CN111601346A - Method and equipment for determining access cell and configuring information - Google Patents

Method and equipment for determining access cell and configuring information Download PDF

Info

Publication number
CN111601346A
CN111601346A CN201910364354.7A CN201910364354A CN111601346A CN 111601346 A CN111601346 A CN 111601346A CN 201910364354 A CN201910364354 A CN 201910364354A CN 111601346 A CN111601346 A CN 111601346A
Authority
CN
China
Prior art keywords
cell
access
terminal device
access group
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910364354.7A
Other languages
Chinese (zh)
Other versions
CN111601346B (en
Inventor
张艳霞
吴昱民
柯小婉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201910364354.7A priority Critical patent/CN111601346B/en
Publication of CN111601346A publication Critical patent/CN111601346A/en
Application granted granted Critical
Publication of CN111601346B publication Critical patent/CN111601346B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • H04W36/0009Control or signalling for completing the hand-off for a plurality of users or terminals, e.g. group communication or moving wireless networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • H04W36/0011Control or signalling for completing the hand-off for data sessions of end-to-end connection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/08Reselecting an access point

Abstract

The invention provides a method and a device for determining an access cell and configuring information, wherein the method for determining the access cell comprises the following steps: determining a candidate cell allowing the terminal device to access based on target access group information, wherein the target access group information comprises at least one of access group information of the terminal device and access group information of the cell; and selecting one cell from the candidate cells as an access cell of the terminal equipment. The access cell determining method can ensure that the specific terminal equipment under the non-independent non-public network can be correctly accessed into the specific cell to obtain the service.

Description

Method and equipment for determining access cell and configuring information
Technical Field
The invention relates to the technical field of communication, in particular to a method and equipment for determining an access cell and configuring information under a non-independent non-public network.
Background
In order to meet the communication requirements of applications (such as manufacturing, automation control, etc.) in an industrial environment, a private Local Area Network (LAN), that is, a Non-Public Network (NPN) in a wireless communication system, is introduced into the wireless communication system.
Currently, NPN supports two deployment approaches: the first is an independent NPN deployment manner, which does not depend on a Public Network, and a User Equipment (UE) determines whether a certain cell can be accessed through a non-Public Network identifier (such as a Public Land Mobile Network (PLMN)) provided by a Network side; the second non-standalone NPN deployment approach depends on a public network, and a Closed Access Group (CAG) is introduced under the deployment approach, so that a specific UE accesses a specific cell (an Access object), but it is unclear how to ensure that the specific UE accesses the specific cell.
Disclosure of Invention
The embodiment of the invention provides a method and equipment for determining an access cell and configuring information under a non-independent non-public network, so as to determine the cell which can be accessed by a terminal device.
In a first aspect, a method for determining an access cell in a non-independent non-public network is provided, and is applied to a terminal device, where the method includes:
determining a candidate cell allowing the terminal device to access based on target access group information, wherein the target access group information comprises at least one of access group information of the terminal device and access group information of the cell;
and selecting one cell from the candidate cells as an access cell of the terminal equipment.
In a second aspect, an information configuration method is provided, which is applied to a network device, and the method includes:
sending configuration information, wherein the configuration information is used for configuring access group information of terminal equipment;
the access group information includes information for determining an access group to which the terminal device belongs, and the access group information further includes at least one of frequency point information corresponding to the access group to which the terminal device belongs and cell information belonging to the access group to which the terminal device belongs.
In a third aspect, a terminal device is provided, which includes:
a first determining module, configured to determine a candidate cell allowing the terminal device to access based on target access group information, where the target access group information includes at least one of access group information of the terminal device and access group information of the cell;
and the selecting module is used for selecting one cell from the candidate cells as the access cell of the terminal equipment.
In a fourth aspect, a network device is provided, the network device comprising:
a sending module, configured to send configuration information, where the configuration information is used to configure access group information of a terminal device;
the access group information includes information for determining an access group to which the terminal device belongs, and the access group information further includes at least one of frequency point information corresponding to the access group to which the terminal device belongs and cell information belonging to the access group to which the terminal device belongs.
In a fifth aspect, a terminal device is provided, the terminal device comprising a memory, a processor and a wireless communication program stored on the memory and operable on the processor, the wireless communication program, when executed by the processor, implementing the steps of the method according to the first aspect.
In a sixth aspect, a network device is provided, which comprises a memory, a processor and a wireless communication program stored on the memory and executable on the processor, the wireless communication program, when executed by the processor, implementing the steps of the method according to the second aspect.
In a seventh aspect, a computer readable medium is provided, having stored thereon a wireless communication program, which when executed by a processor, performs the steps of the method according to the first or second aspect.
In the embodiment of the invention, the candidate cells can be determined firstly, and then one cell is selected from the candidate cells to be used as the access cell of the terminal equipment, so that the specific terminal equipment under the non-independent non-public network can be ensured to be correctly accessed into the specific cell to obtain the service.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly introduced below, it is obvious that the drawings in the following description are only some embodiments described in the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
Fig. 1 is a schematic flow chart of an access cell determination method under a non-independent non-public network according to an embodiment of the present invention.
Fig. 2 is a schematic flow chart of an information configuration method according to an embodiment of the present invention.
Fig. 3 is a schematic structural diagram of a terminal device 300 according to an embodiment of the present invention.
Fig. 4 is a schematic structural diagram of a network device 400 according to an embodiment of the present invention.
Fig. 5 is a schematic structural diagram of a terminal device 500 according to an embodiment of the present invention.
Fig. 6 is a schematic structural diagram of a network device 600 according to an embodiment of the present invention.
Detailed Description
In order to make those skilled in the art better understand the technical solution of the present invention, the technical solution in the embodiment of the present invention will be clearly and completely described below with reference to the drawings in the embodiment of the present invention, and it is obvious that the described embodiment is only a part of the embodiment of the present invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be understood that the technical solutions of the embodiments of the present invention can be applied to various communication systems, for example: a Global System for Mobile communications (GSM) System, a Code Division Multiple Access (CDMA) System, a Wideband Code Division Multiple Access (WCDMA) System, a General Packet Radio Service (GPRS), a Long Term Evolution (Long Term Evolution, LTE) System, an LTE Frequency Division Duplex (FDD) System, an LTE Time Division Duplex (TDD), a Universal Mobile Telecommunications System (UMTS) or a Worldwide Interoperability for Microwave Access (WiMAX) communication System, a 5G System, or a New Radio (NR) System.
A Terminal device (UE), which may also be referred to as a Mobile Terminal (Mobile Terminal), a Mobile Terminal device, or the like, may communicate with at least one core Network via a Radio Access Network (RAN, for example), where the Terminal device may be a Mobile Terminal, such as a Mobile phone (or a "cellular" phone) and a computer having the Mobile Terminal, such as a portable, pocket, handheld, computer-embedded or vehicle-mounted Mobile device, and may exchange languages and/or data with the Radio Access Network.
The network device is a device deployed in a radio access network device for providing an information configuration function, and the network device may be a Base Station, where the Base Station may be a Base Transceiver Station (BTS) in GSM or CDMA, a Base Station (NodeB) in WCDMA, an evolved Node B (eNB or e-NodeB) in LTE, a 5G Base Station (gNB) in a subsequent evolved communication system, and a network-side device in the subsequent evolved communication system, but the term does not limit the protection scope of the present invention.
It should be noted that, when describing a specific embodiment, the sequence number of each process does not mean the execution sequence, and the execution sequence of each process should be determined by its function and internal logic, and should not constitute any limitation to the implementation process of the embodiment of the present invention.
The following description will first be made with reference to fig. 1, where the method is applied to a terminal device for determining an access cell in a non-standalone non-public network.
It should be noted that, the device for implementing the method for determining an access cell in a non-standalone non-public network according to the embodiment of the present invention may be a terminal device with access group capability, for example, a terminal device supporting access to a specific access group. In addition, the Access Group in the embodiment of the present invention may include, but is not limited to, a Closed Access Group (CAG).
Fig. 1 illustrates an access cell determination method in a non-standalone non-public network, which is applied to a terminal device according to an embodiment of the present invention. As shown in fig. 1, the method may include the steps of:
step 101, determining a candidate cell allowing the terminal device to access based on the target access group information.
The target access group information includes at least one of access group information of the terminal device and access group information of a cell.
The access group information of the terminal device may include information (e.g., an access group list) for determining an access group to which the terminal device belongs, such as identification information of the access group to which the terminal device belongs. In addition, the access group information of the terminal device may further include at least one of frequency point information corresponding to an access group to which the terminal device belongs and cell information and the like belonging to the access group to which the terminal device belongs.
The access group information of the cell may be information of an access group to which the cell is broadcasted by the cell scanned by the terminal device, such as identification information of the access group to which the cell belongs, identification information of other members in the access group to which the cell belongs, and the like.
When a cell belongs to an access group, the cell may be referred to as a member cell of the access group. Similarly, when a terminal device belongs to an access group, the terminal device may be referred to as a member device of the access group. Also, one access group may include a plurality of members, and one member may also belong to a plurality of access groups.
Optionally, before step 101, the method for determining an access cell in a non-standalone non-public network according to the embodiment of the present invention may further include: receiving configuration information from a network device, wherein the configuration information is used for configuring access group information of the terminal device, and the access group information of the terminal device comprises information used for determining an access group to which the terminal device belongs.
For example, the network device may configure the terminal device with an access group list to which the terminal device belongs, such as that the UE belongs to access group 1 and access group 2; additionally, the network device may configure the terminal device with the cell and/or frequency point corresponding to the access group to which the terminal device belongs, for example, configure the member cell of the access group 1 to include cell 1 and cell 2, and configure the member cell of the access group 2 to include cell 3, and so on; or, configuring the frequency points corresponding to the access group 1 to include the frequency point 1 and the frequency point 2, and configuring the frequency points corresponding to the access group 2 to include the frequency point 3, and so on.
And 102, selecting a cell from the candidate cells as an access cell of the terminal equipment.
When the candidate cells are different, the manner of selecting the access cell and the type of service acquired after accessing the cell may be different, which will be described in the following specific examples, and will not be described herein again.
Optionally, before step 101, the terminal device may scan accessible frequency points or cells based on its own capability, and scan for one or more cells.
On this basis, the procedure of determining candidate cells in step 101, how to select an access cell after determining the candidate cells, and what type of service (normal service or limited service) to acquire after accessing the cell will be described below by way of three examples.
First example
In a first example, the network device configures an access group list to which the terminal device belongs in advance for the terminal device, that is, the terminal device belongs to at least one access group.
In an implementation manner of the first example, the step 101 may include: and when the scanned cell is determined to belong to the access group to which the terminal equipment belongs based on the target access group information, determining the scanned cell as a first candidate cell allowing the terminal equipment to access.
Whether the scanned cell belongs to the access group to which the terminal device belongs or not can be determined by at least one of the access group information of the terminal device and the access group information broadcasted by the scanned cell.
In another implementation manner of the first example, if the access group information of the terminal device, configured by the network device to the terminal device, includes frequency point information corresponding to the access group to which the terminal device belongs, before step 101, the terminal device may determine a target frequency point to be scanned according to the access group information of the terminal device, and the target frequency point may only include a frequency point corresponding to a cell belonging to the access group to which the terminal device belongs.
Further, after the target frequency point is determined, only the target frequency point may be scanned, and after at least one cell is scanned by scanning the target frequency point, whether the scanned cell belongs to the access group of the terminal device may be determined by comparing access group identification information in access group information broadcast by the at least one cell with whether identification information of the at least one access group to which the terminal device belongs is consistent.
That is, the terminal device may only scan the frequency points corresponding to the member cells of the access group to which the terminal device belongs. For example, if the terminal device belongs to access group 1, and the member cells of access group 1 include cell 1 (corresponding to frequency point 1) and cell 2 (corresponding to frequency point 2), then only frequency point 1 and frequency point 2 are scanned.
In this embodiment, on one hand, since the terminal device only scans a small number of target frequency points, the scanning range of the terminal device can be reduced, and thus the power consumption of the terminal device is reduced. On the other hand, the scanned target frequency point may only include a frequency point corresponding to a cell belonging to the access group to which the terminal device belongs, so that the probability that the scanned cell is a member cell of the access group of the terminal device may be increased, and thus the first candidate cell that the terminal device may access may be found more quickly.
In another implementation manner of the first example, if the access group information of the terminal device configured by the network device to the terminal device includes cell information belonging to an access group to which the terminal device belongs, before step 101, the terminal device may determine a target cell to be scanned according to the access group information of the terminal device, and the target cell may only include cells belonging to the access group to which the terminal device belongs.
That is, the terminal device may only scan the member cells of the access group to which the terminal device belongs. For example, if the terminal device belongs to access group 1, and the member cells of access group 1 include cell 1 (corresponding to physical cell 1 (identified as PCI1) and cell 2 (corresponding to physical cell 2 (identified as PCI 2)), then the terminal device scans only physical cell 1 and physical cell 2 corresponding to identification PCI1 and PCI2, respectively.
In this embodiment, on the one hand, since only a small number of target cells are scanned, the scanning range of the terminal device can be reduced, thereby reducing the power consumption of the terminal device. On the other hand, because the scanning target cell may only include the cell belonging to the access group to which the terminal device belongs, the probability that the scanned cell is a member cell of the access group of the terminal device may be increased, and thus the first candidate cell accessible to the terminal device may be found more quickly.
Further, the method shown in fig. 1 may further include: and when the scanned cell does not belong to the access group to which the terminal equipment belongs, prohibiting the terminal equipment from accessing the scanned cell or the frequency point corresponding to the scanned cell.
That is, the terminal device considers other cells outside the member cell of the access group to which the terminal device belongs as cells to which access is prohibited. For example, if the terminal device belongs to access group 1, but the Cell 1 scanned by the terminal device does not belong to access group 1, the terminal device considers that the Cell 1 is a Cell prohibited from accessing (Barred Cell).
Or the terminal device considers that the frequency points corresponding to other cells outside the member cell of the access group to which the terminal device belongs are the frequency points which are forbidden to be accessed. For example, if the terminal device belongs to the access group 1, and the member cells of the access group 1 include a cell 1 (corresponding to a Frequency point 1) and a cell 2 (corresponding to a Frequency point 2), the terminal device considers that other Frequency points except the Frequency point 1 and the Frequency point 2 are Frequency points (Barred Frequency) which are not accessed; for another example, if the terminal device belongs to the access group 1 and the cell 1 (corresponding to the frequency point 1) scanned by the terminal device does not belong to a member of the access group 1, the terminal device considers that the frequency point 1 is a frequency point prohibited from being accessed.
Still further, the method shown in fig. 1 may further include: and determining the time for forbidding the terminal equipment to access the access object corresponding to the scanned cell. Wherein the time may be agreed upon by the network device configuration and/or protocol.
For example, when the terminal device considers that other cells except for the member cell of the access group to which the terminal device belongs are cells prohibited from accessing, further, the terminal device may set a duration for prohibiting accessing the cell, such as 300 seconds, or always prohibiting (infinite), according to a configuration or a protocol convention of the network device.
For another example, when the terminal device considers that the frequency point corresponding to the other cell except the member cell of the access group to which the terminal device belongs is the cell prohibited from accessing, further, the terminal device may set a duration for prohibiting accessing the frequency point according to a network device configuration or a protocol convention, for example, 300 seconds, or always prohibited (infinite).
It will be appreciated that the first example is intended to illustrate that a terminal device may only be allowed to access member cells of the access group to which the terminal device belongs, and not non-member cells of the access group to which the terminal device belongs. As the name implies, a non-member cell of an access group is a cell that is not a member of the access group.
Further, on the basis of the first example, the step 102 may include: and selecting a suitable cell from the first candidate cells as an access cell of the terminal equipment.
Wherein the suitable cell may be a cell satisfying the following condition:
the Signal quality satisfies a preset condition, and the Signal quality may include at least one of Reference Signal Receiving Power (RSRP) and Reference Signal Receiving Quality (RSRQ);
preset System Information can be obtained by the terminal device, that is, the terminal device can obtain necessary System Information of the cell, and the System Information may include a Management Information Base (MIB) and a System Information Block 1 (SIB 1); and
the cell is not barred from access (e.g., the cellbar IE of the cell takes the value notgarred), and so on.
If no suitable cell exists in the first candidate cells, the terminal device returns to step 101 to continue scanning to determine the first candidate cells.
Second example
In a second example, the network device configures, in advance, an access group list to which the terminal device belongs to the terminal device, that is, the terminal device belongs to at least one access group.
Optionally, in an implementation manner of the second example, the step 101 may include: and when the scanned cell is determined to belong to the access group to which the terminal equipment belongs based on the target access group information, determining the scanned cell as a first candidate cell allowing the terminal equipment to access.
Whether the scanned cell belongs to the access group to which the terminal device belongs or not can be determined by at least one of the access group information of the terminal device and the access group information broadcasted by the scanned cell.
That is, the network device may use the member cell of the access group to which the network device belongs as a cell that can obtain normal service (normal service). For example, if the terminal device belongs to access group 1 and the cell 1 scanned by the terminal device does not belong to access group 1, the terminal device cannot regard the cell 1 as a cell that can acquire normal service (e.g., the terminal device cannot set cell 1 as "suitable cell"); for another example, if the terminal device belongs to the access group 1 and the cell 2 scanned by the terminal device belong to the access group 1, the cell 1 and the cell 2 may be regarded as cells that can obtain normal services, and other cells that do not belong to the access group 1 may not be regarded as cells that can obtain normal services (e.g., the terminal device may set the cell 1 and the cell 2 as "capable cells" and may not set the cell 1 and the cell 2 as "capable cells" for other cells).
Further, the determining, when it is determined that the scanned cell belongs to the access group to which the terminal device belongs based on the target access group information, the scanned cell as a first candidate cell allowing the terminal device to access may include: when the scanned cell belongs to an access group to which the terminal equipment belongs and meets a first preset condition, determining the scanned cell as a first candidate cell allowing the terminal equipment to access; wherein the first preset condition comprises: the terminal equipment receives first indication information from network equipment, wherein the first indication information is used for indicating that the terminal equipment is allowed to access the scanned cell.
That is, when the scanned cell belongs to a certain access group, the terminal device also belongs to the access group, and the terminal device receives the first indication information from the network device to indicate that the terminal device can access the cell, the UE considers the cell as an accessible cell. For example, if the access group information broadcasted by the Cell 1 indicates that the Cell 1 belongs to the access group 1, and the terminal device determines that the terminal device also belongs to the access group 1 according to the access group information of the terminal device, then, when the network side indicates that the terminal device can access the Cell 1, the terminal device determines the Cell 1 as a candidate Cell that can be accessed (for example, the Cell 1 is set as a suitable Cell or an acceptable Cell).
Optionally, in another implementation manner of the second example, the method shown in fig. 1 may further include: and when the scanned cell meets a second preset condition, prohibiting the terminal equipment from accessing the scanned cell or the frequency point corresponding to the scanned cell.
Wherein the second preset condition comprises: and the scanned cell belongs to a second access group to which the terminal equipment belongs, and the terminal equipment receives second indication information from network equipment, wherein the second indication information is used for indicating that the terminal equipment is forbidden to access the scanned cell.
That is to say, although the cell scanned by the terminal device is a member cell of the access group to which the terminal device belongs, when the network device indicates that the terminal device is prohibited from accessing the cell through the second indication information, the terminal device regards that the cell is a cell prohibited from accessing or a frequency point corresponding to the cell is a frequency point prohibited from accessing.
For example, the access group information broadcasted by the Cell 1 indicates that the Cell 1 belongs to the access group 1, and the terminal device determines that the terminal device also belongs to the access group 1 according to the access group information of the terminal device, but when the network device indicates, through the second indication information, that the terminal device in the access group 1 is prohibited from accessing the member cells of the access group 1, the terminal device considers that the Cell 1 is a Cell (Barred Cell)) which is prohibited from accessing, or the terminal device considers that the frequency point corresponding to the Cell 1 is a frequency point (Barred frequency) which is prohibited from accessing.
Still further, the method shown in fig. 1 may further include: and determining the time for forbidding the terminal equipment to access the access object corresponding to the scanned cell. Wherein the time may be agreed upon by the network device configuration and/or protocol.
For example, the terminal device may set a time duration for prohibiting access to the cell, such as 300 seconds, or always prohibited (infinite), according to the network device configuration or protocol convention.
For another example, the terminal device may set a time duration for prohibiting access to the frequency point, for example, 300 seconds, or always prohibited (infinite), according to the network device configuration or protocol convention.
Optionally, in another implementation manner of the second example, the step 101 may include: and when the scanned cell meets a third preset condition, determining the scanned cell as a second candidate cell allowing the terminal equipment to access.
As a possible case, the third preset condition includes that the scanned cell does not belong to any access group to which the terminal device belongs. This scenario is intended to illustrate that a terminal device may acquire a restricted service by accessing a cell that does not belong to the access group to which the terminal device belongs.
More specifically, the third preset condition includes: the scanned cell is a cell set to a designated purpose, the scanned cell belongs to a third access group, the terminal device does not belong to the third access group, and the terminal device receives third indication information from a network device, wherein the third indication information is used for indicating that a device which does not belong to the third access group is allowed to access the cell belonging to the third access group.
For example, cell 1 scanned by the terminal device is set to be accessed For a designated purpose, For example, cell 1 indicates that "cell reserved For Other Use" takes a value of "true"; meanwhile, the access group information broadcasted by the cell 1 shows that the cell 1 belongs to the access group 1, but the terminal equipment judges that the terminal equipment does not belong to the access group 1 according to the access group information of the terminal equipment; furthermore, the terminal device receives the third indication information from the network, which indicates that the cell 1 is accessible to the terminal device not belonging to the access group to which the cell 1 belongs (e.g., the third indication information indicates that the cell 1 allows access to other terminal devices except for members of the access group 1). Then, the terminal device may determine Cell 1 as a candidate Cell from which the restricted service can be acquired (e.g., set Cell 1 as an acceptable Cell).
As another possible case, the third preset condition may include that the scanned cell belongs to at least one access group to which the terminal device belongs. This scenario is intended to illustrate that a terminal device may also acquire a restricted service by accessing a cell belonging to an access group to which the terminal device belongs.
Optionally, in another implementation manner of the second example, the method shown in fig. 1 may further include: and when the scanned cell meets a fourth preset condition, prohibiting the terminal equipment from accessing the scanned cell or a frequency point corresponding to the scanned cell.
As a case, the fourth preset condition specifically includes: the scanned cell is a cell set to a designated purpose, the scanned cell belongs to a fourth access group, and the terminal device does not belong to the fourth access group.
For example, cell 1 scanned by the terminal device is set to be access For a specific Use (e.g., cell 1 indicates that "cell reserved For Other Use" takes a value of "true"); meanwhile, the access group identifier broadcasted by the cell 1 received by the terminal device is not the identifier of the access group to which the terminal device belongs, and then the terminal device considers that the cell 1 is a cell (barred cell) which is forbidden to access.
As another case, the fourth preset condition includes: the scanned cell is a cell set to a designated purpose, the scanned cell belongs to a fourth access group, the terminal device does not belong to the fourth access group, and the terminal device receives fourth indication information from a network device, wherein the fourth indication information is used for indicating that a device which does not belong to the fourth access group is forbidden to access the cell belonging to the fourth access group.
For example, cell 1 scanned by the terminal device is set to be access For a specific Use (e.g., cell 1 indicates that "cell reserved For Other Use" takes a value of "true"); meanwhile, the access group identifier (access group 1) broadcasted by the cell 1 received by the terminal equipment is not the identifier of the access group (access group 2) to which the terminal equipment belongs; and if the terminal device receives the fourth indication information from the network device and indicates that the device not belonging to the access group 1 of the Cell 1 is prohibited from accessing the Cell 1, the terminal device considers that the Cell 1 is a Barred Cell (Barred Cell).
This case is intended to illustrate that the terminal device considers that the cells other than the member cells that do not belong to the access group to which the terminal device belongs are cells to which access is prohibited, or that the frequency points corresponding to the cells other than the member cells that do not belong to the access group to which the terminal device belongs are frequency points to which access is prohibited.
Optionally, in another implementation manner of the second example, the step 102 may include: and selecting a suitable (able) cell from the first candidate cells as an access cell for the terminal equipment to acquire normal service.
Wherein the suitable cell may be a cell satisfying the following condition:
the signal quality meets a preset condition;
the preset system information can be acquired by the terminal equipment; and
access is not barred.
Optionally, in another implementation manner of the second example, if there is no suitable cell in the first candidate cell, the step 102 may further include: and selecting an acceptable (acceptable) cell from the second candidate cells as an access cell for the terminal equipment to acquire the limited service.
That is, on the basis of the second example, the process of selecting the access cell by the terminal device may include two stages, a first stage of selecting one cell from the first candidate cells to obtain normal service; and a second stage of selecting one cell from the second candidate cells to acquire the limited service if no suitable cell exists in the first candidate cells. Further, if there is no acceptable cell in the second cell, the scanning is continued.
In summary, in the second example, the terminal device may only use the member cell of the access group to which the terminal device belongs as the cell for acquiring the normal service (normal service), but may use the member cell of the access group to which the terminal device belongs as the cell for acquiring the limited service (limited service), or may use the cell that does not belong to the access group to which the terminal device belongs as the cell for acquiring the limited service (limited service).
For example, if the terminal device belongs to access group 1, but the scanned cell 1 does not belong to access group 1, the terminal device cannot treat cell 1 as a cell that can acquire normal service (e.g., the terminal device cannot set cell 1 to "suiteable"). For another example, if the terminal device belongs to the access group 1 and the scanned cell 1 and cell 2 also belong to the access group 1, the terminal device may use the cell 1 and cell 2 as cells that can acquire normal services, for example, the terminal device may set the cell 1 and cell 2 as "viable cells" and cannot set the cell 1 and cell 2 as "viable cells" for other cells.
For another example, if the terminal device belongs to the access group 1, but the scanned cell 1 does not belong to the access group 1, the terminal device may use the cell 1 as a cell for acquiring the restricted service (e.g., the terminal device sets the cell 1 to "acceptable cell"); for another example, if the terminal device belongs to the access group 1 and the member cells of the access group 1 include the cell 1 and the cell 2, the terminal device may use other cells except the cell 1 and the cell 2 as the cells for acquiring the restricted service (e.g., the terminal device may set other cells except the cell 1 and the cell 2 as "acceptable cells").
Third example
In a third example, the terminal device may have access group capability, but the network device does not configure the access group to which the terminal device belongs, that is, the terminal device does not belong to any access group. At this time, the target access information includes access group information broadcasted by the cell.
Optionally, in an implementation manner of the third example, step 101 may include: determining whether the scanned cell belongs to at least one access group based on the target access group information; and when the scanned cell does not belong to any access group, determining the scanned cell as a first candidate cell allowing the terminal equipment to access.
For example, when the scanned Cell is a normal Cell (normal Cell), the Cell may be regarded as the first candidate Cell.
Optionally, in another implementation manner of the third example, the method shown in fig. 1 may further include: when the scanned cell meets a fifth preset condition, prohibiting the terminal equipment from accessing the scanned cell or a frequency point corresponding to the scanned cell; wherein the fifth preset condition includes that the scanned cell belongs to a fifth access group.
This embodiment is intended to illustrate that, when a scanned cell belongs to a certain access group, the terminal device considers the cell as a cell prohibited from accessing. For example, if it is shown in the access group information broadcast by the Cell 1 that the Cell 1 belongs to the access group 1, the terminal device considers that the Cell 1 is a Cell (Barred Cell) which is prohibited from accessing, or the terminal device considers that a Frequency point corresponding to the Cell 1 is a Frequency point (Barred Frequency) which is prohibited from accessing.
Still further, in another implementation manner of the third example, the fifth preset condition may further include: the scanned cell is a cell set to a designated purpose.
This embodiment is intended to illustrate that when the terminal device determines that the scanned cell belongs to a specific access group and determines that the cell is set for a specific use access, the terminal device considers the cell as a cell for which access is prohibited. For example, the terminal device detects that the Cell 1 belongs to the access group 1, and a message broadcasted by the Cell 1 shows that a value of "Cell Reserved For other use" is "true", then the terminal device considers that the Cell 1 is a Cell (Barred Cell) which is prohibited from accessing.
Or, still further, in another implementation manner of the third example, the fifth preset condition further includes: the scanned cell is a cell set to a designated purpose, and the terminal device receives fifth indication information from a network device, where the fifth indication information is used to indicate that devices not belonging to the fifth access group are prohibited from accessing the fifth access group.
The embodiment is intended to illustrate that, when the terminal device determines that the scanned cell belongs to a specific access group, determines that the cell is set to be access for a specific purpose, and receives the indication information of the network device indicating that the cell is prohibited from being accessed to a device not belonging to the access group to which the cell belongs, the terminal device considers the cell as a cell prohibited from being accessed. For example, when the terminal device detects that the Cell 1 belongs to the access group 1, and a message broadcasted by the Cell 1 shows that a value of "Cell Reserved for other Use" is "true", and the network side indicates that the Cell 1 prohibits access by a device not belonging to the access group 1 to which the Cell 1 belongs, the terminal device considers that the Cell 1 is a Barred Cell (Barred Cell).
Still further, in another implementation manner of the third example, the method shown in fig. 1 may further include: and determining the time for forbidding the terminal equipment to access the access object corresponding to the scanned cell. Wherein the time may be agreed upon by the network device configuration and/or protocol.
For example, the terminal device may set a time duration for prohibiting access to the cell, such as 300 seconds, or always prohibited (infinite), according to the network device configuration or protocol convention.
For another example, the terminal device may set a time duration for prohibiting access to the frequency point, for example, 300 seconds, or always prohibited (infinite), according to the network device configuration or protocol convention.
Optionally, in another implementation manner of the third example, step 101 may include:
and when the scanned cell meets a sixth preset condition based on the target access group information, determining the scanned cell as a second candidate cell allowing the terminal equipment to access.
Wherein the sixth preset condition includes that the scanned cell belongs to a sixth access group; or, the sixth preset condition includes that the scanned cell does not belong to any access group.
This embodiment is intended to illustrate that the terminal device may use the scanned normal cell as the second candidate cell for acquiring the restricted service, or may use the scanned cell belonging to a certain access group as the second candidate cell for acquiring the restricted service.
Further, in another implementation manner of the third example, the sixth preset condition may further include: the scanned cells are set as the cells of the designated purpose, and the terminal equipment receives sixth indication information from network equipment, wherein the sixth indication information is used for indicating that the equipment which does not belong to the sixth access group is allowed to access the cells belonging to the sixth access group.
This embodiment is intended to illustrate that if the scanned cell is set to be access for a specific purpose, while the terminal device receives that the cell belongs to a specific access group, and the terminal device receives that the indication information on the network side indicates that the cell allows access to devices not belonging to the access group to which the cell belongs, the terminal device considers the cell as an access-allowed cell. For example, when the terminal device detects that the Cell 1 belongs to the access group 1, and a message broadcasted by the Cell 1 shows that a value of "Cell Reserved for other Use" is "true", and the network side indicates that the Cell 1 allows a device not belonging to the access group 1 to which the Cell 1 belongs to access, the terminal device considers that the Cell 1 is a Cell (Barred Cell) which allows access.
Optionally, in another implementation manner of the third example, the step 102 may include: and selecting a suitable (able) cell from the first candidate cells as an access cell for the terminal equipment to acquire normal service.
Wherein the suitable cell may be a cell satisfying the following condition:
the signal quality meets a preset condition;
the preset system information can be acquired by the terminal equipment; and
access is not barred.
Optionally, in another implementation manner of the third example, if there is no suitable cell in the first candidate cell, the step 102 may further include: and selecting an acceptable (acceptable) cell from the second candidate cells as an access cell for the terminal equipment to acquire the limited service.
That is to say, on the basis of the third example, the process of selecting the access cell by the terminal device may also include two stages, in the first stage, one cell is selected from the first candidate cells to obtain normal service; and a second stage of selecting one cell from the second candidate cells to acquire the limited service if no suitable cell exists in the first candidate cells. Further, if there is no acceptable cell in the second cell, the scanning is continued.
In summary, in the third example, the terminal device may use a normal cell (not belonging to any access group) as a cell for acquiring a normal service (normal service), or may use a normal cell or a cell belonging to a certain access group as a cell for acquiring a limited service (limited service).
The method for determining the access cell in the non-independent non-public network provided by the embodiment of the invention can determine the candidate cells firstly, and then select one cell from the candidate cells as the access cell of the terminal equipment, so that the specific terminal equipment in the non-independent non-public network can be ensured to be correctly accessed into the specific cell to obtain the service. In addition, according to the scheme, the cell scanning range can be reduced according to at least one of the frequency point information corresponding to the access group to which the terminal equipment additionally configured belongs and the cell information belonging to the access group to which the terminal equipment belongs, so that the power consumption of the terminal equipment can be reduced.
It should be noted that, in the embodiment of this specification, the first access group, the second access group to the sixth access group are names introduced for the purpose of description, and they may be the same access group or different access groups, and do not limit the technical solution provided by the embodiment of the present invention.
The above describes an access cell determination method applied to a non-standalone non-public network of a terminal device, and an information configuration method applied to a network device is described below.
As shown in fig. 2, an information configuration method provided in an embodiment of the present invention may include:
step 201, sending configuration information, where the configuration information is used to configure access group information of a terminal device.
The access group information includes information (e.g., an access group list) for determining an access group to which the terminal device belongs, and the access group information further includes at least one of frequency point information corresponding to the access group to which the terminal device belongs and cell information belonging to the access group to which the terminal device belongs.
The access group list may be used for the terminal device to determine the access group to which the terminal device belongs.
The frequency point information corresponding to the access group to which the terminal device belongs can be used for the terminal device to determine a target frequency point to be scanned, and the target frequency point can only include a frequency point corresponding to a cell belonging to the access group to which the terminal device belongs, so that the scanning range of the terminal device can be reduced, and the power consumption of the terminal device can be reduced.
The cell information of the access group to which the terminal device belongs may be used for the terminal device to determine a target cell that the terminal device needs to scan, and the target cell may only include a cell belonging to the access group to which the terminal device belongs, which may also reduce the scanning range of the terminal device, thereby reducing the power consumption of the terminal device.
The above description is provided for the information configuration method applied to the network device, and since the method corresponds to the above access cell determination method applied to the non-standalone non-public network of the terminal device, the description is brief, and for the relevant points, refer to the above description for the access object determination method applied to the terminal device.
A terminal device and a network device according to an embodiment of the present invention will be described below with reference to fig. 3 and 4.
Fig. 3 shows a schematic structural diagram of a terminal device according to an embodiment of the present invention, and as shown in fig. 3, the terminal device 300 includes: a first determination module 301 and a selection module 302.
A first determining module 301, configured to determine a candidate cell to which the terminal device is allowed to access based on target access group information, where the target access group information includes at least one of access group information of the terminal device and access group information of the cell.
The access group information of the terminal device may include information (e.g., an access group list) for determining an access group to which the terminal device belongs, such as identification information of the access group to which the terminal device belongs. In addition, the access group information of the terminal device may further include at least one of frequency point information corresponding to an access group to which the terminal device belongs and cell information and the like belonging to the access group to which the terminal device belongs.
The access group information of the cell may be information of an access group to which the cell is broadcasted by the cell scanned by the terminal device, such as identification information of the access group to which the cell belongs, identification information of other members in the access group to which the cell belongs, and the like.
Optionally, the terminal device 300 may further include: a receiving module, configured to receive configuration information from a network device before determining a candidate cell allowing the terminal device to access, where the configuration information is used to configure access group information of the terminal device, and the access group information of the terminal device includes information used to determine an access group to which the terminal device belongs.
A selecting module 302, configured to select a cell from the candidate cells as an access cell of the terminal device.
The process of determining candidate cells by the first determining module 301 and the process of selecting an access cell by the selecting module 302 are described below by three examples.
First example
In a first example, the network device configures an access group list to which the terminal device belongs in advance for the terminal device, that is, the terminal device belongs to at least one access group.
In one implementation of the first example, the first determining module 301 may be configured to: and when the scanned cell is determined to belong to the access group to which the terminal equipment belongs based on the target access group information, determining the scanned cell as a first candidate cell allowing the terminal equipment to access.
Whether the scanned cell belongs to the access group to which the terminal device belongs or not can be determined by at least one of the access group information of the terminal device and the access group information broadcasted by the scanned cell.
In another implementation manner of the first example, if the access group information of the terminal device, configured by the network device to the terminal device, includes frequency point information corresponding to an access group to which the terminal device belongs, the terminal device 300 may further include: and the second determining module is used for determining a target frequency point to be scanned according to the access group information of the terminal equipment before determining the candidate cell, and the target frequency point can only comprise a frequency point corresponding to a cell belonging to the access group to which the terminal equipment belongs, so that the scanning range of the terminal equipment is reduced, and the power consumption of the terminal equipment is reduced.
In another implementation manner of the first example, if the access group information of the terminal device configured by the network device to the terminal device includes cell information belonging to an access group to which the terminal device belongs, the terminal device 300 may further include: a third determining module, configured to determine, before determining the candidate cell, a target cell to be scanned according to the access group information of the terminal device, where the target cell may only include cells belonging to an access group to which the terminal device belongs, so as to narrow a scanning range of the terminal device and reduce power consumption of the terminal device.
Further, the terminal device 300 shown in fig. 3 may further include: and the first forbidding module is used for forbidding the terminal equipment to access the scanned cell or the frequency point corresponding to the scanned cell when the scanned cell does not belong to the access group to which the terminal equipment belongs.
Further, the terminal device 300 shown in fig. 3 may further include: and the first time determining module is used for determining the time for forbidding the terminal equipment to access the access object corresponding to the scanned cell. Wherein the time may be agreed upon by the network device configuration and/or protocol.
It will be appreciated that the first example is intended to illustrate that a terminal device may only be allowed to access member cells of the access group to which the terminal device belongs, and not non-member cells of the access group to which the terminal device belongs. As the name implies, a non-member cell of an access group is a cell that is not a member of the access group.
Further, on the basis of the first example, the selection module 302 may be configured to: and selecting a suitable cell from the first candidate cells as an access cell of the terminal equipment.
Wherein the suitable cell may be a cell satisfying the following condition:
the signal quality meets a preset condition;
the preset system information can be acquired by the terminal equipment; and
access is not barred.
Second example
In a second example, the network device configures, in advance, an access group list to which the terminal device belongs to the terminal device, that is, the terminal device belongs to at least one access group.
Optionally, in an implementation manner of the second example, the first determining module 301 may be configured to: and when the scanned cell is determined to belong to the access group to which the terminal equipment belongs based on the target access group information, determining the scanned cell as a first candidate cell allowing the terminal equipment to access.
Whether the scanned cell belongs to the access group to which the terminal device belongs or not can be determined by at least one of the access group information of the terminal device and the access group information broadcasted by the scanned cell.
Further, the first determination module 301 may be configured to: when the scanned cell belongs to an access group to which the terminal equipment belongs and meets a first preset condition, determining the scanned cell as a first candidate cell allowing the terminal equipment to access; wherein the first preset condition comprises: the terminal equipment receives first indication information from network equipment, wherein the first indication information is used for indicating that the terminal equipment is allowed to access the scanned cell.
That is, when the scanned cell belongs to a certain access group, the terminal device also belongs to the access group, and the terminal device receives the first indication information from the network device to indicate that the terminal device can access the cell, the UE considers the cell as an accessible cell.
Optionally, in another implementation manner of the second example, the terminal device 300 shown in fig. 3 may further include: and the second forbidding module is used for forbidding the terminal equipment to access the scanned cell or the frequency point corresponding to the scanned cell when the scanned cell meets a second preset condition.
Wherein the second preset condition comprises: and the scanned cell belongs to a second access group to which the terminal equipment belongs, and the terminal equipment receives second indication information from network equipment, wherein the second indication information is used for indicating that the terminal equipment is forbidden to access the scanned cell.
That is to say, although the cell scanned by the terminal device is a member cell of the access group to which the terminal device belongs, when the network device indicates that the terminal device is prohibited from accessing the cell through the second indication information, the terminal device regards that the cell is a cell prohibited from accessing or a frequency point corresponding to the cell is a frequency point prohibited from accessing.
Further, the terminal device 300 shown in fig. 3 may further include: and a second time determination module, configured to determine a time for prohibiting the terminal device from accessing the access object corresponding to the scanned cell. Wherein the time may be agreed upon by the network device configuration and/or protocol.
Optionally, in another implementation manner of the second example, the first determining module 301 may be configured to: and when the scanned cell meets a third preset condition, determining the scanned cell as a second candidate cell allowing the terminal equipment to access.
As a case, the third preset condition includes that the scanned cell does not belong to any access group to which the terminal device belongs. This scenario is intended to illustrate that a terminal device may acquire a restricted service by accessing a cell that does not belong to the access group to which the terminal device belongs.
More specifically, the third preset condition includes: the scanned cell is a cell set to a designated purpose, the scanned cell belongs to a third access group, the terminal device does not belong to the third access group, and the terminal device receives third indication information from a network device, wherein the third indication information is used for indicating that a device which does not belong to the third access group is allowed to access the cell belonging to the third access group.
As another case, the third preset condition may include that the scanned cell belongs to at least one access group to which the terminal device belongs. This scenario is intended to illustrate that a terminal device may also acquire a restricted service by accessing a cell belonging to an access group to which the terminal device belongs.
Optionally, in another implementation manner of the second example, the terminal device 300 shown in fig. 3 may further include: and the third forbidding module is used for forbidding the terminal equipment to access the scanned cell or the frequency point corresponding to the scanned cell when the scanned cell meets a fourth preset condition.
As a case, the fourth preset condition specifically includes: the scanned cell is a cell set to a designated purpose, the scanned cell belongs to a fourth access group, and the terminal device does not belong to the fourth access group.
As another case, the fourth preset condition includes: the scanned cell is a cell set to a designated purpose, the scanned cell belongs to a fourth access group, the terminal device does not belong to the fourth access group, and the terminal device receives fourth indication information from a network device, wherein the fourth indication information is used for indicating that a device which does not belong to the fourth access group is forbidden to access the cell belonging to the fourth access group.
This case is intended to illustrate that the terminal device considers that the cells other than the member cells that do not belong to the access group to which the terminal device belongs are cells to which access is prohibited, or that the frequency points corresponding to the cells other than the member cells that do not belong to the access group to which the terminal device belongs are frequency points to which access is prohibited.
Optionally, in another implementation manner of the second example, the selecting module 302 may include:
a first selecting sub-module, configured to select a suitable (able) cell from the first candidate cells as an access cell for the terminal device to obtain normal service.
Wherein the suitable cell may be a cell satisfying the following condition:
the signal quality meets a preset condition;
the preset system information can be acquired by the terminal equipment; and
access is not barred.
Optionally, in another implementation manner of the second example, if there is no suitable cell in the first candidate cell, the selecting module 302 may further include: and a second selection submodule, configured to select an acceptable (acceptable) cell from the second candidate cells, as an access cell for the terminal device to acquire the limited service.
That is, on the basis of the second example, the process of selecting the access cell by the terminal device may include two stages, a first stage of selecting one cell from the first candidate cells to obtain normal service; and a second stage of selecting one cell from the second candidate cells to acquire the limited service if no suitable cell exists in the first candidate cells. Further, if there is no acceptable cell in the second cell, the scanning is continued.
In summary, in the second example, the terminal device may only use the member cell of the access group to which the terminal device belongs as the cell for acquiring the normal service (normal service), but may use the member cell of the access group to which the terminal device belongs as the cell for acquiring the limited service (limited service), or may use the cell that does not belong to the access group to which the terminal device belongs as the cell for acquiring the limited service (limited service).
Third example
In a third example, the terminal device may have access group capability, but the network device does not configure the access group to which the terminal device belongs, that is, the terminal device does not belong to any access group. At this time, the target access information includes access group information broadcasted by the cell.
Optionally, in an implementation manner of the third example, the first determining module 301 may be configured to: determining whether the scanned cell belongs to at least one access group based on the target access group information; and when the scanned cell does not belong to any access group, determining the scanned cell as a first candidate cell allowing the terminal equipment to access.
Optionally, in another implementation manner of the third example, the terminal device 300 shown in fig. 3 may further include: a fourth prohibiting module, configured to prohibit the terminal device from accessing the scanned cell or a frequency point corresponding to the scanned cell when the scanned cell meets a fifth preset condition; wherein the fifth preset condition includes that the scanned cell belongs to a fifth access group.
This embodiment is intended to illustrate that, when a scanned cell belongs to a certain access group, the terminal device considers the cell as a cell prohibited from accessing.
Still further, in another implementation manner of the third example, the fifth preset condition may further include: the scanned cell is a cell set to a designated purpose.
This embodiment is intended to illustrate that when the terminal device determines that the scanned cell belongs to a specific access group and determines that the cell is set for a specific use access, the terminal device considers the cell as a cell for which access is prohibited.
Or, still further, in another implementation manner of the third example, the fifth preset condition further includes: the scanned cell is a cell set to a designated purpose, and the terminal device receives fifth indication information from a network device, where the fifth indication information is used to indicate that devices not belonging to the fifth access group are prohibited from accessing the fifth access group.
The embodiment is intended to illustrate that, when the terminal device determines that the scanned cell belongs to a specific access group, determines that the cell is set to be access for a specific purpose, and receives the indication information of the network device indicating that the cell is prohibited from being accessed to a device not belonging to the access group to which the cell belongs, the terminal device considers the cell as a cell prohibited from being accessed.
Further, in another implementation manner of the third example, the terminal device 300 shown in fig. 3 may further include: and a fourth time determination module, configured to determine a time for prohibiting the terminal device from accessing the access object corresponding to the scanned cell. Wherein the time may be agreed upon by the network device configuration and/or protocol.
Optionally, in another implementation manner of the third example, the first determining module 301 may be configured to: and when the scanned cell meets a sixth preset condition based on the target access group information, determining the scanned cell as a second candidate cell allowing the terminal equipment to access.
Wherein the sixth preset condition includes that the scanned cell belongs to a sixth access group; or, the sixth preset condition includes that the scanned cell does not belong to any access group.
This embodiment is intended to illustrate that the terminal device may use the scanned normal cell as the second candidate cell for acquiring the restricted service, or may use the scanned cell belonging to a certain access group as the second candidate cell for acquiring the restricted service.
Further, in another implementation manner of the third example, the sixth preset condition may further include: the scanned cells are set as the cells of the designated purpose, and the terminal equipment receives sixth indication information from network equipment, wherein the sixth indication information is used for indicating that the equipment which does not belong to the sixth access group is allowed to access the cells belonging to the sixth access group.
This embodiment is intended to illustrate that if the scanned cell is set to be access for a specific purpose, while the terminal device receives that the cell belongs to a specific access group, and the terminal device receives that the indication information on the network side indicates that the cell allows access to devices not belonging to the access group to which the cell belongs, the terminal device considers the cell as an access-allowed cell.
Optionally, in another implementation manner of the third example, the selecting module 302 may include: a first selecting sub-module, configured to select a suitable (able) cell from the first candidate cells as an access cell for the terminal device to obtain normal service.
Wherein the suitable cell may be a cell satisfying the following condition:
the signal quality meets a preset condition;
the preset system information can be acquired by the terminal equipment; and
access is not barred.
Optionally, in another implementation manner of the third example, if there is no suitable cell in the first candidate cell, the selecting module 302 may further include: and a second selection submodule, configured to select an acceptable (acceptable) cell from the second candidate cells, as an access cell for the terminal device to acquire the limited service.
That is, on the basis of the third example, the process of selecting an access cell by the terminal device may include two stages, a first stage of selecting one cell from the first candidate cells to obtain normal service; and a second stage of selecting one cell from the second candidate cells to acquire the limited service if no suitable cell exists in the first candidate cells. Further, if there is no acceptable cell in the second cell, the scanning is continued.
In summary, in the third example, the terminal device may use a normal cell (not belonging to any access group) as a cell for acquiring a normal service (normal service), or may use a normal cell or a cell belonging to a certain access group as a cell for acquiring a limited service (limited service).
The terminal device 300 according to the embodiment of the present invention may determine candidate cells first, and then select a cell from the candidate cells as an access cell for the terminal device, so as to ensure that a specific terminal device in a non-independent non-public network can correctly access a specific cell to obtain a service. In addition, according to the scheme, the cell scanning range can be reduced according to at least one of frequency point information corresponding to an access group to which the terminal equipment additionally configured belongs and cell information and the like belonging to the access group to which the terminal equipment belongs, so that the power consumption of the terminal equipment can be reduced.
The apparatus shown in fig. 3 may be used to implement various embodiments of the method for determining an access cell in a non-standalone non-public network shown in fig. 1, and please refer to the above method embodiments for related matters.
As shown in fig. 4, an embodiment of the present invention further provides a network device 400, including:
the sending module 401 sends configuration information, where the configuration information is used to configure access group information of a terminal device.
The access group information includes information (e.g., an access group list) for determining an access group to which the terminal device belongs, and the access group information further includes at least one of frequency point information corresponding to the access group to which the terminal device belongs and cell information belonging to the access group to which the terminal device belongs.
The access group list may be used for the terminal device to determine the access group to which the terminal device belongs.
The frequency point information corresponding to the access group to which the terminal device belongs can be used for the terminal device to determine a target frequency point to be scanned, and the target frequency point can only include a frequency point corresponding to a cell belonging to the access group to which the terminal device belongs, so that the scanning range of the terminal device can be reduced, and the power consumption of the terminal device can be reduced.
The cell information of the access group to which the terminal device belongs may be used for the terminal device to determine a target cell that the terminal device needs to scan, and the target cell may only include a cell belonging to the access group to which the terminal device belongs, which may also reduce the scanning range of the terminal device, thereby reducing the power consumption of the terminal device.
The network device shown in fig. 4 may be used to implement various embodiments of the information configuring method shown in fig. 2, and please refer to the above method embodiments for relevant points.
Fig. 5 is a schematic structural diagram of a terminal device according to another embodiment of the present invention. The terminal device 500 shown in fig. 5 includes: at least one processor 501, memory 502, at least one network interface 504, and a user interface 503. The various components in the terminal device 500 are coupled together by a bus system 505. It is understood that the bus system 505 is used to enable connection communications between these components. The bus system 505 includes a power bus, a control bus, and a status signal bus in addition to a data bus. For clarity of illustration, however, the various buses are labeled as bus system 505 in FIG. 5.
The user interface 503 may include, among other things, a display, a keyboard, or a pointing device (e.g., a mouse, trackball, touch pad, or touch screen, among others.
It is to be understood that the memory 502 in embodiments of the present invention may be either volatile memory or nonvolatile memory, or may include both volatile and nonvolatile memory. The non-volatile memory may be a Read-only memory (ROM), a Programmable ROM (PROM), an Erasable PROM (EPROM), an Electrically Erasable PROM (EEPROM), or a flash memory. Volatile Memory can be Random Access Memory (RAM), which acts as external cache Memory. By way of illustration, and not limitation, many forms of RAM are available, such as Static random access memory (Static RAM, SRAM), Dynamic Random Access Memory (DRAM), Synchronous Dynamic random access memory (Synchronous DRAM, SDRAM), Double Data Rate Synchronous Dynamic Random Access Memory (DDRSDRAM), Enhanced Synchronous SDRAM (ESDRAM), Sync Link DRAM (SLDRAM), and direct memory bus RAM (DRRAM). The memory 502 of the subject systems and methods described in connection with the embodiments of the invention is intended to comprise, without being limited to, these and any other suitable types of memory.
In some embodiments, memory 502 stores elements, executable modules or data structures, or a subset thereof, or an expanded set thereof as follows: an operating system 5021 and application programs 5022.
The operating system 5021 includes various system programs, such as a framework layer, a core library layer, a driver layer, and the like, and is used for implementing various basic services and processing hardware-based tasks. The application 5022 includes various applications, such as a media player (MediaPlayer), a Browser (Browser), and the like, for implementing various application services. The program for implementing the method according to the embodiment of the present invention may be included in the application program 5022.
In this embodiment of the present invention, the terminal device 500 further includes: a computer program stored in the memory 502 and capable of running on the processor 501, where the computer program, when executed by the processor 501, implements each process of the above-mentioned method for determining an access cell in a non-standalone non-public network, and can achieve the same technical effect, and is not described herein again to avoid repetition.
The method disclosed by the above-mentioned embodiments of the present invention may be applied to the processor 501, or implemented by the processor 501. The processor 501 may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method may be performed by integrated logic circuits of hardware or instructions in the form of software in the processor 501. The Processor 501 may be a general-purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf programmable Gate Array (FPGA) or other programmable logic device, discrete Gate or transistor logic device, or discrete hardware components. The various methods, steps and logic blocks disclosed in the embodiments of the present invention may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in connection with the embodiments of the present invention may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor. The software modules may reside in ram, flash memory, rom, prom, or eprom, registers, among other computer-readable storage media known in the art. The computer readable storage medium is located in the memory 502, and the processor 501 reads the information in the memory 502 and performs the steps of the above method in combination with the hardware thereof. In particular, the computer readable storage medium has stored thereon a computer program which, when being executed by the processor 501, realizes the steps of the embodiments of the method for determining an access cell in a non-standalone non-public network as described above.
Referring to fig. 6, fig. 6 is a structural diagram of a network device applied in the embodiment of the present invention, which can implement details of the information configuration method and achieve the same effect. As shown in fig. 6, the network device 600 includes: a processor 601, a transceiver 602, a memory 603, a user interface 604, and a bus interface, wherein:
in this embodiment of the present invention, the network device 600 further includes: the computer program is stored in the memory 603 and can be executed on the processor 601, and when being executed by the processor 601, the computer program implements each process of the information configuration method, and can achieve the same technical effect, and in order to avoid repetition, the computer program is not described herein again.
In fig. 6, the bus architecture may include any number of interconnected buses and bridges, with various circuits being linked together, in particular at least one processor represented by the processor 601 and a memory represented by the memory 603. The bus architecture may also link together various other circuits such as peripherals, voltage regulators, power management circuits, and the like, which are well known in the art, and therefore, will not be described any further herein. The bus interface provides an interface. The transceiver 602 may be a number of elements including a transmitter and a receiver that provide a means for communicating with various other apparatus over a transmission medium. The user interface 604 may also be an interface capable of interfacing with a desired device for different end devices, including but not limited to a keypad, display, speaker, microphone, joystick, etc.
The processor 601 is responsible for managing the bus architecture and general processing, and the memory 603 may store data used by the processor 601 in performing operations.
It is to be understood that the embodiments described herein may be implemented in hardware, software, firmware, middleware, microcode, or any combination thereof. For a hardware implementation, the processing unit may be implemented in at least one Application Specific Integrated Circuit (ASIC), a Digital Signal Processor (DSP), a Digital Signal Processing Device (DSPD), a Programmable Logic Device (PLD), a Field Programmable Gate Array (FPGA), a general purpose processor, a controller, a microcontroller, a microprocessor, other electronic units for performing the functions of the invention, or a combination thereof.
For a software implementation, the techniques described in this disclosure may be implemented with modules (e.g., procedures, functions, and so on) that perform the functions described in this disclosure. The software codes may be stored in a memory and executed by a processor. The memory may be implemented within the processor or external to the processor.
An embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when executed by a processor, the computer program implements each process of the foregoing method for determining an access cell in a non-standalone non-public network or the foregoing method for configuring information, and can achieve the same technical effect, and in order to avoid repetition, the detailed description is omitted here. The computer-readable storage medium may be a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk.
An embodiment of the present invention further provides a computer program product including instructions, and when a computer runs the instructions of the computer program product, the computer executes the method for determining an access cell or the method for configuring information in the non-standalone non-public network. In particular, the computer program product may be run on the network device described above.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the embodiments provided in the present invention, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
The above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention, and all the changes or substitutions should be covered within the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (26)

1. A method for determining an access cell under a non-independent non-public network is applied to a terminal device, and the method comprises the following steps:
determining a candidate cell allowing the terminal device to access based on target access group information, wherein the target access group information comprises at least one of access group information of the terminal device and access group information of the cell;
and selecting one cell from the candidate cells as an access cell of the terminal equipment.
2. The method of claim 1, wherein prior to determining the candidate cells for allowing the terminal device to access based on the target access group information, the method further comprises:
receiving configuration information from a network device, wherein the configuration information is used for configuring access group information of the terminal device, and the access group information of the terminal device comprises information used for determining an access group to which the terminal device belongs.
3. The method of claim 2,
the determining the candidate cell allowing the terminal device to access based on the target access group information includes:
and when the scanned cell is determined to belong to the access group to which the terminal equipment belongs based on the target access group information, determining the scanned cell as a first candidate cell allowing the terminal equipment to access.
4. The method of claim 3,
the access group information of the terminal device further includes frequency point information corresponding to an access group to which the terminal device belongs, and before determining a candidate cell allowing the terminal device to access based on the target access group information, the method further includes:
and determining scanned target frequency points based on the access group information of the terminal equipment, wherein the target frequency points comprise frequency points corresponding to cells belonging to the access group to which the terminal equipment belongs.
5. The method of claim 3,
the access group information of the terminal device further includes cell information belonging to an access group to which the terminal device belongs, and before determining a candidate cell allowing the terminal device to access based on the target access group information, the method further includes:
and determining a scanned target cell based on the access group information of the terminal equipment, wherein the target cell comprises a cell belonging to the access group to which the terminal equipment belongs.
6. The method according to any one of claims 3-5, further comprising:
and when the scanned cell does not belong to the access group to which the terminal equipment belongs, prohibiting the terminal equipment from accessing the scanned cell or the frequency point corresponding to the scanned cell.
7. The method of claim 3,
determining, when it is determined that the scanned cell belongs to the access group to which the terminal device belongs based on the target access group information, the scanned cell as a first candidate cell allowing the terminal device to access, including:
when the scanned cell belongs to an access group to which the terminal equipment belongs and meets a first preset condition, determining the scanned cell as a first candidate cell allowing the terminal equipment to access;
wherein the first preset condition comprises: the terminal equipment receives first indication information from network equipment, wherein the first indication information is used for indicating that the terminal equipment is allowed to access the scanned cell.
8. The method of claim 3 or 7, further comprising:
when the scanned cell meets a second preset condition, prohibiting the terminal equipment from accessing the scanned cell or a frequency point corresponding to the scanned cell;
wherein the second preset condition comprises: and the scanned cell belongs to a second access group to which the terminal equipment belongs, and the terminal equipment receives second indication information from network equipment, wherein the second indication information is used for indicating that the terminal equipment is forbidden to access the scanned cell.
9. The method of claim 3, wherein the determining candidate cells for allowing the terminal device to access based on the target access group information further comprises:
when the scanned cell meets a third preset condition, determining the scanned cell as a second candidate cell allowing the terminal device to access;
the third preset condition includes that the scanned cell does not belong to any access group to which the terminal device belongs; or, the third preset condition includes that the scanned cell belongs to at least one access group to which the terminal device belongs.
10. The method of claim 9,
the third preset condition includes: the scanned cell is a cell set to a designated purpose, the scanned cell belongs to a third access group, the terminal device does not belong to the third access group, and the terminal device receives third indication information from a network device, wherein the third indication information is used for indicating that a device which does not belong to the third access group is allowed to access the cell belonging to the third access group.
11. The method of claim 9 or 10, further comprising:
when the scanned cell meets a fourth preset condition, prohibiting the terminal equipment from accessing the scanned cell or a frequency point corresponding to the scanned cell; wherein the content of the first and second substances,
the fourth preset condition includes: the scanned cell is a cell set to a designated purpose, the scanned cell belongs to a fourth access group, and the terminal device does not belong to the fourth access group;
alternatively, the first and second electrodes may be,
the fourth preset condition includes: the scanned cell is a cell set to a designated purpose, the scanned cell belongs to a fourth access group, the terminal device does not belong to the fourth access group, and the terminal device receives fourth indication information from a network device, wherein the fourth indication information is used for indicating that a device which does not belong to the fourth access group is forbidden to access the cell belonging to the fourth access group.
12. The method of claim 1,
the terminal device does not belong to any access group, the target access information includes access group information broadcasted by a cell, wherein the determining a candidate cell allowing the terminal device to access based on the target access group information includes:
determining whether the scanned cell belongs to at least one access group based on the target access group information;
and when the scanned cell does not belong to any access group, determining the scanned cell as a first candidate cell allowing the terminal equipment to access.
13. The method of claim 12, further comprising:
when the scanned cell meets a fifth preset condition, prohibiting the terminal equipment from accessing the scanned cell or a frequency point corresponding to the scanned cell;
wherein the fifth preset condition includes that the scanned cell belongs to a fifth access group.
14. The method of claim 13,
the fifth preset condition further includes: the scanned cell is a cell set to a designated purpose; alternatively, the first and second electrodes may be,
the fifth preset condition further includes: the scanned cell is a cell set to a designated purpose, and the terminal device receives fifth indication information from a network device, where the fifth indication information is used to indicate that devices not belonging to the fifth access group are prohibited from accessing the fifth access group.
15. The method according to claim 7 or 12, wherein the selecting a cell from the candidate cells as the access cell of the terminal device comprises:
and selecting a cell from the first candidate cells as an access cell for the terminal equipment to acquire normal service.
16. The method of claim 1, further comprising:
the terminal device does not belong to any access group, the target access information includes access group information broadcasted by a cell, wherein the determining a candidate cell allowing the terminal device to access based on the target access group information includes:
when the scanned cell meets a sixth preset condition based on the target access group information, determining the scanned cell as a second candidate cell allowing the terminal equipment to access;
wherein the sixth preset condition includes that the scanned cell belongs to a sixth access group; or, the sixth preset condition includes that the scanned cell does not belong to any access group.
17. The method of claim 16,
the sixth preset condition further includes: the scanned cells are set as the cells of the designated purpose, and the terminal equipment receives sixth indication information from network equipment, wherein the sixth indication information is used for indicating that the equipment which does not belong to the sixth access group is allowed to access the cells belonging to the sixth access group.
18. The method according to claim 9 or 16, wherein the selecting a cell from the candidate cells as the access cell of the terminal device comprises:
and selecting a cell from the second candidate cells as an access cell for the terminal equipment to acquire the limited service.
19. The method of any one of claims 6, 8, 11, and 13, further comprising:
and determining the time for forbidding the terminal equipment to access the access object corresponding to the scanned cell.
20. The method of claim 19,
the time is agreed upon by the network device configuration and/or protocol.
21. An information configuration method, applied to a network device, the method comprising:
sending configuration information, wherein the configuration information is used for configuring access group information of terminal equipment;
the access group information includes information for determining an access group to which the terminal device belongs, and the access group information further includes at least one of frequency point information corresponding to the access group to which the terminal device belongs and cell information belonging to the access group to which the terminal device belongs.
22. A terminal device, characterized in that the terminal device comprises:
a first determining module, configured to determine a candidate cell allowing the terminal device to access based on target access group information, where the target access group information includes at least one of access group information of the terminal device and access group information of the cell;
and the selecting module is used for selecting one cell from the candidate cells as the access cell of the terminal equipment.
23. A network device, characterized in that the network device comprises:
a sending module, configured to send configuration information, where the configuration information is used to configure access group information of a terminal device;
the access group information includes information for determining an access group to which the terminal device belongs, and the access group information further includes at least one of frequency point information corresponding to the access group to which the terminal device belongs and cell information belonging to the access group to which the terminal device belongs.
24. A terminal device, characterized in that it comprises a memory, a processor and a wireless communication program stored on said memory and running on said processor, said wireless communication program, when executed by said processor, implementing the steps of the method according to any one of claims 1-20.
25. A network device comprising a memory, a processor, and a wireless communication program stored on the memory and executed on the processor, the wireless communication program when executed by the processor implementing the steps of the method of claim 21.
26. A computer readable medium having stored thereon a wireless communication program which, when executed by a processor, carries out the steps of the method according to any one of claims 1 to 21.
CN201910364354.7A 2019-04-30 2019-04-30 Method and equipment for determining access cell and configuring information Active CN111601346B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910364354.7A CN111601346B (en) 2019-04-30 2019-04-30 Method and equipment for determining access cell and configuring information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910364354.7A CN111601346B (en) 2019-04-30 2019-04-30 Method and equipment for determining access cell and configuring information

Publications (2)

Publication Number Publication Date
CN111601346A true CN111601346A (en) 2020-08-28
CN111601346B CN111601346B (en) 2022-06-24

Family

ID=72185403

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910364354.7A Active CN111601346B (en) 2019-04-30 2019-04-30 Method and equipment for determining access cell and configuring information

Country Status (1)

Country Link
CN (1) CN111601346B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2008306354A1 (en) * 2007-09-28 2009-04-09 Huawei Technologies Co., Ltd. A call controlling method, base station subsystem and user terminal
CN101742575A (en) * 2008-11-05 2010-06-16 华为技术有限公司 Method and system for reelecting and transmitting data for closed user group cell
CN108513322A (en) * 2018-02-07 2018-09-07 电信科学技术研究院有限公司 A kind of method, apparatus and computer storage media of determining candidate cell
CN109392036A (en) * 2017-08-10 2019-02-26 中兴通讯股份有限公司 A kind of residence reselecting, closed user group verification method and device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2008306354A1 (en) * 2007-09-28 2009-04-09 Huawei Technologies Co., Ltd. A call controlling method, base station subsystem and user terminal
CN101742575A (en) * 2008-11-05 2010-06-16 华为技术有限公司 Method and system for reelecting and transmitting data for closed user group cell
CN109392036A (en) * 2017-08-10 2019-02-26 中兴通讯股份有限公司 A kind of residence reselecting, closed user group verification method and device
CN108513322A (en) * 2018-02-07 2018-09-07 电信科学技术研究院有限公司 A kind of method, apparatus and computer storage media of determining candidate cell

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
LG ELECTRONICS: "S2-1903423 "Correction to NPN access for initial configuration and multiple IDs"", 《3GPP TSG_SA\WG2_ARCH》 *

Also Published As

Publication number Publication date
CN111601346B (en) 2022-06-24

Similar Documents

Publication Publication Date Title
CN110945914B (en) Method, device, chip system and medium for transmitting information
CN109587701B (en) Dual-resident user equipment and capability reporting method, measuring method and resident method thereof
CN109151802B (en) Access control method, base station and terminal
CN103843407A (en) Methods of modifying communication network access and related network nodes, and wireless terminals
US11234175B2 (en) Method for selecting cell, terminal device, and network device
US20210297844A1 (en) Selection of Slice-Supporting PLMNs While Roaming Away from Home Network
JP2019517195A (en) Network search method and terminal device
WO2021142576A1 (en) Wireless communication method, terminal apparatus, and network apparatus
US11457389B2 (en) Cell selection method, terminal device, and network device
CA3078410C (en) Method and apparatus for controlling restricted ue capability, and computer storage medium
CN110612745A (en) Apparatus and method for processing access type restriction information
CN109803282B (en) Method and apparatus for measuring signals
EP3965471A1 (en) Cell selection method, network device and terminal
WO2021197453A1 (en) Cell selection or reselection method and device
US11206612B2 (en) Wireless communication method and terminal device
CN111601346B (en) Method and equipment for determining access cell and configuring information
CN106550431B (en) UTRAN PLMN searching method
US11277782B2 (en) Service access method and device
WO2022198446A1 (en) Network selection method and apparatus, device and storage medium
WO2022067813A1 (en) Cell search method applied to terminal, and communication apparatus
CN113950115A (en) inter-RAT cell reselection method and terminal equipment
CN116156627A (en) Information processing method, device and readable storage medium
CN115942421A (en) Cell disabling method, device, terminal equipment and computer storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant