CN103139868B - Control the method, apparatus and system accessed - Google Patents

Control the method, apparatus and system accessed Download PDF

Info

Publication number
CN103139868B
CN103139868B CN201110390152.3A CN201110390152A CN103139868B CN 103139868 B CN103139868 B CN 103139868B CN 201110390152 A CN201110390152 A CN 201110390152A CN 103139868 B CN103139868 B CN 103139868B
Authority
CN
China
Prior art keywords
access control
pdcch
control information
dci1a
scrambling
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201110390152.3A
Other languages
Chinese (zh)
Other versions
CN103139868A (en
Inventor
李龠
国炜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN201110390152.3A priority Critical patent/CN103139868B/en
Publication of CN103139868A publication Critical patent/CN103139868A/en
Application granted granted Critical
Publication of CN103139868B publication Critical patent/CN103139868B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention discloses a kind of method, apparatus and system controlling and accessing, belong to communication technical field.Described method includes: when network equipment needs carry out Access Control to the user equipment (UE) of configuration Access Control, Access Control information is carried in physical downlink control channel PDCCH, and scrambles described PDCCH;PDCCH after described scrambling is sent to described UE by described network equipment, after making described UE PDCCH after receiving described scrambling, the PDCCH after described scrambling is descrambled, obtain the described Access Control information after descrambling, so that described UE no longer asks and the connection of described network equipment according to described Access Control information.Access Control information is carried on PDCCH be handed down to UE by the present invention, UE is enable to receive control information timely, and stop the connection with network side, thus solve in traditional approach owing to the broadcast change cycle slowly causes the Access Control of UE to respond the problem affecting H2H user's communication quality slowly.

Description

Control the method, apparatus and system accessed
Technical field
The present invention relates to communication technical field, particularly to a kind of method, apparatus and system controlling and accessing.
Background technology
Development along with Internet of Things, M2M (MachinetoMachine, Internet of Things) quantity of equipment can become the hugest, these equipment can be combined closely with wireless communication technology, and obtain data by wireless connections or data are reported to control centre, substantial amounts of random or the cycle the reported data so coming from various concrete application can be generated, such as wireless watermeter ammeter, automatic vending machine, pos machine etc..Owing to these M2M number of devices are huge, and it is insensitive to time delay, so in order to not affect normal UE (UserEquipment, subscriber equipment) communication, the mainly communication of cellphone subscriber, need to concentrate initiation when of reporting, its access to be limited at M2M equipment, in case taking excess resource to affect normal UE communication.
ACB (the AccessClassBarring used in LTE system at present, access category limits) technology, concrete, when network side determines to carry out M2M equipment Access Control, Access Control information is broadcasted to UE, this Access Control information includes probability factor, and probability factor is for controlling the access of UE.Probability factor is set to 0.5 by such as network side, then by broadcast, this probability factor is notified randomly generate the random number of a 0-1, only random number to UE, UE more than 0.5, just can access, the most just forbid that accessing and keep out of the way a period of time again attempts to.Can effectively control the scale of UE that network is initiated to be accessed by this mode, in case the too much resource of M2M hold facility and affect normal UE communication.
But the change cycle of system broadcast message is slowly (being several seconds to tens seconds in usual system), even if causing network side to determine to carry out M2M equipment Access Control, M2M user also can initiate to access within the change cycle of broadcast, seize H2H (HumantoHuman, refer to existing cellphone subscriber) resource, may result in the network problems such as H2H conversation loss in phase at this moment, affect the speech quality of H2H user.
Summary of the invention
In order to solve the problem of H2H user's communication quality, embodiments provide a kind of method, apparatus and system controlling and accessing.Described technical scheme is as follows:
On the one hand, it is provided that a kind of method controlling to access, described method includes:
When network equipment needs that the user equipment (UE) of configuration Access Control is carried out Access Control, Access Control information is carried in physical downlink control channel PDCCH, and described PDCCH is scrambled;
PDCCH after described scrambling is sent to described UE by described network equipment, after making described UE PDCCH after receiving described scrambling, the PDCCH after described scrambling is descrambled, obtain the described Access Control information after descrambling, so that described UE no longer asks and the connection of described network equipment according to described Access Control information.
On the other hand, additionally providing a kind of method controlling and accessing, described method includes:
The user equipment (UE) of configuration Access Control receives the physical downlink control channel PDCCH after the scrambling that network equipment issues, and described PDCCH carries Access Control information;
PDCCH after described scrambling is descrambled, obtains the described Access Control information after descrambling;
No longer ask and the connection of described network equipment according to described Access Control information.
On the other hand, additionally providing a kind of network equipment, described equipment includes:
Carrier module, for when network equipment needs that the user equipment (UE) of configuration Access Control is carried out Access Control, being carried to Access Control information in physical downlink control channel PDCCH, and scramble described PDCCH;
Sending module, PDCCH after being scrambled by described carrier module is sent to described UE, after making described UE PDCCH after receiving described scrambling, the PDCCH after described scrambling is descrambled, obtain the described Access Control information after descrambling, so that described UE no longer asks and the connection of described network equipment according to described Access Control information.
On the other hand, additionally providing a kind of subscriber equipment configuring Access Control, described equipment includes:
Receiver module, the physical downlink control channel PDCCH after receiving the scrambling that network equipment issues, described PDCCH carries Access Control information;
Descrambling module, the PDCCH after the described scrambling receiving described receiver module descrambles, and obtains the described Access Control information after descrambling;
Disconnect module, no longer ask and the connection of described network equipment for the Access Control information obtained according to described descrambling module.
On the other hand, additionally providing a kind of system controlling and accessing, described system includes: network equipment as above and the subscriber equipment configuring Access Control as above.
The technical scheme that the embodiment of the present invention provides has the benefit that Access Control information is carried on PDCCH be handed down to be configured with the UE of Access Control by network equipment, UE is enable to timely receive Access Control information and no longer to ask the connection with network side according to control information in time, so make the UE being configured with Access Control will not take the resource of H2H user network congestion when, thus solve the UE being configured with Access Control in traditional approach and be also connected with network side in request within the change cycle of broadcast, seize H2H user resources, cause H2H conversation loss, thus the problem affecting H2H user's communication quality.
Accompanying drawing explanation
For the technical scheme being illustrated more clearly that in the embodiment of the present invention, in describing embodiment below, the required accompanying drawing used is briefly described, apparently, accompanying drawing in describing below is only some embodiments of the present invention, for those of ordinary skill in the art, on the premise of not paying creative work, it is also possible to obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 is a kind of method flow diagram controlling to access provided in the embodiment of the present invention;
Fig. 2 is a kind of method flow diagram controlling to access provided in the embodiment of the present invention;
Fig. 3 is a kind of method flow diagram controlling to access provided in the embodiment of the present invention;
Fig. 4 is the schematic diagram of a kind of network equipment provided in the embodiment of the present invention;
Fig. 5 is the schematic diagram of a kind of subscriber equipment provided in the embodiment of the present invention;
Fig. 6 is the schematic diagram of a kind of system controlling to access provided in the embodiment of the present invention.
Detailed description of the invention
For making the object, technical solutions and advantages of the present invention clearer, below in conjunction with accompanying drawing, embodiment of the present invention is described further in detail.
Before introducing the technical scheme that the present invention provides, first the rudimentary knowledge of the present invention is briefly described:
In LTE system, due to the difference of transmission mode or resource distribution mode etc., corresponding PDCCH (PhysicalDownlinkControlChannel, Physical Downlink Control Channel) have different DCI format, such as form 0,1A, 1B, 1C, 1D, 1,2,2A, 3,3A etc., the magnitude of load of the PDCCH of these DCI format is usually different, but the magnitude of load of some form such as 0/1A/3/3A is identical, and distinguishes according to the difference of the bit in signaling or scrambler.
In the present embodiment, in order to M2M user and H2H user be made a distinction, introduce EAB (EnhancedAccessBarring strengthens to access limiting) mechanism, i.e. for the specific probability factor of M2M user setup and Backoff time.According to the progress of current 3GPP, EAB information can be placed in system broadcasts SIB (Systeminformationblocks, system information block).But the change cycle of system broadcasts is slowly (being several seconds to tens seconds in usual system), even if causing network side to determine to carry out Access Control, EAB information still can not be known by M2M user in time, so M2M user still can initiate to access in longer what is called " reflecting time ", seize H2H resource, in phase at this moment, may result in the network problems such as H2H conversation loss.
The invention provides following example to solve the problems referred to above:
See Fig. 1, present embodiments provide a kind of method controlling and accessing, including:
101: when network equipment needs that the user equipment (UE) of configuration Access Control is carried out Access Control, Access Control information is carried in physical downlink control channel PDCCH, and described PDCCH is scrambled;
102: the PDCCH after described scrambling is sent to described UE by network equipment, after making described UE PDCCH after receiving described scrambling, the PDCCH after described scrambling is descrambled, obtain the described Access Control information after descrambling, so that described UE no longer asks and the connection of described network equipment according to described Access Control information.
In the present embodiment, alternatively, described PDCCH includes Downlink Control Information DCI1C or DCI1A, described Access Control information is carried in physical downlink control channel PDCCH, and scrambles described PDCCH, including:
Access Control information is carried on described DCI1C or DCI1A, and described DCI1C or described DCI1A is scrambled with the first identifier;
Correspondingly, in the present embodiment, the PDCCH after described scrambling is sent to described UE by described network equipment, including:
DCI1A after DCI1C after described scrambling or described scrambling is sent to described UE by described network equipment so that described UE can use DCI1C or DCI1A after the described first identifier described scrambling of monitoring in an idle state.
In the present embodiment, alternatively, described PDCCH includes the first DCI format, described Access Control information is carried in physical downlink control channel PDCCH, and scrambles described PDCCH, including:
Access Control information is carried in described first DCI format, and described first DCI format is scrambled with the second identifier;
Correspondingly, in the present embodiment, the PDCCH after described scrambling is sent to described UE by described network equipment, including:
The first DCI format after described scrambling is sent to described UE by described network equipment so that described UE can use the first DCI format after the described second identifier described scrambling of monitoring in an idle state.
In the present embodiment, alternatively, described PDCCH includes DCI1A, described Access Control information is carried in physical downlink control channel PDCCH, and scrambles described PDCCH, including:
Access Control information being carried on described DCI1A, and scramble described DCI1A paging wireless temporary identifier P-RNTI, described Access Control information is carried on the reserved bit position in the DCI1A after described scrambling;
Correspondingly, in the present embodiment, the PDCCH after described scrambling is sent to described UE by described network equipment, including:
DCI1A after described scrambling is sent to described UE by described network equipment so that described UE can use the DCI1A after the described P-RNTI described scrambling of monitoring in an idle state.
In the present embodiment, described Access Control information includes: probability factor and roaming kind, or described Access Control information includes: access grade restricted information and roaming kind.
The embodiment of the method that the present invention provides provides the benefit that: Access Control information is carried on PDCCH be handed down to be configured with the UE of Access Control by network equipment, UE is enable to timely receive Access Control information and no longer to ask the connection with network side according to control information in time, so make the UE being configured with Access Control will not take the resource of H2H user network congestion when, thus solve the UE being configured with Access Control in traditional approach and be also connected with network side in request within the change cycle of broadcast, seize H2H user resources, cause H2H conversation loss, thus the problem affecting H2H user's communication quality.
See Fig. 2, present embodiments provide a kind of method controlling and accessing, including:
201: the user equipment (UE) of configuration Access Control receives the physical downlink control channel PDCCH after the scrambling that network equipment issues, described PDCCH carries Access Control information;
202: the PDCCH after described scrambling is descrambled, obtain the described Access Control information after descrambling;
203: no longer ask and the connection of described network equipment according to described Access Control information.
Alternatively, in the present embodiment, the user equipment (UE) of described configuration Access Control receives the PDCCH after the scrambling that network equipment issues, and described PDCCH carries Access Control information and includes:
The user equipment (UE) of configuration Access Control receives the PDCCH after the scrambling that network equipment issues, described PDCCH includes Downlink Control Information DCI1C or DCI1A, described DCI1C or DCI1A scrambles with the first identifier, and described Access Control information is carried on described DCI1C or DCI1A;
Correspondingly, in the present embodiment, described described PDCCH is descrambled, obtain the described Access Control information after descrambling, including:
Judge whether described DCI1C or described DCI1A is with the first identifier scrambling, if it is read described DCI1C or described DCI1A, obtain Access Control information.
Alternatively, in the present embodiment, the user equipment (UE) of described configuration Access Control receives the PDCCH after the scrambling that network equipment issues, and described PDCCH carries Access Control information and includes:
PDCCH, described PDCCH after the user equipment (UE) of configuration Access Control receives the scrambling that network equipment issues include that a DCI, described first DCI format scramble with the second identifier, the Access Control information of carrying in described first DCI format;
Correspondingly, in the present embodiment, described described PDCCH is resolved, obtain the described Access Control information after descrambling, including:
Judge whether described first DCI format is with the second identifier scrambling, if it is read described first DCI format, obtain Access Control information.
Alternatively, in the present embodiment, the user equipment (UE) of described configuration Access Control receives the PDCCH after the scrambling that network equipment issues, and described PDCCH carries Access Control information and includes:
The user equipment (UE) of described configuration Access Control receives the PDCCH after the scrambling that network equipment issues, described PDCCH includes DCI1A paging wireless temporary identifier P-RNTI scrambling described in DCI1A, the Access Control information of carrying on reserved bit position in described DCI1A;
Correspondingly, in the present embodiment, described described PDCCH is resolved, obtain the described Access Control information after descrambling, including:
Judge whether described DCI1A scrambles with P-RNTI, if it is read the reserved bit position in described DCI1A, obtain Access Control information.
In the present embodiment, described Access Control information includes: probability factor and roaming kind, or described Access Control information includes: access grade restricted information and roaming kind.
The embodiment of the method that the present invention provides provides the benefit that: the UE being configured with Access Control can obtain Access Control information in time by the PDCCH carrying Access Control information that network equipment issues, and no longer ask the connection with network side according to control information, the UE being so configured with Access Control network congestion when would not take the resource of H2H user, thus solve the UE being configured with Access Control in traditional approach and be also connected with network side in request within the change cycle of broadcast, seize H2H user resources, cause H2H conversation loss, thus the problem affecting H2H user's communication quality.
See Fig. 3, present embodiments provide a kind of method controlling and accessing, including:
301: when network equipment needs that the user equipment (UE) of configuration Access Control is carried out Access Control, Access Control information is carried on PDCCH, and this PDCCH is scrambled.
In the present embodiment, introducing the first identifier, the first identifier can use EAB-RNTI (strengthen and access restriction identifier) to represent so that the UE being configured with EAB can use EAB-RNTI to monitor PDCCH under IDLE (idle) state.In the present embodiment, EAB-RNTI is a kind of representation of the first identifier, certainly can also with other identifier, existing identifier makes a distinction with prior art, this present embodiment is not specifically limited.
In the present embodiment, PDCCH includes DCI1C, network side uses EAB-RNTI scrambling to DCI1C, DCI1C after scrambling carries EAB information, in the present embodiment, multiplexing DCI1C goes to carry EAB information, needs to keep PDCCH to carry the in the same size of bit (bit) and common DCI1C, if carrying the cause not of uniform size of the DCI1C and common DCI1C of EAB information, then outside EAB information reserved bit to be added so that message length is identical with former DCI1C length.In the present embodiment, Access Control information is for controlling the connection of UE and the network side configuring Access Control, and wherein EAB information is the one of Access Control information, and in the present embodiment, network equipment broadcasts EAB information to the UE being configured with EAB.
In the present embodiment, PDCCH includes DCI1A, alternatively, network side uses EAB-RNTI scrambling to DCI1A, and the DCI1A after scrambling carries EAB information, in the present embodiment, multiplexing DCI1A goes to carry EAB information, be also required to keep PDCCH carrying bit (bit) and common DCI1A in the same size, if carrying the cause not of uniform size of the DCI1A and common DCI1A of EAB information, then outside EAB information reserved bit to be added so that message length is identical with former DCI1A length.
In the present embodiment, EAB information (i.e. Access Control information) comprises: EAB probability factor and roaming kind, or access grade restricted information and roaming kind.EAB information can also include further: controls information version and persistent period.Wherein, EAB probability factor/persistent period can be to be the form making index of reference.
302: the PDCCH after scrambling is sent to configure the UE of Access Control information by network equipment.
In the present embodiment, if EAB information is carried on DCI1A by network equipment, after then using EAB-RNTI that DCI1A is scrambled, DCI1A after scrambling is sent to be configured with the UE of Access Control, alternatively, in the present embodiment, if EAB information is carried on DCI1C by network equipment, after then using EAB-RNTI that DCI1C is scrambled, the DCI1C after scrambling is sent to be configured with the UE of Access Control.
303: after being configured with the UE of the Access Control PDCCH after receiving the scrambling that network equipment issues, the PDCCH after scrambling is descrambled to obtain Access Control information, and no longer asks the connection with network equipment according to Access Control information.
In the present embodiment, if EAB information is carried on DCI1A or DCI1C by network equipment, and use the first identifier that DCI1A or DCI1C is scrambled, described PDCCH is descrambled by the UE being then configured with EAB, obtain the described Access Control information after descrambling, including: judge whether described DCI1C or described DCI1A is with the first identifier scrambling, if it is read described DCI1C or described DCI1A, obtain Access Control information.
In the present embodiment, if EAB information is handed down to be configured with the UE of EAB by PDCCH corresponding for DCI1C by network side, when the UE being configured with EAB receives the CRC (CyclicRedundancyCheck of PDCCH, CRC) scramble with EAB-RNTI, then read N number of bit of PDCCH as EAB information, the process i.e. PDCCH resolved.
In the present embodiment, the UE being configured with EAB once receives the DCI1C of EAB-RNTI scrambling, access request the most whether is had to need to initiate, EAB information comes into force at once, the UE being configured with EAB disconnects according to EAB information or no longer request and the connection of network equipment, further, if EAB information includes the sustainable time, then timer starts timing, to record the controllable period of time of this UE being configured with EAB, so network side, if eNB (evolvedNodeB, Long-Term Evolution base station) is controlled to control turn-on time of UE.The up-to-date EAB information received as UE can cover before information, and timer restarts.After not receiving new EAB information and timer expired, it is believed that the most several times there is no EAB, access request can be initiated to network side.In the present embodiment, the UE not configuring EAB will not use EAB-RNTI to monitor PDCCH, so also can not receive foregoing.
In the present embodiment, be configured with the UE of EAB can additionally use EAB-RNTI to monitor PDCCH, DRX (DiscontinuousReception, discontinuous reception) cycle under IDLE state can be identical with pagingcycle, can also be other cycle, this present embodiment is not specifically limited.In the present embodiment, the UE of IDLE state needs to use EAB-RNTI to monitor whether PDCCH scheduled the beep-page message of oneself in real time, if each subframe is monitored, extremely serious to UE power consumption, so UE can be only at the monitoring paging that wakes up of some period of sub-frame, other moment enter sleep state, and the interval of the subframe that two of which monitors paging is exactly this pagingcycle.
In the present embodiment, introducing the first DCI format, PDCCH includes the first DCI format, i.e. creates a kind of new DCI1X, and wherein X is for distinguishing the form of existing DCI, and Access Control information can be carried in the first DCI format by network side alternatively.PDCCH length need not keep consistent with existing any DCI in this case, owing to introducing new DCI format for the UE being configured with EAB, so also without additionally introducing special EAB-RNTI, scrambling with existing RNTI, such as P-RNTI, SI-RNTI or RA-RNTI etc..DCI1X can be the first DCI format by the present embodiment, existing RNTI is as the second identifier, Access Control information is carried in the first DCI format by network equipment, use the second identifier that it is scrambled, and the first DCI format after scrambling is sent to be configured with the UE of Access Control so that the UE being configured with Access Control can use the second identifier to monitor the PDCCH after scrambling in an idle state.Correspondingly, it is configured with the UE of Access Control after receiving the first DCI format using the second identifier scrambling, described PDCCH is resolved, obtain the described Access Control information after descrambling, including: judge whether described first DCI format is with the second identifier scrambling, if it is read described first DCI format, obtain Access Control information.
In the present embodiment, at network side, DCI1X being used existing RNTI scrambling, DCI1X carries EAB information, and EAB information is handed down to UE by PDCCH corresponding for DCI1X by network side, scramble with existing RNTI when UE receives the CRC of PDCCH, then read N number of bit of PDCCH as EAB information.
Whether, in the present embodiment, the UE being configured with EAB once receives the DCI1X of existing RNTI scrambling, the most currently have access request to need to initiate, and EAB information comes into force at once, and timer starts timing, and such network side, as eNB is controlled for the time of its effect of EAB.The up-to-date EAB information received as UE can cover before information, and timer restarts.After not receiving new EAB information and timer expired, it is believed that the most several times there is no EAB, access request can be initiated to network side.
In the present embodiment, PDCCH includes DCI1A, and alternatively, Access Control information is carried on DCI1A by network equipment, uses P-RNTI to scramble DCI1A, and described Access Control information is carried on the reserved bit position in the DCI1A after described scrambling.In the present embodiment, use P-RNTI that CRC is scrambled in DCI1A, HARQ (HybridAutomaticRepeatRequest therein, hybrid automatic repeat-request) process number (3bits) is reserved, so i.e. can carry EAB information on reserved bit with the spare bits of this 3bit of multiplexing for the UE being configured with EAB.Such as can index with wherein 2 bit, the UE that representative is not prohibited by UE access, generation random number is less than 0.3 forbids that the UE that access, generation random number are less than 0.5 forbids that the UE that access, generation random number are less than 0.8 forbids access etc.;1 bit can also be separated and do the index of EAB time.If 3bit all makees probability factor index, then need one the EAB time of over-specification.
Except HARQ process, also has PUCCH (PhysicalUplinkControlCHannel, physical uplink control channel) bit in power control territory can use, for TDD system, it is also possible to the DownlinkAssignmentIndex (downlink indicator of distribution) of 2bit can use.
When network side determines to start EAB when, the reserved bit position of DCI1A carries EAB information, by PDCCH corresponding for DCI1A, EAB information is handed down to be configured with the UE of EAB, described PDCCH is resolved by the UE being correspondingly configured with EAB, obtain the described Access Control information after descrambling, including: judge whether described DCI1A scrambles with P-RNTI, if it is read the reserved bit position in described DCI1A, obtain Access Control information.In the present embodiment, it is configured with the UE of EAB, at any time receives the DCI1A of P-RNTI scrambling, all detect the 3bit in HARQ process number territory, and be considered as up-to-date EAB information.The up-to-date EAB information that UE receives can cover before information, and timer restarts.After not receiving new EAB information and timer expired, it is believed that there is no EAB, access request information can be initiated to network side.
In the present embodiment, require that eNB can not arbitrarily arrange the reserved bit position of DCI1A, need to be considered as EAB information and arrange, i.e. without EAB demand, again common UE is sent the DCI1A of P-RNTI scrambling, HARQ process number territory is set to the index being not prohibited by accessing.Wherein, common UE refers to not configure the UE of EAB.
The method of the Access Control that the embodiment of the present invention provides can coordinate with traditional EAB scheme based on SIB, it is also possible to individually becomes EAB scheme, as described below:
(1) when the present embodiment provides the method for Access Control and EAB scheme based on SIB coordinate:
In the present embodiment, when network side determines to start EAB when, send the quick EAB information of PDCCH so that the UE being configured with EAB stops accessing.Meanwhile, at next system broadcasts change cycle change SIB.EAB information in the PDCCH that UE receives is the most expired, when having read again EAB information based on SIB, is as the criterion with the EAB information of SIB, performs Access Control.EAB parameter/the intervalometer relevant to PDCCH all discharges.
In the present embodiment, connection for Quick stop UE, send PDCCH to UE, first terminate the access of UE, meanwhile, the broadcast of change system, in broadcast, add the strategy that network side is new, be broadcast to UE the most again, after UE receives broadcast, it is as the criterion with the information in broadcast, performs Access Control.The UE of configuration EAB is after receiving PDCCH and performing EAB, some variable and timer are assigned, such as access probability factor, also it is prohibited timer of time etc., so after hearing the EAB information of broadcast, will be all rinsing out according to the relevant assignment of the quick EAB of PDCCH reception before, assignment again.
(2) when the method controlling to access that the present embodiment provides is used alone:
In the present embodiment, PDCCH can be individually used to issue Access Control information, the PDCCH that UE only issues in this case based on network side.
But, after network side have sent the EAB that PDCCH carries, have UE access network that is that newly wake up up or that move to this community.These UE do not know before the EAB information that sends of PDCCH, it is believed that do not have EAB to control information, it is possible to normal access network.In this case, in community, real EAB access probability factor slowly can increase owing to community increases EABUE newly, the EAB probability factor carried in deviation PDCCH.After network side detects the change of access probability factor, can be according to self control algolithm, the in good time EAB parameter of transmission again, to solve the deviation of EAB probability factor.
The embodiment of the method that the present invention provides provides the benefit that: Access Control information is carried on PDCCH be handed down to be configured with the UE of Access Control by network equipment, UE is enable to timely receive Access Control information and no longer to ask the connection with network side according to control information in time, so make the UE being configured with Access Control will not take the resource of H2H user network congestion when, thus solve the UE being configured with Access Control in traditional approach and be also connected with network side in request within the change cycle of broadcast, seize H2H user resources, cause H2H conversation loss, thus the problem affecting H2H user's communication quality.Meanwhile, Access Control information can be handed down to UE by different DCI format, it is achieved convenient, easily operates.
Seeing Fig. 4, this enforcement provides a kind of network equipment, including: carrier module 401 and sending module 402.
Carrier module 401, for when network equipment needs to carry out getting involved control to the user equipment (UE) of configuration Access Control, being carried to Access Control information in physical downlink control channel PDCCH, and scramble described PDCCH;
Sending module 402, PDCCH after being scrambled by described carrier module 401 is sent to described UE, after making described UE PDCCH after receiving described scrambling, the PDCCH after described scrambling is descrambled, obtain the described Access Control information after descrambling, so that described UE no longer asks and the connection of described network equipment according to described Access Control information.
The most alternatively, described PDCCH includes Downlink Control Information DCI1C or DCI1A, described carrier module 401 specifically for: Access Control information is carried on described DCI1C or DCI1A, and described DCI1C or described DCI1A is scrambled with the first identifier;
Correspondingly, described sending module 402 is sent to described UE specifically for the DCI1A after DCI1C or the described scrambling after being scrambled by described carrier module 401 so that described UE can use DCI1C or DCI1A after the described first identifier described scrambling of monitoring in an idle state.
In the present embodiment, alternatively, described PDCCH includes the first DCI format, described carrier module 401 specifically for: Access Control information is carried in described first DCI format, and described first DCI format is scrambled with the second identifier;
Correspondingly, described sending module 402 is sent to described UE specifically for the first DCI format after being scrambled by described carrier module 401 so that described UE can use the first DCI format after the described second identifier described scrambling of monitoring in an idle state.
In the present embodiment alternatively, described PDCCH includes DCI1A, described carrier module 401 specifically for: Access Control information is carried in described first DCI format, and described DCI1A paging wireless temporary identifier P-RNTI is scrambled, described Access Control information is specifically carried on the reserved bit position in the DCI1A after described scrambling;
Correspondingly, described sending module 402 is sent to described UE specifically for the DCI1A after being scrambled by described carrier module 401 so that described UE can use the DCI1A after the described P-RNTI described scrambling of monitoring in an idle state.
In the present embodiment, described Access Control information includes: probability factor and roaming kind, or described Access Control information includes: access grade restricted information and roaming kind.
The apparatus embodiments that the present invention provides provides the benefit that: Access Control information is carried on PDCCH be handed down to be configured with the UE of Access Control by network equipment, UE is enable to timely receive Access Control information and no longer to ask the connection with network side according to control information in time, so make the UE being configured with Access Control will not take the resource of H2H user network congestion when, thus solve the UE being configured with Access Control in traditional approach and be also connected with network side in request within the change cycle of broadcast, seize H2H user resources, cause H2H conversation loss, thus the problem affecting H2H user's communication quality.
See Fig. 5, present embodiments provide a kind of subscriber equipment, including: receiver module 501, parsing module 502 and disconnection module 503.
Receiver module 501, the physical downlink control channel PDCCH after receiving the scrambling that network equipment issues, described PDCCH carries Access Control information;
Descrambling module 502, the PDCCH after the described scrambling receiving described receiver module 501 descrambles, and obtains the described Access Control information after descrambling;
Disconnect module 503, for no longer asking and the connection of described network equipment according to described descrambling module 502 Access Control information.
In the present embodiment, alternatively, described receiver module 501 scrambles with the first identifier specifically for DCI1A, described DCI1C or the described DCI1A after the DCI1C after receiving the scrambling that network equipment issues or scrambling, and described Access Control information is carried on described DCI1C or DCI1A;
Correspondingly, whether described DCI1C or the described DCI1A that described descrambling module 502 receives specifically for judging described receiver module 501 is with the first identifier scrambling, if it is reads described DCI1C or described DCI1A, obtains Access Control information.
In the present embodiment, alternatively, described receiver module 501 is specifically for receiving the first DCI format after the scrambling that issues of network equipment, and described first DCI format scrambles with the second identifier, the Access Control information that described first DCI format carries;
Correspondingly, whether described first DCI format that described descrambling module 502 receives specifically for judging described receiver module 501 is with the second identifier scrambling, if it is reads described first DCI format, obtains Access Control information.
In the present embodiment, alternatively, described receiver module 501 scrambles specifically for the DCI1A, described DCI1A paging wireless temporary identifier P-RNTI after receiving the scrambling that network equipment issues, the Access Control information of carrying on the reserved bit position in described DCI1A;
Correspondingly, whether the described DCI1A that described descrambling module concrete 502 receives for judging described receiver module 501 scrambles with P-RNTI, if it is reads the reserved bit position in described DCI1A, obtains Access Control information.
In the present embodiment, described Access Control information includes: probability factor and roaming kind, or described Access Control information includes: access grade restricted information and roaming kind.
The apparatus embodiments that the present invention provides provides the benefit that: the UE being configured with Access Control can obtain Access Control information in time by the PDCCH carrying Access Control information that network equipment issues, and no longer ask the connection with network side according to control information, the UE being so configured with Access Control network congestion when would not take the resource of H2H user, thus solve the UE being configured with Access Control in traditional approach and be also connected with network side in request within the change cycle of broadcast, seize H2H user resources, cause H2H conversation loss, thus the problem affecting H2H user's communication quality.
Seeing Fig. 6, the present embodiment additionally provides a kind of system controlling and accessing, and this system includes network equipment 400 as above and the UE500 configuring Access Control as above.
The system embodiment that the present invention provides provides the benefit that: the UE being configured with Access Control can obtain Access Control information in time by the PDCCH carrying Access Control information that network equipment issues, and no longer ask the connection with network side according to control information, the UE being so configured with Access Control network congestion when would not take the resource of H2H user, thus solve the UE being configured with Access Control in traditional approach and be also connected with network side in request within the change cycle of broadcast, seize H2H user resources, cause H2H conversation loss, thus the problem affecting H2H user's communication quality.
Network equipment, subscriber equipment and the system that the present embodiment provides, specifically can belong to same design with correspondingly embodiment of the method, and it implements process and refers to embodiment of the method, repeats no more here.
It should be noted that in above-mentioned subscriber equipment and network equipment embodiment, included modules is to carry out dividing according to function logic, but is not limited to above-mentioned division, as long as being capable of corresponding function;It addition, the specific name of each functional module is also only to facilitate mutually distinguish, it is not limited to protection scope of the present invention.
Additionally, one of ordinary skill in the art will appreciate that all or part of step realizing above-described embodiment can be completed by hardware, relevant hardware can also be instructed by program to complete, described program can be stored in a kind of computer-readable recording medium, storage medium mentioned above can be read only memory, disk or CD etc..
The foregoing is only presently preferred embodiments of the present invention, not in order to limit the present invention, all within the spirit and principles in the present invention, any modification, equivalent substitution and improvement etc. made, should be included within the scope of the present invention.

Claims (17)

1. the method controlling to access, it is characterised in that described method includes:
When network equipment needs that the user equipment (UE) of configuration Access Control is carried out Access Control, Access Control information is carried in physical downlink control channel PDCCH, and described PDCCH is scrambled, the PDCCH after being scrambled;
PDCCH after described scrambling is sent to described UE by described network equipment, after making described UE PDCCH after receiving described scrambling, the PDCCH after described scrambling is descrambled, obtain the described Access Control information after descrambling, so that described UE no longer asks and the connection of described network equipment according to described Access Control information;
Described PDCCH includes Downlink Control Information DCI1C or DCI1A, described Access Control information is carried in physical downlink control channel PDCCH, and scrambles described PDCCH, including:
Access Control information is carried on described DCI1C or DCI1A, and described DCI1C or described DCI1A is scrambled with the first identifier;
PDCCH after described scrambling is sent to described UE by described network equipment, including:
DCI1A after DCI1C after described scrambling or described scrambling is sent to described UE by described network equipment so that described UE can use DCI1C or DCI1A after the described first identifier described scrambling of monitoring in an idle state.
Method the most according to claim 1, it is characterised in that described PDCCH includes the first DCI format, described is carried to Access Control information in physical downlink control channel PDCCH, and scrambles described PDCCH, including:
Access Control information is carried in described first DCI format, and described first DCI format is scrambled with the second identifier;
PDCCH after described scrambling is sent to described UE by described network equipment, including:
The first DCI format after described scrambling is sent to described UE by described network equipment so that described UE can use the first DCI format after the described second identifier described scrambling of monitoring in an idle state.
Method the most according to claim 1, it is characterised in that described PDCCH includes DCI1A, described is carried to Access Control information in physical downlink control channel PDCCH, and scrambles described PDCCH, including:
Access Control information being carried on described DCI1A, and scramble described DCI1A paging wireless temporary identifier P-RNTI, described Access Control information is carried on the reserved bit position in the DCI1A after described scrambling;
PDCCH after described scrambling is sent to described UE by described network equipment, including:
DCI1A after described scrambling is sent to described UE by described network equipment so that described UE can use the DCI1A after the described P-RNTI described scrambling of monitoring in an idle state.
4. according to the method described in any one of claim 1-3, it is characterised in that described Access Control information includes: probability factor and roaming kind, or described Access Control information includes: access grade restricted information and roaming kind.
5. the method controlling to access, it is characterised in that described method includes:
The user equipment (UE) of configuration Access Control receives the physical downlink control channel PDCCH after the scrambling that network equipment issues, and described PDCCH carries Access Control information;
PDCCH after described scrambling is descrambled, obtains the described Access Control information after descrambling;
No longer ask and the connection of described network equipment according to described Access Control information;
The user equipment (UE) of described configuration Access Control receives the PDCCH after the scrambling that network equipment issues, and described PDCCH carries Access Control information and includes:
The user equipment (UE) of configuration Access Control receives the PDCCH after the scrambling that network equipment issues, described PDCCH includes Downlink Control Information DCI1C or DCI1A, described DCI1C or DCI1A scrambles with the first identifier, and described Access Control information is carried on described DCI1C or DCI1A;
Described described PDCCH is descrambled, obtain the described Access Control information after descrambling, including:
Judge whether described DCI1C or described DCI1A is with the first identifier scrambling, if it is read described DCI1C or described DCI1A, obtain Access Control information.
Method the most according to claim 5, it is characterised in that the user equipment (UE) of described configuration Access Control receives the PDCCH after the scrambling that network equipment issues, described PDCCH carries Access Control information and includes:
PDCCH, described PDCCH after the user equipment (UE) of configuration Access Control receives the scrambling that network equipment issues include that a DCI, described first DCI format scramble with the second identifier, and described first DCI format carries Access Control information;
Described described PDCCH is resolved, obtain the described Access Control information after descrambling, including:
Judge whether described first DCI format is with the second identifier scrambling, if it is read described first DCI format, obtain Access Control information.
Method the most according to claim 5, it is characterised in that the user equipment (UE) of described configuration Access Control receives the PDCCH after the scrambling that network equipment issues, described PDCCH carries Access Control information and includes:
The user equipment (UE) of described configuration Access Control receives the PDCCH after the scrambling that network equipment issues, described PDCCH includes DCI1A, described DCI1A paging wireless temporary identifier P-RNTI scrambles, and the reserved bit position in described DCI1A carries Access Control information;
Described described PDCCH is resolved, obtain the described Access Control information after descrambling, including:
Judge whether described DCI1A scrambles with P-RNTI, if it is read the reserved bit position in described DCI1A, obtain Access Control information.
8. according to the method described in any one of claim 5-7, it is characterised in that described Access Control information includes: probability factor and roaming kind, or described Access Control information includes: access grade restricted information and roaming kind.
9. a network equipment, it is characterised in that described equipment includes:
Carrier module, for when network equipment needs that the user equipment (UE) of configuration Access Control is carried out Access Control, Access Control information being carried in physical downlink control channel PDCCH, and described PDCCH is scrambled, the PDCCH after being scrambled;
Sending module, PDCCH after being scrambled by described carrier module is sent to described UE, after making described UE PDCCH after receiving described scrambling, the PDCCH after described scrambling is descrambled, obtain the described Access Control information after descrambling, so that described UE no longer asks and the connection of described network equipment according to described Access Control information;
Described PDCCH includes Downlink Control Information DCI1C or DCI1A, and described carrier module is specifically for being carried to Access Control information on described DCI1C or DCI1A, and scrambles described DCI1C or described DCI1A with the first identifier;
Described sending module is sent to described UE specifically for the DCI1A after DCI1C or the described scrambling after being scrambled by described carrier module so that described UE can use DCI1C or DCI1A after the described first identifier described scrambling of monitoring in an idle state.
Network equipment the most according to claim 9, it is characterized in that, described PDCCH includes the first DCI format, and described carrier module is specifically for being carried to Access Control information in described first DCI format, and scrambles described first DCI format with the second identifier;
Described sending module is sent to described UE specifically for the first DCI format after being scrambled by described carrier module so that described UE can use the first DCI format after the described second identifier described scrambling of monitoring in an idle state.
11. network equipments according to claim 9, it is characterized in that, described PDCCH includes DCI1A, described carrier module is specifically for being carried to Access Control information on described DCI1A, and described DCI1A paging wireless temporary identifier P-RNTI is scrambled, described Access Control information is specifically carried on the reserved bit position in the DCI1A after described scrambling;
Described sending module is sent to described UE specifically for the DCI1A after being scrambled by described carrier module so that described UE can use the DCI1A after the described P-RNTI described scrambling of monitoring in an idle state.
12. according to the network equipment described in any one of claim 9-11, it is characterised in that described Access Control information includes: probability factor and roaming kind, or described Access Control information includes: access grade restricted information and roaming kind.
13. 1 kinds of subscriber equipmenies configuring Access Control, it is characterised in that described subscriber equipment includes:
Receiver module, the physical downlink control channel PDCCH after receiving the scrambling that network equipment issues, described PDCCH carries Access Control information;
Descrambling module, the PDCCH after the described scrambling receiving described receiver module descrambles, and obtains the described Access Control information after descrambling;
Disconnect module, no longer ask and the connection of described network equipment for the Access Control information obtained according to described descrambling module;
Described receiver module scrambles with the first identifier specifically for DCI1A, described DCI1C or the described DCI1A after the DCI1C after receiving the scrambling that network equipment issues or scrambling, and described Access Control information is carried on described DCI1C or DCI1A;
Whether described DCI1C or the described DCI1A that described descrambling module receives specifically for judging described receiver module is with the first identifier scrambling, if it is reads described DCI1C or described DCI1A, obtains Access Control information.
14. subscriber equipmenies according to claim 13, it is characterized in that, described receiver module is specifically for receiving the first DCI format after the scrambling that issues of network equipment, and described first DCI format scrambles with the second identifier, and described first DCI format carries Access Control information;
Whether described first DCI format that described descrambling module receives specifically for judging described receiver module is with the second identifier scrambling, if it is reads described first DCI format, obtains Access Control information.
15. subscriber equipmenies according to claim 13, it is characterized in that, described receiver module is specifically for receiving the DCI1A after the scrambling that issues of network equipment, described DCI1A paging wireless temporary identifier P-RNTI scrambles, and the reserved bit position in described DCI1A carries Access Control information;
Whether the described DCI1A that described descrambling module receives specifically for judging described receiver module scrambles with P-RNTI, if it is reads the reserved bit position in described DCI1A, obtains Access Control information.
16. according to the subscriber equipment described in any one of claim 13-15, it is characterised in that described Access Control information includes: probability factor and roaming kind, or described Access Control information includes: access grade restricted information and roaming kind.
17. 1 kinds control the system accessed, it is characterised in that described system includes: the network equipment as described in any one of claim 9-12 and the subscriber equipment of the configuration Access Control as described in any one of claim 13-16.
CN201110390152.3A 2011-11-30 2011-11-30 Control the method, apparatus and system accessed Active CN103139868B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110390152.3A CN103139868B (en) 2011-11-30 2011-11-30 Control the method, apparatus and system accessed

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110390152.3A CN103139868B (en) 2011-11-30 2011-11-30 Control the method, apparatus and system accessed

Publications (2)

Publication Number Publication Date
CN103139868A CN103139868A (en) 2013-06-05
CN103139868B true CN103139868B (en) 2016-08-03

Family

ID=48499045

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110390152.3A Active CN103139868B (en) 2011-11-30 2011-11-30 Control the method, apparatus and system accessed

Country Status (1)

Country Link
CN (1) CN103139868B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015065271A1 (en) * 2013-10-31 2015-05-07 Telefonaktiebolaget L M Ericsson (Publ) Providing access control parameters to a user equipment
CN105813168A (en) * 2014-12-30 2016-07-27 中兴通讯股份有限公司 Access control method for neighbor service, and ProSe UE
CN108200597B (en) * 2017-12-18 2020-10-09 中国电子科技集团公司第四十一研究所 DCI descrambling analysis method of LTE-A air interface monitor
CN114944972A (en) * 2018-06-29 2022-08-26 华为技术有限公司 Data scrambling method and related equipment
WO2020087500A1 (en) * 2018-11-02 2020-05-07 华为技术有限公司 Data transmission method and device
US20230269031A1 (en) * 2020-08-03 2023-08-24 Beijing Xiaomi Mobile Software Co., Ltd. Method and device for hybrid automatic repeat request (harq) transmission, and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1756405A (en) * 2004-09-27 2006-04-05 华为技术有限公司 Mobile network over loading control method
CN102056266A (en) * 2009-11-06 2011-05-11 中兴通讯股份有限公司 Method and system for access control of machine type communication (MTC) terminal
CN102223729A (en) * 2010-04-16 2011-10-19 中兴通讯股份有限公司 Method and system for controlling machine type communication device to access to network

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1756405A (en) * 2004-09-27 2006-04-05 华为技术有限公司 Mobile network over loading control method
CN102056266A (en) * 2009-11-06 2011-05-11 中兴通讯股份有限公司 Method and system for access control of machine type communication (MTC) terminal
CN102223729A (en) * 2010-04-16 2011-10-19 中兴通讯股份有限公司 Method and system for controlling machine type communication device to access to network

Also Published As

Publication number Publication date
CN103139868A (en) 2013-06-05

Similar Documents

Publication Publication Date Title
EP2870710B1 (en) Method and apparatus for service access barring
CN107925983B (en) Method and apparatus for notifying SI update, EAB update and PWS messages in a wireless communication system
KR101823475B1 (en) Method of receiving and transmitting message in a mobile communication system using a mtc device and apparatus for the same
US9674873B2 (en) Method for informing identification of a UE and device therefor
US9622018B2 (en) Method and device for processing data transmission of machine-type communication device
EP2609762B1 (en) Enhanced paging mechanism for machine type communication
US8787232B2 (en) Method and apparatus for updating extended access barring information
US20180055223A1 (en) Mobile terminal device and associated method for obtaining uplink resources
AU2012295045B2 (en) System and method for applying extended accessing barring in wireless communication system
US9432900B2 (en) Method for performing handover in wireless communication system and apparatus for same
US8457618B2 (en) Preventing random access based on outdated system information in a wireless communication system
CN105359604B (en) Method, device and system for communication by using unlicensed spectrum
EP3678425B1 (en) Data transmission method and related device
JP5503806B2 (en) Method and apparatus for receiving a service by a terminal in a wireless communication system
EP3934333A2 (en) Network selection and random access method and apparatus of machine-type communication user equipment in mobile communication system
EP2466979B1 (en) A method, system and device for using user equipment (ue) identity
WO2013183966A1 (en) Method and apparatus for receiving system information in wireless communication system
EP3324666B1 (en) Sc-mcch resource configuration method and apparatus
KR101498090B1 (en) Method for restricting the cell access of a terminal in a wireless communication system, and apparatus therefor
WO2014051370A1 (en) Method and apparatus for receiving extended access barring parameters in wireless communication system
CN103139868B (en) Control the method, apparatus and system accessed
KR102240644B1 (en) Data transmission/reception apparatus and method, and communication system
EP2222128A1 (en) Method for sending, transmitting and scheduling system message in long term evolution system
EP2632213A2 (en) Method and apparatus for performing network entry/reentry in wireless communication system
EP3833109B1 (en) Random access method, user equipment, and base station

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant