CN111818581B - User access method and access network equipment - Google Patents

User access method and access network equipment Download PDF

Info

Publication number
CN111818581B
CN111818581B CN202010754626.7A CN202010754626A CN111818581B CN 111818581 B CN111818581 B CN 111818581B CN 202010754626 A CN202010754626 A CN 202010754626A CN 111818581 B CN111818581 B CN 111818581B
Authority
CN
China
Prior art keywords
unit time
private network
current unit
operator
bandwidth
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010754626.7A
Other languages
Chinese (zh)
Other versions
CN111818581A (en
Inventor
杨艳
冯毅
张涛
张忠皓
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN202010754626.7A priority Critical patent/CN111818581B/en
Publication of CN111818581A publication Critical patent/CN111818581A/en
Application granted granted Critical
Publication of CN111818581B publication Critical patent/CN111818581B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/08Load balancing or load distribution
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/16Central resource management; Negotiation of resources or communication parameters, e.g. negotiating bandwidth or QoS [Quality of Service]
    • H04W28/18Negotiating wireless communication parameters
    • H04W28/20Negotiating bandwidth
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/16Central resource management; Negotiation of resources or communication parameters, e.g. negotiating bandwidth or QoS [Quality of Service]
    • H04W28/24Negotiating SLA [Service Level Agreement]; Negotiating QoS [Quality of Service]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/18Selecting a network or a communication service
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Quality & Reliability (AREA)
  • Computer Security & Cryptography (AREA)
  • Telephonic Communication Services (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides a user access method and access network equipment, relates to the technical field of communication, and solves the problem that how to meet 2B (can be understood as private network) users and 2C (can be understood as public network) users of different operators as much as possible under the condition of limited resources of a co-established shared base station. Acquiring network data of target service of each operator in N operators in current unit time; determining the bandwidth demand of the kth private network service in the current unit time according to the network data of the N operators when the RRC connection number of the kth private network service of the nth operator is greater than a first threshold value and/or the data transmission connection number of the kth private network service is greater than a second threshold value; and when the residual bandwidth of the nth operator is determined to be larger than the bandwidth demand, allowing a new user of the kth private network service to access core network equipment corresponding to the kth private network service in the current unit time.

Description

User access method and access network equipment
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a user access method and an access network device.
Background
Fifth generation mobile communication technology (5 th-generation, 5G) networks provide multiple slicing modes that can meet both consumer (customer to customer, 2C) and enterprise (business to business, 2B) needs.
The transceiving devices (e.g. access network devices) in a 5G network are typically multi-antenna devices, such as: 64 transceiving (transmitter and receiver, TR) devices, resulting in extremely high networking costs. Therefore, operators begin to seek a scheme of co-building base stations by multiple operators and performing network deployment by using the co-built base stations. Co-building a base station means that one base station can meet the needs of multiple operators, and does not concentrate the equipment of multiple operators in the same base station.
How to meet the access requirements of 2B (which can be understood as private network) users and 2C (which can be understood as public network) users of different operators as far as possible under the condition of limited resources of the co-established shared base station becomes a problem to be solved urgently.
Disclosure of Invention
The invention provides a user access method and access network equipment, which solve the problem that how to meet 2B (can be understood as private network) users and 2C (can be understood as public network) users of different operators as much as possible under the condition of limited resources of a shared base station after co-establishment becomes urgent to be solved.
In order to achieve the above purpose, the invention adopts the following technical scheme:
in a first aspect, an embodiment of the present invention provides a user access method, applied to an access network device, where the access network device provides support for public network service and private network service of an operator through a carrier wave, including: and acquiring network data of the target service of each of N operators in the current unit time. The target services comprise K private network services, the network data at least comprise RRC connection numbers and data transmission connection numbers, N is an integer greater than or equal to 2, and K is an integer greater than or equal to 1. And determining the bandwidth demand of the kth private network service in the current unit time according to the network data of the N operators when the RRC connection number of the kth private network service of the nth operator is determined to be larger than a first threshold value and/or the data transmission connection number of the kth private network service is determined to be larger than a second threshold value. Wherein n is an integer, k is an integer, and n is an integer. And when the residual bandwidth of the nth operator is determined to be larger than the bandwidth demand, allowing a new user of the kth private network service to access core network equipment corresponding to the kth private network service in the current unit time.
It can be seen that, according to the network data of the current unit time, the access network device can determine whether the RRC connection number of the kth private network service of the nth operator is greater than the first threshold value, and/or whether the data transmission connection number of the kth private network service is greater than the kth private network service of the second threshold value, so as to determine whether a new user of the kth private network service can access the core network device corresponding to the kth private network service in the current unit time. When the number of RRC connections of the kth private network service of the nth operator is determined to be greater than the first threshold value and/or the number of data transmission connections of the kth private network service is determined to be greater than the second threshold value, the method indicates that the kth private network service requests more new users to be accessed in the current unit time at the moment, so that the bandwidth demand of the kth private network service in the current unit time needs to be determined. And when the residual bandwidth of the nth operator is determined to be larger than the bandwidth demand, allowing a new user of the kth private network service to access core network equipment corresponding to the kth private network service in the current unit time. Therefore, the problem of how to meet the access requirements of 2B (which can be understood as private network) users and 2C (which can be understood as public network) users of different operators as far as possible under the condition that resources of the commonly-built shared base station are limited is solved.
In a second aspect, the present invention provides an access network device for supporting public network services and private network services of an operator through a carrier, the access network device comprising respective modules for performing the user access method of the first aspect.
Specifically, the access network device includes: an acquisition unit and a processing unit. The acquiring unit is configured to acquire network data of a target service of each of N operators in a current unit time; the target services comprise K private network services, the network data at least comprise RRC connection numbers and data transmission connection numbers, N is an integer greater than or equal to 2, and K is an integer greater than or equal to 1. And the processing unit is used for determining the bandwidth demand of the kth private network service in the current unit time according to the network data of the N operators acquired by the acquisition unit when the RRC connection number of the kth private network service of the nth operator acquired by the acquisition unit is larger than a first threshold value and/or the data transmission connection number of the kth private network service acquired by the acquisition unit is larger than a second threshold value. Wherein n is an integer, k is an integer, and n is an integer. And the processing unit is further configured to allow the new user of the kth private network service to access the core network device corresponding to the kth private network service in the current unit time when the remaining bandwidth of the nth operator is determined to be greater than the bandwidth demand.
In a third aspect, the present invention provides an access network device, comprising: communication interface, processor, memory, bus; the memory is used for storing computer execution instructions, and the processor is connected with the memory through a bus. When the access network device is running, the processor executes the computer-executable instructions stored in the memory to cause the access network device to perform the user access method as provided in the first aspect above.
In a fourth aspect, the present invention provides a computer-readable storage medium comprising instructions. The instructions, when executed on a computer, cause the computer to perform the user access method as provided in the first aspect above.
In a fifth aspect, the present invention provides a computer program product for, when run on a computer, causing the computer to perform the user access method as set forth in the design of the first aspect.
It should be noted that the above-mentioned computer instructions may be stored in whole or in part on the first computer readable storage medium. The first computer readable storage medium may be packaged together with the processor of the access network device or may be packaged separately from the processor of the access network device, which is not limited by the present invention.
The description of the second, third, fourth and fifth aspects of the present invention may refer to the detailed description of the first aspect; further, the advantageous effects described in the second aspect, the third aspect, the fourth aspect, and the fifth aspect may refer to the advantageous effect analysis of the first aspect, and are not described herein.
In the present invention, the names of the access network devices are not limited to the devices or the functional modules themselves, and in practical implementations, these devices or functional modules may appear under other names. Insofar as the function of each device or function module is similar to that of the present invention, it falls within the scope of the claims of the present invention and the equivalents thereof.
These and other aspects of the invention will be more readily apparent from the following description.
Drawings
In order to more clearly illustrate the embodiments of the invention or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described, it being obvious that the drawings in the following description are only some embodiments of the invention, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a schematic diagram of a system architecture to which a user access method according to an embodiment of the present invention is applied;
fig. 2 is a schematic diagram of a system architecture to which another user access method according to an embodiment of the present invention is applied;
fig. 3 is a schematic structural diagram of an access network device according to an embodiment of the present invention;
fig. 4 is a schematic flow chart of a user access method according to an embodiment of the present invention;
fig. 5 is a second flowchart of a user access method according to an embodiment of the present invention;
fig. 6 is a third flow chart of a user access method according to an embodiment of the present invention;
fig. 7 is a flowchart of a user access method according to an embodiment of the present invention;
fig. 8 is a flowchart of a user access method according to an embodiment of the present invention;
fig. 9 is a flowchart of a user access method according to an embodiment of the present invention;
fig. 10 is a flowchart of a user access method according to an embodiment of the present invention;
fig. 11 is a schematic structural diagram of a base station according to an embodiment of the present invention;
fig. 12 is a second schematic structural diagram of a base station according to an embodiment of the present invention;
fig. 13 is a schematic structural diagram of a computer program product of a user access method according to an embodiment of the present invention.
Detailed Description
Embodiments of the present invention are described below with reference to the accompanying drawings.
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
In order to clearly describe the technical solution of the embodiments of the present invention, in the embodiments of the present invention, the terms "first", "second", etc. are used to distinguish the same item or similar items having substantially the same function and effect, and those skilled in the art will understand that the terms "first", "second", etc. do not limit the number and execution order.
In view of the above problems, an embodiment of the present invention provides a user access method, which can satisfy access requirements of user terminals corresponding to different services carried by a shared base station (access network device) co-established by different operators based on a radio resource control (radio resource control, RRC) connection number and a data transmission connection number (which indicates the RRC connection number with data transmission). The method is applied to the system architecture shown in fig. 1, and the system can comprise: a terminal 01, an access network device 02, and at least one core network device 03 (03-1, 03-2, 03-3, and 03-4), each core network device 03 corresponding to one operator core network (private network core network (supporting 2B services) or public network core network (supporting 2C services)). Illustratively, referring to FIG. 1, 03-1 may correspond to a public network core network of operator A, 03-2 may correspond to a private network core network of operator A, 03-3 may correspond to a public network core network of operator B, and 03-4 may correspond to a private network core network of operator B. After the terminal 01 access network device 02 is connected with the access network device, the terminal can access the public network core network or the private network core network of the corresponding operator through different core network devices 03. Of course, only one core network device 03 may actually exist, and the functions of the plurality of core network devices may be completed.
In the present invention, public network service (2C service) refers to all services in the public network, and private network service (2B service) refers to all services in the private network.
As an example, referring to fig. 2, the functional modules in the core network device 03 may include a service distribution requirement collection module 031, a service dependency analysis module 032, a critical user parameter customization module 033, and an operator carrier bandwidth customization module 034. The service distribution requirement collection module 031 may collect network data of a private network service or a public network service of a corresponding operator of the access network device 02 (e.g., a base station) to which the service distribution requirement collection module is connected. The network data may include: the related data (average RRC connection number per unit time (e.g., hour)/average RRC connection number with data transmission, maximum RRC connection number per unit time (e.g., hour)/maximum RRC connection number with data transmission) of the service corresponding to the network, traffic of the service, or the number of users, etc.
The service dependency analysis module 032 may determine, through a certain calculation, whether the service in the actual scenario corresponding to the network data is mainly dependent on the RRC connection number and the RRC connection number with data transmission by using the network data acquired by the corresponding service distribution demand collection module 031 in cooperation with the service dependency analysis module 032 in other core network devices corresponding to the access network device 02 connected thereto. Of course, if all the core networks correspond to the same core network device, the service dependency analysis module included in the core network device independently completes the calculation process.
The key user number parameter customizing module 033 is configured to calculate, through cooperation of the key user number parameter customizing module 033 in other core network devices corresponding to the access network device 02 connected thereto, a contracted RRC connection number (first threshold) and a contracted data transmission RRC connection number (second threshold) per target unit time recommended for public network services and private network services of different operators according to the network data acquired by the service distribution demand collecting module 031 corresponding to each key user number parameter customizing module. Of course, if all the core networks correspond to the same core network device, the key capacity customization module included in the core network device independently completes the calculation process.
Illustratively, taking 1 second per unit time and 1 hour per unit time as an example, the first threshold and the second threshold of the private network service may be calculated by the following formula:
Figure BDA0002611117520000061
Figure BDA0002611117520000062
wherein ,
Figure BDA0002611117520000063
representing contracted private network user access number per second,/->
Figure BDA0002611117520000064
Representing the agreed subscriber access number of private network-specific data transfer per second +.>
Figure BDA0002611117520000065
Indicating the maximum RRC connection number per hour of private network,/->
Figure BDA0002611117520000066
Represents the average RRC connection number per hour of private network,/->
Figure BDA0002611117520000067
RRC connection number indicating maximum data transmission per hour of private network,/H>
Figure BDA0002611117520000068
The RRC connection number indicating the average number of data transmissions per hour for the private network.
And the carrier bandwidth customizing module 034 is configured to obtain the RRC connection numbers of different carriers and the RRC connection numbers with data transmission in the area where the base station is to be deployed, and determine the initial bandwidth of each carrier.
Wherein the initial bandwidth satisfies
Figure BDA0002611117520000069
Wherein i represents carrier i, j is the j-th private network under carrier i, W is the total bandwidth supported by the base station, and floor represents the downward rounding of the calculated value.
For example, referring to fig. 2, the access network device 02 includes a user real-time monitoring module 021, a user discriminating module 022, and a network load balancing module 023. The user number real-time monitoring module 021 can collect the RRC connection number and the RRC connection number with data transmission of private network service and public network service of each operator according to the time granularity of unit time (1 second). The user number discriminating module 022 may determine whether the subsequent network load balancing module 023 is required to reject or allow the access request of the user terminal of each service according to the RRC connection number and the RRC connection number with data transmission collected by the service distribution demand collecting module 031.
By way of example, and taking a 5G communication network as an example, referring to fig. 3, the actual means in the access network device 02 may comprise a radio frequency unit and a baseband processing unit. The radio frequency unit is connected with the baseband processing unit through a common public radio interface (common public radio interface, CPRI (eCRPI)), and the public network core network (5 GC 1) of the operator a, the public network core network (5 GC 2) of the operator B, the private network core network (5 GC 3) of the operator a, and the private network core network (5 GC 4) of the operator B are all connected with the baseband processing unit of the access network device 2 through NG interfaces.
The 5G baseband processing unit includes a Control Plane (CP) and a User Plane (UP). The control plane has identification modules (specifically, can be judged by PLMN (public land mobile network, public land mobile network), APN (access point name ), DNN (data network name, data network name) and the like) for private network core networks and public network core networks of different operators, so that the public network core networks and the private network core networks of different operators are distinguished. The user number real-time monitoring module 021, the user number discriminating module 022 and the network load balancing module 023 may be all arranged in the CP.
The 5G radio frequency unit comprises an antenna unit, a switch, a first combiner, a second combiner, a first transceiver and a second transceiver. Each transceiver includes, among other things, digital up-conversion (digital up conversion, DUC), digital-to-analog converter (digital to analog converter, DAC), transmit antenna (TX), receive antenna (RX), analog-to-digital converter (analog to digital converter, ADC), and digital down-conversion (digital down conversion, DDC).
Specifically, in the technical solution provided in the present invention, the access network device 02 allocates a carrier to each operator to carry the public network service and the private network service of the operator. Each carrier comprises an uplink carrier and a downlink carrier, the communication link corresponding to the uplink carrier is composed of an antenna unit, a switch, RX, ADC, DDC and a 5G baseband processing unit in fig. 3, and the communication link corresponding to the downlink carrier is composed of an antenna unit, a switch, TX, DAC, DUC and a 5G baseband processing unit in fig. 3.
For example, as shown in fig. 3, when 2 operators (operator a and operator B respectively) are accessed in the access network device, the user terminal of the operator a may transmit through a first carrier when initiating a private network service or a public network service, and the user terminal of the operator B may transmit through a second carrier when initiating a private network service or a public network service. The first carrier comprises a first transceiver, a first combiner, a switch and an antenna unit; the second carrier includes a second transceiver, a second combiner, a switch, and an antenna unit.
In an embodiment of the present invention, the access network device 02 may be an access network device (basetransceiver station, BTS) in a global system for mobile communications (globalsystem formobilecommunication, GSM), a code division multiple access (code division multiple access, CDMA), an access network device (node B, NB) in a wideband code division multiple access (wideband code division multiple access, WCDMA), an access network device (evolvedNode B, eNB) in a long term evolution (Long Term Evolution, LTE), an eNB in an internet of things (internet of things, ioT) or a narrowband internet of things (NB-IoT), an access network device in a future 5G mobile communication network or a future evolved public land mobile network (public land mobile network, PLMN), which is not limited in any way by the embodiments of the present invention.
By way of example, the terminal 01 in the embodiments of the present invention may be named differently, such as a User Equipment (UE), an access terminal, a terminal unit, a terminal station, a mobile station, a remote terminal, a mobile device, a wireless communication device, a vehicle user equipment, a terminal agent, or a terminal apparatus, etc. It may specifically be a mobile phone, a tablet computer, a desktop, a laptop, a handheld computer, a notebook, an ultra-mobile personal computer (ultra-mobile personal computer, UMPC), a netbook, a cellular phone, a personal digital assistant (personal digital assistant, PDA), an augmented reality (augmented reality, AR) \virtual reality (VR) device, and the like, which may communicate with the base station, and the specific form of the terminal is not limited in the embodiments of the present invention.
The user access method provided by the embodiment of the present invention is described below with reference to the communication system shown in fig. 1, taking the access network device 02 as an example of a base station.
As shown in fig. 4, the user access method provided by the embodiment of the present invention is applied to a base station, where the base station provides support for public network service and private network service of an operator through a carrier wave, and includes:
S11, the base station acquires network data of the target service of each operator in N operators in the current unit time. The target services comprise K private network services, the network data at least comprise RRC connection numbers and data transmission connection numbers, N is an integer greater than or equal to 2, and K is an integer greater than or equal to 1.
Illustratively, in order to ensure timely processing of the access request of the user terminal based on the RRC connection number and the data transfer connection number (also referred to as the RRC connection number with data transfer), the unit time may be one second. Of course, the unit time may be smaller as the technology allows in practice, and there is no specific limitation here.
For example, in practice S11 may be executed by the foregoing flow real-time monitoring module, and the record after the data is collected is as follows in table 1:
TABLE 1
Figure BDA0002611117520000091
Wherein YY represents year, MM represents month, DD represents day of MM month, HH: SS stands for time minutes and seconds.
Optionally, referring to fig. 5, because the technical solution provided in the embodiment of the present invention determines whether the ue of each service is accessible based on the RRC connection number and the RRC connection number with data transmission, if the RRC connection number required by each service and the RRC connection number with data transmission are not large, and do not affect the performance of the co-established shared base station, the technical solution does not need to be executed, so before step S11, the core network device 03 further needs to execute the following steps:
S1, core network equipment 03 obtains the average RRC connection number and average RRC connection number with data transmission of each target unit time in busy time in a preset time period before the current unit time of each service borne by a base station.
Illustratively, the target unit time may be 1 hour; in order to save the computing resources and ensure that the collected data can reflect the RRC connection number of each service carried by the base station and the RRC connection number usage condition with data transmission, the preset time period may be two consecutive weeks (all days of work) and weekdays (all days of rest). The busy hour can be determined by the operator according to the traffic use condition of the corresponding user, for example, the busy hour can be 9:00-11:00 and 14:00-17:00 on the working day, and the busy hour can be 10:00-17:00 on the non-working day.
Illustratively, the step S1 is mainly performed by the service dependency analysis module 032 in the core network device 03 shown in fig. 2.
S2, the core network device 03 determines a large-flow target unit time according to the average RRC connection number and the average RRC connection number with data transmission of each target unit time of all the services in the busy hour in a preset time period.
For example, when the sum of the average RRC connection numbers of all the services in the target unit time in busy hours in the preset period is greater than the third preset duty ratio, the target unit time is determined to be a large-traffic target unit time.
And when the sum of the average number of RRC connection with data transmission in the target unit time in busy hours in the preset time period of all the services is larger than the fourth preset duty ratio in the target unit time, determining that the target unit time is the large-flow target unit time.
And S3, the core network device 03 judges whether the number of the large-flow target unit time is larger than a preset percentage or not according to the ratio of the number of the large-flow target unit time to the total target unit time corresponding to busy hours in the preset time period.
S4, executing when the number of the large-flow target unit time is larger than a preset percentage and the ratio of the number of the large-flow target unit time to the total target unit time corresponding to all busy hours is larger than a preset percentage; and when the number of the large-flow target unit time is not larger than the preset percentage, executing S1.
The preset percentage may be 30% or any other feasible number, and is not particularly limited herein.
And S4, the core network equipment 03 sends a corresponding instruction to the base station so as to acquire the RRC connection number and the transmitted RRC connection number of each service carried by the base station in the current unit time.
Because the traffic used by each service in the time of the large traffic target unit time is more, the large traffic target unit time can be considered to be very dependent on the number of RRC connections and the number of RRC connections with transmission, and if the ratio of the total target unit time in the busy time exceeds a certain ratio, the traffic carried by the base station is indicated to be relatively dependent on the number of RRC connections and the number of RRC connections with transmission, and a corresponding instruction needs to be sent to the base station to enable the base station to execute the technical scheme provided by the embodiment of the invention.
Illustratively, the steps S2-S4 described above are performed by the service dependency analysis module 032 in the core network device 03 shown in fig. 2.
It should be noted that, in practice, the core network device may not execute the step S3, and after the step S2, directly determine whether to execute the step S1 or send a corresponding instruction to the core network device according to the ratio of the number of large-flow target unit times to the total number of target unit times corresponding to the busy time in the preset time period, so that the step S12 may be executed. In addition, the ratio of the number of the large-flow target unit times to the total target unit times corresponding to all busy hours is equal to the preset percentage, which may be attributed to the case where the ratio of the number of the large-flow target unit times to the total target unit times corresponding to all busy hours is greater than the preset percentage, or the case where the ratio of the number of the large-flow target unit times to the total target unit times corresponding to all busy hours is less than the preset percentage, and the example corresponding to fig. 5 takes the case where the ratio of the number of the large-flow target unit times to the total target unit times corresponding to all busy hours is less than the preset percentage as an example, but the invention is not limited thereto.
And S12, the base station determines the bandwidth demand of the kth private network service in the current unit time according to the network data of the N operators when the RRC connection number of the kth private network service of the nth operator is greater than a first threshold value and/or the data transmission connection number of the kth private network service is greater than a second threshold value. Wherein n is an integer, k is an integer, and n is an integer.
Alternatively, the first threshold may be
Figure BDA0002611117520000111
The second threshold is->
Figure BDA0002611117520000112
Therefore, the problem that the base station cannot allow a new user to access when the number of RRC connections corresponding to the accessed user is excessive can be prevented.
And S13, when the base station determines that the residual bandwidth of the nth operator is larger than the bandwidth demand, allowing a new user of the kth private network service to access core network equipment corresponding to the kth private network service in the current unit time.
From the above, the base station may determine, according to the network data of the current unit time, whether the RRC connection number of the kth private network service of the nth operator is greater than the first threshold, and/or whether the data transmission connection number of the kth private network service is greater than the kth private network service of the second threshold, so as to determine whether a new user of the kth private network service in the current unit time can access the core network device corresponding to the kth private network service. When the base station determines that the RRC connection number of the kth private network service of the nth operator is greater than the first threshold value and/or the number of data transmission connections of the kth private network service is greater than the second threshold value, it is indicated that the kth private network service requests more new users to be accessed in the current unit time at this time, so that it is required to determine the bandwidth demand of the kth private network service in the current unit time. And when the base station determines that the residual bandwidth of the nth operator is greater than the bandwidth demand, allowing a new user of the kth private network service to access core network equipment corresponding to the kth private network service in the current unit time.
In one implementation manner, when the target service further includes the public network service, in this case, as shown in fig. 6 in conjunction with fig. 4, the user access method provided in the embodiment of the present invention further includes S14.
S14, the base station determines that the RRC connection number of the public network service of the nth operator is larger than a third threshold value, and/or the data transmission connection number of the public network service of the nth operator is larger than a fourth threshold value, and forbids a new user of the public network service of the nth operator from accessing core network equipment corresponding to the public network service of the nth operator in the current unit time.
For example, taking 1 second per unit time and 1 hour per unit time as an example, the third threshold and the fourth threshold of the public network service may be calculated by the following formulas:
Figure BDA0002611117520000121
Figure BDA0002611117520000122
wherein ,
Figure BDA0002611117520000123
represents the contracted public network user access number per second, < >>
Figure BDA0002611117520000124
Representing agreed user access number with data transmission per second of public network, < >>
Figure BDA0002611117520000125
Indicating the maximum RRC connection number per hour of the public network,/->
Figure BDA0002611117520000126
Showing average RRC connection number per hour for public network,/->
Figure BDA0002611117520000127
RRC connection number indicating maximum data transmission per hour of public network,/for the public network>
Figure BDA0002611117520000128
The public network has average number of RRC connections per hour.
The third threshold value may be
Figure BDA0002611117520000129
The fourth threshold is +.>
Figure BDA00026111175200001210
Therefore, the problem that the base station cannot allow a new user to access when the number of RRC connections corresponding to the accessed user is excessive can be prevented.
In one implementation manner, when it is determined that the RRC connection number of the kth private network service of the nth operator is less than or equal to the first threshold and the number of data transmission connections of the kth private network service of the nth operator is less than or equal to the second threshold and it is determined that the RRC connection number of the public network service of the nth operator is less than or equal to the third threshold and the number of data transmission connections of the public network service of the nth operator is less than or equal to the fourth threshold, the base station normally accesses the public network service of the nth operator and the new user of the K private network service. The normal access refers to a case of maintaining the current 5QI (5G QoS Identifier) (QoS (Quality of Service, quality of service) for identifying 5G) unchanged, and allowing a new user terminal corresponding to each service to access.
In practical application, the priority of the public network service is lower than that of the private network service, so that in case of the bandwidth resource shortage of the base station (for example, the RRC connection number of the public network service of the nth operator is greater than the third threshold value and/or the data transmission connection number of the public network service of the nth operator is greater than the fourth threshold value), the user experience of the private network user of the nth operator can be ensured by prohibiting the user access of the public network service of the nth operator.
In an implementation manner, in connection with fig. 4, the user access method provided in the embodiment of the present invention as shown in fig. 7 further includes S15 and S16.
And S15, when the base station determines that the residual bandwidth of the nth operator is smaller than or equal to the bandwidth demand, and operators with the residual bandwidth larger than the bandwidth demand exist in operators except the nth operator, allocating resources from any one of the operators with the residual bandwidth larger than the bandwidth demand in the operators except the nth operator.
It should be noted that allocating resources refers to allocating part of bandwidth resources in the residual bandwidth of the jth operator (which is an operator with a residual bandwidth greater than the bandwidth demand among operators other than the nth operator) to the nth operator, so that the bandwidth resources of the nth operator increase allocated bandwidth resources on the original basis, and the bandwidth resources of the corresponding jth operator reduce allocated bandwidth resources on the original basis.
In one implementation, when the bandwidth resources of the jth operator (also referred to as other operators) in the current unit time are insufficient, the base station preferentially reallocates the bandwidth resources allocated to the nth operator from the jth operator back to the jth operator, and if the bandwidth resources of the jth operator are still insufficient, allocates the resources from the other operators. Wherein j is different from n, and j is an integer.
In another embodiment, when the bandwidth resources of the current unit time are insufficient, the base station preferentially reallocates the bandwidth resources allocated to the nth operator from the jth operator back to the jth operator, if the bandwidth resources of the jth operator and the bandwidth resources of the nth operator are both insufficient, the base station preferentially allocates the resources to the nth operator from the other operators, and if the bandwidth resources of the jth operator are insufficient, the base station allocates the resources to the jth operator from the other operators.
In another implementation manner, when the bandwidth resources of the jth operator in the current unit time are insufficient, the base station preferentially reallocates the bandwidth resources allocated to the nth operator from the jth operator back to the jth operator, and if the bandwidth resources of the jth operator and the bandwidth resources of the nth operator are insufficient, preferentially allocates resources to the jth operator from other operators, and then allocates resources to the nth operator from the other operators.
In another embodiment, the base station sets different priorities for each of the operators (such as the operator a, the operator B and the operator C), so that when the residual bandwidths of the operator a and the operator B are smaller than or equal to the bandwidth demand and the residual bandwidth of the operator C is greater than the bandwidth demand, if the priority of the operator a is greater than the priority of the operator B, the resource is preferentially allocated to the operator a (resource is allocated from the public network carrier of the operator C), and after the resource is allocated by the operator a, if the residual resource is still available by the operator C, the resource is allocated to the operator B (resource is allocated from the public network carrier of the operator C).
S16, the base station distributes the allocated resources to the nth operator, and allows the new user of the kth private network service to access the core network equipment corresponding to the kth private network service in the current unit time.
It should be noted that, in an actual application, when the nth operator allocates resources from the other operators, the preset time (including at least one time) may be continued, and when the bandwidth resources of the other operators are insufficient, the allocated resources are reallocated to the other operators. When the remaining bandwidth of the nth operator is greater than the bandwidth demand after subtracting the resources allocated from the other operators, then reallocating the allocated resources to the other operators.
In the user access method provided by the embodiment of the invention, each carrier corresponds to one carrier, so that when the bandwidth resource of the carrier corresponding to the nth carrier is smaller than or equal to the bandwidth demand, whether the carrier corresponding to the other carrier has the residual bandwidth resource is required to be judged, and when the carrier corresponding to the other carrier has the residual bandwidth resource, the bandwidth resource is acquired from the other carrier, thereby ensuring the user experience of the private network user of the nth carrier and further improving the bandwidth resource utilization rate of the base station.
In an implementation manner, in connection with fig. 4, the user access method provided in the embodiment of the present invention as shown in fig. 8 further includes S17.
And S17, the base station determines that the residual bandwidth of the nth operator is smaller than or equal to the bandwidth demand, and when no operators with the residual bandwidth larger than the bandwidth demand exist in operators except the nth operator, the new user of the kth private network service is forbidden to access the core network equipment corresponding to the kth private network service in the current unit time.
It should be noted that, in the kth private network service of the nth operator in the current unit time, the user accessing the base station, the base station needs to continue to provide service for the user, and the new user requesting to access the kth private network service of the nth operator needs to prohibit access. When the residual bandwidth of each operator in the base station is smaller than or equal to the bandwidth demand, the number of users currently served by each operator is larger, so that resources cannot be allocated to the nth operator from other operators, and each operator is guaranteed to provide services for the respective users.
In one implementation, the target service further includes a public network service, in which case, in conjunction with fig. 4, the step S12 described above may be implemented through the step S120 as shown in fig. 9.
S120, the base station determines that the RRC connection number of the kth private network service of the nth operator is greater than a first threshold value, and/or the data transmission connection number of the kth private network service is greater than a second threshold value, and determines the bandwidth demand of the kth private network service of the nth operator in the current unit time according to a bandwidth demand formula and the network data of the target service of each operator in the N operators in the current unit time. Wherein, the bandwidth demand formula satisfies:
Figure BDA0002611117520000151
wherein ,
Figure BDA0002611117520000152
indicating bandwidth demand, RCC PrAdd RRC connection number indicating kth private network service at current unit time,/for each private network service>
Figure BDA0002611117520000153
Sigma RCC (radio resource control) connection number representing data transmission of kth private network service in current unit time PU Sigma RCC representing the sum of RRC connection numbers of all public network services of the base station in the current unit time Pr The sum of RRC connection numbers indicating all private network services of the base station in the current unit time, +.>
Figure BDA0002611117520000154
The sum of the RRC connection numbers with data transmission representing all public network services of the base station in the current unit time,/->
Figure BDA0002611117520000155
The sum of the RRC connection numbers with data transmission of all private network services of the base station in the current unit time is represented, and w represents the total bandwidth of the base station.
In one embodiment, when
Figure BDA0002611117520000156
Is greater than->
Figure BDA0002611117520000157
When in use, then
Figure BDA0002611117520000158
In another embodiment, when
Figure BDA0002611117520000159
Less than->
Figure BDA00026111175200001510
When in use, then->
Figure BDA00026111175200001511
In another embodiment, when
Figure BDA00026111175200001512
Equal to->
Figure BDA00026111175200001513
Then
Figure BDA0002611117520000161
Or->
Figure BDA0002611117520000162
In one implementation manner, the network data further includes a residual bandwidth, in which case, in conjunction with fig. 4, the user access method provided in the embodiment of the present invention as shown in fig. 10 further includes S18 and S19.
And S18, the base station determines the bandwidth used by the nth operator in the current unit time according to the bandwidth formula and the network data of the target service of each operator in the N operators in the current unit time. Wherein, the bandwidth formula satisfies:
Figure BDA0002611117520000163
wherein ,WNT Indicating the bandwidth used, RCC PU Sigma RCC representing RRC connection number of public network service of nth operator in current unit time Pr Indicating that all private network services of nth operator are in current unit timeIs defined as the sum of the number of RRC connections,
Figure BDA0002611117520000164
indicating the RRC connection number of the kth private network service of the nth operator with data transmission in the current unit time,
Figure BDA0002611117520000165
sigma RCC representing sum of RRC connection numbers of all private network services of nth operator with data transmission in current unit time PU Sigma RCC representing the sum of RRC connection numbers of all public network services of the base station in the current unit time Pr Sigma RRC represents the sum of RRC connections of all private network services of the base station in the current unit time Data transmission The sum of the RRC connection numbers with data transmission representing all public network services of the base station in the current unit time,/->
Figure BDA0002611117520000166
The sum of the RRC connection numbers with data transmission of all private network services of the base station in the current unit time is represented, and w represents the total bandwidth of the base station.
S19, the base station determines the residual bandwidth of the nth operator according to the rated bandwidth of the nth operator and the bandwidth used by the nth operator in the current unit time. Where a=b-c, a represents the remaining bandwidth, b represents the nominal bandwidth of the nth operator, and c represents the bandwidth that the nth operator has used in the current unit time.
The nominal bandwidth refers to the initial bandwidth.
In one embodiment, when
Figure BDA0002611117520000167
Is greater than->
Figure BDA0002611117520000168
When in use, then
Figure BDA0002611117520000171
In another embodiment, when
Figure BDA0002611117520000172
Less than->
Figure BDA0002611117520000173
When in use, then->
Figure BDA0002611117520000174
/>
In another embodiment, when
Figure BDA0002611117520000175
Equal to->
Figure BDA0002611117520000176
When in use, then
Figure BDA0002611117520000177
Or->
Figure BDA0002611117520000178
In one embodiment, S13 is performed when the remaining bandwidth is less than or equal to the preset bandwidth. Wherein the preset bandwidth is equal to the preset ratio multiplied by the bandwidth demand. Illustratively, the preset ratio may be 0.7.
The foregoing description of the solution provided by the embodiments of the present invention has been mainly presented in terms of a method. To achieve the above functions, it includes corresponding hardware structures and/or software modules that perform the respective functions. Those of skill in the art will readily appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as hardware or combinations of hardware and computer software. Whether a function is implemented as hardware or computer software driven hardware depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
The embodiment of the invention can divide the functional modules of the base station according to the method example, for example, each functional module can be divided corresponding to each function, and two or more functions can be integrated in one processing module. The integrated modules may be implemented in hardware or in software functional modules. It should be noted that, in the embodiment of the present invention, the division of the modules is schematic, which is merely a logic function division, and other division manners may be implemented in actual implementation.
Fig. 11 is a schematic structural diagram of a base station 10 according to an embodiment of the present invention. The base station 10 is configured to obtain network data of a target service of each of N operators in a current unit time; the target services comprise K private network services, the network data at least comprise RRC connection numbers and data transmission connection numbers, N is an integer greater than or equal to 2, and K is an integer greater than or equal to 1; determining the bandwidth demand of the kth private network service in the current unit time according to the network data of the nth operator when the RRC connection number of the kth private network service of the nth operator is greater than a first threshold value and/or the data transmission connection number of the kth private network service is greater than a second threshold value; wherein n is an integer, k is an integer, and n is an integer; and when the residual bandwidth of the nth operator is determined to be larger than the bandwidth demand, allowing a new user of the kth private network service to access core network equipment corresponding to the kth private network service in the current unit time. The base station 10 may comprise an acquisition unit 101 and a processing unit 102.
An acquiring unit 101, configured to acquire network data of a target service of each of N operators in a current unit time. For example, in connection with fig. 4, the acquisition unit 101 may be used to perform S11.
And a processing unit 102, configured to determine, when the RRC connection number of the kth private network service of the nth operator acquired by the acquiring unit 101 is greater than the first threshold, and/or the number of data transmission connections of the kth private network service acquired by the acquiring unit 101 is greater than the second threshold, a bandwidth demand of the kth private network service in the current unit time according to the network data of the nth operator acquired by the acquiring unit 101. The processing unit 102 is further configured to allow, when the remaining bandwidth of the nth operator is greater than the bandwidth requirement, a new user of the kth private network service to access the core network device corresponding to the kth private network service in the current unit time. For example, in connection with fig. 4, the acquisition unit 101 may be used to perform S12 and S13. In connection with fig. 6, the acquisition unit 101 may be used to perform S14. In connection with fig. 7, the acquisition unit 101 may be used to perform S15 and S16. In connection with fig. 8, the acquisition unit 101 may be used to perform S17. In connection with fig. 9, the acquisition unit 101 may be used to perform S120. In connection with fig. 10, the acquisition unit 101 may be used to perform S18 and S19.
All relevant contents of each step related to the above method embodiment may be cited to the functional descriptions of the corresponding functional modules, and their effects are not described herein.
Of course, the base station 10 provided in the embodiment of the present invention includes, but is not limited to, the above modules, for example, the base station 10 may further include a storage unit 103. The storage unit 103 may be used for storing the program code of the writing base station 10, and may also be used for storing data generated by the writing base station 10 during operation, such as data in a writing request, etc.
Fig. 12 is a schematic structural diagram of a base station 10 according to an embodiment of the present invention, and as shown in fig. 12, the base station 10 may include: at least one processor 51, a memory 52, a communication interface 53 and a communication bus 54.
The following describes the respective constituent elements of the base station 10 in detail with reference to fig. 12:
the processor 51 is a control center of the base station 10, and may be one processor or a collective term of a plurality of processing elements. For example, processor 51 is a central processing unit (Central Processing Unit, CPU), but may also be an integrated circuit (Application Specific Integrated Circuit, ASIC), or one or more integrated circuits configured to implement embodiments of the present invention, such as: one or more DSPs, or one or more field programmable gate arrays (Field Programmable Gate Array, FPGAs).
In a particular implementation, processor 51 may include one or more CPUs, such as CPU0 and CPU1 shown in FIG. 12, as an example. Also, as an example, the base station 10 may include a plurality of processors, such as the processor 51 and the processor 55 shown in fig. 12. Each of these processors may be a Single-core processor (Single-CPU) or a Multi-core processor (Multi-CPU). A processor herein may refer to one or more devices, circuits, and/or processing cores for processing data (e.g., computer program instructions).
The Memory 52 may be, but is not limited to, a Read-Only Memory (ROM) or other type of static storage device that can store static information and instructions, a random access Memory (Random Access Memory, RAM) or other type of dynamic storage device that can store information and instructions, an electrically erasable programmable Read-Only Memory (Electrically Erasable Programmable Read-Only Memory, EEPROM), a compact disc (Compact Disc Read-Only Memory, CD-ROM) or other optical disk storage, optical disk storage (including compact disc, laser disc, optical disc, digital versatile disc, blu-ray disc, etc.), magnetic disk storage media or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer. The memory 52 may be stand alone and be coupled to the processor 51 via a communication bus 54. Memory 52 may also be integrated with processor 51.
In a specific implementation, the memory 52 is used to store data in the present invention and to execute software programs of the present invention. The processor 51 may perform various functions of the air conditioner by running or executing a software program stored in the memory 52 and calling data stored in the memory 52.
The communication interface 53 uses any transceiver-like means for communicating with other devices or communication networks, such as a radio access network (Radio Access Network, RAN), a wireless local area network (Wireless Local Area Networks, WLAN), a terminal, a cloud, etc. The communication interface 53 may include a receiving unit implementing a receiving function and a transmitting unit implementing a transmitting function.
The communication bus 54 may be an industry standard architecture (Industry Standard Architecture, ISA) bus, an external device interconnect (Peripheral Component Interconnect, PCI) bus, or an extended industry standard architecture (Extended Industry Standard Architecture, EISA) bus, among others. The bus may be classified as an address bus, a data bus, a control bus, etc. For ease of illustration, only one thick line is shown in fig. 12, but not only one bus or one type of bus.
As an example, in connection with fig. 11, the acquisition unit 101 in the base station 10 realizes the same function as the communication interface 53 in fig. 12, the processing unit 102 realizes the same function as the processor 51 in fig. 12, and the storage unit 103 realizes the same function as the memory 52 in fig. 12.
Another embodiment of the present invention also provides a computer-readable storage medium having stored therein instructions which, when executed on a computer, cause the computer to perform the method shown in the above-described method embodiment.
In some embodiments, the disclosed methods may be implemented as computer program instructions encoded on a computer-readable storage medium in a machine-readable format or encoded on other non-transitory media or articles of manufacture.
Fig. 13 schematically illustrates a conceptual partial view of a computer program product provided by an embodiment of the invention, the computer program product comprising a computer program for executing a computer process on a computing device.
In one embodiment, a computer program product is provided using signal bearing medium 410. The signal bearing medium 410 may include one or more program instructions that when executed by one or more processors may provide the functionality or portions of the functionality described above with respect to fig. 4. Thus, for example, referring to the embodiment shown in FIG. 4, one or more features of S11-S13 may be carried by one or more instructions associated with signal bearing medium 410. Further, the program instructions in fig. 13 also describe example instructions.
In some examples, signal bearing medium 410 may comprise a computer readable medium 411 such as, but not limited to, a hard disk drive, compact Disk (CD), digital Video Disk (DVD), digital tape, memory, read-only memory (ROM), or random access memory (random access memory, RAM), among others.
In some implementations, the signal bearing medium 410 may include a computer recordable medium 412 such as, but not limited to, memory, read/write (R/W) CD, R/W DVD, and the like.
In some implementations, the signal bearing medium 410 may include a communication medium 413 such as, but not limited to, a digital and/or analog communication medium (e.g., fiber optic cable, waveguide, wired communications link, wireless communications link, etc.).
The signal bearing medium 410 may be conveyed by a communication medium 413 in wireless form (e.g., a wireless communication medium conforming to the IEEE802.41 standard or other transmission protocol). The one or more program instructions may be, for example, computer-executable instructions or logic-implemented instructions.
In some examples, a data-writing apparatus such as described with respect to fig. 4 may be configured to provide various operations, functions, or actions in response to program instructions through one or more of computer-readable medium 411, computer-recordable medium 412, and/or communication medium 413.
From the foregoing description of the embodiments, it will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-described division of functional modules is illustrated, and in practical application, the above-described functional allocation may be implemented by different functional modules according to needs, i.e. the internal structure of the apparatus is divided into different functional modules to implement all or part of the functions described above.
In the several embodiments provided by the present invention, it should be understood that the disclosed apparatus and method may be implemented in other manners. For example, the apparatus embodiments described above are merely illustrative, e.g., the division of the modules or units is merely a logical functional division, and there may be additional divisions when actually implemented, e.g., multiple units or components may be combined or integrated into another apparatus, or some features may be omitted, or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or units, which may be in electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and the parts displayed as units may be one physical unit or a plurality of physical units, may be located in one place, or may be distributed in a plurality of different places. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in the embodiments of the present invention may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units.
The integrated units, if implemented in the form of software functional units and sold or used as stand-alone products, may be stored in a readable storage medium. Based on such understanding, the technical solution of the embodiments of the present invention may be essentially or a part contributing to the prior art or all or part of the technical solution may be embodied in the form of a software product stored in a storage medium, including several instructions for causing a device (may be a single-chip microcomputer, a chip or the like) or a processor (processor) to perform all or part of the steps of the method described in the embodiments of the present invention. And the aforementioned storage medium includes: a usb disk, a removable hard disk, a ROM, a RAM, a magnetic disk, or an optical disk, etc.
The foregoing is merely illustrative of specific embodiments of the present invention, and the scope of the present invention is not limited thereto, but any changes or substitutions within the technical scope of the present invention should be covered by the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (10)

1. The user access method is applied to access network equipment, and the access network equipment provides support for public network service and private network service of an operator through one carrier wave, and is characterized by comprising the following steps:
acquiring network data of a target service of each operator in N operators in the current unit time; the target services comprise K private network services, the network data at least comprise RRC connection numbers and data transmission connection numbers, N is an integer greater than or equal to 2, and K is an integer greater than or equal to 1;
determining that the RRC connection number of the kth private network service of the nth operator is greater than a first threshold value, and/or determining the bandwidth demand of the kth private network service in the current unit time according to the network data of the N operators when the data transmission connection number of the kth private network service is greater than a second threshold value; wherein n is an integer, k is an integer, and n is an integer;
When the residual bandwidth of the nth operator is determined to be larger than the bandwidth demand, allowing a new user of the kth private network service to access core network equipment corresponding to the kth private network service in the current unit time;
the target service also comprises a public network service;
the user access method further comprises the following steps:
when the RRC connection number of the public network service of the nth operator is determined to be larger than a third threshold value and/or the data transmission connection number of the public network service of the nth operator is determined to be larger than a fourth threshold value, prohibiting a new user of the public network service of the nth operator from accessing core network equipment corresponding to the public network service of the nth operator in the current unit time;
the target service also comprises a private network service;
determining the bandwidth demand of the kth private network service in the current unit time according to the network data of the N operators, wherein the method comprises the following steps:
according to a bandwidth demand formula and network data of target service of each operator in the N operators in the current unit time, determining bandwidth demand of the kth private network service of the nth operator in the current unit time; wherein the bandwidth demand formula satisfies:
Figure QLYQS_1
wherein ,
Figure QLYQS_2
Indicating bandwidth demand, RCC PrAdd RRC connection number indicating kth private network service at current unit time,/for each private network service>
Figure QLYQS_3
Sigma RCC (radio resource control) connection number representing that kth private network service has data transmission in current unit time PU Sigma RCC representing the sum of RRC connection numbers of all public network services of access network equipment in current unit time Pr The sum of RRC connection numbers representing all private network services of the access network device in the current unit time, +.>
Figure QLYQS_4
The sum of the RRC connection numbers with data transmission representing all public network services of the access network device in the current unit time,/L>
Figure QLYQS_5
The sum of the RRC connection numbers with data transmission of all private network services of the access network equipment in the current unit time is represented, and w represents the total bandwidth of the access network equipment.
2. The user access method of claim 1, further comprising:
determining that the remaining bandwidth of the nth operator is less than or equal to the bandwidth demand, and allocating resources from any one of operators other than the nth operator, the remaining bandwidth of which is greater than the bandwidth demand, when there is an operator whose remaining bandwidth is greater than the bandwidth demand among operators other than the nth operator;
and allocating the allocated resources to the nth operator, and allowing a new user of the kth private network service to access core network equipment corresponding to the kth private network service in the current unit time.
3. The user access method of claim 1, further comprising:
and when the residual bandwidth of the nth operator is determined to be smaller than or equal to the bandwidth demand, and no operators with the residual bandwidth larger than the bandwidth demand exist in operators except the nth operator, prohibiting a new user of the kth private network service from accessing core network equipment corresponding to the kth private network service in the current unit time.
4. The user access method of claim 1, wherein the network data further comprises a residual bandwidth;
when the remaining bandwidth of the nth operator is determined to be greater than the bandwidth demand, before the new user of the kth private network service is allowed to access the core network device corresponding to the kth private network service in the current unit time, the user access method further includes:
according to a bandwidth formula and network data of target service of each operator in the N operators in the current unit time, determining the bandwidth used by the nth operator in the current unit time; wherein the bandwidth formula satisfies:
Figure QLYQS_6
wherein ,RCCPU Sigma RCC representing RRC connection number of public network service of nth operator in current unit time Pr Representing the sum of the RRC connection numbers of all private network services of the nth operator at the current unit time,
Figure QLYQS_7
RRC connection number indicating data transmission of kth private network carrier of nth operator in current unit time,/->
Figure QLYQS_8
Sum of RRC connection numbers of all private network services of nth operator with data transmission in current unit time, sigma RCC PU Sigma RCC representing the sum of RRC connection numbers of all public network services of access network equipment in current unit time Pr The sum of RRC connection numbers representing all private network services of the access network device in the current unit time, +.>
Figure QLYQS_9
The sum of the RRC connection numbers with data transmission representing all public network services of the access network device in the current unit time,/L>
Figure QLYQS_10
The sum of the RRC connection numbers with data transmission of all private network services of the access network equipment in the current unit time is represented, and w represents the total bandwidth of the access network equipment;
and determining the residual bandwidth of the nth operator according to the rated bandwidth of the nth operator and the bandwidth used by the nth operator in the current unit time.
5. An access network device, which provides support for public network service and private network service of an operator through a path of carrier, comprising:
the acquiring unit is used for acquiring the network data of the target service of each operator in the N operators in the current unit time; the target services comprise K private network services, the network data at least comprise RRC connection numbers and data transmission connection numbers, N is an integer greater than or equal to 2, and K is an integer greater than or equal to 1;
The processing unit is used for determining the bandwidth demand of the kth private network service in the current unit time according to the network data of the N operators acquired by the acquisition unit when the RRC connection number of the kth private network service of the nth operator acquired by the acquisition unit is greater than a first threshold value and/or the data transmission connection number of the kth private network service acquired by the acquisition unit is greater than a second threshold value; wherein n is an integer, k is an integer, and n is an integer;
the processing unit is further configured to determine that, when the remaining bandwidth of the nth operator is greater than the bandwidth demand, allow, in a current unit time, a new user of the kth private network service to access a core network device corresponding to the kth private network service;
the target service also comprises a public network service;
the processing unit is further configured to determine that the RRC connection number of the public network service of the nth operator obtained by the obtaining unit is greater than a third threshold, and/or when the number of data transmission connections of the public network service of the nth operator obtained by the obtaining unit is greater than a fourth threshold, prohibit, in a current unit time, a new user of the public network service of the nth operator from accessing a core network device corresponding to the public network service of the nth operator; the target service also comprises a private network service;
The processing unit is specifically configured to determine, according to a bandwidth demand formula and the network data of the target service of each of the N operators in the current unit time acquired by the acquiring unit, a bandwidth demand of a kth private network service of the nth operator in the current unit time; wherein the bandwidth demand formula satisfies:
Figure QLYQS_11
wherein ,
Figure QLYQS_12
indicating bandwidth demand, RCC PrAdd RRC connection number indicating kth private network service at current unit time,/for each private network service>
Figure QLYQS_13
Representation ofThe RRC connection number of the kth private network service with data transmission in the current unit time, sigma RCC PU Sigma RCC representing the sum of RRC connection numbers of all public network services of access network equipment in current unit time Pr The sum of RRC connection numbers representing all private network services of the access network device in the current unit time, +.>
Figure QLYQS_14
The sum of the RRC connection numbers with data transmission representing all public network services of the access network device in the current unit time,/L>
Figure QLYQS_15
The sum of the RRC connection numbers with data transmission of all private network services of the access network equipment in the current unit time is represented, and w represents the total bandwidth of the access network equipment.
6. The access network apparatus according to claim 5, wherein the processing unit is further configured to determine that the remaining bandwidth of the nth operator acquired by the acquiring unit is less than or equal to the bandwidth demand, and allocate resources from any one of operators other than the nth operator, where the remaining bandwidth is greater than the bandwidth demand, when there is an operator whose remaining bandwidth is greater than the bandwidth demand among operators other than the nth operator;
The processing unit is further configured to allocate the allocated resources to the nth operator, and allow the new user of the kth private network service to access the core network device corresponding to the kth private network service in the current unit time.
7. The access network device of claim 5, wherein the processing unit is further configured to determine that the remaining bandwidth of the nth operator acquired by the acquiring unit is less than or equal to the bandwidth demand, and prohibit, when no operator with a remaining bandwidth greater than the bandwidth demand exists among operators other than the nth operator, a new user of the kth private network service from accessing a core network device corresponding to the kth private network service in a current unit time.
8. The access network device of claim 5, wherein the network data further comprises a residual bandwidth;
the processing unit is specifically configured to determine, according to a bandwidth formula and the network data of the target service of each of the N operators in the current unit time acquired by the acquiring unit, a bandwidth that the nth operator has used in the current unit time; wherein the bandwidth formula satisfies:
Figure QLYQS_16
wherein ,RCCPU Sigma RCC representing RRC connection number of public network service of nth operator in current unit time Pr Representing the sum of the RRC connection numbers of all private network services of the nth operator at the current unit time,
Figure QLYQS_17
RRC connection number indicating data transmission of kth private network carrier of nth operator in current unit time,/->
Figure QLYQS_18
Sum of RRC connection numbers of all private network services of nth operator with data transmission in current unit time, sigma RCC PU Sigma RCC representing the sum of RRC connection numbers of all public network services of access network equipment in current unit time Pr The sum of RRC connection numbers representing all private network services of the access network device in the current unit time, +.>
Figure QLYQS_19
The sum of the RRC connection numbers with data transmission representing all public network services of the access network device in the current unit time,/L>
Figure QLYQS_20
Indicating that the access network device is currently on listThe sum of the RRC connection numbers with data transmission of all private network services in bit time, w represents the total bandwidth of access network equipment;
the processing unit is specifically configured to determine a remaining bandwidth of the nth operator according to the rated bandwidth of the nth operator and a bandwidth that the nth operator has used in a current unit time.
9. A computer readable storage medium comprising instructions which, when run on a computer, cause the computer to perform the user access method of any of the preceding claims 1-4.
10. An access network device, comprising: communication interface, processor, memory, bus;
the memory is used for storing computer execution instructions, and the processor is connected with the memory through the bus;
the processor, when run by the access network device, executes the computer-executable instructions stored by the memory to cause the access network device to perform the user access method of any one of the preceding claims 1-4.
CN202010754626.7A 2020-07-30 2020-07-30 User access method and access network equipment Active CN111818581B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010754626.7A CN111818581B (en) 2020-07-30 2020-07-30 User access method and access network equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010754626.7A CN111818581B (en) 2020-07-30 2020-07-30 User access method and access network equipment

Publications (2)

Publication Number Publication Date
CN111818581A CN111818581A (en) 2020-10-23
CN111818581B true CN111818581B (en) 2023-05-12

Family

ID=72864417

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010754626.7A Active CN111818581B (en) 2020-07-30 2020-07-30 User access method and access network equipment

Country Status (1)

Country Link
CN (1) CN111818581B (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112367710B (en) * 2020-11-27 2023-05-16 中国联合网络通信集团有限公司 Service processing method and equipment
CN112333829B (en) * 2020-11-27 2023-05-16 中国联合网络通信集团有限公司 Service processing method and equipment
CN112333842B (en) * 2020-11-27 2023-05-12 中国联合网络通信集团有限公司 Service processing method and equipment
CN113115374B (en) * 2021-03-17 2022-08-12 中国联合网络通信集团有限公司 Co-construction shared resource block configuration method and access network equipment
CN113115371B (en) * 2021-03-17 2022-05-17 中国联合网络通信集团有限公司 Co-construction shared resource block configuration method and access network equipment
CN113115373B (en) * 2021-03-17 2022-09-02 中国联合网络通信集团有限公司 Co-construction shared resource block configuration method and access network equipment
CN115102678B (en) * 2022-08-24 2023-03-24 深圳国人无线通信有限公司 BWP switching method and system for co-building shared base station to meet user service requirement

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102088793A (en) * 2009-12-03 2011-06-08 华为技术有限公司 Network access method and system
WO2017045195A1 (en) * 2015-09-18 2017-03-23 富士通株式会社 Network indication processing device, method and communication system
CN106851730A (en) * 2017-03-02 2017-06-13 北京国交信通科技发展有限公司 Service establishing method and device under network share mode
CN110740475A (en) * 2019-10-24 2020-01-31 国网信息通信产业集团有限公司 semi-static scheduling device applied to power wireless private network
CN110891240A (en) * 2018-09-10 2020-03-17 中国移动通信集团广东有限公司 Method and device for returning user equipment to private network

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10009908B2 (en) * 2015-01-30 2018-06-26 Telefonaktiebolaget Lm Ericsson (Publ) Methods of operating wireless terminals and network nodes using high speed vehicle network indicators and related wireless terminals and network nodes

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102088793A (en) * 2009-12-03 2011-06-08 华为技术有限公司 Network access method and system
WO2017045195A1 (en) * 2015-09-18 2017-03-23 富士通株式会社 Network indication processing device, method and communication system
CN106851730A (en) * 2017-03-02 2017-06-13 北京国交信通科技发展有限公司 Service establishing method and device under network share mode
CN110891240A (en) * 2018-09-10 2020-03-17 中国移动通信集团广东有限公司 Method and device for returning user equipment to private network
CN110740475A (en) * 2019-10-24 2020-01-31 国网信息通信产业集团有限公司 semi-static scheduling device applied to power wireless private network

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"Rel-12_description_20140630".3GPP tsg_ct\TSG_CT.2014,全文. *

Also Published As

Publication number Publication date
CN111818581A (en) 2020-10-23

Similar Documents

Publication Publication Date Title
CN111818581B (en) User access method and access network equipment
CN111818588B (en) User access method and access network equipment
CN111818576B (en) User access method and access network equipment
CN111818585B (en) User access method and access network equipment
CN111818575B (en) User access method and access network equipment
CN112333831B (en) Resource allocation method and access network equipment
CN111818584B (en) User access method and access network equipment
CN113055948B (en) Downlink resource block reservation method and device
CN113056016B (en) Co-construction shared resource block configuration method and access network equipment
CN112333833B (en) Resource allocation method and access network equipment
CN113115376B (en) Downlink resource block reservation method and device
CN113115378B (en) Co-construction shared resource block configuration method and access network equipment
CN111818583B (en) User access method and access network equipment
CN111818586B (en) User access method and access network equipment
CN112312568B (en) Resource allocation method and access network equipment
CN112367710B (en) Service processing method and equipment
CN111818578B (en) User access method and access network equipment
CN113115373B (en) Co-construction shared resource block configuration method and access network equipment
CN111818579B (en) User access method and access network equipment
CN113115377B (en) Co-construction shared resource block configuration method and access network equipment
CN112333842B (en) Service processing method and equipment
CN113115371B (en) Co-construction shared resource block configuration method and access network equipment
CN111818577B (en) User access method and access network equipment
CN111818580B (en) User access method and access network equipment
CN113115372B (en) Co-construction shared resource block configuration method and access network equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant