WO2012058970A1 - Method, terminal, and system for controlling terminal access - Google Patents

Method, terminal, and system for controlling terminal access Download PDF

Info

Publication number
WO2012058970A1
WO2012058970A1 PCT/CN2011/078720 CN2011078720W WO2012058970A1 WO 2012058970 A1 WO2012058970 A1 WO 2012058970A1 CN 2011078720 W CN2011078720 W CN 2011078720W WO 2012058970 A1 WO2012058970 A1 WO 2012058970A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
access control
access
information
control information
Prior art date
Application number
PCT/CN2011/078720
Other languages
French (fr)
Chinese (zh)
Inventor
戴谦
许英奇
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2012058970A1 publication Critical patent/WO2012058970A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions

Definitions

  • the present invention relates to the field of wireless communications, and in particular to a method, a terminal, and a system for controlling terminal access.
  • BACKGROUND In an existing protocol, in order to control access behavior of a user equipment, an access control mechanism is introduced in the protocol. The mechanism specifies a total of 16 access classes (AC, Access Class), where AC 0 ⁇ 9 corresponds to an ordinary call, AC 10 corresponds to an emergency call, and AC 11 ⁇ 15 corresponds to other special calls.
  • AC 0 ⁇ 9 the network side sets the corresponding access control factor (Barring Factor) for each AC, and for AC 10 ⁇ 15, the network side sets a lbit identifier for each AC, and passes the system.
  • the message is broadcast to the terminal.
  • the terminal corresponding to an AC accesses if the AC of the terminal belongs to 0 to 9, the terminal generates a random number between 0 and 1. If the random number is smaller than the control factor corresponding to the AC, The terminal can access, if not, the terminal tries to access after delaying for a period of time; if the AC of the terminal belongs to 11 ⁇ 15, if the bit corresponding to the AC is 0, the terminal can access, otherwise, The terminal attempts to access after delaying for a period of time; if the AC of the terminal is 10, if the bit corresponding to the AC is 0, the terminal can access, otherwise, the terminal immediately attempts to access again.
  • This mechanism can effectively cope with possible congestion in the current network and prevent the network from being overloaded.
  • M2M Machine to Machine
  • H2H human-to-human communication
  • smart home including remote control of home appliances, remote monitoring of home security, etc.
  • intelligent traffic traffic flow monitoring, accident monitoring, vehicle monitoring, etc.
  • smart metering industrial instrument monitoring and remote control, remote meter reading
  • the number of M2M terminals far exceeds that of H2H terminals.
  • the call arrival density is usually small compared to the H2H terminal, and the call arrival density of the M2M terminal is usually large. Therefore, after the concept of the Internet of Things is introduced, the main cause of network congestion is no longer the access of the H2H terminal, but the access of a large number of M2M terminals.
  • the business model refers to a data transmission model when the user equipment and the network side exchange data, and the elements representing the business model include: data interaction periodicity, data interaction frequency, data size, Data interaction direction (refer to the above data, or the following line data, or the uplink and downlink traffic are similar).
  • the meter reports the meter reading data once a day, and the traffic of each meter reading data is small.
  • different services may also have different Quality of Service (QoS) requirements.
  • QoS requirements related to access control include: Access delay tolerance, for example, some services are very sensitive to access delay (for example) Some services, such as fire alarm, security, medical monitoring, etc., have low sensitivity to access delays (such as meter reading), and the current mechanism cannot distinguish between these differences.
  • Different services or user equipments also have different priorities.
  • a primary object of the present invention is to provide a method, a terminal, and a system for controlling terminal access, so as to solve the above-mentioned problem that the current access control mechanism cannot effectively cope with or avoid a large number of accesses of the M2M terminal, causing network congestion, thereby affecting communication quality. problem.
  • a method for controlling terminal access including: transmitting, by a network side terminal, an access control object type, and access control information corresponding to an access control object type, where the terminal needs to perform access Obtaining the access control information corresponding to the terminal according to the type of the access control object to which the network belongs, and the access control information corresponding to the type of the access control object sent by the network side, where the access control information is used to indicate whether The terminal is allowed to access or instruct the terminal to access proportionally; the terminal performs access control according to the obtained access control information.
  • the foregoing access control object type includes at least one of the following: terminal type information, terminal priority information, terminal group information, terminal PLMN information, service priority information, service QoS information, or service model information; wherein, the terminal priority The information refers to the priority of the terminal and the network side to the terminal; the terminal grouping information refers to the identifier of the terminal group; the service priority information refers to the priority of the service agreed by the terminal and the network side; the service model information refers to the data communication model of the service, and the information is at least It includes one of the following: data interaction periodicity, data interaction frequency, data volume size, and data interaction direction.
  • the network side terminal sends the access control object type, and the access control information corresponding to the access control object type includes: the network side sends a system message or a paging message to the terminal, where the system message or the paging message carries Access control object type, and access control information corresponding to the access control object type; the terminal acquires according to the access control object type to which the network belongs, and according to the access control information corresponding to the type of the access control object sent by the network side Before the access control information corresponding to the terminal, the method includes: the terminal intercepts a system message or a paging message from the network side, acquires an access control object type from the system message or the paging message, and connects the access control object type Enter control information.
  • the access control information used to indicate whether the terminal is allowed to access is a flag or an indicator.
  • the access control performed by the terminal according to the obtained access control information includes: when the terminal determines to allow the terminal to access according to the access control information, the terminal initiates Random access; When the terminal determines that the terminal is not allowed to access according to the access control information, the terminal cannot initiate random access. After the terminal cannot initiate random access, the method includes: the terminal intercepts a system message or a paging message from the network side, and acquires the next access control information from the system message or the paging message, according to the acquired next access control information. Perform access control.
  • the foregoing access control information used to indicate that the terminal accesses in proportion is an access control factor and an access control delay;
  • the access control performed by the terminal according to the obtained access control information includes: the terminal generates a random number, and the random number Compared with the access control factor; if the random number is smaller than the access control factor, the terminal initiates random access; if the random number is greater than or equal to the access control factor, the terminal cannot initiate random access.
  • the method includes: The terminal generates a delay time according to the access control delay, and after the delay time is reached, the terminal performs access control again.
  • a terminal including: a receiving module, configured to receive an access control object type sent by a network side, and access control information corresponding to an access control object type; When access is required, according to the type of the access control object to which the user belongs, and according to the access control information corresponding to the access control object type sent by the network side, the access control information corresponding to the terminal is obtained, where The control information is used to indicate whether the terminal is allowed to access or instruct the terminal to access in proportion.
  • the access control module is configured to perform access control according to the access control information acquired by the information acquiring module.
  • the receiving module includes: a monitoring unit configured to monitor a system message or a paging message from the network side, where the system message or the paging message carries an access control object type sent by the network side, and the access control object type corresponds to Access control information.
  • the access control module includes: a first information determining unit, configured to determine that the access control information uses a flag bit or an indicator to indicate whether the terminal is allowed to access; and the first access control unit is configured to determine, according to the access control information, the allowed terminal When accessing, the terminal is controlled to initiate random access; and the second access control unit is configured to control, when the terminal is not allowed to access according to the access control information, to control that the terminal cannot initiate random access.
  • the access control module includes: a second information determining unit, configured to determine whether the access control information uses an access control factor and an access control delay to instruct the terminal to access proportionally; and the comparing unit is configured to be the second information When the result determined by the determining unit is yes, a random number is generated, and the random number is compared with the access control factor; the third access control unit is set to be if the comparison result of the comparing unit is a random number smaller than the access control factor, and the control The terminal initiates random access; and the fourth access control unit is configured to control the terminal not to initiate random access if the comparison result of the comparing unit is that the random number is greater than or equal to the access control factor.
  • the terminal further includes: a delay triggering module, configured to generate a delay time according to the access control delay when the terminal cannot initiate random access, and trigger the access control module to perform access control after the delay time is reached.
  • a control system for terminal access including a network side device and a terminal, where the terminal is the terminal, and the network side device includes: a sending module, configured to send an access control object to the terminal Type, and access control information corresponding to the access control object type.
  • the terminal determines the access control information according to the type of the access control object to which the terminal belongs, and then determines the access control measure, and performs the access control more flexibly and accurately, thereby solving the problem that the current access control mechanism cannot effectively respond or It avoids network congestion caused by massive access of M2M terminals, thus affecting the quality of communication, effectively protecting the network, and ensuring the quality of communication.
  • FIG. 1 is a flowchart of a method for controlling terminal access according to Embodiment 1 of the present invention
  • 2 is a schematic diagram of a correspondence between an access control object type and access control information according to Embodiment 1 of the present invention
  • FIG. 3 is a flowchart of a method for controlling terminal access according to Embodiment 2 of the present invention
  • FIG. 1 is a flowchart of a method for controlling terminal access according to Embodiment 1 of the present invention
  • 2 is a schematic diagram of a correspondence between an access control object type and access control information according to Embodiment 1 of the present invention
  • FIG. 3 is a flowchart of a method for controlling terminal access according to Embodiment 2 of the present invention
  • FIG. 1 is a flowchart of a method for controlling terminal access according to Embodiment 1 of the present invention
  • 2 is a schematic diagram of a correspondence between an access control object type and access control information according to Embodiment 1 of the present invention
  • FIG. 3 is
  • FIG. 5 is a structural block diagram of a terminal access control system according to Embodiment 3 of the present invention.
  • FIG. BEST MODE FOR CARRYING OUT THE INVENTION the present invention will be described in detail with reference to the accompanying drawings. It should be noted that the embodiments in the present application and the features in the embodiments may be combined with each other without conflict.
  • the object (for example, the terminal) of the access control is effectively classified, so that the terminal can take corresponding access control measures according to the category to which the access control object belongs, thereby implementing the access control more flexibly and accurately. , to prevent network overload, effectively protect the network. Based on this, a control method, terminal and system for terminal access are provided.
  • Embodiment 1 FIG.
  • Step S100 The network side sends an access control object type to the terminal, and an access control object Type access control information.
  • the network side may send the foregoing information by using a system message or a paging message, that is, the access control object type and the access control information corresponding to the access control object type.
  • the terminal acquires the foregoing by listening to the system message or the paging message. information.
  • Step S102 When the terminal needs to perform access, according to the type of the access control object to which the terminal belongs, and according to the access control information corresponding to the access control object type sent by the network side, obtain the access control information corresponding to the terminal, where The access control information is used to indicate whether the terminal is allowed to access or instruct the terminal to access proportionally.
  • the access control object type includes at least one of the following: terminal type information, terminal priority information, terminal group information, public land mobile network (PLMN) information of the terminal, service priority information, and service quality of service. Information, or business model information.
  • PLMN public land mobile network
  • Information or business model information.
  • the specific contents of the information of this embodiment are as follows: 1)
  • the terminal type information includes: an H2H terminal, an M2M terminal, or another type of terminal;
  • the terminal priority information is the priority of the terminal that is agreed with or signed by the network, and the terminal priority information may be represented by the priority number of the terminal or the priority identifier of the terminal;
  • the terminal grouping information refers to an identifier of a terminal group (group), and the terminal grouping information may be represented by a group serial number of the terminal or a group identifier of the terminal;
  • the PLMN information of the terminal refers to the information of the PLMN where the terminal is located, and the PLMN information of the terminal may include: a terminal in the HPLMN (Home Public Land Mobile Network), a terminal not in the HPLMN, not in the HPLMN or The terminal of the equivalent PLMN, the terminal of the PLMN that is not in the HPLMN or the PLMN list in the (U)SIM; 5) the service priority information refers to the prior agreement with the network side, or the priority of the contracted service, including: Serial number, or priority identifier;
  • Service QoS information includes one or more combinations of the following requirements: access delay tolerance, guaranteed traffic, allowed bit error rate, etc.; the service QoS information may be hierarchical;
  • Business model information refers to the data communication model of the business, including one or more combinations of the following characteristics: data interaction periodicity (whether it is periodic data interaction), data interaction frequency, data volume size, data interaction Direction (refer to the above data, or the following data, or the upstream and downstream traffic are similar).
  • the terminal in this step obtains the access control information corresponding to the terminal according to the type of the access control object to which the terminal belongs, and the access control information corresponding to the type of the access control object that is sent by the network side, and may include the following manners: 1) The terminal monitors the system message or the paging message from the network side, where the system message or the paging message carries the access control object type and the access control information corresponding to the access control object type; 2) the terminal determines that it belongs to The access control object type; 3) The terminal acquires the access control information corresponding to the access control object type according to the information received from the network side.
  • the access control object type sent by the network side and the access control information corresponding to the access control object type may be sent in the form of a table, for example, the information is placed in the access control object type and the access control information mapping table.
  • FIG. 2 is a schematic diagram of a correspondence between an access control object type and access control information, where each access control object type and access control information may have a one-to-one correspondence, that is, as shown in FIG. 2 According to requirements, multiple access control object types may also be corresponding to the same access control information.
  • Step S104 The terminal performs access control according to the obtained access control information.
  • the access control information in the embodiment of the present invention may be a flag bit or an indicator indicating whether the terminal is allowed to access, or may be a combination of an access control factor and an access control delay indicating that the terminal accesses proportionally.
  • the specific implementation of the access control may be different according to the specific content of the access control information, and the specific manner is as follows: Method 1: The access control information used to indicate whether the terminal is allowed to access is a flag bit or an indicator;
  • the access control information for performing access control includes: when the terminal determines, according to the access control information, that the terminal is allowed to access, the terminal initiates random access; and the terminal determines, according to the access control information, that the terminal is not allowed to access, The terminal cannot initiate random access.
  • the terminal when the terminal determines that the flag bit or the indicator is the first specified value (for example, 0), the terminal initiates random access; when the terminal determines that the flag bit or the indicator is the second specified value (for example, 1), the terminal cannot initiate random access.
  • Access In the case of mode 1, after the terminal cannot initiate random access, the foregoing method includes: the terminal intercepts a system message or a paging message from the network side, and acquires the next access control information from the system message or the paging message, according to the acquired An access control message is used for access control.
  • the terminal in this embodiment may also continuously monitor system messages or paging messages from the network side, or listen at intervals.
  • the access control information used to indicate that the terminal accesses in proportion is an access control factor and an access control delay; the access control performed by the terminal according to the obtained access control information includes: the terminal generates a random number, Comparing the random number with the access control factor; if the random number is smaller than the access control factor, the terminal initiates random access; if the random number is greater than or equal to the access control factor, the terminal cannot initiate random access.
  • the foregoing method includes: The terminal generates a delay time according to the access control delay, and after the delay time is reached, the terminal performs access control again.
  • the length of the specific delay time can be adjusted as needed, or can be implemented by referring to the existing formula in the related art.
  • the terminal in this embodiment adopts the corresponding access control measures according to the type of the access control object to which the terminal belongs, and performs the access control more flexibly and accurately, and solves the problem that the current access control mechanism cannot effectively cope with or avoid the M2M terminal accessing a large amount.
  • the resulting network congestion which affects the quality of communication, effectively protects the network and ensures communication quality.
  • Embodiment 2 This embodiment provides a method for controlling terminal access, which is implemented on an LTE (Long-Term Evolution) system as an example.
  • the access control operation is performed before the terminal initiates the random access.
  • the main steps of the method are as follows: Step S300:
  • the network side sends the access control object type to the terminal, and the access control object type corresponds to Access control information.
  • the network side may send the foregoing information by using a system message or a paging message, that is, the access control object type and the access control information corresponding to the access control object type.
  • the terminal acquires the foregoing by listening to the system message or the paging message. information.
  • Step S302 The terminal receives the access control object type from the network side, and the access control information corresponding to the access control object type, according to the type of the access control object to which the network belongs, and according to the access control object type sent by the network side.
  • Access control information obtaining access control information corresponding to the terminal, where the access control information includes an access control factor (ac-BarringFactor) and an access control delay (ac-BarringTime), or a flag bit, an indicator , for example, a bit.
  • the terminal performs an access control operation according to the access control information, and the specific control is as follows:
  • the access control information is a flag bit or an indicator, for example, a bit: if the bit is "0", it indicates that the terminal can initiate a random connection. If the bit is "1", it means that the terminal cannot initiate random access.
  • the access control information is an access control factor (ac-BarringFactor) and an access control delay (ac-BarringTime): the terminal generates a random number, and compares the random number with an access control factor, if the random number is less than the access The control factor indicates that the terminal can initiate random access. Otherwise, it indicates that the terminal cannot initiate random access. If the terminal is unable to initiate random access, the terminal generates a delay time according to the access control delay. After the delay time is reached, the terminal performs access control again. For example, the terminal generates a random number (rand), and according to the formula : (0.7+ 0.6 * rand) * ac-BarringTime generates a delay time after which the access control operation is re-executed.
  • the "type of access control object" in the present embodiment refers to one or a combination of the following types of information: terminal type information, terminal priority information, terminal group information, terminal PLMN information, service Priority information, service QoS information, or business model information.
  • the terminal type information includes one or more of the following: H2H terminal, M2M terminal, and other types of terminals.
  • the terminal priority information refers to the priority agreed with the network side in advance, or the priority of the subscribed terminal, including: the priority sequence number, or the priority identifier.
  • the existing H2H terminal can be used as a priority. In addition to the priority, one or more priorities can be added. The added priority can be higher or lower than the existing H2H terminal priority, and the existing H2H can be used.
  • the terminal is based on the priority and can be classified as follows:
  • H2H terminal low priority terminal (relative to H2H terminal); Or, a high priority terminal (relative to an H2H terminal), an H2H terminal.
  • A H2H terminal, low priority level 1 terminal, low priority level 2 terminal, ..., low priority N level terminal (N is a positive integer);
  • B high priority level 1 terminal, high priority level 2 Terminal, ..., high priority M-level terminal (M is a positive integer), H2H terminal;
  • the group information of the terminal refers to the identifier of the terminal group, and includes: a serial number or identifier of the terminal group (Group).
  • the group information of the terminal may directly use a Group-RNTI (Radio Network Temporary Identifier), or may use a sequence number pre-agreed with the network side, and the network side pre-establishes a one-to-one correspondence between the sequence number and the packet.
  • the terminal PLMN information refers to the information of the PLMN where the terminal is located, including: the terminal at the HPLMN, the terminal not at the HPLMN, the terminal not at the HPLMN or the equivalent PLMN, and the PLMN not in the HPLMN or the PLMN list in the (U)SIM Terminal.
  • the service priority information refers to the priority agreed with the network side in advance, or the priority of the contracted service, including: priority sequence number, or priority identifier.
  • the access control includes the types of services: Emergency (the terminal initiates an emergency call), MO-Signalling (the terminal initiates the signaling call), and MO-Data (the terminal initiates the data type call).
  • this embodiment can also introduce a new service priority (the following "H2H service” refers to the type of service already included in the existing protocol), for example:
  • H2H service including the following two forms: H2H service, low priority service (relative to H2H service); or high priority service (relative to H2H terminal), H2H service.
  • B high priority level 1 service, high priority level 2 service, ..., high priority level M service (M is a positive integer), H2H service;
  • C high priority level 1 service, high priority level 2 Service, ..., high priority M-class service, H2H service, low priority level 1 service, low priority level 2 service, ..., low priority level N service (M, N are positive integers);
  • MTC Machine Type Communication
  • the main function is to report the meter parameters, and the service priority is low.
  • the financial data transmission type MTC service its main function is to transmit time-time financial data, and service priority. The level is higher than that of the meter type service.
  • the role is to perform alarms and the service priority is higher.
  • the priority of these three types of services is as follows: Alarm-like MTC service (high-priority service), financial data transmission-type MTC service (H2H service), and meter-type MTC service (low-priority service).
  • the service QoS information includes a combination of one or more of the following requirements: access delay tolerance, guaranteed traffic, and allowed bit error rate.
  • the access delay can be set as follows: Two levels: sensitive to access delay and insensitive to access delay; multi-level: high access delay sensitivity, access delay sensitivity, and access delay sensitivity Low; can also be a combination of multiple QoS requirements, such as: high access delay sensitivity + low guaranteed traffic + low error rate requirements; or, access delay sensitivity + high guaranteed traffic + low error rate requirements
  • the QoS can also be divided into more detailed levels.
  • the service model information in this embodiment refers to a data communication model of a service, and includes a combination of one or more of the following features: data interaction periodicity (whether periodic data interaction), data interaction frequency, data volume size, Data interaction direction (refer to the above data, or the following line data, or the uplink and downlink traffic are similar).
  • information including only one feature small data service model, or high-frequency business model, or periodic business model
  • information including multiple characteristics periodic small data service model, low-frequency periodic small data reporting, Very low frequency periodic small data reporting, extremely high frequency periodic small data interaction model, medium frequency aperiodic big data downlink model.
  • the correspondence between the specific service type and the service model is pre-agreed or contracted by the network side and the user equipment.
  • the type of the access control object may be in various forms, that is, the type of the access control object may be one or more of the above types, or a combination of multiple types. For example: Combine the terminal priority information (taking two priorities as an example) with the PLMN information of the terminal, as shown in Table 1: Table 1
  • the terminal in this embodiment adopts corresponding access control measures according to the type of the access control object to which the terminal belongs, and performs access control more flexibly and accurately, thereby solving the problem that the current access control mechanism cannot effectively cope or avoid
  • FIG. 4 is a structural block diagram of a terminal according to Embodiment 3 of the present invention.
  • the terminal includes: a receiving module 40, an information acquiring module 42 and an access control module 44, and the functions thereof are as follows:
  • the receiving module 40 is configured to receive The access control object type sent from the network side, and the access control information corresponding to the access control object type;
  • the information obtaining module 42 is connected to the receiving module 40, and is set to access the access control according to the access control module
  • the access control object type includes at least one of the following: terminal type information, terminal priority information, terminal group information, and a public land mobile network (PLMN) information of the terminal, Service priority information, QoS (Quality of Service) information, or business model information.
  • PLMN public land mobile network
  • the terminal type information includes: an H2H terminal, an M2M terminal, or another type of terminal;
  • the terminal priority information is the priority of the terminal that is agreed with or signed by the network, and the terminal priority information may be represented by the priority number of the terminal or the priority identifier of the terminal;
  • the terminal grouping information refers to an identifier of a terminal group (group), and the terminal grouping information may be represented by a group serial number of the terminal or a group identifier of the terminal;
  • the PLMN information of the terminal refers to the information of the PLMN where the terminal is located, and the PLMN information of the terminal may include: a terminal in the HPLMN (Home Public Land Mobile Network), a terminal not in the HPLMN, not in the HPLMN or a terminal of an equivalent PLMN, a terminal of a PLMN that is not in the HPLMN or a PLMN list in the (U)SIM;
  • the service priority information refers to the prior agreement with the network side, or the priority of the contracted service, including: the priority sequence number, or the priority identifier;
  • Service QoS information includes one or more combinations of the following requirements: access delay tolerance, guaranteed traffic, and allowed bit error rate; the service QoS information may be hierarchical;
  • Business model information refers to the data communication model of the business, including one or more combinations of the following characteristics: data interaction periodicity (whether it is periodic data interaction), data interaction frequency, data volume size, data interaction Direction (refer to the above data, or the following data, or the upstream and downstream traffic are similar).
  • the access control module 44 is connected to the information acquiring module 42 and configured to perform access control according to the access control information acquired by the information acquiring module 42.
  • the receiving module 40 includes: a monitoring unit, configured to monitor a system message or a paging message from the network side, where the system message or the paging message carries an access control object type sent by the network side, and the access control object type corresponds to Access control information.
  • the access control information in the embodiment of the present invention may be information indicating whether the terminal can initiate an access, or information indicating that the terminal is proportionally accessed.
  • the specific implementation of the access control may be different according to the access control information.
  • the specific manner is as follows: In the first manner, the access control module 44 includes: a first information determining unit, configured to determine that the access control information uses a flag bit or an indication. Indicates whether the terminal is allowed to access; the first access control unit is set to be based on the access control When the system determines that the terminal is allowed to access, the terminal controls the terminal to initiate random access; and the second access control unit is configured to control the terminal not to initiate random access when the terminal is not allowed to access according to the access control information.
  • the terminal will listen to the system message or the paging message from the network side through the foregoing listening unit, and acquire the next access control information from the system message or the paging message, according to the next The access control information is again subjected to access control.
  • the access control module 44 includes: a second information determining unit, configured to determine whether the access control information uses an access control factor and an access control delay to instruct the terminal to access proportionally; and the comparing unit is configured as described above
  • the second information determining unit is YES
  • a random number is generated, and the random number is compared with the access control factor
  • the third access control unit is set to be that if the comparison result of the comparing unit is a random number smaller than the access control
  • the terminal controls the terminal to initiate random access
  • the fourth access control unit is configured to control the terminal not to initiate random access if the comparison result of the comparing unit is that the random number is greater than or equal to the access control factor.
  • the terminal further includes: a delay triggering module, configured to generate a delay time according to the access control delay when the terminal cannot initiate random access, and trigger the access control module 44 to perform the delay time after the delay time is reached.
  • a delay triggering module configured to generate a delay time according to the access control delay when the terminal cannot initiate random access
  • trigger the access control module 44 to perform the delay time after the delay time is reached.
  • Access control Referring to FIG. 5, the embodiment further provides a terminal access control system, which includes a network side device 52 and a terminal 54.
  • the terminal 54 can be implemented according to the terminal shown in FIG. 4, and details are not described herein again.
  • the network side device 52 includes The sending module is configured to send the access control object type to the terminal 54 and the access control information corresponding to the access control object type.
  • the terminal in this embodiment adopts the corresponding access control measures according to the type of the access control object to which the terminal belongs, and performs the access control more flexibly and accurately, and solves the problem that the current access control mechanism cannot effectively cope with or avoid the M2M terminal accessing a large amount.
  • the resulting network congestion which affects the quality of communication, effectively protects the network and ensures communication quality.
  • the terminal in the above embodiment determines the type of the access control object first, and then determines the corresponding access control measures to perform the access control more flexibly and accurately, and solves the problem that the current access control mechanism cannot effectively cope with or avoid the M2M terminal accessing a large amount.
  • the resulting network congestion which affects the quality of communication, effectively protects the network and ensures communication quality.
  • modules or steps of the present invention can be implemented by a general-purpose computing device, which can be concentrated on a single computing device or distributed over a network composed of multiple computing devices. Alternatively, they may be implemented by program code executable by the computing device, such that they may be stored in the storage device by the computing device and, in some cases, may be different from the order herein. Perform the steps shown or described, or separate them into individual integrated circuit modules, or Multiple of these modules or steps are fabricated as a single integrated circuit module. Thus, the invention is not limited to any specific combination of hardware and software.
  • the above is only the preferred embodiment of the present invention, and is not intended to limit the present invention, and various modifications and changes can be made to the present invention. Any modifications, equivalent substitutions, improvements, etc. made within the spirit and scope of the present invention are intended to be included within the scope of the present invention.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Disclosed are a method, a terminal, and a system for controlling terminal access. According to the method, a network transmits to a terminal access control target types and access control information corresponding to the access control target types; and, when the terminal needs access, the terminal obtains the access control information corresponding to the terminal according to the terminal's own access control target type and according to the access control information corresponding to access control target types transmitted by the network. The access control information is for instructing a terminal about whether access is permitted or for instructing the terminal to gain access according to a ratio. The terminal carries out access control according to the obtained access control information. The present invention solves the communication quality issue of network congestion arising from the incapability of existing access control mechanisms to process or avoid a large volume of M2M terminal access. The present invention effectively protects a network and ensures communication quality.

Description

终端接入的控制方法、 终端和系统 技术领域 本发明涉及无线通信领域, 具体而言, 涉及一种终端接入的控制方法、 终端和系 统。 背景技术 在现有的协议中, 为了对用户设备的接入行为进行控制, 协议中引入了接入控制 机制。 该机制规定了一共 16个接入等级(AC, Access Class), 其中, AC 0〜9对应于 普通呼叫, AC 10对应于紧急呼叫, AC 11〜15对应于其它特殊的呼叫。 对于 AC 0〜 9, 网络侧为每一个 AC设定了相应的接入控制因子(Barring Factor), 而对于 AC 10〜 15, 网络侧为每一个 AC设定了一个 lbit的标识, 并且通过系统消息广播给终端。 当 对应于某一 AC的终端进行接入时, 如果该终端的 AC属于 0〜9, 则终端会产生一个 0〜1之间的随机数, 若该随机数小于 AC所对应的控制因子, 则该终端可以接入, 否 贝 U, 该终端在延迟一段时间后再尝试接入; 如果该终端的 AC属于 11〜15, 则若 AC 对应的比特为 0, 则该终端可以接入, 否则, 该终端在延迟一段时间后再尝试接入; 如果该终端的 AC为 10, 则若 AC对应的比特为 0, 则该终端可以接入, 否则, 该终 端立刻再次尝试接入。 这种机制可以有效的应对现行网络中可能出现的拥塞, 防止网 络出现过载的情况。 但是, 随着技术的发展, 出现了物联网概念, 狭义的物联网概念是指机器与机器 之间的通信 (Machine to Machine, 简称 M2M, 在 3 GPP ( 3rd Generation Partnership Project, 第三代合作伙伴计划) 会议中, M2M 又被立项为 "Machine Type Communication", 简称 MTC), 广义的物联网概念除了包括机器与机器之间的通信, 还包括传统的人与人之间的通信 (Human to Human, 简称 H2H)。 引入物联网概念后, 通信业务被扩展到各行各业的方方面面。 例如智能家居 (包 括家庭电器的远程控制, 家庭安防的远程监控等等)、 智能交通(交通流量的监控、 事 故监控、 车辆监控等)、 智能计量(工业仪表的监控和远程控制, 远程抄表等)等。 因 此, M2M终端的数量要远远超过 H2H终端。 同时, 与 H2H终端的呼叫到达密度通常 较小不同, M2M终端的呼叫到达密度通常很大。所以, 在引入了物联网概念后, 导致 网络拥塞的主要原因不再是 H2H终端的接入, 而是大量 M2M终端的接入。 此外, 在引入物联网概念后, 终端的类型不再只有 H2H终端, 而且还包括 M2M 终端, 现行的接入控制机制并不能对这两种终端进行有效的区分。 而且, 不同的 M2M应用可能具有不同的业务模型, 业务模型是指用户设备和网 络侧交互数据时的数据传输模型, 表示业务模型的要素包括: 数据交互周期性、 数据 交互频度、 数据大小、 数据交互方向 (指以上行数据为主、 或以下行数据为主、 或上 下行流量相近)。 以智能电表为例,有的电力公司要求每台智能电表每 5分钟上报一次 抄表数据, 有的电力公司要求每台智能电表每 1小时上报一次抄表数据, 有的电力公 司甚至只要求智能电表每天上报一次抄表数据, 每次抄表数据的流量较小, 这就构成 了 3种不同的业务模型, 可以分别称为高频度周期性小数据上报、 低频度周期性小数 据上报、 极低频度周期性小数据上报。 很明显这些不同的业务模型对于网络的压力是 不同的, 而目前的机制是无法区分这些业务模型的。 另外, 不同的业务还可能具有不同的服务质量 (QoS, Quality of Service) 要求, 与接入控制相关的 QoS要求包括: 接入延迟的容忍度, 例如有的业务对接入延迟非常 敏感(例如火警、 安防、 医疗监护等业务), 有的业务对接入延迟敏感度较低 (例如抄 表), 目前的机制是无法区分这些不同的。 不同的业务或者用户设备还具有不同的优先级, 例如和金融、 安防、 医疗相关的 业务的优先级应当高于普通的业务, 而目前的机制也无法区分。 所以在 M2M通信广泛应用后, 由于现行接入控制机制不能够根据接入对象类型 灵活地进行接入控制操作, 不能有效的应对或避免网络拥塞, 从而会严重的影响网络 通信质量。 发明内容 本发明的主要目的在于提供一种终端接入的控制方法、 终端和系统, 以解决上述 由于现行接入控制机制不能有效应对或避免 M2M终端大量接入导致网络拥塞, 从而 影响通信质量的问题。 根据本发明的一个方面, 提供了一种终端接入的控制方法, 包括: 网络侧向终端 发送接入控制对象类型, 以及接入控制对象类型对应的接入控制信息, 终端需要进行 接入时, 根据自身所属的接入控制对象类型, 并且根据网络侧发送的接入控制对象类 型对应的接入控制信息, 获取该终端对应的接入控制信息, 其中, 该接入控制信息用 于指示是否允许终端接入或者指示终端按比例进行接入; 该终端根据获取的接入控制 信息进行接入控制。 上述接入控制对象类型至少包括以下之一: 终端类型信息、 终端优先级信息、 终 端分组信息、 终端的 PLMN信息、业务优先级信息、业务 QoS信息、 或者业务模型信 息; 其中, 该终端优先级信息指终端与网络侧约定终端的优先级; 终端分组信息指终 端分组的标识; 业务优先级信息指终端与网络侧约定的业务的优先级; 业务模型信息 指业务的数据通讯模型, 该信息至少包括以下之一: 数据交互周期性、数据交互频度、 数据量大小、 数据交互方向。 上述网络侧向终端发送接入控制对象类型, 以及接入控制对象类型对应的接入控 制信息包括: 网络侧向终端发送系统消息或寻呼消息, 其中, 该系统消息或寻呼消息 中携带有接入控制对象类型, 以及接入控制对象类型对应的接入控制信息; 上述终端根据自身所属的接入控制对象类型, 并且根据网络侧发送的接入控制对 象类型对应的接入控制信息, 获取终端对应的接入控制信息之前, 该方法包括: 终端 监听来自网络侧的系统消息或寻呼消息, 从系统消息或寻呼消息中获取接入控制对象 类型, 以及接入控制对象类型对应的接入控制信息。 上述用于指示是否允许终端接入的接入控制信息为标志位或者指示符; 终端根据 获取的接入控制信息进行接入控制包括:终端根据接入控制信息确定允许终端接入时, 终端发起随机接入; 终端根据接入控制信息确定不允许终端接入时, 终端不能发起随 机接入。 上述终端不能发起随机接入之后, 该方法包括: 终端监听来自网络侧的系统消息 或寻呼消息, 从系统消息或寻呼消息获取下一个接入控制信息, 根据获取的下一个接 入控制信息进行接入控制。 上述用于指示终端按比例进行接入的接入控制信息是接入控制因子和接入控制时 延; 终端根据获取的接入控制信息进行接入控制包括: 终端产生一个随机数, 将随机 数与接入控制因子进行比较; 如果随机数小于接入控制因子, 终端发起随机接入; 如 果随机数大于或等于接入控制因子, 终端不能发起随机接入。 上述终端不能发起随机接入之后, 该方法包括: 终端根据接入控制时延产生延时 时间, 延时时间达到后, 终端再次进行接入控制。 根据本发明的另一方面, 提供了一种终端, 包括: 接收模块, 用于接收网络侧发 送的接入控制对象类型, 以及接入控制对象类型对应的接入控制信息; 信息获取模块, 用于需要进行接入时, 根据自身所属的接入控制对象类型, 并且根据网络侧发送的接 入控制对象类型对应的接入控制信息, 获取该终端对应的接入控制信息, 其中, 接入 控制信息用于指示是否允许终端接入或者指示终端按比例进行接入; 接入控制模块, 用于根据信息获取模块获取的接入控制信息进行接入控制。 上述接收模块包括: 监听单元, 设置为监听来自网络侧的系统消息或寻呼消息, 其中, 系统消息或寻呼消息中携带有网络侧发送的接入控制对象类型, 以及接入控制 对象类型对应的接入控制信息。 上述接入控制模块包括: 第一信息确定单元, 设置为确定接入控制信息采用标志 位或者指示符指示是否允许终端接入; 第一接入控制单元, 设置为根据接入控制信息 确定允许终端接入时, 控制该终端发起随机接入; 第二接入控制单元, 设置为根据接 入控制信息确定不允许终端接入时, 控制该终端不能发起随机接入。 上述接入控制模块包括: 第二信息确定单元, 设置为确定上述接入控制信息是否 采用接入控制因子和接入控制时延指示终端按比例进行接入; 比较单元, 设置为上述 第二信息确定单元确定的结果为是时, 产生一个随机数, 将随机数与接入控制因子进 行比较; 第三接入控制单元, 设置为如果比较单元的比较结果为随机数小于接入控制 因子, 控制该终端发起随机接入; 第四接入控制单元, 设置为如果比较单元的比较结 果为随机数大于或等于接入控制因子, 控制该终端不能发起随机接入。 上述终端还包括: 延时触发模块, 设置为终端不能发起随机接入时, 根据接入控 制时延产生延时时间, 延时时间达到后, 触发接入控制模块进行接入控制。 根据本发明的又一方面, 提供了一种终端接入的控制系统, 包括网络侧设备和终 端, 该终端为上述终端, 网络侧设备包括: 发送模块, 用于向该终端发送接入控制对 象类型, 以及接入控制对象类型对应的接入控制信息。 通过本发明, 采用终端根据自身所属的接入控制对象类型, 确定接入控制信息, 进而确定接入控制措施, 且更加灵活准确地进行接入控制, 解决了现行接入控制机制 不能有效应对或避免 M2M终端大量接入导致的网络拥塞, 从而影响通信质量的问题, 有效地保护网络, 保证了通信的质量。 附图说明 此处所说明的附图用来提供对本发明的进一步理解, 构成本申请的一部分, 本发 明的示意性实施例及其说明用于解释本发明, 并不构成对本发明的不当限定。 在附图 中: 图 1是根据本发明实施例 1的终端接入的控制方法的流程图; 图 2是根据本发明实施例 1的接入控制对象类型与接入控制信息的对应关系示意 图; 图 3是根据本发明实施例 2的终端接入的控制方法的流程图; 图 4是根据本发明实施例 3的终端的结构框图; 图 5是根据本发明实施例 3的终端接入的控制系统的结构框图。 具体实施方式 下文中将参考附图并结合实施例来详细说明本发明。 需要说明的是, 在不冲突的 情况下, 本申请中的实施例及实施例中的特征可以相互组合。 本发明实施例采用对接入控制的对象 (例如, 终端) 进行有效的分类, 使终端能 够根据接入控制对象所属的类别, 采取相应的接入控制措施, 从而更加灵活准确的进 行接入控制, 防止网络出现过载, 有效的保护网络。 基于此, 提供了一种终端接入的 控制方法、 终端和系统。 实施例 1 图 1示出了根据本发明实施例 1的终端接入的控制方法的流程图, 该方法包括以 下步骤: 步骤 S100, 网络侧向终端发送接入控制对象类型, 以及接入控制对象类型对应的 接入控制信息。 其中, 网络侧可以通过系统消息或寻呼消息发送上述信息, 即, 接入控制对象类 型, 以及接入控制对象类型对应的接入控制信息, 此时终端通过监听系统消息或寻呼 消息获取上述信息。 步骤 S102, 终端需要进行接入时, 根据自身所属的接入控制对象类型, 并且根据 网络侧发送的接入控制对象类型对应的接入控制信息, 获取该终端对应的接入控制信 息, 其中, 接入控制信息用于指示是否允许终端接入或者指示终端按比例进行接入。 其中, 接入控制对象类型至少包括以下之一: 终端类型信息、 终端优先级信息、 终端分组信息、终端的公共陆地移动网络(PLMN, Public Land Mobile Network)信息、 业务优先级信息、 业务服务质量信息、 或者业务模型信息。 本实施例的这些信息的具 体内容如下: 1 ) 终端类型信息包括: H2H终端、 M2M终端或者其它类型终端; The present invention relates to the field of wireless communications, and in particular to a method, a terminal, and a system for controlling terminal access. BACKGROUND In an existing protocol, in order to control access behavior of a user equipment, an access control mechanism is introduced in the protocol. The mechanism specifies a total of 16 access classes (AC, Access Class), where AC 0~9 corresponds to an ordinary call, AC 10 corresponds to an emergency call, and AC 11~15 corresponds to other special calls. For AC 0~ 9, the network side sets the corresponding access control factor (Barring Factor) for each AC, and for AC 10~ 15, the network side sets a lbit identifier for each AC, and passes the system. The message is broadcast to the terminal. When the terminal corresponding to an AC accesses, if the AC of the terminal belongs to 0 to 9, the terminal generates a random number between 0 and 1. If the random number is smaller than the control factor corresponding to the AC, The terminal can access, if not, the terminal tries to access after delaying for a period of time; if the AC of the terminal belongs to 11~15, if the bit corresponding to the AC is 0, the terminal can access, otherwise, The terminal attempts to access after delaying for a period of time; if the AC of the terminal is 10, if the bit corresponding to the AC is 0, the terminal can access, otherwise, the terminal immediately attempts to access again. This mechanism can effectively cope with possible congestion in the current network and prevent the network from being overloaded. However, with the development of technology, the concept of Internet of Things has emerged. The narrow concept of the Internet of Things refers to the communication between machines and machines (Machine to Machine, M2M for short, 3rd Generation Partnership Project, 3rd Generation Partnership Project) In the meeting, M2M was also established as "Machine Type Communication" (MTC). The general concept of IoT includes communication between machines and machines, as well as traditional human-to-human communication (Human to Human). , referred to as H2H). After the introduction of the Internet of Things concept, the communication business was extended to all aspects of all walks of life. For example, smart home (including remote control of home appliances, remote monitoring of home security, etc.), intelligent traffic (traffic flow monitoring, accident monitoring, vehicle monitoring, etc.), smart metering (industrial instrument monitoring and remote control, remote meter reading) and many more. Therefore, the number of M2M terminals far exceeds that of H2H terminals. At the same time, the call arrival density is usually small compared to the H2H terminal, and the call arrival density of the M2M terminal is usually large. Therefore, after the concept of the Internet of Things is introduced, the main cause of network congestion is no longer the access of the H2H terminal, but the access of a large number of M2M terminals. In addition, after the concept of the Internet of Things is introduced, the type of the terminal is no longer only the H2H terminal, but also the M2M terminal. The current access control mechanism cannot effectively distinguish the two terminals. Moreover, different M2M applications may have different business models. The business model refers to a data transmission model when the user equipment and the network side exchange data, and the elements representing the business model include: data interaction periodicity, data interaction frequency, data size, Data interaction direction (refer to the above data, or the following line data, or the uplink and downlink traffic are similar). Take smart meters as an example. Some power companies require each smart meter to report meter reading data every 5 minutes. Some power companies require each smart meter to report meter reading data every hour. Some power companies even only require intelligence. The meter reports the meter reading data once a day, and the traffic of each meter reading data is small. This constitutes three different business models, which can be called high frequency periodic small data reporting, low frequency periodic small data reporting, Very low frequency periodic small data is reported. It is clear that these different business models have different pressures on the network, and the current mechanism is unable to distinguish these business models. In addition, different services may also have different Quality of Service (QoS) requirements. The QoS requirements related to access control include: Access delay tolerance, for example, some services are very sensitive to access delay (for example) Some services, such as fire alarm, security, medical monitoring, etc., have low sensitivity to access delays (such as meter reading), and the current mechanism cannot distinguish between these differences. Different services or user equipments also have different priorities. For example, financial, security, and medical-related services should have higher priority than ordinary services, and the current mechanisms cannot be distinguished. Therefore, after the M2M communication is widely applied, the current access control mechanism cannot flexibly perform access control operations according to the access object type, and cannot effectively cope with or avoid network congestion, thereby seriously affecting network communication quality. SUMMARY OF THE INVENTION A primary object of the present invention is to provide a method, a terminal, and a system for controlling terminal access, so as to solve the above-mentioned problem that the current access control mechanism cannot effectively cope with or avoid a large number of accesses of the M2M terminal, causing network congestion, thereby affecting communication quality. problem. According to an aspect of the present invention, a method for controlling terminal access is provided, including: transmitting, by a network side terminal, an access control object type, and access control information corresponding to an access control object type, where the terminal needs to perform access Obtaining the access control information corresponding to the terminal according to the type of the access control object to which the network belongs, and the access control information corresponding to the type of the access control object sent by the network side, where the access control information is used to indicate whether The terminal is allowed to access or instruct the terminal to access proportionally; the terminal performs access control according to the obtained access control information. The foregoing access control object type includes at least one of the following: terminal type information, terminal priority information, terminal group information, terminal PLMN information, service priority information, service QoS information, or service model information; wherein, the terminal priority The information refers to the priority of the terminal and the network side to the terminal; the terminal grouping information refers to the identifier of the terminal group; the service priority information refers to the priority of the service agreed by the terminal and the network side; the service model information refers to the data communication model of the service, and the information is at least It includes one of the following: data interaction periodicity, data interaction frequency, data volume size, and data interaction direction. The network side terminal sends the access control object type, and the access control information corresponding to the access control object type includes: the network side sends a system message or a paging message to the terminal, where the system message or the paging message carries Access control object type, and access control information corresponding to the access control object type; the terminal acquires according to the access control object type to which the network belongs, and according to the access control information corresponding to the type of the access control object sent by the network side Before the access control information corresponding to the terminal, the method includes: the terminal intercepts a system message or a paging message from the network side, acquires an access control object type from the system message or the paging message, and connects the access control object type Enter control information. The access control information used to indicate whether the terminal is allowed to access is a flag or an indicator. The access control performed by the terminal according to the obtained access control information includes: when the terminal determines to allow the terminal to access according to the access control information, the terminal initiates Random access; When the terminal determines that the terminal is not allowed to access according to the access control information, the terminal cannot initiate random access. After the terminal cannot initiate random access, the method includes: the terminal intercepts a system message or a paging message from the network side, and acquires the next access control information from the system message or the paging message, according to the acquired next access control information. Perform access control. The foregoing access control information used to indicate that the terminal accesses in proportion is an access control factor and an access control delay; the access control performed by the terminal according to the obtained access control information includes: the terminal generates a random number, and the random number Compared with the access control factor; if the random number is smaller than the access control factor, the terminal initiates random access; if the random number is greater than or equal to the access control factor, the terminal cannot initiate random access. After the terminal cannot initiate random access, the method includes: The terminal generates a delay time according to the access control delay, and after the delay time is reached, the terminal performs access control again. According to another aspect of the present invention, a terminal is provided, including: a receiving module, configured to receive an access control object type sent by a network side, and access control information corresponding to an access control object type; When access is required, according to the type of the access control object to which the user belongs, and according to the access control information corresponding to the access control object type sent by the network side, the access control information corresponding to the terminal is obtained, where The control information is used to indicate whether the terminal is allowed to access or instruct the terminal to access in proportion. The access control module is configured to perform access control according to the access control information acquired by the information acquiring module. The receiving module includes: a monitoring unit configured to monitor a system message or a paging message from the network side, where the system message or the paging message carries an access control object type sent by the network side, and the access control object type corresponds to Access control information. The access control module includes: a first information determining unit, configured to determine that the access control information uses a flag bit or an indicator to indicate whether the terminal is allowed to access; and the first access control unit is configured to determine, according to the access control information, the allowed terminal When accessing, the terminal is controlled to initiate random access; and the second access control unit is configured to control, when the terminal is not allowed to access according to the access control information, to control that the terminal cannot initiate random access. The access control module includes: a second information determining unit, configured to determine whether the access control information uses an access control factor and an access control delay to instruct the terminal to access proportionally; and the comparing unit is configured to be the second information When the result determined by the determining unit is yes, a random number is generated, and the random number is compared with the access control factor; the third access control unit is set to be if the comparison result of the comparing unit is a random number smaller than the access control factor, and the control The terminal initiates random access; and the fourth access control unit is configured to control the terminal not to initiate random access if the comparison result of the comparing unit is that the random number is greater than or equal to the access control factor. The terminal further includes: a delay triggering module, configured to generate a delay time according to the access control delay when the terminal cannot initiate random access, and trigger the access control module to perform access control after the delay time is reached. According to still another aspect of the present invention, a control system for terminal access is provided, including a network side device and a terminal, where the terminal is the terminal, and the network side device includes: a sending module, configured to send an access control object to the terminal Type, and access control information corresponding to the access control object type. According to the present invention, the terminal determines the access control information according to the type of the access control object to which the terminal belongs, and then determines the access control measure, and performs the access control more flexibly and accurately, thereby solving the problem that the current access control mechanism cannot effectively respond or It avoids network congestion caused by massive access of M2M terminals, thus affecting the quality of communication, effectively protecting the network, and ensuring the quality of communication. BRIEF DESCRIPTION OF THE DRAWINGS The accompanying drawings, which are set to illustrate,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, In the drawings: FIG. 1 is a flowchart of a method for controlling terminal access according to Embodiment 1 of the present invention; 2 is a schematic diagram of a correspondence between an access control object type and access control information according to Embodiment 1 of the present invention; FIG. 3 is a flowchart of a method for controlling terminal access according to Embodiment 2 of the present invention; FIG. 5 is a structural block diagram of a terminal access control system according to Embodiment 3 of the present invention. FIG. BEST MODE FOR CARRYING OUT THE INVENTION Hereinafter, the present invention will be described in detail with reference to the accompanying drawings. It should be noted that the embodiments in the present application and the features in the embodiments may be combined with each other without conflict. In the embodiment of the present invention, the object (for example, the terminal) of the access control is effectively classified, so that the terminal can take corresponding access control measures according to the category to which the access control object belongs, thereby implementing the access control more flexibly and accurately. , to prevent network overload, effectively protect the network. Based on this, a control method, terminal and system for terminal access are provided. Embodiment 1 FIG. 1 is a flowchart of a method for controlling terminal access according to Embodiment 1 of the present invention. The method includes the following steps: Step S100: The network side sends an access control object type to the terminal, and an access control object Type access control information. The network side may send the foregoing information by using a system message or a paging message, that is, the access control object type and the access control information corresponding to the access control object type. At this time, the terminal acquires the foregoing by listening to the system message or the paging message. information. Step S102: When the terminal needs to perform access, according to the type of the access control object to which the terminal belongs, and according to the access control information corresponding to the access control object type sent by the network side, obtain the access control information corresponding to the terminal, where The access control information is used to indicate whether the terminal is allowed to access or instruct the terminal to access proportionally. The access control object type includes at least one of the following: terminal type information, terminal priority information, terminal group information, public land mobile network (PLMN) information of the terminal, service priority information, and service quality of service. Information, or business model information. The specific contents of the information of this embodiment are as follows: 1) The terminal type information includes: an H2H terminal, an M2M terminal, or another type of terminal;
2)终端优先级信息为与网络约定或签约的终端的优先级, 该终端优先级信息可以 用终端的优先级序号或者终端的优先级标识表示; 2) The terminal priority information is the priority of the terminal that is agreed with or signed by the network, and the terminal priority information may be represented by the priority number of the terminal or the priority identifier of the terminal;
3 ) 终端分组信息指终端分组 (group) 的标识, 该终端分组信息可以用终端的分 组序号或者终端的分组标识表示; 3) The terminal grouping information refers to an identifier of a terminal group (group), and the terminal grouping information may be represented by a group serial number of the terminal or a group identifier of the terminal;
4)终端的 PLMN信息指终端所处的 PLMN的信息,终端的 PLMN信息可以包括: 处于 HPLMN (Home Public Land Mobile Network, 本地公用陆地移动网络) 的终端、 没有处于 HPLMN 的终端、 没有处于 HPLMN 或者等价 PLMN 的终端、 没有处于 HPLMN或者 (U)SIM中 PLMN列表中的 PLMN的终端; 5 ) 业务优先级信息是指事先与网络侧约定好, 或者签约的业务的优先级, 包括: 优先级序号, 或者优先级标识; 4) The PLMN information of the terminal refers to the information of the PLMN where the terminal is located, and the PLMN information of the terminal may include: a terminal in the HPLMN (Home Public Land Mobile Network), a terminal not in the HPLMN, not in the HPLMN or The terminal of the equivalent PLMN, the terminal of the PLMN that is not in the HPLMN or the PLMN list in the (U)SIM; 5) the service priority information refers to the prior agreement with the network side, or the priority of the contracted service, including: Serial number, or priority identifier;
6) 业务 QoS信息包括下述要求的一种或多种的组合: 接入延迟的容忍度、 保证 的流量、 容许的误码率等; 该业务 QoS信息可以是分级别的; 6) Service QoS information includes one or more combinations of the following requirements: access delay tolerance, guaranteed traffic, allowed bit error rate, etc.; the service QoS information may be hierarchical;
7) 业务模型信息是指业务的数据通讯模型, 包括下述特征的一种或多种的组合: 数据交互周期性(是否是周期性数据交互)、 数据交互频度、 数据量大小、 数据交互方 向 (指以上行数据为主、 或以下行数据为主、 或上下行流量相近)。 本步骤中的终端根据自身所属的接入控制对象类型, 并且根据网络侧发送的接入 控制对象类型对应的接入控制信息, 获取该终端对应的接入控制信息可以包括下述方 式: 1 )终端监听来自网络侧的系统消息或寻呼消息, 其中, 该系统消息或寻呼消息中 携带有接入控制对象类型, 以及接入控制对象类型对应的接入控制信息; 2)终端确定 自身所属的接入控制对象类型; 3 )终端根据从网络侧接收到的信息获取上述接入控制 对象类型对应的接入控制信息。 其中, 网络侧发送的接入控制对象类型, 以及接入控制对象类型对应的接入控制 信息可以以表的形式发送, 例如, 将这些信息放于接入控制对象类型与接入控制信息 映射表中。如图 2所示的接入控制对象类型与接入控制信息的对应关系示意图,其中, 每个接入控制对象类型与接入控制信息之间可以是一一对应的关系, 即图 2所示, 根 据需要, 也可以将多个接入控制对象类型对应于同一个接入控制信息。 步骤 S104, 终端根据获取的接入控制信息进行接入控制。 本发明实施例中的接入控制信息可以是指示是否允许终端接入的标志位或者指示 符, 也可以是指示终端按比例进行接入的接入控制因子和接入控制时延的组合。 根据 接入控制信息的具体内容不同, 接入控制的具体实现也可以不同, 具体方式如下: 方式一: 用于指示是否允许终端接入的接入控制信息为标志位或者指示符; 终端 根据获取的接入控制信息进行接入控制包括: 该终端根据接入控制信息确定允许该终 端接入时, 该终端发起随机接入; 该终端根据接入控制信息确定不允许该终端接入时, 该终端不能发起随机接入。 例如, 终端确定标志位或者指示符为第一指定值 (例如为 0)时, 终端发起随机接入; 终端确定标志位或者指示符为第二指定值(例如为 1 )时, 终端不能发起随机接入。 方式一的情况下, 终端不能发起随机接入之后, 上述方法包括: 终端监听来自网 络侧的系统消息或寻呼消息, 从系统消息或寻呼消息获取下一个接入控制信息, 根据 获取的下一个接入控制信息进行接入控制。 本实施例的终端也可以持续监听来自网络侧的系统消息或寻呼消息, 或者每隔一 段时间进行监听。 方式二: 用于指示该终端按比例进行接入的接入控制信息是接入控 制因子和接入控制时延; 终端根据获取的接入控制信息进行接入控制包括: 终端产生 一个随机数, 将随机数与接入控制因子进行比较; 如果该随机数小于接入控制因子, 终端发起随机接入; 如果该随机数大于或等于接入控制因子, 终端不能发起随机接入。 对于第二种方式, 终端不能发起随机接入之后, 上述方法包括: 终端根据接入控 制时延产生延时时间, 该延时时间达到后, 该终端再次进行接入控制。 具体延时时间 的长短可以根据需要调整, 也可以参考相关技术中现有的公式实现。 本实施例的终端 根据自身所属的接入控制对象类型, 采取相应的接入控制措施, 更加灵活准确地进行 接入控制, 解决了由于现行接入控制机制不能有效应对或避免 M2M终端大量接入导 致的网络拥塞, 从而影响通信质量的问题, 有效地保护网络, 保证通信质量。 实施例 2 本实施例提供了一种终端接入的控制方法, 以在 LTE (Long-Term Evolution, 长 期演进) 系统上实现为例进行说明。 终端在发起随机接入之前, 需要进行接入控制操 作, 如图 3所示, 该方法主要的步骤如下: 步骤 S300, 网络侧向终端发送接入控制对象类型, 以及接入控制对象类型对应的 接入控制信息。 其中, 网络侧可以通过系统消息或寻呼消息发送上述信息, 即, 接入控制对象类 型, 以及接入控制对象类型对应的接入控制信息, 此时终端通过监听系统消息或寻呼 消息获取上述信息。 步骤 S302, 终端接收来自网络侧的接入控制对象类型, 以及接入 控制对象类型对应的接入控制信息, 根据自身所属的接入控制对象类型, 并且根据网 络侧发送的接入控制对象类型对应的接入控制信息,获取该终端对应的接入控制信息, 其中, 接入控制信息包括接入控制因子 ( ac-BarringFactor ) 和接入控制时延 (ac-BarringTime), 或者标志位、 指示符, 例如比特位。 步骤 S304, 终端根据接入控制信息进行接入控制操作, 具体控制如下: 接入控制信息为标志位或指示符, 例如比特位: 若该比特位为 "0", 则表示终端能 够发起随机接入; 若该比特位为 "1", 则表示终端不能发起随机接入。 接入控制信息为接入控制因子 ( ac-BarringFactor ) 和接入控制时延 (ac-BarringTime): 终端产生一个随机数, 并将该随机数与接入控制因子比较, 若随 机数小于接入控制因子, 则表示终端能够发起随机接入, 否则, 则表示终端不能够发 起随机接入。 若终端不能够发起随机接入, 终端根据接入控制时延产生延时时间, 该延时时间 达到后, 该终端再次进行接入控制, 例如, 终端产生一个随机数 (rand), 并且按照公 式: (0.7+ 0.6 * rand) * ac-BarringTime产生延迟时间, 在该延迟时间之后, 重新进行接 入控制操作。 本实施例中的 "接入控制对象的类型"是指下述信息中的一种或者是多种的组合: 终端类型信息、 终端优先级信息、 终端分组 (group) 信息、 终端 PLMN信息、 业务 优先级信息、 业务 QoS信息、 或者业务模型信息。 终端类型信息包括以下的一种或者多种: H2H终端, M2M终端, 其他类型终端。 终端优先级信息是指预先与网络侧约定好, 或者签约的终端的优先级, 包括: 优 先级序号, 或者优先级标识。 现有 H2H终端可以作为一个优先级, 除该优先级外, 还 可以增设一个或多个优先级,这些增设的优先级可以高于或低于现有的 H2H终端优先 级, 以现有的 H2H终端为基础优先级, 可以进行如下分类: 7) Business model information refers to the data communication model of the business, including one or more combinations of the following characteristics: data interaction periodicity (whether it is periodic data interaction), data interaction frequency, data volume size, data interaction Direction (refer to the above data, or the following data, or the upstream and downstream traffic are similar). The terminal in this step obtains the access control information corresponding to the terminal according to the type of the access control object to which the terminal belongs, and the access control information corresponding to the type of the access control object that is sent by the network side, and may include the following manners: 1) The terminal monitors the system message or the paging message from the network side, where the system message or the paging message carries the access control object type and the access control information corresponding to the access control object type; 2) the terminal determines that it belongs to The access control object type; 3) The terminal acquires the access control information corresponding to the access control object type according to the information received from the network side. The access control object type sent by the network side and the access control information corresponding to the access control object type may be sent in the form of a table, for example, the information is placed in the access control object type and the access control information mapping table. in. FIG. 2 is a schematic diagram of a correspondence between an access control object type and access control information, where each access control object type and access control information may have a one-to-one correspondence, that is, as shown in FIG. 2 According to requirements, multiple access control object types may also be corresponding to the same access control information. Step S104: The terminal performs access control according to the obtained access control information. The access control information in the embodiment of the present invention may be a flag bit or an indicator indicating whether the terminal is allowed to access, or may be a combination of an access control factor and an access control delay indicating that the terminal accesses proportionally. The specific implementation of the access control may be different according to the specific content of the access control information, and the specific manner is as follows: Method 1: The access control information used to indicate whether the terminal is allowed to access is a flag bit or an indicator; The access control information for performing access control includes: when the terminal determines, according to the access control information, that the terminal is allowed to access, the terminal initiates random access; and the terminal determines, according to the access control information, that the terminal is not allowed to access, The terminal cannot initiate random access. For example, when the terminal determines that the flag bit or the indicator is the first specified value (for example, 0), the terminal initiates random access; when the terminal determines that the flag bit or the indicator is the second specified value (for example, 1), the terminal cannot initiate random access. Access. In the case of mode 1, after the terminal cannot initiate random access, the foregoing method includes: the terminal intercepts a system message or a paging message from the network side, and acquires the next access control information from the system message or the paging message, according to the acquired An access control message is used for access control. The terminal in this embodiment may also continuously monitor system messages or paging messages from the network side, or listen at intervals. Manner 2: The access control information used to indicate that the terminal accesses in proportion is an access control factor and an access control delay; the access control performed by the terminal according to the obtained access control information includes: the terminal generates a random number, Comparing the random number with the access control factor; if the random number is smaller than the access control factor, the terminal initiates random access; if the random number is greater than or equal to the access control factor, the terminal cannot initiate random access. For the second method, after the terminal cannot initiate random access, the foregoing method includes: The terminal generates a delay time according to the access control delay, and after the delay time is reached, the terminal performs access control again. The length of the specific delay time can be adjusted as needed, or can be implemented by referring to the existing formula in the related art. The terminal in this embodiment adopts the corresponding access control measures according to the type of the access control object to which the terminal belongs, and performs the access control more flexibly and accurately, and solves the problem that the current access control mechanism cannot effectively cope with or avoid the M2M terminal accessing a large amount. The resulting network congestion, which affects the quality of communication, effectively protects the network and ensures communication quality. Embodiment 2 This embodiment provides a method for controlling terminal access, which is implemented on an LTE (Long-Term Evolution) system as an example. The access control operation is performed before the terminal initiates the random access. As shown in FIG. 3, the main steps of the method are as follows: Step S300: The network side sends the access control object type to the terminal, and the access control object type corresponds to Access control information. The network side may send the foregoing information by using a system message or a paging message, that is, the access control object type and the access control information corresponding to the access control object type. At this time, the terminal acquires the foregoing by listening to the system message or the paging message. information. Step S302: The terminal receives the access control object type from the network side, and the access control information corresponding to the access control object type, according to the type of the access control object to which the network belongs, and according to the access control object type sent by the network side. Access control information, obtaining access control information corresponding to the terminal, where the access control information includes an access control factor (ac-BarringFactor) and an access control delay (ac-BarringTime), or a flag bit, an indicator , for example, a bit. Step S304, the terminal performs an access control operation according to the access control information, and the specific control is as follows: The access control information is a flag bit or an indicator, for example, a bit: if the bit is "0", it indicates that the terminal can initiate a random connection. If the bit is "1", it means that the terminal cannot initiate random access. The access control information is an access control factor (ac-BarringFactor) and an access control delay (ac-BarringTime): the terminal generates a random number, and compares the random number with an access control factor, if the random number is less than the access The control factor indicates that the terminal can initiate random access. Otherwise, it indicates that the terminal cannot initiate random access. If the terminal is unable to initiate random access, the terminal generates a delay time according to the access control delay. After the delay time is reached, the terminal performs access control again. For example, the terminal generates a random number (rand), and according to the formula : (0.7+ 0.6 * rand) * ac-BarringTime generates a delay time after which the access control operation is re-executed. The "type of access control object" in the present embodiment refers to one or a combination of the following types of information: terminal type information, terminal priority information, terminal group information, terminal PLMN information, service Priority information, service QoS information, or business model information. The terminal type information includes one or more of the following: H2H terminal, M2M terminal, and other types of terminals. The terminal priority information refers to the priority agreed with the network side in advance, or the priority of the subscribed terminal, including: the priority sequence number, or the priority identifier. The existing H2H terminal can be used as a priority. In addition to the priority, one or more priorities can be added. The added priority can be higher or lower than the existing H2H terminal priority, and the existing H2H can be used. The terminal is based on the priority and can be classified as follows:
1 ) 增设一个优先级, 包括下述两种形式: 1) Add a priority, including the following two forms:
H2H终端, 低优先级终端 (相对于 H2H终端); 或者, 高优先级终端 (相对于 H2H终端), H2H终端。 H2H terminal, low priority terminal (relative to H2H terminal); Or, a high priority terminal (relative to an H2H terminal), an H2H terminal.
2) 增设多个优先级, 包括下述三种形式: 2) Add multiple priorities, including the following three forms:
A: H2H终端, 低优先级 1级终端, 低优先级 2级终端, ..., 低优先级 N级终端 (N为正整数); B: 高优先级 1级终端, 高优先级 2级终端, ..., 高优先级 M级终端 (M为正整 数), H2H终端; A: H2H terminal, low priority level 1 terminal, low priority level 2 terminal, ..., low priority N level terminal (N is a positive integer); B: high priority level 1 terminal, high priority level 2 Terminal, ..., high priority M-level terminal (M is a positive integer), H2H terminal;
C: 高优先级 1级终端, 高优先级 2级终端, ..., 高优先级 M级终端, H2H终端, 低优先级 1级终端, 低优先级 2级终端, ..., 低优先级 N级终端(M、 ^^均为正整数); 例如, 网络侧与 M2M终端约定, M2M终端的优先级低于 H2H终端, 则网络中 一共有两种优先级终端: H2H终端、 M2M终端。 终端的分组信息是指终端分组 (Group) 的标识, 包括: 终端分组 (Group) 的序 号或者标识。 例如, 终端的分组信息可以直接使用 Group-RNTI ( Radio Network Temporary Identifier, 无线网络临时标识), 也可以使用和网络侧预先约定的一个序号, 网络侧预先建立该序号和分组的一一对应关系。 终端 PLMN信息是指终端所处的 PLMN的信息, 包括: 处于 HPLMN的终端, 没 有处于 HPLMN的终端、没有处于 HPLMN或者等价 PLMN的终端、没有处于 HPLMN 或者 (U)SIM中 PLMN列表中的 PLMN的终端。 业务优先级信息是指事先与网络侧约定好, 或者签约的业务的优先级, 包括: 优 先级序号, 或者优先级标识。 在现有协议中, 接入控制包含的业务类型有 Emergency (终端发起的是紧急呼叫)、 MO-Signalling (终端主动发起信令类呼叫) 和 MO-Data (终端主动发起数据类呼叫)。 除此之外, 本实施例还可以引入新的业务优先级(下述 "H2H业务"指现有协议中已经包含的业务类型), 例如: C: high priority level 1 terminal, high priority level 2 terminal, ..., high priority level M terminal, H2H terminal, low priority level 1 terminal, low priority level 2 terminal, ..., low priority Level N terminals (M, ^^ are positive integers); for example, the network side and the M2M terminal agree that the M2M terminal has lower priority than the H2H terminal, and there are two priority terminals in the network: H2H terminal, M2M terminal . The group information of the terminal refers to the identifier of the terminal group, and includes: a serial number or identifier of the terminal group (Group). For example, the group information of the terminal may directly use a Group-RNTI (Radio Network Temporary Identifier), or may use a sequence number pre-agreed with the network side, and the network side pre-establishes a one-to-one correspondence between the sequence number and the packet. The terminal PLMN information refers to the information of the PLMN where the terminal is located, including: the terminal at the HPLMN, the terminal not at the HPLMN, the terminal not at the HPLMN or the equivalent PLMN, and the PLMN not in the HPLMN or the PLMN list in the (U)SIM Terminal. The service priority information refers to the priority agreed with the network side in advance, or the priority of the contracted service, including: priority sequence number, or priority identifier. In the existing protocol, the access control includes the types of services: Emergency (the terminal initiates an emergency call), MO-Signalling (the terminal initiates the signaling call), and MO-Data (the terminal initiates the data type call). In addition, this embodiment can also introduce a new service priority (the following "H2H service" refers to the type of service already included in the existing protocol), for example:
1 ) 增设一个优先级, 包括下述两种形式: H2H业务, 低优先级业务 (相对于 H2H业务); 或者, 高优先级业务 (相对于 H2H终端), H2H业务。 1) Add a priority, including the following two forms: H2H service, low priority service (relative to H2H service); or high priority service (relative to H2H terminal), H2H service.
2) 增设多个优先级, 包括下述三种形式: A: H2H业务, 低优先级 1级业务, 低优先级 2级业务, ..., 低优先级 N级业务 (N为正整数); 2) Add multiple priorities, including the following three forms: A: H2H service, low priority level 1 service, low priority level 2 service, ..., low priority level N service (N is a positive integer);
B: 高优先级 1级业务, 高优先级 2级业务, ..., 高优先级 M级业务 (M为正整 数), H2H业务; C: 高优先级 1级业务, 高优先级 2级业务, ..., 高优先级 M级业务, H2H业务, 低优先级 1级业务, 低优先级 2级业务, ..., 低优先级 N级业务(M、 N均为正整数); 例如, 对于电表类 MTC (Machine Type Communication, 机器类型通信) 业务, 其主要作用是上报电表参数, 业务优先级较低; 对于金融数据传输类 MTC业务, 其 主要作用是传输时时金融数据, 业务优先级较电表类业务要高; 对于告警类 MTC业 务, 其作用是进行告警, 业务优先级较高。 所以这三类业务的优先级由高到低排列如 下: 告警类 MTC业务(高优先级业务)、 金融数据传输类 MTC业务(H2H业务)、 电 表类 MTC业务 (低优先级业务)。 业务 QoS信息包括下述要求的一种或多种的组合: 接入延迟的容忍度、 保证的流 量、 容许的误码率。 例如: 以接入延迟为例, 可以设置为: 两级: 对接入延迟敏感、 对接入延迟不敏感; 多级: 接入延迟敏感度高、 接入延迟敏感度中、 接入延迟敏感度低; 也可以是多种 QoS要求的组合, 例如: 接入延迟敏感度高 +低保证流量 +低误码率 要求; 或者, 接入延迟敏感度中 +高保证流量 +低误码率要求; 该 QoS也可以分为更细 的级数。 本实施例的业务模型信息是指业务的数据通讯模型, 包括下述的一种或多种特征 的组合: 数据交互周期性(是否是周期性数据交互)、 数据交互频度、 数据量大小、 数 据交互方向 (指以上行数据为主、 或以下行数据为主、 或上下行流量相近)。 例如: 只包括一种特征的信息: 小数据业务模型、 或者高频度业务模型、 或者周期性业 务模型; 包括多种特征的信息: 周期性小数据业务模型、 低频度周期性小数据上报、 极低 频度周期性小数据上报、 极高频度周期性小数据交互模型、 中频度非周期性大数据下 传模型等。 具体的业务类型和业务模型之间的对应关系由网络侧和用户设备预先约定或者签 约。 上述接入控制对象类型可以有多种形式, 即接入控制对象的类型可以是以上类型 的一种或多种, 或者是多种的合并。 例如: 将终端优先级信息 (以两个优先级为例) 与终端的 PLMN信息组合起来, 如表 1所示: 表 1 B: high priority level 1 service, high priority level 2 service, ..., high priority level M service (M is a positive integer), H2H service; C: high priority level 1 service, high priority level 2 Service, ..., high priority M-class service, H2H service, low priority level 1 service, low priority level 2 service, ..., low priority level N service (M, N are positive integers); For example, for the meter type MTC (Machine Type Communication) service, its main function is to report the meter parameters, and the service priority is low. For the financial data transmission type MTC service, its main function is to transmit time-time financial data, and service priority. The level is higher than that of the meter type service. For the alarm type MTC service, the role is to perform alarms and the service priority is higher. Therefore, the priority of these three types of services is as follows: Alarm-like MTC service (high-priority service), financial data transmission-type MTC service (H2H service), and meter-type MTC service (low-priority service). The service QoS information includes a combination of one or more of the following requirements: access delay tolerance, guaranteed traffic, and allowed bit error rate. For example, the access delay can be set as follows: Two levels: sensitive to access delay and insensitive to access delay; multi-level: high access delay sensitivity, access delay sensitivity, and access delay sensitivity Low; can also be a combination of multiple QoS requirements, such as: high access delay sensitivity + low guaranteed traffic + low error rate requirements; or, access delay sensitivity + high guaranteed traffic + low error rate requirements The QoS can also be divided into more detailed levels. The service model information in this embodiment refers to a data communication model of a service, and includes a combination of one or more of the following features: data interaction periodicity (whether periodic data interaction), data interaction frequency, data volume size, Data interaction direction (refer to the above data, or the following line data, or the uplink and downlink traffic are similar). For example: information including only one feature: small data service model, or high-frequency business model, or periodic business model; information including multiple characteristics: periodic small data service model, low-frequency periodic small data reporting, Very low frequency periodic small data reporting, extremely high frequency periodic small data interaction model, medium frequency aperiodic big data downlink model. The correspondence between the specific service type and the service model is pre-agreed or contracted by the network side and the user equipment. The type of the access control object may be in various forms, that is, the type of the access control object may be one or more of the above types, or a combination of multiple types. For example: Combine the terminal priority information (taking two priorities as an example) with the PLMN information of the terminal, as shown in Table 1: Table 1
Figure imgf000013_0001
Figure imgf000013_0001
本实施例的终端根据自身所属的接入控制对象类型, 采取相应的接入控制措施, 更加灵活准确地进行接入控制, 解决了由于现行接入控制机制不能有效应对或避免 The terminal in this embodiment adopts corresponding access control measures according to the type of the access control object to which the terminal belongs, and performs access control more flexibly and accurately, thereby solving the problem that the current access control mechanism cannot effectively cope or avoid
M2M终端大量接入导致的网络拥塞, 从而影响通信质量的问题, 有效地保护网络, 保 证了通信质量。 实施例 3 图 4示出了根据本发明实施例 3的终端的结构框图, 该终端包括: 接收模块 40、 信息获取模块 42与接入控制模块 44, 其功能如下: 接收模块 40, 设置为接收来自网络侧发送的接入控制对象类型, 以及接入控制对 象类型对应的接入控制信息; 信息获取模块 42, 与接收模块 40相连, 设置为需要进行接入时, 根据自身所属 的接入控制对象类型,并且根据网络侧发送的接入控制对象类型对应的接入控制信息, 获取该终端对应的接入控制信息, 其中, 接入控制信息用于指示是否允许终端接入或 者指示终端按比例进行接入; 其中, 接入控制对象类型至少包括以下之一: 终端类型信息、 终端优先级信息、 终端分组信息、终端的公共陆地移动网络(PLMN, Public Land Mobile Network)信息、 业务优先级信息、 业务服务质量(QoS, Quality of Service)信息、 或者业务模型信息。 本实施例的这些信息的具体内容如下: The network congestion caused by a large number of M2M terminals affects the communication quality, effectively protects the network, and ensures communication quality. Embodiment 3 FIG. 4 is a structural block diagram of a terminal according to Embodiment 3 of the present invention. The terminal includes: a receiving module 40, an information acquiring module 42 and an access control module 44, and the functions thereof are as follows: The receiving module 40 is configured to receive The access control object type sent from the network side, and the access control information corresponding to the access control object type; the information obtaining module 42 is connected to the receiving module 40, and is set to access the access control according to the access control module Obtaining access control information corresponding to the terminal according to the access control information corresponding to the access control object type sent by the network side, where the access control information is used to indicate whether the terminal is allowed to access or indicate the proportion of the terminal. The access control object type includes at least one of the following: terminal type information, terminal priority information, terminal group information, and a public land mobile network (PLMN) information of the terminal, Service priority information, QoS (Quality of Service) information, or business model information. The specific contents of the information of this embodiment are as follows:
1 ) 终端类型信息包括: H2H终端、 M2M终端或者其它类型终端; 1) The terminal type information includes: an H2H terminal, an M2M terminal, or another type of terminal;
2)终端优先级信息为与网络约定或签约的终端的优先级, 该终端优先级信息可以 用终端的优先级序号或者终端的优先级标识表示; 2) The terminal priority information is the priority of the terminal that is agreed with or signed by the network, and the terminal priority information may be represented by the priority number of the terminal or the priority identifier of the terminal;
3 ) 终端分组信息指终端分组 (group) 的标识, 该终端分组信息可以用终端的分 组序号或者终端的分组标识表示; 3) The terminal grouping information refers to an identifier of a terminal group (group), and the terminal grouping information may be represented by a group serial number of the terminal or a group identifier of the terminal;
4)终端的 PLMN信息指终端所处的 PLMN的信息,终端的 PLMN信息可以包括: 处于 HPLMN (Home Public Land Mobile Network, 本地公用陆地移动网络) 的终端、 没有处于 HPLMN 的终端、 没有处于 HPLMN 或者等价 PLMN 的终端、 没有处于 HPLMN或者 (U)SIM中 PLMN列表中的 PLMN的终端; 4) The PLMN information of the terminal refers to the information of the PLMN where the terminal is located, and the PLMN information of the terminal may include: a terminal in the HPLMN (Home Public Land Mobile Network), a terminal not in the HPLMN, not in the HPLMN or a terminal of an equivalent PLMN, a terminal of a PLMN that is not in the HPLMN or a PLMN list in the (U)SIM;
5 ) 业务优先级信息是指事先与网络侧约定好, 或者签约的业务的优先级, 包括: 优先级序号, 或者优先级标识; 5) The service priority information refers to the prior agreement with the network side, or the priority of the contracted service, including: the priority sequence number, or the priority identifier;
6) 业务 QoS信息包括下述要求的一种或多种的组合: 接入延迟的容忍度、 保证 的流量、 容许的误码率; 该业务 QoS信息可以是分级别的; 6) Service QoS information includes one or more combinations of the following requirements: access delay tolerance, guaranteed traffic, and allowed bit error rate; the service QoS information may be hierarchical;
7) 业务模型信息是指业务的数据通讯模型, 包括下述特征的一种或多种的组合: 数据交互周期性(是否是周期性数据交互)、 数据交互频度、 数据量大小、 数据交互方 向 (指以上行数据为主、 或以下行数据为主、 或上下行流量相近)。 接入控制模块 44, 与信息获取模块 42相连, 设置为根据信息获取模块 42获取的 接入控制信息进行接入控制。 接收模块 40包括: 监听单元, 设置为监听来自网络侧的系统消息或寻呼消息, 其 中, 系统消息或寻呼消息中携带有网络侧发送的接入控制对象类型, 以及接入控制对 象类型对应的接入控制信息。 本发明实施例中的接入控制信息可以是指示终端是否能够发起接入的信息, 或者 是指示终端按比例接入的信息。 根据接入控制信息的不同, 接入控制的具体实现也可 以不同, 具体方式如下: 方式一, 接入控制模块 44包括: 第一信息确定单元, 设置为确定接入控制信息采 用标志位或者指示符指示是否允许终端接入; 第一接入控制单元, 设置为根据接入控 制信息确定允许该终端接入时, 控制该终端发起随机接入; 第二接入控制单元, 设置 为根据接入控制信息确定不允许该终端接入时, 控制该终端不能发起随机接入。 上述方式一中, 如果终端不能发起随机接入, 终端将会通过上述监听单元监听来 自网络侧的系统消息或寻呼消息, 从系统消息或寻呼消息获取下一个接入控制信息, 根据下一个接入控制信息再次进行接入控制。 方式二, 接入控制模块 44包括: 第二信息确定单元, 设置为确定上述接入控制信 息是否采用接入控制因子和接入控制时延指示终端按比例进行接入; 比较单元, 设置 为上述第二信息确定单元确定的结果为是时, 产生一个随机数, 将随机数与接入控制 因子进行比较; 第三接入控制单元, 设置为如果比较单元的比较结果为随机数小于接 入控制因子, 控制该终端发起随机接入; 第四接入控制单元, 设置为如果比较单元的 比较结果为随机数大于或等于接入控制因子, 控制该终端不能发起随机接入。 基于上述方式二, 该终端还包括: 延时触发模块, 设置为该终端不能发起随机接 入时, 根据接入控制时延产生延时时间, 延时时间达到后, 触发接入控制模块 44进行 接入控制。 参见图 5, 本实施例还提供了一种终端接入的控制系统, 包括网络侧设备 52和终 端 54,终端 54可以按照上述图 4所示终端实现,这里不再赘述, 网络侧设备 52包括: 发送模块, 设置为向终端 54发送接入控制对象类型, 以及接入控制对象类型对应 的接入控制信息。 本实施例的终端根据自身所属的接入控制对象类型, 采取相应的接入控制措施, 更加灵活准确地进行接入控制, 解决了由于现行接入控制机制不能有效应对或避免 M2M终端大量接入导致的网络拥塞, 从而影响通信质量的问题, 有效地保护网络, 保 证通信质量。 以上实施例的终端通过先确定接入控制对象类型, 再确定相应的接入控 制措施, 更加灵活准确地进行接入控制, 解决了由于现行接入控制机制不能有效应对 或避免 M2M终端大量接入导致的网络拥塞, 从而影响通信质量的问题, 有效地保护 网络, 保证通信质量。 显然, 本领域的技术人员应该明白, 上述的本发明的各模块或各步骤可以用通用 的计算装置来实现, 它们可以集中在单个的计算装置上, 或者分布在多个计算装置所 组成的网络上, 可选地, 它们可以用计算装置可执行的程序代码来实现, 从而, 可以 将它们存储在存储装置中由计算装置来执行, 并且在某些情况下, 可以以不同于此处 的顺序执行所示出或描述的步骤, 或者将它们分别制作成各个集成电路模块, 或者将 它们中的多个模块或步骤制作成单个集成电路模块来实现。 这样, 本发明不限制于任 何特定的硬件和软件结合。 以上所述仅为本发明的优选实施例而已, 并不用于限制本发明, 对于本领域的技 术人员来说, 本发明可以有各种更改和变化。 凡在本发明的精神和原则之内, 所作的 任何修改、 等同替换、 改进等, 均应包含在本发明的保护范围之内。 7) Business model information refers to the data communication model of the business, including one or more combinations of the following characteristics: data interaction periodicity (whether it is periodic data interaction), data interaction frequency, data volume size, data interaction Direction (refer to the above data, or the following data, or the upstream and downstream traffic are similar). The access control module 44 is connected to the information acquiring module 42 and configured to perform access control according to the access control information acquired by the information acquiring module 42. The receiving module 40 includes: a monitoring unit, configured to monitor a system message or a paging message from the network side, where the system message or the paging message carries an access control object type sent by the network side, and the access control object type corresponds to Access control information. The access control information in the embodiment of the present invention may be information indicating whether the terminal can initiate an access, or information indicating that the terminal is proportionally accessed. The specific implementation of the access control may be different according to the access control information. The specific manner is as follows: In the first manner, the access control module 44 includes: a first information determining unit, configured to determine that the access control information uses a flag bit or an indication. Indicates whether the terminal is allowed to access; the first access control unit is set to be based on the access control When the system determines that the terminal is allowed to access, the terminal controls the terminal to initiate random access; and the second access control unit is configured to control the terminal not to initiate random access when the terminal is not allowed to access according to the access control information. In the foregoing manner 1, if the terminal cannot initiate random access, the terminal will listen to the system message or the paging message from the network side through the foregoing listening unit, and acquire the next access control information from the system message or the paging message, according to the next The access control information is again subjected to access control. In the second mode, the access control module 44 includes: a second information determining unit, configured to determine whether the access control information uses an access control factor and an access control delay to instruct the terminal to access proportionally; and the comparing unit is configured as described above When the result determined by the second information determining unit is YES, a random number is generated, and the random number is compared with the access control factor; and the third access control unit is set to be that if the comparison result of the comparing unit is a random number smaller than the access control The terminal controls the terminal to initiate random access; and the fourth access control unit is configured to control the terminal not to initiate random access if the comparison result of the comparing unit is that the random number is greater than or equal to the access control factor. According to the foregoing manner, the terminal further includes: a delay triggering module, configured to generate a delay time according to the access control delay when the terminal cannot initiate random access, and trigger the access control module 44 to perform the delay time after the delay time is reached. Access control. Referring to FIG. 5, the embodiment further provides a terminal access control system, which includes a network side device 52 and a terminal 54. The terminal 54 can be implemented according to the terminal shown in FIG. 4, and details are not described herein again. The network side device 52 includes The sending module is configured to send the access control object type to the terminal 54 and the access control information corresponding to the access control object type. The terminal in this embodiment adopts the corresponding access control measures according to the type of the access control object to which the terminal belongs, and performs the access control more flexibly and accurately, and solves the problem that the current access control mechanism cannot effectively cope with or avoid the M2M terminal accessing a large amount. The resulting network congestion, which affects the quality of communication, effectively protects the network and ensures communication quality. The terminal in the above embodiment determines the type of the access control object first, and then determines the corresponding access control measures to perform the access control more flexibly and accurately, and solves the problem that the current access control mechanism cannot effectively cope with or avoid the M2M terminal accessing a large amount. The resulting network congestion, which affects the quality of communication, effectively protects the network and ensures communication quality. Obviously, those skilled in the art should understand that the above modules or steps of the present invention can be implemented by a general-purpose computing device, which can be concentrated on a single computing device or distributed over a network composed of multiple computing devices. Alternatively, they may be implemented by program code executable by the computing device, such that they may be stored in the storage device by the computing device and, in some cases, may be different from the order herein. Perform the steps shown or described, or separate them into individual integrated circuit modules, or Multiple of these modules or steps are fabricated as a single integrated circuit module. Thus, the invention is not limited to any specific combination of hardware and software. The above is only the preferred embodiment of the present invention, and is not intended to limit the present invention, and various modifications and changes can be made to the present invention. Any modifications, equivalent substitutions, improvements, etc. made within the spirit and scope of the present invention are intended to be included within the scope of the present invention.

Claims

权 利 要 求 书 Claim
1. 一种终端接入的控制方法, 包括: A method for controlling terminal access, comprising:
网络侧向终端发送接入控制对象类型, 以及所述接入控制对象类型对应的 接入控制信息;  The network side terminal sends an access control object type, and access control information corresponding to the access control object type;
所述终端需要进行接入时, 根据自身所属的接入控制对象类型, 并且根据 所述网络侧发送的接入控制对象类型对应的接入控制信息, 获取所述终端对应 的接入控制信息, 其中, 所述接入控制信息用于指示是否允许所述终端接入或 者指示所述终端按比例进行接入;  When the terminal needs to perform access, according to the type of the access control object to which the terminal belongs, and obtain the access control information corresponding to the terminal according to the access control information corresponding to the access control object type sent by the network side, The access control information is used to indicate whether the terminal is allowed to access or instruct the terminal to access in proportion;
所述终端根据获取的所述接入控制信息进行接入控制。  The terminal performs access control according to the obtained access control information.
2. 根据权利要求 1所述的方法,其中,所述接入控制对象类型至少包括以下之一: 2. The method of claim 1, wherein the access control object type comprises at least one of the following:
终端类型信息、 终端优先级信息、 终端分组信息、 终端的公共陆地移动网 络 PLMN信息、 业务优先级信息、 业务服务质量 QoS信息、 或者业务模型信 息;  Terminal type information, terminal priority information, terminal grouping information, public land mobile network PLMN information of the terminal, service priority information, service quality of service QoS information, or service model information;
其中, 所述终端优先级信息指所述终端与网络侧约定终端的优先级; 所述终端分组信息指终端分组的标识;  The terminal priority information refers to a priority of the terminal and the network side to appoint a terminal; the terminal group information refers to an identifier of the terminal group;
所述业务优先级信息指所述终端与网络侧约定的业务的优先级; 所述业务模型信息指业务的数据通讯模型, 至少包括以下之一: 数据交互 周期性、 数据交互频度、 数据量大小、 数据交互方向。  The service priority information refers to a priority of the service agreed by the terminal and the network side; the service model information refers to a data communication model of the service, and includes at least one of the following: data interaction periodicity, data interaction frequency, data volume Size, data interaction direction.
3. 根据权利要求 1所述的方法, 其中, 3. The method according to claim 1, wherein
所述网络侧向终端发送接入控制对象类型, 以及所述接入控制对象类型对 应的接入控制信息包括: 网络侧向终端发送系统消息或寻呼消息, 其中, 所述 系统消息或寻呼消息中携带有接入控制对象类型, 以及所述接入控制对象类型 对应的接入控制信息;  The network side terminal sends an access control object type, and the access control information corresponding to the access control object type includes: the network side sends a system message or a paging message to the terminal, where the system message or paging The message carries an access control object type, and access control information corresponding to the access control object type;
所述终端根据自身所属的接入控制对象类型, 并且根据所述网络侧发送的 接入控制对象类型对应的接入控制信息, 获取所述终端对应的接入控制信息之 前,所述方法包括:所述终端监听来自所述网络侧的所述系统消息或寻呼消息, 从所述系统消息或寻呼消息中获取所述接入控制对象类型, 以及所述接入控制 对象类型对应的接入控制信息。 Before the terminal obtains the access control information corresponding to the terminal according to the type of the access control object to which the terminal belongs, and according to the access control information corresponding to the access control object type sent by the network side, the method includes: The terminal monitors the system message or the paging message from the network side, and obtains the access control object type from the system message or the paging message, and the access corresponding to the access control object type Control information.
4. 根据权利要求 1所述的方法, 其中, 所述用于指示是否允许终端接入的接入控 制信息为标志位或者指示符; 所述终端根据获取的所述接入控制信息进行接入 控制包括: The method according to claim 1, wherein the access control information used to indicate whether the terminal is allowed to access is a flag bit or an indicator; the terminal accesses according to the obtained access control information. Controls include:
所述终端根据所述接入控制信息确定允许所述终端接入时, 所述终端发起 随机接入;  When the terminal determines, according to the access control information, that the terminal is allowed to access, the terminal initiates random access;
所述终端根据所述接入控制信息确定不允许所述终端接入时, 所述终端不 能发起随机接入。  When the terminal determines, according to the access control information, that the terminal is not allowed to access, the terminal cannot initiate random access.
5. 根据权利要求 4所述的方法, 其中, 所述终端不能发起随机接入之后, 所述方 法包括: The method according to claim 4, wherein after the terminal cannot initiate random access, the method includes:
所述终端监听来自网络侧的系统消息或寻呼消息, 从所述系统消息或寻呼 消息获取下一个接入控制信息, 根据获取的所述下一个接入控制信息进行接入 控制。  The terminal monitors a system message or a paging message from the network side, acquires the next access control information from the system message or the paging message, and performs access control according to the obtained next access control information.
6. 根据权利要求 1所述的方法, 其中, 所述用于指示所述终端按比例进行接入的 接入控制信息是接入控制因子和接入控制时延; 所述终端根据获取的所述接入 控制信息进行接入控制包括: The method according to claim 1, wherein the access control information used to indicate that the terminal accesses in proportion is an access control factor and an access control delay; The access control information for access control includes:
所述终端产生一个随机数, 将所述随机数与所述接入控制因子进行比较; 如果所述随机数小于所述接入控制因子, 所述终端发起随机接入; 如果所述随机数大于或等于所述接入控制因子, 所述终端不能发起随机接 入。  The terminal generates a random number, and compares the random number with the access control factor; if the random number is smaller than the access control factor, the terminal initiates random access; if the random number is greater than Or equal to the access control factor, the terminal cannot initiate random access.
7. 根据权利要求 6所述的方法, 其中, 所述终端不能发起随机接入之后, 所述方 法包括: The method according to claim 6, wherein after the terminal cannot initiate random access, the method includes:
所述终端根据所述接入控制时延产生延时时间, 所述延时时间达到后, 所 述终端再次进行所述接入控制。  The terminal generates a delay time according to the access control delay. After the delay time is reached, the terminal performs the access control again.
8. 一种终端, 包括: 8. A terminal comprising:
接收模块, 设置为接收网络侧发送的接入控制对象类型, 以及所述接入控 制对象类型对应的接入控制信息;  a receiving module, configured to receive an access control object type sent by the network side, and access control information corresponding to the access control object type;
信息获取模块, 设置为需要进行接入时, 根据自身所属的接入控制对象类 型, 并且根据所述网络侧发送的接入控制对象类型对应的接入控制信息, 获取 所述终端对应的接入控制信息, 其中, 所述接入控制信息用于指示是否允许所 述终端接入或者指示所述终端按比例进行接入; The information acquisition module is configured to acquire, according to the type of the access control object to which the network access side belongs, and the access control information corresponding to the type of the access control object sent by the network side, The access control information corresponding to the terminal, where the access control information is used to indicate whether the terminal is allowed to access or instruct the terminal to access in proportion;
接入控制模块, 设置为根据所述信息获取模块获取的所述接入控制信息进 行接入控制。  The access control module is configured to perform access control according to the access control information acquired by the information acquiring module.
9. 根据权利要求 8所述的终端, 其中, 9. The terminal according to claim 8, wherein
所述接收模块包括: 监听单元, 设置为监听来自网络侧的系统消息或寻呼 消息, 其中, 所述系统消息或寻呼消息中携带有所述网络侧发送的接入控制对 象类型, 以及所述接入控制对象类型对应的接入控制信息。  The receiving module includes: a monitoring unit, configured to monitor a system message or a paging message from the network side, where the system message or the paging message carries an access control object type sent by the network side, and a The access control information corresponding to the access control object type.
10. 根据权利要求 8所述的终端, 其中, 所述接入控制模块包括: 第一信息确定单元, 设置为确定所述接入控制信息采用标志位或者指示符 指示是否允许所述终端接入; The terminal according to claim 8, wherein the access control module comprises: a first information determining unit, configured to determine that the access control information uses a flag bit or an indicator to indicate whether the terminal is allowed to access ;
第一接入控制单元, 设置为根据所述接入控制信息确定允许所述终端接入 时, 控制所述终端发起随机接入;  And the first access control unit is configured to: when determining, according to the access control information, that the terminal is allowed to access, controlling the terminal to initiate random access;
第二接入控制单元, 设置为根据所述接入控制信息确定不允许所述终端接 入时, 控制所述终端不能发起随机接入。  The second access control unit is configured to control, when the terminal is not allowed to access according to the access control information, to control that the terminal cannot initiate random access.
11. 根据权利要求 8所述的终端, 其中, 所述接入控制模块包括: 第二信息确定单元, 设置为确定所述接入控制信息是否采用接入控制因子 和接入控制时延指示所述终端按比例进行接入; The terminal according to claim 8, wherein the access control module comprises: a second information determining unit, configured to determine whether the access control information adopts an access control factor and an access control delay indication Said terminal is connected in proportion;
比较单元, 设置为所述第二信息确定单元确定的结果为是时, 产生一个随 机数, 将所述随机数与所述接入控制因子进行比较;  a comparing unit, configured to: when the result determined by the second information determining unit is YES, generate a random number, and compare the random number with the access control factor;
第三接入控制单元, 设置为如果所述比较单元的比较结果为所述随机数小 于所述接入控制因子, 控制所述终端发起随机接入;  a third access control unit, configured to control the terminal to initiate random access if the comparison result of the comparing unit is that the random number is less than the access control factor;
第四接入控制单元, 设置为如果所述比较单元的比较结果为所述随机数大 于或等于所述接入控制因子, 控制所述终端不能发起随机接入。  And a fourth access control unit, configured to control the terminal not to initiate random access if the comparison result of the comparing unit is that the random number is greater than or equal to the access control factor.
12. 根据权利要求 11所述的终端, 其中, 所述终端还包括: The terminal according to claim 11, wherein the terminal further comprises:
延时触发模块, 设置为所述终端不能发起随机接入时, 根据所述接入控制 时延产生延时时间, 所述延时时间达到后, 触发所述接入控制模块进行所述接 入控制。 The delay triggering module is configured to generate a delay time according to the access control delay when the terminal cannot initiate random access, and after the delay time is reached, trigger the access control module to perform the access control.
13. 一种终端接入的控制系统, 包括网络侧设备和终端, 所述终端为权利要求 8-12 任一项所述的终端, 所述网络侧设备包括: A terminal access control system, comprising: a network side device and a terminal, wherein the terminal is the terminal according to any one of claims 8 to 12, and the network side device comprises:
发送模块, 设置为向所述终端发送接入控制对象类型, 以及所述接入控制 对象类型对应的接入控制信息。  And a sending module, configured to send, to the terminal, an access control object type, and access control information corresponding to the access control object type.
PCT/CN2011/078720 2010-11-04 2011-08-22 Method, terminal, and system for controlling terminal access WO2012058970A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201010532883.2A CN102469547B (en) 2010-11-04 2010-11-04 Method, terminal and system for controlling terminal access
CN201010532883.2 2010-11-04

Publications (1)

Publication Number Publication Date
WO2012058970A1 true WO2012058970A1 (en) 2012-05-10

Family

ID=46023989

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2011/078720 WO2012058970A1 (en) 2010-11-04 2011-08-22 Method, terminal, and system for controlling terminal access

Country Status (2)

Country Link
CN (1) CN102469547B (en)
WO (1) WO2012058970A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103828406A (en) * 2012-09-21 2014-05-28 华为技术有限公司 Method and device for transmitting public message

Families Citing this family (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103929776B (en) * 2013-01-14 2018-03-23 中兴通讯股份有限公司 A kind of jamming control method and device of MTC device access network
WO2015024214A1 (en) * 2013-08-21 2015-02-26 华为技术有限公司 Random access method and related device
CN104640152B (en) 2013-11-12 2019-05-14 中兴通讯股份有限公司 A kind of method and device that M2M coexists with H2H business
CN104980951A (en) * 2014-04-11 2015-10-14 中兴通讯股份有限公司 Transmission method and device, and monitoring method and device of monitored information
CN106941656A (en) * 2016-01-05 2017-07-11 中兴通讯股份有限公司 The method and device of Business Processing
CN106034328B (en) * 2016-05-11 2019-08-23 西安交通大学 Connection control method towards differentiated service coexistence scenario in wireless medical networks
CN107404748B (en) * 2016-05-19 2021-11-02 中兴通讯股份有限公司 Equipment access method and device
CN107566325A (en) * 2016-07-01 2018-01-09 中兴通讯股份有限公司 Access the method and device of network
CN105959978B (en) * 2016-07-12 2019-04-16 北京理工大学 A kind of flood tide M2M communication grouping accessing method based on LTE
CN107889186B (en) 2016-09-30 2021-01-12 华为技术有限公司 Access control method, terminal equipment and wireless access network equipment
CN106657364B (en) * 2016-12-30 2020-05-08 南京蔚蓝智能科技有限公司 Internet of things device and gateway device
CN108282751A (en) * 2017-01-06 2018-07-13 电信科学技术研究院 A kind of connection control method and device
CN107248961A (en) * 2017-06-23 2017-10-13 深圳市盛路物联通讯技术有限公司 A kind of management method and management system of Internet of Things data flow
CN107820309B (en) * 2017-12-14 2020-09-15 石家庄科林电气股份有限公司 Wake-up strategy and time slot optimization algorithm for low-power-consumption communication equipment
CN110572801B (en) * 2019-08-29 2021-06-25 西安电子科技大学 Method for establishing mMTC (machine type communication) service flow model
CN113630840B (en) * 2020-05-06 2023-04-18 大唐移动通信设备有限公司 SNPN cell access method, device and storage medium
CN111740886A (en) * 2020-06-12 2020-10-02 青岛恒星科技学院 5G Internet of things power acquisition terminal access control method
CN112020879B (en) * 2020-07-23 2023-12-05 北京小米移动软件有限公司 Access control method and device and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101345988A (en) * 2007-07-13 2009-01-14 大唐移动通信设备有限公司 Resource allocation method and device of multi-carrier system
CN102045810A (en) * 2009-10-09 2011-05-04 华为技术有限公司 Method, device and system for accessing machine type communication terminal equipment to network

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100761700B1 (en) * 2006-01-26 2007-09-28 삼성전자주식회사 Method for connecting signal in mobile communication terminal

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101345988A (en) * 2007-07-13 2009-01-14 大唐移动通信设备有限公司 Resource allocation method and device of multi-carrier system
CN102045810A (en) * 2009-10-09 2011-05-04 华为技术有限公司 Method, device and system for accessing machine type communication terminal equipment to network

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
CATT: "Access control of MTC devices", 3GPP TSG RAN WG2 MEETING #68BIS R2-100182, 22 January 2010 (2010-01-22), VALENCIA, SPAIN *
ZTE: "RAN Control with Access Priority", 3GPP TSG SA WG2 MEETING #79E (ELECTRONIC) TD2-103124, 13 July 2010 (2010-07-13), ELBONIA *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103828406A (en) * 2012-09-21 2014-05-28 华为技术有限公司 Method and device for transmitting public message
US9729339B2 (en) 2012-09-21 2017-08-08 Huawei Technologies Co., Ltd. Transmission method for common message and device
CN103828406B (en) * 2012-09-21 2018-09-21 华为技术有限公司 A kind of transmission method and device of public message
US10116459B2 (en) 2012-09-21 2018-10-30 Huawei Technologies Co., Ltd. Transmission method for common message and device
US10581628B2 (en) 2012-09-21 2020-03-03 Huawei Technologies Co., Ltd. Transmission method for common message and device
US11349681B2 (en) 2012-09-21 2022-05-31 Huawei Technologies Co., Ltd. Transmission method for common message and device

Also Published As

Publication number Publication date
CN102469547A (en) 2012-05-23
CN102469547B (en) 2014-07-02

Similar Documents

Publication Publication Date Title
WO2012058970A1 (en) Method, terminal, and system for controlling terminal access
US11503446B2 (en) Service capability exposure at the user equipment
US10681614B2 (en) Network-controlled adaptive terminal behavior managing high-network-load scenarios
JP5758503B2 (en) Terminal access method and apparatus
EP2537366B1 (en) Configuration of the operational state of delay-tolerant wireless devices based on network traffic level of a particular network sector
JP5690405B2 (en) Radio resource control method and system
US20110310731A1 (en) Controlling network resource usage of machine type communication (mtc) devices
BR112014003543B1 (en) Improved access control method for machine type communications
CN107409384B (en) Method and apparatus for transmitting channel state information
CN112087292B (en) Channel state measurement parameter indication method and device
US10122438B2 (en) Systems, methods and devices for modifying relay operation of a wireless device
EP2257100A1 (en) Re-transmission of service connection requests between radio network controllers
AU2017394025B2 (en) Access method, and terminal
WO2012058969A1 (en) Method and device for controlling radio resources
CN110139360B (en) Paging strategy determination method and device, RAN network element and core network element
TWI528745B (en) Base station, wireless end device, and transmission barring methods thereof
CN109413669B (en) Effective value determination method of network configuration parameters, related equipment and system
CN110545579B (en) Processing method, network side equipment and user equipment
US20220022021A1 (en) Communication method and device
US11102632B2 (en) Access mechanism for single purpose operation
CN112351470B (en) Access restriction detection method and device
CN114503467B (en) Data transmission method and device
WO2020156460A1 (en) Methods and nodes for ue-to-ue event monitoring
CN115299012A (en) QoS-based alternative charging handling
CN116455771A (en) Method and network node for QoS notification

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 11837496

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 11837496

Country of ref document: EP

Kind code of ref document: A1