CN111405679A - Random access control method for Internet of things based on time advance - Google Patents
Random access control method for Internet of things based on time advance Download PDFInfo
- Publication number
- CN111405679A CN111405679A CN202010197131.9A CN202010197131A CN111405679A CN 111405679 A CN111405679 A CN 111405679A CN 202010197131 A CN202010197131 A CN 202010197131A CN 111405679 A CN111405679 A CN 111405679A
- Authority
- CN
- China
- Prior art keywords
- terminal
- access
- preamble
- random access
- time
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 24
- 230000007246 mechanism Effects 0.000 claims description 24
- 238000001514 detection method Methods 0.000 claims description 11
- 238000013475 authorization Methods 0.000 claims description 4
- 230000005540 biological transmission Effects 0.000 claims description 4
- 238000004364 calculation method Methods 0.000 claims description 4
- 238000000926 separation method Methods 0.000 claims description 3
- 238000004088 simulation Methods 0.000 description 22
- 238000010586 diagram Methods 0.000 description 7
- 230000006854 communication Effects 0.000 description 6
- 238000004891 communication Methods 0.000 description 4
- 230000032823 cell division Effects 0.000 description 3
- 238000004458 analytical method Methods 0.000 description 2
- 230000002860 competitive effect Effects 0.000 description 2
- 238000012544 monitoring process Methods 0.000 description 2
- 230000036963 noncompetitive effect Effects 0.000 description 2
- 230000001413 cellular effect Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000007774 longterm Effects 0.000 description 1
- 238000005259 measurement Methods 0.000 description 1
- 238000005192 partition Methods 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 238000010845 search algorithm Methods 0.000 description 1
- 230000011664 signaling Effects 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W74/00—Wireless channel access
- H04W74/08—Non-scheduled access, e.g. ALOHA
- H04W74/0833—Random access procedures, e.g. with 4-step access
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses an access control method based on time advance, which mainly solves the problem that in the prior art, when a large number of intelligent terminals simultaneously apply for random access, conflict is generated due to the fact that lead code sequence resources compete violently. The implementation scheme is as follows: 1) when the terminal sends a preamble sequence to apply for random access, the base station judges the area where the terminal is located according to the time advance and calculates the optimal access probability factor of each area; 2) after receiving the random access response of the base station, the terminal realizes access control according to the allowed access probability of the area; 3) and after terminals which are not allowed to access and terminals which fail to access are randomly backed off for a period of time, re-applying for a random access process. According to the method, the optimal access probability factor is combined according to different time leads, so that the utilization rate of the lead code sequence resource of the system is maximized, the average time delay of terminal access is reduced, and the system throughput is improved; the method can be used for controlling the random access process of the ground Internet of things.
Description
Technical Field
The invention belongs to the technical field of communication, and further relates to an access technology of a ground Internet of things, in particular to an Internet of things random access control method based on time advance; the method can be used for the ground Internet of things with a large number of terminals simultaneously applying for access resources.
Background
The ground internet of things generally covers a large number of intelligent terminals, such as intelligent distance measurement, human health monitoring and safety monitoring, and 78 billion intelligent terminals are expected to be available in 2021. When a large number of intelligent terminals are activated simultaneously, because the resources allowed to access are limited, a plurality of terminals contend for the same access resource, and therefore, in order to effectively avoid the occurrence of a collision, an access control means is usually adopted for the terminals to ensure the service quality.
At present, the research on access control at home and abroad is based on the Access Class Barring (ACB) scheme of 3GPP, that is, the system allows access probability through broadcasting, each terminal generates a random number, if the random number is less than the probability, the access is allowed, otherwise, the access is not allowed.
Zehua Wang et al, in the article "Optimal Access Class Barring for Stationarymachine Type Communication With Timing Advance Information" (IEEETransactions on Wireless Communications, vol.14, No.10, pp.5374-5387, Oct.2015), propose an Access control method based on time Advance, which maximizes throughput by deriving a functional relationship between system throughput and Access probability to obtain an Optimal Access probability, and further solve the problem of terminal contention for Access resources, however, the disadvantage of this method is that the same Access probability is broadcast for all terminals in a cell, and thus the control accuracy is not high.
Chong Di et al, in the article "L arrival Automata based Access Class BarringScheme for Massive Random Access in Machine-to-Machine Communications" (IEEEInternet of these Journal, vol.6, No.4, pp.6007-6017, Aug.2019), analyzed the relationship between the number of newly arrived and applied retransmission devices and the Access probability in the current timeslot, and estimated the number of the most likely terminals to be applied for Access in the current timeslot by a search algorithm, thereby obtaining the Access probability in the next timeslot.
Taehon Kim et al, in the paper "An Enhanced Random Access Scheme With spatial group Based Reusable Preamble in Cellular M2M Networks" (IEEEcommunications L, vol.19, No.10, pp.1714-1717, Oct.2015), propose to divide the cell covered area into several cells according to the time advance, each cell can multiplex the same Preamble sequence, so as to reduce the collision generated when the devices of two different cells apply for the same Preamble sequence.
Disclosure of Invention
The invention aims to provide a random access control method of the internet of things based on the time advance, which aims to solve the problem of conflict of simultaneously applying for random access resources by a large number of intelligent terminals, improve the utilization rate of system resources and reduce the average access delay of the intelligent terminals.
The idea for realizing the invention is as follows: firstly, multiplexing of the same lead code sequence resource by different equipment terminals is realized through the time advance, and the utilization rate of system resources is improved; then, determining the area where the intelligent terminal is located according to the time advance; and finally, determining the optimal access probability factor by constructing a functional relation between the number of the allowed access devices and the throughput. The invention combines the optimal access probability factor according to the difference of the time advance, thereby maximizing the utilization rate of the lead code sequence resource of the system, reducing the average time delay of the terminal access and improving the system throughput.
The invention realizes the aim as follows:
(1) the system broadcast allows the terminal equipment registered in the Internet of things system to carry out random access, the terminal applying for random access keeps an interception state, and system broadcast information is received;
(2) in the current time slot, a terminal applying for access randomly selects one of L preamble sequences specified by L TE protocol and sends the selected preamble sequence to a base station;
(3) the base station detects the received preamble signal and determines whether the preamble in the current time slot is multiplexed:
(3a) the base station carries out correlation calculation on the received preamble signal and L locally known preamble sequences to obtain a correlation coefficient E of the two preamble signalscorr(ii) a Determining the serial number of the received lead code according to the magnitude relation between the correlation coefficient and the detection threshold value;
(3b) let the first peak position of multiple detection signals appearing on the multi-path propagation time axis be t1The last peak position is t2σ is the multipath delay spread; if t is present2-t1If not more than sigma, judging that the lead code is not multiplexed; otherwise, the lead code is judged to be multiplexed by the two terminals;
(4) the base station estimates the time advance T corresponding to the lead code signal sent by the terminalADividing the cell into phi annular regions with equal intervals according to the multipath delay spread sigma, and respectively calculating the optimal access probability of all the regionsWhereinRepresenting the optimal access probability of the region with the region number of x;
(5) the base station returns a random access response RAR to the terminal, and the response at least comprises the preamble sequence number η selected by the terminal and the time advance TAUplink scheduling authorization theta and the area number chi of the uplink scheduling authorization theta; when the preamble is not multiplexed, only one access response RAR is returned, and when the preamble is multiplexed by two terminals, two access responses RAR are required to be returned simultaneously;
(6) the terminal keeps the interception state, and if the received Random Access Response (RAR) is TAValue and terminal's own reference timing advanceIf the values are the same, receiving the response and correspondingly adjusting the uplink transmission time according to the time lead; otherwise, discarding the response;
(7) the terminal obtains the random access response from the received random access responseIts affiliated area number χ, thereby obtaining the corresponding access probabilityMeanwhile, the terminal randomly generates a random number rho ifThe terminal continues to execute the step (8), otherwise, the step (10) is executed;
(8) the terminal transmits a Radio Resource Control (RRC) sublayer message to the base station by adopting a hybrid automatic retransmission mechanism through a Physical Uplink Shared Channel (PUSCH);
(9) after receiving the message, the base station performs contention resolution and broadcasts a contention resolution result, the terminal which succeeds in contention resolution is successfully accessed, and the terminal which fails in contention resolution executes the step (10);
(10) the terminal adopts a back-off mechanism to back off randomly for a period of time, and the transmitting power is increased to apply for access again when the system broadcast carries out random access.
Drawings
FIG. 1 is a schematic diagram of an application scenario of the present invention;
fig. 2 is a simulation diagram comparing the average access delay performance of the access mechanism employed in the present invention with the existing access mechanism;
FIG. 3 is a simulation graph comparing the total time taken for access completion of the access mechanism employed in the present invention with that of the existing access mechanism;
FIG. 4 is a simulation diagram comparing the number of devices applying for access and the number of devices successfully accessing in a plurality of areas without access control according to the present invention;
fig. 5 is a simulation diagram comparing the number of devices applying for access and the number of devices successfully accessing in a plurality of areas with access control according to the present invention.
Detailed Description
The invention has the following implementation steps:
l TE specifies 64 mutually orthogonal preamble sequences for terminal equipment to select, wherein the sequences are divided into non-competitive preamble sequences and competitive preamble sequences, the non-competitive preamble sequences are generally used for the communication process between people, and the competitive preamble sequences are generally used for the communication process of machines.
l TE has two uplink channels for requesting access, one is physical random access channel PRACH mainly used for transmitting preamble sequence, the other is physical uplink shared channel PUSCH mainly used for transmitting signaling information, the working bandwidth of PRACH is the bandwidth of 6 resource blocks, namely 6x180kHz, from the aspect of frequency domain, the PRACH occupies a random access time slot RAO, and the time range occupied by a random access time slot RAO is 1ms to 20ms according to different configuration parameters of the system.
(3a) calculating a correlation coefficient E between the received preamble signal and L preamble sequences specified by a long term evolution L TE protocol according to the following formulacorr:
Wherein x (i) is the i-th symbol in the received preamble sequence, y (i) is the i-th symbol in the locally known preamble sequence, NZCThe total number of symbols contained in the preamble sequence;
determining the serial number of the received lead code according to the magnitude relation between the correlation coefficient and the detection threshold value; since different preamble sequences are orthogonal to each other, if the correlation coefficient between the received preamble sequence and a local preamble sequence is greater than the detection threshold, the preamble sequence value sent by the terminal, that is, the sequence number to which the received preamble belongs, can be determined. The detection threshold is a value set according to system-related parameters, and the value is related to parameters such as specific preamble length, signal-to-noise ratio, and the like, and is usually set to be above 0.3.
(3b) Because of the multipath propagation mode, the peak values of a plurality of detection signals appear on the time axis, and the first peak position of the plurality of detection signals appearing on the time axis is t1The last peak position is t2σ is the multipath delay spread; if t is present2-t1Sigma is less than or equal to indicate that a plurality of detected signals are caused by scattering diffraction of the same signal, so that the lead code is determined not to be multiplexed and only corresponds to a time advance; otherwise, explain t2If the signal appearing at the position is the same lead code sent by another terminal, the lead code is determined to be multiplexed by the two terminals and corresponds to two time lead amounts;
(4a) calculating an interference interval:
=c·σ,
wherein c is the speed of light, and σ is the multipath delay spread;
(4b) calculating the separation interval d:
dividing the cell into four regions along the cell radius at intervals of d, each region being denoted as Λ1、Λ2、Λ3、Λ4Wherein Λ1Is a circular area, Λ2、Λ3、Λ4Are respectively and Λ1The region numbers chi of the annular regions from near to far are respectively 1, 2, 3 and 4;
(4c) in the current time slot, region Λ1M for random access, M for allowed access, Λ2The number of terminals applying for random access is N, the number of allowed accesses is N, and the area Λ3The number of terminals applying for random access is K, the number of allowed accesses is K, and the region Λ4The number of terminals applying for random access is R, and the number of allowed access is R; the total number of devices allowed to access is m + n + k + r,
(4d) computing system throughput T:
T(m,n,k,r)=T0+T1+T2+T3+T4
wherein, T0Represents the system throughput when a certain preamble is selected by only one terminal; t is1Indicating that a certain preamble belongs to the area Λ1And another belongs to the area Λ3Or Λ4When the devices are simultaneously selected, area Λ1A throughput of (1); t is2Indicating that a certain preamble belongs to the area Λ2And another belongs to the area Λ4When the devices are simultaneously selected, area Λ2A throughput of (1); t is3Indicating that a certain preamble belongs to the area Λ3And another belongs to the area Λ1When the devices are simultaneously selected, area Λ3A throughput of (1); t is4Indicating that a certain preamble belongs to the area Λ4And another belongs to the area Λ1Or Λ2When the devices are simultaneously selected, area Λ4A throughput of (1); their calculation formula is as follows:
wherein L is the number of preambles;
Wherein p is1、p2、p3And p4Respectively representing the allowed access probability of four regions, and respectively satisfying the relation m ═ Mp1、n=Np2、k=Kp3And r ═ Rp4;
the acquisition χ is calculated as followsi;
(5a) According to the advance of timeCalculating the distance gamma of the terminal i from the base stationi:
γi=c·ti;
Therein, 16TsFor synchronous granularity, T s1/30720ms, c is the speed of light.
(5b) According to the distance gammaiCalculating the region number χ of the terminal i according to the following formulai:
Obtained by the same principle, xi 1Hexix-i 2;
the RRC sublayer message is specified by the 4G protocol, and the terminal sends the message to the base station after receiving the random access response; the terminal transmits the connection request information through the PUSCH channel, and in order to ensure that the connection request information is successfully transmitted to the base station, a hybrid automatic repeat request mechanism is adopted, that is, if a feedback signal is not received within a certain time, the connection request signal is transmitted again.
the base station feeds back the result of the connection request signal to the terminal, if the terminal still does not receive the feedback signal of the base station after the terminal finishes the self conflict resolution countdown, the terminal which competes for the lead code resource fails, and the failed terminal executes the step 10; if the feedback signal is received, it indicates that the terminal competes for the preamble resource this time, and directly enters step 11.
the terminal randomly backs off for a period of time to reapply for access, and the transmission power is increased when the selected preamble sequence is retransmitted next time. The back-off method is as follows:
(10a) if the terminal withdraws due to the failure of competition, the withdrawal time is tau1:
Wherein N iscolFor the number of terminal backoffs, U (-) represents the compliance interval [ ·]Uniformly distributed therein.
(10b) If the terminal is retreated due to not allowing access, the retreating time is tau2:
τ2=U(1,10·Ncol),
Wherein N iscolFor the number of terminal backoffs, U (-) represents the compliance interval [ ·]Uniformly distributed therein.
And 11, stopping the random access process after the access is successful.
The effect of the present invention will be further explained by the simulation experiment of the present invention.
1. Simulation conditions are as follows:
the simulation experiment of the invention uses Matlab R2014a simulation software, the simulation model is as shown in fig. 1, the radius of the cell is set to be 500 meters, the interference interval is 250m, d is 125m, sigma is 0.416 mu s, and one time slot T is setsThe service model adopts a L TE service burst model, where 0.5ms is used, and the preamble number L is 64, and the specific steps are as follows:
wherein Beta (α) is Beta function, α is 3, β is 4, TA=50ms。
2. Simulation content and result analysis thereof:
The simulation analysis proves the correctness and the effectiveness of the method provided by the invention.
The invention has not been described in detail in part of the common general knowledge of those skilled in the art.
While the invention has been particularly shown and described with reference to a preferred embodiment, it will be understood by those skilled in the art that various changes in form and detail may be made therein without departing from the spirit and scope of the invention.
Claims (7)
1. A random access control method of the Internet of things based on time advance is characterized by comprising the following steps:
(1) the system broadcast allows the terminal equipment registered in the Internet of things system to carry out random access, the terminal applying for random access keeps an interception state, and system broadcast information is received;
(2) in the current time slot, a terminal applying for access randomly selects one of L preamble sequences specified by L TE protocol and sends the selected preamble sequence to a base station;
(3) the base station detects the received preamble signal and determines whether the preamble in the current time slot is multiplexed:
(3a) the base station carries out correlation calculation on the received preamble signal and L locally known preamble sequences to obtain a correlation coefficient E of the two preamble signalscorr(ii) a Determining the serial number of the received lead code according to the magnitude relation between the correlation coefficient and the detection threshold value;
(3b) let the first peak position of multiple detection signals appearing on the multi-path propagation time axis be t1The last peak position is t2σ is the multipath delay spread; if t is present2-t1If not more than sigma, judging that the lead code is not multiplexed; otherwise, the lead code is judged to be multiplexed by the two terminals;
(4) the base station estimates the time advance T corresponding to the lead code signal sent by the terminalADividing the cell into phi annular regions with equal intervals according to the multipath delay spread sigma, and respectively calculating the optimal access probability of all the regionsWhereinRepresenting the optimal access probability of the region with the region number of x;
(5) the base station returns a random access response RAR to the terminal, and the response at least comprises the preamble sequence number η selected by the terminal and the time advance TAUplink scheduling authorization theta and the area number chi of the uplink scheduling authorization theta; when the preamble is not multiplexed, only one access response RAR is returned, and when the preamble is multiplexed by two terminals, two access responses RAR are required to be returned simultaneously;
(6) the terminal keeps the interception state, and if the received Random Access Response (RAR) is TAValue and terminal's own reference timing advanceIf the values are the same, receiving the response and correspondingly adjusting the uplink transmission time according to the time lead; otherwise, discarding the response;
(7) the terminal obtains the region number x of the random access response from the received random access response so as to obtain the corresponding access probabilityMeanwhile, the terminal randomly generates a random number rho ifThe terminal continues to execute the step (8), otherwise, the step (10) is executed;
(8) the terminal transmits a Radio Resource Control (RRC) sublayer message to the base station by adopting a hybrid automatic retransmission mechanism through a Physical Uplink Shared Channel (PUSCH);
(9) after receiving the message, the base station performs contention resolution and broadcasts a contention resolution result, the terminal which succeeds in contention resolution is successfully accessed, and the terminal which fails in contention resolution executes the step (10);
(10) the terminal adopts a back-off mechanism to back off randomly for a period of time, and the transmitting power is increased to apply for access again when the system broadcast carries out random access.
2. The method of claim 1, wherein: correlation coefficient E in step (3a)corrCalculated according to the following formula:
wherein x (i) is the i-th symbol in the received preamble sequence, y (i) is the i-th symbol in the locally known preamble sequence, NZCThe total number of symbols included in the preamble sequence.
3. The method of claim 1, wherein: the detection threshold in step (3a) is a value set according to system-related parameters, and when a correlation coefficient between a received preamble sequence and a certain local preamble sequence is greater than the detection threshold, it is determined that a sequence number of the local preamble sequence is a sequence number to which a preamble transmitted by the terminal belongs.
4. The method of claim 1, wherein: in the step (4), the cell is divided into phi annular regions with equal intervals according to the multipath delay spread sigma, and the method specifically comprises the following steps:
(4a) calculating an interference interval:
=c·σ,
wherein c is the speed of light, and σ is the multipath delay spread;
(4b) calculating the separation interval d:
dividing the cell into phi regions along the cell radius at intervals of d, which are respectively recorded as Λ1、Λ2…Λχ…ΛφWherein χ is not less than 1 and not more than φ, and χ is an integer.
5. The method of claim 1, wherein: the optimal access probability of the region with the region number of x in the step (4)Wherein x is more than or equal to 1 and less than or equal to phi, and is calculated according to the following steps:
(4c) in the current time slot, region ΛχThe number of terminals applying for random access is GχThe number of allowed accesses is gχ;
(4d) Computing system throughput T:
wherein, T0Represents the system throughput when a certain preamble is selected by only one terminal; t isχIndicating that a certain preamble belongs to the area ΛχAnd another stationRegion Λ when devices belonging to regions not adjacent thereto are simultaneously selectedχA throughput of (1);
(4e) determining the optimal access probability of each region according to the following formula:
wherein p isχRepresents the allowed access probability of the region χ and satisfies the relation gχ=Gχpχ。
6. The method of claim 1, wherein: the area number x belonging to the step (5) is calculated by the base station according to the following steps;
(5a) according to the time advance TACalculating the distance gamma of the terminal from the base station:
γ=c·(TA·16Ts);
therein, 16TsDenotes the synchronization granularity, Ts1/30720ms, c is the speed of light;
(5b) calculating the area number χ of the terminal according to the distance γ and the separation distance d according to the following formula:
7. the method of claim 1, wherein: the back-off mechanism adopted by the terminal in the step (10) is as follows:
(10a) if the terminal withdraws due to the failure of competition, the withdrawal time is tau1:
(10b) If the terminal is retreated due to not allowing access, the retreating time is tau2:
τ2=U(1,10·Ncol),
Wherein N iscolFor the number of terminal backoffs, U (-) represents the compliance interval [ ·]Uniformly distributed therein.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010197131.9A CN111405679B (en) | 2020-03-19 | 2020-03-19 | Random access control method for Internet of things based on time advance |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010197131.9A CN111405679B (en) | 2020-03-19 | 2020-03-19 | Random access control method for Internet of things based on time advance |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111405679A true CN111405679A (en) | 2020-07-10 |
CN111405679B CN111405679B (en) | 2022-03-04 |
Family
ID=71413455
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010197131.9A Active CN111405679B (en) | 2020-03-19 | 2020-03-19 | Random access control method for Internet of things based on time advance |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111405679B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111970765A (en) * | 2020-08-10 | 2020-11-20 | 杭州电子科技大学 | Large-scale terminal access method and system |
CN113329445A (en) * | 2021-05-28 | 2021-08-31 | 江苏集萃深度感知技术研究所有限公司 | NB-IoT-based street lamp control access method |
WO2022127806A1 (en) * | 2020-12-15 | 2022-06-23 | 华为技术有限公司 | Wireless communication method and apparatus |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2408253A1 (en) * | 2010-07-13 | 2012-01-18 | Alcatel Lucent | Method for random access to a wireless or mobile communication network, and corresponding transceiver equipment |
CN106102182A (en) * | 2016-06-07 | 2016-11-09 | 北京交通大学 | Nonopiate accidental access method |
CN107371126A (en) * | 2017-08-21 | 2017-11-21 | 西安电子科技大学 | Accidental access method based on FDD LTE networks |
CN108811119A (en) * | 2017-05-05 | 2018-11-13 | 华为技术有限公司 | Accidental access method, equipment and system |
-
2020
- 2020-03-19 CN CN202010197131.9A patent/CN111405679B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2408253A1 (en) * | 2010-07-13 | 2012-01-18 | Alcatel Lucent | Method for random access to a wireless or mobile communication network, and corresponding transceiver equipment |
CN106102182A (en) * | 2016-06-07 | 2016-11-09 | 北京交通大学 | Nonopiate accidental access method |
CN108811119A (en) * | 2017-05-05 | 2018-11-13 | 华为技术有限公司 | Accidental access method, equipment and system |
CN107371126A (en) * | 2017-08-21 | 2017-11-21 | 西安电子科技大学 | Accidental access method based on FDD LTE networks |
Non-Patent Citations (6)
Title |
---|
CHONG DI等: "Learning Automata-Based Access Class Barring Scheme for Massive Random Access in Machine-to-Machine Communications", 《IEEE INTERNET OF THINGS JOURNAL》 * |
HAN SEUNG JANG等: "A Preamble Collision Resolution Scheme via Tagged Preambles for Cellular IoT M2M Communications", 《IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY》 * |
TAEHOON KIM等: "An Enhanced Random Access Scheme With Spatial Group Based Reusable Preamble Allocation in Cellular M2M Networks", 《IEEE COMMUNICATIONS LETTERS》 * |
ZEHUA WANG等: "Optimal Access Class Barring for Stationary Machine Type Communication_Devices_With_Timing Advance Information", 《IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS)》 * |
刘文燕: "窄带物联网中大规模接入方法研究", 《中国优秀硕士学位论文全文数据库》 * |
张继荣等: "基于终端分组的非正交随机接入资源分配方案", 《计算机科学》 * |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111970765A (en) * | 2020-08-10 | 2020-11-20 | 杭州电子科技大学 | Large-scale terminal access method and system |
CN111970765B (en) * | 2020-08-10 | 2022-05-31 | 杭州电子科技大学 | Large-scale terminal access method and system |
WO2022127806A1 (en) * | 2020-12-15 | 2022-06-23 | 华为技术有限公司 | Wireless communication method and apparatus |
CN113329445A (en) * | 2021-05-28 | 2021-08-31 | 江苏集萃深度感知技术研究所有限公司 | NB-IoT-based street lamp control access method |
Also Published As
Publication number | Publication date |
---|---|
CN111405679B (en) | 2022-03-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111405679B (en) | Random access control method for Internet of things based on time advance | |
US11737151B2 (en) | Method and apparatus for performing random access backoff in wireless communication system | |
EP3695679B1 (en) | Methods and apparatuses for determining and configuring a time-frequency resource, in the random access process | |
EP3818768B1 (en) | Method and user equipment for performing random access channel procedure for unlicensed operation | |
EP3432673B1 (en) | Method and apparatus for decoding random access response message in wireless communication system | |
CN107371273B (en) | Random access method, device and user equipment | |
EP3369285B1 (en) | Two-step contention-based random access over radio resources in laa | |
EP4255047A2 (en) | Method and apparatus for performing two step or four step random access procedure | |
Amjad et al. | Low latency V2X applications and network requirements: Performance evaluation | |
EP3975651A1 (en) | Method and apparatus for random access in wireless communication system | |
WO2017076352A1 (en) | Beamforming-based system broadcast message transmission method, device and system | |
CN102740492B (en) | Random access control method and system | |
CN111149414B (en) | User equipment and base station participating in prioritized random access | |
EP4044727A1 (en) | Method and apparatus for configuring bandwidth part in wireless communication system | |
WO2020068616A1 (en) | Listen before talk and channel access priority class for rach in new radio unlicensed | |
EP4307770A2 (en) | Method and apparatus for system information acquisition, beam failure recovery and cell reselection | |
EP2651174B1 (en) | Method, apparatus, and system for communication information transmission | |
JP5996114B2 (en) | Random access response method and apparatus | |
Cheng et al. | Performance evaluation of radio access network overloading from machine type communications in LTE-A networks | |
KR20160138834A (en) | Method and apparatus for performing random access in wireless communication system | |
Pan et al. | Cluster-based group paging for massive machine type communications under 5G networks | |
CN107295567B (en) | Wireless resource conflict detection method based on frame structure | |
de Andrade et al. | A cluster-based random-access scheme for LTE/LTE-A networks supporting massive machine-type communications | |
Ali et al. | A congestion control approach based on dynamic ACB of differentiated M2M services in 5G/HetNet | |
JP2024519991A (en) | First Message Repetition for Mission-Critical User Equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |