CN108495354B - Access control method - Google Patents

Access control method Download PDF

Info

Publication number
CN108495354B
CN108495354B CN201810244323.3A CN201810244323A CN108495354B CN 108495354 B CN108495354 B CN 108495354B CN 201810244323 A CN201810244323 A CN 201810244323A CN 108495354 B CN108495354 B CN 108495354B
Authority
CN
China
Prior art keywords
wireless terminal
wireless
terminals
data
group
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810244323.3A
Other languages
Chinese (zh)
Other versions
CN108495354A (en
Inventor
白晖峰
王立城
霍超
苏斓
侯莹莹
刘全春
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Information and Telecommunication Co Ltd
Beijing Smartchip Microelectronics Technology Co Ltd
Original Assignee
State Grid Information and Telecommunication Co Ltd
Beijing Smartchip Microelectronics Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Information and Telecommunication Co Ltd, Beijing Smartchip Microelectronics Technology Co Ltd filed Critical State Grid Information and Telecommunication Co Ltd
Priority to CN201810244323.3A priority Critical patent/CN108495354B/en
Publication of CN108495354A publication Critical patent/CN108495354A/en
Application granted granted Critical
Publication of CN108495354B publication Critical patent/CN108495354B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/04Wireless resource allocation
    • H04W72/044Wireless resource allocation based on the type of the allocated resource
    • H04W72/0446Resources in time domain, e.g. slots or frames
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/04Wireless resource allocation
    • H04W72/044Wireless resource allocation based on the type of the allocated resource
    • H04W72/0453Resources in frequency domain, e.g. a carrier in FDMA
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/50Allocation or scheduling criteria for wireless resources
    • H04W72/51Allocation or scheduling criteria for wireless resources based on terminal or device properties
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA
    • H04W74/0833Random access procedures, e.g. with 4-step access

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses an access control method, which comprises the following steps: acquiring an identifier of a wireless terminal accessed to a base station; grouping the wireless terminals according to the number of the maximum concurrent access terminals and the identification of the wireless terminals; in a first period, initiating a request for acquiring data to a wireless terminal in the group; receiving data sent by a wireless terminal in a competition mode, and judging whether the wireless terminal with data uploading failure exists or not; if the data transmission failure exists, grouping the wireless terminals with data transmission failure; in the second period, initiating a data acquisition request to all wireless terminals in a group according to the time slot and the frequency spectrum resource corresponding to each wireless terminal; and receiving data transmitted by the wireless terminal through the corresponding time slot and the spectrum resource. The access control method provided by the invention can improve the reliability of realizing the power wireless service and the utilization rate of wireless network resources, ensure the continuity of the service and ensure the reliable realization of the power service.

Description

Access control method
Technical Field
The present invention relates to the field of communications technologies, and in particular, to an access control method.
Background
With the diversification of the communication demand of the smart grid, the application of a novel power wireless private network technology represented by a Long Term Evolution (LTE) technology in a power communication system is receiving more and more attention. The electric power wireless private network technology not only needs to guarantee the bandwidth and real-time reliability of electric power communication services, but also needs to have reliable and efficient support capability for mass services of the smart power grid. Therefore, the service access control performance of the power wireless private network is particularly important.
The existing access control mechanism mainly comprises a random competition access control class, a fixed time sequence distribution access control class and an on-demand distribution time sequence access control class. The random contention access control class is applicable to a case where traffic communication is performed discontinuously at a communication terminal, and when applied to continuous traffic, it causes traffic congestion. The fixed allocation time sequence access control class mainly allocates a fixed communication time sequence to the communication terminal, so that the communication terminal can utilize a channel to perform communication when service communication is desired, and the fixed allocation time sequence access control class is suitable for being applied to a service environment with continuous communication, such as voice communication service, video communication service and the like, but if the terminal has no information, the channel is in an idle state, and the spectrum resource of a wireless channel is wasted. The access control class of the time sequence is allocated according to the requirement, which is mainly characterized in that a terminal carries out communication by competing the use right of a channel when information is sent, the use right of the channel is transferred out after the communication is finished, and competition is carried out when the communication is needed next time, so that the access control class is suitable for the condition of communication state change.
In the actual scene of the power wireless private network, there are many situations, and the access performance is adversely affected by the LTE random access procedure. For example, after the power failure is recovered, all devices start to access the network after being electrified; and the metering terminal uploads the electricity consumption data at regular time. If the number of the access terminals is known, an optimal queuing access mode, that is, access control is allocated by using a fixed time sequence, can be preset, but in practical situations, the number of the access terminals is usually uncertain, and services with uncertain number can only complete access by using a random contention access control class.
Based on this, the inventor of the present invention finds that access is completed through random contention access control, and in an application scenario of a continuous communication service of a smart grid, massive concurrent service access may cause blocking, and further cause problems of service delay and the like.
The information disclosed in this background section is only for enhancement of understanding of the general background of the invention and should not be taken as an acknowledgement or any form of suggestion that this information forms the prior art already known to a person skilled in the art.
Disclosure of Invention
The invention aims to provide an access control method, so as to overcome the defect that massive concurrent service access can cause blockage and further cause service delay in the prior art.
In order to achieve the above object, the present invention provides an access control method, which obtains an identifier of a wireless terminal accessing a base station; grouping the wireless terminals according to the number of the maximum concurrent access terminals and the identification of the wireless terminals; initiating a data acquisition request to all wireless terminals in a group of wireless terminals in a first period; receiving data sent by the wireless terminal in a competition mode, and judging whether the wireless terminal with data uploading failure exists or not; if the wireless terminals with data uploading failure exist, grouping the wireless terminals with data uploading failure; in a second period, initiating a data acquisition request to all wireless terminals in a group of wireless terminal groups with data uploading failure according to the time slot and the frequency spectrum resource corresponding to each wireless terminal; and receiving data transmitted by the wireless terminal through a time slot and a frequency spectrum resource corresponding to the wireless terminal.
In a possible implementation manner, before the base station groups the wireless terminals according to the number of the maximum concurrent access terminals and the identifier of the wireless terminal, the method further includes: acquiring the service frame length of a wireless terminal accessed to a base station; and calculating the maximum number of the terminals accessed in parallel according to the maximum throughput of the base station and the service frame length of the wireless terminal accessed in the base station.
In a possible implementation manner, the calculating, according to the maximum throughput of the base station and the service frame length of the wireless terminal accessing the base station, the maximum number of concurrently accessing terminals includes: calculating the number of the maximum concurrent access terminals by using a first formula, wherein the first formula is as follows:
Figure GDA0002569327800000031
where C is the maximum throughput of the base station, MAX (L)i) The maximum traffic frame length of a wireless terminal accessing a base station.
In a possible implementation manner, the receiving data transmitted by the wireless terminal through a timeslot and a spectrum resource corresponding to the wireless terminal includes: receiving data sent by the wireless terminal through a time slot corresponding to the wireless terminal and a frequency spectrum resource, and judging whether a wireless terminal with data uploading failure again exists or not; if the wireless terminals with the data re-uploading failure exist, grouping the wireless terminals with the data re-uploading failure; in a second period, initiating a data acquisition request to all wireless terminals in a wireless terminal group with data re-uploading failure according to the time slot and the frequency spectrum resource corresponding to each wireless terminal; and repeating the steps until no wireless terminal with data uploading failure exists again.
In one possible implementation manner, before initiating a request for obtaining data to all wireless terminals in a group of wireless terminals in the first period, the method further includes: acquiring communication time delay of a wireless terminal accessed to a base station; and calculating a first period of the wireless terminal grouping according to the number of the wireless terminals in a group of the wireless terminal grouping and the communication time delay.
In one possible implementation manner, the calculating the first period of the wireless terminal packet according to the number of wireless terminals in a group of the wireless terminal packets and the communication delay includes: through a maleEquation two calculates the first period T of the group1The second formula includes:
T1=[1-(1-ρ)M+1]·MAX(Ti1);
where ρ is the collision blocking rate of concurrent services, MAX (T)i1) The maximum value of the communication time delay of the wireless terminals in a group of wireless terminal groups is defined, and M is the maximum number of terminals which are accessed in the base station in a concurrent mode.
In a possible implementation manner, before initiating a request for acquiring data to all wireless terminals in a group of wireless terminals in the wireless terminal group with failed data upload according to a time slot and a spectrum resource corresponding to each wireless terminal in the second period, the method further includes: and calculating the second period of the wireless terminal group with the data uploading failure according to the communication time delay of the wireless terminals in the wireless terminal group with the data uploading failure.
In a possible implementation manner, the calculating, according to communication delays of wireless terminals in a group of wireless terminal groups in which the data upload failure occurs, a second period of the wireless terminal group in which the data upload failure occurs includes: calculating the second period T of the wireless terminal group with data uploading failure through a formula III2And the third formula comprises:
T2=MAX(Ti2);
wherein, MAX (T)i2) And the maximum value of the communication time delay of the wireless terminal in the wireless terminal group with the data uploading failure is obtained.
Compared with the prior art, the invention has the following beneficial effects: in the access control method provided in this embodiment, by acquiring the identifier of the wireless terminal accessing the base station, the wireless terminals are grouped according to the number of the terminals accessed by the maximum concurrent access and the identifier of the wireless terminal; initiating a data acquisition request to all wireless terminals in a group of wireless terminals in a first period; receiving data sent by the wireless terminal in a competition mode, and judging whether the wireless terminal with data uploading failure exists or not; if the wireless terminals with data uploading failure exist, grouping the wireless terminals with data uploading failure; in a second period, initiating a data acquisition request to all wireless terminals in a group of wireless terminal groups with data uploading failure according to the time slot and the frequency spectrum resource corresponding to each wireless terminal; the data sent by the wireless terminal through the time slot corresponding to the wireless terminal and the frequency spectrum resource is received, so that the reliability of realizing the power wireless service and the utilization rate of the wireless network resource can be improved, the continuity of the service is ensured, the problems of blocking, delay, packet loss and the like of service transmission are avoided, and the reliable realization of the power service is ensured.
Further, the base station receives the data sent by the wireless terminal in the random competition mode, and then receives the data sent by the wireless terminal with the uploading failure through the corresponding time slot and the frequency spectrum resource, so that the complexity is reduced, the required response frame is reduced, and the success rate of copying is improved.
Drawings
Fig. 1 is a flowchart illustrating an access control method according to an embodiment of the present invention;
fig. 2 is a flowchart illustrating an access control method according to another embodiment of the present invention.
Detailed Description
The following detailed description of the present invention is provided in conjunction with the accompanying drawings, but it should be understood that the scope of the present invention is not limited to the specific embodiments.
Throughout the specification and claims, unless explicitly stated otherwise, the word "comprise", or variations such as "comprises" or "comprising", will be understood to imply the inclusion of a stated element or component but not the exclusion of any other element or component.
Example 1
Fig. 1 shows a flowchart of an access control method according to an embodiment of the present invention, and as shown in fig. 1, the method includes:
step S1, the identifier of the wireless terminal accessing the base station is acquired.
Specifically, the base station acquires the identities of all wireless terminals accessing the current base station.
And step S2, grouping the wireless terminals according to the maximum number of the concurrent access terminals and the identification of the wireless terminals.
Specifically, the grouping manner may be that the base station groups the wireless terminals with the largest number of concurrently-accessed terminals into one group, or may group the wireless terminals with the smaller number of concurrently-accessed terminals into one group. Further, the grouping may be performed in the order of the identifiers of the wireless terminals, or may be performed in the order of the service types, and the wireless terminals with the same service type may be grouped into the same group.
Step S3, in a first period, initiates a get data request to all wireless terminals in a group of wireless terminals.
Specifically, the base station initiates a data acquisition request to all wireless terminals in a group of wireless terminal groups in a first period in a broadcast manner.
And step S4, receiving the data sent by the wireless terminal in a contention mode, and determining whether there is a wireless terminal with a failed data upload.
And step S5, if there is a wireless terminal with failed data uploading, grouping the wireless terminals with failed data uploading.
Step S6, in the second period, according to the time slot and the spectrum resource corresponding to each wireless terminal, initiating a request for acquiring data to all wireless terminals in the wireless terminal group in which data upload fails.
Specifically, the base station allocates a time slot to each wireless terminal in the wireless terminal group with failed data uploading, and the wireless terminals report data in their respective time slots through corresponding spectrum resources.
Step S7, receiving data transmitted by the wireless terminal through the time slot and the spectrum resource corresponding to the wireless terminal.
Therefore, the access control method provided in this embodiment groups the wireless terminals according to the number of the maximum concurrently accessed terminals and the identifiers of the wireless terminals by acquiring the identifiers of the wireless terminals accessing the base station; initiating a data acquisition request to all wireless terminals in a group of wireless terminals in a first period; receiving data sent by the wireless terminal in a competition mode, and judging whether the wireless terminal with data uploading failure exists or not; if the wireless terminals with data uploading failure exist, grouping the wireless terminals with data uploading failure; in a second period, initiating a data acquisition request to all wireless terminals in a group of wireless terminal groups with data uploading failure according to the time slot and the frequency spectrum resource corresponding to each wireless terminal; the data sent by the wireless terminal through the time slot corresponding to the wireless terminal and the frequency spectrum resource is received, so that the reliability of realizing the power wireless service and the utilization rate of the wireless network resource can be improved, the continuity of the service is ensured, the problems of blocking, delay, packet loss and the like of service transmission are avoided, and the reliable realization of the power service is ensured.
Further, the base station receives the data sent by the wireless terminal in the random competition mode, and then receives the data sent by the wireless terminal with the uploading failure through the corresponding time slot and the frequency spectrum resource, so that the complexity is reduced, the required response frame is reduced, and the success rate of copying is improved.
Example 2
Fig. 2 is a flowchart illustrating an access control method according to another embodiment of the present invention, and the present embodiment further defines the steps in the first embodiment. As shown in fig. 2, before step S2, the present embodiment further includes:
step S201, a service frame length of a wireless terminal accessing a base station is obtained.
Step S202, according to the maximum throughput of the base station and the service frame length of the wireless terminal accessed to the base station, calculating the maximum number of terminals accessed concurrently.
Specifically, the number of the maximum concurrent access terminals may be calculated by a first formula, where the first formula is:
Figure GDA0002569327800000071
where C is the maximum throughput of the base station, LiTraffic frame length, MAX (L) for a wireless terminali) The maximum service frame length of the wireless terminal Node _ i for accessing the base station.
In a possible implementation manner, before step S3, the method further includes:
step S301, obtains the communication delay of the wireless terminal accessing the base station.
Step S302, calculating a first period of the wireless terminal group according to the number of wireless terminals in a group of the wireless terminal group and the communication delay.
Specifically, the first period T1 of the group may be calculated by formula two, which includes:
T1=[1-(1-ρ)M+1]·MAX(Ti1) (2)
where ρ is the collision blocking rate of concurrent services, MAX (T)i1) The maximum value of the communication time delay of the wireless terminals in a group of wireless terminal groups is defined, and M is the maximum number of terminals which are accessed in the base station in a concurrent mode. The collision blocking rate may be calculated by counting a ratio of collision times to total transmission times in data transmitted by each node in a period of time.
In a possible implementation manner, before step S6, the method further includes:
step S601, calculating a second period of the wireless terminal group with the data upload failure according to the communication delay of the wireless terminal in the wireless terminal group with the data upload failure.
Specifically, the second period T of the wireless terminal group with data upload failure may be calculated by formula three2And the third formula comprises:
T2=MAX(Ti2) (3)
wherein, MAX (T)i2) And the maximum value of the communication time delay of the wireless terminal in the wireless terminal group with the data uploading failure is obtained.
In this embodiment, in step S7, the receiving data sent by the wireless terminal through the time slot and the spectrum resource corresponding to the wireless terminal may specifically include:
step S71, receiving data sent by the wireless terminal through the time slot and the spectrum resource corresponding to the wireless terminal, and determining whether there is a wireless terminal that fails to upload data again.
In step S72, if there is a wireless terminal that fails in data re-upload, the wireless terminals that failed in data re-upload are grouped.
Step S73, in the second period, according to the time slot and the spectrum resource corresponding to each wireless terminal, a request for obtaining data is initiated to all wireless terminals in a group of wireless terminals that have failed in data upload again.
And step S74, repeating the above steps until no wireless terminal with data uploading failure exists.
Specifically, the base station may be further configured to, if there is a wireless terminal with a failed data upload after the base station receives the data sent by the wireless terminal through the time slot and the spectrum resource corresponding to the wireless terminal for the third time, classify the terminal as a "failure" state.
Therefore, in this embodiment, the data sent by the wireless terminal through the time slot and the spectrum resource corresponding to the wireless terminal is received, and it is determined whether there is a wireless terminal that fails to upload the data again. And if the wireless terminals with the data re-uploading failure exist, grouping the wireless terminals with the data re-uploading failure. And in the second period, initiating a data acquisition request to all wireless terminals in a wireless terminal group with data re-uploading failure according to the time slot and the frequency spectrum resource corresponding to each wireless terminal. The steps are repeated until no wireless terminal with data uploading failure exists again, so that the reading success rate of the terminal can be improved, and the reliability of realizing the electric power wireless service and the utilization rate of wireless network resources are further improved.
The foregoing descriptions of specific exemplary embodiments of the present invention have been presented for purposes of illustration and description. It is not intended to limit the invention to the precise form disclosed, and obviously many modifications and variations are possible in light of the above teaching. The exemplary embodiments were chosen and described in order to explain certain principles of the invention and its practical application to enable one skilled in the art to make and use various exemplary embodiments of the invention and various alternatives and modifications as are suited to the particular use contemplated. It is intended that the scope of the invention be defined by the claims and their equivalents.

Claims (6)

1. An access control method, characterized in that the access control method comprises:
acquiring an identifier of a wireless terminal accessed to a base station;
grouping the wireless terminals according to the number of the maximum concurrent access terminals and the identification of the wireless terminals;
initiating a data acquisition request to all wireless terminals in a group of wireless terminals in a first period;
receiving data sent by the wireless terminal in a competition mode, and judging whether the wireless terminal with data uploading failure exists or not;
if the wireless terminals with data uploading failure exist, grouping the wireless terminals with data uploading failure;
in a second period, initiating a data acquisition request to all wireless terminals in a group of wireless terminal groups with data uploading failure according to the time slot and the frequency spectrum resource corresponding to each wireless terminal; and
receiving data transmitted by the wireless terminal through a time slot and a frequency spectrum resource corresponding to the wireless terminal,
before initiating a request for acquiring data to all wireless terminals in a group of wireless terminals in the first period, the method further includes:
acquiring communication time delay of a wireless terminal accessed to a base station; and
calculating a first period of a group of wireless terminals according to the number of wireless terminals in the group of wireless terminals and communication delay,
wherein the calculating the first period of the wireless terminal group according to the number of wireless terminals in the group of wireless terminal groups and the communication delay comprises:
calculating the first period T of the group by formula two1The second formula includes:
T1=[1-(1-ρ)M+1]·MAX(Ti1);
where ρ is the collision blocking rate of concurrent services, MAX (T)i1) The maximum value of the communication time delay of the wireless terminals in a group of wireless terminal groups is defined, and M is the maximum number of terminals which are accessed in the base station in a concurrent mode.
2. The access control method according to claim 1, wherein before the base station groups the wireless terminals according to the number of the terminals with the largest concurrent access and the identities of the wireless terminals, the method further comprises:
acquiring the service frame length of a wireless terminal accessed to a base station; and
and calculating the maximum number of the terminals accessed in parallel according to the maximum throughput of the base station and the service frame length of the wireless terminal accessed in the base station.
3. The access control method of claim 2, wherein the calculating the maximum number of concurrently accessed terminals according to the maximum throughput of the base station and the traffic frame length of the wireless terminal accessing the base station comprises:
calculating the number of the maximum concurrent access terminals by using a first formula, wherein the first formula is as follows:
Figure FDA0002569327790000021
where C is the maximum throughput of the base station, MAX (L)i) The maximum traffic frame length of a wireless terminal accessing a base station.
4. The access control method according to claim 1, wherein the receiving data transmitted by the wireless terminal through a timeslot and a spectrum resource corresponding to the wireless terminal comprises:
receiving data sent by the wireless terminal through a time slot corresponding to the wireless terminal and a frequency spectrum resource, and judging whether a wireless terminal with data uploading failure again exists or not;
if the wireless terminals with the data re-uploading failure exist, grouping the wireless terminals with the data re-uploading failure;
in a second period, initiating a data acquisition request to all wireless terminals in a wireless terminal group with data re-uploading failure according to the time slot and the frequency spectrum resource corresponding to each wireless terminal; and
and repeating the steps until no wireless terminal with data uploading failure exists again.
5. The access control method according to claim 1, wherein before initiating a request for acquiring data to all wireless terminals in a group of wireless terminals in the wireless terminal group with failed data upload according to a timeslot and spectrum resource corresponding to each wireless terminal in the second period, the method further comprises:
and calculating the second period of the wireless terminal group with the data uploading failure according to the communication time delay of the wireless terminals in the wireless terminal group with the data uploading failure.
6. The access control method of claim 5, wherein the calculating the second period of the wireless terminal group with the data upload failure according to the communication delay of the wireless terminal in the group of wireless terminal groups with the data upload failure comprises: calculating the second period T of the wireless terminal group with data uploading failure through a formula III2And the third formula comprises:
T2=MAX(Ti2);
wherein, MAX (T)i2) And the maximum value of the communication time delay of the wireless terminal in the wireless terminal group with the data uploading failure is obtained.
CN201810244323.3A 2018-03-23 2018-03-23 Access control method Active CN108495354B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810244323.3A CN108495354B (en) 2018-03-23 2018-03-23 Access control method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810244323.3A CN108495354B (en) 2018-03-23 2018-03-23 Access control method

Publications (2)

Publication Number Publication Date
CN108495354A CN108495354A (en) 2018-09-04
CN108495354B true CN108495354B (en) 2020-09-08

Family

ID=63319704

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810244323.3A Active CN108495354B (en) 2018-03-23 2018-03-23 Access control method

Country Status (1)

Country Link
CN (1) CN108495354B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102158981A (en) * 2010-02-11 2011-08-17 中兴通讯股份有限公司 Contention-based uplink data transmission method and system
CN102638866A (en) * 2012-04-16 2012-08-15 东南大学 Mobile communication network access method based on M2M (machine to machine) service characteristic
CN106921474A (en) * 2015-12-24 2017-07-04 华为技术有限公司 The sending method of uplink retransmission data, apparatus and system
CN107105474A (en) * 2017-03-20 2017-08-29 南京邮电大学 A kind of accidental access method limited in arrowband Internet of Things based on dynamic access
CN107222827A (en) * 2016-03-21 2017-09-29 中国移动通信有限公司研究院 Stochastic accessing collocation method and device, at any time cut-in method, base station and UE
CN107370526A (en) * 2017-09-12 2017-11-21 中国联合网络通信集团有限公司 Data transmission method and terminal device

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104581967B (en) * 2013-10-11 2018-12-28 中国移动通信集团公司 Contention access resource adjusting method, contention access request sending method and device
GB2519975A (en) * 2013-11-01 2015-05-13 Nec Corp Communication system
CN103763784B (en) * 2014-01-22 2017-07-18 东南大学 The up-link access method of User Priority lead code distribution is distinguished for TD LTE/TD LTE A systems
CN106060933B (en) * 2015-04-08 2019-08-27 财团法人资讯工业策进会 Base station, user's device, transfer control method and data transmission method
WO2016175496A1 (en) * 2015-04-28 2016-11-03 Lg Electronics Inc. Method for receiving a mac ce for contention-based pusch in a wireless communication system and a device therefor

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102158981A (en) * 2010-02-11 2011-08-17 中兴通讯股份有限公司 Contention-based uplink data transmission method and system
CN102638866A (en) * 2012-04-16 2012-08-15 东南大学 Mobile communication network access method based on M2M (machine to machine) service characteristic
CN106921474A (en) * 2015-12-24 2017-07-04 华为技术有限公司 The sending method of uplink retransmission data, apparatus and system
CN107222827A (en) * 2016-03-21 2017-09-29 中国移动通信有限公司研究院 Stochastic accessing collocation method and device, at any time cut-in method, base station and UE
CN107105474A (en) * 2017-03-20 2017-08-29 南京邮电大学 A kind of accidental access method limited in arrowband Internet of Things based on dynamic access
CN107370526A (en) * 2017-09-12 2017-11-21 中国联合网络通信集团有限公司 Data transmission method and terminal device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于电力无线专网的用电信息采集业务接入控制方法;王祥;《产品与技术自动化系统》;20180210;第83-84页 *

Also Published As

Publication number Publication date
CN108495354A (en) 2018-09-04

Similar Documents

Publication Publication Date Title
CN102291845B (en) Accidental access method and system
CN102685913B (en) Method for improving uplink transmission in a wireless communication system
US9036652B2 (en) Communication transmission system
CN106550480B (en) Random access method, device and system
EP4089549A1 (en) Resource scheduling method and apparatus, and readable storage medium
CN111294775B (en) Resource allocation method based on H2H dynamic characteristics in large-scale MTC and H2H coexistence scene
US8873537B2 (en) Synchronization method and system of control sequence numbers
WO2014139413A1 (en) Method and device for implementing non-centralized clustering mechanism
CN111556528A (en) Channel state judgment method based on frequency hopping time hopping pattern under self-organizing network
US20140254456A1 (en) Method for counting terminals for multicast/broadcast service
CN103814596A (en) Method, device and system for data transmission
WO2017070838A1 (en) Resource scheduling method, base station, scheduler, program server and system
CN105553540A (en) Satellite and ground data processing method and device
CN102149163A (en) System and method for reporting random access information in carrier polymerization
CN108495354B (en) Access control method
CN111602443A (en) Data transmission method and device and computer storage medium
Huq et al. On the benefits of clustered capillary networks for congestion control in machine type communications over LTE
CN111132223A (en) Data packet transmission method and communication equipment
CN112929960B (en) Method for supporting IPv6 and improving wireless sensor network certainty
Fawal et al. CTMC modeling for M2M/H2H coexistence in a NB-IoT adaptive eNodeB
CN107371218B (en) Method and device for updating and receiving broadcast system information
Singh et al. Mechanizing wireless LAN (WLAN) using compression techniques
CN103384395A (en) Uplink bandwidth configuring method and device
WO2024093508A1 (en) Communication method and apparatus
WO2024140405A1 (en) Random access preamble sequence generation method, device and apparatus, and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant