CN108495354B - Access control method - Google Patents
Access control method Download PDFInfo
- Publication number
- CN108495354B CN108495354B CN201810244323.3A CN201810244323A CN108495354B CN 108495354 B CN108495354 B CN 108495354B CN 201810244323 A CN201810244323 A CN 201810244323A CN 108495354 B CN108495354 B CN 108495354B
- Authority
- CN
- China
- Prior art keywords
- wireless terminal
- wireless
- terminals
- data
- group
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 30
- 238000001228 spectrum Methods 0.000 claims abstract description 30
- 230000000977 initiatory effect Effects 0.000 claims abstract description 18
- 238000004891 communication Methods 0.000 claims description 38
- 230000000903 blocking effect Effects 0.000 claims description 7
- 230000005540 biological transmission Effects 0.000 abstract description 5
- 238000005516 engineering process Methods 0.000 description 4
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000002411 adverse Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 230000001934 delay Effects 0.000 description 1
- 230000005611 electricity Effects 0.000 description 1
- 230000007717 exclusion Effects 0.000 description 1
- 230000007774 longterm Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/16—Discovering, processing access restriction or access information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W72/00—Local resource management
- H04W72/04—Wireless resource allocation
- H04W72/044—Wireless resource allocation based on the type of the allocated resource
- H04W72/0446—Resources in time domain, e.g. slots or frames
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W72/00—Local resource management
- H04W72/04—Wireless resource allocation
- H04W72/044—Wireless resource allocation based on the type of the allocated resource
- H04W72/0453—Resources in frequency domain, e.g. a carrier in FDMA
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W72/00—Local resource management
- H04W72/50—Allocation or scheduling criteria for wireless resources
- H04W72/51—Allocation or scheduling criteria for wireless resources based on terminal or device properties
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W74/00—Wireless channel access
- H04W74/08—Non-scheduled access, e.g. ALOHA
- H04W74/0833—Random access procedures, e.g. with 4-step access
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses an access control method, which comprises the following steps: acquiring an identifier of a wireless terminal accessed to a base station; grouping the wireless terminals according to the number of the maximum concurrent access terminals and the identification of the wireless terminals; in a first period, initiating a request for acquiring data to a wireless terminal in the group; receiving data sent by a wireless terminal in a competition mode, and judging whether the wireless terminal with data uploading failure exists or not; if the data transmission failure exists, grouping the wireless terminals with data transmission failure; in the second period, initiating a data acquisition request to all wireless terminals in a group according to the time slot and the frequency spectrum resource corresponding to each wireless terminal; and receiving data transmitted by the wireless terminal through the corresponding time slot and the spectrum resource. The access control method provided by the invention can improve the reliability of realizing the power wireless service and the utilization rate of wireless network resources, ensure the continuity of the service and ensure the reliable realization of the power service.
Description
Technical Field
The present invention relates to the field of communications technologies, and in particular, to an access control method.
Background
With the diversification of the communication demand of the smart grid, the application of a novel power wireless private network technology represented by a Long Term Evolution (LTE) technology in a power communication system is receiving more and more attention. The electric power wireless private network technology not only needs to guarantee the bandwidth and real-time reliability of electric power communication services, but also needs to have reliable and efficient support capability for mass services of the smart power grid. Therefore, the service access control performance of the power wireless private network is particularly important.
The existing access control mechanism mainly comprises a random competition access control class, a fixed time sequence distribution access control class and an on-demand distribution time sequence access control class. The random contention access control class is applicable to a case where traffic communication is performed discontinuously at a communication terminal, and when applied to continuous traffic, it causes traffic congestion. The fixed allocation time sequence access control class mainly allocates a fixed communication time sequence to the communication terminal, so that the communication terminal can utilize a channel to perform communication when service communication is desired, and the fixed allocation time sequence access control class is suitable for being applied to a service environment with continuous communication, such as voice communication service, video communication service and the like, but if the terminal has no information, the channel is in an idle state, and the spectrum resource of a wireless channel is wasted. The access control class of the time sequence is allocated according to the requirement, which is mainly characterized in that a terminal carries out communication by competing the use right of a channel when information is sent, the use right of the channel is transferred out after the communication is finished, and competition is carried out when the communication is needed next time, so that the access control class is suitable for the condition of communication state change.
In the actual scene of the power wireless private network, there are many situations, and the access performance is adversely affected by the LTE random access procedure. For example, after the power failure is recovered, all devices start to access the network after being electrified; and the metering terminal uploads the electricity consumption data at regular time. If the number of the access terminals is known, an optimal queuing access mode, that is, access control is allocated by using a fixed time sequence, can be preset, but in practical situations, the number of the access terminals is usually uncertain, and services with uncertain number can only complete access by using a random contention access control class.
Based on this, the inventor of the present invention finds that access is completed through random contention access control, and in an application scenario of a continuous communication service of a smart grid, massive concurrent service access may cause blocking, and further cause problems of service delay and the like.
The information disclosed in this background section is only for enhancement of understanding of the general background of the invention and should not be taken as an acknowledgement or any form of suggestion that this information forms the prior art already known to a person skilled in the art.
Disclosure of Invention
The invention aims to provide an access control method, so as to overcome the defect that massive concurrent service access can cause blockage and further cause service delay in the prior art.
In order to achieve the above object, the present invention provides an access control method, which obtains an identifier of a wireless terminal accessing a base station; grouping the wireless terminals according to the number of the maximum concurrent access terminals and the identification of the wireless terminals; initiating a data acquisition request to all wireless terminals in a group of wireless terminals in a first period; receiving data sent by the wireless terminal in a competition mode, and judging whether the wireless terminal with data uploading failure exists or not; if the wireless terminals with data uploading failure exist, grouping the wireless terminals with data uploading failure; in a second period, initiating a data acquisition request to all wireless terminals in a group of wireless terminal groups with data uploading failure according to the time slot and the frequency spectrum resource corresponding to each wireless terminal; and receiving data transmitted by the wireless terminal through a time slot and a frequency spectrum resource corresponding to the wireless terminal.
In a possible implementation manner, before the base station groups the wireless terminals according to the number of the maximum concurrent access terminals and the identifier of the wireless terminal, the method further includes: acquiring the service frame length of a wireless terminal accessed to a base station; and calculating the maximum number of the terminals accessed in parallel according to the maximum throughput of the base station and the service frame length of the wireless terminal accessed in the base station.
In a possible implementation manner, the calculating, according to the maximum throughput of the base station and the service frame length of the wireless terminal accessing the base station, the maximum number of concurrently accessing terminals includes: calculating the number of the maximum concurrent access terminals by using a first formula, wherein the first formula is as follows:
where C is the maximum throughput of the base station, MAX (L)i) The maximum traffic frame length of a wireless terminal accessing a base station.
In a possible implementation manner, the receiving data transmitted by the wireless terminal through a timeslot and a spectrum resource corresponding to the wireless terminal includes: receiving data sent by the wireless terminal through a time slot corresponding to the wireless terminal and a frequency spectrum resource, and judging whether a wireless terminal with data uploading failure again exists or not; if the wireless terminals with the data re-uploading failure exist, grouping the wireless terminals with the data re-uploading failure; in a second period, initiating a data acquisition request to all wireless terminals in a wireless terminal group with data re-uploading failure according to the time slot and the frequency spectrum resource corresponding to each wireless terminal; and repeating the steps until no wireless terminal with data uploading failure exists again.
In one possible implementation manner, before initiating a request for obtaining data to all wireless terminals in a group of wireless terminals in the first period, the method further includes: acquiring communication time delay of a wireless terminal accessed to a base station; and calculating a first period of the wireless terminal grouping according to the number of the wireless terminals in a group of the wireless terminal grouping and the communication time delay.
In one possible implementation manner, the calculating the first period of the wireless terminal packet according to the number of wireless terminals in a group of the wireless terminal packets and the communication delay includes: through a maleEquation two calculates the first period T of the group1The second formula includes:
T1=[1-(1-ρ)M+1]·MAX(Ti1);
where ρ is the collision blocking rate of concurrent services, MAX (T)i1) The maximum value of the communication time delay of the wireless terminals in a group of wireless terminal groups is defined, and M is the maximum number of terminals which are accessed in the base station in a concurrent mode.
In a possible implementation manner, before initiating a request for acquiring data to all wireless terminals in a group of wireless terminals in the wireless terminal group with failed data upload according to a time slot and a spectrum resource corresponding to each wireless terminal in the second period, the method further includes: and calculating the second period of the wireless terminal group with the data uploading failure according to the communication time delay of the wireless terminals in the wireless terminal group with the data uploading failure.
In a possible implementation manner, the calculating, according to communication delays of wireless terminals in a group of wireless terminal groups in which the data upload failure occurs, a second period of the wireless terminal group in which the data upload failure occurs includes: calculating the second period T of the wireless terminal group with data uploading failure through a formula III2And the third formula comprises:
T2=MAX(Ti2);
wherein, MAX (T)i2) And the maximum value of the communication time delay of the wireless terminal in the wireless terminal group with the data uploading failure is obtained.
Compared with the prior art, the invention has the following beneficial effects: in the access control method provided in this embodiment, by acquiring the identifier of the wireless terminal accessing the base station, the wireless terminals are grouped according to the number of the terminals accessed by the maximum concurrent access and the identifier of the wireless terminal; initiating a data acquisition request to all wireless terminals in a group of wireless terminals in a first period; receiving data sent by the wireless terminal in a competition mode, and judging whether the wireless terminal with data uploading failure exists or not; if the wireless terminals with data uploading failure exist, grouping the wireless terminals with data uploading failure; in a second period, initiating a data acquisition request to all wireless terminals in a group of wireless terminal groups with data uploading failure according to the time slot and the frequency spectrum resource corresponding to each wireless terminal; the data sent by the wireless terminal through the time slot corresponding to the wireless terminal and the frequency spectrum resource is received, so that the reliability of realizing the power wireless service and the utilization rate of the wireless network resource can be improved, the continuity of the service is ensured, the problems of blocking, delay, packet loss and the like of service transmission are avoided, and the reliable realization of the power service is ensured.
Further, the base station receives the data sent by the wireless terminal in the random competition mode, and then receives the data sent by the wireless terminal with the uploading failure through the corresponding time slot and the frequency spectrum resource, so that the complexity is reduced, the required response frame is reduced, and the success rate of copying is improved.
Drawings
Fig. 1 is a flowchart illustrating an access control method according to an embodiment of the present invention;
fig. 2 is a flowchart illustrating an access control method according to another embodiment of the present invention.
Detailed Description
The following detailed description of the present invention is provided in conjunction with the accompanying drawings, but it should be understood that the scope of the present invention is not limited to the specific embodiments.
Throughout the specification and claims, unless explicitly stated otherwise, the word "comprise", or variations such as "comprises" or "comprising", will be understood to imply the inclusion of a stated element or component but not the exclusion of any other element or component.
Example 1
Fig. 1 shows a flowchart of an access control method according to an embodiment of the present invention, and as shown in fig. 1, the method includes:
step S1, the identifier of the wireless terminal accessing the base station is acquired.
Specifically, the base station acquires the identities of all wireless terminals accessing the current base station.
And step S2, grouping the wireless terminals according to the maximum number of the concurrent access terminals and the identification of the wireless terminals.
Specifically, the grouping manner may be that the base station groups the wireless terminals with the largest number of concurrently-accessed terminals into one group, or may group the wireless terminals with the smaller number of concurrently-accessed terminals into one group. Further, the grouping may be performed in the order of the identifiers of the wireless terminals, or may be performed in the order of the service types, and the wireless terminals with the same service type may be grouped into the same group.
Step S3, in a first period, initiates a get data request to all wireless terminals in a group of wireless terminals.
Specifically, the base station initiates a data acquisition request to all wireless terminals in a group of wireless terminal groups in a first period in a broadcast manner.
And step S4, receiving the data sent by the wireless terminal in a contention mode, and determining whether there is a wireless terminal with a failed data upload.
And step S5, if there is a wireless terminal with failed data uploading, grouping the wireless terminals with failed data uploading.
Step S6, in the second period, according to the time slot and the spectrum resource corresponding to each wireless terminal, initiating a request for acquiring data to all wireless terminals in the wireless terminal group in which data upload fails.
Specifically, the base station allocates a time slot to each wireless terminal in the wireless terminal group with failed data uploading, and the wireless terminals report data in their respective time slots through corresponding spectrum resources.
Step S7, receiving data transmitted by the wireless terminal through the time slot and the spectrum resource corresponding to the wireless terminal.
Therefore, the access control method provided in this embodiment groups the wireless terminals according to the number of the maximum concurrently accessed terminals and the identifiers of the wireless terminals by acquiring the identifiers of the wireless terminals accessing the base station; initiating a data acquisition request to all wireless terminals in a group of wireless terminals in a first period; receiving data sent by the wireless terminal in a competition mode, and judging whether the wireless terminal with data uploading failure exists or not; if the wireless terminals with data uploading failure exist, grouping the wireless terminals with data uploading failure; in a second period, initiating a data acquisition request to all wireless terminals in a group of wireless terminal groups with data uploading failure according to the time slot and the frequency spectrum resource corresponding to each wireless terminal; the data sent by the wireless terminal through the time slot corresponding to the wireless terminal and the frequency spectrum resource is received, so that the reliability of realizing the power wireless service and the utilization rate of the wireless network resource can be improved, the continuity of the service is ensured, the problems of blocking, delay, packet loss and the like of service transmission are avoided, and the reliable realization of the power service is ensured.
Further, the base station receives the data sent by the wireless terminal in the random competition mode, and then receives the data sent by the wireless terminal with the uploading failure through the corresponding time slot and the frequency spectrum resource, so that the complexity is reduced, the required response frame is reduced, and the success rate of copying is improved.
Example 2
Fig. 2 is a flowchart illustrating an access control method according to another embodiment of the present invention, and the present embodiment further defines the steps in the first embodiment. As shown in fig. 2, before step S2, the present embodiment further includes:
step S201, a service frame length of a wireless terminal accessing a base station is obtained.
Step S202, according to the maximum throughput of the base station and the service frame length of the wireless terminal accessed to the base station, calculating the maximum number of terminals accessed concurrently.
Specifically, the number of the maximum concurrent access terminals may be calculated by a first formula, where the first formula is:
where C is the maximum throughput of the base station, LiTraffic frame length, MAX (L) for a wireless terminali) The maximum service frame length of the wireless terminal Node _ i for accessing the base station.
In a possible implementation manner, before step S3, the method further includes:
step S301, obtains the communication delay of the wireless terminal accessing the base station.
Step S302, calculating a first period of the wireless terminal group according to the number of wireless terminals in a group of the wireless terminal group and the communication delay.
Specifically, the first period T1 of the group may be calculated by formula two, which includes:
T1=[1-(1-ρ)M+1]·MAX(Ti1) (2)
where ρ is the collision blocking rate of concurrent services, MAX (T)i1) The maximum value of the communication time delay of the wireless terminals in a group of wireless terminal groups is defined, and M is the maximum number of terminals which are accessed in the base station in a concurrent mode. The collision blocking rate may be calculated by counting a ratio of collision times to total transmission times in data transmitted by each node in a period of time.
In a possible implementation manner, before step S6, the method further includes:
step S601, calculating a second period of the wireless terminal group with the data upload failure according to the communication delay of the wireless terminal in the wireless terminal group with the data upload failure.
Specifically, the second period T of the wireless terminal group with data upload failure may be calculated by formula three2And the third formula comprises:
T2=MAX(Ti2) (3)
wherein, MAX (T)i2) And the maximum value of the communication time delay of the wireless terminal in the wireless terminal group with the data uploading failure is obtained.
In this embodiment, in step S7, the receiving data sent by the wireless terminal through the time slot and the spectrum resource corresponding to the wireless terminal may specifically include:
step S71, receiving data sent by the wireless terminal through the time slot and the spectrum resource corresponding to the wireless terminal, and determining whether there is a wireless terminal that fails to upload data again.
In step S72, if there is a wireless terminal that fails in data re-upload, the wireless terminals that failed in data re-upload are grouped.
Step S73, in the second period, according to the time slot and the spectrum resource corresponding to each wireless terminal, a request for obtaining data is initiated to all wireless terminals in a group of wireless terminals that have failed in data upload again.
And step S74, repeating the above steps until no wireless terminal with data uploading failure exists.
Specifically, the base station may be further configured to, if there is a wireless terminal with a failed data upload after the base station receives the data sent by the wireless terminal through the time slot and the spectrum resource corresponding to the wireless terminal for the third time, classify the terminal as a "failure" state.
Therefore, in this embodiment, the data sent by the wireless terminal through the time slot and the spectrum resource corresponding to the wireless terminal is received, and it is determined whether there is a wireless terminal that fails to upload the data again. And if the wireless terminals with the data re-uploading failure exist, grouping the wireless terminals with the data re-uploading failure. And in the second period, initiating a data acquisition request to all wireless terminals in a wireless terminal group with data re-uploading failure according to the time slot and the frequency spectrum resource corresponding to each wireless terminal. The steps are repeated until no wireless terminal with data uploading failure exists again, so that the reading success rate of the terminal can be improved, and the reliability of realizing the electric power wireless service and the utilization rate of wireless network resources are further improved.
The foregoing descriptions of specific exemplary embodiments of the present invention have been presented for purposes of illustration and description. It is not intended to limit the invention to the precise form disclosed, and obviously many modifications and variations are possible in light of the above teaching. The exemplary embodiments were chosen and described in order to explain certain principles of the invention and its practical application to enable one skilled in the art to make and use various exemplary embodiments of the invention and various alternatives and modifications as are suited to the particular use contemplated. It is intended that the scope of the invention be defined by the claims and their equivalents.
Claims (6)
1. An access control method, characterized in that the access control method comprises:
acquiring an identifier of a wireless terminal accessed to a base station;
grouping the wireless terminals according to the number of the maximum concurrent access terminals and the identification of the wireless terminals;
initiating a data acquisition request to all wireless terminals in a group of wireless terminals in a first period;
receiving data sent by the wireless terminal in a competition mode, and judging whether the wireless terminal with data uploading failure exists or not;
if the wireless terminals with data uploading failure exist, grouping the wireless terminals with data uploading failure;
in a second period, initiating a data acquisition request to all wireless terminals in a group of wireless terminal groups with data uploading failure according to the time slot and the frequency spectrum resource corresponding to each wireless terminal; and
receiving data transmitted by the wireless terminal through a time slot and a frequency spectrum resource corresponding to the wireless terminal,
before initiating a request for acquiring data to all wireless terminals in a group of wireless terminals in the first period, the method further includes:
acquiring communication time delay of a wireless terminal accessed to a base station; and
calculating a first period of a group of wireless terminals according to the number of wireless terminals in the group of wireless terminals and communication delay,
wherein the calculating the first period of the wireless terminal group according to the number of wireless terminals in the group of wireless terminal groups and the communication delay comprises:
calculating the first period T of the group by formula two1The second formula includes:
T1=[1-(1-ρ)M+1]·MAX(Ti1);
where ρ is the collision blocking rate of concurrent services, MAX (T)i1) The maximum value of the communication time delay of the wireless terminals in a group of wireless terminal groups is defined, and M is the maximum number of terminals which are accessed in the base station in a concurrent mode.
2. The access control method according to claim 1, wherein before the base station groups the wireless terminals according to the number of the terminals with the largest concurrent access and the identities of the wireless terminals, the method further comprises:
acquiring the service frame length of a wireless terminal accessed to a base station; and
and calculating the maximum number of the terminals accessed in parallel according to the maximum throughput of the base station and the service frame length of the wireless terminal accessed in the base station.
3. The access control method of claim 2, wherein the calculating the maximum number of concurrently accessed terminals according to the maximum throughput of the base station and the traffic frame length of the wireless terminal accessing the base station comprises:
calculating the number of the maximum concurrent access terminals by using a first formula, wherein the first formula is as follows:
where C is the maximum throughput of the base station, MAX (L)i) The maximum traffic frame length of a wireless terminal accessing a base station.
4. The access control method according to claim 1, wherein the receiving data transmitted by the wireless terminal through a timeslot and a spectrum resource corresponding to the wireless terminal comprises:
receiving data sent by the wireless terminal through a time slot corresponding to the wireless terminal and a frequency spectrum resource, and judging whether a wireless terminal with data uploading failure again exists or not;
if the wireless terminals with the data re-uploading failure exist, grouping the wireless terminals with the data re-uploading failure;
in a second period, initiating a data acquisition request to all wireless terminals in a wireless terminal group with data re-uploading failure according to the time slot and the frequency spectrum resource corresponding to each wireless terminal; and
and repeating the steps until no wireless terminal with data uploading failure exists again.
5. The access control method according to claim 1, wherein before initiating a request for acquiring data to all wireless terminals in a group of wireless terminals in the wireless terminal group with failed data upload according to a timeslot and spectrum resource corresponding to each wireless terminal in the second period, the method further comprises:
and calculating the second period of the wireless terminal group with the data uploading failure according to the communication time delay of the wireless terminals in the wireless terminal group with the data uploading failure.
6. The access control method of claim 5, wherein the calculating the second period of the wireless terminal group with the data upload failure according to the communication delay of the wireless terminal in the group of wireless terminal groups with the data upload failure comprises: calculating the second period T of the wireless terminal group with data uploading failure through a formula III2And the third formula comprises:
T2=MAX(Ti2);
wherein, MAX (T)i2) And the maximum value of the communication time delay of the wireless terminal in the wireless terminal group with the data uploading failure is obtained.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810244323.3A CN108495354B (en) | 2018-03-23 | 2018-03-23 | Access control method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810244323.3A CN108495354B (en) | 2018-03-23 | 2018-03-23 | Access control method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108495354A CN108495354A (en) | 2018-09-04 |
CN108495354B true CN108495354B (en) | 2020-09-08 |
Family
ID=63319704
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810244323.3A Active CN108495354B (en) | 2018-03-23 | 2018-03-23 | Access control method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108495354B (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102158981A (en) * | 2010-02-11 | 2011-08-17 | 中兴通讯股份有限公司 | Contention-based uplink data transmission method and system |
CN102638866A (en) * | 2012-04-16 | 2012-08-15 | 东南大学 | Mobile communication network access method based on M2M (machine to machine) service characteristic |
CN106921474A (en) * | 2015-12-24 | 2017-07-04 | 华为技术有限公司 | The sending method of uplink retransmission data, apparatus and system |
CN107105474A (en) * | 2017-03-20 | 2017-08-29 | 南京邮电大学 | A kind of accidental access method limited in arrowband Internet of Things based on dynamic access |
CN107222827A (en) * | 2016-03-21 | 2017-09-29 | 中国移动通信有限公司研究院 | Stochastic accessing collocation method and device, at any time cut-in method, base station and UE |
CN107370526A (en) * | 2017-09-12 | 2017-11-21 | 中国联合网络通信集团有限公司 | Data transmission method and terminal device |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104581967B (en) * | 2013-10-11 | 2018-12-28 | 中国移动通信集团公司 | Contention access resource adjusting method, contention access request sending method and device |
GB2519975A (en) * | 2013-11-01 | 2015-05-13 | Nec Corp | Communication system |
CN103763784B (en) * | 2014-01-22 | 2017-07-18 | 东南大学 | The up-link access method of User Priority lead code distribution is distinguished for TD LTE/TD LTE A systems |
CN106060933B (en) * | 2015-04-08 | 2019-08-27 | 财团法人资讯工业策进会 | Base station, user's device, transfer control method and data transmission method |
WO2016175496A1 (en) * | 2015-04-28 | 2016-11-03 | Lg Electronics Inc. | Method for receiving a mac ce for contention-based pusch in a wireless communication system and a device therefor |
-
2018
- 2018-03-23 CN CN201810244323.3A patent/CN108495354B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102158981A (en) * | 2010-02-11 | 2011-08-17 | 中兴通讯股份有限公司 | Contention-based uplink data transmission method and system |
CN102638866A (en) * | 2012-04-16 | 2012-08-15 | 东南大学 | Mobile communication network access method based on M2M (machine to machine) service characteristic |
CN106921474A (en) * | 2015-12-24 | 2017-07-04 | 华为技术有限公司 | The sending method of uplink retransmission data, apparatus and system |
CN107222827A (en) * | 2016-03-21 | 2017-09-29 | 中国移动通信有限公司研究院 | Stochastic accessing collocation method and device, at any time cut-in method, base station and UE |
CN107105474A (en) * | 2017-03-20 | 2017-08-29 | 南京邮电大学 | A kind of accidental access method limited in arrowband Internet of Things based on dynamic access |
CN107370526A (en) * | 2017-09-12 | 2017-11-21 | 中国联合网络通信集团有限公司 | Data transmission method and terminal device |
Non-Patent Citations (1)
Title |
---|
基于电力无线专网的用电信息采集业务接入控制方法;王祥;《产品与技术自动化系统》;20180210;第83-84页 * |
Also Published As
Publication number | Publication date |
---|---|
CN108495354A (en) | 2018-09-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102291845B (en) | Accidental access method and system | |
CN102685913B (en) | Method for improving uplink transmission in a wireless communication system | |
US9036652B2 (en) | Communication transmission system | |
CN106550480B (en) | Random access method, device and system | |
EP4089549A1 (en) | Resource scheduling method and apparatus, and readable storage medium | |
CN111294775B (en) | Resource allocation method based on H2H dynamic characteristics in large-scale MTC and H2H coexistence scene | |
US8873537B2 (en) | Synchronization method and system of control sequence numbers | |
WO2014139413A1 (en) | Method and device for implementing non-centralized clustering mechanism | |
CN111556528A (en) | Channel state judgment method based on frequency hopping time hopping pattern under self-organizing network | |
US20140254456A1 (en) | Method for counting terminals for multicast/broadcast service | |
CN103814596A (en) | Method, device and system for data transmission | |
WO2017070838A1 (en) | Resource scheduling method, base station, scheduler, program server and system | |
CN105553540A (en) | Satellite and ground data processing method and device | |
CN102149163A (en) | System and method for reporting random access information in carrier polymerization | |
CN108495354B (en) | Access control method | |
CN111602443A (en) | Data transmission method and device and computer storage medium | |
Huq et al. | On the benefits of clustered capillary networks for congestion control in machine type communications over LTE | |
CN111132223A (en) | Data packet transmission method and communication equipment | |
CN112929960B (en) | Method for supporting IPv6 and improving wireless sensor network certainty | |
Fawal et al. | CTMC modeling for M2M/H2H coexistence in a NB-IoT adaptive eNodeB | |
CN107371218B (en) | Method and device for updating and receiving broadcast system information | |
Singh et al. | Mechanizing wireless LAN (WLAN) using compression techniques | |
CN103384395A (en) | Uplink bandwidth configuring method and device | |
WO2024093508A1 (en) | Communication method and apparatus | |
WO2024140405A1 (en) | Random access preamble sequence generation method, device and apparatus, and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |