CN110035474A - Connection control method, user equipment, base station and the device with store function - Google Patents
Connection control method, user equipment, base station and the device with store function Download PDFInfo
- Publication number
- CN110035474A CN110035474A CN201810033953.6A CN201810033953A CN110035474A CN 110035474 A CN110035474 A CN 110035474A CN 201810033953 A CN201810033953 A CN 201810033953A CN 110035474 A CN110035474 A CN 110035474A
- Authority
- CN
- China
- Prior art keywords
- access
- user equipment
- trigger event
- category
- stratum
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/02—Access restriction performed under specific conditions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/16—Discovering, processing access restriction or access information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/08—Access restriction or access information delivery, e.g. discovery data delivery
- H04W48/12—Access restriction or access information delivery, e.g. discovery data delivery using downlink control channel
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
This application discloses a kind of connection control method, user equipment, base stations and with the device of store function, this method comprises: user equipment is in connected state or inactive state, detect whether that trigger event, the trigger event are access layer trigger event or Non-Access Stratum trigger event;If so, the trigger event, which is then mapped as access category, the access layer or the Non-Access Stratum, carries out access control judgement to the access category;If the access control judgement passes through, the user equipment sends access request corresponding with the trigger event.By the above-mentioned means, method provided herein can provide the connection control method for being suitable for connected state or inactive state for 5G-NR system.
Description
Technical field
This application involves wireless communication technology field, more particularly to a kind of connection control method, user equipment, base station and
Device with store function.
Background technique
In order to meet user for mobile data services increasing need, the 5th third-generation mobile communication technology is newly wireless
5G-NR system is come into being.In order to reduce signaling and reduce power consumption, in addition to Idle state (IDLE) and connected state in 5G-NR system
(CONNECTED) outside, inactive state (INACTIVE) is also introduced.
Present inventor has found that user equipment (UE, alternatively referred to as terminal) is in access net in chronic study procedure
Access control is needed to be implemented when network, for judge can initiating business request, avoid causing network side (including access net and core
Net) overload.Access control in January, 2017 RAN2#NR meeting and in May, 2017 RAN2#98 meeting, to 5G-NR system
System proposes some targets, e.g., defines the unified connection control method for being suitable for connected state or inactive state, but at present
Detailed solution is not provided.
Summary of the invention
The application is mainly solving the technical problems that provide a kind of connection control method, user equipment, base station and having are deposited
The device for storing up function can provide the connection control method for being suitable for connected state or inactive state for 5G-NR system.
In order to solve the above technical problems, the technical solution that the application uses is: providing a kind of connection control method, use
In the new wireless 5G-NR system of the 5th third-generation mobile communication technology, which comprises user equipment is in connected state or inactive
State has detected whether that trigger event, the trigger event are access layer trigger event or Non-Access Stratum trigger event;If so, then
The trigger event is mapped as access category, the access layer or the Non-Access Stratum carry out access control to the access category
System judgement;If the access control judgement passes through, the user equipment sends access request corresponding with the trigger event.
In order to solve the above technical problems, another technical solution that the application uses is: a kind of connection control method is provided,
The control method includes: that the access layer for issuing user equipment or Non-Access Stratum carry out access control judgement to access category and sentence
Certainly parameter;It detects whether to receive the access request that the user equipment is sent, the access request is based on the decision parameter
It is obtained with trigger event, the trigger event is that user equipment is in access layer detected when connected state or inactive state
Trigger event or Non-Access Stratum trigger event;If receiving, the access request is handled.
In order to solve the above technical problems, another technical solution that the application uses is: a kind of user equipment is provided, it is described
User equipment includes: processor, memory, telecommunication circuit, and the processor is respectively coupled to the memory, communication electricity
Road, the user equipment are preset with the access control mode of connected state, inactive state, the processor, the memory, described
Telecommunication circuit can be realized the step in above-mentioned connection control method.
In order to solve the above technical problems, another technical solution that the application uses is: providing a kind of base station, the base station
Including processor, memory, telecommunication circuit, the processor is respectively coupled to the memory, the telecommunication circuit, the processing
Device, the memory, the telecommunication circuit can be realized the step in above-mentioned connection control method.
In order to solve the above technical problems, another technical solution that the application uses is: providing a kind of with store function
Device, be stored thereon with program data, described program data realize any of the above-described connection control method when being executed by processor
In step.
The beneficial effect of the application is: being in contrast to the prior art, connection control method provided herein is suitable
For the user equipment in connected state or inactive state, and it is based on existing access layer and Non-Access Stratum event, is flexibly easy to
It realizes;
In addition, method provided herein applies also for the user equipment in Idle state, and then mentioned for 5G-NR system
The unified access control program for being suitable for all status of user equipment is supplied;
In addition, mapping ruler between trigger event and access category provided herein can by trigger event type and
User device parameters (for example, the service quality QoS traffic identifier QFI of data flow, five-tuple 5QI of data flow etc.) codetermine,
So that operator can control specific application or the access of type of service.
Detailed description of the invention
In order to more clearly explain the technical solutions in the embodiments of the present application, make required in being described below to embodiment
Attached drawing is briefly described, it should be apparent that, the drawings in the following description are only some examples of the present application, for
For those of ordinary skill in the art, without creative efforts, it can also be obtained according to these attached drawings other
Attached drawing.Wherein:
Fig. 1 is the flow diagram of one embodiment of the application connection control method;
Fig. 2 is the flow diagram of mono- embodiment of step S102 in Fig. 1;
Fig. 3 is the flow diagram of another embodiment of step S102 in Fig. 1;
Fig. 4 is the flow diagram of another embodiment of step S102 in Fig. 1;
Fig. 5 is the flow diagram of another embodiment of step S102 in Fig. 1;
Fig. 6 is the flow diagram of another embodiment of step S102 in Fig. 1
Fig. 7 is the flow diagram of another embodiment of step S102 in Fig. 1
Fig. 8 is the flow diagram of another embodiment of the application connection control method;
Fig. 9 is the flow diagram of one embodiment of the application connection control method;
Figure 10 is the structural schematic diagram of one embodiment of the application user equipment;
Figure 11 is the structural schematic diagram of one embodiment of the application base station;
Figure 12 is the structural schematic diagram for one embodiment of device that the application has store function.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of embodiments of the present application, rather than whole embodiments.Based on this
Embodiment in application, those of ordinary skill in the art are obtained every other under the premise of not making creative labor
Embodiment shall fall in the protection scope of this application.
In 5G-NR network include user equipment and access net and core net positioned at network side, user equipment and access net
Between interface be air interface, the protocol stack of air interface is divided into Non-Access Stratum NAS and access layer AS two parts.User equipment
Access control is needed to be implemented when establishing communication traffic between network side, for judge can initiating business request, avoid causing
The overload of network side (including access net and core net).
Referring to Fig. 1, Fig. 1 is the flow diagram of one embodiment of the application connection control method, this method is for the
Newly wireless 5G-NR system, this method are the processes based on user equipment side to five third-generation mobile communication technologies, comprising the following steps:
S101: user equipment is in connected state or inactive state, has detected whether that trigger event, trigger event are access layer
Trigger event or Non-Access Stratum trigger event;
Specifically, when user equipment is in connected state or inactive state, above-mentioned access layer trigger event includes but unlimited
In: new wireless data or signaling bear are established in user equipment trial, user equipment is attempted to modify existing radio bearer attribute, are used
Family equipment is attempted service quality QoS stream from a radio bearer is remapped to another radio bearer, user equipment is attempted
Remap QoS flow carry from default radio bearer to specific wireless, user equipment attempt the existing wireless data of deletion or
Signaling bear, user equipment are attempted to establish new wireless data carrying to transmit data, user equipment trial progress wireless data
Bearer types conversion, user equipment attempt activation/deactivation packet replication and transmit (Packet Duplication) function;Work as user
When equipment is in inactive state, above-mentioned access layer trigger event further include: user equipment is in unactivated state trial and is counted
Unactivated state is according to transmission, user equipment to attempt to initiate notification area renewal process (Notification Area
Update).When user equipment is in connected state or inactive state, above-mentioned Non-Access Stratum trigger event includes but is not limited to: asking
It asks and starts voice, video or session initiation protocol SIP calling, send mobile caller short message service SMS, establish new agreement number
According to unit PDU session, the existing protocol Data Unit PDU session of modification, release protocol Data Unit PDU session, be existing association
View data cell PDU session re-establishes user plane, establishes new urgency protocol data cell PDU session.
S102: if so, trigger event is then mapped as access category, access layer or Non-Access Stratum connect access category
Enter control judgement;
It specifically, in one embodiment, further include preparatory reception mapping ruler before step S102;Step S102 packet
It includes: calling the mapping ruler, and then obtain the corresponding access category of trigger event.Mapping ruler by base station system broadcast message
Or radio resource control RRC transmitting signaling downwards are to user equipment.
Access category is determined by trigger event type and/or user device parameters in mapping ruler, above-mentioned user equipment ginseng
Number includes but is not limited to: the service quality QoS traffic identifier QFI of data flow, the five-tuple 5QI of data flow, user equipment access grade
Other Access Class, user's set roaming state, the operating system ID (OS ID) of trigger data access, trigger data access
Operating system application ID (OS AP ID).
In one embodiment, the trigger event of user equipment can be divided into multiple access categories (for example, 12,14,
16 etc.), an access category can correspond to one or more trigger event, and this is not limited by the present invention.If user
Equipment needs initiating business request, and user equipment is firstly the need of checking whether accessed cell forbids access class belonging to oneself
Not, if prohibited, user equipment is unable to initiating business request, can be with initiating business request if do not forbidden.
In an application scenarios, access category is determined by trigger event type in mapping ruler, as shown in table 1 below, no
Same trigger event type corresponds to different access categories;Certainly, in other embodiments, certain two or more different touching
Hair event type can also correspond to an identical access category, and the application is not construed as limiting this.
1 mapping ruler schematic table of table
Trigger event type | Access category |
New radio bearer is established in user equipment trial | 1 |
User equipment is attempted to modify existing radio bearer attribute | 2 |
User equipment is attempted to modify existing radio bearer attribute | 3 |
…… | …… |
In another application scenarios, as shown in table 2 below, access category is by trigger event type and user in mapping ruler
Device parameter codetermines, so that operator can control specific application or the access of type of service.Such as the following table 2 institute
Show, although trigger event type is identical, the data service for establishing request is different, and access category can be identical, can also be different.
2 mapping ruler schematic table of table
Specifically, in another embodiment, when detecting trigger event, and trigger event is that access layer triggers thing
Part then can carry out access control judgement to trigger event in access layer or Non-Access Stratum, specifically see following three kinds of modes.
In an application scenarios, incorporated by reference to Fig. 2, above-mentioned steps S102 is specifically included: A, access layer reflects trigger event
It penetrates as the first access category;Specific mapping ruler can be found in above-described embodiment, and details are not described herein;B, access layer connects first
Enter classification and is transmitted to Non-Access Stratum;C, Non-Access Stratum carries out access control judgement to the first access category, specifically, in a reality
Apply in example, Non-Access Stratum using include but is not limited to access class forbid ACB, for data communication using specific congestion control
ACDC mechanism carries out access control judgement to the first access category, in other embodiments, the progress of other mechanism can also be used
Access control judgement, the application are not construed as limiting this;When access control judgement, the system broadcast message or RRC signaling of base station are mentioned
For decision parameter (for example, access scale factor ac-BarringFactor), access layer obtains the decision parameter, and passes through access
Interlayer communication between layer and Non-Access Stratum passes to Non-Access Stratum;D, court verdict is fed back to access layer by Non-Access Stratum.
In another application scenarios, referring to Fig. 3, above-mentioned steps S102 is specifically included: A, access layer is by trigger event
It is transmitted to Non-Access Stratum;B, trigger event is mapped as the first access category by Non-Access Stratum, and specific mapping ruler can be found in
Embodiment is stated, details are not described herein;C, Non-Access Stratum carries out access control judgement to the first access category, specifically, at one
In embodiment, Non-Access Stratum using include but is not limited to access class forbid ACB, for data communication using specific congestion
Control ACDC mechanism carries out access control judgement to access category, in other embodiments, the progress of other mechanism can also be used
Access control judgement, the application are not construed as limiting this;When access control judgement, the system broadcast message or RRC signaling of base station are mentioned
For decision parameter (for example, access scale factor ac-BarringFactor), access layer obtains the decision parameter, and passes through access
Interlayer communication between layer and Non-Access Stratum passes to Non-Access Stratum;D, court verdict is back to access layer by Non-Access Stratum.
In another application scenarios, referring to Fig. 4, above-mentioned steps S102 is specifically included: A, access layer is by trigger event
It is mapped as the first access category, specific mapping ruler can be found in above-described embodiment, and details are not described herein;B, access layer is to first
Access category carries out access control judgement, and then obtains court verdict.Specifically, in one embodiment, Non-Access Stratum can
Using include but is not limited to access class forbid ACB, for data communication using specific congestion control ACDC mechanism to access class
Access control judgement is not carried out, in other embodiments, other mechanism can also be used and carry out access control judgement, the application couple
This is not construed as limiting.When access control judgement, the system broadcast message or RRC signaling of base station provide decision parameter (for example, access ratio
Example factor ac-BarringFactor), access layer obtains the decision parameter.
In another embodiment, when detecting trigger event, and trigger event is Non-Access Stratum trigger event, then
Access control judgement can be carried out to trigger event in access layer or Non-Access Stratum, specifically see following three kinds of modes.
In an application scenarios, referring to Fig. 5, above-mentioned steps S102 includes: that A, Non-Access Stratum map trigger event
For the second access category, specific mapping ruler can be found in above-described embodiment, and details are not described herein;B, Non-Access Stratum connects second
Enter classification and is transmitted to access layer;C, access layer carries out access control judgement to the second access category;Specifically, in an embodiment party
In formula, access layer using include but is not limited to access class forbid ACB, for data communication using specific congestion control ACDC
Mechanism carries out access control judgement to access category, in other embodiments, other mechanism can also be used and carry out access control
Judgement, the application are not construed as limiting this;When access control judgement, the system broadcast message or RRC signaling of base station provide judgement ginseng
Number (for example, access scale factor ac-BarringFactor), access layer obtains the decision parameter.D, access layer is by court verdict
Feed back to Non-Access Stratum.
In another application scenarios, referring to Fig. 6, above-mentioned steps S102 includes: that A, Non-Access Stratum pass trigger event
Transport to access layer;B, trigger event is mapped as the second access category by access layer, and specific mapping ruler can be found in above-mentioned implementation
Example, details are not described herein;C, access layer carries out access control judgement to the second access category, specifically, in an embodiment
In, Non-Access Stratum using include but is not limited to access class forbid ACB, for data communication using specific congestion control ACDC
Mechanism carries out access control judgement to access category, in other embodiments, other mechanism can also be used and carry out access control
Judgement, the application are not construed as limiting this;When access control judgement, the system broadcast message or RRC signaling of base station provide judgement ginseng
Number (for example, access scale factor ac-BarringFactor), access layer obtains the decision parameter.D, access layer returns to result
To Non-Access Stratum.
In another application scenarios, referring to Fig. 7, above-mentioned steps S102 includes: that A, Non-Access Stratum reflect trigger event
It penetrates as the second access category, specific mapping method can be found in above-described embodiment, and details are not described herein;B, Non-Access Stratum is to second
Access category carries out access control judgement, and then obtains court verdict, specifically, in one embodiment, Non-Access Stratum can
Using include but is not limited to access class forbid ACB, for data communication using specific congestion control ACDC mechanism to access class
Access control judgement is not carried out, in other embodiments, other mechanism can also be used and carry out access control judgement, the application couple
This is not construed as limiting.When access control judgement, the system broadcast message or RRC signaling of base station provide that the second access category is corresponding to be sentenced
Certainly parameter (for example, access scale factor ac-BarringFactor), access layer obtain the decision parameter, and by access layer and
Interlayer communication between Non-Access Stratum passes to Non-Access Stratum.
S103: if access control judgement passes through, user equipment sends access request corresponding with trigger event;It is answered at one
With in scene, does not pass through if being currently accessed control judgement, forbid timer to start, in the disable time, user equipment cannot
Carry out the access attempts of same type.
User equipment is in connected state or inactive state in above-described embodiment, above-mentioned when user equipment is in Idle state
Method in embodiment is still applicable in, connection control method process are as follows: A, has detected whether that trigger event, trigger event are access
The first trigger event of layer, in an application scenarios, which includes that user equipment is attempted to be transferred to company from Idle state
Connect state;B, the third is connect if so, above-mentioned first trigger event is then mapped as third access category, access layer or Non-Access Stratum
Enter classification and carry out access control judgement, specific mapping ruler and control decision method can be found in above-described embodiment, herein no longer
It repeats;If C, access control judgement passes through, user equipment sends access request corresponding with the trigger event.It can from foregoing description
To find out, method provided herein apply also for it is stateful under user equipment, and then provide one for 5G-NR system
A unified access control program suitable for all status of user equipment;
Referring to Fig. 8, Fig. 8 is the flow diagram of another embodiment of the application connection control method, this method is base
In the process of user equipment side, this method comprises:
S201: user equipment is in connection or inactive state, has detected whether that trigger event, trigger event are access layer touching
Hair event or Non-Access Stratum trigger event;Specifically, the step is identical as step S101 in above-described embodiment, no longer superfluous herein
It states.
S202: if there is trigger event, judge whether access control function activates;Specifically, if network side access control
Function is not activated, then user equipment can directly transmit access request corresponding with trigger event.
S203: if activation, trigger event is mapped as access category, access layer or Non-Access Stratum, access category is carried out
Access control judgement;Specifically, the step is identical as step S102 in above-described embodiment, and details are not described herein.
S204: if access control judgement passes through, user equipment sends access request corresponding with trigger event;Specifically,
The step is identical as step S103 in above-described embodiment, and details are not described herein.
Referring to Fig. 9, Fig. 9 is the flow diagram of another embodiment of the application connection control method, this method is based on
Network side (for example, base station), comprising the following steps:
S301: the judgement that the access layer or Non-Access Stratum for issuing user equipment carry out access control judgement to access category is joined
Number;
Specifically, network side, such as base station access access category in the access layer or Non-Access Stratum of user equipment
When control judgement, decision parameter can be issued by system broadcast message or RRC signaling;In an application scenarios, access
Layer or Non-Access Stratum utilize include but is not limited to access class forbid ACB, for data communication using specific congestion control ACDC
Mechanism carries out access control judgement to access category, and decision parameter includes access scale factor ac-BarringFactor.
S302: it detects whether to receive the access request of user equipment transmission, access request is based on decision parameter and triggering
Event and obtain, trigger event be user equipment be in access layer trigger event detected when connected state or inactive state or
Non-Access Stratum trigger event;
Specifically, access layer trigger event, the type of Non-Access Stratum trigger event can be found in above-described embodiment, herein not
It repeats again.
S303: if receiving, access request is handled.
In other embodiments, it may further comprise the step of: before above-mentioned steps S301 and mapping ruler be provided previously, and will reflect
Rule is penetrated to issue by broadcast or RRC information;Specifically, mapping ruler can be found in above-described embodiment, and details are not described herein.
In the following, with a specific application scenarios, in conjunction with network side and user equipment, to access control provided herein
Method processed is further elaborated.The connection control method process is as follows: A, mapping rule are provided previously in network side (for example, base station)
Then, and by the mapping ruler by system broadcast message or RRC signaling it is issued to user equipment, user equipment receives the mapping
Rule;B, when user equipment has detected access layer trigger event or Non-Access Stratum trigger event, user equipment calls mapping
Rule, and then obtain access category corresponding with current trigger event;C, the access layer of user equipment or Non-Access Stratum utilize
Access class forbids ACB or carries out access control to classification is currently accessed using specific congestion control ACDC mechanism for data communication
System judgement, the decision parameter corresponding with classification is currently accessed when access control is adjudicated is (for example, access scale factor ac-
BarringFactor connecing for user equipment) is issued to by system broadcast message or RRC signaling by network side (for example, base station)
Enter layer;If D, user equipment judgement access control judgement passes through, user equipment sends access corresponding with current trigger event
Request;Specifically, in one embodiment, equally distributed several RAND between one 0 to 1 are randomly generated in user equipment, if
RAND passes through lower than access scale factor, then user equipment judgement access control judgement, otherwise user equipment judgement access control
Judgement does not pass through;E, after network side receives the access request of user equipment, the access request is handled.
Referring to Fig. 10, Figure 10 is the structural schematic diagram of one embodiment of the application user equipment, which includes:
Processor 1, memory 2, telecommunication circuit 3, processor 1 are respectively coupled to memory 2, telecommunication circuit 3, and user equipment is preset with connection
State, the access control mode of inactive state, processor 1, memory 2, telecommunication circuit 3 can be realized above-mentioned access control at work
Step in method processed.The detailed description of related content refers to above method part, and details are not described herein.
Wherein, telecommunication circuit 3 for realizing the connection communication and user equipment and network side between these components it
Between communication.The access control mode that user equipment is under Idle state, inactive state and connected state is preset in memory 2
Program or instruction.
In presently filed embodiment, by the program or instruction for calling memory 2 to store, processor 1 and communication electricity
Road 3 is specifically used for: telecommunication circuit 3 receives the mapping ruler of network side in advance and is transferred to memory 2;Processor 1 detects whether
There is trigger event, trigger event is access layer trigger event or Non-Access Stratum trigger event;If so, processor 1 calls memory 2
In mapping ruler, trigger event is mapped as access category, and access control judgement is carried out to access category;If processor 1
The result of access control judgement is judged to pass through, and the telecommunication circuit 3 of user equipment sends access corresponding with the trigger event and asks
It asks.
Please refer to Figure 11, Figure 11 is the structural schematic diagram of one embodiment of the application base station, the base station include: processor 4,
Memory 5, telecommunication circuit 6, processor 4 are respectively coupled to memory 5, telecommunication circuit 6, processor 4, memory 5, telecommunication circuit 6
It can be realized the step in above-mentioned connection control method at work.The detailed description of related content refers to above method portion
Point, details are not described herein.
Wherein, telecommunication circuit 6 for realizing between these components connection communication and base station and user equipment between
Communication.In the application embodiment, by the program or instruction for calling memory 5 to store, processor 4 and telecommunication circuit 6
Be specifically used for: access category mapping ruler is provided previously in processor 4, and passes it to telecommunication circuit 6, and telecommunication circuit 6 will reflect
Rule is penetrated to issue;When user equipment carries out access control judgement, telecommunication circuit 6 issues decision parameter;When telecommunication circuit 6 receives
To user equipment send access request when, processor 4 handle the access request.
Figure 12 is please referred to, Figure 12 is the structural schematic diagram for one embodiment of device that the application has store function, the dress
It sets 10 and is stored thereon with program data 100, the step in as above any one method is realized when which is executed by processor
Suddenly.The detailed description of related content refers to above method part, and details are not described herein.
To sum up, being in contrast to the prior art, connection control method provided herein is suitable in company
The user equipment of state or inactive state is connect, and is based on existing access layer and Non-Access Stratum event, is flexibly easily achieved;In addition,
Method provided herein applies also for the user equipment in Idle state, and then provides one for 5G-NR system and be applicable in
In the unified access control program of all status of user equipment;In addition, trigger event and access category provided herein
Between mapping ruler can by trigger event type and user device parameters (for example, the service quality QoS traffic identifier of data flow,
Five-tuple 5QI of data flow etc.) it codetermines, so that operator can control connecing for specific application or type of service
Enter.
The above is only presently filed embodiments, are not intended to limit the scope of the patents of the application, all to utilize the application
Equivalent structure or equivalent flow shift made by specification and accompanying drawing content is applied directly or indirectly in other relevant technologies
Field similarly includes in the scope of patent protection of the application.
Claims (18)
1. a kind of connection control method is used for the 5th third-generation mobile communication technology newly wireless 5G-NR system, which is characterized in that described
Method includes:
User equipment is in connected state or inactive state, has detected whether that trigger event, the trigger event are access layer triggering
Event or Non-Access Stratum trigger event;
If so, the trigger event is then mapped as access category, the access layer or the Non-Access Stratum to the access class
Access control judgement is not carried out;
If the access control judgement passes through, the user equipment sends access request corresponding with the trigger event.
2. connection control method according to claim 1, which is characterized in that
The access layer trigger event includes but is not limited to: new wireless data or signaling bear, use are established in user equipment trial
Family equipment attempts the existing radio bearer attribute of modification, QoS flow is remapped to separately by user equipment trial from a radio bearer
One radio bearer, user equipment attempt the remap QoS flow carried from default radio bearer to specific wireless, user equipment
Attempt to delete existing wireless data or signaling bear, user equipment attempt to establish new wireless data carrying with transmit data,
User equipment is attempted to carry out the conversion of wireless data bearer types, user equipment trial activation/deactivation packet replication transfer function, be used
Family equipment be in unactivated state trial carry out data transmission, user equipment be in unactivated state attempt initiation notification area more
New process.
3. connection control method according to claim 1, which is characterized in that
The Non-Access Stratum trigger event includes but is not limited to: request beginning voice, video or session initiation protocol SIP calling,
It sends mobile caller short message service SMS, establish new protocol Data Unit PDU session, the existing protocol Data Unit of modification
PDU session, release protocol Data Unit PDU session re-establish user plane, build for the PDU session of existing protocol data cell
Stand new urgency protocol data cell PDU session.
4. connection control method according to claim 1, which is characterized in that if there is trigger event, the trigger event is
The access layer trigger event, carrying out access control judgement to the trigger event in the access layer or Non-Access Stratum includes:
The trigger event is mapped as the first access category by the access layer, and the access layer passes first access category
Transport to the Non-Access Stratum, the Non-Access Stratum carries out access control judgement to first access category, and by court verdict
Feed back to the access layer;
Or, the trigger event is transmitted to the Non-Access Stratum by the access layer, the Non-Access Stratum is by the trigger event
It is mapped as the first access category, the Non-Access Stratum carries out access control judgement to first access category, and judgement is tied
Fruit feeds back to the access layer;
Or, the trigger event is mapped as the first access category by the access layer, the access layer is to the first access class
Access control judgement is not carried out, and then obtains court verdict.
5. connection control method according to claim 1, which is characterized in that if there is trigger event, the trigger event is
The Non-Access Stratum trigger event carries out access control judgement packet to the trigger event in the access layer or Non-Access Stratum
It includes:
The trigger event is mapped as the second access category by the Non-Access Stratum, and the Non-Access Stratum accesses class for described second
Supplementary biography transports to the access layer, and the access layer carries out access control judgement to second access category, and by court verdict
Feed back to the Non-Access Stratum;
Or, the trigger event is transmitted to the access layer by the Non-Access Stratum, the access layer reflects the trigger event
It penetrates as the second access category, the access layer carries out access control judgement to second access category, and result is fed back to
The Non-Access Stratum;
Or, the trigger event is mapped as the second access category by the Non-Access Stratum, the Non-Access Stratum connects to described second
Enter classification and carry out access control judgement, and then obtains court verdict.
6. connection control method according to claim 1, which is characterized in that the access layer or the Non-Access Stratum are to institute
Stating access category and carrying out access control judgement includes: that the access layer or the Non-Access Stratum utilize including but not limited to access class
Forbid ACB, access control judgement is carried out to the access category using specific congestion control ACDC mechanism for data communication.
7. connection control method according to claim 1, which is characterized in that
The connection control method further include: receive mapping ruler in advance, the mapping ruler by base station system broadcast message
Or radio resource control RRC transmitting signaling downwards;
It is described that the trigger event is mapped as access category includes: to call the mapping ruler, and then obtain the triggering thing
The corresponding access category of part.
8. connection control method according to claim 7, which is characterized in that access category described in the mapping ruler by
The trigger event type and/or user device parameters determine that the user device parameters include but is not limited to: the clothes of data flow
Being engaged in, quality Q oS traffic identifier QFI, the five-tuple 5QI of data flow, user equipment access rank Access Class, user equipment is overflow
The operating system application ID that free state, the operating system ID of trigger data access, trigger data access.
9. connection control method according to claim 1, which is characterized in that described if so, then reflecting the trigger event
It penetrates that the access category access control and adjudicate for access category, the access layer or Non-Access Stratum and includes:
Judge whether access control function activates, the trigger event is mapped as access category, the access layer if activation
Or Non-Access Stratum carries out access control judgement to the access category.
10. a kind of connection control method is used for the 5th third-generation mobile communication technology newly wireless 5G-NR system, which is characterized in that described
Method includes:
The access layer or Non-Access Stratum that issue user equipment carry out the decision parameter of access control judgement to access category;
It detects whether to receive the access request that the user equipment is sent, the access request is based on the decision parameter and touching
Hair event and obtain, the trigger event is that user equipment is in detected access layer triggering when connected state or inactive state
Event or Non-Access Stratum trigger event;
If receiving, the access request is handled.
11. connection control method according to claim 10, which is characterized in that
The access layer trigger event includes but is not limited to: new wireless data or signaling bear, use are established in user equipment trial
Family equipment is attempted to modify existing radio bearer attribute, user equipment is attempted service quality QoS stream from a radio bearer again
Be mapped to another radio bearer, user equipment attempt remap from default radio bearer carried to specific wireless QoS flow,
User equipment attempts to delete existing wireless data or signaling bear, user equipment attempt to establish new wireless data carrying to pass
Transmission of data, user equipment are attempted to carry out the conversion of wireless data bearer types, user equipment trial activation/deactivation packet replication transmission
Function, user equipment be in unactivated state trial carry out data transmission, user equipment be in unactivated state attempt initiate lead to
Know area update procedures.
12. connection control method according to claim 10, which is characterized in that
The Non-Access Stratum trigger event includes but is not limited to: request beginning voice, video or session initiation protocol SIP calling,
It sends mobile caller short message service SMS, establish new protocol Data Unit PDU session, the existing protocol Data Unit of modification
PDU session, release protocol Data Unit PDU session re-establish user plane, build for the PDU session of existing protocol data cell
Stand new urgency protocol data cell PDU session.
13. connection control method according to claim 10, which is characterized in that the method also includes: it is provided previously and reflects
Rule is penetrated, and the mapping ruler is passed through into system broadcast message or radio resource control RRC transmitting signaling downwards;
Access category described in the mapping ruler determines by the trigger event type and/or user device parameters, the use
Family device parameter includes but is not limited to: five-tuple 5QI, Yong Hushe of the service quality QoS traffic identifier QFI of data flow, data flow
Standby access rank Access Class, user's set roaming state, the operating system ID of trigger data access, trigger data access
Operating system application ID.
14. connection control method according to claim 10, which is characterized in that
The access layer or Non-Access Stratum of the user equipment to access category carry out access control judgement include: the access layer or
The Non-Access Stratum utilize include but is not limited to access class forbid ACB, for data communication using specific congestion control ACDC
Mechanism carries out access control judgement to the access category;
The decision parameter includes but is not limited to access scale factor.
15. a kind of user equipment, which is characterized in that the user equipment includes: processor, memory, telecommunication circuit, the place
Reason device is respectively coupled to the memory, the telecommunication circuit, and the user equipment is preset with the access control of connected state, inactive state
Mode processed, the processor, the memory, the telecommunication circuit can be realized any one of claim 1-9 access control
Step in method processed.
16. user equipment according to claim 15, which is characterized in that the user equipment is preset with Idle state and described
The access control mode of connected state, inactive state;
The access control mode of the preset Idle state includes: that the user equipment is in Idle state, the processor detection
Whether access layer first trigger event is had, and first trigger event includes that user equipment is attempted to be transferred to connected state from Idle state;
If so, first trigger event is then mapped as third access category, and access control is carried out to the third access category
Judgement;If the access control judgement passes through, the telecommunication circuit of the user equipment is sent and the access control trigger event
Corresponding access request.
17. a kind of base station, which is characterized in that the base station includes: processor, memory, telecommunication circuit, the processor difference
The memory, the telecommunication circuit are coupled, the processor, the memory, the telecommunication circuit can be realized right and want
Seek the step in any one of 10-14 connection control method.
18. a kind of device with store function, is stored thereon with program data, which is characterized in that described program data are located
Manage the step realized in any one of the claim 1-9 or 10-14 connection control method when device executes.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810033953.6A CN110035474A (en) | 2018-01-11 | 2018-01-11 | Connection control method, user equipment, base station and the device with store function |
PCT/CN2018/084469 WO2019136880A1 (en) | 2018-01-11 | 2018-04-25 | Access control method, user equipment, base station and storage apparatus |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810033953.6A CN110035474A (en) | 2018-01-11 | 2018-01-11 | Connection control method, user equipment, base station and the device with store function |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110035474A true CN110035474A (en) | 2019-07-19 |
Family
ID=67218171
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810033953.6A Pending CN110035474A (en) | 2018-01-11 | 2018-01-11 | Connection control method, user equipment, base station and the device with store function |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN110035474A (en) |
WO (1) | WO2019136880A1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2021155859A1 (en) * | 2020-02-07 | 2021-08-12 | 维沃移动通信有限公司 | Access control method and device |
WO2022000203A1 (en) * | 2020-06-29 | 2022-01-06 | 北京小米移动软件有限公司 | Access control method and apparatus, and storage medium |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11595879B2 (en) | 2021-02-19 | 2023-02-28 | At&T Intellectual Property I, L.P. | Fine grained access barring of aggressive cellular devices |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104244450A (en) * | 2013-06-21 | 2014-12-24 | 中兴通讯股份有限公司 | Rebuilding method used for concurrence of long term evolution service and cluster service, base station and user equipment |
US20170367116A1 (en) * | 2016-06-15 | 2017-12-21 | Convida Wireless, Llc | Grant-less Operations |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104427574B (en) * | 2013-09-11 | 2018-08-21 | 华为技术有限公司 | A kind of method and device of access control |
-
2018
- 2018-01-11 CN CN201810033953.6A patent/CN110035474A/en active Pending
- 2018-04-25 WO PCT/CN2018/084469 patent/WO2019136880A1/en active Application Filing
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104244450A (en) * | 2013-06-21 | 2014-12-24 | 中兴通讯股份有限公司 | Rebuilding method used for concurrence of long term evolution service and cluster service, base station and user equipment |
US20170367116A1 (en) * | 2016-06-15 | 2017-12-21 | Convida Wireless, Llc | Grant-less Operations |
Non-Patent Citations (3)
Title |
---|
LG ELECTRONICS INC.: "Access category based access barring for RRC_IDLE and RRC_INACTIVE", 《3GPP TSG-RAN WG2 #99 R2-1708455》 * |
QUALCOMM INCORPORATED: "Unified Access Control in different RRC Modes", 《3GPP TSG-RAN2 MEETING #98 R2-1705739》 * |
SAMSUNG: "Way-forward for NR access control", 《3GPP TSG-RAN WG2 MEETING #99BIS R2-1711624》 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2021155859A1 (en) * | 2020-02-07 | 2021-08-12 | 维沃移动通信有限公司 | Access control method and device |
WO2022000203A1 (en) * | 2020-06-29 | 2022-01-06 | 北京小米移动软件有限公司 | Access control method and apparatus, and storage medium |
Also Published As
Publication number | Publication date |
---|---|
WO2019136880A1 (en) | 2019-07-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR101322501B1 (en) | Prioritization of group communications at a wireless communication device | |
EP1745616B1 (en) | Method and system for service integration in a multi-service communication system | |
JP7399318B2 (en) | Condition indicating methods, equipment and systems | |
CN103607783B (en) | CSFB (Circuit Switched Domain Fall Back) call establishment method and user equipment | |
EP1561293A1 (en) | Apparatus and method for establishing feedback in a broadcast or multicast service | |
CN110035474A (en) | Connection control method, user equipment, base station and the device with store function | |
WO2022017527A1 (en) | Data transmission method, apparatus and system | |
CN114731535A (en) | Method and apparatus for maximum number of protocol data unit sessions per network slice enforcement in a communication system | |
US20230164878A1 (en) | Radio barrier processing method and network device | |
CN105684511B (en) | It is transmitted from the data of mobile radio communication apparatus | |
EP2942990A1 (en) | Method, system and equipment for realizing cluster group call session in long term evolution | |
EP3567927B1 (en) | Access method, and terminal | |
WO2007027395A2 (en) | Rapid push-to-talk call setup method and apparatus | |
US8055290B1 (en) | Method to reduce push-to-talk call setup time | |
CN113133063A (en) | Session release method, electronic device and storage medium | |
WO2013178091A1 (en) | Short message shielding method and mobile terminal | |
WO2018133604A1 (en) | Access control method, network element, user equipment, and computer storage medium | |
CN106454693A (en) | D2D UE control method, D2D UE control device, base station, and D2D UE | |
CN112770107B (en) | Modification method of load bearing and related device | |
US20200383161A1 (en) | Access control method and device, and computer storage medium | |
CN107493160A (en) | A kind of method, the method for work of base station and base station for transmitting information | |
CN104284368A (en) | Multi-mode double-standby mobile terminal and network registration method thereof | |
KR20090099004A (en) | Method for refusal of 1x page delivery in an hrpd system | |
RU2358386C2 (en) | Asynchronous transmission of signals and data delivery in wireless communication system | |
CN109362105A (en) | Method, communication system and the relevant apparatus of cluster communication terminal triggering TAU |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190719 |