CN112188558B - Network connection method, terminal and storage medium - Google Patents
Network connection method, terminal and storage medium Download PDFInfo
- Publication number
- CN112188558B CN112188558B CN202011128504.3A CN202011128504A CN112188558B CN 112188558 B CN112188558 B CN 112188558B CN 202011128504 A CN202011128504 A CN 202011128504A CN 112188558 B CN112188558 B CN 112188558B
- Authority
- CN
- China
- Prior art keywords
- request
- network access
- access request
- layer
- network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 51
- 238000003860 storage Methods 0.000 title claims abstract description 12
- 230000000903 blocking effect Effects 0.000 claims description 87
- 230000000977 initiatory effect Effects 0.000 claims description 31
- 230000005540 biological transmission Effects 0.000 claims description 30
- 230000015654 memory Effects 0.000 claims description 22
- 230000000116 mitigating effect Effects 0.000 claims description 21
- 238000004590 computer program Methods 0.000 claims description 13
- 238000004891 communication Methods 0.000 claims description 8
- 238000010586 diagram Methods 0.000 description 14
- 230000011664 signaling Effects 0.000 description 8
- 230000006870 function Effects 0.000 description 4
- 238000013507 mapping Methods 0.000 description 3
- 101150096310 SIB1 gene Proteins 0.000 description 2
- 238000013500 data storage Methods 0.000 description 1
- 238000009826 distribution Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W28/00—Network traffic management; Network resource management
- H04W28/02—Traffic management, e.g. flow control or congestion control
- H04W28/06—Optimizing the usage of the radio link, e.g. header compression, information sizing, discarding information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W24/00—Supervisory, monitoring or testing arrangements
- H04W24/02—Arrangements for optimising operational condition
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/08—Access restriction or access information delivery, e.g. discovery data delivery
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/16—Discovering, processing access restriction or access information
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The embodiment of the application discloses a network connection method, a terminal and a storage medium, wherein the network connection method is applied to the terminal, the terminal comprises a non-access stratum (NAS) and an Access Stratum (AS), the NAS comprises a first timer, and the network connection method comprises the following steps: the NAS layer receives a request relieving message transmitted by the AS layer under the condition that the first network access request is determined to be forbidden and the request forbidden duration is up; the NAS layer determines a first operation time length of a first timer according to the request relieving message and starts the first timer; and sending a second network access request to the network side within the first operation duration under the condition of receiving the second network access request, so that the network side can execute network access operation corresponding to the second network access request, wherein the first request type of the first network access request is the same as the second request type of the second network access request.
Description
Technical Field
The present application relates to the field of communications technologies, and in particular, to a network connection method, a terminal, and a storage medium.
Background
Unified Access Control (UAC) is a mechanism introduced in a 5G system to control a terminal to access a network, and aims to alleviate network congestion at a base station side.
In the prior art, a network Access request generated by a terminal is judged by a Non-Access Stratum (NAS) and an Access Stratum (AS), after the fact that the network Access request is forbidden due to a unified Access control mechanism is determined, when the terminal generates the network Access request again, the NAS layer and the AS layer also judge whether the Access request is forbidden, if the Access request is forbidden, the terminal cannot send the network Access request generated again to a network side, and therefore the speed of the terminal sending the network Access request to the network side is reduced.
Disclosure of Invention
In order to solve the foregoing technical problem, embodiments of the present application are intended to provide a network connection method, a terminal, and a storage medium, which can improve the speed when the terminal sends a network access request to a network side.
The technical scheme of the application is realized as follows:
the embodiment of the application provides a network connection method, which is applied to a terminal, wherein the terminal comprises a non-access stratum (NAS) and an Access Stratum (AS), the NAS comprises a first timer, and the method comprises the following steps:
under the condition that the first network access request is forbidden and the request forbidden duration is up, the NAS layer receives a request release message transmitted by the AS layer;
the NAS layer determines a first operation duration of the first timer according to the request relieving message and starts the first timer;
and sending a second network access request to the network side within the first operation duration under the condition that the second network access request is received, so that the network side can execute network access operation corresponding to the second network access request, wherein the first request type of the first network access request is the same as the second request type of the second network access request.
The embodiment of the application provides a terminal, the terminal includes an NAS layer and an AS layer, the NAS layer includes a first timer, and the terminal includes:
a receiving unit, configured to receive, by the NAS layer, a request mitigation message transmitted by the AS layer when it is determined that the first network access request is prohibited and a request prohibition duration arrives;
a determining unit, configured to determine, by the NAS layer, a first operation duration of the first timer according to the request mitigation message;
the starting unit is used for starting the first timer;
a sending unit, configured to send a second network access request to the network side when the second network access request is received within the first operation duration, so that the network side executes a network access operation corresponding to the second network access request, where a first request type of the first network access request is the same as a second request type of the second network access request.
An embodiment of the present application provides a terminal, including:
a memory, a processor, and a communication bus, the memory communicating with the processor through the communication bus, the memory storing a network-connected program executable by the processor, the network-connected program, when executed, executing the method described above by the processor.
The embodiment of the present application provides a storage medium, on which a computer program is stored, and is applied to a terminal, wherein the computer program is implemented by a processor, and when executed by the processor, the method is implemented.
The embodiment of the application provides a network connection method, a terminal and a storage medium, wherein the network connection method is applied to the terminal, the terminal comprises an NAS layer and an AS layer, the NAS layer comprises a first timer, and the network connection method comprises the following steps: the NAS layer receives a request relieving message transmitted by the AS layer under the condition that the first network access request is determined to be forbidden and the request forbidden duration is up; the NAS layer determines a first running time length of a first timer according to the request relieving message and starts the first timer; and sending a second network access request to the network side within the first operation duration under the condition that the second network access request is received, so that the network side can execute network access operation corresponding to the second network access request, wherein the first request type of the first network access request is the same as the second request type of the second network access request. By adopting the method, under the condition that the terminal determines that the first network access request is forbidden and the request forbidden time length is reached, the terminal determines the first operation time length according to the request release message, so that the terminal can directly send the second network access request to the network side when receiving the second network access request corresponding to the second request type which is the same as the first request type within the first preset time length, and the speed of the terminal sending the network access request to the network side is improved.
Drawings
Fig. 1 is a schematic diagram of a network connection structure in the prior art according to an embodiment of the present application;
fig. 2 is a flowchart of a network connection method according to an embodiment of the present disclosure;
fig. 3 is a flowchart of an exemplary network connection method provided in an embodiment of the present application;
fig. 4 is a flowchart of an exemplary network connection method provided in the embodiment of the present application;
fig. 5 is a first schematic structural diagram of a terminal according to an embodiment of the present disclosure;
fig. 6 is a schematic structural diagram of a terminal according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
Unified Access Control (UAC) is a mechanism introduced in a 5G system to control a terminal to access a network, and aims to alleviate network congestion at a base station side. The mechanism supports all services, and is applicable to all states of the terminal: an idle state, a deactivated state, and a connected state. In the process of performing unified access control, the base station broadcasts access control Information in a System Information Block (SIB), which is a list of access parameters associated with an access identity and an access category, i.e. a barring parameter set consisting of a barring factor and a barring time. The terminal determines whether to allow access for the same access request as the access category based on the barring parameter sets and the terminal configuration. In the process of unified access control, the non-access layer is responsible for mapping different access requests and different priority users into an access category and one or more access identifiers, and the access layer determines whether to allow access according to the access category, the access identifiers and a blocking parameter set broadcasted by a network.
For the current requirements of 3GPP TS24.501 regarding the unified access control section, the general mechanism when a terminal processes a certain network access request (e.g. PDU session creation is initiated by the upper layer in idle mode) is shown in fig. 1:
11. the network access request is sent.
It should be noted that, after receiving the network access request sent by the upper layer application, the NAS layer determines a request type corresponding to the network access request from the configuration information of the terminal configuration and sets one or more request identifiers according to a mapping relationship between different access requests and terminal configurations.
It should be noted that, after receiving the network access request, the NAS layer sends the network access request to the AS layer.
It should be further noted that, the network access request sent by the NAS to the AS layer may specifically be a NAS signaling link establishment request.
It should be further noted that the NAS signaling link establishment request may be signaling generated by the NAS layer after the NAS layer receives the network access request.
It should be noted that the NAS signaling link establishment request sent by the NAS layer to the AS layer carries the request category and the request identifier.
After the AS layer receives the NAS signaling connection establishment request sent by the NAS layer, the AS layer can determine whether the network access request can be sent to the network side.
The AS layer may perform access control checks on the network access request in the following order, AS required by the 3GPP TS38.311 for the unified access control section.
12. And sending a blocking parameter, wherein the blocking parameter comprises blocking time.
In the embodiment of the application, the network side may send the blocking parameter to the AS layer before the NAS layer sends the network access request to the AS layer; the network side may send the barring parameter to the AS layer after the NAS layer sends the first network access request to the AS layer, which may be specifically determined according to an actual situation, and this is not limited in this embodiment of the present application.
It should be noted that the blocking parameter further includes a set of blocking factors.
13. It is determined that the network access request is barred.
The AS layer firstly checks the running state of a second timer in the AS layer, and if the running state of the second timer is running, the network access request is determined to be forbidden; if the running state of the second timer is not running, the AS layer checks the request type and the request identification sent by the NAS layer according to the access control information in the system message SIB1 sent by the network side. Each request class has a corresponding set of blocking parameters. The AS layer firstly checks the request identifications, if the blocking parameter corresponding to one of the request identifications is 0, the access is allowed, namely the network access request can be sent to the network side, if the blocking parameters are all 1, the blocking check of the request category is carried out, if the random number generated by the AS layer is smaller than the blocking factor in the blocking parameter set, the access is allowed, namely the network access request can be sent to the network side. Otherwise, the network access request is determined to be forbidden.
14. Transmitting the network access request prohibited information.
The AS layer sends network access request forbidden information to the upper layer application through the NAS layer.
15. And determining the running time of the second timer according to the blocking time, and starting the second timer.
If the network access request is forbidden, the AS informs the NAS layer network that the network access request is forbidden, and starts a second timer, wherein the running time of the second timer is (0.7+ 0.6) blocking time, the blocking time is a random number between 0 and 1, and the blocking time is the access forbidden time in the SIB 1.
During the time that the second timer is running, all access requests of the same request category as the network access request are barred.
16. A request for mitigation message is sent.
In the event that the second timer times out or otherwise stops, the AS sends a request for mitigation message to the NAS. The NAS layer forwards the request release message to an upper layer, and the upper layer application determines whether to continue initiating the network access request.
The network access request initiated by the terminal is judged in the NAS layer and the AS layer, and the fact that the network access request is forbidden due to the unified access control mechanism is determined, namely the AS starts a corresponding second timer of the access category, the terminal cannot perform the same access attempt within the period of time when the second timer runs, and the AS layer generates a release notice until the second timer runs overtime or stops running, and the terminal can send an RRC connection establishment request to the base station.
However, it is uncertain for the application layer when the user triggers the network access request, so even if the terminal receives the release notification, the terminal cannot immediately initiate the network access request, requesting to send an RRC connection establishment request to the base station. This presents a problem: when there is a network access request, do NAS layer and AS layer need to do unified access control check for the network access request? If the unified access control check needs to be performed, the access request may be prohibited again after being judged, and the access may be initiated again after the duration of a second timer, so that the success rate of establishing the RRC connection between the terminal and the base station is reduced, and the user experience is reduced. If the unified access control check is not needed, the original purpose of the unified access control mechanism is violated, and the network load of the base station side is increased, so that the network congestion is generated at the base station side.
The problems in the prior art can be solved by the following methods in the following embodiments.
An embodiment of the present application provides a network connection method, which is applied to a terminal, where the terminal includes a first timer, and fig. 2 is a first flowchart of the network connection method provided in the embodiment of the present application, and as shown in fig. 2, the network connection method may include:
s101, receiving a request release message transmitted by an AS layer by an NAS layer under the condition that the first network access request is determined to be forbidden and the request forbidden time length is up.
The network connection method provided by the embodiment of the application is suitable for a scene that the terminal sends the first network access request to the network side.
In the embodiments of the present application, the terminal may be implemented in various forms. For example, the terminal described in the present application may include devices such as a mobile phone, a tablet computer, a notebook computer, a palmtop computer, a Personal Digital Assistant (PDA), a Portable Media Player (PMP), a navigation device, a wearable device, a smart band, a pedometer, and the like, and devices such as a Digital TV, a desktop computer, and the like.
In the embodiment of the present application, the request to mitigate message may be information generated by the AS layer in the case that the prohibited duration arrives.
In the embodiment of the application, the request prohibition duration may be a duration preset in the terminal and used for not sending the first network access request to the network side; the request prohibition duration may also be a duration for which the network side broadcasts that the terminal is not allowed to send the first network access request to the network side; the request prohibition duration may also be a duration determined by the terminal according to the information broadcast by the network side, where the first network access request is not sent to the network side, and may specifically be determined according to an actual situation, which is not limited in this embodiment of the present application.
In the embodiment of the application, the terminal may generate the first network access request corresponding to the service access request under the condition that the service access request is triggered.
In an embodiment of the present application, the first network access request includes a data transmission channel allocation request or a voice call initiation request. Specifically, the Data transmission channel allocation request is a user plane resource request received by the terminal from a Data Plane (DP) and used for establishing an existing Packet Data Unit (PDU) session; the voice call initiation request may be a Multimedia telephone service (MMTEL) voice call initiation request from an IP Multimedia System (IMS) received by the terminal.
In this embodiment of the present application, the AS layer further includes a second timer, and when the terminal determines that the first network access request is prohibited and the request prohibition duration reaches, before the NAS layer receives the request mitigation message transmitted by the AS layer, the terminal further performs the following operations: under the condition that the NAS layer receives the first network access request, the terminal acquires a request parameter of the first network access request from the first network access request and transmits the request parameter to the AS layer; after the terminal transmits the request parameter to the AS layer, the AS layer of the terminal determines whether to start a second timer according to the request parameter and the blocking parameter; and after the AS layer of the terminal determines whether to start the second timer according to the request parameter and the blocking parameter, the AS layer determines the request forbidding duration based on the blocking time under the condition that the AS layer determines to start the second timer, and forbids to send a second network access request to the network side within the request forbidding duration.
In an embodiment of the present application, the second network access request includes a data transmission channel allocation request or a voice telephone initiation request. Specifically, the Data transmission channel allocation request is a user plane resource request received by the terminal from a Data Plane (DP) and used for establishing an existing Packet Data Unit (PDU) session; the voice call initiation request may be a Multimedia telephone service (MMTEL) voice call initiation request from an IP Multimedia System (IMS) received by the terminal.
It should be noted that the first request type of the first network access request is the same as the second request type of the second network access request.
It should be noted that the first request category may be a request category for a user to initiate data actively, and may also be a multimedia voice telephone category, which may be specifically determined according to an actual situation, and this is not limited in this embodiment of the present application.
It should be further noted that the request category for the user to actively initiate data may specifically be category 3: a terminal initiates (MO) data type; the multimedia voice telephony category may be specifically category 4: MMTEL voice telephony category.
It should be noted that the blocking parameter is a parameter corresponding to the first request type and sent by the network side; the blocking parameter includes a blocking time.
It should be noted that the request parameter includes a first request category and a first request identifier.
It should be noted that the number of the first request identifier may be one, or may be multiple, and may be specifically determined according to an actual situation, which is not limited in this embodiment of the present application.
In this embodiment of the application, when the NAS layer receives a first network access request, the NAS layer determines, according to a mapping relationship between different access requests and terminal configurations, a first request type corresponding to the first network access request from configuration information of the terminal configuration, and sets one or more first request identifiers.
In the embodiment of the application, the NAS layer may directly transmit the request parameter to the AS layer when the NAS layer acquires the request parameter; the NAS layer may also generate an NAS signaling link establishment request under the condition that the request parameter is obtained, load the request parameter into the NAS signaling link establishment request, and then transmit the NAS signaling link establishment request carrying the request parameter to the AS layer.
In this embodiment of the present application, the process of determining, by the AS layer, whether to start the second timer according to the request parameter and the barring parameter includes: the AS layer determines the state of a second timer under the condition that the AS layer receives the request parameter; when the AS layer determines that the state of the second timer is a non-running state, the AS layer determines whether a parameter value of a first request identifier in the request parameters is a preset parameter value, and when the parameter value of the first request identifier is not the preset parameter value, the AS layer determines a blocking factor corresponding to the first access category from a blocking factor set in the blocking parameter, and generates a first random number, and when the first random data is greater than or equal to the blocking factor, the AS layer determines that the first network access request is forbidden, then the AS layer sends information that the first network access request is forbidden to the NAS layer, and simultaneously the AS layer starts the second timer.
It should be noted that the blocking factor set includes a plurality of blocking factors, and the AS layer may determine, in the blocking factor set, a blocking factor corresponding to the request type of the first network access request when the AS layer obtains the first request type.
It should be noted that, the manner of determining, by the AS layer, the blocking factor corresponding to the first request type in the blocking factor set may be: the AS layer obtains a corresponding relation between the request category and the blocking factor from the blocking factor set, and determines the blocking factor corresponding to the first request category according to the first request category and the corresponding relation between the request category and the blocking factor.
In this embodiment of the present application, in case that the first random data is smaller than the barring factor, then the access is allowed, and the AS layer sends the first network access request to the network side.
In the embodiment of the application, the first random number is a random number between 0 and 1.
In this embodiment of the present application, when the AS layer determines that the state of the second timer is the running state, the AS layer determines that the first network access request is prohibited, and the AS layer does not send the first network access request to the network side.
In this embodiment of the application, when the parameter value of the first request identifier is not a preset parameter value, it may be that none of the at least one parameter value of the at least one first request identifier is equal to the preset parameter value.
In this embodiment of the application, a parameter value of the first request identifier may be 0, and a parameter value of the first request identifier may be 1, which may be determined specifically according to an actual situation, and this is not limited in this embodiment of the application.
In the embodiment of the present application, the preset parameter value may be 0.
In this embodiment of the present application, if any one of at least one parameter value of at least one first request identifier is 0, the access is allowed, and the AS layer sends the first network access request to the network side, or sends the Radio Resource Control (RRC) connection establishment request to the network side.
In the embodiment of the present application, the request prohibition time period is specifically a running time period of the second timer. And the terminal starts to run the second timer after starting the second timer, and stops running the second timer when the running time of the second timer exceeds the request prohibition time.
In this embodiment of the application, the second timer may be a T390 timer, the second timer may also be a T302 timer, and the second timer may also be a T390 timer and a T302 timer, which may be determined specifically according to an actual situation, and this is not limited in this embodiment of the application.
S102, the NAS layer determines a first operation time length of the first timer according to the request relieving message and starts the first timer.
In this embodiment of the application, after the NAS of the terminal receives the request mitigation message transmitted by the AS layer, the NAS layer of the terminal may determine the first operation duration of the first timer according to the request mitigation message, and start the first timer.
In this embodiment of the present application, a process of determining, by an NAS layer of a terminal, a first operation duration of a first timer according to a request mitigation message includes: the NAS layer obtains blocking time and request forbidding duration from the request relieving message; after the NAS layer of the terminal obtains the blocking time and the request forbidding duration from the request relieving message, the NAS layer of the terminal determines that the first operation duration of the first timer is up according to the blocking time and the request forbidding duration.
It should be noted that the blocking time is a preset time corresponding to the first request type of the SIB1 information broadcasted by the network side.
In the embodiment of the application, the terminal can obtain the difference value between the blocking time and the request forbidding time, so that the first running time is obtained; the terminal may also obtain 1.3 times of the blocking time to obtain a product, and then obtain a difference between the product and the request prohibition time to obtain the first operation time, which may be specifically determined according to an actual situation, which is not limited in the embodiment of the present application.
In the embodiment of the application, the AS layer generates a second random number, determines 0.6 times of the second random number, adds 0.7 to the second random number to obtain a numerical sum, and multiplies the numerical sum by the blocking time to obtain the request prohibition time length.
The second random number is a random number between 0 and 1.
In this embodiment of the present application, in the first operation duration, when the NAS layer receives the second network access request, the AS layer does not perform the unified access control check on the second network access request, and may directly send the second network access request to the network side. In the process, if the time length of the first operation duration is too short, the first timer loses the existing meaning, and cannot achieve the effect of increasing the speed when the terminal sends the network access request to the network side, and if the time length of the first operation duration is too long, the requirement of unified access control cannot be met, so the time length of the first operation duration is an important parameter.
In the embodiment of the present application, the running duration of the second timer may be determined according to formula (1), that is, the request prohibition duration is obtained.
(0.7+0.6 random number) blocking time (1)
The formula (1) can obtain that if the value of the random number is 1, the maximum value of the request prohibition time length is 1.3 × barring time; if the value of the random number is 0, it can be obtained that the minimum value of the request prohibition time is 0.7 × blocking time, and the access request result of the second network access request is uncertain in the time period between 0.7 × blocking time and 1.3 × blocking time. Under the condition that no other reason causes the second timer to stop, if the random number is 1, the second network access request is forbidden in the period of 0 to 1.3 blocking time; if the random number is 0, the second network access request is prohibited in the time period from 0 to 0.7 × barring time, and in the time period from 0.7 × barring time to 1.3 × barring time, the second network access request can be sent to the network side under the condition that the second network access request is received. Thus, the first operating time period formula can be obtained as: 1.3 difference between blocking time and request inhibit duration.
In this embodiment, after the NAS layer of the terminal starts the first timer, the NAS layer of the terminal stops running the first timer when the first timer satisfies the condition for stopping running.
It should be noted that, after the NAS layer of the terminal stops running the first timer, when the terminal receives the second network access request again, the terminal needs to perform the unified access control check on the second network access request according to the second request type and the request identifier of the second network access request, and to determine whether to send the second network access request to the network side again.
In an embodiment of the application, the second request category is the same as the first request category of the first network access request.
It should be noted that the second network access request may be the same as the first network access request, that is, the second network access request is the first network access request; the second network access request may also be different from the first network access request, but the second request category is the same as the first request category.
In this embodiment of the application, the operation stop condition includes that the operation duration of the first timer is reached, or within the first operation duration of the first timer, the NAS layer receives the second network access request for a preset number of times.
In this embodiment of the present application, the preset number of times may be 1, that is, within the first operation duration of the first timer, when the NAS layer receives the second network access request, the NAS layer stops operating the first timer; the preset times can also be 2 times, that is, the NAS layer stops running the first timer when receiving the second network access request twice within the first running duration of the first timer; the preset times can also be multiple times, that is, within the first operation duration of the first timer, the NAS layer stops operating the first timer when receiving the second network access request multiple times; the specific details can be determined according to actual conditions, and the embodiment of the present application does not limit this.
In this embodiment of the application, the NAS layer stops running the process of the first timer when receiving the second network access request for the preset number of times within the first running time, where the NAS layer may be configured to transmit the second network access request to the AS layer when receiving the second network access request for the first time within the first running time, and the AS layer directly transmits the second network access request to the network side without performing unified access control check on the second network access request; if the NAS layer receives the second network access request again in the first running time, the NAS layer transmits the second network access request received by the NAS layer to the AS layer, and the AS layer directly transmits the newly received second network access request to the network side without performing unified access control check on the newly received second network access request; and until the number of the received second network access requests reaches a preset number.
It should be noted that, if the number of the second network access requests received by the NAS layer exceeds the preset number of times in the first operation time, the NAS layer sends the second network access requests exceeding the preset number of times to the AS layer, so that the AS layer performs unified access control check on the second network access requests exceeding the preset number of times.
In this embodiment of the application, after the NAS layer of the terminal stops running the first timer, and when the NAS layer of the terminal receives the second network access request, the NAS layer performs a unified access control check on the second network access request, and a specific process of performing the unified access control check on the second network access request by the NAS layer may be: the NAS layer acquires the request parameters of the second network access request from the second network access request; the NAS layer transmits the request parameters of the second network access request to the AS layer; the AS layer determines the access request state of the second network access request according to the request parameters of the second network access request; and under the condition that the AS layer determines that the access request state is a forbidden state, the AS layer forbids to send a second network access request to the network side.
It should be noted that the request parameter includes a second request category.
In this embodiment of the present application, the process of determining, by the AS layer, the access request status of the second network access request according to the request parameter of the second network access request includes: the AS layer determines whether to start a second timer according to the request parameter and the blocking parameter; and under the condition that the AS layer determines to start the second timer, namely the AS layer determines that the access request state of the second network access request is a forbidden state.
It should be noted that the barring parameter is a parameter sent by the network side and corresponding to the second request type; the blocking parameter includes a blocking time.
In the embodiment of the application, when the AS layer determines that the access request state of the second network access request is the forbidden state, the AS layer determines the request forbidding duration based on the blocking time, and forbids the second network access request from being sent to the network side within the request forbidding duration.
S103, sending a second network access request to the network side within the first running time and under the condition of receiving the second network access request, so that the network side can execute network access operation corresponding to the second network access request, wherein the first request type of the first network access request is the same as the second request type of the second network access request.
In the embodiment of the application, after determining the first running duration of the first timer and starting the first timer according to the request mitigation message, the NAS layer of the terminal sends the second network access request to the network side within the first running duration and under the condition that the second network access request is received, so that the network side executes the network access operation corresponding to the second network access request.
In the embodiment of the application, when the terminal receives the second network access request within the first operation duration, the terminal does not perform the unified access control check on the second network access request any more, and directly sends the second network access request to the network side.
For example, in the case that the first network access request is specifically a first data transmission channel allocation request, an exemplary network connection structure diagram is shown in fig. 3:
31. and sending a first data transmission channel allocation request.
In this embodiment of the application, when the terminal receives the first data transmission channel allocation request, the terminal sends the first data transmission channel allocation request to the NAS layer by using the upper layer application.
Note that the upper layer application may be DP.
In this embodiment of the application, when the NAS layer determines the request type and the request identifier of the first data transmission channel allocation request from the first data transmission channel allocation request, the NAS layer transmits the request type and the request identifier to the AS layer through the first data transmission channel allocation request.
32. And sending a blocking parameter, wherein the blocking parameter comprises blocking time.
In the embodiment of the present application, the network side may send the blocking parameter to the AS layer before the NAS layer transmits the first data transmission channel allocation request to the AS layer; the network side may send the barring parameter to the AS layer after the NAS layer transmits the first data transmission channel allocation request to the AS layer, which may be determined specifically according to an actual situation, and this embodiment of the present application does not limit this.
It should be noted that the blocking parameter further includes a set of blocking factors.
33. It is determined that the first data transmission channel allocation request is prohibited.
In the embodiment of the present application, when the AS layer receives the request type and the request identifier, the AS layer determines whether the first data transmission channel allocation request can be sent to the network side, and when the AS layer determines that the first data transmission channel allocation request cannot be sent to the network side, it determines that the first data transmission channel allocation request is prohibited.
34. Transmitting the first data transmission channel allocation request prohibited information.
In this embodiment of the present application, the AS sends the first data transmission channel allocation request prohibited information to the upper layer application through the NAS layer.
35. And determining the running time of the second timer, and starting the second timer.
In this embodiment of the application, in a case that the AS determines that the first data transmission channel allocation request is prohibited, the AS layer determines the running time of the second timer and starts the second timer.
36. A request to mitigate message is sent.
In this embodiment of the application, the AS layer sends a request mitigation message to the upper layer application through the NAS layer when determining that the second timer stops running or that the second timer runs beyond the running time.
37. And starting a first timer, and determining a first operation time length according to the blocking time.
In the embodiment of the application, when the NAS layer receives the request mitigation message sent by the AS layer, the NAS layer starts the first timer and determines the first operation duration according to the blocking time.
The blocking time is a preset time for broadcasting on the network side.
38. And sending a second data transmission channel distribution request.
In this embodiment of the present application, in a first operation duration, when the terminal receives the second data transmission channel allocation request, the terminal sends the first data transmission channel allocation request to the NAS layer by using the upper layer application, and sends the second data transmission channel allocation request to the network side by using the AS layer.
For example, in the case that the first network access request is specifically the first voice telephone initiation request, an exemplary network connection structure diagram is shown in fig. 4:
41. a first voice telephone initiation request is sent.
In the embodiment of the application, when the terminal receives the first voice call initiation request, the terminal sends the first voice call initiation request to the NAS layer by using the upper layer application.
It should be noted that the upper layer application may be IMS.
In this embodiment of the application, in a case that the NAS layer determines the request category and the request identifier of the first voice telephone initiation request from the first voice telephone initiation request, the NAS layer transmits the request category and the request identifier to the AS layer through the first voice telephone initiation request.
42. And sending a blocking parameter, wherein the blocking parameter comprises blocking time.
In the embodiment of the application, the network side can send the blocking parameter to the AS layer before the NAS layer transmits the first voice telephone initiation request to the AS layer; the network side may send the barring parameter to the AS layer after the NAS layer transmits the first voice telephone initiation request to the AS layer, which may be determined specifically according to an actual situation, and this embodiment of the present application does not limit this.
It should be noted that the blocking parameter further includes a set of blocking factors.
43. It is determined that the first voice telephone initiation request is disabled.
In the embodiment of the application, when the AS layer receives the request type and the request identifier, the AS layer determines whether the first voice telephone initiation request can be sent to the network side, and when the AS layer determines that the first voice telephone initiation request cannot be sent to the network side, the AS layer determines that the first voice telephone initiation request is prohibited.
44. Transmitting the first voice telephone origination request disabled information.
In the embodiment of the application, the AS sends the information that the first voice call initiation request is forbidden to the upper layer application through the NAS layer.
45. And determining the running time of the second timer, and starting the second timer.
In this embodiment, in the case that the AS determines that the first voice call initiation request is prohibited, the AS layer determines the running time of the second timer and starts the second timer.
46. A request for mitigation message is sent.
In this embodiment of the application, the AS layer sends a request mitigation message to the upper layer application through the NAS layer when determining that the second timer stops running or that the second timer runs beyond the running time.
47. And starting a first timer, and determining a first operation time length according to the blocking time.
In the embodiment of the application, when the NAS layer receives the request mitigation message sent by the AS layer, the NAS layer starts the first timer and determines the first operation duration according to the blocking time.
The blocking time is a preset time for broadcasting on the network side.
48. A second voice telephone initiation request is sent.
In the embodiment of the application, the upper layer application initiates the second voice telephone initiation request within a period of time after receiving the request release message, and the time length within the period of time exceeds the first operation duration, and the upper layer application sends the second voice telephone initiation request to the AS layer through the NAS layer.
In the embodiment of the application, the request category of the first voice telephone initiated request is the same as the request category of the second voice telephone initiated request.
49. A unified access control check is performed on the second voice telephone origination request.
In this embodiment of the present application, since the upper layer application receives the second voice call initiation request after the first running duration, the AS layer needs to perform a unified access control check on the second voice call initiation request.
It can be understood that, when the terminal determines that the first network access request is prohibited and the request prohibition duration reaches, the terminal determines the first operation duration according to the request release message, so that within the first preset duration, if the terminal receives a second network access request corresponding to a second request type identical to the first request type, the terminal can directly send the second network access request to the network side, and the speed of sending the network access request to the network side by the terminal is improved.
Based on the same inventive concept of the above embodiments, the present embodiment provides a terminal 1, where the terminal 1 includes an NAS layer and an AS layer, and the AS layer includes a first timer and corresponds to a network connection method; fig. 5 is a schematic structural diagram of a terminal according to an embodiment of the present application, where the terminal 1 may include:
a receiving unit 11, configured to receive, by the NAS layer, a request mitigation message transmitted by the AS layer when it is determined that the first network access request is prohibited and the request prohibition duration reaches;
a determining unit 12, configured to determine, by the NAS layer, a first operation duration of the first timer according to the request mitigation message;
a starting unit 13, configured to start the first timer;
a sending unit 14, configured to send a second network access request to the network side in the first operation duration when the second network access request is received, so that the network side executes a network access operation corresponding to the second network access request, where a first request type of the first network access request is the same as a second request type of the second network access request.
In some embodiments of the present application, the terminal further includes an obtaining unit;
the obtaining unit is configured to obtain blocking time and the request prohibition duration from the request mitigation message, where the blocking time is preset time that is sent by a network side and corresponds to the first request category;
the determining unit 12 is configured to determine, by the NAS layer, a first operation duration of the first timer according to the blocking time and the request prohibition duration.
In some embodiments of the present application, the terminal further comprises an execution unit;
the operation unit is used for stopping the operation of the first timer under the condition that the first timer meets the operation stopping condition;
the shutdown conditions include: the first running time length is up;
or, within the first operation duration, receiving the second network access request for preset times.
In some embodiments of the present application, the AS layer includes a second timer, and the terminal further includes a transmission unit;
the obtaining unit is configured to obtain a request parameter of the first network access request from the first network access request when the NAS layer receives the first network access request; the request parameters comprise the first request category;
the transmission unit is configured to transmit the request parameter to the AS layer;
the determining unit is configured to determine, by the AS layer, whether to start the second timer according to the request parameter and the barring parameter; the blocking parameter is a parameter which is sent by the network side and corresponds to the first request type; the blocking parameter comprises the blocking time; and under the condition that the second timer is determined to be started, determining the request forbidding duration based on the blocking time, and forbidding sending the second network access request to the network side within the request forbidding duration.
In some embodiments of the present application, the obtaining unit is configured to, in a case that the second network access request is received, obtain a request parameter of the second network access request from the second network access request; the request parameters comprise the second request type;
the determining unit is configured to determine an access request state of the second network access request according to the request parameter of the second network access request; and under the condition that the access request state of the second network access request is a forbidden state, forbidding to send the second network access request to the network side.
In some embodiments of the present application, the first network access request comprises a data transmission channel assignment request or a voice telephony initiation request.
In some embodiments of the present application, the second network access request comprises a data transmission channel assignment request or a voice telephony initiation request.
In practical applications, the receiving Unit 11, the determining Unit 12, the starting Unit 13 and the sending Unit 14 may be implemented by a processor 15 on the terminal 1, specifically implemented by a CPU (Central Processing Unit), an MPU (Microprocessor Unit), a DSP (Digital Signal Processing) or a Field Programmable Gate Array (FPGA); the above data storage may be implemented by the memory 16 on the terminal 1.
The embodiment of the present application further provides a terminal 1, as shown in fig. 6, where the terminal 1 includes: a processor 15, a memory 16 and a communication bus 17, the memory 16 communicating with the processor 15 through the communication bus 17, the memory 16 storing a program executable by the processor 15, the program, when executed, executing the network connection method as described above through the processor 15.
In practical applications, the Memory 16 may be a volatile Memory (volatile Memory), such as a Random-Access Memory (RAM); or a non-volatile Memory (non-volatile Memory), such as a Read-Only Memory (ROM), a flash Memory (flash Memory), a Hard Disk (Hard Disk Drive, HDD) or a Solid-State Drive (SSD); or a combination of the above types of memories and provides instructions and data to the processor 15.
The present embodiment provides a computer-readable storage medium, on which a computer program is stored, and the computer program is executed by the processor 15 to implement the network connection method as described above.
It can be understood that, when the terminal determines that the first network access request is prohibited and the request prohibition duration reaches, the terminal determines the first operation duration according to the request release message, so that within the first preset duration, if the terminal receives a second network access request corresponding to a second request type identical to the first request type, the terminal can directly send the second network access request to the network side, and the speed of sending the network access request to the network side by the terminal is improved.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of a hardware embodiment, a software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The above description is only a preferred embodiment of the present application, and is not intended to limit the scope of the present application.
Claims (10)
1. A network connection method is applied to a terminal, the terminal comprises a non-access stratum (NAS) and an Access Stratum (AS), the NAS comprises a first timer, and the method comprises the following steps:
under the condition that the first network access request is forbidden and the request forbidden duration is up, the NAS layer receives a request release message transmitted by the AS layer;
the NAS layer determines a first running time length of the first timer according to the request relieving message and starts the first timer;
and sending a second network access request to a network side within the first operation duration under the condition that the second network access request is received, so that the network side can execute network access operation corresponding to the second network access request, wherein the first request type of the first network access request is the same as the second request type of the second network access request.
2. The method of claim 1, wherein the determining, by the NAS layer, the first operation duration of the first timer according to the request for mitigation message comprises:
the NAS layer acquires blocking time and the request forbidding duration from the request relieving message, wherein the blocking time is preset time which is sent by a network side and corresponds to the first request type;
and the NAS layer determines a first operation time length of the first timer according to the blocking time and the request forbidding time length.
3. The method of claim 1, wherein after the NAS layer starts the first timer, the method further comprises:
stopping running the first timer when the first timer meets a running stop condition; the shutdown conditions include: the first running time length is up;
or, within the first operation duration, receiving the second network access request for preset times.
4. The method of claim 1, wherein the AS layer comprises a second timer, and wherein before the NAS layer receives the request mitigation message transmitted by the AS layer when it is determined that the first network access request is barred and the request barring duration is reached, the method further comprises:
under the condition of receiving the first network access request, acquiring a request parameter of the first network access request from the first network access request; transmitting the request parameter to the AS layer; the request parameters comprise the first request category;
the AS layer determines whether to start the second timer according to the request parameter and the blocking parameter; the blocking parameter is a parameter which is sent by the network side and corresponds to the first request type; the blocking parameter comprises a blocking time;
and under the condition that the second timer is determined to be started, determining the request forbidding duration based on the blocking time, and forbidding sending the second network access request to the network side within the request forbidding duration.
5. The method of claim 3, wherein after the stopping the first timer, the method further comprises:
under the condition of receiving the second network access request, acquiring a request parameter of the second network access request from the second network access request; the request parameters comprise the second request type;
determining the access request state of the second network access request according to the request parameters of the second network access request;
and under the condition that the access request state of the second network access request is a forbidden state, forbidding to send the second network access request to the network side.
6. The method of claim 1 or 4, wherein the first network access request comprises a data transmission channel assignment request or a voice telephony initiation request.
7. The method of any of claims 1 and 3-5, wherein the second network access request comprises a data transmission channel assignment request or a voice telephony initiation request.
8. A terminal, comprising a NAS layer and an AS layer, wherein the NAS layer comprises a first timer, comprising:
a receiving unit, configured to receive, by the NAS layer, a request mitigation message transmitted by the AS layer when it is determined that the first network access request is prohibited and a request prohibition duration arrives;
a determining unit, configured to determine, by the NAS layer, a first operation duration of the first timer according to the request mitigation message;
the starting unit is used for starting the first timer;
a sending unit, configured to send a second network access request to a network side when the second network access request is received within the first operation duration, so that the network side executes a network access operation corresponding to the second network access request, where a first request type of the first network access request is the same as a second request type of the second network access request.
9. A terminal, characterized in that the terminal comprises:
a memory, a processor, and a communication bus, the memory in communication with the processor through the communication bus, the memory storing a network-connected program executable by the processor, the network-connected program when executed causing the processor to perform the method of any of claims 1 to 7.
10. A storage medium having stored thereon a computer program for application to a terminal, characterized in that the computer program, when executed by a first processor, implements the method of any one of claims 1 to 7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011128504.3A CN112188558B (en) | 2020-10-20 | 2020-10-20 | Network connection method, terminal and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011128504.3A CN112188558B (en) | 2020-10-20 | 2020-10-20 | Network connection method, terminal and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112188558A CN112188558A (en) | 2021-01-05 |
CN112188558B true CN112188558B (en) | 2022-06-24 |
Family
ID=73923802
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011128504.3A Active CN112188558B (en) | 2020-10-20 | 2020-10-20 | Network connection method, terminal and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112188558B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112954771B (en) * | 2021-02-19 | 2023-04-14 | Oppo广东移动通信有限公司 | Access control method, terminal and storage medium |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102469548A (en) * | 2010-11-05 | 2012-05-23 | 中兴通讯股份有限公司 | Access handling method, device and system |
CN110169135A (en) * | 2017-02-02 | 2019-08-23 | 株式会社Kt | Connection control method and device |
CN110351872A (en) * | 2018-04-02 | 2019-10-18 | 夏普株式会社 | Connection control method and user equipment |
CN110622565A (en) * | 2017-05-05 | 2019-12-27 | 瑞典爱立信有限公司 | Access class and establishment cause |
CN110891327A (en) * | 2018-09-07 | 2020-03-17 | 苹果公司 | Enhancements to connection rejection procedures |
WO2020067749A1 (en) * | 2018-09-28 | 2020-04-02 | Lg Electronics Inc. | Access control for data transmission |
CN111418230A (en) * | 2018-03-26 | 2020-07-14 | Oppo广东移动通信有限公司 | Access control method and device and computer storage medium |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TW201029489A (en) * | 2009-01-22 | 2010-08-01 | Htc Corp | Method of handling radio resource control connection establishment for a wireless communication system and related communication device |
-
2020
- 2020-10-20 CN CN202011128504.3A patent/CN112188558B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102469548A (en) * | 2010-11-05 | 2012-05-23 | 中兴通讯股份有限公司 | Access handling method, device and system |
CN110169135A (en) * | 2017-02-02 | 2019-08-23 | 株式会社Kt | Connection control method and device |
CN110622565A (en) * | 2017-05-05 | 2019-12-27 | 瑞典爱立信有限公司 | Access class and establishment cause |
CN111418230A (en) * | 2018-03-26 | 2020-07-14 | Oppo广东移动通信有限公司 | Access control method and device and computer storage medium |
CN110351872A (en) * | 2018-04-02 | 2019-10-18 | 夏普株式会社 | Connection control method and user equipment |
CN110891327A (en) * | 2018-09-07 | 2020-03-17 | 苹果公司 | Enhancements to connection rejection procedures |
WO2020067749A1 (en) * | 2018-09-28 | 2020-04-02 | Lg Electronics Inc. | Access control for data transmission |
Non-Patent Citations (3)
Title |
---|
C1-192108,"Handling of network rejection in the UE NAS layer";Nokia等;《3GPP TSG CT WG1 Meeting #116》;20190402;全文 * |
R2-2007234,"Discussion on UE behaviours for access barring alleviation";Google Inc.;《3GPP TSG-RAN WG2 Meeting #110-e》;20200807;全文 * |
S2-184291,"NAS level congestion control for emergency and high priority access";Qualcomm Incorporated等;《3GPP TSG-SA WG2 Meeting #127》;20180423;全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN112188558A (en) | 2021-01-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10798640B2 (en) | Enhancement of unified access control | |
CN102170659B (en) | Network congestion control method and equipment | |
US11778591B2 (en) | Method for selecting a plurality of carriers and related device | |
WO2011041979A1 (en) | Method, device and system for network access of machine type communications terminal equipment | |
WO2012094982A1 (en) | Access control method and device | |
CN101925151A (en) | Method, equipment and system for controlling access | |
CN102300285A (en) | Access control method and equipment | |
CN113055972B (en) | Session processing method in wireless communication and terminal equipment | |
RU2702267C1 (en) | Method and device for preventing overload of service data channel | |
CN110351872B (en) | Access control method and user equipment | |
WO2014086282A1 (en) | Access control method and device | |
TWI382774B (en) | System and method for responding to a page during a communication restriction | |
CN103857005A (en) | Access control method and device | |
WO2013170537A1 (en) | Access control method, terminal, and access network device | |
WO2012051893A1 (en) | Service processing method and device | |
CN112188558B (en) | Network connection method, terminal and storage medium | |
JP7367186B2 (en) | Paging methods and equipment | |
CN110719607B (en) | Network congestion indication method, device and equipment | |
CN117336896A (en) | Session management method and device, equipment and storage medium | |
CN107302795B (en) | Indication information sending method, indication information processing method and device | |
WO2015194459A1 (en) | Mobile station and restriction control method | |
CN114641016A (en) | Busy indication transmission method and device | |
WO2015024214A1 (en) | Random access method and related device | |
CN110730427A (en) | Group joining method and device | |
CN102457976B (en) | Business request processing method and equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |