CN108347746B - Access control method, access network element and user equipment - Google Patents

Access control method, access network element and user equipment Download PDF

Info

Publication number
CN108347746B
CN108347746B CN201710058991.2A CN201710058991A CN108347746B CN 108347746 B CN108347746 B CN 108347746B CN 201710058991 A CN201710058991 A CN 201710058991A CN 108347746 B CN108347746 B CN 108347746B
Authority
CN
China
Prior art keywords
access
data
service
threshold
forbidden
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710058991.2A
Other languages
Chinese (zh)
Other versions
CN108347746A (en
Inventor
戴谦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201710058991.2A priority Critical patent/CN108347746B/en
Priority to PCT/CN2017/117031 priority patent/WO2018133606A1/en
Publication of CN108347746A publication Critical patent/CN108347746A/en
Application granted granted Critical
Publication of CN108347746B publication Critical patent/CN108347746B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions
    • H04W48/06Access restriction performed under specific conditions based on traffic conditions

Abstract

The embodiment of the invention discloses an access control method and device, wherein the method comprises the following steps: when the network load of a core network or an access network accords with an overload condition or the congestion condition of the core network or the access network accords with a congestion condition, an access network element sends indication information of an access restriction rule to User Equipment (UE); wherein the access restriction rule comprises at least one of: the access mode used by the UE is forbidden; the UE type of forbidden access; the type of service that is barred from access.

Description

Access control method, access network element and user equipment
Technical Field
The present invention relates to the field of wireless communications, and in particular, to an access control method, an access network element, and a User Equipment (UE).
Background
The method is introduced into the Internet of things, so that a large amount of low-cost, small-bandwidth and small-data are connected to the network by the Internet of things equipment. However, the duration of the access of the internet of things device to the network is short, the transmission data volume is small, the device holding volume is very huge, and a large amount of overhead of control plane signaling of an air interface and control plane signaling of the ground side can be caused when the connection between the device and the wireless communication network is established each time, but compared with the data volume transmitted by the device, the situation that the overhead of the control plane signaling is larger than the data volume of the user plane occurs, which causes the low transmission efficiency of the system and the corresponding problems of network element overload and congestion.
Disclosure of Invention
In view of this, it is desirable to provide an access control method, an access network element and a UE, which can be used to alleviate overload or congestion conditions.
In order to achieve the above purpose, the technical scheme of the invention is realized as follows: a first aspect of an embodiment of the present invention provides an access control method, including:
when the network load of a core network or an access network accords with an overload condition or the congestion condition of the core network or the access network accords with a congestion condition, an access network element sends indication information of an access limit rule to UE;
wherein the access restriction rule comprises at least one of:
The access mode used by the UE is forbidden;
the UE type of forbidden access;
the type of service that is barred from access.
A second aspect of an embodiment of the present invention provides an access control method, including:
receiving indication information sent by an access network element, wherein the indication information is used for indicating an access restriction rule, and the access restriction rule comprises at least one of the following:
the access mode used by the UE is forbidden;
Disabling the type of UE;
the service type of forbidden access;
and determining whether to initiate access according to the access limit rule pointed by the indication information.
A third aspect of an embodiment of the present invention provides an access network element, including:
A sending unit, configured to send, when a network load of a core network or an access network meets an overload condition, or a congestion condition of the core network or the access network meets a congestion condition, an indication information of an access restriction rule to a user equipment UE by an access network element;
wherein the access restriction rule comprises at least one of:
The access mode used by the UE is forbidden;
the UE type of forbidden access;
the type of service that is barred from access.
A fourth aspect of an embodiment of the present invention provides a UE, including:
The receiving unit is configured to receive indication information sent by an access network element, where the indication information is used to indicate an access restriction rule, and the access restriction rule includes at least one of the following:
The access mode used by the UE is forbidden;
Disabling the type of UE;
the service type of forbidden access;
and the access unit is used for determining whether to initiate access according to the access limit rule pointed by the indication information.
According to the access control method, the access network element and the UE, the access network element can send the indication information to the UE to indicate the UE to execute the corresponding access restriction rule, and the access restriction rule is mainly used for prohibiting the UE from initiating access under a specific condition, so that obviously, overload or congestion of an access network or a core network caused by a large number of UE initiating various accesses at the same time can be reduced.
Drawings
Fig. 1 is a flow chart of a first access control method according to an embodiment of the present invention;
Fig. 2 is a flow chart of a second access control method according to an embodiment of the present invention;
fig. 3 is a flow chart of a third access control method according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of a UE according to an embodiment of the present invention;
fig. 5 is a flow chart of a fourth access control method according to an embodiment of the present invention.
Detailed Description
The technical scheme of the invention is further elaborated below by referring to the drawings in the specification and the specific embodiments.
As shown in fig. 1, this embodiment provides an access control method, including:
Step S110: when the network load of a core network or an access network accords with an overload condition or the congestion condition of the core network or the access network accords with a congestion condition, an access network element sends indication information of an access restriction rule to User Equipment (UE);
wherein the access restriction rule comprises at least one of:
The access mode used by the UE is forbidden;
the UE type of forbidden access;
the type of service that is barred from access.
The accounting control method provided in this embodiment is a method applied to a network side, for example, a method applied to a network element of an access network, for example, a method in an evolved Node B (eNB). The Access network element may be the eNB or a next generation base station (next generation Node B, gnb) or other wireless Access node (AP), etc.
The step S110 in this embodiment may include:
Step S111: when the network load of the core network or the access network accords with an overload condition or the congestion condition of the core network or the access network accords with a congestion condition, acquiring indication information matched with the overload condition or the congestion condition of the access network or the core network;
step S112: and sending the indication information to the UE.
The manner of obtaining the indication information may be 2 the access network element, which generates the indication information itself according to the load condition or congestion condition of the access network or the core network, or may also be received from the core network element, for example, from a Mobility management entity (Mobility MANAGEMENT ENTITY, MME).
For example, a correspondence between the load factor or congestion status and the corresponding indication information is preset in the network element forming the indication information, and when the indication information required to be issued to the UE is formed, the corresponding relationship is queried according to the current information such as the load factor and the congestion status, and the indication information matched with the information such as the load factor and the congestion status in the correspondence is selected as the indication information required to be issued to the UE currently. Of course, the manner of generating the indication information is not limited to the above examples.
When the network load of the core network or the access network meets the preset condition, the method may include: when the load rate of the access network or the core network reaches the load rate threshold or the load capacity exceeds the load capacity threshold, the network load of the core network or the access network can be considered to accord with the overload condition. In this embodiment, determining the network load of the core network may include determining whether a current load rate or a current load amount of the MME reaches a corresponding threshold. The network load of the access network meets the overload condition, and may include: and judging whether the current load rate or the load capacity of the base station reaches a corresponding threshold.
The congestion status of the core network or the access network can be represented by the load status of the current core network or the access network, or can be represented according to the available resource status of the current network or the number of requests to be responded and other parameters, and when the congestion status meets a certain condition, the core network or the access network can be considered to be congested, and the congestion needs to be relieved. For example, the number of requests to be responded in the current MME or eNB queue exceeds a number threshold, or the usage of processing resources of the current MME or eNB reaches an upper usage limit, etc., so that congestion can be considered to occur, and the congestion condition is met.
At this time, the access network element sends indication information to all UEs covered by the access network element through a broadcast message. The indication information may be used to indicate the validation or enforcement of the access restriction rules.
In this embodiment, the access network element sends indication information to the UE, and may send the UE through a broadcast message or a non-broadcast message.
The broadcast message may include a system message. The indication information may be transmitted to the UE carried in a master device information block (Master Information Block, MIB) or a system information block (System Information Block, SIB) of a system message.
The access restriction rule indicated by the indication information in this embodiment may include:
The access mode used when the UE is forbidden to access;
The type of UE that is barred from access, which can be distinguished by UE capabilities of the UE, can be specifically: indicating which UEs with which UE capabilities are barred from access.
The type of service that is barred from access.
The indication information can be divided into three types of indication bits, namely a first type indication bit, a second type indication bit and a third type indication bit; one or more bits in the first type of indication bits are used for indicating an access mode of forbidden access, and the second type of indication bits are used for indicating a UE type of forbidden access; the third class indication bit is used for indicating the service type of forbidden access. In this embodiment, the indication bits corresponding to the indication information are split into three types for characterization, so that when the access restriction rule takes effect, the execution of the access restriction rule conforming to the current network condition can be flexibly combined by combining at least two types of indication bits. And the current effective access limit rule is indicated through the sending of the indication information, but not the complete access limit rule is sent, and the method has the characteristics of small signaling overhead and high flexibility.
After receiving the indication information, the UE knows which restricted access rules are currently effective, and before initiating access, the UE needs to determine whether to allow the UE to initiate access according to the access restricted rules effective in the current period.
In some embodiments of the present invention, in some embodiments,
The method for prohibiting the UE from using the access mode comprises at least one of the following steps:
the control plane optimizes the CP mode of data transmission;
the user plane optimizes the UP mode of data transmission;
a wireless resource control connection establishing legacy mode;
the access-prohibited UE types include at least one of:
Only supporting the UE accessed by the CP mode;
Simultaneously supporting the UE entering the CP mode and the UP mode;
the service types of the forbidden access include at least one of the following:
calling data service mo-data;
calling meta-data mo-Exception Data;
Delay tolerant access service Delay Tolerant Access;
Calling signaling service mo-signaling;
network protocol IP data traffic;
non-IP data traffic.
The CP method includes: the terminal directly transmits the data to the MME through control plane signaling, for example, a Non-access stratum (NAS) message, and the MME forwards the data to the external network instead of forwarding the data to an access mode of the external network through a gateway. The CP method requires the MME to participate in data transmission, and if the CP method accesses too many UEs, overload or congestion of the MME may be caused.
The UP mode is as follows: before the connection between the UE and the network side is released, the network side stores the historical context of the UE, and when the terminal initiates connection with the network side next time, the stored context is used for establishing the access mode of the connection. In the access mode, the access network elements such as the base station are required to store the context, if the accessed UE is too many or the stored context is too many, the cache resource is reduced, and in the next access, the context stored in the previous time may be required to be searched, and a certain processing resource is required to be consumed. Processing resources herein may include computing, querying, and retrieving resources provided by a processor or processing circuitry.
The legacy mode is a mode of establishing connection by using RRC signaling.
The mo-exception data is generally directed to burst type traffic, such as alarm traffic, abnormal type data reporting traffic, etc.
The network protocol IP data service may be simply referred to as a non-IP-data service; the network protocol IP data traffic may be referred to as IP-data traffic. The data packet corresponding to the non-IP-data service usually does not carry the destination IP address, and the route forwarding not based on the destination IP address is adopted. The data packet corresponding to the IP-data service is carried with
For the limitation of the CP mode, generally, when the network load of the core network meets the overload condition or the congestion condition load of the core network, especially when the current condition load of the MME meets the overload condition or the congestion condition, the indication information sent by the access network element may be used to instruct to prohibit some or all terminals from initiating access in the CP mode, or instruct all or some services to initiate access in the CP mode to take effect by using an access limitation rule, thereby alleviating the overload or congestion condition of the core network.
For the limitation of the UP mode, generally, when the network load of the access network accords with the overload condition or the congestion condition of the access network accords with the congestion condition, especially when the residual buffer of the base station is smaller than a buffer threshold, or the buffer is tense, or the residual processing resource is smaller than a processing resource threshold, and the like, the indication information sent by the network element of the access network is used for indicating to prohibit all or part of terminals from being accessed in the UP mode or all or part of services from being accessed in the UP mode, the access limitation rule of all or part of services from being accessed in the UP mode is effective, thereby relieving the overload or congestion condition of the access network.
The type of the UE in this embodiment is determined according to the UE capability of the access mode supported by the UE. For example, the UEs may be classified into one type of UEs supporting only the CP mode, while supporting another type of UEs supporting both the CP mode and the UP mode.
The indication information may indicate that the corresponding access restriction rule takes effect, thereby restricting access of a certain type of UE. For example, the access network element may indicate, through the second type indication bit, that an access restriction rule prohibiting access of a UE supporting only the CP mode is validated when congestion or overload occurs in the core network. For another example, the access network element may instruct, through the second type bit, to prohibit access by the UE supporting both the CP mode and the UP mode when congestion or overload occurs in the access network, or instruct access by the UE adopting both the CP mode and the UP mode.
Specifically, the indication information indicates that the effective access restriction rule may include at least one of: rule 1: the calling of calling data service mo-data, calling supernormal data mo-ExceptionData, delay tolerant access service delayTolerantAccess or calling signaling service mo-signaling is forbidden to be initiated by using an UP mode or a legacy mode;
Rule 2: disabling the call originating of said mo-ExceptionData, said delayTolerantAccess, or said mo-signaling using CP mode;
Rule 3: prohibiting a predetermined proportion of UEs from initiating the mo-data call using a CP manner;
Rule 4: prohibiting a UE supporting only a CP mode from initiating a call of the mo-data, the mo-ExceptionData, the delayTolerantAccess or the mo-signaling;
Rule 5: the UE supporting the CP mode and the UP mode simultaneously is forbidden to initiate the call of the mo-data, the mo-ExceptionData, the delayTolerantAccess or the mo-signaling;
rule 6: the UE supporting the CP mode and the UP mode simultaneously is forbidden to initiate the call of the mo-data, the mo-ExceptionData, the delayTolerantAccess or the mo-signaling by using the CP mode;
Rule 7: the UE supporting the CP mode and the UP mode simultaneously is forbidden, and the UP mode or the legacy mode is used for initiating the call of the mo-data, or the mo-ExceptionData, the delayTolerantAccess or the mo-signaling;
Rule 8: prohibiting sending non-network protocol data non-IP-data service;
Rule 9: prohibiting transmission of the non-IP-data service of which the single data packet exceeds a first preset data packet length threshold, the non-IP-data service of which the cumulative transmission data amount of one connection is larger than a first accumulation threshold, the non-IP-data service of which the traffic exceeds a first preset traffic threshold, or the non-IP-data service with continuous data packets, wherein the non-IP-data service with continuous data packets is that: the non-IP-data service of a plurality of data packets is sent through one connection;
Rule 10: forbidding sending network protocol data IP-data service;
Rule 11: the transmission of the IP-data service of which the single data packet exceeds a second preset data packet length threshold, the connection of the IP-data service of which the accumulated data quantity is larger than the second accumulation threshold at one time and the connection of the IP-data service of which the flow exceeds a second preset flow threshold are forbidden;
Rule 12: the CP mode is forbidden to be used for initiating the service exceeding the third preset data packet length threshold, the service of which the one-time connection accumulated data volume exceeds the third accumulation threshold, the service of which the flow exceeds the third preset flow threshold or the service with continuous data packets;
Rule 13: and prohibiting to initiate the service below the fourth preset data packet length threshold, the service with the accumulated data quantity of one connection below the fourth accumulation threshold or the service with the flow quantity below the fourth preset flow threshold by using an UP mode.
The preceding ordinal words "first", "second", and "third" before the predetermined packet length threshold and the accumulation threshold are all used to distinguish the thresholds in different situations, and do not represent a substantial meaning.
In this embodiment, the access network element may instruct the corresponding access restriction rule to take effect according to the current location of congestion status or overload phenomenon and according to the effect of restricting access by the access restriction rule.
In this embodiment, the foregoing multiple access restriction rules may be pre-stored in the UE and the access network element, or may be pre-negotiated for the UE and the access network element, or may be pre-specified by a communication protocol. In summary, before the indication information is sent, the access network element and the UE may have corresponding ways to obtain the access restriction rule, and obtain a correspondence between the indication information and the access restriction rule, so that a subsequent UE may execute or take effect of executing the specific access restriction rule according to the indication information, thereby implementing access control, and alleviating overload or congestion caused by accessing a large number of UEs, especially, terminals of the internet of things, to the network at the same time.
For example, when the indication information indicates that the rule 3 is effective, the UE randomly generates a random number between 0 and 1 before initiating access, compares the random number with the predetermined ratio, and allows the UE to initiate access if the random number is greater than the predetermined ratio, otherwise prohibits the UE from initiating access. Of course, if the random number is not greater than the predetermined try, the UE may be allowed to initiate access, otherwise, the UE is forbidden to access.
The above is merely an example of an access restriction rule, but the specific implementation is not limited to any one of the above rules.
In this embodiment, the access restriction rule may be divided into two parts, where the first part is rule content and the second part is restriction parameter of rule execution. The limiting parameters may include one or more of time parameters, scale parameters, and data model parameters, although specific implementations may include exception parameters, etc. The exception parameters herein may correspond to at least which special cases correspond to cases where the rule content is not valid. Optionally, the access restriction rule further includes at least one of a time parameter, a scale parameter, and a data model parameter;
the time parameter is used for specifying the effective duration of the access limiting rule;
The proportion parameter is used for indicating the proportion of the user equipment for limiting access or the effective probability of the access limiting rule;
The data model parameters include: a data model threshold;
the data model threshold comprises at least one of the following;
a packet length threshold;
An accumulation threshold for accumulating the amount of data;
a flow threshold;
A data number threshold of the continuous data packet;
A transmission frequency or period threshold of consecutive data packets.
The validation period corresponds to a time length of a time window. If the UE receives the indication information, reads the rule content of a certain access restriction rule, extracts the time parameter, and calculates the effective time from the moment of receiving the indication information or from the moment of reading the access restriction rule according to the effective time of the restriction in the time parameter. The proportion parameter indicates the effective probability of one or more rules or the proportion of the user terminal. When the proportion parameter is the proportion of the accessed UE, the UE can generate a random number, compare the random number with the proportion and then determine whether to initiate an access request currently.
In this embodiment, the limiting parameters may be individually written in each of the access limiting rules, and the limiting parameters may be shared by multiple limiting rules at the same time. For example, the time parameter may be a parameter that is shared by multiple access restriction rules. The time parameter may be sent to the UE by the base station, or may be indicated to the UE by the base station.
The step S110 may further include:
The access network element sends the indication information to the UE through a broadcast message, wherein the broadcast message comprises: system messages.
In other embodiments, the step S110 may include:
the access network element sends the indication information through paging information, a physical downlink control channel or dedicated RRC signaling.
In this embodiment, the indication information is preferably transmitted using a broadcast message, so that access control of a plurality of UEs is indicated at once. And if the access request is not initiated temporarily, controlling the initiation of the access request according to the indication information.
In short, the access network element may send the indication information to the UE in various manners, and is not limited to any one of the foregoing manners.
As shown in fig. 2, this embodiment provides an access control method, including:
step S210: receiving indication information sent by an access network element, wherein the indication information is used for indicating an access restriction rule, and the access restriction rule comprises at least one of the following:
The access mode used by the UE is forbidden;
Disabling the type of UE;
the service type of forbidden access;
Step S220: and determining whether to initiate access according to the access limit rule pointed by the indication information.
The method described in this embodiment may be a method applied in a UE. The access network element may be any communication node that may enable a base station to connect to a wireless network, e.g., various types of base stations, etc.
The indication information sent by the access network element is received in step S210, and the relevant description of the indication information herein may be referred to the corresponding parts of the foregoing embodiments. The recruiting may include receiving indication information of broadcast transmission, indication information of multicast transmission, or indication information of unicast mode at step S210. Preferably, the indication information of the broadcast mode of the network element of the access network is received.
For example, the step S210 may include:
receiving broadcast information, and extracting the indication information from the broadcast information; the broadcast information here may include a system message. The indication information may be sent to the UE carried in SIB or MIB.
And receiving paging information or information sent by a physical downlink control channel or the indication information carried by the special RRC signaling.
The indication information in this embodiment may be used to indicate one of an access mode of prohibiting access of the UE, a UE type of prohibiting access, and a service type of prohibiting access, respectively. So in this embodiment as well, the indication information may include the indication bits of the three types.
In some embodiments, the disabling the UE from using the access manner includes at least one of:
the control plane optimizes the CP mode of data transmission;
the user plane optimizes the UP mode of data transmission;
a wireless resource control connection establishing legacy mode;
the access-prohibited UE types include at least one of:
Only supporting the UE accessed by the CP mode;
Simultaneously supporting the UE entering the CP mode and the UP mode;
the service types of the forbidden access include at least one of the following:
calling data service mo-data;
calling meta-data mo-Exception Data;
Delay tolerant access service Delay Tolerant Access;
Calling signaling service mo-signaling;
network protocol IP data traffic;
non-IP data traffic.
In this embodiment, the relevant definition of the access manner and the data type may be referred to the foregoing embodiments, and will not be repeated here.
Further, the access restriction rule comprises at least one of:
The calling of calling data service mo-data, calling supernormal data mo-ExceptionData, delay tolerant access service delayTolerantAccess or calling signaling service mo-signaling is forbidden to be initiated by using an UP mode or a legacy mode;
disabling the call originating of said mo-ExceptionData, said delayTolerantAccess, or said mo-signaling using CP mode;
prohibiting a predetermined proportion of UEs from initiating the mo-data call using a CP manner;
prohibiting a UE supporting only a CP mode from initiating a call of the mo-data, the mo-ExceptionData, the delayTolerantAccess or the mo-signaling;
The UE supporting the CP mode and the UP mode simultaneously is forbidden to initiate the call of the mo-data, the mo-ExceptionData, the delayTolerantAccess or the mo-signaling;
the UE supporting the CP mode and the UP mode simultaneously is forbidden to initiate the call of the mo-data, the mo-ExceptionData, the delayTolerantAccess or the mo-signaling by using the CP mode;
The UE supporting the CP mode and the UP mode simultaneously is forbidden, and the UP mode or the legacy mode is used for initiating the call of the mo-data, or the mo-ExceptionData, the delayTolerantAccess or the mo-signaling;
prohibiting sending non-network protocol data non-IP-data service;
Prohibiting transmission of the non-IP-data service of which the single data packet exceeds a first preset data packet length threshold, the non-IP-data service of which the cumulative transmission data amount of one connection is larger than a first accumulation threshold, the non-IP-data service of which the traffic exceeds a first preset traffic threshold, or the non-IP-data service with continuous data packets, wherein the non-IP-data service with continuous data packets is that: the non-IP-data service of a plurality of data packets is sent through one connection;
forbidding sending network protocol data IP-data service;
the transmission of the IP-data service of which the single data packet exceeds a second preset data packet length threshold, the connection of the IP-data service of which the accumulated data quantity is larger than the second accumulation threshold at one time and the connection of the IP-data service of which the flow exceeds a second preset flow threshold are forbidden;
The CP mode is forbidden to be used for initiating the service exceeding the third preset data packet length threshold, the service of which the one-time connection accumulated data volume exceeds the third accumulation threshold, the service of which the flow exceeds the third preset flow threshold or the service with continuous data packets;
and prohibiting to initiate the service below the fourth preset data packet length threshold, the service with the accumulated data quantity of one connection below the fourth accumulation threshold or the service with the flow quantity below the fourth preset flow threshold by using an UP mode.
The access restriction rules received here are consistent with the access restriction rules sent by the access network elements such as the base station.
Further, the access restriction rule further includes at least one of a time parameter, a scale parameter, and a data model parameter; the time parameter is used for specifying the effective duration of the access limiting rule; the proportion parameter is used for indicating the proportion of the user equipment for limiting access or the effective probability of the access limiting rule;
The data model parameters include: a data model threshold;
the data model threshold comprises at least one of the following;
a packet length threshold;
An accumulation threshold for accumulating the amount of data;
a flow threshold;
A data number threshold of the continuous data packet;
A transmission frequency or period threshold of consecutive data packets.
By limiting the parameters, various parameters such as effective time, effective probability, effective model and the like of the access limiting rule can be regulated, and further control of the use of the access limiting rule can be ensured, so that access of UE (user equipment), especially the UE of the Internet of things, is better limited, and congestion and overload phenomena can be reduced on the network side.
Several specific examples are provided below in connection with the above embodiments:
Example 1:
this example is used to illustrate an access restriction procedure initiated by the radio access network itself.
This example takes an LTE access network as an example, with its radio access network element being an eNB.
As shown in fig. 3:
Step 101: the eNB judges whether the load level of the eNB is high or overloaded, if so, the eNB initiates access restriction to the terminal, and the eNB sends an access restriction rule and/or restriction parameters to the UE through SIB broadcasting or through a paging channel.
Step 102: before initiating access, the UE acquires an access limiting rule and/or limiting parameters sent by the eNB;
step 103: and the UE judges whether to initiate the access behavior according to the received access limit rule and/or limit parameter.
Example 2:
This example is used to illustrate which access restriction methods and effects may be formed by a combination of different access restriction indications.
This embodiment specifically illustrates what manner the eNB may include in SIB, or paging message, or RRC dedicated signaling, and what access control effect the eNB may perform in example 1;
combining the present example with example 1, a complete detailed example including access control flow and access control parameters may be formed.
The access restriction rules and/or restriction parameters contained by the eNB in SIB, or paging message, or RRC dedicated signaling include the following classes:
(1) Prohibiting the call of mo-data, or mo-ExceptionData, or delayTolerantAccess, or mo-signaling from being initiated by using the UP mode or the legacy mode;
(2) The call of mo-ExceptionData, delayTolerantAccess or mo-signaling is forbidden to be initiated by using the CP mode;
(3) A certain proportion of X UE (user equipment) is forbidden to initiate mo-data call by using a CP mode;
(4) A UE with the device capability of supporting the CP mode only is prohibited from initiating a call of mo-data, or mo-ExceptionData, or delayTolerantAccess, or mo-signaling;
(5) A UE with the device capability of supporting the CP mode and the UP mode simultaneously is prohibited from initiating a call of mo-data, mo-ExceptionData, delayTolerantAccess or mo-signaling;
(6) The UE with the device capability of supporting the CP mode and the UP mode simultaneously is prohibited from initiating a call of mo-data, mo-ExceptionData, delayTolerantAccess or mo-signaling by using the CP mode;
(7) The UE with the device capability of supporting the CP mode and the UP mode simultaneously is prohibited from initiating a call of mo-data, mo-ExceptionData, delayTolerantAccess or mo-signaling by using the UP mode or the legacy mode;
(8) Prohibiting sending non-IP-data service;
(9) Prohibiting transmission of non-IP-data service exceeding a preset data packet size threshold, or non-IP-data service exceeding an accumulated data volume threshold, or non-IP-data service exceeding a preset traffic volume threshold, or non-IP-data service with continuous data packets;
(10) Inhibit sending IP-data traffic;
(11) The transmission of the IP-data service exceeding the preset data packet size threshold, or the IP-data service exceeding the accumulated data volume threshold, or the IP-data service exceeding the preset traffic volume threshold is forbidden;
(12) The method comprises the steps that a CP scheme is forbidden to initiate a service exceeding a preset data packet size threshold, a service exceeding an accumulated data volume threshold, a service exceeding a preset flow threshold or a service with continuous data packets, wherein the threshold can be notified to UE by a network side or preset by a transceiver;
(13) The UP scheme is prohibited from being used to initiate traffic below a preset packet size threshold, or traffic below a cumulative data volume threshold, or traffic below a preset traffic threshold (meaning that the UP mode is prohibited from being used to transmit small data/small traffic because the UP scheme is suitable for transmitting large data/large traffic).
The eNB selects a type 1 rule or a plurality of rules without mutual conflict from the access limiting rules according to the severity level of the self-load condition and the main reason causing the load; for example the following examples:
Taking 1 rule as an example:
Example 1: selecting rule (1), wherein the selected limited service type is delayTolerantAccess, and the eNB comprises the following instructions in RRC connection rejection signaling, RRC connection reestablishment rejection signaling or RRC connection release signaling:
The UP mode or the legacy mode is forbidden to initiate delayTolerantAccess calls;
When the UE receives the instruction and initiates delayTolerantAccess services, the UE can only initiate access by using methods other than an UP mode and a legacy mode according to the instructed access limit rule;
example 2: still select rule (1), the selected restricted service types are mo-data and delayTolerantAccess, and the eNB includes the following indication in RRC connection reject signaling, RRC connection reestablishment reject signaling, or RRC connection release signaling:
The call of mo-data or delayTolerantAccess is prohibited to be initiated by using the UP mode or the legacy mode;
When the UE receives the instruction, and initiates delayTolerantAccess service or mo-data service, according to the instructed access limit rule, the UE can only initiate access by using methods other than the UP mode and the legacy mode.
Example 3: still selecting rule (1), and selecting restricted service types mo-ExceptionData and mo-signaling, and mo-data and delayTolerantAccess, the eNB includes the following instructions in RRC connection reject signaling, RRC connection reestablishment reject signaling, or RRC connection release signaling:
Prohibiting the call of mo-data, or mo-ExceptionData, or delayTolerantAccess, or mo-signaling from being initiated by using the UP mode or the legacy mode;
the UE receiving the instruction can initiate access only by using methods other than the UP method and the legacy method when it initiates the 4 services limited by the rule.
Example 4: the usage of rule 2 can be referred to rule 1, see examples 1,2,3;
Example 5: a selection rule (3), wherein the selected limited service type is mo-data, and the eNB comprises the following instructions in RRC connection rejection signaling, RRC connection reestablishment rejection signaling or RRC connection release signaling:
A certain proportion of X UE (user equipment) is forbidden to initiate mo-data call by using a CP mode; the ratio X may be configured by the eNB to notify the UE by a broadcast message or dedicated signaling, for example: when the load is heavy, the ratio X may be set higher, for example 80%.
When the UE receives the indication, the UE can directly initiate access by adopting other methods except the CP mode when the UE initiates the mo-data service limited by the rule, if the CP mode is adopted, the probability of initiating the access by the UE is calculated according to uniformly distributed random numbers, and when the proportion X is 80%, only 20% probability can initiate the access by using the CP mode.
Example 6: selection rule (4)
A UE with a device capability of "CP-only mode" is prohibited from initiating a mo-data, or mo-ExceptionData, or delayTolerantAccess, or mo-signaling call.
The rule limits the type of capability and the type of initiated service that the UE has, and besides the capability limitation, the limitation of the service may select various free combinations, such as:
A UE with the equipment capacity of 'supporting only a CP mode' is prohibited from initiating a mo-data call;
A UE with the device capability of 'supporting only a CP mode' is prohibited from initiating delayTolerantAccess calls;
A UE with the device capability of supporting the CP mode only is prohibited from initiating a call of mo-ExceptionData or mo-signaling;
a UE with the equipment capacity of 'supporting only a CP mode' is prohibited from initiating a mo-signaling call;
Example 7: selection rule (5)
A UE with a device capability of "supporting both CP and UP modes" is prohibited from initiating a call of mo-data, or mo-ExceptionData, or delayTolerantAccess, or mo-signaling. The rule sets access restrictions on another UE capability; reference example 6 can be made to the usage;
example 8: selection rule (6)
A UE with a device capability of "supporting both CP and UP modes" is prohibited from initiating a mo-data, or mo-ExceptionData, or delayTolerantAccess, or mo-signaling call using the CP mode.
The rules contain 3 constraints on UE capabilities, access method used, and type of service initiated, the use method can refer to the previous example;
example 9: selection rule (7)
The UE with the device capability of supporting the CP mode and the UP mode simultaneously is prohibited from initiating a call of mo-data, mo-ExceptionData, delayTolerantAccess or mo-signaling by using the UP mode or the legacy mode;
similar to rule 6, except that the constraints on the access method used are different;
Example 10: selection rule (8)
Prohibiting sending non-IP-data service;
The rule only limits access to the service types, and aims at the services which are not based on the IP address transmission technology, and the services are transmitted in a CP mode in the current LTE protocol.
The UE receiving the rule can not initiate access as long as the UE initiates non-IP-data service, no matter what the capability is and no matter what access method is adopted;
example 11: selection rule (9)
Disabling transmission of non-IP-data traffic exceeding a preset packet size threshold, or non-IP-data traffic exceeding a cumulative data size threshold, or non-IP-data traffic exceeding a preset traffic threshold, or non-IP-data traffic with consecutive packets
The rule has looser access constraints on non-IP-data traffic than rule (8), and limits access to a portion of non-IP-data traffic from the point of view of traffic data characteristics. Wherein the limiting angle of the traffic data characteristic comprises one or a combination of more of the following:
Prohibiting exceeding a preset data packet size threshold;
Inhibit exceeding the cumulative data size threshold;
prohibiting exceeding a preset flow threshold;
inhibit having consecutive data packets;
Example 12: selection rules (10) or (11)
Reference may be made to rules (8) or (9);
Example 13: selection rule (12)
The method comprises the steps that a CP scheme is forbidden to initiate a service exceeding a preset data packet size threshold, a service exceeding an accumulated data volume threshold, a service exceeding a preset flow threshold or a service with continuous data packets, wherein the threshold can be notified to UE by a network side or preset by a transceiver;
The rule combines the limitation of the service data feature with the limitation of the access method, and the usage can refer to the previous rule with the limitation of the CP scheme and the limitation of the service data feature.
Example 14: selection rule (13)
Prohibiting the use of the UP scheme to initiate a service below a preset packet size threshold, or a service below a cumulative data volume threshold, or a service below a preset traffic threshold (meaning prohibiting the use of the UP mode to send small data/small traffic because the UP scheme is suitable for transmitting large data/large traffic)
The rule also combines the limitation of the service data feature with the limitation of the access method, except that the limitation of the access method is directed to the UP mode, so that the limitation of the corresponding service data feature and the rule (13) are different, and this example emphasizes that the UP mode cannot be used to transmit small data packets or low traffic.
When the eNB sends the rules, one or a plurality of rules can be selected, and the rules are selected without mutual conflict or mutual repetition.
Example 3:
this example serves to illustrate a more flexible manner of access restriction that may be formed in conjunction with additional restriction parameters.
Based on the access restriction rule of example 2, the eNB may additionally send other restriction parameters to cooperate with the access restriction rule to form a new and more flexible access restriction rule.
The additional limiting parameters include:
Time parameters, scale parameters, data model parameters:
-time parameter: adding corresponding WAIT TIMER to specify the time length for which the access restriction rule is effective;
-ratio parameters: increasing a probability factor or a scaling factor to define a probability or a UE scale at which the access restriction rule is valid;
-data model threshold: increasing a data packet size threshold, or an accumulated data volume threshold, or a traffic threshold, or a number of consecutive data packets, or a frequency/period threshold of consecutive data packets, to specify that a service contained in the access restriction rule is prohibited from exceeding the data model threshold, or is prohibited from being lower than the data model threshold;
the 3 parameters may be 1 parameter or a combination of parameters, and may be combined with the above-mentioned access restriction rule to form a new rule.
The specific values of the 3 parameters may be configured by the eNB and notified to the UE by a broadcast message or paging, or dedicated signaling.
Example 1: combining rule (2) "prohibit the call originating mo-ExceptionData, or delayTolerantAccess, or mo-signaling using CP mode" with the time parameter, a new rule can be formed as follows:
And prohibiting the call of mo-ExceptionData, delayTolerantAccess or mo-signaling from being initiated by using the CP mode in the set time range A.
The time range a may be configured by the eNB and notified to the UE by a broadcast message or dedicated signaling.
Example 2: combining rule (2) "prohibit the call originating mo-ExceptionData, or delayTolerantAccess, or mo-signaling using CP mode" with the ratio parameter, a new rule can be formed as follows:
the user number of the preset proportion B is forbidden to initiate the call of mo-ExceptionData, delayTolerantAccess or mo-signaling by using a CP mode.
The preset proportion B may be configured by the eNB and notified to the UE by a broadcast message or dedicated signaling. The eNB can prohibit the number of users of the proportion B from initiating a call of a restricted service type using the CP manner in this way.
Example 3: combining rule (2) "prohibit the call of mo-ExceptionData, delayTolerantAccess, or mo-signaling by CP mode" with the data model threshold, where the data model threshold further includes a data packet size threshold, or an accumulated data volume threshold, or a traffic threshold, or a number of consecutive data packets, or a frequency/period threshold of consecutive data packets, one or more of which may be selected. New rules may be formed as follows:
Prohibiting the CP mode from being used for initiating delayTolerantAccess calls exceeding the data packet size threshold;
disabling the CP mode to initiate a call of mo-signaling exceeding the cumulative data amount threshold;
Prohibiting the call of mo-ExceptionData exceeding the traffic threshold from being initiated by using the CP mode;
Disabling the CP mode to initiate a call of mo-ExceptionData, or delayTolerantAccess, or mo-signaling exceeding the frequency/period threshold of the consecutive packets;
disabling the CP mode to initiate the mo-ExceptionData call exceeding the traffic threshold or exceeding the quantity threshold of the continuous data packets;
example 4: the rule 'forbidden to send non-IP-data service' is combined with the time parameter, the proportion parameter and the data model threshold simultaneously to form a new rule as follows:
in a preset time range A, prohibiting the number of users of a preset proportion B from sending non-IP-data service exceeding a flow threshold;
Example 4:
This example is used to illustrate the relationship of the access restriction rules and restriction parameters described in this invention to existing LTE access restrictions (Access Barring, ACB) and (Extended Access Barring, EAB).
The existing LTE has ACB and EAB mechanisms, parameters of which are sent through a system broadcast message SIB2, and the access restriction rule and restriction parameters of the invention belong to parallel relations with the ACB or EAB, and the relation between the ACB and the EAB is processed by the following 2 methods:
After the UE acquires the ACB parameters and the EAB parameters and the access limiting rules and limiting parameters according to the embodiment of the invention, the UE firstly executes the judgment of the access limiting rules and limiting parameters according to the invention, and if the UE passes the judgment, the UE needs to execute the ACB parameters or the EAB parameters again;
after the UE acquires the ACB parameters and the EAB parameters and the access restriction rules and restriction parameters according to the embodiments of the present invention, the UE first executes the ACB or EAB, and if the UE passes the judgment, the UE needs to execute the judgment of the access restriction rules and restriction parameters according to the embodiments of the present invention.
The embodiment provides an access network element, which includes:
A sending unit, configured to send, when a network load of a core network or an access network meets an overload condition, or a congestion condition of the core network or the access network meets a congestion condition, an indication information of an access restriction rule to a user equipment UE by an access network element;
wherein the access restriction rule comprises at least one of:
The access mode used by the UE is forbidden;
the UE type of forbidden access;
the type of service that is barred from access.
The access network element in this embodiment may correspond to a device such as a base station that may be used by a UE to access to a network side. The transmitting unit may correspond to a transmitting antenna of the access network element and may be configured to transmit the indication information to the UE.
In this embodiment, the access network element may further include a processor, where the processor may be a microprocessor, a digital signal processor, a programmable array, or a central processing unit, and may be configured to generate or parse a message sent by the peripheral device by itself to obtain the indication information. The processor is connected with the transmitting antenna and can be used for transmitting data.
The details of the access restriction rule in this embodiment may refer to the part of the foregoing embodiment, and may also include various parameters such as an access mode and a data type that prohibit the UE from accessing.
In summary, the access network element provided in this embodiment is an access control method for the foregoing access network element, so details of all access restriction rules may be referred to the foregoing corresponding portions, and will not be repeated herein.
The transmitting unit may broadcast, multicast or unicast the indication information.
In some embodiments, the sending unit is specifically configured to send the indication information to the UE by using a broadcast message by using the access network element, where the broadcast message includes: system messages.
In other embodiments, the sending unit is specifically configured to send the indication information through a paging message, a physical downlink control channel, or dedicated RRC signaling.
As shown in fig. 4, this embodiment provides a user equipment UE, including:
A receiving unit 210, configured to receive indication information sent by an access network element, where the indication information is used to indicate an access restriction rule, and the access restriction rule includes at least one of the following:
The access mode used by the UE is forbidden;
Disabling the type of UE;
the service type of forbidden access;
An access unit 220, configured to determine whether to initiate access according to the access restriction rule pointed by the indication information.
The receiving unit 210 may be configured to be fixed to a receiving antenna of the UE and may be configured to receive the indication information.
The receiving unit 210 may receive a broadcast message, a multicast message, or a unicast message, and extract the indication information from the broadcast message or the multicast message or the unicast message.
The access unit 220 may correspond to a processor and a transmitting antenna connected to the processor, and may be configured to transmit an access request according to an access restriction rule, or not transmit an access request. When the processor determines that the current UE has an access requirement, firstly querying the access restriction rule which is currently effective, judging the matching of the access restriction rule which participates in the current effective through the acquisition of the judging parameters, if the matching is successful, not initiating the access, and if the matching is unsuccessful, initiating the access. The judging parameters here may be: parameters such as the access mode of the UE, the type of the UE or the service type needing to initiate access.
The access restriction rules here are identical to those of the previous embodiments and are not repeated here.
As shown in fig. 5, this embodiment further provides an access control method, including:
Step S1: the eNB sends indication information to the UE;
step S2: the UE determines the currently effective access limit rule based on Ahu indication information;
Step S3: inquiring a currently effective access limit rule when an access requirement exists, and determining whether to allow the initiation of an access request corresponding to the current access requirement;
step S4: if the access is allowed, initiating an access request;
step S5: and if the access is not allowed, shielding the response of the current access requirement.
In the several embodiments provided by the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. The above described device embodiments are only illustrative, e.g. the division of the units is only one logical function division, and there may be other divisions in practice, such as: multiple units or components may be combined or may be integrated into another system, or some features may be omitted, or not performed. In addition, the various components shown or discussed may be coupled or directly coupled or communicatively coupled to each other via some interface, whether indirectly coupled or communicatively coupled to devices or units, whether electrically, mechanically, or otherwise.
The units described as separate units may or may not be physically separate, and units displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units; some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in each embodiment of the present invention may be integrated in one processing module, or each unit may be separately used as one unit, or two or more units may be integrated in one unit; the integrated units may be implemented in hardware or in hardware plus software functional units.
Those of ordinary skill in the art will appreciate that: all or part of the steps for implementing the above method embodiments may be implemented by hardware associated with program instructions, where the foregoing program may be stored in a computer readable storage medium, and when executed, the program performs steps including the above method embodiments; and the aforementioned storage medium includes: a mobile storage device, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a magnetic disk or optical disk, or the like, which can store program codes.
The foregoing is merely illustrative of the present invention, and the present invention is not limited thereto, and any person skilled in the art will readily recognize that variations or substitutions are within the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (12)

1. An access control method, comprising:
when the network load of a core network or an access network accords with an overload condition or the congestion condition of the core network or the access network accords with a congestion condition, the access network element sends indication information of an access restriction rule to User Equipment (UE), wherein the indication information is used for enabling the UE to determine whether to initiate access according to the access restriction rule pointed by the indication information;
wherein the access restriction rule comprises at least one of:
The access mode used by the UE is forbidden;
the UE type of forbidden access;
the service type of forbidden access;
the access restriction rule comprises at least one of:
The call of mo-ExceptionData, delayTolerantAccess or mo-signaling is forbidden to be initiated by using the CP mode;
The UE only supporting the CP mode is forbidden to initiate a call of mo-data, mo-ExceptionData, delayTolerantAccess or mo-signaling;
prohibiting sending non-network protocol data non-IP-data service;
Prohibiting transmission of the non-IP-data service of which the single data packet exceeds a first preset data packet length threshold, the non-IP-data service of which the cumulative transmission data amount of one connection is larger than a first accumulation threshold, the non-IP-data service of which the traffic exceeds a first preset traffic threshold, or the non-IP-data service with continuous data packets, wherein the non-IP-data service with continuous data packets is that: the non-IP-data service of a plurality of data packets is sent through one connection;
The CP mode is forbidden to be used for initiating the service exceeding the third preset data packet length threshold, the service of which the one-time connection accumulated data volume exceeds the third accumulation threshold, the service of which the flow exceeds the third preset flow threshold or the service with continuous data packets;
The access restriction rule further comprises at least one of a time parameter, a scale parameter and a data model parameter;
the time parameter is used for specifying the effective duration of the access limiting rule;
The proportion parameter is used for indicating the proportion of the user equipment for limiting access or the effective probability of the access limiting rule;
The data model parameters include: a data model threshold;
the data model threshold comprises at least one of the following;
a packet length threshold;
An accumulation threshold for accumulating the amount of data;
a flow threshold;
A data number threshold of the continuous data packet;
A transmission frequency or period threshold of consecutive data packets.
2. The method of claim 1, wherein the step of determining the position of the substrate comprises,
The UE type of the forbidden access comprises UE which only supports the access of the CP mode;
The service types of the forbidden access include non-IP data service.
3. The method of claim 1, wherein the step of determining the position of the substrate comprises,
The access network element sends indication information of the access restriction rule to the user equipment UE, including:
The access network element sends the indication information to the UE through a broadcast message, wherein the broadcast message comprises: system messages.
4. The method of claim 1, wherein the step of determining the position of the substrate comprises,
The access network element sends indication information of the access restriction rule to the user equipment UE, including:
the access network element sends the indication information through paging information, a physical downlink control channel or dedicated RRC signaling.
5. An access control method, comprising:
The method comprises the steps that User Equipment (UE) receives indication information sent by an access network element, wherein the indication information is used for indicating an access limiting rule, the indication information is sent to the UE when the access network element determines that network load of a core network or an access network meets an overload condition or congestion condition of the core network or the access network meets the congestion condition, and the access limiting rule comprises at least one of the following steps:
the access mode used by the UE is forbidden;
Disabling the type of UE;
the service type of forbidden access;
determining whether to initiate access according to the access limit rule pointed by the indication information;
the access restriction rule comprises at least one of:
The call of mo-ExceptionData, delayTolerantAccess or mo-signaling is forbidden to be initiated by using the CP mode;
The UE only supporting the CP mode is forbidden to initiate a call of mo-data, mo-ExceptionData, delayTolerantAccess or mo-signaling;
prohibiting sending non-network protocol data non-IP-data service;
Prohibiting transmission of the non-IP-data service of which the single data packet exceeds a first preset data packet length threshold, the non-IP-data service of which the cumulative transmission data amount of one connection is larger than a first accumulation threshold, the non-IP-data service of which the traffic exceeds a first preset traffic threshold, or the non-IP-data service with continuous data packets, wherein the non-IP-data service with continuous data packets is that: the non-IP-data service of a plurality of data packets is sent through one connection;
The CP mode is forbidden to be used for initiating the service exceeding the third preset data packet length threshold, the service of which the one-time connection accumulated data volume exceeds the third accumulation threshold, the service of which the flow exceeds the third preset flow threshold or the service with continuous data packets;
The access restriction rule further comprises at least one of a time parameter, a scale parameter and a data model parameter;
the time parameter is used for specifying the effective duration of the access limiting rule;
The proportion parameter is used for indicating the proportion of the user equipment for limiting access or the effective probability of the access limiting rule;
The data model parameters include: a data model threshold;
the data model threshold comprises at least one of the following;
a packet length threshold;
An accumulation threshold for accumulating the amount of data;
a flow threshold;
A data number threshold of the continuous data packet;
A transmission frequency or period threshold of consecutive data packets.
6. The method of claim 5, wherein the step of determining the position of the probe is performed,
The type of the forbidden UE comprises UE which only supports the CP access;
The service types of the forbidden access include non-IP data service.
7. An access network element, comprising:
a sending unit, configured to send, when a network load of a core network or an access network meets an overload condition, or a congestion condition of the core network or the access network meets a congestion condition, indication information of an access restriction rule to a user equipment UE, where the indication information is used to make the UE determine whether to initiate access according to the access restriction rule pointed by the indication information;
wherein the access restriction rule comprises at least one of:
The access mode used by the UE is forbidden;
the UE type of forbidden access;
the service type of forbidden access;
the access restriction rule comprises at least one of:
The call of mo-ExceptionData, delayTolerantAccess or mo-signaling is forbidden to be initiated by using the CP mode;
The UE only supporting the CP mode is forbidden to initiate a call of mo-data, mo-ExceptionData, delayTolerantAccess or mo-signaling;
prohibiting sending non-network protocol data non-IP-data service;
Prohibiting transmission of the non-IP-data service of which the single data packet exceeds a first preset data packet length threshold, the non-IP-data service of which the cumulative transmission data amount of one connection is larger than a first accumulation threshold, the non-IP-data service of which the traffic exceeds a first preset traffic threshold, or the non-IP-data service with continuous data packets, wherein the non-IP-data service with continuous data packets is that: the non-IP-data service of a plurality of data packets is sent through one connection;
The CP mode is forbidden to be used for initiating the service exceeding the third preset data packet length threshold, the service of which the one-time connection accumulated data volume exceeds the third accumulation threshold, the service of which the flow exceeds the third preset flow threshold or the service with continuous data packets;
The access restriction rule further comprises at least one of a time parameter, a scale parameter and a data model parameter;
the time parameter is used for specifying the effective duration of the access limiting rule;
The proportion parameter is used for indicating the proportion of the user equipment for limiting access or the effective probability of the access limiting rule;
The data model parameters include: a data model threshold;
the data model threshold comprises at least one of the following;
a packet length threshold;
An accumulation threshold for accumulating the amount of data;
a flow threshold;
A data number threshold of the continuous data packet;
A transmission frequency or period threshold of consecutive data packets.
8. The network element of claim 7, wherein the network element,
The UE type of the forbidden access comprises UE which only supports the access of the CP mode;
The service types of the forbidden access include non-IP data service.
9. The network element of claim 7, wherein the network element,
The sending unit is further configured to send the indication information to the UE through a broadcast message, where the broadcast message includes: system messages.
10. The network element of claim 7, wherein the network element,
The sending unit is specifically configured to send the indication information through a paging message, a physical downlink control channel, or dedicated RRC signaling.
11. A user equipment, UE, comprising:
A receiving unit, configured to receive indication information sent by an access network element, where the indication information is used to indicate an access restriction rule, where the indication information is sent by the access network element to a UE when it is determined that a network load of a core network or an access network meets an overload condition, or a congestion condition of the core network or the access network meets a congestion condition, and the access restriction rule includes at least one of:
The access mode used by the UE is forbidden;
Disabling the type of UE;
the service type of forbidden access;
The access unit is used for determining whether to initiate access according to the access limit rule pointed by the indication information;
the access restriction rule comprises at least one of:
The call of mo-ExceptionData, delayTolerantAccess or mo-signaling is forbidden to be initiated by using the CP mode;
The UE only supporting the CP mode is forbidden to initiate a call of mo-data, mo-ExceptionData, delayTolerantAccess or mo-signaling;
prohibiting sending non-network protocol data non-IP-data service;
Prohibiting transmission of the non-IP-data service of which the single data packet exceeds a first preset data packet length threshold, the non-IP-data service of which the cumulative transmission data amount of one connection is larger than a first accumulation threshold, the non-IP-data service of which the traffic exceeds a first preset traffic threshold, or the non-IP-data service with continuous data packets, wherein the non-IP-data service with continuous data packets is that: the non-IP-data service of a plurality of data packets is sent through one connection;
The CP mode is forbidden to be used for initiating the service exceeding the third preset data packet length threshold, the service of which the one-time connection accumulated data volume exceeds the third accumulation threshold, the service of which the flow exceeds the third preset flow threshold or the service with continuous data packets;
The access restriction rule further comprises at least one of a time parameter, a scale parameter and a data model parameter;
the time parameter is used for specifying the effective duration of the access limiting rule;
The proportion parameter is used for indicating the proportion of the user equipment for limiting access or the effective probability of the access limiting rule;
The data model parameters include: a data model threshold;
the data model threshold comprises at least one of the following;
a packet length threshold;
An accumulation threshold for accumulating the amount of data;
a flow threshold;
A data number threshold of the continuous data packet;
A transmission frequency or period threshold of consecutive data packets.
12. The UE of claim 11, wherein,
The type of the forbidden UE comprises UE which only supports the CP access;
The service types of the forbidden access include non-IP data service.
CN201710058991.2A 2017-01-23 2017-01-23 Access control method, access network element and user equipment Active CN108347746B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201710058991.2A CN108347746B (en) 2017-01-23 2017-01-23 Access control method, access network element and user equipment
PCT/CN2017/117031 WO2018133606A1 (en) 2017-01-23 2017-12-18 Access control method, access network element, user equipment, and computer storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710058991.2A CN108347746B (en) 2017-01-23 2017-01-23 Access control method, access network element and user equipment

Publications (2)

Publication Number Publication Date
CN108347746A CN108347746A (en) 2018-07-31
CN108347746B true CN108347746B (en) 2024-05-03

Family

ID=62907892

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710058991.2A Active CN108347746B (en) 2017-01-23 2017-01-23 Access control method, access network element and user equipment

Country Status (2)

Country Link
CN (1) CN108347746B (en)
WO (1) WO2018133606A1 (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111148105B (en) * 2018-11-02 2022-07-29 华为技术有限公司 Method and device for determining category information
CN110831065B (en) * 2020-01-09 2020-04-28 武汉慧联无限科技有限公司 Congestion control method and Internet of things platform
CN114071646B (en) * 2020-07-31 2023-04-07 维沃移动通信有限公司 Access control method, device, terminal and network equipment
CN114982292A (en) * 2020-12-28 2022-08-30 北京小米移动软件有限公司 Access control method and device, communication equipment and storage medium
WO2022155913A1 (en) * 2021-01-22 2022-07-28 华为技术有限公司 Access control method, apparatus, and system
WO2022178766A1 (en) * 2021-02-25 2022-09-01 Oppo广东移动通信有限公司 Wireless communication method, terminal device, and network device
CN113825103B (en) * 2021-08-27 2022-07-22 北京国信华源科技有限公司 Carrier communication system based on LoRa communication
WO2023092422A1 (en) * 2021-11-25 2023-06-01 北京小米移动软件有限公司 Information transmission method and apparatus, communication device, and storage medium
CN116436862A (en) * 2021-12-31 2023-07-14 华为技术有限公司 Communication method and communication device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102811462A (en) * 2011-05-31 2012-12-05 普天信息技术研究院有限公司 Overload processing method and system for mobility management entity
CN103220750A (en) * 2012-01-19 2013-07-24 电信科学技术研究院 EAB mechanism management method and equipment
CN103907323A (en) * 2012-10-30 2014-07-02 华为技术有限公司 Method for relieving network congestion, core network device and access network device
CN104221422A (en) * 2012-01-27 2014-12-17 三星电子株式会社 Method and apparatus for efficiently controlling access for system load adjustment in mobile communication systems
CN106211265A (en) * 2011-04-29 2016-12-07 英特尔公司 Machine-to-machine communication device and for providing the method strengthening access barred in wireless network

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102948203B (en) * 2009-11-06 2015-09-09 华为技术有限公司 Load control method and equipment and communication system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106211265A (en) * 2011-04-29 2016-12-07 英特尔公司 Machine-to-machine communication device and for providing the method strengthening access barred in wireless network
CN102811462A (en) * 2011-05-31 2012-12-05 普天信息技术研究院有限公司 Overload processing method and system for mobility management entity
CN103220750A (en) * 2012-01-19 2013-07-24 电信科学技术研究院 EAB mechanism management method and equipment
CN104221422A (en) * 2012-01-27 2014-12-17 三星电子株式会社 Method and apparatus for efficiently controlling access for system load adjustment in mobile communication systems
CN103907323A (en) * 2012-10-30 2014-07-02 华为技术有限公司 Method for relieving network congestion, core network device and access network device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
Overload Start message for control plane data;Ericsson;《3GPP SA WG2 Meeting #118 S2-166408》;20161118;第4.3.7.4节 *

Also Published As

Publication number Publication date
WO2018133606A1 (en) 2018-07-26
CN108347746A (en) 2018-07-31

Similar Documents

Publication Publication Date Title
CN108347746B (en) Access control method, access network element and user equipment
US10616868B2 (en) Method for connecting IMS-based service
US8462722B2 (en) Access control for machine-type communication devices
EP3028422B1 (en) Smart congestion control for rrc idle mode in lte advanced systems
US9125137B2 (en) Method and terminal for applying an extended access barring
US10004027B2 (en) Access control method and apparatus
CA2789960C (en) Access control for m2m devices
US8634830B2 (en) Method and arrangement in a telecommunication system
US9622211B2 (en) Access spreading with selective paging
US9854381B2 (en) Method for transmitting data of MTC device
CN106658601B (en) Data transmission processing method and device
CN110383894B (en) Method and apparatus for configuring signaling class of access control mechanism in wireless communication system
CN112601253A (en) Method and device for controlling service bearing congestion
US20220279478A1 (en) Paging priority and wireless access for non-high priority access users during wireless network congestion
CN107078914B (en) Telecommunications system and method
CN108347743B (en) Access control method, access network element, core network element and user equipment
US20200107246A1 (en) Method and apparatus providing access control
CN107113694B (en) network state information transmission method and network equipment
WO2013115693A1 (en) Access spreading with selective paging

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant