinds of Numerology and the terminal equipment type or services/bearer parameter It should be related to;Or
The wireless access control message includes Numerology bitmaps, the Numerology bitmaps be used to indicate it is described at least Whether two kinds of Numerology need to carry out congestion control, and the wireless access control message, which further includes, to be needed to carry out congestion control Numerology the random access congestion control factor.
10. method according to claim 8 or claim 9, which is characterized in that with a kind of corresponding all terminals of Numerology Device type or services/bearer parameter correspond to a random access congestion control factor;Or
Each terminal equipment type corresponding with a kind of Numerology or the corresponding random access of services/bearer parameter are gathered around Fill in controlling elements.
11. according to claim 7 to 10 any one of them method, which is characterized in that the method further includes:
The terminal device receives the bearing parameter pair that the access network equipment is sent by radio resource control RRC signaling It should be related to notification message, the bearing parameter correspondence notification message includes:The mark of at least one logic channel with it is described The mark of the correspondence of the mark of logic channel collection or at least one Data Radio Bearer and the mark of Data Radio Bearer collection Correspondence, and/or at least one network slice mark with the network slice collection mark correspondence.
12. according to claim 7 to 11 any one of them method, which is characterized in that the wireless access control message is also wrapped It includes:The load information of each Numerology at least two Numerology.
13. a kind of access network equipment, which is characterized in that the access network equipment includes:Receiver, is deposited transmitter Reservoir and processor;Wherein, batch processing code is stored in memory, and processor is used to call the program stored in memory Code performs following operate:
Wireless access control message is sent to terminal device by the transmitter, the wireless access control message includes:Extremely The random access control parameter of few two kinds of Numerology, the random access control parameter are used to carry out the terminal device Congestion control is carried out during random access;
The terminal device is received according to the one of which selected at least two Numerology by the receiver The random access request that the random access control parameter of Numerology is sent.
14. access network equipment according to claim 13, which is characterized in that the random access control parameter packet It includes:The random access congestion control factor, the random access congestion control factor and terminal equipment type or services/bearer parameter It is corresponding;
The services/bearer parameter includes:The type of service of the terminal device, the mark of logic channel, logic channel collection Mark, the identifying of the mark of Data Radio Bearer, Data Radio Bearer collection, the network slice belonging to the business of the terminal device Mark or network slice collection mark.
15. access network equipment according to claim 14, which is characterized in that each wireless access control message Including a kind of random access control parameter for the Numerology for needing to carry out congestion control;Or
The wireless access control message includes the list of Numerology, the list of the Numerology include it is described at least Pair of the random access congestion control factor of two kinds of Numerology and the terminal equipment type or services/bearer parameter It should be related to;Or
The wireless access control message includes Numerology bitmaps, the Numerology bitmaps be used to indicate it is described at least Whether two kinds of Numerology need to carry out congestion control, and the wireless access control message, which further includes, to be needed to carry out congestion control Numerology the random access congestion control factor.
16. the access network equipment according to claims 14 or 15, which is characterized in that opposite with a kind of Numerology All terminal equipment types or services/bearer parameter answered correspond to a random access congestion control factor;Or
Each terminal equipment type corresponding with a kind of Numerology or the corresponding random access of services/bearer parameter are gathered around Fill in controlling elements.
17. according to claim 13 to 16 any one of them access network equipment, which is characterized in that the processor is also used It is operated as follows in performing:
Bearing parameter correspondence is sent by the transmitter to the terminal device with radio resource control RRC signaling to notify Message, the bearing parameter correspondence notification message include:The mark of at least one logic channel and the logic channel collection Mark correspondence or at least one Data Radio Bearer mark it is corresponding with the mark of Data Radio Bearer collection close The correspondence of the mark of system, and/or at least one network slice and the mark of network slice collection.
18. according to claim 13 to 17 any one of them access network equipment, which is characterized in that the wireless access control Message processed further includes:The load information of each Numerology at least two Numerology.
19. a kind of terminal device, which is characterized in that the terminal device includes:Receiver, transmitter, memory and processor; Wherein, batch processing code is stored in memory, and processor is used to call the program code stored in memory, performed following Operation:
The wireless access control message of access network equipment transmission is received by the receiver, the wireless access control disappears Breath includes:The random access control parameter of at least two Numerology, the random access control parameter were used for the end End equipment carries out carrying out congestion control during random access;
The random access control parameter of Numerology a kind of is selected at least two Numerology;
According to the random access control parameter of selected Numerology a kind of, net net is accessed to described by the transmitter Network equipment sends random access request.
20. terminal device according to claim 19, which is characterized in that the random access control parameter includes:At random The congestion control factor is accessed, the random access congestion control factor is corresponding with terminal equipment type or services/bearer parameter;
The services/bearer parameter includes:The type of service of the terminal device, the mark of logic channel, logic channel collection Mark, the identifying of the mark of Data Radio Bearer, Data Radio Bearer collection, the network slice belonging to the business of the terminal device Mark or network slice collection mark.
21. terminal device according to claim 20, which is characterized in that each wireless access control message includes one Kind needs to carry out the random access control parameter of the Numerology of congestion control;Or
The wireless access control message includes the list of Numerology, the list of the Numerology include it is described at least Pair of the random access congestion control factor of two kinds of Numerology and the terminal equipment type or services/bearer parameter It should be related to;Or
The wireless access control message includes Numerology bitmaps, the Numerology bitmaps be used to indicate it is described at least Whether two kinds of Numerology need to carry out congestion control, and the wireless access control message, which further includes, to be needed to carry out congestion control Numerology the random access congestion control factor.
22. the terminal device according to claim 20 or 21, which is characterized in that with a kind of corresponding institutes of Numerology There are terminal equipment type or services/bearer parameter to correspond to a random access congestion control factor;Or
Each terminal equipment type corresponding with a kind of Numerology or the corresponding random access of services/bearer parameter are gathered around Fill in controlling elements.
23. according to claim 19 to 22 any one of them terminal device, which is characterized in that the processor is additionally operable to perform Following operation:
The bearing parameter sent by the receiver reception access network equipment by radio resource control RRC signaling Correspondence notification message, the bearing parameter correspondence notification message include:The mark of at least one logic channel and institute State the correspondence of the mark of logic channel collection or the mark of at least one Data Radio Bearer and the mark of Data Radio Bearer collection The correspondence of the mark of the correspondence of knowledge, and/or at least one network slice and the mark of network slice collection.
24. according to claim 19 to 23 any one of them terminal device, which is characterized in that the wireless access control message It further includes:The load information of each Numerology at least two Numerology.
CN201710005280.9A 2017-01-04 2017-01-04 Communication control method, unauthorized transmission method and device Active CN108271213B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710005280.9A CN108271213B (en) 2017-01-04 2017-01-04 Communication control method, unauthorized transmission method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710005280.9A CN108271213B (en) 2017-01-04 2017-01-04 Communication control method, unauthorized transmission method and device

Publications (2)

Publication Number Publication Date
CN108271213A true CN108271213A (en) 2018-07-10
CN108271213B CN108271213B (en) 2021-06-22

Family

ID=62770722

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710005280.9A Active CN108271213B (en) 2017-01-04 2017-01-04 Communication control method, unauthorized transmission method and device

Country Status (1)

Country Link
CN (1) CN108271213B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020038431A1 (en) * 2018-08-23 2020-02-27 华为技术有限公司 V2x communication method and apparatus
CN112887106A (en) * 2018-09-30 2021-06-01 Oppo广东移动通信有限公司 Communication method and device and communication equipment
WO2022022635A1 (en) * 2020-07-31 2022-02-03 维沃移动通信有限公司 Access control method and apparatus, and terminal and network device
CN114339616A (en) * 2020-09-30 2022-04-12 维沃移动通信有限公司 Congestion control method, device and equipment for broadcast multicast service
WO2023019542A1 (en) * 2021-08-20 2023-02-23 Zte Corporation Systems and methods for initial access

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101064864A (en) * 2006-04-28 2007-10-31 大唐移动通信设备有限公司 Method for counting and access controlling in MBMS service
CN101272608A (en) * 2007-03-21 2008-09-24 华为技术有限公司 Interception reference signal transmission method and device
CN104662964A (en) * 2013-02-06 2015-05-27 华为技术有限公司 Network access control method, device and system
CN105594251A (en) * 2013-08-09 2016-05-18 松下电器(美国)知识产权公司 Efficient status reporting for ues in dual connectivity during mobility
US20160164793A1 (en) * 2013-07-24 2016-06-09 Prateek Basu Mallick Efficient discard mechanism in small cell deployment

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101064864A (en) * 2006-04-28 2007-10-31 大唐移动通信设备有限公司 Method for counting and access controlling in MBMS service
CN101272608A (en) * 2007-03-21 2008-09-24 华为技术有限公司 Interception reference signal transmission method and device
CN104662964A (en) * 2013-02-06 2015-05-27 华为技术有限公司 Network access control method, device and system
US20160164793A1 (en) * 2013-07-24 2016-06-09 Prateek Basu Mallick Efficient discard mechanism in small cell deployment
CN105594251A (en) * 2013-08-09 2016-05-18 松下电器(美国)知识产权公司 Efficient status reporting for ues in dual connectivity during mobility

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020038431A1 (en) * 2018-08-23 2020-02-27 华为技术有限公司 V2x communication method and apparatus
CN110858958A (en) * 2018-08-23 2020-03-03 华为技术有限公司 Communication method and device of V2X
CN110858958B (en) * 2018-08-23 2021-09-07 华为技术有限公司 Communication method and device of V2X
CN112887106A (en) * 2018-09-30 2021-06-01 Oppo广东移动通信有限公司 Communication method and device and communication equipment
WO2022022635A1 (en) * 2020-07-31 2022-02-03 维沃移动通信有限公司 Access control method and apparatus, and terminal and network device
CN114071646A (en) * 2020-07-31 2022-02-18 维沃移动通信有限公司 Access control method, device, terminal and network equipment
CN114071646B (en) * 2020-07-31 2023-04-07 维沃移动通信有限公司 Access control method, device, terminal and network equipment
CN114339616A (en) * 2020-09-30 2022-04-12 维沃移动通信有限公司 Congestion control method, device and equipment for broadcast multicast service
CN114339616B (en) * 2020-09-30 2023-03-10 维沃移动通信有限公司 Congestion control method, device and equipment for broadcast multicast service
WO2023019542A1 (en) * 2021-08-20 2023-02-23 Zte Corporation Systems and methods for initial access

Also Published As

Publication number Publication date
CN108271213B (en) 2021-06-22

Similar Documents

Publication Publication Date Title
US11564072B2 (en) Method for selecting, in selection period, subframe excluding subframe relating to subframe in which transmission has been performed during sensing period in wireless communication system, and terminal using same
US10536826B2 (en) Method for selecting resource to be used for performing V2X communication within range satisfying latency requirement in wireless communication system, and terminal using same
CN113301661B (en) Random access backoff method and system
CN108271213A (en) Communication control method, unauthorized transmission method and device
US20110317777A1 (en) Controlling Transmissions on Composite Carriers
WO2016134532A1 (en) Data transmission method and apparatus, user equipment and system
CN108260105A (en) A kind of D2D communication means and equipment
KR20200032198A (en) Resource selection method of a terminal for V2X communication in a wireless communication system and a terminal using the method
JP2019536304A (en) Beam management method, terminal device and network device
EP3226606B1 (en) Method for ran-wlan aggregation
US20210112546A1 (en) Resource allocation method, node, and storage medium
CN109525993B (en) Method and apparatus for dynamically allocating resources in integrated access and backhaul wireless communication networks
CN109428680A (en) The method and apparatus for sending or receiving upstream data
CN110463119A (en) For enhancing the extension scheduling request (SR) of scheduling information instruction
CN103974341A (en) Control apparatus, representative base station and base station control method
CN110663281A (en) Method for allocating resources to base station terminal in wireless communication system and communication device using the same
JP2021524702A (en) Data transmission method and related equipment
CN111052848A (en) Method for operating a cellular radio communication network entity and cellular radio communication network entity
WO2002056627A1 (en) Method for reporting status information between a mobile station and a radio access network
CN101083609A (en) Terminal equipment accessing method, system and a terminal equipment
KR20180081372A (en) Method and apparatus for user equipment operation for supporting multiple service in wireless communication system supporting communication between user equipments
CN101473671A (en) A method and apparatus for dynamic adjustment of orthogonal frequency-division multiplexing during congested conditions
CN113766516B (en) Uplink configuration method, system, base station and storage medium
CN107547172B (en) Control information sending and receiving method, device, base station and terminal
KR101908066B1 (en) Base station and bearer split method by the same

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant