CN108430115B - Random access control method and device and mobile terminal - Google Patents

Random access control method and device and mobile terminal Download PDF

Info

Publication number
CN108430115B
CN108430115B CN201810177447.4A CN201810177447A CN108430115B CN 108430115 B CN108430115 B CN 108430115B CN 201810177447 A CN201810177447 A CN 201810177447A CN 108430115 B CN108430115 B CN 108430115B
Authority
CN
China
Prior art keywords
cell
mobile terminal
random access
standard network
message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810177447.4A
Other languages
Chinese (zh)
Other versions
CN108430115A (en
Inventor
王燕飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qiku Internet Technology Shenzhen Co Ltd
Original Assignee
Qiku Internet Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qiku Internet Technology Shenzhen Co Ltd filed Critical Qiku Internet Technology Shenzhen Co Ltd
Priority to CN201810177447.4A priority Critical patent/CN108430115B/en
Publication of CN108430115A publication Critical patent/CN108430115A/en
Application granted granted Critical
Publication of CN108430115B publication Critical patent/CN108430115B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA
    • H04W74/0833Random access procedures, e.g. with 4-step access

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the invention provides a control method, a device and a mobile terminal of random access, wherein the method comprises the following steps: when a mobile terminal initiates a random access process to a first cell, judging whether to successfully access a high-standard network of the first cell; if not, selecting a second cell from other candidate cells except the first cell; and initiating a random access process to the second cell to access the high-standard network of the second cell. The invention can increase the probability of the mobile terminal accessing to the high-standard network and improve the stability of network access, thereby improving the internet experience of users.

Description

Random access control method and device and mobile terminal
Technical Field
The present invention relates to the field of communications, and in particular, to a method and an apparatus for controlling random access, and a mobile terminal.
Background
In the random access process, communication is easily interfered by the outside or the inside of a base station; when the interference is too large, communication between UE (User Equipment) or eNB (evolved Node B) is blocked, so that the UE cannot receive an access response from the eNB; at this time, the UE may evade the 4G network of the cell and connect to the 2G or 3G network, so that the UE cannot log in the 4G network. However, the network bandwidth, the network signal quality, and the like of the low-standard network are relatively poor in the high-standard network, and it is difficult to meet the original internet access requirement of the high-standard network, which results in poor internet access experience of the user.
Disclosure of Invention
In view of this, embodiments of the present invention provide a method, an apparatus, and a mobile terminal for controlling random access, so as to increase a probability that the mobile terminal accesses a high-standard network, improve stability of network access, and thereby improve internet experience of a user.
In order to achieve the above purpose, the embodiment of the present invention adopts the following technical solutions:
in a first aspect, an embodiment of the present invention provides a method for controlling random access, where the method is applied to a mobile terminal, and includes: when a mobile terminal initiates a random access process to a first cell, judging whether to successfully access a high-standard network of the first cell; if not, selecting a second cell from other candidate cells except the first cell; and initiating a random access process to the second cell to access the high-standard network of the second cell.
In a preferred embodiment of the present invention, the selecting the second cell from the candidate cells except the first cell includes: performing a blocking operation on the first cell to remove the first cell from the candidate cells; a second cell is selected from the remaining candidate cells.
In a preferred embodiment of the present invention, the step of performing the blocking operation on the first cell includes: adding a blocking identifier for the first cell and starting timing; and when the set time length is reached, deleting the blocking identifier so as to add the first cell into the candidate cell again.
In a preferred embodiment of the present invention, the initiating a random access procedure to the second cell includes: and initiating a random access process to the second cell within a set time length.
In a preferred embodiment of the present invention, the step of selecting the second cell from the candidate cells except the first cell includes: and searching the cell with the strongest signal strength from other candidate cells except the first cell to be used as the second cell.
In a preferred embodiment of the present invention, the step of determining whether to access the high standard network of the first cell successfully when the mobile terminal initiates the random access procedure to the first cell includes: when the mobile terminal sends an appointed message in the random access process to the first cell, monitoring the measurement parameters of a response message corresponding to the appointed message which is not received; and if the measurement parameter reaches a preset threshold value, determining that the high-standard network accessing the first cell fails.
In a preferred embodiment of the present invention, if the random access procedure initiated by the mobile terminal to the first cell is based on a contention mechanism, the designated message is a random access request message; and if the random access process initiated by the mobile terminal to the first cell is based on a non-contention mechanism, the designated message is a contention resolution message.
In a second aspect, an embodiment of the present invention provides a random access control device, where the random access control device is disposed in a mobile terminal, and includes: the judging module is used for judging whether the mobile terminal successfully accesses the high standard network of the first cell when the mobile terminal initiates a random access process to the first cell; the cell selection module is used for selecting a second cell from other candidate cells except the first cell if the high-system network of the first cell is not successfully accessed; and the access module is used for initiating a random access process to the second cell so as to access the high-standard network of the second cell.
In a third aspect, an embodiment of the present invention provides a mobile terminal, where the mobile terminal includes a memory and a processor, the memory is used to store a program that supports the processor to execute the above-mentioned control method for random access, and the processor is configured to execute the program stored in the memory.
In a fourth aspect, an embodiment of the present invention provides a computer storage medium for storing computer software instructions for the control apparatus for random access.
Compared with the prior art, according to the random access control method, the random access control device, the mobile terminal and the computer storage medium provided by the embodiment of the invention, when the mobile terminal cannot successfully access the high-standard network of the first cell, the second cell is selected from other candidate cells except the first cell, and a random access process is initiated to the second cell so as to access the high-standard network of the second cell; the method can increase the probability of the mobile terminal accessing to the high-standard network, and improve the stability of network access, thereby improving the internet experience of users.
In order to make the aforementioned and other objects, features and advantages of the present invention comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present invention and therefore should not be considered as limiting the scope, and for those skilled in the art, other related drawings can be obtained according to the drawings without inventive efforts.
Fig. 1 is a flowchart of a method for controlling random access according to an embodiment of the present invention;
fig. 2 is a flowchart of a method of a random access procedure according to an embodiment of the present invention;
fig. 3 is a schematic diagram of message interaction in a contention-based random access procedure according to an embodiment of the present invention;
fig. 4 is a flowchart of another random access control method according to an embodiment of the present invention;
fig. 5 is a flowchart of another random access control method according to an embodiment of the present invention;
fig. 6 is a schematic diagram illustrating an update flow of a tracking area according to an embodiment of the present invention;
fig. 7 is a flowchart of another random access control method according to an embodiment of the present invention;
fig. 8 is a schematic structural diagram of a random access control device according to an embodiment of the present invention;
fig. 9 is a schematic structural diagram of another random access control device according to an embodiment of the present invention;
fig. 10 is a schematic structural diagram of a mobile terminal according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. The components of embodiments of the present invention generally described and illustrated in the figures herein may be arranged and designed in a wide variety of different configurations. Thus, the following detailed description of the embodiments of the present invention, presented in the figures, is not intended to limit the scope of the invention, as claimed, but is merely representative of selected embodiments of the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments of the present invention without making any creative effort, shall fall within the protection scope of the present invention.
In the embodiment of the present invention, sometimes, also called a mobile terminal for short as UE, the mobile terminal often needs to initiate a random access process when establishing a communication link with a base station; through the random access process, uplink time can be synchronized between the mobile terminal and the base station, information interaction can be realized, and tasks such as calling, resource request, data transmission and the like can be completed, so that the effectiveness of random access can directly influence the internet experience of a user.
The mobile terminal can trigger the random access process when the mobile terminal is started, the position of the mobile terminal is changed, or the mobile terminal is switched from a low-system network to a high-system network; the random access process may enable the mobile terminal to be switched from an idle state to an active state, so as to connect to a high-system network such as LTE (Long Term Evolution) or 4G. The following description will be made with respect to a low-standard network being a 2G or 3G network, and a high-standard network being a 4G network, a 4G + network, or a 5G network.
In the random access process, the interaction between the UE and the eNB may be influenced by the internal interference or the external interference of the base station, so that the UE or the eNB cannot receive the information sent by the other side; these interferences may come from interference sources of other base stations or other external devices, which are also referred to as external interferences; or the interference may come from within the base station, e.g. excessive traffic, carrier frequency failure, etc., which is also referred to as internal interference.
When the interference is too large, the UE is likely to fall back to the low-standard network due to failure to receive the response from the base station, and the network bandwidth, the network signal quality, and the like of the low-standard network are relatively poor in the high-standard network, which is not consistent with the original high-standard network internet access requirement of the user, and thus the user experience on the internet is poor. Based on this, the embodiment of the invention provides a control method and device for random access, a mobile terminal and a computer storage medium; the technology can be applied to mobile terminals such as mobile phones, tablet computers and the like, or other equipment capable of logging in a mobile communication network; the techniques may be implemented in associated software or hardware, as described by way of example below.
Referring to a flowchart of a method for controlling random access shown in fig. 1, the method is applied to a mobile terminal, and the method includes the following steps:
step S102, when the mobile terminal initiates a random access process to the first cell, judging whether to access the high standard network of the first cell successfully;
when a mobile terminal initiates a random access process, a plurality of candidate cells may be accessible; the mobile terminal may rank the cells according to parameters such as signal strength and stability of the cell base station, so as to select an optimal cell as the first cell for access, for example, the selected first cell may be a cell with the strongest signal strength.
When initiating an access process to a first cell, a mobile terminal may prefer to access a high-standard network of the first cell. If the mobile terminal sends the relevant information in the random access process to the base station of the first cell, if the information which should be fed back or responded by the base station is not received in the set time length, the relevant information is usually sent again or continuously waits for a period of time, and if the times of sending the relevant information reaches the set times or the waiting time length reaches the set time length, the high-system network which is accessed to the first cell at this time is determined to fail.
Step S104, if not, selecting a second cell from other candidate cells except the first cell;
the selection of the second cell may also refer to the selection of the first cell.
Step S106, a random access process is initiated to the second cell so as to access the high standard network of the second cell.
According to the existing protocol, if the mobile terminal can not successfully access the high-standard network of the first cell, the mobile terminal tries to access the low-standard network of the first cell, such as 2G or 3G; in order to avoid the problem of network standard fallback, in this embodiment, when it is found that the mobile terminal cannot successfully access the high-standard network of the first cell, a second cell is selected from candidate cells other than the first cell, and an attempt is made to access the high-standard network of the second cell, so as to increase a probability that the mobile terminal accesses the high-standard network.
The first cell is usually the cell with the strongest signal but with larger interference, and the signal strength of the second cell may be lower than that of the first cell but with smaller or no interference, and compared with the low-standard network accessed to the first cell, the high-standard network accessed to the second cell can often better meet the internet access requirement of the user.
The process of accessing the second cell high-standard network by the mobile terminal may refer to a method flowchart of a random access process shown in fig. 2, where the method takes the high-standard network as a 4G network as an example, and the process includes the following steps:
step S202, the UE sends a random access preamble to the eNB of the second cell, where the preamble may also be referred to as Message 1; the UE comprises a mobile terminal, a mobile phone, a data card and the like; the UE may randomly select a preamble from two predefined groups and transmit the preamble to the eNB through a physical random access channel PRACH, this step S202 may also be referred to as a power sounding step.
Step S204, the eNB responds to the UE with random access resource information, which may also be referred to as Message 2; and after receiving the lead code, the eNB confirms whether the lead code is occupied by other UE, and if not, allocates random access resources for uplink communication for the UE through a downlink shared channel (DL-SCH).
Step S206, the UE transmits a contention resolution Message, which may also be referred to as Message3, to the eNB; and after receiving the random access resource information, the UE performs time synchronization with the current tracking area, starts to execute a competition resolving program, and sends the competition resolving message to the eNB after the execution is finished.
Step S208, the eNB responds to the UE with a contention resolution flag, which may also be referred to as Message 4; after receiving the contention resolution Message, the eNB responds to the UE with a contention resolution flag, which may be extracted from the Message 3; by responding to the contention resolution identification to the UE, the UE may be allocated time-frequency resources or channels required for data transmission.
If the mobile terminal can not successfully access the high-standard network of the second cell, the mobile terminal can continuously select a third cell from the rest candidate cells except the first cell or the second cell for access; of course, it is also possible to try to initiate the random access procedure again to the first cell.
In the random access control method provided by the embodiment of the present invention, when a mobile terminal cannot successfully access a high standard network of a first cell, a second cell is selected from candidate cells except the first cell, and a random access process is initiated to the second cell to access the high standard network of the second cell; the method can increase the probability of the mobile terminal accessing to the high-standard network, and improve the stability of network access, thereby improving the internet experience of users.
The random access procedure for connecting to the 4G network may be classified into a contention type and a non-contention type, where the contention type random access procedure generally means that no preamble allocated by the base station exists on the UE before the random access, and needs to be acquired from the base station in the random access procedure. The non-contention type random access procedure refers to that the UE has a preamble pre-allocated by the base station, that is, before the UE initiates the random access procedure, the eNB has allocated the random access resource for uplink communication to the UE. Therefore, the UE can determine whether the current access procedure is a contention type or a non-contention type by checking whether the preamble is saved.
Referring to a message interaction diagram in the contention-based random access process shown in fig. 3, the random process is described by taking the example that the UE initiates the random access when the tracking area is updated, and specifically includes the following processes:
when the UE performs tracking area update, send the Message1 to the eNB of the first cell, so as to access the high-standard network of the first cell, and if the eNB is interfered to a certain extent, it is likely that the eNB cannot receive the Message1, so that the UE cannot normally receive the Message 2.
If the UE can receive the Message2 within the number of times that the UE sends the Message1 does not reach the set n times, the Message3 is sent to the eNB, and after the Message3 is sent, a processing manner similar to the Message1 may be used, that is, if the Message4 is normally received, an update procedure of the related access parameter is initiated, and the UE successfully accesses the high-standard network of the first cell. Otherwise, the Message3 may be repeatedly sent until the number of sending times reaches the set m times (m may be equal to n or unequal, for example, any value from 3 times to 6 times, etc.). If the Message4 is still not received, a 2G or 3G access procedure is initiated to the eNB.
The UE initiating a 2G or 3G access procedure to the eNB may include: the UE deletes the current location area identifier LAI, the temporary mobile subscriber identity TMSI, the encryption key sequence number and the equivalent public land mobile network PLMN list, and sets the updating state as U2NOT UPDATED; furthermore, the UE will try to select either GSM radio access network GERAN or evolved universal radio access network UTRAN; wherein, GERAN and UTRAN belong to 3G network.
As can be seen from the interaction process shown in fig. 3, for the contention-based random access process, if the UE sends the Message1 or the Message3 for the maximum number of times, the UE still does not receive the corresponding Message2 or the Message4, at this time, the UE may avoid the 4G network according to the existing protocol, connect to the 2G or 3G network of the cell corresponding to the eNB, and therefore the UE cannot log in the 4G network. Therefore, the UE can determine whether the access to the high-standard network fails by monitoring whether the relevant message is received. Based on this, refer to a flow chart of another random access control method shown in fig. 4, which is implemented on the basis of the method shown in fig. 3; in the method, when a mobile terminal sends a designated message in a random access process to a first cell, monitoring a measurement parameter of a response message corresponding to the designated message which is not received; and if the measurement parameter reaches a preset threshold value, determining that the high-standard network accessing the first cell fails.
The method specifically comprises the following steps:
step S402, the mobile terminal sends the appointed information in the random access process to the first cell; the designation Message may be the Message1, i.e., a random access preamble, or the Message3, i.e., a contention resolution Message.
Step S404, judging whether a response message corresponding to the specified message is received; if yes, go to step S405; if not, go to step S406;
step S405, determining that the high-system network accessed to the first cell is successful; finishing;
it can be understood that, if the specified Message is Message1, the corresponding response Message is Message2, and after receiving Message2, the mobile terminal continues to send Message3, and after receiving Message4, it may determine that the high-system network accessing the first cell is successful; if the designated Message is Message3, the corresponding response Message is Message4, that is, after receiving Message4, it can be determined that the high-system network accessing the first cell is successful.
Step S406, monitoring the measurement parameters of the response message corresponding to the non-received appointed message;
the measurement parameters include: the sending times of the appointed messages, the sending rounds of the appointed messages or the time length from the sending time of the first appointed message to the current time are specified; the time length of each round in the number of sending rounds is a preset value, and the multiple appointed messages can be sent continuously or discontinuously within the time length, namely, the multiple appointed messages can be sent in each round. In specific implementation, a time window may be set, where the length of the time window is the length of each round of time, and in the time window, the designated message is sent for multiple times until the time window is finished, and the sending in the round is finished. And starting the next time window, starting the next round of sending operation, and repeating the steps until the number of sending rounds reaches the preset threshold value.
Alternatively, the number of transmission rounds may be further understood as: reporting the random access failure n times when the random access failure is 1 round and 1 random access failure. Taking TAU (tracking area update procedure)/Attach procedure as an example, the random access failure report may refer to that the UE lower layer indicates that the upper layer message fails to be sent after the RRC connection establishment (i.e., the random access procedure) fails, and when the UE upper layer receives the indication, the number of sending rounds is incremented by 1. The UE lower layer will retry the next round of random access procedure until the number of transmission rounds reaches the preset threshold.
The sending times may refer to the times of sending the designated message by the UE bottom layer, that is, the times of attempting in the random access process, and in the process of sending the designated message for multiple times, the power may be continuously increased until the power reaches the preset upper power limit, or the sending times reaches the preset upper time limit, and at this time, the random access failure reporting operation may be performed. The time duration from the transmission time of the first specific message to the current time may also be the total attempt time of the TAU or Attach.
Step S408, judging whether the measurement parameter reaches a preset threshold value; if yes, go to step S410; if not, executing step S402;
for example, if the measurement parameter is the number of times of sending a specified message, the maximum number of times of sending may be preset as a preset threshold; if the measurement parameter is the number of transmission rounds of the designated message, the maximum number of transmission rounds can be preset as a preset threshold value; as described above, the time length of each round in the number of transmission rounds is a preset value, and the mobile terminal can continuously or at set time intervals transmit the designated message within the time length; the time length of each round can be kept continuous, and a certain time gap can be set; of course, the number of transmission times per round in the number of transmission rounds may be set to a preset value.
In order to avoid that the mobile terminal directly falls back to the low-standard network in the first cell, the preset threshold value of the measurement parameter is lower than the corresponding threshold value when the mobile terminal falls back to the low-standard network; for example, if the measurement parameter is the transmission frequency of the specified message, and the maximum transmission frequency corresponding to the mobile terminal falling back to the low-standard network is set to be N, the maximum transmission frequency M for determining that the high-standard network accessing the first cell fails is less than N, so that the mobile terminal performs subsequent blocking operation on the first cell before falling back to the low-standard network.
Step S410, determining that the access to the high-standard network of the first cell fails, and performing blocking operation on the first cell to remove the first cell from the candidate cells;
in practical implementation, a congestion flag may be added to the first cell to indicate that the first cell is congested; when the mobile terminal detects that the blocking identifier is added to the cell, the cell is removed from the candidate cells; of course, the first cell may also be deleted directly from the candidate cell list.
Step S412, selects a second cell from the remaining candidate cells.
Step S414, a random access procedure is initiated to the second cell to access the high standard network of the second cell.
In the above manner, when the measurement parameter of the response message corresponding to the non-received designated message reaches the preset threshold value, the first cell is subjected to blocking operation to remove the first cell from the candidate cells; selecting a second cell from the remaining candidate cells, and initiating a random access process to the second cell to access a high-standard network of the second cell; according to the method, the cells which cannot be accessed to the high-standard network can be simply, conveniently and quickly removed through blocking operation, so that the probability of accessing the mobile terminal to the high-standard network is increased, the stability of network access is improved, and the internet surfing experience of a user is improved.
The embodiment of the invention also provides another random access control method, which is realized on the basis of the method shown in the figure 4; as shown in fig. 5, the method includes the steps of:
step S502, the mobile terminal sends an appointed message in the random access process to the first cell;
step S504, judge whether receive the response message corresponding to appointed message; if yes, go to step S505; if not, go to step S506;
step S505, determining that the high-system network accessed to the first cell is successful; finishing;
step S506, monitoring the measurement parameters of the response message corresponding to the non-received appointed message;
step S508, judge whether the parameter of this measurement reaches the predetermined threshold value; if yes, go to step S510; if not, executing step S502;
step S510, determining that the access to the high-system network of the first cell fails, and adding a blocking identifier for the first cell to remove the first cell from the candidate cells; starting timing;
the method for adding the blocking identifier to the first cell can be realized by the following steps: setting a 'barred' keyword in a cell status bit of a first cell; after the keyword is set, the corresponding counter is started to start timing, when the time reaches the timing time, for example, 300 seconds, the blocking identifier, namely the "barred" keyword is deleted, and the first cell returns to the candidate cell.
In step S512, a cell with the strongest signal strength is searched from other candidate cells except the first cell as a second cell. Generally, in a cell with weak signal strength, the probability that a mobile terminal can successfully access is low, and even if the mobile terminal accesses, a network signal may be unstable or even interrupted at any time; therefore, the search results in the second cell, often with signal strength as a selection criterion.
Step S514, a random access process is initiated to the second cell within the set duration to access the high standard network of the second cell.
In order to improve the efficiency of the random access process, after the mobile terminal fails to access the high-standard network of the first cell, a random access procedure needs to be initiated to the second cell as soon as possible, so that the set duration may be preset in step S514; meanwhile, the time for blocking the first cell is limited, if the random access procedure is not initiated to the second cell at a later time, after the blocking operation on the first cell fails, the mobile terminal may select the first cell to access due to a strong signal of the first cell, if the interference of the current first cell is still large, the mobile terminal still cannot successfully access, and the mobile terminal cannot initiate the random access procedure to the second cell in time, which easily causes the access procedure to be trapped in a dead cycle of initiating access to the first cell all the time, and further causes the mobile terminal to be unable to be connected to the mobile network all the time.
For example, as shown in fig. 6, when the mobile terminal performs tracking area update, if the mobile terminal sends the number of rounds of Message1 and reaches the set number of rounds, the mobile terminal performs a blocking operation on the first cell; the mobile terminal selects a second cell and sends a Message1 to the second cell, and if the interference of the second cell is small, the subsequent messages 2, 3 and 4 are normally transmitted, thereby completing the update process of the tracking area. If the mobile terminal sends the Message1 to the low-level network after 5 rounds of transmission in the conventional specification, the number of rounds of transmission may be less than 5 rounds, for example, 2 rounds or 3 rounds of transmission may be set.
In step S516, when the set duration is reached, the blocking flag is deleted, so as to add the first cell into the candidate cell again. The set time length can be 300 seconds, and other set time lengths can also be set according to the time parameter of random access; in general, the set time period may be longer than the set time period in step S514 in order to allow the mobile terminal an opportunity to access the second cell.
In many cases, the interference causing the failure of accessing the high-standard network of the first cell is periodic interference, and the interference automatically disappears after a period of time or disappears after the fault forming the interference is removed; if the first cell is still blocked after the interference disappears, the mobile terminal cannot be connected to the cell with the strongest signal, and network signal resources cannot be reasonably utilized, thereby resulting in resource waste.
Therefore, when the blocking identifier is added to the set duration, the identifier is deleted, so that the mobile terminal can still try to connect to the first cell when triggering the random access process again, and therefore the mobile terminal can be always connected to the cell with the best network signal, and reasonable utilization of network signal resources can be achieved.
In the above manner, after the high-standard network accessing the first cell fails, the first cell is removed by adding a blocking identifier to the first cell; searching a cell with the strongest signal intensity from other candidate cells to serve as a second cell, and initiating a random access process to the second cell within a set time length; according to the method, the cells which cannot be accessed to the high-standard network can be simply, conveniently and quickly removed by adding the blocking marks, so that the probability of accessing the mobile terminal to the high-standard network is increased, the stability of network access is improved, and the internet surfing experience of a user is improved.
In the method, by setting the duration of the blocking identifier, the mobile terminal can be given an opportunity to access a high-standard network of other cells, and the mobile terminal can still try to connect the first cell subsequently, so that the mobile terminal is always connected to the cell with the best network signal, and the internet experience of a user is improved.
The embodiment of the invention also provides another random access control method, which is realized on the basis of the method shown in the figure 4; as can be seen from the above description, the random access procedure is classified into a contention type and a non-contention type, and there is a difference between the specific access procedures of the contention type and the non-contention type, so before triggering the random access procedure, it is often necessary to identify the type of the random access procedure of the first cell.
In this embodiment, if the random access process initiated by the mobile terminal to the first cell is based on a contention mechanism, the mobile terminal sends a designated message in the random access process to the first cell as a random access request message; if the random access process initiated by the mobile terminal to the first cell is based on a non-contention mechanism, the specified message is a contention resolution message. The contention mechanism and the non-contention mechanism can refer to the contention-type and non-contention-type random access procedures described above, respectively.
As shown in fig. 7, the method includes the steps of:
step S702, detecting whether a random access code of a first cell is stored; if not, executing step S704, if yes, executing step S706;
step S704, initiating a random access process based on a competition mechanism to the first cell; step S708 is executed;
step S706, initiating a random access process based on a non-contention mechanism to a first cell; executing step S710;
step S708, the mobile terminal sends a random access request message in the random access process to the first cell; step S712 is performed; the random access request Message corresponds to the Message 1;
step S710, the mobile terminal sends competition resolving information in the random access process to the first cell; the contention resolution Message corresponds to the Message 3;
step S712, determining whether a response message corresponding to the designated message is received; if yes, go to step S713; if not, go to step S714;
step S713, determining that the high-system network accessed to the first cell is successful, and ending;
step S714, monitoring the measurement parameters of the response message corresponding to the non-received appointed message;
step S716, if the measurement parameter reaches the preset threshold, determining that the access to the high-standard network of the first cell fails;
step S718, performing a blocking operation on the first cell to remove the first cell from the candidate cells;
step S720, selects a second cell from the remaining candidate cells.
Step S722, a random access procedure is initiated to the second cell to access the high-standard network of the second cell.
In the above manner, no matter whether the random access process is competitive or non-competitive, the cell which cannot be accessed to the high-standard network can be simply, conveniently and quickly removed through blocking operation, so that the probability of accessing the mobile terminal to the high-standard network is increased, the stability of network access is improved, and the internet experience of a user is improved.
Corresponding to the above method embodiment, referring to fig. 8, a schematic structural diagram of a control apparatus for random access is shown, where the apparatus is disposed in a mobile terminal, and includes:
a judging module 80, configured to judge whether to successfully access the high-standard network of the first cell when the mobile terminal initiates a random access process to the first cell;
a cell selection module 81, configured to select a second cell from candidate cells other than the first cell if the high-system network of the first cell is not successfully accessed;
an accessing module 82, configured to initiate a random access procedure to the second cell to access the high-standard network of the second cell.
The cell selection module is further configured to: performing a blocking operation on the first cell to remove the first cell from the candidate cells; a second cell is selected from the remaining candidate cells.
The cell selection module is further configured to: adding a blocking identifier for the first cell and starting timing; and when the set time length is reached, deleting the blocking identifier so as to add the first cell into the candidate cell again.
The access module is further configured to: and initiating a random access process to the second cell within a set time length.
The cell selection module is further configured to: and searching the cell with the strongest signal strength from other candidate cells except the first cell to be used as the second cell.
The judgment module is further configured to: when the mobile terminal sends an appointed message in the random access process to the first cell, monitoring the measurement parameters of a response message corresponding to the appointed message which is not received; and if the measurement parameter reaches a preset threshold value, determining that the high-standard network accessing the first cell fails.
If the random access process initiated by the mobile terminal to the first cell is based on a competition mechanism, the designated message is a random access request message; and if the random access process initiated by the mobile terminal to the first cell is based on a non-contention mechanism, the designated message is a contention resolution message.
An embodiment of the present invention further provides another random access control device, as shown in fig. 9, based on the device shown in fig. 8, the device further includes:
a monitoring module 90, configured to detect whether a random access code of a first cell is stored;
an initiating module 91, configured to initiate a contention based random access procedure to a first cell if a random access code of the first cell is stored; otherwise, initiating a random access process based on a non-contention mechanism to the first cell.
The above parameters include: the sending times of the appointed messages, the sending rounds of the appointed messages or the time length from the sending time of the first appointed message to the current time are specified; the time length of each round in the number of transmission rounds is a preset value. The threshold value is lower than the corresponding threshold value when the mobile terminal falls back to the low-standard network.
In the random access control device provided in the embodiment of the present invention, when the mobile terminal cannot successfully access the high standard network of the first cell, a second cell is selected from candidate cells other than the first cell, and a random access process is initiated to the second cell to access the high standard network of the second cell; the method can increase the probability of the mobile terminal accessing to the high-standard network, and improve the stability of network access, thereby improving the internet experience of users.
An embodiment of the present invention further provides a mobile terminal, where the mobile terminal includes a memory and a processor, the memory is used to store a program that supports the processor to execute the control method of random access provided in the foregoing embodiment, and the processor is configured to execute the program stored in the memory. The mobile terminal may also include a communication interface for communicating with other devices or a communication network. The mobile terminal may be any terminal device including a mobile phone, a tablet computer, a PDA (Personal Digital Assistant), a vehicle-mounted computer, and the like.
Further, the present embodiment also provides a computer storage medium for storing computer software instructions for a random access control device provided in any one of the foregoing embodiments.
As shown in fig. 10, the mobile terminal 100 includes: a Radio Frequency (RF) circuit 110, a memory 120, an input unit 130, a display unit 140, a sensor 150, an audio circuit 160, a Wireless Fidelity (WiFi) module 170, a processor 180, and a power supply 190. Those skilled in the art will appreciate that the mobile terminal 100 configuration shown in fig. 10 is not intended to be limiting of the mobile terminal 100 and may include more or less components than shown, or some components in combination, or a different arrangement of components.
The following describes each component of the mobile terminal 100 in detail with reference to fig. 10:
the RF circuit 110 may be used for receiving and transmitting signals during information transmission and reception or during a call, and in particular, receives downlink information of a base station and then processes the received downlink information to the processor 180; in addition, the data for designing uplink is transmitted to the base station. In general, the RF circuit 110 includes, but is not limited to, an antenna, at least one Amplifier, a transceiver, a coupler, a Low Noise Amplifier (LNA), a duplexer, and the like. In addition, the RF circuitry 110 may also communicate with networks and other devices via wireless communications. The wireless communication may use any communication standard or protocol, including but not limited to Global System for Mobile communication (GSM), General Packet Radio Service (GPRS), Code Division Multiple Access (CDMA), Wideband Code Division Multiple Access (WCDMA), Long Term Evolution (LTE), email, Short Messaging Service (SMS), and the like.
The memory 120 may be configured to store software programs and modules, such as program instructions/modules corresponding to the method for controlling WiFi network speed according to the embodiment of the present invention, and the processor 180 executes various functional applications and data processing of the mobile terminal 100, such as a control method of random access according to the embodiment of the present invention, by executing the software programs and modules stored in the memory 120. The memory 120 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the mobile terminal 100, and the like. Further, the memory 120 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
The input unit 130 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the mobile terminal 100. Specifically, the input unit 130 may include a touch panel 131 and other input devices 132. The touch panel 131, also referred to as a touch screen, may collect touch operations of a user on or near the touch panel 131 (e.g., operations of the user on or near the touch panel 131 using any suitable object or accessory such as a finger or a stylus pen), and drive the corresponding connection device according to a preset program. Alternatively, the touch panel 131 may include two parts, i.e., a touch detection device and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, sends the touch point coordinates to the processor 180, and can receive and execute commands sent by the processor 180. In addition, the touch panel 131 may be implemented by various types such as a resistive type, a capacitive type, an infrared ray, and a surface acoustic wave. The input unit 130 may include other input devices 132 in addition to the touch panel 131. In particular, other input devices 132 may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control keys, switch keys, etc.), a trackball, a mouse, a joystick, and the like.
The display unit 140 may be used to display information input by the user or information provided to the user and various menus of the mobile terminal 100. The Display unit 140 may include a Display panel 141, and optionally, the Display panel 141 may be configured in the form of a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like. Further, the touch panel 131 can cover the display panel 141, and when the touch panel 131 detects a touch operation on or near the touch panel 131, the touch operation is transmitted to the processor 180 to determine the type of the touch event, and then the processor 180 performs processing according to the type of the touch event. Although the touch panel 131 and the display panel 141 are two separate components to implement the input and output functions of the mobile terminal 100 in fig. 10, in some embodiments, the touch panel 131 and the display panel 141 may be integrated to implement the input and output functions of the mobile terminal 100.
The mobile terminal 100 may also include at least one sensor 150, such as a light sensor, a motion sensor, and other sensors. Specifically, the light sensor may include an ambient light sensor that may adjust the brightness of the display panel 141 according to the brightness of ambient light, and a proximity sensor that may turn off the display panel 141 and/or a backlight when the mobile terminal 100 is moved to the ear. As one of the motion sensors, the accelerometer sensor may detect the magnitude of acceleration in each direction (generally, three axes), detect the magnitude and direction of gravity when stationary, and be used for applications (such as horizontal and vertical screen switching, related games, magnetometer attitude calibration) for recognizing the attitude of the mobile terminal 100, and related functions (such as pedometer and tapping) for vibration recognition; as for other sensors such as a gyroscope, a barometer, a hygrometer, a thermometer, and an infrared sensor, which may be further configured in the mobile terminal 100, detailed descriptions thereof are omitted.
Audio circuitry 160, speaker 161, and microphone 162 may provide an audio interface between a user and mobile terminal 100. The audio circuit 160 may transmit the electrical signal converted from the received audio data to the speaker 161, and convert the electrical signal into a sound signal for output by the speaker 161; on the other hand, the microphone 162 converts the collected sound signal into an electric signal, converts the electric signal into audio data after being received by the audio circuit 160, and then outputs the audio data to the processor 180 for processing, and then transmits the audio data to, for example, another mobile terminal 100 via the RF circuit 110, or outputs the audio data to the memory 120 for further processing.
WiFi belongs to a short-distance wireless transmission technology, and the mobile terminal 100 can help a user send and receive e-mails, browse web pages, access streaming media, and the like through the WiFi module 170, and it provides a wireless broadband internet access for the user. Although fig. 10 shows the WiFi module 170, it is understood that it does not belong to the essential constitution of the mobile terminal 100, and may be omitted entirely as needed within the scope not changing the essence of the invention.
The processor 180 is a control center of the mobile terminal 100, connects various parts of the entire mobile terminal 100 using various interfaces and lines, and performs various functions of the mobile terminal 100 and processes data by running or executing software programs and/or modules stored in the memory 120 and calling data stored in the memory 120, thereby monitoring the mobile terminal 100 as a whole. Alternatively, processor 180 may include one or more processing units; preferably, the processor 180 may integrate an application processor, which mainly handles operating systems, user interfaces, application programs, etc., and a modem processor, which mainly handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor 180.
The mobile terminal 100 further includes a power supply 190 (e.g., a battery) for powering the various components, which may be logically coupled to the processor 180 via a power management system that may be configured to manage charging, discharging, and power consumption.
It is to be understood that the configuration shown in fig. 10 is merely exemplary, and that the mobile terminal 100 may include more or fewer components than those shown in fig. 8, or have a different configuration than that shown in fig. 10. The components shown in fig. 10 may be implemented in hardware, software, or a combination thereof.
It should be noted that, in the present specification, the embodiments are all described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments may be referred to each other.
The method and apparatus for controlling random access and the computer program product of the mobile terminal provided in the embodiments of the present invention include a computer-readable storage medium storing a program code, where instructions included in the program code may be used to execute the method described in the foregoing method embodiments, and specific implementation may refer to the method embodiments, and will not be described herein again.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
Finally, it should be noted that: the above-mentioned embodiments are only specific embodiments of the present invention, which are used for illustrating the technical solutions of the present invention and not for limiting the same, and the protection scope of the present invention is not limited thereto, although the present invention is described in detail with reference to the foregoing embodiments, those skilled in the art should understand that: any person skilled in the art can modify or easily conceive the technical solutions described in the foregoing embodiments or equivalent substitutes for some technical features within the technical scope of the present disclosure; such modifications, changes or substitutions do not depart from the spirit and scope of the embodiments of the present invention, and they should be construed as being included therein. Therefore, the protection scope of the present invention shall be subject to the protection scope of the appended claims.
The embodiment of the invention also discloses:
A1. a control method of random access is applied to a mobile terminal and comprises the following steps:
when the mobile terminal initiates a random access process to a first cell, judging whether to successfully access a high standard network of the first cell;
if not, selecting a second cell from other candidate cells except the first cell;
and initiating a random access process to the second cell to access the high-standard network of the second cell.
A2. The method of a1, wherein the selecting a second cell from candidate cells other than the first cell comprises:
performing a blocking operation on the first cell to remove the first cell from candidate cells;
a second cell is selected from the remaining candidate cells.
A3. The method of a2, the step of jamming the first cell comprising:
adding a blocking identifier for the first cell and starting timing;
and when the set duration is reached, deleting the blocking identifier so as to add the first cell into the candidate cell again.
A4. The method of a3, the initiating a random access procedure to the second cell comprising: and initiating a random access process to the second cell within the set time length.
A5. The method of a1, the step of selecting a second cell from candidate cells other than the first cell comprising: and searching the cell with the strongest signal strength from other candidate cells except the first cell to be used as a second cell.
A6. According to the method of a1, the step of determining whether to successfully access the high-standard network of the first cell when the mobile terminal initiates the random access procedure to the first cell includes:
when the mobile terminal sends an appointed message in the random access process to the first cell, monitoring the measurement parameters of a response message corresponding to the appointed message which is not received;
and if the measurement parameter reaches a preset threshold value, determining that the high-standard network accessing the first cell fails.
A7. According to the method of a6, if the random access procedure initiated by the mobile terminal to the first cell is based on a contention mechanism, the designated message is a random access request message;
if the random access process initiated by the mobile terminal to the first cell is based on a non-contention mechanism, the designated message is a contention resolution message.
A8. The method of a7, the method further comprising:
detecting whether a random access code of the first cell is stored;
if so, initiating a random access process based on a competition mechanism to the first cell; otherwise, initiating a random access process based on a non-contention mechanism to the first cell.
A9. The method of a6, the measurement parameters comprising: the sending times of the specified messages, the sending rounds of the specified messages or the time length from the sending time of the first specified message to the current time; wherein the time length of each round in the number of transmission rounds is a preset value.
A10. According to the method of a6, the threshold is lower than a threshold corresponding to the mobile terminal falling back to the low-standard network.
B11. A control device for random access, the device is arranged in a mobile terminal and comprises:
the judging module is used for judging whether the mobile terminal successfully accesses the high standard network of the first cell when the mobile terminal initiates a random access process to the first cell;
the cell selection module is used for selecting a second cell from other candidate cells except the first cell if the high-system network of the first cell is not successfully accessed;
and the access module is used for initiating a random access process to the second cell so as to access the high-standard network of the second cell.
B12. The apparatus of B11, the cell selection module further configured to:
performing a blocking operation on the first cell to remove the first cell from candidate cells;
a second cell is selected from the remaining candidate cells.
B13. The apparatus of B12, the cell selection module further configured to:
adding a blocking identifier for the first cell and starting timing;
and when the set duration is reached, deleting the blocking identifier so as to add the first cell into the candidate cell again.
B14. The apparatus of B13, the access module further configured to: and initiating a random access process to the second cell within the set time length.
B15. The apparatus of B11, the cell selection module further configured to: and searching the cell with the strongest signal strength from other candidate cells except the first cell to be used as a second cell.
B16. The apparatus of B11, the determining module further configured to:
when the mobile terminal sends an appointed message in the random access process to the first cell, monitoring the measurement parameters of a response message corresponding to the appointed message which is not received;
and if the measurement parameter reaches a preset threshold value, determining that the high-standard network accessing the first cell fails.
B17. According to the apparatus in B16, if the random access procedure initiated by the mobile terminal to the first cell is based on a contention mechanism, the designated message is a random access request message;
if the random access process initiated by the mobile terminal to the first cell is based on a non-contention mechanism, the designated message is a contention resolution message.
B18. The apparatus of B17, the apparatus further comprising:
a monitoring module, configured to detect whether a random access code of the first cell is stored;
an initiating module, configured to initiate a contention mechanism-based random access procedure to the first cell if the random access code of the first cell is stored; otherwise, initiating a random access process based on a non-contention mechanism to the first cell.
B19. The apparatus of B16, the metrics comprising: the sending times of the specified messages, the sending rounds of the specified messages or the time length from the sending time of the first specified message to the current time; wherein the time length of each round in the number of transmission rounds is a preset value.
B20. According to the apparatus in B16, the threshold is lower than a threshold corresponding to when the mobile terminal falls back to the low-standard network.
C21. A mobile terminal comprising a memory for storing a program enabling a processor to perform the method of any of a1 to a10 and a processor configured to execute the program stored in the memory.
D22. A computer storage medium storing computer software instructions for use with an apparatus according to any one of B11 to B20.

Claims (9)

1. A control method of random access is applied to a mobile terminal, and is characterized in that the method comprises the following steps:
when the mobile terminal initiates a random access process to a first cell, judging whether to successfully access a high standard network of the first cell;
if not, selecting a second cell from other candidate cells except the first cell;
initiating a random access process to the second cell to access a high standard network of the second cell;
the step of judging whether the mobile terminal successfully accesses the high standard network of the first cell when the mobile terminal initiates the random access process to the first cell comprises the following steps:
when the mobile terminal sends an appointed message in the random access process to the first cell, monitoring the measurement parameters of a response message corresponding to the appointed message which is not received; the measurement parameters comprise: the sending times of the appointed messages, the sending rounds of the appointed messages or the time length from the sending time of the first appointed message to the current time are specified; the time length of each round in the number of sending rounds is a preset value, and multiple specified messages are sent continuously or discontinuously within the time length;
if the measurement parameter reaches a preset threshold value, determining that the high-standard network accessing the first cell fails; and the preset threshold value is lower than a corresponding threshold value when the mobile terminal falls back to the low-standard network, so that the mobile terminal initiates random access to the second cell before falling back to the low-standard network.
2. The method of claim 1, wherein the step of selecting the second cell from the candidate cells other than the first cell comprises:
performing a blocking operation on the first cell to remove the first cell from candidate cells;
a second cell is selected from the remaining candidate cells.
3. The method of claim 2, wherein the step of blocking the first cell comprises:
adding a blocking identifier for the first cell and starting timing;
and when the set duration is reached, deleting the blocking identifier so as to add the first cell into the candidate cell again.
4. The method of claim 3, wherein the initiating the random access procedure to the second cell comprises: and initiating a random access process to the second cell within the set time length.
5. The method of claim 1, wherein the step of selecting the second cell from the candidate cells other than the first cell comprises: and searching the cell with the strongest signal strength from other candidate cells except the first cell to be used as a second cell.
6. The method according to claim 1, wherein if the random access procedure initiated by the mobile terminal to the first cell is based on a contention mechanism, the specified message is a random access request message;
if the random access process initiated by the mobile terminal to the first cell is based on a non-contention mechanism, the designated message is a contention resolution message.
7. A control device for random access, the device being disposed in a mobile terminal, comprising:
the judging module is used for judging whether the mobile terminal successfully accesses the high standard network of the first cell when the mobile terminal initiates a random access process to the first cell;
the cell selection module is used for selecting a second cell from other candidate cells except the first cell if the high-system network of the first cell is not successfully accessed;
an access module, configured to initiate a random access procedure to the second cell to access a high standard network of the second cell;
the judging module is further configured to monitor a measurement parameter of a response message corresponding to the specified message that is not received when the mobile terminal sends the specified message in the random access process to the first cell; the measurement parameters comprise: the sending times of the appointed messages, the sending rounds of the appointed messages or the time length from the sending time of the first appointed message to the current time are specified; the time length of each round in the number of sending rounds is a preset value, and multiple specified messages are sent continuously or discontinuously within the time length; if the measurement parameter reaches a preset threshold value, determining that the high-standard network accessing the first cell fails; and the preset threshold value is lower than a corresponding threshold value when the mobile terminal falls back to the low-standard network, so that the mobile terminal initiates random access to the second cell before falling back to the low-standard network.
8. A mobile terminal, characterized in that the mobile terminal comprises a memory for storing a program enabling a processor to perform the method of any of claims 1 to 6 and a processor configured for executing the program stored in the memory.
9. A computer storage medium storing computer software instructions for use by the apparatus of claim 7.
CN201810177447.4A 2018-03-02 2018-03-02 Random access control method and device and mobile terminal Active CN108430115B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810177447.4A CN108430115B (en) 2018-03-02 2018-03-02 Random access control method and device and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810177447.4A CN108430115B (en) 2018-03-02 2018-03-02 Random access control method and device and mobile terminal

Publications (2)

Publication Number Publication Date
CN108430115A CN108430115A (en) 2018-08-21
CN108430115B true CN108430115B (en) 2021-06-15

Family

ID=63157651

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810177447.4A Active CN108430115B (en) 2018-03-02 2018-03-02 Random access control method and device and mobile terminal

Country Status (1)

Country Link
CN (1) CN108430115B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108235397A (en) * 2018-04-10 2018-06-29 奇酷互联网络科技(深圳)有限公司 Control method, device and the mobile terminal of random access
CN112566222B (en) * 2019-09-10 2022-07-29 中国移动通信有限公司研究院 Access method, terminal and network side device
CN113286344B (en) * 2021-05-19 2023-04-07 深圳传音控股股份有限公司 Control method, mobile terminal and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103906190A (en) * 2014-04-15 2014-07-02 宇龙计算机通信科技(深圳)有限公司 Network search method and device and terminal
CN103906191A (en) * 2014-04-15 2014-07-02 宇龙计算机通信科技(深圳)有限公司 Method and device for network searching and terminal
CN103906189A (en) * 2014-04-15 2014-07-02 宇龙计算机通信科技(深圳)有限公司 Method and device for network searching and terminal
CN103906188A (en) * 2014-04-15 2014-07-02 宇龙计算机通信科技(深圳)有限公司 Network search method and device and terminal

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015149409A1 (en) * 2014-03-31 2015-10-08 华为终端有限公司 Wireless communication method and wireless terminal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103906190A (en) * 2014-04-15 2014-07-02 宇龙计算机通信科技(深圳)有限公司 Network search method and device and terminal
CN103906191A (en) * 2014-04-15 2014-07-02 宇龙计算机通信科技(深圳)有限公司 Method and device for network searching and terminal
CN103906189A (en) * 2014-04-15 2014-07-02 宇龙计算机通信科技(深圳)有限公司 Method and device for network searching and terminal
CN103906188A (en) * 2014-04-15 2014-07-02 宇龙计算机通信科技(深圳)有限公司 Network search method and device and terminal

Also Published As

Publication number Publication date
CN108430115A (en) 2018-08-21

Similar Documents

Publication Publication Date Title
CN108601059B (en) Frequency point selection method and device and mobile terminal
WO2019196670A1 (en) Method and apparatus for random access control, and mobile terminal
CN106714250B (en) Cell registration method and device and computer readable storage medium
US20220400421A1 (en) Cell reselection method and apparatus, and communication device
US20240007919A1 (en) Frequency priority determination method and apparatus, information issuing method and apparatus, and device and medium
CN112188577A (en) Cell residence method, device, terminal equipment and computer readable storage medium
CN108430115B (en) Random access control method and device and mobile terminal
JP2020517208A (en) Method, apparatus, user equipment and base station for requesting system information
CN107113747B (en) Communication method, device, terminal and base station
CN106851755B (en) Cell registration method and device
US20230094982A1 (en) Method and device for communication processing
CN107484239B (en) Network registration exception handling method and device and user terminal
CN106714275B (en) Wi-Fi connection method and mobile terminal
CN110022553B (en) User identity identification card management method and mobile terminal
CN115087044B (en) Data transmission method, access category creation method and device
CN112383928B (en) Cell reselection method, terminal equipment and storage medium
US20230413150A1 (en) Method and apparatus for determining target cell of ue, communication device, and storage medium
CN109600808B (en) Cell selection method, terminal and network side equipment
CN111096049B (en) Random access method and device based on mobility
CN111885748A (en) Method for releasing RRC connection, terminal equipment and network equipment
CN111988867B (en) Communication method with limited radio resource control and terminal equipment
CN105376138A (en) Contact adding method, data transmission method, and user equipment
CN112637867B (en) 5G network priority registration method and device and mobile terminal
CN110611890B (en) Notification message control method and related device
CN107371203B (en) Method for establishing call and related product

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant