CN111866750B - Late access method, communication device and computer readable storage medium - Google Patents

Late access method, communication device and computer readable storage medium Download PDF

Info

Publication number
CN111866750B
CN111866750B CN201910360939.1A CN201910360939A CN111866750B CN 111866750 B CN111866750 B CN 111866750B CN 201910360939 A CN201910360939 A CN 201910360939A CN 111866750 B CN111866750 B CN 111866750B
Authority
CN
China
Prior art keywords
data
signaling
call
call information
matrix
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910360939.1A
Other languages
Chinese (zh)
Other versions
CN111866750A (en
Inventor
张东东
李亚
李容
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hytera Communications Corp Ltd
Original Assignee
Hytera Communications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hytera Communications Corp Ltd filed Critical Hytera Communications Corp Ltd
Priority to CN201910360939.1A priority Critical patent/CN111866750B/en
Publication of CN111866750A publication Critical patent/CN111866750A/en
Application granted granted Critical
Publication of CN111866750B publication Critical patent/CN111866750B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/06Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]; Services to user groups; One-way selective calling services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L5/00Arrangements affording multiple use of the transmission path
    • H04L5/003Arrangements for allocating sub-channels of the transmission path
    • H04L5/0053Allocation of signaling, i.e. of overhead other than pilot signals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information

Abstract

The application discloses a delayed access method, a communication device and a computer readable storage medium, wherein the delayed access method comprises the steps of processing call information of at least one target terminal into a plurality of signaling with preset formats; the method comprises the steps that a plurality of signaling are sent through a control channel, so that at least one target terminal obtains call information by utilizing the signaling and determines whether to execute delayed access, the call information for determining whether to execute the delayed access is divided into a plurality of signaling capable of being borne in the control channel through the mode, and the signaling for determining whether to execute the delayed access is sent to the target terminal through the control channel to realize the delayed access, so that the service channel resource does not need to be occupied, and the utilization rate of the channel resource is improved.

Description

Late access method, communication device and computer readable storage medium
Technical Field
The present application relates to the field of trunking communications technologies, and in particular, to a late access method, a communication device, and a computer-readable storage medium.
Background
The late access generally refers to that, in the process of establishing a group call session, part of User Equipment (UE) in a group call cannot be accessed to the group call in time due to some reasons, and a Trunking system such as Digital Mobile Radio (DMR) or Police Digital Trunking (PDT) allows the UE to access to the group call after having an access condition. The scenarios of late access generally include: UE newly powers on, UE roams into a cell with cluster coverage, etc.
Currently, in a cluster communication system such as DMR or PDT, whether to execute late access is determined by an embedded signaling LC _ emb (link Control embedded). However, in the prior art, the embedded signaling LC _ EMB is generally embedded in the burst of the super frame, thereby occupying the channel resources carrying voice/data traffic and reducing the utilization rate of the channel resources.
Disclosure of Invention
The technical problem mainly solved by the present application is to provide a late access method, a communication device and a computer readable storage medium, which can carry signaling for determining whether to access late without occupying channel resources for carrying voice/data services, thereby improving the utilization rate of the channel resources.
To solve the foregoing technical problem, a first aspect of the present application provides a late access method, including: processing call information for at least one target terminal into a plurality of signaling with a preset format; and sending a plurality of signaling through the control channel so that at least one target terminal acquires call information by using the plurality of signaling and determines whether to execute delayed access.
In order to solve the above technical problem, a second aspect of the present application provides a late access method, including: receiving a plurality of signaling with a preset format through a control channel; processing the plurality of signaling to obtain call information according to the plurality of signaling; the call information is used to determine whether to perform late access.
To solve the above technical problem, a third aspect of the present application provides a communication apparatus, including: communication circuitry and processing circuitry coupled to each other; the communication circuit and the processing circuit may implement the late access method according to the first aspect or the second aspect.
In order to solve the above technical problem, a fourth aspect of the present application provides a computer-readable storage medium, where a computer program is stored, and when the computer program is executed by a processor, the delayed access method according to the first aspect or the second aspect may be implemented.
The beneficial effect of this application is: different from the prior art, the delayed access method provided by the application processes the call information of at least one target terminal into a plurality of signaling with a preset format, and sends the plurality of signaling through a control channel, so that the at least one target terminal acquires the call information by using the plurality of signaling and determines whether to execute delayed access. By the mode, the call information for determining whether to access late is split into the plurality of signaling which can be borne in the control channel, and then the signaling for determining whether to access late is sent to the target terminal in the control channel to realize the access late, so that the service channel resource does not need to be occupied, and the utilization rate of the channel resource is improved.
Drawings
In order to more clearly illustrate the technical solutions in the present application, the drawings required in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings described below are only some embodiments of the present application, and it is obvious for those skilled in the art that other drawings can be obtained according to the drawings without inventive labor. Wherein:
fig. 1 is a schematic flow chart of an embodiment of a late access method according to the present application;
FIG. 2 is a schematic timing diagram of a downlink channel;
fig. 3 is a flowchart illustrating another embodiment of a late access method according to the present application;
fig. 4 is a flowchart illustrating a delayed access method according to another embodiment of the present application;
fig. 5 is a flowchart illustrating a delayed access method according to another embodiment of the present application;
fig. 6 is a flowchart illustrating a delayed access method according to another embodiment of the present application;
FIG. 7 is a call information processing diagram;
fig. 8 is a flowchart illustrating a delayed access method according to another embodiment of the present application;
fig. 9 is a flowchart illustrating a delayed access method according to another embodiment of the present application;
FIG. 10 is a schematic flow chart diagram illustrating an embodiment of step S92 in FIG. 9;
FIG. 11 is a flowchart illustrating an embodiment of step S922 in FIG. 10;
fig. 12 is a flowchart illustrating a delayed access method according to another embodiment of the present application;
FIG. 13 is a schematic flow chart diagram illustrating one embodiment of step S93 in FIG. 9;
FIG. 14 is a block diagram of an embodiment of a communications device of the present application;
FIG. 15 is a block diagram of an embodiment of a computer-readable storage medium of the present application.
Detailed Description
The technical solutions in the embodiments of the present application are clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Referring to fig. 1, fig. 1 is a flowchart illustrating an embodiment of a late access method according to the present application. The method comprises the following steps:
step S11: the call information to at least one target terminal is processed into a plurality of signaling having a preset format.
The target terminal may be a mobile terminal, such as an intercom, etc., staying at the base station side of the trunking communication system. In one implementation scenario, a target terminal stays at a base station and performs a Group call service (Group Voice); in another implementation scenario, the target terminal stays at the base station and performs an Individual call service (Individual Voice); in yet another implementation scenario, the target terminal stays at the base station and performs a Group Data service (Group Data); in another implementation scenario, the target terminal stays in the base station and performs an Emergency Group call service (Emergency Group Voice), and in another implementation scenario, the target terminal stays in the base station and may also perform another service, such as an Emergency Individual call service (Emergency Individual Voice), and the like, which is not limited in this embodiment.
In one implementation scenario, in order to make the information included in the call information at least available to the target terminal to determine whether to perform the late access and accurately access, the call information may include a channel on which the call is made, a service type of the call, and an access identifier of at least one target terminal. In some embodiments, the communication frequency is divided into several time slots in a time division multiplexing system and a Common Acknowledgement Channel (CACH), and the call information sent in the Common broadcast Channel may include the access identity of the target terminal and the time slot in which the call is made. The service types include, but are not limited to, group call services, individual call services, group data services, emergency group call services, and the like. The access identity may comprise a destination address.
Step S12: and sending a plurality of signaling through the control channel so that at least one target terminal acquires call information by using the plurality of signaling and determines whether to execute delayed access.
Unlike traffic channels used to carry voice/data traffic, control channels are used to carry signaling. In one implementation scenario, in a cluster communication using a double Time slot TDMA (Time Division Multiple Access) technique such as DMR or PDT, in order for a target terminal to receive a plurality of signaling having a predetermined format, the plurality of signaling having the predetermined format may be set to a format of a burst of a common broadcast channel (CACH) and transmitted through the common broadcast channel CACH. In this embodiment, the control channel is a common broadcast channel CACH. As shown in the timing diagram of the downlink channel in fig. 2, in the cluster communication using the dual timeslot TDMA such as DMR or PDT, CACH signaling is located between burst 1 of channel1 and burst 2 of channel 2 of the downlink channel.
Through the above embodiment, the late access method provided by the present application processes call information for at least one target terminal into multiple signaling with a preset format, and sends the multiple signaling through a control channel, so that the at least one target terminal acquires the call information by using the multiple signaling and determines whether to perform late access. By the mode, the call information used for determining whether to perform delayed access is split into the plurality of signaling which can be borne in the control channel, and then the signaling used for determining whether to perform delayed access is sent to the target terminal on the control channel to achieve delayed access, so that service channel resources do not need to be occupied, and the utilization rate of the channel resources is improved.
Referring to fig. 3, fig. 3 is a flowchart illustrating a delayed access method according to another embodiment of the present application. The step S11 may specifically include:
step S111: the call information is encoded to obtain preprocessed data, and the preprocessed data are divided into a plurality of groups of call data.
The call information is encoded to obtain the preprocessed data, so that the call information can be transmitted through an air interface after subsequent processing, and then received and correctly decoded by the target terminal. In an implementation scenario, call information is carried through a Long link control information (Long LC) signaling, the Long link control information has 64 bits, and the Long link control information includes a 4-bit channel1 service type identifier (Time Slot1Activity ID), a 4-bit channel 2 service type identifier (Time Slot2Activity ID), a 24-bit channel1 Address (Address Time Slot1), and a 24-bit channel 2 Address (Address Time Slot2), where the channel1 service type and the channel 2 service type carry the service type of a call in the call information, and the channel1 Address and the channel 2 Address carry the access identifier of the call information.
Since the control channel is generally used for carrying signaling, the load carried by the control channel is small, and therefore, the call information needs to be transmitted in multiple times. In one implementation scenario, the call information is carried over CACH. In DMR, one CACH signaling has 24 bits, and among the 24 bits, there are 4 bit message bits and 3 bit check bits, and the remaining 17 bits carry valid signaling, so that the preprocessed data obtained by encoding call information needs to be divided into multiple groups of call data to be carried by CACH signaling.
Step S112: a plurality of signaling is generated using the plurality of sets of call data and the corresponding plurality of sets of identifiers, respectively.
In this embodiment, each signaling includes a set of call data and a set of identifiers. Each group of identifiers comprises a position identifier used for indicating the position of the corresponding signaling in the sent multiple signaling. When the CACH is used to carry call information, the identifier includes a TC for indicating the next timeslot number, an AT for indicating the busy/idle state of the current timeslot, and an lcs for indicating the start, continuation, and end of multiple CACH signaling, i.e. the location identifier in this embodiment, which indicates the location of the corresponding CACH signaling in the multiple CACH signaling sent. The LCSS has 2 bits and the corresponding codes in DMR are 00, 01, 10, 11, indicated as single packet, start packet, end packet, and middle packet, respectively. The identifier may also comprise 3 check bits FEC.
Through the implementation mode, the Long LC signaling is used for bearing the call information, the DMR protocol standard is met, and the Short link control information Short LC scene can be compatible with the target terminal.
In an embodiment, the encoding of the call information in step S111 of the foregoing embodiment to obtain the preprocessed data may specifically include: and carrying out BPTC (Block Product Turbo Code) coding on the call information to obtain a preprocessed data matrix. In the step S111, the dividing the preprocessed data into multiple groups of call data may specifically include: and taking each row/column data of the preprocessed data matrix as a group of call data to obtain a plurality of groups of call data. In one implementation scenario, each row of data of the pre-processing data matrix is preferably treated as a set of call data to obtain multiple sets of call data. The step S112 may specifically include: and carrying out interleaving processing on each group of call data and each group of identifiers corresponding to each group of call data to obtain a corresponding signaling. In one implementation scenario, in the DMR system, the identifier has 7 bits, i.e., includes 4 message bits (i.e., 1 AT, 1 TC, 2 lcs) and 3 check bits (i.e., 3 FEC), the 7-bit identifier is embedded into the call data in sequence, and two adjacent message bits in the embedded 4 message bits are separated by 3 call data, and two adjacent check bits in the embedded 3 check bits are separated by 3 call data.
Specifically, the method comprises the following steps:
in the above embodiment, the BPTC encoding of the call information to obtain the preprocessed data matrix may be implemented by the steps shown in fig. 4:
step S41: the data contained in the call information is rearranged to obtain an initial matrix.
The call information contains data containing multiple bits, and in one implementation scenario, the bits of each row of the initial matrix obtained after the data is rearranged are the same, and the bits of each column are also the same.
Step S42: and verifying the initial matrix to obtain a plurality of verification data, and supplementing the plurality of verification data into the initial matrix to obtain the verification matrix.
In an implementation scenario, each row of the initial matrix may be checked to obtain a plurality of check data, and the check data is supplemented to the end of each row of the initial matrix to obtain a check matrix; in another implementation scenario, each column of the initial matrix may be verified to obtain a plurality of verification data, and the verification data is supplemented to the end of each column of the initial matrix to obtain a verification matrix; in another implementation scenario, each row and each column of the initial matrix may be verified to obtain a plurality of verification data, the verification data verified for each row is supplemented to the end of each row, and the verification data verified for each column is supplemented to the end of each column.
Step S43: and performing row-column replacement on the check matrix to obtain a preprocessed data matrix.
In one implementation scenario, when performing row-column permutation on the check matrix, the bits of each column/row after conversion are controlled to be a fixed length, for example, the bits of each column are controlled to be 7 bits.
In another embodiment, referring to fig. 5, the step S41 may specifically include:
step S51: and verifying the data contained in the call information to generate first verification data.
In one implementation scenario, data included in the call information is carried by Long LCs having 64 bits in total, the data is arranged by 8 × 8 as an information bit matrix, and Cyclic Redundancy Check (CRC) is performed on the data, so as to generate first Check data.
Step S52: and arranging the data contained in the calling information and the first check data to form an initial matrix.
And arranging the data contained in the call information and the first check data into an initial matrix. In an implementation scenario, first check data obtained by performing CRC check on data arranged in 8 × 8 as an information bit matrix and an information bit matrix arranged in 9 × 8 are arranged, and the information bit matrix arranged in 9 × 8 is arranged according to a 12-bit horizontally arranged data matrix, so as to finally obtain an initial matrix arranged in 6 × 12.
Further, the step S42 may specifically include:
step S53: and carrying out Hamming coding on each row of data of the initial matrix to obtain a corresponding group of second check data, and supplementing each group of second check data to the tail of the corresponding row.
In one implementation scenario, each row of the initial matrix of 6 × 12 is hammed (17,12,3) to obtain 5 bits of second parity data, and each set of second parity data is supplemented to the end of the corresponding row to obtain an information bit matrix of 6 × 17 rows, i.e., an information bit matrix of 6 rows × 17 columns, i.e., each row has 17 bits, and each column has 6 bits.
Step S54: and performing parity check on each line of data of the initial matrix after the second check data is supplemented to obtain a corresponding group of third check data, and supplementing each group of third check data to the tail of the corresponding line to form a check matrix.
In an implementation scenario, parity check is performed on each column of data of the initial matrix supplemented with the second check data, that is, the information bit matrix arranged 6 × 17, to obtain a corresponding group of third check data, and each group of third check data is supplemented to the end of the corresponding column to form a check matrix arranged 7 × 17.
The following describes the steps of processing the call information into multiple signaling with preset format in the above step S11 in combination with fig. 6 and 7 as a whole:
step S61: and verifying the data contained in the call information to generate first verification data.
For the call information carried by Long LC signaling in this embodiment, the data included in the call information has 64 bits (LC (0) -LC (63)) in total, and is arranged in an 8 × 8 information bit matrix (8 rows × 8 columns), and CRC check is performed on the data to obtain first check data having 8 bits in total, which is CR (0) -CR (7), and the generated first check data and the data included in the call information are arranged in a 9 × 8 information bit matrix.
Step S62: and arranging the data contained in the calling information and the first check data to form an initial matrix.
Arranging the information bit matrix transverse arrangement data in the 9-by-8 arrangement according to a 12-bit arrangement data matrix to form an information bit matrix in a 6-by-12 arrangement, namely an initial matrix.
Step S63: and carrying out Hamming coding on each row of data of the initial matrix after the second check data is supplemented to obtain a corresponding group of second check data, and supplementing each group of second check data to the tail of the corresponding row.
Performing (17,12,3) hamming encoding on each row of data of the initial matrix arranged by 6 × 12 to obtain a corresponding set of second parity data, namely for the first row (LC (63) -LC (52)) in the initial matrix to obtain a corresponding set of second parity data (H1(4) -H1(0)), and supplementing the second parity data to the end of the first row; for the second row (LC (51) -LC (40)) of the initial matrix, a corresponding set of second parity data (H2(4) -H2(0)) is obtained, which is supplemented to the end of the second row, and so on, and the description of the embodiment is omitted here.
And after each group of second check data is supplemented to the end of the corresponding row, obtaining an information bit matrix arranged by 6 × 17.
Step S64: and performing parity check on each line of data of the initial matrix after the second check data is supplemented to obtain a corresponding group of third check data, and supplementing each group of third check data to the tail of the corresponding line to form a check matrix.
Performing parity check on each column of the initial matrix supplemented with the second check data, that is, performing parity check on each column of the 6 × 17 arranged information bit matrix, to obtain third check data corresponding to the 1 st column to the 17 th column, respectively: and the PC (16) -PC (0) supplements the information to the tail end of the corresponding column to form an information bit matrix with 7-17 arrangement, namely a check matrix.
Step S65: and performing row-column replacement on the check matrix to obtain a preprocessed data matrix.
And performing row-column permutation on the check matrix, namely performing row-column permutation on the information bit matrix arranged by 7 × 17, specifically, permuting rows of the check matrix into columns, and controlling the data bits of each column to be 7 bits, so as to finally obtain the information bit matrix arranged by 7 × 17, namely the preprocessed data matrix.
Step S66: and taking each row/column data of the preprocessed data matrix as a group of call data to obtain a plurality of groups of call data.
In this embodiment, each row of data of the preprocessed data matrix is used as a group of call data, and 7 groups of call data are finally obtained, where the data bit of each group of call data is 17 bits and is used as 17 bits in the valid data in 24 bits of the CACH signaling, so as to obtain CACH1-CACH 7.
Step S67: and carrying out interleaving processing on each group of call data and each group of identifiers corresponding to each group of call data to obtain a corresponding signaling.
And carrying out interleaving processing on each group of call data and each group of identifiers corresponding to each group of call data to obtain a corresponding signaling. Specifically, as shown in fig. 7, AT is embedded before the 1 st bit of each group of 17-bit call data, TC is embedded after 3 th bit of valid data, lcs (1) is embedded after 3 rd bit of valid data, that is, the upper bit of lcs, lcs (0) is embedded after 3 rd bit of valid data, that is, the lower bit of lcs, FEC (2) is embedded after 1 st bit of valid data, FEC (1) is embedded after 3 rd bit of valid data, FEC (0) is embedded after 3 rd bit of valid data, and finally, 7 total 24-bit complete CACH signaling conforming to CACH signaling rules is obtained. It is to be understood that fig. 7 is merely an illustration of interleaving 17 bits of call data with an identifier. In practical implementation, each group of 17-bit call data needs to be interleaved with the corresponding identifier in the above manner.
After step S67, a step of transmitting the above-described 7 CACH signaling through a common broadcast channel (CACH) is performed. Referring to fig. 2, in the DMR, the timing duration of each CACH signaling is 2.5ms, and the timing duration of each downlink burst is 27.5 ms. Therefore, the duration of sending the 7 CACH signaling is 210ms, that is, the target terminal can obtain complete call information by continuously receiving the 7 CACH signaling, that is, after 210 ms. In the prior art, embedded signaling is embedded in a burst of a superframe, and the time of one superframe is 360ms, so that the embedded signaling is acquired in the prior art, complete call information is acquired, whether delayed access is executed needs at least 360ms, and if a scene of embedded signaling periodic nesting exists, the delayed access time is theoretically longer. The call information is processed into 7 CACH signaling, so that the call information can be acquired only by 210 ms. Compared with the prior art, the method and the device effectively reduce the time for the target terminal to acquire the call information, and further reduce the time for the target terminal to determine whether to access the call information later. Meanwhile, the problem that in the prior art, due to the fact that the LC _ EMB cannot be acquired for a long time and whether delayed access is executed cannot be determined in a delayed mode or not, a useful call can be missed is effectively solved.
Referring to fig. 8, fig. 8 is a flowchart illustrating a delayed access method according to another embodiment of the present application. Before the step S11 and after the step S12, the late access method further includes:
step S81: and updating the call information.
When any one of the calling service type and the access identifier of the target terminal changes, the calling information needs to be updated in time, so that the target terminal can accurately determine whether to execute delayed access according to the acquired calling information when the relay station of the trunking communication system subsequently sends a plurality of signaling in a control channel. The relay station, also called a relay station or a peer station, in other scenarios, also called a base station, is used in a trunking communication system to increase a communication distance, extend a coverage area, and also used to access a third party service, and the like, and is an essential important device in the field of private network communication.
Step S82: and judging whether the mobile terminal is in the sleep state, if so, executing the step S83, otherwise, executing the step S85.
The software and hardware of the relay station may be in an inactive state, i.e., a sleep state. When the relay station is in an inactive state, the updated call information cannot be cached, and therefore, it is necessary to determine whether the relay station is in a dormant state before caching the updated call information.
Step S83: activation is performed.
And if the relay station is in the dormant state, activating so as to cache the updated call information.
Step S84: and caching the updated call information.
And caching the updated call information so as to facilitate the subsequent processing of the updated call information into a plurality of signaling with preset formats.
Step S85: step S84 is executed.
If the transfer platform is in the activated state, the updated calling information is directly cached.
Through the above embodiment, the steps of updating the call information and caching the updated call information are performed before step S11 and after step S12, so that the call information can be sent over the air interface once changed, and the target terminal can accurately determine whether to perform late access according to the acquired call information.
Referring to fig. 9, fig. 9 is a flowchart illustrating a delayed access method according to another embodiment of the present application. Specifically, the method comprises the following steps:
step S91: a plurality of signaling having a preset format is received through a control channel.
Unlike traffic channels used to carry voice/data traffic, control channels are used to carry signaling. In one implementation scenario, in a DMR or PDT or other trunking communication that employs a double-timeslot TDMA (Time Division Multiple Access) technique, in order for a target terminal to receive Multiple signaling with a predetermined format, the Multiple signaling with the predetermined format may be embedded in a burst of a Common broadcast Channel (CACH). As shown in the downlink channel timing sequence of fig. 2, in cluster communication using double-slot TDMA such as DMR or PDT, CACH signaling is located between burst 1 of channel1 and burst 2 of channel 2 of the downlink channel.
In one implementation scenario, in order to make the information included in the call information at least available to the target terminal to determine whether to perform the late access and accurately access, the call information at least includes the service type of the call and the access identifier of at least one target terminal. The service types include, but are not limited to, group call services, individual call services, group data services, emergency group call services, and the like. The access identity may comprise a destination address.
Step S92: the plurality of signaling is processed to obtain call information based on the plurality of signaling.
And processing the received multiple signaling to acquire the call information.
Step S93: the call information is used to determine whether to perform late access.
In one implementation scenario, the call information includes at least a service type of the call and an access identification of the at least one target terminal. The service types include, but are not limited to, group call services, individual call services, group data services, emergency group call services, and the like. The access identifier may include a target address, and whether to perform late access is determined according to the service type and the access identifier included in the acquired call information.
Through the implementation mode, the method receives a plurality of signaling with a preset format through the control channel, wherein the call information is formed by the call data contained in the plurality of signaling, processes the plurality of signaling to obtain the call information, and determines whether to execute the delayed access by using the call information. By the mode, the call information used for determining whether to perform delayed access is split into the plurality of signaling which can be borne in the control channel, and then the signaling used for determining whether to perform delayed access is sent to the target terminal on the control channel to achieve delayed access, so that service channel resources do not need to be occupied, and the utilization rate of the channel resources is improved.
Referring to fig. 10, fig. 10 is a flowchart illustrating an embodiment of step S92 in fig. 9. Each signaling comprises a group of calling data and a group of identifiers, wherein the group of identifiers comprises a position identifier used for indicating the position of the corresponding signaling in the received multiple signaling. The call data contains at least the service type of the call and the access identification. In one implementation scenario, when the CACH is used to carry call information, the identifier includes a TC for indicating a next timeslot number, an AT for indicating a busy-idle state of a current timeslot, and an lcs for indicating a start, a continuation, and an end of multiple CACH signaling, i.e., a location identifier in this embodiment, which indicates a location of the corresponding CACH signaling in the sent multiple CACH signaling. The LCSS has 2 bits, encoded in DMR as 00, 01, 10, 11, indicated as single packet, start packet, end packet, middle packet, respectively. The identifier may also comprise 3 check bits FEC. The step S92 may specifically include:
step S921: multiple groups of call data are obtained from multiple signaling, and the multiple groups of call data are arranged in sequence according to the position identifiers in the signaling.
In one implementation scenario, referring to fig. 7, the complete CACH1-CACH7 is obtained, and the call data is sorted according to the location identifier lcs (including lcs (1) and lcs (0)) in each signaling, so that the call data can be decoded correctly in the following.
Step S922: and decoding the arranged groups of call data to acquire call information.
And decoding the groups of call data sorted according to the position identifiers to obtain call information.
Referring to fig. 11, fig. 11 is a flowchart illustrating an embodiment of step S922 in fig. 10. Specifically, step S922 may include:
step S9221: and forming a preprocessing data matrix by the multiple groups of call data.
In one implementation scenario, referring to fig. 7 in combination, a plurality of sets of call data are sequentially stacked to obtain a 7 × 17 information bit matrix, i.e., a preprocessed data matrix.
Step S9222: and performing row-column replacement on the preprocessed data matrix to obtain a check matrix.
With continuing reference to fig. 7, the preprocessed data matrix with 7 × 17 arrangement is row-column converted, that is, the rows of the preprocessed data matrix are converted into the columns, and the data bits in each column are controlled to be 7 bits, so as to finally obtain the check matrix with 7 × 17 arrangement.
Step S9223: and eliminating the check data of the initial matrix in the check matrix to obtain the initial matrix.
With continuing reference to fig. 7, the check data of the 7 × 17 arranged check matrix to the initial matrix is discarded. In an implementation scenario, the check data includes check data obtained by hamming coding each row of the initial matrix and check data obtained by parity check of each column of the initial matrix after the hamming coding is supplemented, and after the check data is removed, the initial matrix with 6 × 12 arrangement can be obtained.
Step S9224: the initial matrix is rearranged to obtain call information.
With reference to fig. 7, the initial matrix of 6 × 12 is arranged according to the 8-bit horizontally arranged data matrix, so as to obtain the call information carried by the Long LC signaling. For the application that Long LC signaling is used to carry call information, data contained in the call information has 64 bits (LC (0) -LC (63)), where the data includes a 4-bit channel1 service type identifier (Time Slot1Activity ID), a 4-bit channel 2 service type identifier (Time Slot2Activity ID), a 24-bit channel1 Address (Address Time Slot1), and a 24-bit channel 2 Address (Address Time Slot2), where the channel1 service type and the channel 2 service type carry the service type of a call in the call information, and the channel1 Address and the channel 2 Address carry an access identifier of the call information.
In the embodiment, the Long LC signaling is used for bearing the call information, the DMR protocol standard is met, and the method and the system can be compatible with the scene that the target terminal in the DMR adopts Short link control information Short LC.
Referring to fig. 12, fig. 12 is a flowchart illustrating a delayed access according to another embodiment of the present application. Specifically, before the step S91, the late access method of the present application may further include:
step S1201: and jumping to a communication frequency point.
In one implementation scenario, the target terminal is configured with a frequency point scanning list, for example, configured with scanning lists of channels 1 to 4, and the target terminal continuously scans back and forth between channels 1 to 4, thereby jumping to a communication frequency point. In another implementation scenario, the target terminal may also be manually switched to a certain communication frequency point. The target terminal may also jump to a communication frequency point through other manners, and this embodiment is not limited herein.
Step S1202: and judging whether the service carried by the current communication frequency point can be accessed. If so, go to step S1203, otherwise go to step S1204.
In an implementation scenario, a target terminal first performs carrier detection, performs pattern detection after confirming a carrier, and identifies a Color Code (CC) of a current communication frequency point after detecting a synchronization pattern, where if the detections all meet preset conditions, that is, the carrier detection confirms that a carrier exists, the synchronization pattern can be detected, and identifies a matched Color Code, it indicates that a service carried by the current communication frequency point can be accessed, step S1203 is executed, otherwise step S1204 is executed.
Step S1203: the step of receiving a plurality of signaling with a preset format through a control channel and the subsequent steps are executed.
If the service carried by the current communication frequency point can be accessed by the target terminal, step S91 and the subsequent steps in the above embodiment are executed, so that after the target terminal acquires the call information, it is determined whether to execute the late access.
Step S1204: skipping to a new communication frequency point, and executing the step of judging whether the service carried by the current communication frequency point can be accessed or not and the subsequent steps.
If the service carried by the current communication frequency point can not be accessed by the target terminal, a new communication frequency point is jumped to, and the step S1202 and the subsequent steps are executed to judge whether the service carried by the jumped new communication frequency point can be accessed.
Referring to fig. 13, fig. 13 is a schematic flowchart illustrating an embodiment of step S93 in fig. 9, where the step S93 may specifically include:
step S931: and acquiring the service type of the call and the access identifier of the called target terminal from the call information.
And acquiring the service type of the call and the access identifier of the called target terminal from the call information. For example, the service type of the acquired call is a Group call service (Group Voice), the access identifier of the acquired called target terminal is Group1, or the service type of the acquired call is an Emergency Group call service (Emergency Group Voice), the access identifier of the acquired called target terminal is Emergency Group2, and the like, which is not limited in this embodiment.
Step S932: and judging whether the service carried by the current communication frequency point is contained in a pre-stored access list or not according to the service type and the access identifier, if so, executing a step S933, and otherwise, executing a step S934.
The access list is a communication list pre-stored in the target terminal. For example, the target terminal a is a hotel console terminal, which is configured with all Group call lists Group _ A, Group _ B, Group _ C, Group _ D of a hotel, and at this time, the acquired service type is Emergency Group call service (Emergency Group Voice), and the access identifier is Group _ a, it is determined that the service carried by the current communication frequency point is included in the pre-stored access list. Or, for example, the target terminal B is a hotel kitchen terminal, and is configured with all Group call lists Group _ A, Group _ B in the hotel kitchen jurisdiction, at this time, the obtained service type is a Group call service (Group Voice), and the access identifier is Group _ D, and at this time, although the service type is a receivable service type, the Group _ D is not in the access list, it is determined that the service carried by the current communication frequency point is not included in the pre-stored access list.
Step S933: and performing delayed access through the communication frequency point.
If the service carried by the current communication frequency point is judged to be contained in the pre-stored access list according to the service type and the access identifier, the delayed access is executed through the current communication frequency point, for example, a voice frame is received and a loudspeaker is turned on, so that the target terminal plays the current calling voice.
Step S934: skipping to a new communication frequency point, and executing the step of judging whether the service carried by the current communication frequency point can be accessed or not and the subsequent steps.
If the service carried by the current communication frequency point is judged not to be contained in the pre-stored access list according to the service type and the access identifier, a new communication frequency point is skipped, and step S1202 and subsequent steps in the above embodiment are executed, that is, the step of judging whether the service carried by the current communication frequency point can be accessed and the subsequent steps are executed, so as to judge whether the service carried by the skipped new communication frequency point can be accessed.
Referring to fig. 14, fig. 14 is a schematic diagram of a frame of an embodiment of a communication device according to the present application. The communication device of the present application includes a communication circuit 1401 and a processing circuit 1402, which are coupled to each other, and the communication circuit 1401 and the processing circuit 1402 operate to implement the late access method in the above-described embodiments. Specifically, the processing circuit 1402 may be configured to process call information for the at least one target terminal into a plurality of signaling having a preset format, and control the communication circuit 1401 to transmit the plurality of signaling through the control channel, so that the at least one target terminal acquires the call information using the plurality of signaling and determines whether to perform late access. Alternatively, the processing circuit 1402 is configured to control the communication circuit 1401 to receive a plurality of signaling with a preset format through a control channel, wherein call data included in the plurality of signaling constitutes call information, and the processing circuit 1402 is further configured to process the plurality of signaling to obtain the call information and determine whether to perform late access by using the call information.
The Processing circuit 1402 may also be referred to as a CPU (Central Processing Unit). The processing circuit 1402 may be an integrated circuit chip having signal processing capabilities. The processing circuit 1402 may also be a general purpose processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. In addition, the processing circuit 1402 may be collectively implemented by a plurality of circuit-forming chips.
Through the implementation mode, the signaling is carried in the control channel, so that the signaling is embedded in the burst of the superframe without occupying effective channel resources, and the utilization rate of the channel resources is improved.
Referring to fig. 15, fig. 15 is a block diagram illustrating an embodiment of a computer-readable storage medium 150 according to the present application. The computer-readable storage medium 150 has a computer program 1501 stored thereon, and when the computer program 1501 is executed by a processor, the late access method in the above-described embodiment of the present application can be implemented.
The computer-readable storage medium 150 may be a medium that can store the computer program 1501, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk, or may be a server that stores the computer program 1501, and the server may send the stored computer program 1501 to another device for running, or may run the stored computer program 1501 by itself.
The above description is only for the purpose of illustrating embodiments of the present application and is not intended to limit the scope of the present application, and all modifications of equivalent structures and equivalent processes, which are made by the contents of the specification and the drawings of the present application or are directly or indirectly applied to other related technical fields, are also included in the scope of the present application.

Claims (10)

1. A late access method, characterized in that the method comprises:
processing call information for at least one target terminal into a plurality of signaling with a preset format; wherein the processing of the call information to the at least one target terminal into the plurality of signaling having the preset format comprises: coding the call information to obtain preprocessed data, dividing the preprocessed data into a plurality of groups of call data, and generating a plurality of signaling by using the plurality of groups of call data and corresponding plurality of groups of identifiers respectively, wherein each signaling comprises a group of call data and a group of identifiers; each group of identifiers comprises a position identifier used for indicating the position of the corresponding signaling in the sent multiple signaling;
sending the multiple signaling through a control channel, so that the at least one target terminal acquires the call information by using the multiple signaling and determines whether to execute delayed access;
wherein the encoding the call information to obtain the preprocessed data includes: carrying out BPTC coding on the call information to obtain a preprocessed data matrix;
the dividing the pre-processed data into a plurality of groups of call data comprises: and taking each row/column data of the preprocessed data matrix as a group of calling data to obtain the multiple groups of calling data.
2. The method of claim 1,
the generating the plurality of signaling using the plurality of sets of call data and the corresponding plurality of sets of identifiers, respectively, comprises:
and carrying out interleaving processing on each group of call data and each group of identifiers corresponding to each group of call data to obtain a corresponding signaling.
3. The method of claim 1, wherein the BPTC encoding the call information to obtain a pre-processing data matrix comprises:
rearranging data contained in the call information to obtain an initial matrix;
verifying the initial matrix to obtain a plurality of verification data, and supplementing the plurality of verification data into the initial matrix to obtain a verification matrix;
and performing row-column replacement on the check matrix to obtain the preprocessed data matrix.
4. The method of claim 3,
the rearranging data included in the call information to obtain an initial matrix includes:
verifying data contained in the call information to generate first verification data;
arranging data contained in the call information and the first check data to form the initial matrix;
the verifying the initial matrix to obtain a plurality of verification data, and supplementing the plurality of verification data into the initial matrix to obtain a verification matrix, includes:
performing Hamming coding on each row of data of the initial matrix to obtain a corresponding group of second check data, and supplementing each group of the second check data to the tail of the corresponding row;
and performing parity check on each line of data of the initial matrix after the second check data is supplemented to obtain a corresponding group of third check data, and supplementing each group of the third check data to the tail of the corresponding line to form the check matrix.
5. The method of claim 1, wherein before processing the call information for the at least one target terminal into a plurality of signaling with a preset format, and after sending the plurality of signaling through a control channel, so that the at least one target terminal acquires the call information by using the plurality of signaling and determines whether to perform late access, the method further comprises:
updating the call information;
judging whether the mobile phone is in a dormant state or not;
if yes, activating and caching the updated calling information;
if not, the updated call information is directly cached.
6. A late access method, characterized in that the method comprises:
receiving a plurality of signaling with a preset format through a control channel; each signaling comprises a group of calling data and a group of identifiers, wherein the group of calling data and the group of identifiers are used for forming calling information, and each group of identifiers comprises a position identifier and is used for indicating the position of the corresponding signaling in the received multiple signaling;
processing the plurality of signaling to obtain call information according to the plurality of signaling; wherein the processing the plurality of signaling to obtain the call information according to the plurality of signaling comprises: obtaining a plurality of groups of call data from the plurality of signaling, arranging the plurality of groups of call data in sequence according to the position identifier in the signaling, and decoding the arranged plurality of groups of call data to obtain the call information;
determining whether to perform late access using the call information;
wherein the decoding the arranged multiple groups of call data to obtain the call information includes: and forming a preprocessed data matrix by the multiple groups of call data, performing row-column replacement on the preprocessed data matrix to obtain a check matrix, removing check data of the initial matrix in the check matrix to obtain the initial matrix, and rearranging the initial matrix to obtain the call information.
7. The method of claim 6, wherein before the receiving the plurality of signaling with the preset format over the control channel, the method comprises:
jumping to a communication frequency point;
judging whether the service carried by the current communication frequency point can be accessed;
if yes, executing the step of receiving a plurality of signaling with preset formats through the control channel and the subsequent steps;
if not, skipping to a new communication frequency point, and executing the step of judging whether the service carried by the current communication frequency point can be accessed or not and the subsequent steps.
8. The method of claim 7, wherein using the call information to determine whether to perform late access comprises:
acquiring the service type of a call and the access identifier of a called target terminal from the call information;
judging whether the service carried by the current communication frequency point is contained in a pre-stored access list or not according to the service type and the access identifier;
if yes, performing delayed access through the communication frequency point;
if not, skipping to a new communication frequency point, and executing the step of judging whether the service carried by the current communication frequency point can be accessed or not and the subsequent steps.
9. A communications apparatus, the apparatus comprising:
communication circuitry and processing circuitry coupled to each other;
the communication circuit, the processing circuit being operative to implement the late access method of any of claims 1-5 or claims 6-8.
10. A computer-readable storage medium, having stored thereon a computer program which, when executed by a processor, implements the late access method of any one of claims 1-5 or claims 6-8.
CN201910360939.1A 2019-04-30 2019-04-30 Late access method, communication device and computer readable storage medium Active CN111866750B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910360939.1A CN111866750B (en) 2019-04-30 2019-04-30 Late access method, communication device and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910360939.1A CN111866750B (en) 2019-04-30 2019-04-30 Late access method, communication device and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN111866750A CN111866750A (en) 2020-10-30
CN111866750B true CN111866750B (en) 2022-03-22

Family

ID=72966472

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910360939.1A Active CN111866750B (en) 2019-04-30 2019-04-30 Late access method, communication device and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN111866750B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112737633B (en) * 2020-12-25 2022-03-15 河北远东通信系统工程有限公司 Frequency hopping group call delayed adding method suitable for PDT/DMR
CN113314128B (en) * 2021-05-27 2022-07-12 哈尔滨海能达科技有限公司 Delayed access method, device and system for voice service and related products

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101940009A (en) * 2007-12-28 2011-01-05 北电网络有限公司 Call group set up, managing a group call and coordination of group calls
CN103096258A (en) * 2013-01-15 2013-05-08 中兴通讯股份有限公司 Delayed connect-in method, base station and terminal in broadband trunking communication system
CN103108286A (en) * 2011-11-10 2013-05-15 中兴通讯股份有限公司 Method and network element and terminal for user lagged access based on enhanced multimedia broadcast multicast service (EMBMS) cluster system
CN103517213A (en) * 2012-06-27 2014-01-15 福建先创通信有限公司 Late signaling sending method in TDMA mobile communication system
CN106341798A (en) * 2016-09-28 2017-01-18 海能达通信股份有限公司 Trunking group call delayed access method and device

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9344290B2 (en) * 2007-09-24 2016-05-17 Qualcomm Incorporated Terminating a multicast session within a wireless communications network
CN103650418B (en) * 2011-06-09 2017-10-31 安华高科技通用Ip(新加坡)公司 Method and apparatus for multicast service

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101940009A (en) * 2007-12-28 2011-01-05 北电网络有限公司 Call group set up, managing a group call and coordination of group calls
CN103108286A (en) * 2011-11-10 2013-05-15 中兴通讯股份有限公司 Method and network element and terminal for user lagged access based on enhanced multimedia broadcast multicast service (EMBMS) cluster system
CN103517213A (en) * 2012-06-27 2014-01-15 福建先创通信有限公司 Late signaling sending method in TDMA mobile communication system
CN103096258A (en) * 2013-01-15 2013-05-08 中兴通讯股份有限公司 Delayed connect-in method, base station and terminal in broadband trunking communication system
CN106341798A (en) * 2016-09-28 2017-01-18 海能达通信股份有限公司 Trunking group call delayed access method and device

Also Published As

Publication number Publication date
CN111866750A (en) 2020-10-30

Similar Documents

Publication Publication Date Title
US11678168B2 (en) Method and apparatus for efficiently controlling access for system load adjustment in mobile communication systems
EP2200392B1 (en) Semi-persistent resource release by wireless communication device
CN101385381B (en) Initial connection establishment in a wireless communication system
CN101860898B (en) Method and system for collocating hybrid automatic repeat request related information
CZ307671B6 (en) A method and apparatus for paging a wireless terminal in a wireless communication system
US8325731B2 (en) Method for establishing a call rapidly in CDMA cluster communication system
CZ298748B6 (en) Method of and apparatus for paging a wireless terminal in a wireless telecommunications system
CN104427626B (en) Semi-static scheduling method and system
CN107343297A (en) A kind of method and apparatus in radio communication
CN103220741A (en) Controlled idle mode bahavious in user equipement supporting multiple radio access techniques
CN101730253A (en) Method of improving semi-persistent scheduling resources reconfiguration in a wireless communication system and related communication device
TWM354286U (en) Apparatus for handling random access channel responses
CN111866750B (en) Late access method, communication device and computer readable storage medium
WO2019179343A1 (en) Method and device used in user equipment and base station for radio communication
CN104244453A (en) Method of Handling Radio Resource Control Connection Establishment during Reception of Public Warning System Message in Wireless Communication System and Communication Device Thereof
US20100075691A1 (en) Transport Block Size Signaling for Semi-Persistent Scheduling
US9232365B1 (en) Push-to-talk capacity enhancement
US20120127907A1 (en) Method and Device for Transmitting Multimedia Broadcast Multicast Service Notification Messages
CN103155673B (en) For providing the method and apparatus multiplexed to the resource on transmission medium
WO2013123844A1 (en) Method, terminal, and base station for multi-terminal competition conflict resolution
US9444602B2 (en) Control signaling transmission method, control signaling processing device, and terminal
CN113141657B (en) Semi-persistent scheduling method and device
CN104427634A (en) Signaling sending method and device
CN108702652B (en) TTI switching method and device
EP2736279A1 (en) Methods and devices for broadcast messaging in a mobile communications system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant