CN107864483B - Method and device for detecting access result and computer storage medium - Google Patents

Method and device for detecting access result and computer storage medium Download PDF

Info

Publication number
CN107864483B
CN107864483B CN201711248356.7A CN201711248356A CN107864483B CN 107864483 B CN107864483 B CN 107864483B CN 201711248356 A CN201711248356 A CN 201711248356A CN 107864483 B CN107864483 B CN 107864483B
Authority
CN
China
Prior art keywords
terminal
gsm cell
access
gsm
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201711248356.7A
Other languages
Chinese (zh)
Other versions
CN107864483A (en
Inventor
曾元清
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201711248356.7A priority Critical patent/CN107864483B/en
Publication of CN107864483A publication Critical patent/CN107864483A/en
Application granted granted Critical
Publication of CN107864483B publication Critical patent/CN107864483B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/02Arrangements for optimising operational condition

Abstract

The embodiment of the invention discloses a method and a device for detecting an access result and a computer storage medium; the method is applied to the process that the terminal adopts a preset optimization scheme to execute data network access, and comprises the following steps: receiving a first access request message sent by the terminal to a first GSM cell; sending an attach reject message to the terminal for the first access request message; detecting that the access state of the terminal is an unregistered state, and detecting whether a second access request message sent by the terminal to a second GSM cell is received or not after a set time interval; wherein the second GSM cell has the same PLMN ID as the first GSM cell; after receiving the second access request message, sending an attachment success message to the terminal; and detecting user plane data between the terminal and the second GSM cell, and determining whether the terminal is successfully accessed to the second GSM cell based on the detection result of the user plane data.

Description

Method and device for detecting access result and computer storage medium
Technical Field
The present invention relates to network access technologies in the field of mobile communications, and in particular, to a method and an apparatus for detecting an access result, and a computer storage medium.
Background
With the increase of the demand of users for data services, the coverage and quality of the LTE network need to meet higher requirements. Meanwhile, a Global System for Mobile Communication (GSM)/Time Division Synchronous Code Division Multiple Access (TDSCDMA) network is still used, and for this reason, it is a better transition scheme for the LTE network and the TDSCDMA/GSM network to perform co-site deployment based on the original network System.
For the LTE/TDSCDMA/GSM network, the co-sited deployment scheme may share part of the network elements, resulting in a higher coupling degree of a multi-Radio Access Technology (RAT) system. In the optimization process of each RAT system, unpredictable problems are often caused to shared network elements of other RAT systems, so that the optimization process fails or the optimization time is long.
In order to solve the problem caused by the incompatibility of network deployment, various optimization means are adopted by each terminal (UE) manufacturer to improve the User experience of the network. However, since the occurrence of various abnormal situations may probabilistically cause the UE to fail to access the LTE network, it is particularly necessary to effectively detect the LTE network access result in an abnormal scenario.
Disclosure of Invention
The embodiment of the invention provides a method and a device for detecting an access result and a computer storage medium; the validity and the rationality of the optimization scheme can be verified based on the obtained access result, a basis is provided for further perfecting the optimization scheme, and the internet surfing experience of the user is improved.
The technical scheme of the invention is realized as follows:
in a first aspect, an embodiment of the present invention provides a method for detecting an access result, where the method is applied to a process in which a terminal performs data network access by using a preset optimization scheme, and the method includes:
receiving a first access request message sent by the terminal to a GSM cell;
sending an attach reject message to the terminal for the first access request message;
detecting that the access state of the terminal is an unregistered state, and detecting whether a second access request message sent by the terminal to a second GSM cell is received or not after a set time interval; wherein the second GSM cell has the same public land mobile network identity (PLMN ID) as the first GSM cell;
after receiving the second access request message, sending an attachment success message to the terminal;
and detecting user plane data between the terminal and the second GSM cell, and determining whether the terminal is successfully accessed to the second GSM cell based on the detection result of the user plane data.
In the above aspect, the method further includes:
and encapsulating an attachment rejection message, wherein the attachment rejection message carries the reason value of the attachment failure, and the reason value of the attachment failure is used for representing the reason of the attachment failure.
In the above aspect, the method further includes:
and if the second access request message is not received after the time interval, determining that the terminal fails to access the second GSM cell.
In the above solution, before receiving a first access request message sent by the terminal to a first GSM cell, the method further includes:
and increasing the transmission power of the first GSM cell to trigger the terminal to send the first access request message to the first GSM cell.
In the above aspect, the method further includes:
and after detecting that the access state of the terminal is an unregistered state, increasing the transmitting power of a second GSM cell, and reducing the transmitting power of the first GSM cell to be below a set power threshold.
In the foregoing solution, the determining whether the terminal successfully accesses the second GSM cell based on the detection result of the user plane data includes:
judging whether the rate of user plane data between the terminal and the second GSM cell is greater than or equal to a preset threshold value or not;
if the rate of the user plane data between the terminal and the second GSM cell is larger than or equal to a preset threshold value, determining that the terminal is successfully accessed into the second GSM cell;
and if the rate of the user plane data between the terminal and the second GSM cell is less than a preset threshold value, determining that the terminal fails to access the second GSM cell.
In the above aspect, the method further includes:
establishing a simulation network environment, wherein the simulation network environment at least comprises the following network structures: a long term evolution, LTE, network, a GSM network; the system message block SIB7 of the LTE network is configured with GSM neighbor cell information, and the system message SI of the GSM network is configured with LTE neighbor cell information; the GSM network is configured with two GSM cells with the same PLMN ID;
correspondingly, the first GSM cell and the second GSM cell which interact with the terminal are GSM networks in the simulated network environment.
In a second aspect, an embodiment of the present invention provides an apparatus for detecting an access result, where the apparatus is applied to a process in which a terminal performs data network access by using a preset optimization scheme, and the apparatus includes: a receiving section, a transmitting section, a detecting section, and a determining section; wherein the content of the first and second substances,
the receiving part is configured to receive a first access request message sent by the terminal to a first global system for mobile communications (GSM) cell;
the sending part is configured to send an attach reject message to the terminal for the first access request message;
the detection part is configured to detect that the access state of the terminal is an unregistered state, and after a set time interval, detect whether the receiving part receives a second access request message sent by the terminal to a second GSM cell; wherein the second GSM cell has the same public land mobile network identity (PLMN ID) as the first GSM cell;
the sending part is further configured to send an attach success message to the terminal after the receiving part receives the second access request message;
the detection part is also configured to detect user plane data between the terminal and the second GSM cell;
the determining part is configured to determine whether the terminal successfully accesses the second GSM cell based on a detection result of the user plane data.
In the above solution, the apparatus further comprises: and the encapsulation part is configured to encapsulate an attachment rejection message, the attachment rejection message carries the reason value of the attachment failure, and the reason value of the attachment failure is used for representing the reason of the attachment failure.
In the above-mentioned solution, the determining part is further configured to determine that the terminal fails to access the second GSM cell if the receiving part does not receive the second access request message after the time interval.
In the above solution, the apparatus further comprises: a first power adjustment part configured to increase the transmission power of the first GSM cell to trigger the terminal to send the first access request message to the first GSM cell.
In the above solution, the apparatus further comprises: and the second power adjusting part is configured to increase the transmitting power of a second GSM cell and reduce the transmitting power of the first GSM cell to be lower than a set power threshold value after detecting that the access state of the terminal is an unregistered state.
In the above scheme, the determining part is specifically configured to: judging whether the rate of user plane data between the terminal and the second GSM cell is greater than or equal to a preset threshold value or not;
if the rate of the user plane data between the terminal and the second GSM cell is larger than or equal to a preset threshold value, determining that the terminal is successfully accessed into the second GSM cell;
and if the rate of the user plane data between the terminal and the second GSM cell is less than a preset threshold value, determining that the terminal fails to access the second GSM cell.
In the above solution, the apparatus further comprises: a simulation part configured to establish a simulated network environment, the simulated network environment including at least the following network structure: a long term evolution, LTE, network, a GSM network; the system message block SIB7 of the LTE network is configured with GSM neighbor cell information, and the system message SI of the GSM network is configured with LTE neighbor cell information; the GSM network is configured with two GSM cells with the same PLMN ID;
correspondingly, the first GSM cell and the second GSM cell which interact with the terminal are GSM networks in the simulated network environment.
In a third aspect, an embodiment of the present invention provides an apparatus for detecting an access result, where the apparatus is applied to a process in which a terminal performs data network access by using a preset optimization scheme, and the apparatus includes: a processor and a memory for storing a computer program capable of running on the processor,
wherein the processor is configured to perform the steps of the method of any one of the first aspect when running the computer program.
In a fourth aspect, an embodiment of the present invention provides a computer storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the steps of the method according to any one of the first aspect.
The embodiment of the invention provides a method and a device for detecting an access result and a computer storage medium; in the technical scheme of the embodiment of the invention, in the process that the terminal adopts a preset optimization scheme to execute data network access, a first access request message sent by the terminal to a first GSM cell is received; sending an attach reject message to the terminal for the first access request message; detecting that the access state of the terminal is an unregistered state, and detecting whether a second access request message sent by the terminal to a second GSM cell is received or not after a set time interval; wherein the second GSM cell has the same Public Land Mobile Network identity (PLMN ID) as the first GSM cell; after receiving the second access request message, sending an attachment success message to the terminal; and detecting user plane data between the terminal and the second GSM cell, and determining whether the terminal is successfully accessed to the second GSM cell based on the detection result of the user plane data. By adopting the technical scheme of the embodiment of the invention, the terminal adopts the preset optimization scheme to execute the access process of the data network, and in the access process, the terminal enters the state of unavailable SIM card (Invalid SIM) of the Subscriber Identity Module (SIM) due to the failure of initial registration, so that the terminal cannot access the data network.
Drawings
FIG. 1 is a schematic diagram of a SIB7 displayed via a computer display screen;
FIG. 2 is a schematic diagram of SI display via a computer display screen;
fig. 3 is a schematic flowchart of a method for detecting an access result according to an embodiment of the present invention;
FIG. 4 is a schematic illustration of the cause value displayed via the computer display screen;
fig. 5 is a schematic diagram illustrating an access result detection apparatus according to an embodiment of the present invention;
fig. 6 is a schematic diagram of a specific hardware structure of an apparatus for detecting an access result according to an embodiment of the present invention.
Detailed Description
The technical solution in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention.
In the technical scheme of the embodiment of the invention, an abnormal access scene is simulated, namely: the terminal enters a Subscriber Identity Module (SIM) card unavailable (Invalid SIM) state due to an initial registration failure, so that the terminal cannot access a data network.
And aiming at the abnormal access scene, a preset optimization scheme is adopted at the terminal side to execute the access process of the data network, whether the terminal is successfully accessed to the data network is detected, and finally the effectiveness and the reasonability of the optimization scheme adopted by the terminal are determined.
In the embodiment of the present invention, a network environment (referred to as a simulation network environment) may be constructed by a simulation platform, where the simulation network environment at least includes the following network structures: an LTE network, a GSM network; the System Information Block (SIB, System Information Block)7 of the LTE network is configured with GSM neighbor Information, and the System Information Block (SI, System Information) of the GSM network is configured with LTE neighbor Information; the GSM network is configured with two GSM cells having the same PLMN ID. FIG. 1 is a schematic diagram of a SIB7 displayed via a computer display screen; fig. 2 is a schematic diagram showing SI of a GSM network through a computer display screen.
And then, performing a data network access process based on the constructed network environment, wherein the main objects involved in the data network access process include a terminal and a network, wherein the terminal can be implemented by using a mobile phone, but not limited to, and the network can be implemented by using a simulation platform. Here, since the network is implemented by using a simulation platform, the network can stably reproduce an abnormal access scenario with the terminal, thereby verifying feasibility and stability of the optimization scheme.
Based on the above simulated network environment, the following describes the technical solution of the embodiment of the present invention in detail.
Example one
Fig. 3 is a schematic flowchart of a method for detecting an access result according to an embodiment of the present invention, where the flowchart is applied to a process in which a terminal performs data network access by using a preset optimization scheme, and as shown in fig. 3, the method for detecting an access result may include the following steps:
s301: receiving a first access request message sent by the terminal to a GSM cell;
in this embodiment, in order to trigger the terminal to send the first access request message to the first GSM cell, the terminal may be triggered to send the first access request message to the first GSM cell by increasing the transmission power of the first GSM cell. It can be understood that, since the network in this embodiment is implemented by using the simulation platform, the transmission power of the first GSM cell can be increased by using the simulation platform. And when the terminal learns that the transmitting power of the first GSM cell is higher through measurement, the terminal sends a first access request message to the first GSM cell.
S302: sending an attach reject message to the terminal for the first access request message;
in this embodiment, after receiving the first access request message, the first GSM cell (the first GSM cell in the location-specific emulated network environment) may implement issuing an attach reject message to the terminal through the emulation platform.
Therefore, in this embodiment, the method may further include: and encapsulating an attachment rejection message, wherein the attachment rejection message carries the reason value of the attachment failure, and the reason value of the attachment failure is used for representing the reason of the attachment failure.
Taking the Attach Reject message as "Attach Reject", the encapsulation cause value in "Attach Reject" is "GPRS Service Not allowed", where "GPRS Service Not allowed" represents that the cause of the Attach failure is that General Packet Radio Service (GPRS) Service is Not allowed. FIG. 4 is a schematic diagram of the cause value displayed by the computer display screen.
S303: detecting that the access state of the terminal is an unregistered state, and detecting whether a second access request message sent by the terminal to a second GSM cell is received or not after a set time interval; wherein the second GSM cell has the same public land mobile network identity (PLMN ID) as the first GSM cell;
in this embodiment, the terminal may be in an unregistered state after receiving the attach reject message carrying the cause value, and at this time, a User Interface (UI) of the terminal may be displayed as an "unregistered state". After the attachment rejection message is sent to the terminal, the terminal may count the time at a set time interval T3245, and after the count is finished, detect whether the terminal sends the second access request message to the second GSM cell.
It should be noted that, in order to trigger the terminal to send the second access request message to the second GSM cell, in this embodiment, after detecting that the access state of the terminal is the unregistered state, the transmission power of the second GSM cell may also be increased, and the transmission power of the first GSM cell is reduced to be below the set power threshold TH 1.
S304: after receiving the second access request message, sending an attachment success message to the terminal;
in this embodiment, after receiving the second access request message sent by the terminal, the network is configured to issue an Attach Accept message to the terminal, so that the terminal is registered in the second GSM cell.
S305: and detecting user plane data between the terminal and the second GSM cell, and determining whether the terminal is successfully accessed to the second GSM cell based on the detection result of the user plane data.
In the embodiment of the present invention, preferably, whether the terminal successfully accesses the data network may be determined by verifying whether user plane data between the terminal and the second GSM cell is clear.
Specifically, the determining whether the terminal successfully accesses the second GSM cell based on the detection result of the user plane data includes:
judging whether the rate of user plane data between the terminal and the second GSM cell is greater than or equal to a preset threshold value or not;
if the rate of the user plane data between the terminal and the second GSM cell is larger than or equal to a preset threshold value, determining that the terminal is successfully accessed into the second GSM cell;
and if the rate of the user plane data between the terminal and the second GSM cell is less than a preset threshold value, determining that the terminal fails to access the second GSM cell.
In addition, preferably, the embodiment of the present invention may further verify by detecting whether the terminal sends an access request to the second GSM cell, specifically, if the second access request message is not received after the time interval, it is determined that the terminal fails to access the second GSM cell.
Example two
Based on the same inventive concept of the foregoing embodiment, referring to fig. 5, which shows an apparatus 50 for detecting an access result provided in an embodiment of the present invention, where the apparatus 50 may be applied to a process in which a terminal performs data network access by using a preset optimization scheme, and the apparatus 50 includes: a receiving section 501, a transmitting section 502, a detecting section 503, and a determining section 504; wherein the content of the first and second substances,
a receiving part 501 configured to receive a first access request message sent by the terminal to a first global system for mobile communications GSM cell;
a transmitting section 502 configured to transmit an attach reject message to the terminal for the first access request message;
a detecting part 503, configured to detect that the access status of the terminal is an unregistered status, and after a set time interval, detect whether the receiving part 501 receives a second access request message sent by the terminal to a second GSM cell; wherein the second GSM cell has the same public land mobile network identity (PLMN ID) as the first GSM cell;
the sending part 502 is further configured to send an attach success message to the terminal after the receiving part 501 receives the second access request message;
the detecting part 503 is further configured to detect user plane data between the terminal and the second GSM cell;
a determining part 504 configured to determine whether the terminal successfully accesses the second GSM cell based on a detection result of the user plane data.
In one possible implementation, the apparatus 50 further includes: an encapsulating part 505 configured to encapsulate an attach reject message, where the attach reject message carries a cause value of the attach failure, and the cause value of the attach failure is used to characterize a cause of the attach failure.
In a possible implementation manner, the determining part 504 is further configured to determine that the terminal fails to access the second GSM cell if the receiving part 501 does not receive the second access request message after the time interval.
In one possible implementation, the apparatus 50 further includes: a first power adjustment part 506 configured to increase the transmission power of the first GSM cell to trigger the terminal to send the first access request message to the first GSM cell.
In one possible implementation, the apparatus 50 further includes: a second power adjustment part 507, configured to increase the transmission power of the second GSM cell and reduce the transmission power of the first GSM cell below a set power threshold after detecting that the access state of the terminal is an unregistered state.
In a possible implementation manner, the determining part 504 is specifically configured to: judging whether the rate of user plane data between the terminal and the second GSM cell is greater than or equal to a preset threshold value or not;
if the rate of the user plane data between the terminal and the second GSM cell is larger than or equal to a preset threshold value, determining that the terminal is successfully accessed into the second GSM cell;
and if the rate of the user plane data between the terminal and the second GSM cell is less than a preset threshold value, determining that the terminal fails to access the second GSM cell.
In one possible implementation, the apparatus 50 further includes: a simulation portion 508 configured to establish a simulated network environment, the simulated network environment including at least the following network structures: a long term evolution, LTE, network, a GSM network; the system message block SIB7 of the LTE network is configured with GSM neighbor cell information, and the system message SI of the GSM network is configured with LTE neighbor cell information; the GSM network is configured with two GSM cells with the same PLMN ID;
correspondingly, the first GSM cell and the second GSM cell which interact with the terminal are GSM networks in the simulated network environment.
It is understood that in this embodiment, "part" may be part of a circuit, part of a processor, part of a program or software, etc., and may also be a unit, and may also be a module or a non-modular.
In addition, each component in the embodiment may be integrated in one processing unit, or each unit may exist alone physically, or two or more units are integrated in one unit. The integrated unit can be realized in a form of hardware or a form of a software functional module.
Based on the understanding that the technical solution of the present embodiment essentially or a part contributing to the prior art, or all or part of the technical solution may be embodied in the form of a software product stored in a storage medium, and include several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) or a processor (processor) to execute all or part of the steps of the method of the present embodiment. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
Accordingly, the present embodiment provides a computer storage medium having a computer program stored thereon, which when executed by a processor implements the steps of the method of the first embodiment.
Referring to fig. 6, which shows a specific hardware structure of the apparatus 50 for detecting an access result according to an embodiment of the present invention, which can be applied to a process in which a terminal performs data network access by using a preset optimization scheme, the apparatus 50 for detecting an access result and a computer storage medium, where the apparatus 50 includes: a processor 601 and a memory 602 for storing computer programs capable of running on the processor 601;
when the processor 601 is configured to run the computer program, the following steps are performed:
receiving a first access request message sent by the terminal to a GSM cell;
sending an attach reject message to the terminal for the first access request message;
detecting that the access state of the terminal is an unregistered state, and detecting whether a second access request message sent by the terminal to a second GSM cell is received or not after a set time interval; wherein the second GSM cell has the same public land mobile network identity (PLMN ID) as the first GSM cell;
after receiving the second access request message, sending an attachment success message to the terminal;
and detecting user plane data between the terminal and the second GSM cell, and determining whether the terminal is successfully accessed to the second GSM cell based on the detection result of the user plane data.
It will be appreciated that the memory 602 in embodiments of the invention may be either volatile memory or nonvolatile memory, or may include both volatile and nonvolatile memory. The non-volatile Memory may be a Read-Only Memory (ROM), a Programmable ROM (PROM), an Erasable PROM (EPROM), an Electrically Erasable PROM (EEPROM), or a flash Memory. Volatile Memory can be Random Access Memory (RAM), which acts as external cache Memory. By way of illustration and not limitation, many forms of RAM are available, such as Static random access memory (Static RAM, SRAM), Dynamic Random Access Memory (DRAM), Synchronous Dynamic random access memory (Synchronous DRAM, SDRAM), Double Data Rate Synchronous Dynamic random access memory (ddr Data Rate SDRAM, ddr SDRAM), Enhanced Synchronous SDRAM (ESDRAM), Synchlink DRAM (SLDRAM), and Direct Rambus RAM (DRRAM). The memory 602 of the systems and methods described herein is intended to comprise, without being limited to, these and any other suitable types of memory.
And processor 601 may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method may be performed by integrated logic circuits of hardware or instructions in the form of software in the processor 601. The Processor 601 may be a general-purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic device, or discrete hardware components. The various methods, steps and logic blocks disclosed in the embodiments of the present invention may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in connection with the embodiments of the present invention may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor. The software module may be located in ram, flash memory, rom, prom, or eprom, registers, etc. storage media as is well known in the art. The storage medium is located in the memory 602, and the processor 601 reads the information in the memory 602 and completes the steps of the method in combination with the hardware thereof.
It is to be understood that the embodiments described herein may be implemented in hardware, software, firmware, middleware, microcode, or any combination thereof. For a hardware implementation, the Processing units may be implemented within one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), general purpose processors, controllers, micro-controllers, microprocessors, other electronic units configured to perform the functions described herein, or a combination thereof.
For a software implementation, the techniques described herein may be implemented with modules (e.g., procedures, functions, and so on) that perform the functions described herein. The software codes may be stored in memory 602 and executed by processor 601. The memory 602 may be implemented within the processor 601 or external to the processor 601.
In one possible implementation, the processor 601 further performs the following steps:
and encapsulating an attachment rejection message, wherein the attachment rejection message carries the reason value of the attachment failure, and the reason value of the attachment failure is used for representing the reason of the attachment failure.
In one possible implementation, the processor 601 further performs the following steps:
and if the second access request message is not received after the time interval, determining that the terminal fails to access the second GSM cell.
In one possible implementation, the processor 601 further performs the following steps:
and increasing the transmission power of the first GSM cell to trigger the terminal to send the first access request message to the first GSM cell.
In one possible implementation, the processor 601 further performs the following steps:
and after detecting that the access state of the terminal is an unregistered state, increasing the transmitting power of a second GSM cell, and reducing the transmitting power of the first GSM cell to be below a set power threshold.
In one possible implementation, the processor 601 further performs the following steps:
judging whether the rate of user plane data between the terminal and the second GSM cell is greater than or equal to a preset threshold value or not;
if the rate of the user plane data between the terminal and the second GSM cell is larger than or equal to a preset threshold value, determining that the terminal is successfully accessed into the second GSM cell;
and if the rate of the user plane data between the terminal and the second GSM cell is less than a preset threshold value, determining that the terminal fails to access the second GSM cell.
In one possible implementation, the processor 601 further performs the following steps:
establishing a simulation network environment, wherein the simulation network environment at least comprises the following network structures: a long term evolution, LTE, network, a GSM network; the system message block SIB7 of the LTE network is configured with GSM neighbor cell information, and the system message SI of the GSM network is configured with LTE neighbor cell information; the GSM network is configured with two GSM cells with the same PLMN ID;
correspondingly, the first GSM cell and the second GSM cell which interact with the terminal are GSM networks in the simulated network environment.
In practice, of course, the various components of the device 60 are coupled together by a bus system 603, as shown in FIG. 6. It will be appreciated that the bus system 603 is used to enable communications for connections between these components. The bus system 603 includes a power bus, a control bus, and a status signal bus in addition to a data bus. But for the sake of clarity the various buses are labeled as bus system 603 in figure 6.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of a hardware embodiment, a software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The above description is only a preferred embodiment of the present invention, and is not intended to limit the scope of the present invention.

Claims (10)

1. A method for detecting an access result is applied to a device for detecting an access result, and is applied to a process that a terminal performs data network access by adopting a preset optimization scheme, wherein an abnormal scene aimed at by the optimization scheme is as follows: the terminal enters a user identity identification module state due to the failure of initial registration, so that the terminal cannot access a data network; the method comprises the following steps:
receiving a first access request message sent by the terminal to a GSM cell;
sending an attach reject message to the terminal for the first access request message;
detecting that the access state of the terminal is an unregistered state, and detecting whether a second access request message sent by the terminal to a second GSM cell is received or not after a set time interval; wherein the second GSM cell has the same public land mobile network identity (PLMN ID) as the first GSM cell;
after receiving the second access request message, sending an attachment success message to the terminal;
and detecting user plane data between the terminal and the second GSM cell, and determining whether the terminal is successfully accessed to the second GSM cell based on the detection result of the user plane data.
2. The method of claim 1, further comprising:
and encapsulating an attachment rejection message, wherein the attachment rejection message carries the reason value of the attachment failure, and the reason value of the attachment failure is used for representing the reason of the attachment failure.
3. The method of claim 1, further comprising:
and if the second access request message is not received after the time interval, determining that the terminal fails to access the second GSM cell.
4. The method of claim 1, wherein prior to receiving the first access request message sent by the terminal to the first GSM cell, the method further comprises:
and increasing the transmission power of the first GSM cell to trigger the terminal to send the first access request message to the first GSM cell.
5. The method of claim 1, further comprising:
and after detecting that the access state of the terminal is an unregistered state, increasing the transmitting power of a second GSM cell, and reducing the transmitting power of the first GSM cell to be below a set power threshold.
6. The method of claim 1, wherein the determining whether the terminal successfully accesses the second GSM cell based on the detection result of the user plane data comprises:
judging whether the rate of user plane data between the terminal and the second GSM cell is greater than or equal to a preset threshold value or not;
if the rate of the user plane data between the terminal and the second GSM cell is larger than or equal to a preset threshold value, determining that the terminal is successfully accessed into the second GSM cell;
and if the rate of the user plane data between the terminal and the second GSM cell is less than a preset threshold value, determining that the terminal fails to access the second GSM cell.
7. The method according to any one of claims 1 to 6, further comprising:
establishing a simulation network environment, wherein the simulation network environment at least comprises the following network structures: a long term evolution, LTE, network, a GSM network; the system message block SIB7 of the LTE network is configured with GSM neighbor cell information, and the system message SI of the GSM network is configured with LTE neighbor cell information; the GSM network is configured with two GSM cells with the same PLMNID;
correspondingly, the first GSM cell and the second GSM cell which interact with the terminal are GSM networks in the simulated network environment.
8. The device for detecting the access result is applied to a process that a terminal performs data network access by adopting a preset optimization scheme, wherein an abnormal scene aimed at by the optimization scheme is as follows: the terminal enters a user identity identification module state due to the failure of initial registration, so that the terminal cannot access a data network; the device comprises: a receiving section, a transmitting section, a detecting section, and a determining section; wherein the content of the first and second substances,
the receiving part is configured to receive a first access request message sent by the terminal to a first global system for mobile communications (GSM) cell;
the sending part is configured to send an attach reject message to the terminal for the first access request message;
the detection part is configured to detect that the access state of the terminal is an unregistered state, and after a set time interval, detect whether the receiving part receives a second access request message sent by the terminal to a second GSM cell; wherein the second GSM cell has the same public land mobile network identity (PLMN ID) as the first GSM cell;
the sending part is further configured to send an attach success message to the terminal after the receiving part receives the second access request message;
the detection part is also configured to detect user plane data between the terminal and the second GSM cell;
the determining part is configured to determine whether the terminal successfully accesses the second GSM cell based on a detection result of the user plane data.
9. The device for detecting the access result is applied to a process that a terminal performs data network access by adopting a preset optimization scheme, wherein an abnormal scene aimed at by the optimization scheme is as follows: the terminal enters a user identity identification module state due to the failure of initial registration, so that the terminal cannot access a data network; the device comprises: a processor and a memory for storing a computer program capable of running on the processor,
wherein the processor is adapted to perform the steps of the method of any one of claims 1 to 7 when running the computer program.
10. A computer storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the method of any one of claims 1 to 7.
CN201711248356.7A 2017-12-01 2017-12-01 Method and device for detecting access result and computer storage medium Active CN107864483B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711248356.7A CN107864483B (en) 2017-12-01 2017-12-01 Method and device for detecting access result and computer storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711248356.7A CN107864483B (en) 2017-12-01 2017-12-01 Method and device for detecting access result and computer storage medium

Publications (2)

Publication Number Publication Date
CN107864483A CN107864483A (en) 2018-03-30
CN107864483B true CN107864483B (en) 2021-08-10

Family

ID=61704553

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711248356.7A Active CN107864483B (en) 2017-12-01 2017-12-01 Method and device for detecting access result and computer storage medium

Country Status (1)

Country Link
CN (1) CN107864483B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110519781B (en) * 2019-08-28 2022-09-16 深圳市万普拉斯科技有限公司 RRC time limit adjusting method and device, mobile terminal and readable storage medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103249119A (en) * 2012-02-06 2013-08-14 宏碁股份有限公司 Method of performing attach procedures
CN104284318A (en) * 2013-07-09 2015-01-14 普天信息技术研究院有限公司 Method for identifying emergency call in TD-LTE system
EP2906014A2 (en) * 2012-10-04 2015-08-12 LG Electronics Inc. Method for reporting denied connection in wireless communication system and apparatus supporting same
WO2016190672A1 (en) * 2015-05-26 2016-12-01 엘지전자 주식회사 Method and terminal for performing attach procedure for sponsored connectivity in wireless communication system
CN106937316A (en) * 2015-12-31 2017-07-07 中国移动通信集团四川有限公司 Determine method, MME and the eNodeB of user plane link
CN107197538A (en) * 2017-05-19 2017-09-22 广东欧珀移动通信有限公司 A kind of method and terminal for connecting network
CN107241721A (en) * 2016-03-29 2017-10-10 努比亚技术有限公司 Mobile terminal network gravity treatment control method and device
CN107396356A (en) * 2016-05-17 2017-11-24 中兴通讯股份有限公司 Data transmission method for uplink and device

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP6371296B2 (en) * 2012-11-08 2018-08-08 インターデイジタル パテント ホールディングス インコーポレイテッド Method and apparatus for medium access control for uniform multiple access point coverage in a wireless local area network

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103249119A (en) * 2012-02-06 2013-08-14 宏碁股份有限公司 Method of performing attach procedures
EP2906014A2 (en) * 2012-10-04 2015-08-12 LG Electronics Inc. Method for reporting denied connection in wireless communication system and apparatus supporting same
CN104284318A (en) * 2013-07-09 2015-01-14 普天信息技术研究院有限公司 Method for identifying emergency call in TD-LTE system
WO2016190672A1 (en) * 2015-05-26 2016-12-01 엘지전자 주식회사 Method and terminal for performing attach procedure for sponsored connectivity in wireless communication system
CN106937316A (en) * 2015-12-31 2017-07-07 中国移动通信集团四川有限公司 Determine method, MME and the eNodeB of user plane link
CN107241721A (en) * 2016-03-29 2017-10-10 努比亚技术有限公司 Mobile terminal network gravity treatment control method and device
CN107396356A (en) * 2016-05-17 2017-11-24 中兴通讯股份有限公司 Data transmission method for uplink and device
CN107197538A (en) * 2017-05-19 2017-09-22 广东欧珀移动通信有限公司 A kind of method and terminal for connecting network

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
《Stage-3 of Option 3/3a/3x》;Huawei, LG Electronics Inc., CATT, ZTE;《3GPP TSG-RAN WG3 #96 R3-171993》;20170519;全文 *

Also Published As

Publication number Publication date
CN107864483A (en) 2018-03-30

Similar Documents

Publication Publication Date Title
US20200252849A1 (en) Method, device for service bearer network handover and computer storage medium
CN112020121B (en) Access control method, equipment and computer storage medium
CN111417111B (en) Data processing method and network equipment
US10772033B2 (en) Avoiding reselection of a fake cell in a wireless communication network
US20090305702A1 (en) Blocking of service in cellular radio system
CN111901842A (en) Wireless communication method and apparatus
CN112806073B (en) Communication processing method, device, mobile terminal and storage medium
CN112806044B (en) Pseudo base station identification method and device, mobile terminal and storage medium
CN109792661B (en) CSFB (Circuit switched Fall Back) fall result detection method and device and computer storage medium
CN116491213A (en) Radio access network connectivity enhancement for network slicing
CN108093429B (en) Method and device for detecting LTE network access result and computer storage medium
CN107864483B (en) Method and device for detecting access result and computer storage medium
CN107969013B (en) Method and device for detecting network access result and computer storage medium
CN111278003B (en) Position updating processing method and mobile terminal
CN108141901B (en) Method and terminal for controlling service connection
US8620317B2 (en) Method and apparatus for communicating network features during a routing area update procedure
CN107734530B (en) Method and device for detecting access result and computer storage medium
CN111107541B (en) Method and apparatus for wireless communication
CN111316697B (en) Method for accessing wireless local area network, terminal equipment and network equipment
US20210410207A1 (en) Data sending method, terminal device, and storage medium
CN108235348B (en) Detection method, detection device and computer storage medium
KR101809239B1 (en) Apn changing apparatus and method, wireless terminal for apn change and record medium
CN108112057B (en) Detection method, detection device and computer storage medium
CN107734531B (en) Method and device for detecting access result and computer storage medium
WO2020253661A1 (en) Method, device and system for determining false base station

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

GR01 Patent grant
GR01 Patent grant