CN108347743A - Connection control method, access network elements, core network element and user equipment - Google Patents

Connection control method, access network elements, core network element and user equipment Download PDF

Info

Publication number
CN108347743A
CN108347743A CN201710058957.5A CN201710058957A CN108347743A CN 108347743 A CN108347743 A CN 108347743A CN 201710058957 A CN201710058957 A CN 201710058957A CN 108347743 A CN108347743 A CN 108347743A
Authority
CN
China
Prior art keywords
data
mo
business
thresholding
access
Prior art date
Application number
CN201710058957.5A
Other languages
Chinese (zh)
Inventor
戴谦
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Priority to CN201710058957.5A priority Critical patent/CN108347743A/en
Publication of CN108347743A publication Critical patent/CN108347743A/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic or resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic or resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/0247Traffic management, e.g. flow control or congestion control based on conditions of the access network or the infrastructure network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic or resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/0289Congestion control

Abstract

The embodiment of the invention discloses a kind of connection control method, access network elements, core network element and user equipmenies.The connection control method includes:When the congestion condition that the network load of core net or access net meets overload condition or the core net or accesses net meets congestion condition, access network elements send access restriction to user equipment (UE) using proprietary radio resource control RRC signaling and indicate.

Description

Connection control method, access network elements, core network element and user equipment

Technical field

The present invention relates to wireless communication field more particularly to a kind of connection control method, access network elements, core network elements And user equipment (User Equipment, UE).

Background technology

It is introduced in Internet of Things so that a large amount of low cost, small bandwidth, small data are that internet of things equipment is connected to network.But Be internet of things equipment access network duration it is short, transmitted data amount is small, but equipment ownership is very huge, each secondary device Holding for the control plane signaling largely eated dishes without rice or wine and the control plane signaling of ground side can all be led to by establishing connection with cordless communication network Pin, but for the data volume transmitted compared to equipment, there is the case where control plane signaling overheads is more than user face data amount, this The problem of leading to the low and corresponding network element overload and congestion of system efficiency of transmission.

Invention content

In view of this, an embodiment of the present invention is intended to provide a kind of connection control method, access network elements, core network element and User equipment partly solves the above problems.

In order to achieve the above objectives, the technical proposal of the invention is realized in this way:

First aspect of the embodiment of the present invention provides a kind of connection control method, including:

When the network load of core net or access net meets the congestion condition of overload condition or the core net or access net When meeting congestion condition, access network elements send access restriction using proprietary radio resource control RRC signaling to user equipment (UE) Instruction.

Second aspect of the embodiment of the present invention provides a kind of connection control method, including:

When the congestion condition that the network load of core net meets overload condition or the core net meets the congestion condition When, send access restriction instruction to access network elements;Wherein, the access restriction instruction is sent to for the access network elements User equipment (UE) is to limit the access of the UE.

The third aspect of the embodiment of the present invention provides a kind of connection control method, including:

User equipment (UE) receives access network element and is indicated by the access restriction that dedicated RRC signaling is sent;Wherein, described Access restriction is designated as the access network elements, meets overload condition or the core in the network load of core net or access net The congestion condition of heart net or access net, which meets, to be sent when congestion condition;

Corresponding access restriction rule is indicated according to the access restriction, it is determined whether initiation accesses next time.

The 5th aspect of the embodiment of the present invention provides a kind of access network elements, including:

First transmission unit, for meeting overload condition or the core net when the network load of core net or access net Or the congestion condition of access net is when meeting congestion condition, access network elements are using proprietary radio resource control RRC signaling to user Equipment UE sends access restriction instruction.

The 6th aspect of the embodiment of the present invention provides a kind of core network element, including:

Second transmission unit, the congestion shape for meeting overload condition or the core net when the network load of core net When condition meets the congestion condition, access restriction instruction is sent to access network elements;Wherein, the access restriction instruction is used for institute It states access network elements and is sent to user equipment (UE) to limit the access of the UE.

The 6th aspect of the embodiment of the present invention provides a kind of user equipment (UE), including:

Receiving unit, for being indicated from access network element by the access restriction that dedicated RRC signaling is sent;Wherein, institute It states access restriction and is designated as the access network elements, meet overload condition or described in the network load of core net or access net The congestion condition of core net or access net, which meets, to be sent when congestion condition;

Access unit, for indicating corresponding access restriction rule according to the access restriction, it is determined whether initiate next Secondary access.

Connection control method, access network elements, core network element and user equipment provided in an embodiment of the present invention access net Network element can send access restriction to UE by dedicated RRC signaling and refer to when accessing net or overload or congestion condition occur for core net Show, the access restriction taking effect rules of at least partly UE access are forbidden in instruction, to alleviate the mistake of present Access and/or core net Load or congestion condition.

Description of the drawings

Fig. 1 is the flow diagram of the first connection control method provided in an embodiment of the present invention;

Fig. 2 is the flow diagram of second of connection control method provided in an embodiment of the present invention;

Fig. 3 is the flow diagram of the third connection control method provided in an embodiment of the present invention;

Fig. 4 is a kind of structural schematic diagram of UE provided in an embodiment of the present invention;

Fig. 5 is the flow diagram of the 4th kind of connection control method provided in an embodiment of the present invention;

Fig. 6 is the flow diagram of the 5th kind of connection control method provided in an embodiment of the present invention.

Specific implementation mode

Technical scheme of the present invention is further elaborated below in conjunction with Figure of description and specific embodiment.

As shown in Figure 1, the present embodiment provides a kind of connection control methods, including:

Step S110:When the network load of core net or access net meets overload condition or the core net or access net Congestion condition when meeting congestion condition, access network elements are sent out using proprietary radio resource control RRC signaling to user equipment (UE) Access restriction is sent to indicate.

Offer described in the present embodiment is included in control method, for the method applied to network side, for example, applied to access Method in the network element of net, for example, the method in evolved base station (evolution Node B, eNB).The access network elements can It is the eNB or next-generation base stations (next generation Node B, Gnb) or, other radio access nodes (Access Point, AP) etc..

The step S110 may include in the present embodiment:

Step S111:When the network load of core net or access net meets overload condition or the core net or access net Congestion condition when meeting congestion condition, obtain compatible with the access net or the overload conditions or congestion condition of core net Access restriction indicates;

Step S112:Access restriction instruction is sent to UE by the dedicated RRC signaling.

The dedicated RRC signaling includes at least one of in the present embodiment:

RRC connections rejection signaling, RRC Connection Releases signaling and RRC connection reconstruction rejection signalings.

Connection control method provided in this embodiment is mainly used for the access network elements by way of unicast, Xiang Dan A UE sends the access restriction instruction.Connection control method provided in this embodiment, mainly in the UE having with Access network elements establish this connection, and access network elements overload phenomenon or congestion condition to alleviate, need to discharge this connection, And it prevents UE after this Connection Release, the application situation connected next time is initiated based on access demand immediately.Therefore at this Access network elements described in embodiment send the access restriction to UE by proprietary RRC signaling and indicate, or are believed by proprietary RRC It enables to UE transmissions access restriction instruction for thering is this to connect with access network elements foundation at present.Here UE can be it is various Through being connected to the UE of access net network element, for example, Internet of Things UE.

The dedicated RRC signaling includes RRC Connection Release signalings, and the RRC Connection Releases signaling is to be released for triggering UE The signaling of this connection is put, is in the present embodiment carried access restriction instruction within the RRC connections signaling, a side Face promotes the UE to release this connection, while informing the access restriction that UE currently comes into force by access restriction instruction and advising Then, UE can determine whether to initiate when accessing based on access demand initiation next time according to the restriction rule that is included in currently to come into force Access, to reach the initiation of the accesses of control UE next time, to the access next time or reduction of delay at least partly UE The UE numbers of initiation access in specified duration within current time;So as to alleviate overload and congestion phenomenon.

The RRC connections rejection signaling exists in the present embodiment for the UE of access network elements refusal current request access The access restriction instruction is carried in RRC connection rejection signalings, on the one hand can refuse this access of UE transmissions, on the other hand The transmission indicated by access restriction is promoted UE to understand the access restriction rule that ought currently come into force, is thought based on access demand in UE Initiation accesses next time when, pass through the inquiry of the access restriction rule to come into force, it is to be understood that itself whether it is allowed to initiate access, from And realize the control accessed next time to UE.

The RRC connection reconstructions rejection signaling, the refusal that the connection reconstruction initiated to UE for access network elements is asked can be with Connection reconstruction for refusing this access.Similarly, access restriction instruction is carried and is refused in RRC connection reconstructions by access network element In signaling, the refusal to this connection reconstruction (being equivalent to this access) is on the one hand realized, overload can be alleviated or congestion is existing As another party can also control next access of UE.

In short, the present embodiment is refused to believe by RRC connections rejection signaling, RRC Connection Releases signaling and RRC connection reconstructions It enables, to carry the access restriction instruction, it is not necessary to build special signaling to send the access restriction instruction, reduce letter Enable expense.Simultaneously the RRC connections rejection signaling, RRC Connection Releases signaling and RRC connection reconstruction rejection signalings may be implemented to Few two kinds of functions, improve the public of dedicated RRC signaling.

Certainly, the dedicated RRC signaling, in addition to above-mentioned RRC connections rejection signaling, RRC Connection Releases signaling and RRC connections Reestablishment rejected signaling can also be other kinds of RRC signaling.

The mode for obtaining the access restriction instruction, can be the access network elements, itself is according to access net or core The load state or congestion condition of net voluntarily generate the access restriction instruction, can also be to be received from core network element, example Such as, it is received from mobile management entity (Mobility Management Entity, MME).

For example, be preset in forming the network element of access restriction instruction, load factor or congestion condition with it is corresponding The correspondence of access restriction instruction with current load factor and is gathered around when forming the access restriction instruction for needing to be handed down to UE The information such as plug-like condition inquire the correspondence, select in the correspondence with the information matches such as load factor and congestion condition Access restriction instruction, as the access restriction instruction for currently needing to be handed down to UE.Certainly the access restriction instruction is generated There are many modes, is not limited to the example above.

It may include when the network load of core net or access net meets preset condition:When access net or the load factor of core net When reaching load factor thresholding or load capacity more than load capacity thresholding, it is believed that the network load of the core net or access net meets The overload condition.Judge the network load of the core net in the present embodiment, it may include judge MME present load rate or Whether present load amount reaches corresponding thresholding.The network load of the access net meets the overload condition, it may include:Judge Whether the present load rate or load capacity of base station reach corresponding thresholding.For another example, judge that accessing net or the current of core net bears Carry whether grade is predetermined load grade, if predetermined load grade, it is believed that meet the default overload condition.

The congestion condition of the core net or access net, can be with the load state of current core net or access net come table Show, the congestion shape can also be characterized according to the parameters such as the available resources situation of current network or the quantity for waiting for respond request Condition, when congestion condition meets some requirements, it is believed that congestion occurs for core net or access network, needs to alleviate congestion.Example Such as, the number of requests to be responded in current MME or eNB queues is more than amount threshold, or, the process resource of current MME or eNB Utilization rate reach utilization rate upper limit etc., you can think congestion occurred, meet above-mentioned congestion condition.

The access restriction instruction is used to indicate the access restriction rule to come into force.

The access restriction rule may include at least one of:Rule 1:It is forbidden to use user plane optimization data transmission UP Mode or wireless heterogeneous networks connection establish legacy modes and initiate caller data service mo-data, the extraordinary number of the caller According to mo-ExceptionData, delay tolerance access service delayTolerantAccess or caller signaling traffic mo- The calling of signaling;

Rule 2:It is forbidden to use control plane optimization data transmission CP modes and initiates the mo-ExceptionData, described The calling of delayTolerantAccess or the mo-signaling;

Rule 3:The UE of predetermined ratio is forbidden to initiate the calling of the mo-data using CP modes;

Rule 4:Forbid only supporting a UE for CP modes to initiate the mo-data, mo-ExceptionData, described The calling of delayTolerantAccess or the mo-signaling;

Rule 5:Forbid that the UE of CP modes and UP modes is supported to initiate the mo-data, the mo- simultaneously The calling of ExceptionData, the delayTolerantAccess or the mo-signaling;

Rule 6:Forbid that the UE of CP modes and UP modes is supported to initiate the mo-data, the mo- using CP modes simultaneously The calling of ExceptionData, the delayTolerantAccess or the mo-signaling;

Rule 7:The UE for forbidding supporting CP modes and UP modes simultaneously is initiated described using UP modes or legacy modes The mo-data or mo-ExceptionData, the delayTolerantAccess or the mo-signaling Calling;

Rule 8:Forbid sending non-network protocol data non-IP-data business;

Rule 9:Forbid sending the non-IP-data industry that single data packet is more than the first preset data packet length thresholding Business, primary connection accumulation transmission data amount are more than the non-IP-data business of the first accumulation thresholding, flow is more than first pre- If the non-IP-data business of traffic threshold or the non-IP-data business with continuous data packet, wherein The non-IP-data business with continuous data packet is:It is sent described in multiple data packets by once connecting Non-IP-data business;

Rule 10:Forbid sending the Internet protocol data IP-data business;

Rule 11:Forbid send single data packet be more than the second preset data packet length thresholding the IP-data business, Primary connection accumulation data volume is more than the IP-data business of the second accumulation thresholding, flow is more than the second preset flow thresholding The IP-data business;

Rule 12:CP modes are forbidden to use to initiate the business more than third preset data packet length thresholding, once connect and tire out Volume data amount is more than that third accumulates the business of thresholding, flow is more than the business of third preset flow thresholding, or has consecutive numbers According to the business of packet;

Rule 13:UP modes are forbidden to use to initiate the business less than the 4th preset data packet length thresholding, once connect and tire out Volume data amount is less than the business of the 4th preset flow thresholding less than the business or flow of the 4th accumulation thresholding.

Ordinal numbers such as " first ", " second " and " third " before above-mentioned preset data packet length thresholding, accumulation thresholding are all It is not represent substantive meaning for distinguishing the thresholding under different situations.

The access network elements in the present embodiment, can according to currently transmitted congestion condition or overload phenomenon position, And the effect of the limitation access according to access restriction rule, indicate corresponding access restriction taking effect rules.

A plurality of limitation access rules aforementioned in the present embodiment can be to be stored in advance in UE and access network elements, can also Negotiate in advance for UE and access network elements, can also be that communication protocol is prespecified.In short, sending the access restriction Before instruction, the access network elements and the UE can have corresponding approach to obtain above-mentioned access restriction rule, and obtain Access restriction indicates the correspondence between access restriction rule, so as to facilitate follow-up UE to be indicated according to access restriction, It executes or the execution for that specific access restriction rule that comes into force alleviates a large amount of UE, especially to realize access control Internet-of-things terminal accesses overload or congestion caused by network simultaneously.

For example, when the access restriction indicates that instruction rule 3 comes into force, UE can randomly generate one before initiating to access Random number is compared by the random number between a 0 to 1 with the predetermined ratio, if the random number is more than the predetermined ratio, Then allow the UE to initiate access, the UE is otherwise forbidden to initiate access.If it is of course also possible to being the random number no more than described pre- When certainty ratio, allows UE to initiate access, otherwise forbid UE access.

It is not limited to above-mentioned any one rule when the above is only the citing of access restriction rule, but implementing.

The CP modes include:Terminal by controlling plane signaling, for example, Non-Access Stratum (Non-access stratum, Data are transmitted directly to MME by NAS) message, by MME by data forwarding outer net, rather than are forwarded the data to by gateway The access way of outer net.The transmission that CP modes need MME to participate in data may result in MME if the UE that CP modes access is excessive Overload or congestion.

The UP modes are:Before the Connection Release of UE and network side, network side will preserve the historical context of UE, at end When end initiates to connect with network side next time, the access way of connection is established using the context preserved.The access way, It needs the access network elements such as base station to store context, if the UE of access is excessive or the context that preserves is excessive, can cause to delay Resource reduction is deposited, when accessing next time, the context once preserved before retrieval may be also needed to, it is also necessary to consume certain processing Resource.Here process resource may include the resources such as calculating, inquiry and the retrieval that processor or processing circuit provide.

The legacy modes are in the way of RRC signaling foundation connection.

The mo-exception data be generally directed towards be outburst type business, for example, alert service, exception class The data of type report business etc..

The procotol IP data services can be referred to as non-IP-data business;The procotol IP data industry Business can be referred to as IP-data business.Purpose IP address is not usually carried in the corresponding data packet of non-IP-data business, The routing forwarding for being not based on purpose IP address used.It is carried when the corresponding data packet of the IP-data business

For the limitation of above-mentioned CP modes, usually when the network load of core net meets the overload condition or core net Described in congestion condition load when congestion condition, especially the overload condition described in the present situation load of the MME or described gather around When tent part, the instruction information that the access network elements are sent may be used to indicate and part or all of terminal is forbidden to use CP Mode is initiated to access, or all or part of business of instruction initiates the access restriction taking effect rules of access using CP modes, to slow Solve the overload or congestion condition of core net.

For the limitation of above-mentioned UP modes, usually when the network load of access net meets the overload condition or accesses net When congestion condition meets the congestion condition, the especially remaining cache of base station is less than cache threshold, or caching occur it is nervous or Person's residue process resource is less than when process resource threshold value, and the instruction information that the access network elements are sent is used to indicate All or part of terminal is forbidden to be accessed using UP modes or, the access restriction rule that all or part of business is accessed using UP modes It comes into force, to alleviate the overload or congestion condition of access net.

The access restriction rule can be divided into two parts in the present embodiment, and first part is Rule content, second part The limitation parameter executed for rule.The limitation parameter may include one in time parameter, scale parameter and data model parameters It is a or multiple, certainly when specific implementation, it may also include exception parameter etc..Here exception parameter can at least which special circumstances pair Answer the infirm situation of Rule content.Optionally, the access restriction rule further includes time parameter, scale parameter and data mould At least one of shape parameter;

The time parameter, the duration that comes into force for providing the access restriction rule;

The scale parameter is used to indicate the ratio of user equipment or the coming into force for access restriction rule of limitation access Probability;

The data model parameters, including:Data model thresholding;

The data model thresholding includes at least one of;

Data packet length thresholding;

Accumulate the accumulation thresholding of data volume;

Traffic threshold;

The data amount check thresholding of continuous data packet;

The transmission frequency or period thresholding of continuous data packet.

The time span for the time window that the duration that comes into force corresponds to.If UE receives access restriction and indicates it Afterwards, the Rule content of a certain access restriction rule is had read, while being extracted time parameter, according to what is limited in time parameter Come into force duration, can be since receiving the access restriction instruction moment or reading access restriction rule, when calculating comes into force Between.The scale parameter, the ratio of come into force probability or the user terminal of certain one or more rule of instruction.When the ratio is joined Number for the UE of limitation access ratio when, the UE can by way of generating random number, then by random number and ratio into Row compares, and then determines whether to initiate access request.

The limitation parameter can be individually to write in each access restriction rule in the present embodiment, described in this Limitation parameter can also be shared by a plurality of restriction rule simultaneously.For example, the time parameter can be by a plurality of access restriction rule Shared parameter.The time parameter can be sent to UE by the base station, can also be that base station is indicated to UE.

The access network elements determine there are many modes for the access restriction instruction for needing to be sent to UE, at least provide below Two kinds:

The first:

When the network load of the access net meet the overload condition or the access net congestion condition meet it is described When congestion condition, the access network element voluntarily forms the access restriction instruction.

For example, load states or congestion condition of the eNB according to itself, form the access restriction instruction for needing to be sent to UE.

Second:

When the network load of the core net meet the overload condition or the core net congestion condition meet it is described When congestion condition, the access network elements receive the access restriction instruction from core network element.

For example, MME current overloads or congestion condition, MME forms the access restriction instruction, and by the access of formation Limitation instruction is sent to the access network elements, and such words access network elements can receive the access restriction instruction.

The access restriction instruction that the access restriction network element and the core network element are formed in the present embodiment, can It is used to indicate the access restriction rule currently to come into force.Here the access restriction rule may refer to the correspondence of previous embodiment Part is not just repeated herein.

Further, the step S110 may include:

When the network load of the core net meet the overload condition or the core net congestion condition meet it is described When congestion condition, the access network elements are indicated from access restriction described in S1 interfaces.

When core net overload or congestion, access network elements can receive the access restriction instruction of core network element transmission, For example, receiving the access restriction instruction of MME transmissions.In the present embodiment the core network element send and access restriction refers to Show and is sent by S1 interfaces.For example, MME has sent S1 message by S1 interfaces to access network elements, taken in the S1 message It is indicated with the access restriction.The S1 message includes but not limited to overload (Over load Start) message.

When access network elements receive the access restriction instruction, corresponding UE is transmitted to by dedicated RRC signaling, from And realize and UE access is controlled, to control the number of UE access in specific time, the number etc. for the access request that UE is initiated, from And alleviates congestion and overload frequently occurring for phenomenon.

As shown in Fig. 2, the present embodiment provides a kind of connection control methods, including:

Step S210:When the congestion condition that the network load of core net meets overload condition or the core net meets institute When stating congestion condition, access restriction instruction is sent to access network elements;Wherein, the access restriction instruction is used for the access net Network element is sent to user equipment (UE) to limit the access of the UE.

Core network element in the present embodiment, when determining that the network load of core net meets the overload condition or described When the congestion condition of core net meets the congestion condition, access restriction instruction is sent to access network elements.

How to determine that the network load of core net meets the overload condition or the congestion condition of the core net meets institute Congestion condition is stated, previous embodiment is may refer to, is not just repeated since then.

The access restriction instruction in the present embodiment, is carried in the MME and is sent in the various message of base station, example Such as, can be the S1 message of MME transmissions.Here S1 message can be the message that S1 interfaces are sent.

Here access restriction instruction can be the message for indicating corresponding access restriction taking effect rules.

In some embodiments, access restriction instruction includes:Forbid type of service, forbid access way and forbid connecing Enter at least one of UE types.

It is described to forbid type of service, can be the type of service for forbidding access.Here type of service can be IP numbers above-mentioned According to business or non-IP data services.The corresponding data packet of the IP data services carries purpose IP address, is with destination IP Location carries out routing forwarding.The corresponding data packet of the non-IP data services, does not carry purpose IP address, is according to service class The parameters such as type are forwarded directly to corresponding server or service the data packet of a group of planes, but this IP data services and non-IP numbers It is not limited to this according to the division of business.

Certainly data service here, which may also include from the angular divisions of data characteristics, is:Mo-data or mo- ExceptionData or delayTolerantAccess or mo-signaling;The type of service for forbidding access One of selection or combination etc. in above-mentioned 4 kinds of types of service.

It is described to forbid access way, can be the access way for forbidding UE access to use, access way here can be aforementioned UP modes, CP modes or legacy modes etc..

The UE types for forbidding access, can have the ability to be divided, for example, will only have the access sides UP from UE The UE of formula is drawn to one kind, CP modes and the UE of UP modes will be supported to be divided into one kind simultaneously.Forbid the UE types of access, Ke Yiyong Access is initiated in forbidding which kind of UE.

Access restriction described in the present embodiment indicates, while being the access restriction rule currently to come into force to UE instructions.Tool The access restriction rule of body, may refer to aforementioned corresponding part, is just not repeated herein.

The access restriction rule described in the present embodiment further includes limitation parameter, which may include time parameter, ratio At least one of example parameter and data model parameters;

The time parameter, the duration that comes into force for providing the access restriction rule;

The scale parameter is used to indicate the ratio of user equipment or the coming into force for access restriction rule of limitation access Probability;

The data model parameters, including:Data model thresholding;

The data model thresholding includes at least one of;

Data packet length thresholding;

Accumulate the accumulation thresholding of data volume;

Traffic threshold;

The data amount check thresholding of continuous data packet;

The transmission frequency or period thresholding of continuous data packet.

The limitation parameter and the access restriction content in access restriction rule, are used in conjunction with, limit access restriction content The information such as execution probability or execution duration in access restriction taking effect rules.

Specifically such as, the step S210 may include:When the network load of the core net meets the overload condition, or When the congestion condition of the core net meets the congestion condition, the access is sent to the access network elements by S1 interfaces Limitation instruction.

The access restriction instruction in the present embodiment, is to carry to send in the S1 message sent by S1 interfaces. When access network elements receive the S1 message, for example, when overload message, the access restriction instruction can be therefrom extracted.

As shown in figure 3, the present embodiment provides a kind of connection control methods, including:

Step S310:User equipment (UE) receives access network element and is indicated by the access restriction that dedicated RRC signaling is sent; Wherein, the access restriction is designated as the access network elements, meets overload condition in the network load of core net or access net, Or the congestion condition of the core net or access net meets and sends when congestion condition;

Step S320:Corresponding access restriction rule is indicated according to the access restriction, it is determined whether initiation connects next time Enter.

UE described in the present embodiment can be various types of UE, for example, mobile phone, tablet et al. carry UE, or vehicle-mounted UE.The UE can also be various Internet of Things UE.

UE can be indicated receiving the access restriction by dedicated RRC signaling.Here access restriction instruction can be institute Access network elements itself formation is stated, can also be to be received from core network element.Here the limitation that is included in indicates, is used to indicate In current time later a period of time or access restriction rule that current time comes into force.

UE receives the access limit limitation instruction in dedicated RRC signaling in the present embodiment, determines the access to come into force After restriction rule, when there is access demand next time, the corresponding access restriction rule to come into force is indicated according to access restriction, really It is fixed itself whether to be allowed to initiate access, if allowing just to initiate access, access demand is otherwise shielded, without access, to reduce Access the congestion or overload phenomenon of net or core net.

The dedicated RRC signaling can be RRC connections rejection signaling, RRC Connection Releases signaling and RRC connection reconstructions refusal letter It enables.These RRC signalings itself have and discharge this connection or refuse this connection, are equivalent to release or refuse this access Function, while the access restriction instruction is also carried in these signalings, it can be used for controlling the hair of UE accessed next time It rises, to which a signaling has multi-efficiency, reduces the signaling number and item number of interaction between access network elements and UE, reduce Signaling overheads.

The detailed content of the access restriction rule in the present embodiment, may refer to previous embodiment part, herein It is not repeated.Same drop, the access restriction rule can be divided into access restriction content and limitation parameter, when limitation parameter may include Between parameter, scale parameter or access model parameter etc., specifically may refer to aforementioned corresponding part.

The present embodiment provides a kind of access network elements, including:

First transmission unit, for meeting overload condition or the core net when the network load of core net or access net Or the congestion condition of access net is when meeting congestion condition, access network elements are using proprietary radio resource control RRC signaling to user Equipment UE sends access restriction instruction.

The access network elements can be various types of equipment for UE access, for example, eNB etc..

First transmission unit described in the present embodiment can correspond to the transmission antenna etc. of base station, can be used for various types of UE sends dedicated RRC signaling, and the access restriction instruction is sent to realize to UE.

The eNB further includes processor and/or storage medium etc., and processor can be used to form the access restriction instruction, The storage medium can be used for storing various information.The processor can be connect with the transmission antenna, can control described first The data of transmission unit are sent.

Access network elements described in the present embodiment can be one of the network element for realizing connection control method.It is connect described in the present embodiment Enter limitation instruction to also refer to show that the access restriction rule to come into force, the related content of access restriction rule may refer to aforementioned reality A part is applied, is not just repeated herein.

In some embodiments, the network element further includes:

Acquiring unit, for when it is described access net network load meet the overload condition or it is described access net gather around When plug-like condition meets the congestion condition, the access network element voluntarily forms the access restriction instruction;And/or when the core It is described when the congestion condition that the network load of heart net meets the overload condition or the core net meets the congestion condition Access network elements receive the access restriction instruction from core network element.

Here acquiring unit, can correspond to receiving interface, can be used for referring to from core network element reception access restriction Show, connect with first transmission unit, can be used for indicating the access restriction received from core network element, be sent to UE。

Certainly, the acquiring unit, also corresponds to processor, and processor can be according to currently detected load state Or congestion condition, itself generate the access restriction instruction.

Optionally, the acquiring unit, specifically for meeting the overload condition when the network load of the core net, or When the congestion condition of the core net meets the congestion condition, the access network elements are from access restriction described in S1 interfaces Instruction.For example, then the receiving interface, can carry from network elements such as MME by S1 interface S1 message from S1 message Take out the access restriction instruction.

Aforementioned, the dedicated RRC signaling includes at least one of:

RRC connections rejection signaling, RRC Connection Releases signaling and RRC connection reconstruction rejection signalings.

The present embodiment provides a kind of core network elements, including:

Second transmission unit, the congestion shape for meeting overload condition or the core net when the network load of core net When condition meets the congestion condition, access restriction instruction is sent to access network elements;Wherein, the access restriction instruction is used for institute It states access network elements and is sent to user equipment (UE) to limit the access of the UE.

Core network element described in the present embodiment may include any one network element positioned at core net, concretely MME,

Second transmission unit can correspond to the transmission interface of the core network element, can be used for accesses such as base stations Network element sends the access restriction instruction, and access restriction here indicates that can be used for access network elements is transmitted to UE, controls UE Access.

For example, the access restriction instruction includes:Forbid type of service, forbid access way and forbid accessing UE types At least one.

Specifically, the access restriction instruction, the access restriction rule of instruction may refer to preceding sections, just do not weigh herein It is multiple.

Further, second transmission unit, specifically for meeting the overload when the network load of the core net When the congestion condition of condition or the core net meets the congestion condition, sent to the access network elements by S1 interfaces The access restriction instruction.

The core network element may also include the other structures such as processor or processing circuit in some embodiments, and described Second transmission unit connects, for generating the access restriction instruction.

In the present embodiment, the generation of the access restriction instruction is equally referred to abovementioned steps S111 and step S112 is only to generate main body as core network element, is based on the load state of core net and congestion condition generates and core net Load state or congestion condition compatible access restriction instruction.

As shown in figure 4, the present embodiment provides a kind of user equipment (UE)s, including:

Receiving unit 310, for being indicated from access network element by the access restriction that dedicated RRC signaling is sent;Wherein, The access restriction is designated as the access network elements, meets overload condition or institute in the network load of core net or access net The congestion condition for stating core net or access net meets and sends when congestion condition;

Access unit 320, for indicating corresponding access restriction rule according to the access restriction, it is determined whether under initiation Primary access.

The receiving unit 310 can schedule the reception antenna of UE, can be used for receiving the instruction information.

The receiving unit 310 can receive broadcast message, multicast message or unicast messages, from broadcast message or multicast message Or the instruction information is extracted in unicast messages.

The transmission antenna that the access unit 320 can correspond to processor and be connect with processor, can be used for according to access Restriction rule sends access request, or does not send access request.The processor is first wanted when determining that current UE has access demand The access restriction rule currently to come into force is inquired, by judging the acquisition of parameter, will determine that the access restriction rule for participating in currently coming into force Successful match is worked as in matching then, then does not initiate to access, unsuccessful when matching, and initiates to access.Here judgement parameter may include The access capability of UE has the information such as the type of service of access demand or the access way of UE uses, by being connect with what is currently come into force Enter the matching of restriction rule, finally determines whether to initiate access.

The access restriction of the present embodiment indicates that the access restriction rule of instruction may refer to previous embodiment, herein just not It is repeated.

The proprietary RRC signaling can be aforementioned RRC Connection Releases signaling, RRC connection rejection signalings or RRC connection reconstructions Rejection signaling etc..

Several specific examples are provided below in conjunction with above-described embodiment:

Example 1:

The access restriction flow that this example is used for illustrating to be initiated by wireless access network oneself.

As an example using LTE accesses net, wireless access network element is eNB to this example.

As shown in figure 5, the access restriction method that this example provides includes:

Step 101:ENB judges whether the load level of oneself is high or overload, if it is, eNB is initiated to UE's Access restriction.

Step 102:For newly initiating the UE of access request or connection reconstruction request, eNB can be refused by RRC connections Either the reestablishment rejected processes of RRC limit the access behavior of UE and are refused in RRC connection rejection signalings or RRC connection reconstructions journey Specific access restriction rule and/or access restriction parameter are carried in exhausted signaling;For the UE in RRC connected states, eNB can be with The RRC connections that UE is discharged by RRC Connection Releases signaling to reduce the load of eNB, and are taken in RRC Connection Release signalings With specific access restriction rule and/or access restriction parameter;Or what is carried in the rejection signaling or Connection Release signaling connects Enter restriction rule and/or access restriction parameter for limiting the follow-up access behavior of the UE for being rejected or discharging. Specifically the step S102 includes:

It judges whether to initiate the connection the UE of request/reconstruction request or there is the UE in connected state

If in the presence of the UE for initiating the connection request or reconstruction request, eNB can be rebuild by RRC connection refusal processes or RRC Refusal process limits the access behavior of UE, for example, taken in RRC connection rejection signalings or RRC connection reconstruction rejection signalings The specific connection restriction rule of band and the access restriction for limiting parameter indicate to realize.

If there are the UE of connected state, eNB can discharge the RRC connections of UE by RRC Connection Releases signaling, and Access restriction instruction is carried in RRC Connection Release signalings.

Step 103:It is regular according to the access restriction is received UE (user equipment) prepares to initiate to access next time before And/or can the judgement of access restriction parameter initiate access behavior.

Example 2:

This example is used for illustrating the access restriction flow that wireless access network is initiated according to the instruction of core network element;

As an example using LTE accesses net, wireless access network element is eNB, core network element MME to this example (mobility management entity).

As shown in fig. 6, the access restriction method that this example provides includes:

Step 201:MME judges whether the load level of oneself is high or overload, if it is, by being connect with eNB Mouth sends premature beats information to eNB, which can be sent by Overload start message, can also pass through other S1 Interface signaling is sent.Include access restriction rule and/or access restriction parameter in the premature beats information;

Step 202:ENB meets the UE in oneself cell according to the MME received the premature beats information sent Enter control;It can be by RRC connection refusal processes or RRC for newly initiating the access request UE eNB that either connection reconstruction is asked Reestablishment rejected process limits the access behavior of UE, and is taken in RRC connection rejection signalings or RRC connection reconstruction rejection signalings With specific access restriction rule and/or access restriction parameter;For the UE in RRC connected states, eNB can be connected by RRC Release signaling discharges the RRC connections of UE, to reduce the load of eNB, and specific access is carried in RRC Connection Release signalings Restriction rule and/or access restriction parameter;Carried in the rejection signaling or Connection Release signaling access restriction rule and/or Access restriction parameter is for limiting the follow-up access behavior of the UE for being rejected or discharging.The access restriction rule Then and/or access restriction parameter should not mutually conflict with the premature beats information received from MME.Step 202 here and step 102 It is same or like, it is not just repeated herein.

Step 203:It is regular according to the access restriction is received UE (user equipment) prepares to initiate to access next time before And/or can the judgement of access restriction parameter initiate access behavior.

Example 3:

This example is used for illustrating the combination of different access restriction instructions can form which access restriction method and effect.

This implementation illustrates in example 1 and 2, and eNB is in RRC connection rejection signalings or RRC Connection Release signalings Including access restriction rule and/or access restriction parameter may include which mode, play what kind of access control effect;

This example and example 1 and 2 are combined, so that it may with formed include access control flow and access control parameter Complete detailed example child.

What eNB included in RRC connections rejection signaling, RRC connection reconstructions rejection signaling or RRC Connection Release signalings connects It includes following a few classes to enter restriction rule and/or access restriction parameter:

(1), be forbidden to use UP modes or legacy modes initiate mo-data or mo-ExceptionData or The calling of delayTolerantAccess or mo-signaling;

(2), be forbidden to use CP modes initiate mo-ExceptionData or delayTolerantAccess or The calling of mo-signaling;

(3), the UE (user equipment) of certain proportion X is forbidden to initiate the calling of mo-data using CP modes;

(4), forbid the UE that capacity of equipment is " only support CP modes " initiate mo-data or mo-ExceptionData, Or the calling of delayTolerantAccess or mo-signaling;

(5), the UE that capacity of equipment is " while supporting CP modes and UP modes " is forbidden to initiate mo-data or mo- The calling of ExceptionData or delayTolerantAccess or mo-signaling;

(6), forbid capacity of equipment be " while supporting CP modes and UP modes " UE using CP modes initiate mo-data, Or the calling of mo-ExceptionData or delayTolerantAccess or mo-signaling;

(7), the UE that capacity of equipment is " while supporting CP modes and UP modes " is forbidden to use UP modes or the side legacy Formula initiates mo-data's or mo-ExceptionData or delayTolerantAccess or mo-signaling Calling;

(8), forbid sending non-IP-data business;

(9), forbid sending more than the non-IP-data business of preset data packet size thresholding or more than accumulation data Measure the non-IP-data business of thresholding or more than the non-IP-data business of preset flow thresholding or with consecutive numbers According to the non-IP-data business of packet;

(10), forbid sending IP-data business;

(11), forbid sending more than the IP-data business of preset data packet size thresholding or more than accumulation data volume door The IP-data business of limit or IP-data business more than preset flow thresholding;

(12), CP schemes are forbidden to use to initiate more than the business of preset data packet size thresholding or more than accumulation data The business of thresholding or the business more than preset flow thresholding, or the business with continuous data packet are measured, the thresholding can To be notified UE by network side or be pre-seted by receiving-transmitting sides;

(13), UP schemes are forbidden to use to initiate less than the business of preset data packet size thresholding or less than accumulation data It measures the business of thresholding or (refers to less than the business of preset flow thresholding and be forbidden to use UP modes and send small data/small flow industry Business, because UP schemes are suitable for transmission big data/big flow)

ENB is advised according to the menace level of oneself load condition, and the main reason for lead to load in above-mentioned access restriction 1 rule-like is selected in then, or is selected a variety of without conflicting rule;Example below such as:

For selecting a kind of rule:

Example 1:Selection is regular (1), and the restricted service type selected is delayTolerantAccess, then eNB connects in RRC Connect in rejection signaling, RRC connection reconstructions rejection signaling or RRC Connection Release signalings includes following instructions:

It is forbidden to use UP modes or legacy modes initiates the calling of delayTolerantAccess;

The UE for receiving above-mentioned instruction need to be according to the access of instruction when it initiates the business of delayTolerantAccess Restriction rule can only use the method in addition to UP modes and legacy modes to initiate to access;

Example 2:Still it selecting regular (1), the restricted service type selected is mo-data and delayTolerantAccess, Then eNB includes following instructions in RRC connections rejection signaling, RRC connection reconstructions rejection signaling or RRC Connection Release signalings:

It is forbidden to use UP modes or legacy modes initiates exhaling for mo-data or delayTolerantAccess It cries;

The UE for receiving above-mentioned instruction, when it initiates the business of delayTolerantAccess or the business of mo-data When, the method in addition to UP modes and legacy modes need to can only be used to initiate to access according to the access restriction rule of instruction;

Example 3:Still it selects regular (1), the restricted service type selected is mo-ExceptionData and mo- Signaling and mo-data and delayTolerantAccess, then eNB is in RRC connections rejection signaling, RRC connection reconstructions Include following instructions in rejection signaling or RRC Connection Release signalings:

Be forbidden to use UP modes or legacy modes initiate mo-data or mo-ExceptionData or The calling of delayTolerantAccess or mo-signaling;

The UE for receiving above-mentioned instruction, when above-mentioned 4 kinds of business that its initiation rule is limited, can only use except UP modes and Method other than legacy modes is initiated to access;

Example 4:The usage of rule 2 can refer to rule 1, see example 1,2,3;

Example 5:Selection is regular (3), and the restricted service type selected is mo-data, then eNB RRC connections rejection signaling, Include following instructions in RRC connection reconstructions rejection signaling or RRC Connection Release signalings:

The UE (user equipment) of certain proportion X is forbidden to initiate the calling of mo-data using CP modes;The ratio X can be with It is configured by eNB, UE is notified by broadcast message or dedicated signaling, such as:When load is heavier, ratio X can be arranged It is higher, such as 80%.

The UE for receiving above-mentioned instruction, when the mo-data business that its initiation rule is limited, if other than using CP modes Other methods, can directly initiate to access, if using CP modes, need to calculate oneself according to uniform random number The probability that can initiate access, when ratio X is 80%, only 20% probability can initiate to access using CP modes;

Example 6:Selection is regular (4)

Forbid the UE that capacity of equipment is " only support CP modes " initiate mo-data or mo-ExceptionData or The calling of delayTolerantAccess or mo-signaling;

The rule all limits the type of service of the UE capability class having and initiation, in addition to energy power limit Outside, the limitation of business can select a variety of independent assortments, such as:

It is the calling that the UE of " only supporting CP modes " initiates mo-data to forbid capacity of equipment;

It is the calling that the UE of " only supporting CP modes " initiates delayTolerantAccess to forbid capacity of equipment;

It is that the UE of " only supporting CP modes " initiates mo-ExceptionData or mo-signaling to forbid capacity of equipment Calling;

It is the calling that the UE of " only supporting CP modes " initiates mo-signaling to forbid capacity of equipment;

Example 7:Selection is regular (5)

The UE that capacity of equipment is " while supporting CP modes and UP modes " is forbidden to initiate mo-data or mo- The calling of ExceptionData or delayTolerantAccess or mo-signaling.The rule settings are to another A kind of access restriction of UE abilities;Usage can refer to example 6;

Example 8:Selection is regular (6)

Forbid capacity of equipment be " while supporting CP modes and UP modes " UE using CP modes initiate mo-data or The calling of mo-ExceptionData or delayTolerantAccess or mo-signaling.

The rule includes 3 kinds of restrictive conditions to UE abilities, the access way used and the type of service initiated, and is made The example above is can refer to method.

Example 9:Selection is regular (7)

It is that the UE of " while supporting CP modes and UP modes " is sent out using UP modes or legacy modes to forbid capacity of equipment Play exhaling for mo-data or mo-ExceptionData or delayTolerantAccess or mo-signaling It cries;Regular (7) are similar with rule 6, only in the restrictive condition of the access way to using difference.

Example 10:Selection is regular (8)

Forbid sending non-IP-data business;

The rule only carries out limitation access to type of service, and is directed to be not based on the industry of IP address transmission technology Business, such business mostly use CP modes to be transmitted in current LTE protocol.

As long as receive the rule UE initiate be non-IP-data business, no matter its ability what is, no matter it is used Any access way cannot be initiated to access;

Example 11:Selection is regular (9)

Forbid sending more than the non-IP-data business of preset data packet size thresholding or more than accumulation data volume door The non-IP-data business of limit or more than preset flow thresholding non-IP-data business or have continuous data packet Non-IP-data business

The rule is looser relative to regular (8) to the access restriction condition of non-IP-data business, from business number Limitation access has been done to a part for non-IP-data business according to the angle of feature.The wherein limited angular of business datum feature Including following one or more kinds of combinations:

Forbid being more than preset data packet size thresholding;

Forbid being more than accumulation amount data threshold;

Forbid being more than preset flow thresholding;

Forbid with continuous data packet;

Example 12:Selection is regular (10) or (11)

It can refer to regular (8) or (9);

Example 13:Selection is regular (12)

CP schemes are forbidden to use to initiate more than the business of preset data packet size thresholding or more than accumulation amount data threshold Business or business more than preset flow thresholding, or the business with continuous data packet, the thresholding can be by nets Network side notifies UE or is pre-seted by receiving-transmitting sides;

The rule is combined the restrictive condition of the restrictive condition of business datum feature and access way, and usage can With reference to the rule for having CP schemes restrictive condition and the restrictive condition of business datum feature of front.

Example 14:Selection is regular (13)

UP schemes are forbidden to use to initiate less than the business of preset data packet size thresholding or less than accumulation amount data threshold Business or less than preset flow thresholding business (refer to and be forbidden to use UP modes and send small data/small-flow service because UP schemes are suitable for transmission big data/big flow)

The rule is also combined the restrictive condition of the restrictive condition of business datum feature and access way, different It is that the restrictive condition of access way is directed to UP modes, thus the restrictive condition of its corresponding business datum feature and regular (13) are Different, this example emphasizes that UP schemes cannot be used for transmitting small data packets or the business of low discharge.

ENB to UE send it is above-mentioned rule when, wherein one can be selected, can also select it is a plurality of, select it is a plurality of rule when It should be guaranteed that and do not conflict with each other between rule, also the part without mutually repeating.

Example 4:

When this example is used for illustrating that MME overloads, how to eNB transmission access restriction rules and parameter.MME is sent It may include which mode in the premature beats information of eNB to the access restriction rule and/or access restriction parameter for including, play What kind of access control effect;

MME can send the premature beats information, any message of S1 interfaces to eNB by S1 interface messages It uses, is Overload start message than more typical overload message.

The access restriction rule and/or access restriction parameter for including in the premature beats information that MME is sent can be with reference examples 13 kinds of rules described in 3, application method and example 3 are identical.

ENB can decide whether to adjustment member according to their own situation after the premature beats information for receiving MME transmissions UE is issued again after the premature beats information that MME is sent.

Example 5:

This example is used for illustrating combining the more flexible access restriction mode that can be formed after additional access restriction parameter.

On the basis of the access restriction rule of example 3 and 4, eNB or MME can also additionally send other access restrictions ginseng It counts and forms new more flexible access restriction rule to be coordinated with access restriction rule.

The additional access restriction parameter includes:

Time parameter, scale parameter, data model parameters:

Time parameter:Increase corresponding wait timer, to provide the duration of the access restriction taking effect rules;

Scale parameter:Increase probability factor or scale factor, with provide the access restriction taking effect rules probability or Person's UE ratios;

Data model thresholding:Increase data package size thresholding or accumulation amount data threshold or traffic threshold or The quantity thresholding of continuous data packet or the frequency of continuous data packet/period thresholding, to provide to wrap in the access restriction rule The business contained forbids more than the data model thresholding or forbids being less than the data model thresholding;

Above-mentioned 3 kinds of parameters can select the combination of a kind of parameter or many kinds of parameters, be carried out with access restriction rule above-mentioned In conjunction with forming new rule.

The concrete numerical value of above-mentioned 3 kinds of parameters can be configured by eNB, and be notified to UE by broadcast message or dedicated signaling.

Example 1:By regular (2) " be forbidden to use CP modes initiate mo-ExceptionData or The calling of delayTolerantAccess or mo-signaling " is combined with the time parameter, can form new rule It is then as follows:

Be forbidden to use in setting time range A CP modes initiate mo-ExceptionData or The calling of delayTolerantAccess or mo-signaling.

The time range A can be configured by eNB, and be notified to UE by broadcast message or dedicated signaling.

Example 2:By regular (2) " be forbidden to use CP modes initiate mo-ExceptionData or The calling of delayTolerantAccess or mo-signaling " is combined with the scale parameter, can form new rule It is then as follows:

Forbid the number of users of preset ratio B using CP modes initiate mo-ExceptionData or The calling of delayTolerantAccess or mo-signaling.

The preset ratio B can be configured by eNB, and be notified to UE by broadcast message or dedicated signaling.ENB can lead to Cross the calling that this mode forbids the number of users of ratio B to initiate to be restricted type of service using CP modes.

Example 3:By regular (2) " be forbidden to use CP modes initiate mo-ExceptionData or The calling of delayTolerantAccess or mo-signaling " is combined with the data model thresholding, wherein data mould Type thresholding includes data package size thresholding again or accumulates the number of amount data threshold or traffic threshold or continuous data packet Frequency/period the thresholding for measuring thresholding or continuous data packet, can select one of which or a variety of.New rule can be formed It is then as follows:

It is forbidden to use the calling for the delayTolerantAccess that CP modes are initiated more than data package size thresholding;

It is forbidden to use the calling for the mo-signaling that CP modes are initiated more than accumulation amount data threshold;

It is forbidden to use the calling for the mo-ExceptionData that CP modes are initiated more than traffic threshold;

Be forbidden to use CP modes initiate more than continuous data packet frequency/period thresholding mo-ExceptionData or The calling of person delayTolerantAccess or mo-signaling;

It is forbidden to use CP modes and initiates to be more than traffic threshold, or the mo- of quantity thresholding more than continuous data packet The calling of ExceptionData;

Example 4:By rule " forbidding sending non-IP-data business " and time parameter, scale parameter and data model door Limit is in combination with the new rule of formation is as follows:

In preset time range A, the number of users of preset ratio B is forbidden to send more than the non-IP- of traffic threshold Data business.

In all of above example, the type of wireless access network element also includes other than eNB:The chicken of cell stands Other access network elements types of small cell, Home eNodeB and compatible core net (EPC) framework.

Core network element of the embodiment of the present invention also includes honeycomb Internet of Things service gateway nodes other than MME (Cellular internet of thing-Serving Gateway Node, C-SGN) is based on cellular narrowband Internet of Things (Narrow Band Internet of Things, NB-IoT) MME etc. supports the core of machine type communication and mobile management Heart network element.

In several embodiments provided herein, it should be understood that disclosed device and method can pass through it Its mode is realized.Apparatus embodiments described above are merely indicative, for example, the division of the unit, only A kind of division of logic function, formula that in actual implementation, there may be another division manner, such as:Multiple units or component can combine, or It is desirably integrated into another system, or some features can be ignored or not executed.In addition, shown or discussed each composition portion It can be the INDIRECT COUPLING by some interfaces, equipment or unit to divide mutual coupling or direct-coupling or communication connection Or communication connection, can be electrical, mechanical or other forms.

The above-mentioned unit illustrated as separating component can be or may not be and be physically separated, aobvious as unit The component shown can be or may not be physical unit, you can be located at a place, may be distributed over multiple network lists In member;Some or all of wherein unit can be selected according to the actual needs to achieve the purpose of the solution of this embodiment.

In addition, each functional unit in various embodiments of the present invention can be fully integrated into a processing module, also may be used It, can also be during two or more units be integrated in one unit to be each unit individually as a unit;It is above-mentioned The form that hardware had both may be used in integrated unit is realized, can also be realized in the form of hardware adds SFU software functional unit.

One of ordinary skill in the art will appreciate that:Realize that all or part of step of above method embodiment can pass through The relevant hardware of program instruction is completed, and program above-mentioned can be stored in a computer read/write memory medium, the program When being executed, step including the steps of the foregoing method embodiments is executed;And storage medium above-mentioned includes:It is movable storage device, read-only Memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disc or The various media that can store program code such as person's CD.

The above description is merely a specific embodiment, but scope of protection of the present invention is not limited thereto, any Those familiar with the art in the technical scope disclosed by the present invention, can easily think of the change or the replacement, and should all contain Lid is within protection scope of the present invention.Therefore, protection scope of the present invention should be based on the protection scope of the described claims.

Claims (30)

1. a kind of connection control method, which is characterized in that including:
When the congestion condition that the network load of core net or access net meets overload condition or the core net or access net meets When congestion condition, access network elements send access restriction to user equipment (UE) using proprietary radio resource control RRC signaling and indicate.
2. according to the method described in claim 1, it is characterized in that,
The access restriction instruction is used to indicate the access restriction rule to come into force;
The access restriction rule includes at least one of:
It is forbidden to use user plane optimization data transmission UP modes or wireless heterogeneous networks connection establishes legacy modes and initiates to lead It is the extraordinary data mo-ExceptionData of data service mo-data, the caller, delay tolerance access service The calling of delayTolerantAccess or caller signaling traffic mo-signaling;
It is forbidden to use control plane optimization data transmission CP modes and initiates the mo-ExceptionData, described The calling of delayTolerantAccess or the mo-signaling;
The UE of predetermined ratio is forbidden to initiate the calling of the mo-data using CP modes;
Forbid only supporting a UE for CP modes to initiate the mo-data, mo-ExceptionData, described The calling of delayTolerantAccess or the mo-signaling;
Forbid supporting the UE of CP modes and UP modes to initiate the mo-data, mo-ExceptionData, described simultaneously The calling of delayTolerantAccess or the mo-signaling;
Forbid that the UE of CP modes and UP modes is supported to initiate the mo-data, the mo- using CP modes simultaneously The calling of ExceptionData, the delayTolerantAccess or the mo-signaling;
The UE for forbidding supporting CP modes and UP modes simultaneously, using UP modes or legacy modes initiate the mo-data or The calling of mo-ExceptionData described in person, the delayTolerantAccess or the mo-signaling;
Forbid sending non-network protocol data non-IP-data business;
Transmission single data packet is forbidden to be more than the non-IP-data business of the first preset data packet length thresholding, once connect It is more than the first preset flow door that accumulation transmission data amount, which is connect, more than the non-IP-data business of the first accumulation thresholding, flow The non-IP-data business of limit or the non-IP-data business with continuous data packet, wherein described to have The non-IP-data business of continuous data packet is:The non-IP-data of multiple data packets is sent by once connecting Business;
Forbid sending the Internet protocol data IP-data business;
Forbid sending the IP-data business, primary connection that single data packet is more than the second preset data packet length thresholding and tire out The IP- that volume data amount is more than the IP-data business of the second accumulation thresholding, flow is more than the second preset flow thresholding Data business;
It is more than the business of third preset data packet length thresholding to be forbidden to use CP modes to initiate, once connection accumulation data volume is more than Third accumulates the business of thresholding, flow is more than the business of third preset flow thresholding, or the business with continuous data packet;
UP modes are forbidden to use to initiate to be less than less than the business of the 4th preset data packet length thresholding, primary connection accumulation data volume The business or flow of 4th accumulation thresholding are less than the business of the 4th preset flow thresholding.
3. method according to claim 1 or 2, which is characterized in that
The access restriction rule further includes at least one of time parameter, scale parameter and data model parameters;
The time parameter, the duration that comes into force for providing the access restriction rule;
The scale parameter is used to indicate the ratio of the user equipment of limitation access or coming into force generally for access restriction rule Rate;
The data model parameters, including:Data model thresholding;
The data model thresholding includes at least one of;
Data packet length thresholding;
Accumulate the accumulation thresholding of data volume;
Traffic threshold;
The data amount check thresholding of continuous data packet;
The transmission frequency or period thresholding of continuous data packet.
4. method according to claim 1 or 2, which is characterized in that
The method further includes at least one of:
When the congestion condition that the network load of the access net meets the overload condition or the access net meets the congestion When condition, the access network element voluntarily forms the access restriction instruction;
When the congestion condition that the network load of the core net meets the overload condition or the core net meets the congestion When condition, the access network elements receive the access restriction instruction from core network element.
5. according to the method described in claim 4, it is characterized in that,
It is described when the network load of the core net meet the overload condition or the core net congestion condition meet it is described When congestion condition, the access network elements receive the access restriction instruction from core network element, including:
When the congestion condition that the network load of the core net meets the overload condition or the core net meets the congestion When condition, the access network elements are indicated from access restriction described in S1 interfaces.
6. method according to claim 1 or 2, which is characterized in that
The dedicated RRC signaling includes at least one of:
RRC connections rejection signaling, RRC Connection Releases signaling and RRC connection reconstruction rejection signalings.
7. a kind of connection control method, which is characterized in that including:
When the congestion condition that the network load of core net meets overload condition or the core net meets congestion condition, to connecing Network element sends access restriction instruction;Wherein, the access restriction instruction is sent to user for the access network elements and sets Standby UE is to limit the access of the UE.
8. the method according to the description of claim 7 is characterized in that
The access restriction indicates:Forbid type of service, forbid access way and forbid accessing at least one of UE types.
9. method according to claim 7 or 8, which is characterized in that
The access restriction instruction is used to indicate the access restriction rule to come into force;
The access restriction rule includes at least one of:
It is forbidden to use user plane optimization data transmission UP modes or wireless heterogeneous networks connection establishes legacy modes and initiates to lead It is the extraordinary data mo-ExceptionData of data service mo-data, the caller, delay tolerance access service The calling of delayTolerantAccess or caller signaling traffic mo-signaling;
It is forbidden to use control plane optimization data transmission CP modes and initiates the mo-ExceptionData, described The calling of delayTolerantAccess or the mo-signaling;
The UE of predetermined ratio is forbidden to initiate the calling of the mo-data using CP modes;
Forbid only supporting a UE for CP modes to initiate the mo-data, mo-ExceptionData, described The calling of delayTolerantAccess or the mo-signaling;
Forbid supporting the UE of CP modes and UP modes to initiate the mo-data, mo-ExceptionData, described simultaneously The calling of delayTolerantAccess or the mo-signaling;
Forbid that the UE of CP modes and UP modes is supported to initiate the mo-data, the mo- using CP modes simultaneously The calling of ExceptionData, the delayTolerantAccess or the mo-signaling;
The UE for forbidding supporting CP modes and UP modes simultaneously, using UP modes or legacy modes initiate the mo-data or The calling of mo-ExceptionData described in person, the delayTolerantAccess or the mo-signaling;
Forbid sending non-network protocol data non-IP-data business;
Transmission single data packet is forbidden to be more than the non-IP-data business of the first preset data packet length thresholding, once connect It is more than the first preset flow door that accumulation transmission data amount, which is connect, more than the non-IP-data business of the first accumulation thresholding, flow The non-IP-data business of limit or the non-IP-data business with continuous data packet, wherein described to have The non-IP-data business of continuous data packet is:The non-IP-data of multiple data packets is sent by once connecting Business;
Forbid sending the Internet protocol data IP-data business;
Forbid sending the IP-data business, primary connection that single data packet is more than the second preset data packet length thresholding and tire out The IP- that volume data amount is more than the IP-data business of the second accumulation thresholding, flow is more than the second preset flow thresholding Data business;
It is more than the business of third preset data packet length thresholding to be forbidden to use CP modes to initiate, once connection accumulation data volume is more than Third accumulates the business of thresholding, flow is more than the business of third preset flow thresholding, or the business with continuous data packet;
UP modes are forbidden to use to initiate to be less than less than the business of the 4th preset data packet length thresholding, primary connection accumulation data volume The business or flow of 4th accumulation thresholding are less than the business of the 4th preset flow thresholding.
10. according to the method described in claim 9, it is characterized in that,
The access restriction rule further includes at least one of time parameter, scale parameter and data model parameters;
The time parameter, the duration that comes into force for providing the access restriction rule;
The scale parameter is used to indicate the ratio of the user equipment of limitation access or coming into force generally for access restriction rule Rate;
The data model parameters, including:Data model thresholding;
The data model thresholding includes at least one of;
Data packet length thresholding;
Accumulate the accumulation thresholding of data volume;
Traffic threshold;
The data amount check thresholding of continuous data packet;
The transmission frequency or period thresholding of continuous data packet.
11. method according to claim 7 or 8, which is characterized in that
The congestion condition for meeting overload condition or the core net when the network load of core net meets the congestion condition When, access restriction instruction is sent to access network elements, including:
When the congestion condition that the network load of the core net meets the overload condition or the core net meets the congestion When condition, the access restriction is sent to the access network elements by S1 interfaces and is indicated.
12. method according to claim 7 or 8, which is characterized in that
It is described to include to the access network elements transmission access restriction instruction by S1 interfaces:
The access restriction instruction is sent by intervening network element described in overload message picture.
13. a kind of connection control method, which is characterized in that including:
User equipment (UE) receives access network element and is indicated by the access restriction that dedicated RRC signaling is sent;Wherein, the access Limitation is designated as the access network elements, meets overload condition or the core net in the network load of core net or access net Or the congestion condition of access net meets and sends when congestion condition;
Corresponding access restriction rule is indicated according to the access restriction, it is determined whether initiation accesses next time.
14. according to the method for claim 13, which is characterized in that
The access restriction instruction is used to indicate the access restriction rule to come into force;
The access restriction rule includes at least one of:
It is forbidden to use user plane optimization data transmission UP modes or wireless heterogeneous networks connection establishes legacy modes and initiates to lead It is the extraordinary data mo-ExceptionData of data service mo-data, the caller, delay tolerance access service The calling of delayTolerantAccess or caller signaling traffic mo-signaling;
It is forbidden to use control plane optimization data transmission CP modes and initiates the mo-ExceptionData, described The calling of delayTolerantAccess or the mo-signaling;
The UE of predetermined ratio is forbidden to initiate the calling of the mo-data using CP modes;
Forbid only supporting a UE for CP modes to initiate the mo-data, mo-ExceptionData, described The calling of delayTolerantAccess or the mo-signaling;
Forbid supporting the UE of CP modes and UP modes to initiate the mo-data, mo-ExceptionData, described simultaneously The calling of delayTolerantAccess or the mo-signaling;
Forbid that the UE of CP modes and UP modes is supported to initiate the mo-data, the mo- using CP modes simultaneously The calling of ExceptionData, the delayTolerantAccess or the mo-signaling;
The UE for forbidding supporting CP modes and UP modes simultaneously, using UP modes or legacy modes initiate the mo-data or The calling of mo-ExceptionData described in person, the delayTolerantAccess or the mo-signaling;
Forbid sending non-network protocol data non-IP-data business;
Transmission single data packet is forbidden to be more than the non-IP-data business of the first preset data packet length thresholding, once connect It is more than the first preset flow door that accumulation transmission data amount, which is connect, more than the non-IP-data business of the first accumulation thresholding, flow The non-IP-data business of limit or the non-IP-data business with continuous data packet, wherein described to have The non-IP-data business of continuous data packet is:The non-IP-data of multiple data packets is sent by once connecting Business;
Forbid sending the Internet protocol data IP-data business;
Forbid sending the IP-data business, primary connection that single data packet is more than the second preset data packet length thresholding and tire out The IP- that volume data amount is more than the IP-data business of the second accumulation thresholding, flow is more than the second preset flow thresholding Data business;
It is more than the business of third preset data packet length thresholding to be forbidden to use CP modes to initiate, once connection accumulation data volume is more than Third accumulates the business of thresholding, flow is more than the business of third preset flow thresholding, or the business with continuous data packet;
UP modes are forbidden to use to initiate to be less than less than the business of the 4th preset data packet length thresholding, primary connection accumulation data volume The business or flow of 4th accumulation thresholding are less than the business of the 4th preset flow thresholding.
15. the method according to claim 13 or 14, which is characterized in that
The access restriction rule further includes at least one of time parameter, scale parameter and data model parameters;
The time parameter, the duration that comes into force for providing the access restriction rule;
The scale parameter is used to indicate the ratio of the user equipment of limitation access or coming into force generally for access restriction rule Rate;
The data model parameters, including:Data model thresholding;
The data model thresholding includes at least one of;
Data packet length thresholding;
Accumulate the accumulation thresholding of data volume;
Traffic threshold;
The data amount check thresholding of continuous data packet;
The transmission frequency or period thresholding of continuous data packet.
16. a kind of access network elements, which is characterized in that including:
First transmission unit, for when the network load of core net or access net meets overload condition or the core net or connects When the congestion condition of networking meets congestion condition, access network elements utilize proprietary radio resource control RRC signaling to user equipment UE sends access restriction instruction.
17. network element according to claim 16, which is characterized in that
The access restriction instruction is used to indicate the access restriction rule to come into force;
The access restriction rule includes at least one of:
It is forbidden to use user plane optimization data transmission UP modes or wireless heterogeneous networks connection establishes legacy modes and initiates to lead It is the extraordinary data mo-ExceptionData of data service mo-data, the caller, delay tolerance access service The calling of delayTolerantAccess or caller signaling traffic mo-signaling;
It is forbidden to use control plane optimization data transmission CP modes and initiates the mo-ExceptionData, described The calling of delayTolerantAccess or the mo-signaling;
The UE of predetermined ratio is forbidden to initiate the calling of the mo-data using CP modes;
Forbid only supporting a UE for CP modes to initiate the mo-data, mo-ExceptionData, described The calling of delayTolerantAccess or the mo-signaling;
Forbid supporting the UE of CP modes and UP modes to initiate the mo-data, mo-ExceptionData, described simultaneously The calling of delayTolerantAccess or the mo-signaling;
Forbid that the UE of CP modes and UP modes is supported to initiate the mo-data, the mo- using CP modes simultaneously The calling of ExceptionData, the delayTolerantAccess or the mo-signaling;
The UE for forbidding supporting CP modes and UP modes simultaneously, using UP modes or legacy modes initiate the mo-data or The calling of mo-ExceptionData described in person, the delayTolerantAccess or the mo-signaling;
Forbid sending non-network protocol data non-IP-data business;
Transmission single data packet is forbidden to be more than the non-IP-data business of the first preset data packet length thresholding, once connect It is more than the first preset flow door that accumulation transmission data amount, which is connect, more than the non-IP-data business of the first accumulation thresholding, flow The non-IP-data business of limit or the non-IP-data business with continuous data packet, wherein described to have The non-IP-data business of continuous data packet is:The non-IP-data of multiple data packets is sent by once connecting Business;
Forbid sending the Internet protocol data IP-data business;
Forbid sending the IP-data business, primary connection that single data packet is more than the second preset data packet length thresholding and tire out The IP- that volume data amount is more than the IP-data business of the second accumulation thresholding, flow is more than the second preset flow thresholding Data business;
It is more than the business of third preset data packet length thresholding to be forbidden to use CP modes to initiate, once connection accumulation data volume is more than Third accumulates the business of thresholding, flow is more than the business of third preset flow thresholding, or the business with continuous data packet;
UP modes are forbidden to use to initiate to be less than less than the business of the 4th preset data packet length thresholding, primary connection accumulation data volume The business or flow of 4th accumulation thresholding are less than the business of the 4th preset flow thresholding.
18. network element according to claim 16 or 17, which is characterized in that
The access restriction rule further includes at least one of time parameter, scale parameter and data model parameters;
The time parameter, the duration that comes into force for providing the access restriction rule;
The scale parameter is used to indicate the ratio of the user equipment of limitation access or coming into force generally for access restriction rule Rate;
The data model parameters, including:Data model thresholding;
The data model thresholding includes at least one of;
Data packet length thresholding;
Accumulate the accumulation thresholding of data volume;
Traffic threshold;
The data amount check thresholding of continuous data packet;
The transmission frequency or period thresholding of continuous data packet.
19. network element according to claim 16 or 17, which is characterized in that
The network element further includes:
Acquiring unit, the congestion shape for meeting the overload condition or the access net when the network load of the access net When condition meets the congestion condition, the access network element voluntarily forms the access restriction instruction;And/or when the core net Network load when meeting the congestion condition of the overload condition or the core net and meeting the congestion condition, the access Network element receives the access restriction instruction from core network element.
20. according to the method for claim 19, which is characterized in that
The acquiring unit, specifically for meeting the overload condition or the core net when the network load of the core net Congestion condition when meeting the congestion condition, the access network elements are indicated from access restriction described in S1 interfaces.
21. network element according to claim 16 or 17, which is characterized in that
The dedicated RRC signaling includes at least one of:
RRC connections rejection signaling, RRC Connection Releases signaling and RRC connection reconstruction rejection signalings.
22. a kind of core network element, which is characterized in that including:
Second transmission unit, the congestion condition symbol for meeting overload condition or the core net when the network load of core net When closing the congestion condition, access restriction instruction is sent to access network elements;Wherein, the access restriction instruction connects for described Network element is sent to user equipment (UE) to limit the access of the UE.
23. network element according to claim 22, which is characterized in that
The access restriction indicates:Forbid type of service, forbid access way and forbid accessing at least one of UE types.
24. the network element according to claim 22 or 23, which is characterized in that
The access restriction instruction is used to indicate the access restriction rule to come into force;
The access restriction rule includes at least one of:
It is forbidden to use user plane optimization data transmission UP modes or wireless heterogeneous networks connection establishes legacy modes and initiates to lead It is the extraordinary data mo-ExceptionData of data service mo-data, the caller, delay tolerance access service The calling of delayTolerantAccess or caller signaling traffic mo-signaling;
It is forbidden to use control plane optimization data transmission CP modes and initiates the mo-ExceptionData, described The calling of delayTolerantAccess or the mo-signaling;
The UE of predetermined ratio is forbidden to initiate the calling of the mo-data using CP modes;
Forbid only supporting a UE for CP modes to initiate the mo-data, mo-ExceptionData, described The calling of delayTolerantAccess or the mo-signaling;
Forbid supporting the UE of CP modes and UP modes to initiate the mo-data, mo-ExceptionData, described simultaneously The calling of delayTolerantAccess or the mo-signaling;
Forbid that the UE of CP modes and UP modes is supported to initiate the mo-data, the mo- using CP modes simultaneously The calling of ExceptionData, the delayTolerantAccess or the mo-signaling;
The UE for forbidding supporting CP modes and UP modes simultaneously, using UP modes or legacy modes initiate the mo-data or The calling of mo-ExceptionData described in person, the delayTolerantAccess or the mo-signaling;
Forbid sending non-network protocol data non-IP-data business;
Transmission single data packet is forbidden to be more than the non-IP-data business of the first preset data packet length thresholding, once connect It is more than the first preset flow door that accumulation transmission data amount, which is connect, more than the non-IP-data business of the first accumulation thresholding, flow The non-IP-data business of limit or the non-IP-data business with continuous data packet, wherein described to have The non-IP-data business of continuous data packet is:The non-IP-data of multiple data packets is sent by once connecting Business;
Forbid sending the Internet protocol data IP-data business;
Forbid sending the IP-data business, primary connection that single data packet is more than the second preset data packet length thresholding and tire out The IP- that volume data amount is more than the IP-data business of the second accumulation thresholding, flow is more than the second preset flow thresholding Data business;
It is more than the business of third preset data packet length thresholding to be forbidden to use CP modes to initiate, once connection accumulation data volume is more than Third accumulates the business of thresholding, flow is more than the business of third preset flow thresholding, or the business with continuous data packet;
UP modes are forbidden to use to initiate to be less than less than the business of the 4th preset data packet length thresholding, primary connection accumulation data volume The business or flow of 4th accumulation thresholding are less than the business of the 4th preset flow thresholding.
25. network element according to claim 23, which is characterized in that
The access restriction rule further includes at least one of time parameter, scale parameter and data model parameters;
The time parameter, the duration that comes into force for providing the access restriction rule;
The scale parameter is used to indicate the ratio of the user equipment of limitation access or coming into force generally for access restriction rule Rate;
The data model parameters, including:Data model thresholding;
The data model thresholding includes at least one of;
Data packet length thresholding;
Accumulate the accumulation thresholding of data volume;
Traffic threshold;
The data amount check thresholding of continuous data packet;
The transmission frequency or period thresholding of continuous data packet.
26. the network element according to claim 23 or 24, which is characterized in that
Second transmission unit, specifically for meeting the overload condition or the core when the network load of the core net When the congestion condition of heart net meets the congestion condition, the access restriction is sent to the access network elements by S1 interfaces and is referred to Show.
27. network element according to claim 26, which is characterized in that
It is described that the access restriction instruction is sent to the access network elements by S1 interfaces, including:
By S1 interfaces the access restriction instruction is sent to the access network elements.
28. a kind of user equipment (UE), which is characterized in that including:
Receiving unit, for being indicated from access network element by the access restriction that dedicated RRC signaling is sent;Wherein, described to connect Enter limitation and be designated as the access network elements, meets overload condition or the core in the network load of core net or access net The congestion condition of net or access net, which meets, to be sent when congestion condition;
Access unit, for indicating corresponding access restriction rule according to the access restriction next time, it is determined whether initiation connects Enter.
29. UE according to claim 28, which is characterized in that
The access restriction instruction is used to indicate the access restriction rule to come into force;
The access restriction rule includes at least one of:
It is forbidden to use user plane optimization data transmission UP modes or wireless heterogeneous networks connection establishes legacy modes and initiates to lead It is the extraordinary data mo-ExceptionData of data service mo-data, the caller, delay tolerance access service The calling of delayTolerantAccess or caller signaling traffic mo-signaling;
It is forbidden to use control plane optimization data transmission CP modes and initiates the mo-ExceptionData, described The calling of delayTolerantAccess or the mo-signaling;
The UE of predetermined ratio is forbidden to initiate the calling of the mo-data using CP modes;
Forbid only supporting a UE for CP modes to initiate the mo-data, mo-ExceptionData, described The calling of delayTolerantAccess or the mo-signaling;
Forbid supporting the UE of CP modes and UP modes to initiate the mo-data, mo-ExceptionData, described simultaneously The calling of delayTolerantAccess or the mo-signaling;
Forbid that the UE of CP modes and UP modes is supported to initiate the mo-data, the mo- using CP modes simultaneously The calling of ExceptionData, the delayTolerantAccess or the mo-signaling;
The UE for forbidding supporting CP modes and UP modes simultaneously, using UP modes or legacy modes initiate the mo-data or The calling of mo-ExceptionData described in person, the delayTolerantAccess or the mo-signaling;
Forbid sending non-network protocol data non-IP-data business;
Transmission single data packet is forbidden to be more than the non-IP-data business of the first preset data packet length thresholding, once connect It is more than the first preset flow door that accumulation transmission data amount, which is connect, more than the non-IP-data business of the first accumulation thresholding, flow The non-IP-data business of limit or the non-IP-data business with continuous data packet, wherein described to have The non-IP-data business of continuous data packet is:The non-IP-data of multiple data packets is sent by once connecting Business;
Forbid sending the Internet protocol data IP-data business;
Forbid sending the IP-data business, primary connection that single data packet is more than the second preset data packet length thresholding and tire out The IP- that volume data amount is more than the IP-data business of the second accumulation thresholding, flow is more than the second preset flow thresholding Data business;
It is more than the business of third preset data packet length thresholding to be forbidden to use CP modes to initiate, once connection accumulation data volume is more than Third accumulates the business of thresholding, flow is more than the business of third preset flow thresholding, or the business with continuous data packet;
UP modes are forbidden to use to initiate to be less than less than the business of the 4th preset data packet length thresholding, primary connection accumulation data volume The business or flow of 4th accumulation thresholding are less than the business of the 4th preset flow thresholding.
30. the UE according to claim 28 or 29, which is characterized in that
The access restriction rule further includes at least one of time parameter, scale parameter and data model parameters;
The time parameter, the duration that comes into force for providing the access restriction rule;
The scale parameter is used to indicate the ratio of the user equipment of limitation access or coming into force generally for access restriction rule Rate;
The data model parameters, including:Data model thresholding;
The data model thresholding includes at least one of;
Data packet length thresholding;
Accumulate the accumulation thresholding of data volume;
Traffic threshold;
The data amount check thresholding of continuous data packet;
The transmission frequency or period thresholding of continuous data packet.
CN201710058957.5A 2017-01-23 2017-01-23 Connection control method, access network elements, core network element and user equipment CN108347743A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710058957.5A CN108347743A (en) 2017-01-23 2017-01-23 Connection control method, access network elements, core network element and user equipment

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710058957.5A CN108347743A (en) 2017-01-23 2017-01-23 Connection control method, access network elements, core network element and user equipment
PCT/CN2017/116875 WO2018133604A1 (en) 2017-01-23 2017-12-18 Access control method, network element, user equipment, and computer storage medium

Publications (1)

Publication Number Publication Date
CN108347743A true CN108347743A (en) 2018-07-31

Family

ID=62907730

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710058957.5A CN108347743A (en) 2017-01-23 2017-01-23 Connection control method, access network elements, core network element and user equipment

Country Status (2)

Country Link
CN (1) CN108347743A (en)
WO (1) WO2018133604A1 (en)

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102811462A (en) * 2011-05-31 2012-12-05 普天信息技术研究院有限公司 Overload processing method and system for mobility management entity
KR101967721B1 (en) * 2011-08-10 2019-04-10 삼성전자 주식회사 Method and appratus of applying extended access barring in mobile communication system
JP6008523B2 (en) * 2012-03-14 2016-10-19 株式会社Nttドコモ Mobile station and radio base station
US9775011B2 (en) * 2014-01-31 2017-09-26 Intel Corporation Implementations of application specific access class barring skip functionality in a wireless network

Also Published As

Publication number Publication date
WO2018133604A1 (en) 2018-07-26

Similar Documents

Publication Publication Date Title
JP6453973B2 (en) Multiple Priority Control Method and Apparatus in Wireless Communication System
US10136284B2 (en) Coordinated grouping for machine type communications group based services
US20170164269A1 (en) Extended access barring
US9225399B2 (en) Method to enable optimization for small data in an evolved packet core (EPC)
US10219143B2 (en) Data transmission method, mobility management entity, and mobile terminal
US9078121B2 (en) Automatic ad-hoc network of mobile devices
US20150289139A1 (en) Method and apparatus for controlling network access of ue in wireless communication system
US9554233B2 (en) Method and device for controlling multipriority in wireless communication system
CN105247931B (en) Dynamic spectrum referee method and system
CN104869526B (en) A kind of communication of device-to-device and its resource allocation methods, equipment
KR101698285B1 (en) Method for connecting ims-based service
US9380551B2 (en) Method and terminal for performing detach procedure
US8879413B2 (en) Method and system for controlling access of machine type communications devices
KR101572443B1 (en) Probe messaging for direct link connections
US9088967B2 (en) Wireless communication system and connection method between user equipment and a mobility management entity
KR101527309B1 (en) Method and apparatus for performing random access based on delay determined by network
CN102111847B (en) Access control method and device
CN102333293B (en) Small data transmission method and equipment
US20170019833A1 (en) Methods and devices for sending or receiving routing information, and system for processing routing information
US9532395B2 (en) System and method for device to device (D2D) communication
US10455406B2 (en) Method and apparatus for generating packet data network connection of user equipment
CN103249013B (en) A kind of sending method, system and the user equipment of MTC user equipmenies triggering information
JP2016525818A (en) Dynamic spectrum arbitrage policy driven quality of service method and system
CN104980991B (en) Communication device and method for network signal
US9125137B2 (en) Method and terminal for applying an extended access barring

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination