CN112567856B - Unauthorized packet access method, device and system - Google Patents

Unauthorized packet access method, device and system Download PDF

Info

Publication number
CN112567856B
CN112567856B CN201880096487.4A CN201880096487A CN112567856B CN 112567856 B CN112567856 B CN 112567856B CN 201880096487 A CN201880096487 A CN 201880096487A CN 112567856 B CN112567856 B CN 112567856B
Authority
CN
China
Prior art keywords
rate
total
accessed
resource set
rate interval
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201880096487.4A
Other languages
Chinese (zh)
Other versions
CN112567856A (en
Inventor
成后发
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Science and Technology of China USTC
Huawei Technologies Co Ltd
Original Assignee
University of Science and Technology of China USTC
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by University of Science and Technology of China USTC, Huawei Technologies Co Ltd filed Critical University of Science and Technology of China USTC
Publication of CN112567856A publication Critical patent/CN112567856A/en
Application granted granted Critical
Publication of CN112567856B publication Critical patent/CN112567856B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/12Wireless traffic scheduling

Abstract

The embodiment of the application provides an access method, equipment and a system of unauthorized grouping, wherein the method comprises the following steps: acquiring to-be-used rate information of each to-be-accessed device in M to-be-accessed devices; wherein M is an integer greater than or equal to 2; determining a rate interval and a resource set corresponding to each group in L groups according to the rate information to be used of each device to be accessed; wherein L is an integer greater than or equal to 1 and less than or equal to M; sending access information to M devices to be accessed; the access information is used for indicating a rate interval and a resource set corresponding to each group, so that the M devices to be accessed are accessed according to the respective rate information to be used and the access information, and the access efficiency of the terminal is improved on the basis of ensuring the service perception of the terminal.

Description

Unauthorized packet access method, device and system
Technical Field
The present application relates to the field of communications technologies, and in particular, to an unauthorized packet access method, device, and system.
Background
Large-scale Machine Type Communication (mtc) has the characteristics of large connection number, small sending data packet, low data transmission rate and power consumption, dominant uplink Communication, and the like. For access in an mtc scenario with a large scale, a small rate, and a strong burstiness, an unauthorized Non-orthogonal multiple access (NOMA) technology is usually adopted to implement the access.
The NOMA technology is to allocate one resource to multiple terminals, that is, multiple terminals perform power multiplexing on the same resource, thereby improving the utilization rate of the resource. However, multiple terminals perform power multiplexing on the same resource, and resource collision may occur during random access, which may cause network congestion. In order to reduce network congestion, technologies such as Access Class Barring (ACB) or polling are usually adopted for Access, but the adoption of the Access Class technology or the polling technology results in a longer Access delay, which makes the terminal service not well aware and the Access efficiency not high.
Therefore, how to improve the access efficiency of the terminal on the basis of ensuring the service awareness of the terminal is a technical problem to be urgently solved by those skilled in the art.
Disclosure of Invention
The application provides an unauthorized packet access method, device and system, which are used for improving the access efficiency of a terminal on the basis of ensuring the service perception of the terminal.
In a first aspect, an embodiment of the present application provides an unauthorized packet access method, where the unauthorized packet access method may include:
acquiring to-be-used rate information of each to-be-accessed device in M to-be-accessed devices; wherein M is an integer greater than or equal to 2;
determining a rate interval and a resource set corresponding to each group in L groups according to the rate information to be used of each device to be accessed; wherein L is an integer greater than or equal to 1 and less than or equal to M;
sending access information to M devices to be accessed; the access information is used for indicating a rate interval and a resource set corresponding to each group, so that the M devices to be accessed are accessed according to the respective rate information to be used and the access information.
In a possible implementation manner, determining a rate interval and a resource set corresponding to each of L packets according to the to-be-used rate information of each to-be-accessed device may include:
determining a total rate interval corresponding to M devices to be accessed and a total resource set required by the M devices to be accessed according to the rate information to be used of each device to be accessed; the total rate interval is a union set of the rate intervals corresponding to each group, and the total resource set is a full set of the resource set corresponding to each group;
and determining a rate interval and a resource set corresponding to each group in the L groups according to the total rate interval and the total resource set.
In a possible implementation manner, determining, according to the total rate interval and the total resource set, a rate interval and a resource set corresponding to each of the L packets may include:
dividing the total rate interval by equal step length according to the number L of the packets to obtain a rate interval corresponding to each packet;
and determining the resource set corresponding to each group according to the sum of the rates of the rate intervals corresponding to each group and the total resource set.
In a possible implementation manner, the access information includes a total rate interval, a packet number L, and a resource set corresponding to each packet.
In a possible implementation manner, determining a rate interval and a resource set corresponding to each of the L packets according to the total rate interval and the total resource set may include:
according to the number L of the groups, performing equal resource division on the total resource set to obtain a resource set corresponding to each group;
and dividing the total rate interval according to the resource amount of the resource set corresponding to each group and the to-be-used rate information of each to-be-accessed device to obtain the rate interval corresponding to each group.
In a possible implementation manner, the access information includes L +1 boundary values dividing the total rate interval, and a resource set corresponding to each group.
In a possible implementation manner, determining a total resource set required by M devices to be accessed according to the rate information to be used of each device to be accessed may include:
according to
Figure GPA0000300475220000041
Determining a total resource set required by M devices to be accessed;
wherein K represents a first constant, γ L Minimum boundary value, gamma, representing the total rate interval M Represents the maximum boundary value of the total rate interval, gamma represents the rate to be used, f (gamma) represents the probability distribution function corresponding to the rate to be used,
Figure GPA0000300475220000042
indicates the total rate interval [ gamma ] L ,γ M ]In the above description, M pieces of total rate information required by the device to be accessed, and C denotes a second constant.
In a second aspect, an embodiment of the present application further provides an unauthorized packet access method, where the unauthorized packet access method may include:
receiving access information sent by network equipment; the access information is used for indicating a rate interval and a resource set corresponding to each of the L groups; the rate interval and the resource interval corresponding to each packet are determined by the network equipment according to the rate information to be used of the equipment to be accessed, the total rate interval corresponding to the equipment to be accessed and the required total resource set, and the total rate interval and the total resource set are determined by the network equipment;
and accessing according to the rate information to be used and the access information.
In a possible implementation manner, when the access information includes a total rate interval, a packet number L, and a resource set corresponding to each packet, performing access according to the rate information to be used and the access information, including:
determining a rate interval corresponding to each packet according to the total rate interval and the number L of the packets;
and selecting a target packet according to the rate information to be used, the rate interval corresponding to each packet and the resource set, and accessing.
In a possible implementation manner, when the access information includes L +1 boundary values for dividing the total rate interval and a resource set corresponding to each group, performing access according to the rate information to be used and the access information, includes:
determining a rate interval corresponding to each of the L groups according to the L +1 boundary values;
and selecting a target group according to the rate information to be used, the rate interval corresponding to each group and the resource set, and accessing.
In a third aspect, an embodiment of the present application further provides a network device, where the network device may include:
the device comprises an acquisition unit, a processing unit and a processing unit, wherein the acquisition unit is used for acquiring the to-be-used rate information of each to-be-accessed device in M to-be-accessed devices; wherein M is an integer greater than or equal to 2;
a determining unit, configured to determine, according to-be-used rate information of each to-be-accessed device, a rate interval and a resource set corresponding to each of the L packets; wherein L is an integer greater than or equal to 1 and less than or equal to M;
a sending unit, configured to send access information to M devices to be accessed; the access information is used for indicating a rate interval and a resource set corresponding to each group, so that the M devices to be accessed are accessed according to the respective rate information to be used and the access information.
In a possible implementation manner, the determining unit is specifically configured to determine, according to the to-be-used rate information of each to-be-accessed device, a total rate interval corresponding to the M to-be-accessed devices and a total resource set required by the M to-be-accessed devices; the total rate interval is a union set of the rate intervals corresponding to each group, and the total resource set is a full set of the resource set corresponding to each group; and determining a rate interval and a resource set corresponding to each of the L groups according to the total rate interval and the total resource set.
In a possible implementation manner, the determining unit is specifically configured to divide the total rate interval by equal step length according to the number L of packets to obtain a rate interval corresponding to each packet; and determining the resource set corresponding to each group according to the sum of the rates of the rate intervals corresponding to each group and the total resource set.
In a possible implementation manner, the access information includes a total rate interval, a packet number L, and a resource set corresponding to each packet.
In a possible implementation manner, the determining unit is specifically configured to perform equal resource division on the total resource set according to the number L of packets to obtain a resource set corresponding to each packet; and dividing the total rate interval according to the resource amount of the resource set corresponding to each group and the to-be-used rate information of each to-be-accessed device to obtain the rate interval corresponding to each group.
In a possible implementation manner, the access information includes L +1 boundary values dividing the total rate interval, and a resource set corresponding to each group.
In a possible implementation, the determining unit is specifically configured to determine the data according to
Figure GPA0000300475220000051
Determining a total resource set required by M devices to be accessed;
wherein K represents a first constant, γ L Minimum boundary value, gamma, representing the total rate interval M Represents the maximum boundary value of the total rate interval, gamma represents the rate to be used, f (gamma) represents the probability distribution function corresponding to the rate to be used,
Figure GPA0000300475220000052
indicates the total rate interval [ gamma ] L ,γ M ]And C represents a second constant.
In a fourth aspect, an embodiment of the present application further provides a device to be accessed, where the device to be accessed may include:
a receiving unit, configured to receive access information sent by a network device; the access information is used for indicating a rate interval and a resource set corresponding to each of the L groups; the rate interval and the resource interval corresponding to each packet are determined by the network equipment according to the rate information to be used of the equipment to be accessed, the total rate interval corresponding to the equipment to be accessed and the required total resource set, and the total rate interval and the total resource set are determined by the network equipment;
and the access unit is used for accessing according to the rate information to be used and the access information.
In a possible implementation manner, when the access information includes a total rate interval, a packet number L, and a resource set corresponding to each packet, the access unit is specifically configured to determine a rate interval corresponding to each packet according to the total rate interval and the packet number L; and selecting a target packet according to the rate information to be used, the rate interval corresponding to each packet and the resource set, and accessing.
In a possible implementation manner, when the access information includes L +1 boundary values for dividing the total rate interval and a resource set corresponding to each group, the access unit is specifically configured to determine, according to the L +1 boundary values, a rate interval corresponding to each group in the L groups; and selecting a target group according to the rate information to be used, the rate interval corresponding to each group and the resource set, and accessing.
In a fifth aspect, an embodiment of the present application further provides a network device, where the network device may include:
the processor is used for acquiring the information of the rate to be used of each device to be accessed in the M devices to be accessed; wherein M is an integer greater than or equal to 2;
the processor is further used for determining a rate interval and a resource set corresponding to each of the L groups according to the to-be-used rate information of each to-be-accessed device; wherein L is an integer greater than or equal to 1 and less than or equal to M;
the transmitter is used for transmitting access information to the M devices to be accessed; the access information is used for indicating a rate interval and a resource set corresponding to each group, so that the M devices to be accessed are accessed according to the respective rate information to be used and the access information.
In a possible implementation manner, the processor is specifically configured to determine, according to the to-be-used rate information of each to-be-accessed device, a total rate interval corresponding to the M to-be-accessed devices and a total resource set required by the M to-be-accessed devices; the total rate interval is a union set of the rate intervals corresponding to each group, and the total resource set is a full set of the resource set corresponding to each group; and determining a rate interval and a resource set corresponding to each of the L groups according to the total rate interval and the total resource set.
In a possible implementation manner, the processor is specifically configured to divide the total rate interval by equal step length according to the number L of packets to obtain a rate interval corresponding to each packet; and determining the resource set corresponding to each group according to the sum of the rates of the rate intervals corresponding to each group and the total resource set.
In a possible implementation manner, the access information includes a total rate interval, a packet number L, and a resource set corresponding to each packet.
In a possible implementation manner, the processor is specifically configured to perform equal resource division on the total resource set according to the number L of packets to obtain a resource set corresponding to each packet; and dividing the total rate interval according to the resource amount of the resource set corresponding to each group and the to-be-used rate information of each to-be-accessed device to obtain the rate interval corresponding to each group.
In a possible implementation manner, the access information includes L +1 boundary values dividing the total rate interval, and a resource set corresponding to each group.
In one possible implementation, the processor is specifically configured according to
Figure GPA0000300475220000061
Determining a total resource set required by M devices to be accessed;
wherein K represents a first constant, γ L Minimum boundary value, gamma, representing the total rate interval M Represents the maximum boundary value of the total rate interval, gamma represents the rate to be used, f (gamma) represents the probability distribution function corresponding to the rate to be used,
Figure GPA0000300475220000062
indicates the total rate interval [ gamma ] L ,γ M ]Total required by M devices to be accessedRate information, C represents a second constant.
In a sixth aspect, an embodiment of the present application further provides a device to be accessed, where the device to be accessed may include:
the receiver is used for receiving access information sent by the network equipment; the access information is used for indicating a rate interval and a resource set corresponding to each of the L groups; the rate interval and the resource interval corresponding to each packet are determined by the network equipment according to the rate information to be used of the equipment to be accessed, the total rate interval corresponding to the equipment to be accessed and the required total resource set, and the total rate interval and the total resource set are determined by the network equipment;
and the processor is used for accessing according to the rate information to be used and the access information.
In a possible implementation manner, when the access information includes a total rate interval, a packet number L, and a resource set corresponding to each packet, the processor is specifically configured to determine a rate interval corresponding to each packet according to the total rate interval and the packet number L; and selecting a target group according to the rate information to be used, the rate interval corresponding to each group and the resource set, and accessing.
In a possible implementation manner, when the access information includes L +1 boundary values for dividing the total rate interval and a resource set corresponding to each group, the processor is specifically configured to determine, according to the L +1 boundary values, a rate interval corresponding to each group in the L groups; and selecting a target group according to the rate information to be used, the rate interval corresponding to each group and the resource set, and accessing.
In a seventh aspect, an embodiment of the present application further provides an unauthorized packet access system, where the unauthorized packet access system may include:
the network device shown in any one of the above third aspects and the device to be accessed shown in any one of the above fourth aspects;
alternatively, the network device according to any of the above fifth aspects and the device to be accessed according to any of the above sixth aspects.
In an eighth aspect, the present application further provides a computer-readable storage medium, on which a computer program is stored, and when the computer program is executed by a processor, the method for accessing an unauthorized packet in any one of the above first aspects is performed, or when the computer program is executed by the processor, the method for accessing an unauthorized packet in any one of the above second aspects is performed.
In a ninth aspect, the present application further provides a chip, where a computer program is stored on the chip, and a computer readable storage medium stores the computer program, and when the computer program is executed by a processor, the method for accessing an unauthorized packet according to any of the above first aspects is performed, or when the computer program is executed by a processor, the method for accessing an unauthorized packet according to any of the above second aspects is performed.
According to the access method, the device and the system for the unauthorized packet, the information of the rate to be used of each device to be accessed in M devices to be accessed is obtained; determining a rate interval and a resource set corresponding to each packet in the L packets according to the rate information to be used of each device to be accessed; after determining a rate interval and a resource set corresponding to each group, sending access information to M devices to be accessed; the access information is used for indicating a rate interval and a resource set corresponding to each packet, so that each device to be accessed in the M devices to be accessed receives the access device information, and a target packet is selected for access according to the respective rate information to be used and the access information. Compared with the prior art, the priority of each device to be accessed does not need to be distinguished, the access of the device to be accessed with lower priority does not need to be discarded, and the access time delay does not exist, so that the access efficiency of the terminal is improved on the basis of ensuring the service perception of the terminal.
Drawings
Fig. 1 is a schematic view of an application scenario provided in an embodiment of the present application;
fig. 2 is a schematic flowchart of an unauthorized packet access method according to an embodiment of the present application;
fig. 3 is a schematic flowchart of another unauthorized packet access method according to an embodiment of the present application;
FIG. 4 is a schematic diagram of a rate probability distribution provided by an embodiment of the present application;
fig. 5 is a flowchart illustrating a further unauthorized packet access method according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of a network device according to an embodiment of the present application;
fig. 7 is a schematic structural diagram of a device to be accessed according to an embodiment of the present application;
fig. 8 is a schematic structural diagram of another network device according to an embodiment of the present application;
fig. 9 is a schematic structural diagram of another device to be accessed according to an embodiment of the present application.
Detailed Description
The embodiments of the present application are applied to a 5G communication system or other systems that may appear in the future, and some terms in the present application are explained below to facilitate understanding by those skilled in the art. It should be noted that, when the scheme of the embodiment of the present application is applied to a 5G system or other systems that may appear in the future, names of network devices and terminals may change, but this does not affect implementation of the scheme of the embodiment of the present application.
Fig. 1 is a schematic view of an application scenario provided in this embodiment of the present application, where the communication system may be a Non-orthogonal multiple access (NOMA) system, the NOMA system may include a network device 101 and multiple devices to be accessed 102, and the network device 101 (e.g., an MTD or a base station) may control each device to be accessed 102 (e.g., a terminal) to access a network. For example, please refer to fig. 1, taking the NOMA system including a network device 101 and four devices to be accessed 102 as an example, when the four devices to be accessed 102 perform power multiplexing on the same resource, resource collision may occur, which causes network congestion, and in order to avoid network congestion, when the four devices to be accessed 102 are accessed to the network, the network device 101 generally accesses the network by using techniques such as ACB or polling, but the access classification technique or the polling technique may cause a large access delay, which makes the terminal service not well aware of the terminal service and the access efficiency not high.
Among them, 1) a terminal, also called a terminal device or a user device, is a device providing voice and/or data connectivity to a user, and may also be some kind of intelligent device with a networking function, for example, a handheld device with a wireless connection function, a vehicle-mounted device, an intelligent air conditioner, an intelligent car, and so on. Common terminal devices include, for example: cell-phone, panel computer, notebook computer, palm computer, Mobile Internet Device (MID), wearable equipment, wherein, wearable equipment includes for example: smart watches, smart bracelets, pedometers, and the like.
2) A Network device, also called a Radio Access Network (RAN) device, is a device for accessing a terminal device to a wireless Network, and includes Network devices in various communication systems, for example, including but not limited to: a Base Station, an evolved Node B (eNB), a Radio Network Controller (RNC), a Node B (NB), a network equipment Controller (BSC), a network equipment Transceiver Station (BTS), a Home network equipment (e.g., Home evolved Node B or Home Node B, HNB), a BaseBand Unit (BBU), and the like.
The network device includes network devices of various frequency systems, for example, but not limited to: low-frequency network equipment and high-frequency network equipment.
3) "plurality" means two or more, and other terms are analogous. "and/or" describes the association relationship of the associated objects, meaning that there may be three relationships, e.g., a and/or B, which may mean: a exists alone, A and B exist simultaneously, and B exists alone. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship.
In order to improve the access efficiency of a terminal on the basis of ensuring the service perception of the terminal, the embodiment of the application provides an unauthorized grouping access method, which obtains the information of the rate to be used of each device to be accessed in M devices to be accessed; determining a rate interval and a resource set corresponding to each packet in the L packets according to the rate information to be used of each device to be accessed; after determining a rate interval and a resource set corresponding to each group, sending access information to M devices to be accessed; the access information is used for indicating a rate interval and a resource set corresponding to each packet, so that each device to be accessed in the M devices to be accessed receives the access device information, and a target packet is selected for access according to the respective rate information to be used and the access information. Compared with the prior art, the priority of each device to be accessed does not need to be distinguished, the access of the device to be accessed with lower priority does not need to be discarded, and the access time delay does not exist, so that the access efficiency of the terminal is improved on the basis of ensuring the service perception of the terminal.
It should be noted that, in this embodiment of the present application, taking a network device as an example of a base station, when the base station determines, according to rate information to be used of each device to be accessed, a rate interval and a resource set corresponding to each of L packets, the base station may be implemented in at least two possible manners, in one possible implementation manner, the base station may first determine the rate interval corresponding to each of the L packets, and then determine a resource set corresponding to each of the L packets according to a sum of rates corresponding to the rate intervals of each of the L packets, and in another possible implementation manner, the base station may first determine the resource set corresponding to each of the L packets, and then determine the rate interval corresponding to each of the L packets according to a resource amount of the resource set corresponding to each of the L packets and the rate information to be used of each device to be accessed. For example, please refer to the following embodiments shown in fig. 2 and fig. 3, fig. 2 is a schematic flowchart of an unauthorized packet access method provided in an embodiment of the present application, and fig. 3 is a schematic flowchart of another unauthorized packet access method provided in an embodiment of the present application. In the following, the access method for these two different unauthorized packets will be described in detail.
In a possible implementation scheme, when determining a rate interval corresponding to each of the L packets first, and then determining a resource set corresponding to each packet according to a sum of rates corresponding to the rate intervals of the packets, for example, as shown in fig. 2, the method for accessing an unauthorized packet may include:
s201, the base station acquires the to-be-used rate information of each to-be-accessed device in the M to-be-accessed devices.
The number of M is not specifically limited in this application, and M is an integer greater than or equal to 2.
It should be noted that, for each device to be accessed, it may correspond to at least one service, each service corresponds to a respective rate requirement, and when the device to be accessed corresponds to multiple services, the rate information to be used of the device to be accessed may be understood as the sum of the rate requirements of all services corresponding to the device to be accessed. However, in general, each device to be accessed only corresponds to a single rate requirement, i.e. its multiple services are services with almost the same rate requirement.
Before obtaining the information of the rate to be used of each device to be accessed in the M devices to be accessed, the base station establishes a connection relationship between the base station and each device to be accessed in advance. For example, in the embodiment of the present application, the connection relationship may be a communication connection between an existing device to be accessed and a base station, and for example, the communication connection may be a communication unauthorized access connection, and after an unauthorized access connection is established between the base station and each device to be accessed, the to-be-used rate information of each device to be accessed in M devices to be accessed may be obtained. Optionally, when the base station acquires the to-be-used rate information of each of the M to-be-accessed devices, the base station may acquire the to-be-used rate information of each to-be-accessed device by receiving the to-be-used rate information reported by each to-be-accessed device; of course, a rate distribution model may also be established according to the historical statistical data of each device to be accessed and the related service model, and the rate information to be used of each device to be accessed is determined according to the established rate distribution model. For example, please refer to fig. 4, fig. 4 is a schematic diagram of a rate probability distribution provided in the present embodiment, a horizontal axis in fig. 4 represents a rate of a device to be accessed, and a vertical axis represents a probability density, which can be seen in conjunction with fig. 4: after a rate distribution model is established according to historical statistical data of the equipment to be accessed and the related service model, the rate information to be used of the equipment to be accessed can be obtained according to the established rate distribution model.
After obtaining the to-be-used rate information of each of the M to-be-accessed devices through S201, the following S202 may be performed:
s202, the base station determines a total rate interval corresponding to the M devices to be accessed and a total resource set required by the M devices to be accessed according to the information of the rate to be used of each device to be accessed.
The total rate interval is a union of the rate intervals corresponding to each group, and the total resource set is a full set of the resource set corresponding to each group. By way of example, the resources of the device to be accessed may include frequency, time and code, which may be denoted as (f, t, c); of course, only any one or two of the frequency, the time, and the code may be included, and the setting may be specifically performed according to actual needs, and here, the embodiment of the present invention is only described by taking as an example that the resource of the device to be accessed may include the frequency, the time, and the code, but the embodiment of the present invention is not limited thereto.
When determining the total rate interval corresponding to the M devices to be accessed, it is necessary to first determine the maximum boundary value and the minimum boundary value of the total rate interval, and determine the total rate interval according to the maximum boundary value and the minimum boundary value of the total rate interval. For example, when determining the maximum boundary value and the minimum boundary value of the total rate interval, the minimum rate of the service executed by each device to be accessed may be determined first, and the minimum rate required by the service executed in all the devices to be accessed is determined as the minimum boundary value of the total rate interval, and the minimum boundary value may be recorded as γ L So as to obtain the minimum boundary value of the total speed interval; in determining the maximum boundary value of the total rate interval, the maximum boundary value may be
Figure GPA0000300475220000101
Determining a maximum boundary value of the total rate interval, which may be denoted as γ M Wherein P is U The expression denotes the maximum transmission power of the device to be accessed, i.e. the maximum rate requirement of the device to be accessed cannot exceed the maximum power limit of the device itself, N 0 Representing the system bandwidth, W representing the system bandwidth, thereby obtaining the maximum boundary value of the total rate interval, and further determining the total rate interval corresponding to the M devices to be accessed as [ gamma ] according to the minimum boundary value and the maximum boundary value L ,γ M ]。
Optionally, when determining the total resource set required by the M devices to be accessed according to the information of the rate to be used of each device to be accessed, the total resource set may be determined according to the information of the rate to be used of each device to be accessed
Figure GPA0000300475220000102
And determining a total resource set required by the M devices to be accessed.
Wherein K represents a first constant, γ L Minimum boundary value, gamma, representing the total rate interval M Represents the maximum boundary value of the total rate interval, gamma represents the rate to be used, f (gamma) represents the probability distribution function corresponding to the rate to be used,
Figure GPA0000300475220000103
indicates the total rate interval [ gamma ] L ,γ M ]And in the step (A), M total rates required by the devices to be accessed are obtained, and C represents a second constant.
In this possible implementation scheme, after determining the total rate interval corresponding to the M devices to be accessed and the total resource set required by the M devices to be accessed through S202, S203 may be executed to determine the rate interval corresponding to each packet in the L packets, then S204 may be executed, and the resource set corresponding to each packet is determined according to the sum of the rates of the rate intervals corresponding to each packet and the total resource set, specifically, refer to the following S203 and S204:
s203, the base station divides the total rate interval according to the number L of the packets by equal step length to obtain the rate interval corresponding to each packet.
For example, the number of packets L may be equal to 3, or may also be equal to 5, and may be specifically set according to actual needs, where the number of packets L is specifically not limited further in the embodiment of the present application.
After the total rate intervals corresponding to the M devices to be accessed are determined, the total rate intervals can be divided by equal step length according to the number L of packets to obtain a rate interval corresponding to each packet. Wherein, the rate interval corresponding to the first packet can be marked as [ γ [ ] 0 ,γ 1 ]The rate interval corresponding to the second packet may be marked as [ gamma ] 1 ,γ 2 ]… the rate interval corresponding to the L-1 th packet can be labeled [ gamma ] L-2 ,γ L-1 ]The rate interval corresponding to the lth packet may be labeled [ γ [ ] L-1 ,γ L ]That is, the rate interval corresponding to the ith packet can be marked as [ gamma ] i-1 ,γ i ]Where i ∈ [1, L ]]After the L packets are marked, the rate interval corresponding to each of the L packets can be specifically calculated. By way of example, may be according to
Figure GPA0000300475220000104
Dividing the total rate interval, wherein s represents the step size of dividing the total rate interval, after determining the equal step size s, the rate interval corresponding to each of the L packets can be further determined, and the rate interval corresponding to the first packet is [ gamma ], [ gamma ] L ,γ L +s]The second packet corresponds to a rate interval of [ gamma ] L +s,γ L +2s]The third packet corresponds to a rate interval of [ gamma ] L +2s,γ L +3s]… packet number L-1 corresponds to a rate interval of [ gamma ] L +(L-2)s,γ L +(L-1)s]The L-th packet corresponds to a rate interval of [ gamma ] L +(L-1)s,γ M ]Thereby obtaining the corresponding rate interval of each packet.
It should be noted that, when the total rate interval is divided according to the number L of packets, the total rate interval may be divided according to equal step size, or of course, the total rate interval may not be divided according to equal step size, specifically, the total rate interval may be divided differently according to different rate distribution probability functions. Here, the embodiment of the present application is described by taking an example of dividing the total rate interval into equal steps according to the number of packets L, but the embodiment of the present application is not limited thereto.
After the rate interval corresponding to each of the L packets is calculated, the following S204 may be performed:
and S204, the base station determines the resource set corresponding to each group according to the sum of the rates of the rate intervals corresponding to each group and the total resource set.
After the rate interval corresponding to each group is determined by the calculation of S203, and then the resource set corresponding to each group is determined according to the rate interval corresponding to each group, the resource set corresponding to each group may be divided according to the principle that the sum of the rates of the rate intervals corresponding to each group matches with the resource set corresponding to each group
Figure GPA0000300475220000111
And dividing the total resource set to obtain a resource set corresponding to each group. Wherein i represents the ith packet of the L packets,
Figure GPA0000300475220000112
indicates the total rate interval [ gamma ] i-1 ,γ i ]Information of the total rate, Δ, required by all devices to be accessed i Represents the resource amount of the resource set corresponding to the ith group, and each of the resources is represented by Delta i The full set of (2) constitutes the total resource set.
After determining the rate interval corresponding to each packet and the resource set corresponding to each packet, respectively, access information indicating the rate interval corresponding to each packet and the resource set corresponding to each packet may be sent to each device to be accessed, that is, the following S205 is performed:
s205, the base station sends access information to the M devices to be accessed.
The access information includes a total rate interval, a packet number L, and a resource set corresponding to each packet.
It is noted that in this possible implementationIn the existing method, each device to be accessed can know in advance that the division mode of the total rate interval is equal-step division, so that the base station only needs to divide the total rate interval [ gamma ] gamma L ,γ M ]The number of groups L and the resource set corresponding to each group are sent to each device to be accessed, so that the device to be accessed can be according to the total rate interval [ gamma ] L ,γ M ]The number of packets L is obtained as the rate interval corresponding to each packet, and of course, the access information may indicate that the rate division method is equal step division.
For example, in this embodiment of the present application, the base station may send access information to M devices to be accessed in a broadcast manner, so that after each device to be accessed receives the access information sent by the base station, the following S206 is executed:
s206, the equipment to be accessed determines a rate interval corresponding to each packet according to the total rate interval and the number L of the packets.
For each device to be accessed, after receiving the access message, the total rate interval may be divided by equal step length according to the number of packets in the access message, so as to obtain the rate interval corresponding to each packet. It should be noted that, the specific method for obtaining the rate interval corresponding to each packet by performing equal-step division on the total rate interval according to the number of packets in the access message may refer to the related description in S203, and here, the embodiments of the present application are not described again.
And S207, selecting a target group by the equipment to be accessed according to the information of the rate to be used, the rate interval corresponding to each group and the resource set, and accessing.
After the rate interval and the resource set corresponding to each packet in the L packets are respectively determined, the rate information to be used of the packet is compared with the rate interval corresponding to each packet, the packet in which the rate information to be used of the packet is located is determined in the L packets as a target packet according to the rate information to be used of the packet, and access is performed according to the rate interval and the resource set corresponding to the target packet.
In this possible implementation manner, when the base station controls each device to be accessed to access, the base station may first obtain rate information to be used of each device to be accessed in the M devices to be accessed, and determine, according to the rate information to be used of each device to be accessed, a total rate interval corresponding to the M devices to be accessed and a total resource set required by the M devices to be accessed; after the total rate interval and the total resource set corresponding to the M devices to be accessed are respectively determined, the total rate interval can be divided in equal step length according to the number L of packets to obtain a rate interval corresponding to each packet, and the resource set corresponding to each packet is determined according to the sum of the rates of the rate intervals corresponding to each packet and the total resource set; after a rate interval and a resource set corresponding to each packet in the L packets are respectively determined, access information is sent to the M devices to be accessed, so that after each device to be accessed receives the access information, the rate interval corresponding to each packet can be determined according to the total rate interval and the packet number L included in the received information, and a target packet is selected according to the rate information to be used, the rate interval corresponding to each packet and the resource set, so that access is performed according to the rate interval and the resource set corresponding to the target packet.
In another possible implementation scheme, when determining a resource set corresponding to each of L packets, and then determining a rate interval corresponding to each packet according to a resource amount of the resource set corresponding to each packet and to-be-used rate information of each device to be accessed, for example, as shown in fig. 3, the method for accessing an unauthorized packet may include:
s301, the base station acquires the to-be-used rate information of each of the M to-be-accessed devices.
S302, the base station determines a total rate interval corresponding to the M devices to be accessed and a total resource set required by the M devices to be accessed according to the information of the rate to be used of each device to be accessed.
It should be noted that, in this embodiment of the present application, a manner in which the S301 base station obtains the to-be-used rate information of each of the M to-be-accessed devices, and a manner in which the S302 base station determines, according to the to-be-used rate information of each of the M to-be-accessed devices, a total rate interval corresponding to the M to-be-accessed devices and a total resource set required by the M to-be-accessed devices are similar to the manner in S201 and S202 in the embodiment shown in fig. 2, and reference may be made to relevant descriptions in S201 and S202 in the embodiment shown in fig. 2, where details of this embodiment are not repeated.
In this possible implementation scheme, after determining the total rate interval corresponding to the M devices to be accessed and the total resource set required by the M devices to be accessed through S302, S303 may be executed to determine the resource set corresponding to each of the L groups, and then S304 may be executed to divide the total rate interval according to the resource amount of the resource set corresponding to each group and the to-be-used rate information of each device to be accessed, so as to obtain the rate interval corresponding to each group, specifically refer to the following S303 and S304:
and S303, the base station performs equal resource division on the total resource set according to the number L of the groups to obtain a resource set corresponding to each group.
When the total resource set is equally divided according to the number of groups L, assuming that the resource amount of the total resource set is M, after the equal resource division is performed, the resource amount of the resource set corresponding to each group is obtained as
Figure GPA0000300475220000121
And determining the corresponding resource set according to the resource amount of the resource set corresponding to each group, thereby ensuring that the resource amounts corresponding to the resource sets in each group are equal or approximately equal.
After obtaining the resource set corresponding to each group, the following S304 may be performed:
s304, the base station divides the total rate interval according to the resource amount of the resource set corresponding to each group and the to-be-used rate information of each to-be-accessed device to obtain the rate interval corresponding to each group.
After the resource set corresponding to each group is determined by the calculation of S303, when the rate interval corresponding to each group is determined according to the resource amount of the resource set corresponding to each group, the rate interval corresponding to each group may be divided according to a principle that the resource amount of the resource set corresponding to each group matches with the rate interval corresponding to each group, for example, the rate interval corresponding to each group may be divided according to the principle that the resource amount of the resource set corresponding to each group matches with the rate interval corresponding to each group
Figure GPA0000300475220000131
And dividing the total rate interval to obtain the rate interval corresponding to each packet division. Wherein i represents the ith packet of the L packets,
Figure GPA0000300475220000132
indicates the total rate interval [ gamma ] i-1 ,γ i ]Information of the total rate, Δ, required by all devices to be accessed i Indicating the resource amount of the resource set corresponding to the ith group, the resource amount of the resource set corresponding to each group is equal or approximately equal, and each delta i Constitutes the total resource set.
After determining the rate interval corresponding to each packet and the resource set corresponding to each packet, respectively, access information indicating the rate interval corresponding to each packet and the resource set corresponding to each packet may be sent to each device to be accessed, that is, the following S305 is performed:
s305, the base station sends access information to the M devices to be accessed.
The access information includes L +1 boundary values for dividing the total rate interval, and a resource set corresponding to each group.
It should be noted that, in this possible implementation manner, when dividing the rate interval corresponding to each packet, the division is not performed according to equal step length, so that the base station does not send the total rate interval and the number L of packets to the device to be accessed, but needs to send L +1 boundary values for dividing the total rate interval and the resource set corresponding to each packet to each device to be accessed, so that the device to be accessed can determine the rate interval corresponding to L packets according to the L +1 boundary values.
For example, in this embodiment of the present application, the base station may send access information to M devices to be accessed in a broadcast manner, so that after each device to be accessed receives the access information sent by the base station, the following S306 is executed:
s306, the equipment to be accessed determines a rate interval corresponding to each group in the L groups according to the L +1 boundary values.
For each device to be accessed, after receiving the access message, the total rate interval may be divided according to L +1 boundary values in the access message to obtain L rate intervals, and a rate interval corresponding to each packet may be determined. Specifically, the rate interval corresponding to the first boundary value and the second boundary value is the rate interval corresponding to the first packet, the rate interval corresponding to the second boundary value and the third boundary value is the rate interval corresponding to the second packet, and so on, the rate interval corresponding to the lth boundary value and the L +1 th boundary value is the rate interval corresponding to the lth packet, so as to obtain the rate interval corresponding to each packet in the L packets.
S307, the equipment to be accessed selects a target group according to the information of the rate to be used, the rate interval corresponding to each group and the resource set, and accesses the target group.
After the rate interval and the resource set corresponding to each packet in the L packets are respectively determined, the rate information to be used of the packet is compared with the rate interval corresponding to each packet, the packet in which the rate information to be used of the packet is located is determined in the L packets as a target packet according to the rate information to be used of the packet, and access is performed according to the rate interval and the resource set corresponding to the target packet.
In this possible implementation, when the base station controls each device to be accessed to access, the base station may first obtain rate information to be used of each device to be accessed in the M devices to be accessed, and determine, according to the rate information to be used of each device to be accessed, a total rate interval corresponding to the M devices to be accessed and a total resource set required by the M devices to be accessed; after the total rate interval and the total resource set corresponding to the M devices to be accessed are respectively determined, the total resource set may be subjected to equal resource division according to the number L of packets to obtain a resource set corresponding to each packet, and the total rate interval may be divided according to the resource amount of the resource set corresponding to each packet and the rate information to be used of each device to be accessed to obtain a rate interval corresponding to each packet; after a rate interval and a resource set corresponding to each of the L packets are respectively determined, access information is sent to the M devices to be accessed, so that after each device to be accessed receives the access information, the rate interval corresponding to each of the L packets is determined according to L +1 boundary values included in the access information, a target packet is selected according to the rate information to be used, the rate interval corresponding to each packet, and the resource set, and access is performed.
The embodiments shown in fig. 2 and fig. 3 above describe in detail how to implement access to an unauthorized packet when the network device is a base station, and of course, the network device may also be an MTD, and when the network device is an MTD, for example, please refer to fig. 5, and fig. 5 is a flowchart illustrating a further method for accessing an unauthorized packet according to an embodiment of the present application, specifically, when implementing access to an unauthorized packet, unlike the schemes shown in fig. 2 and fig. 3 above, after determining a total rate interval corresponding to M devices to be accessed and a total resource set required by the M devices to be accessed according to rate information to be used of each device to be accessed, instead of directly calculating a rate interval and a resource set corresponding to each packet in L packets, a request message for applying the total resource set M is first sent to the base station, so that the base station allocates required resources to the MTD devices according to the request message, after receiving the resource allocation response message sent by the base station, the rate interval and the resource set corresponding to each of the L packets are calculated, in a manner similar to that in fig. 2 or fig. 3, and here, the embodiment of the present application is not described in detail again.
Fig. 6 is a schematic structural diagram of a network device 60 according to an embodiment of the present application, where for example, referring to fig. 6, the network device 60 may include:
an obtaining unit 601, configured to obtain rate information to be used of each device to be accessed in M devices to be accessed; wherein M is an integer greater than or equal to 2.
A determining unit 602, configured to determine, according to the to-be-used rate information of each to-be-accessed device, a rate interval and a resource set corresponding to each of the L packets; wherein L is an integer greater than or equal to 1 and less than or equal to M.
A sending unit 603, configured to send access information to M devices to be accessed; the access information is used for indicating a rate interval and a resource set corresponding to each group, so that the M devices to be accessed are accessed according to the respective rate information to be used and the access information.
Optionally, the determining unit 602 is specifically configured to determine, according to the to-be-used rate information of each to-be-accessed device, a total rate interval corresponding to the M to-be-accessed devices and a total resource set required by the M to-be-accessed devices; the total rate interval is a union set of the rate intervals corresponding to each group, and the total resource set is a full set of the resource set corresponding to each group; and determining a rate interval and a resource set corresponding to each of the L groups according to the total rate interval and the total resource set.
Optionally, the determining unit 602 is specifically configured to divide the total rate interval by equal step length according to the number L of packets to obtain a rate interval corresponding to each packet; and determining the resource set corresponding to each group according to the sum of the rates of the rate intervals corresponding to each group and the total resource set.
Optionally, the access information includes a total rate interval, a packet number L, and a resource set corresponding to each packet.
Optionally, the determining unit 602 is specifically configured to perform equal resource division on the total resource set according to the number L of the groups to obtain a resource set corresponding to each group; and dividing the total rate interval according to the resource amount of the resource set corresponding to each group and the to-be-used rate information of each to-be-accessed device to obtain the rate interval corresponding to each group.
Optionally, the access information includes L +1 boundary values for dividing the total rate interval, and a resource set corresponding to each packet.
Optionally, the determining unit 602 is specifically configured to determine according to
Figure GPA0000300475220000151
And determining a total resource set required by the M devices to be accessed.
Wherein K represents a first constant, γ L Minimum boundary value, gamma, representing the total rate interval M Represents the maximum boundary value of the total rate interval, gamma represents the rate to be used, f (gamma) represents the probability distribution function corresponding to the rate to be used,
Figure GPA0000300475220000152
indicates the total rate interval [ gamma ] L ,γ M ]And C represents a second constant.
The network device 60 shown in the embodiment of the present application may execute the technical solution of the method for accessing unauthorized packets on the network device 60 side shown in any embodiment described above, and the implementation principle and the beneficial effects thereof are similar to those of the method embodiment and are not described herein again.
Fig. 7 is a schematic structural diagram of a device to be accessed 70 according to an embodiment of the present application, and for example, please refer to fig. 7, the device to be accessed 70 may include:
a receiving unit 701, configured to receive access information sent by a network device; the access information is used for indicating a rate interval and a resource set corresponding to each of the L groups; the rate interval and the resource interval corresponding to each packet are determined by the network device according to the rate information to be used of the device 70 to be accessed, the total rate interval corresponding to the device 70 to be accessed and the required total resource set, and are determined according to the total rate interval and the total resource set.
An accessing unit 702, configured to access according to the rate information to be used and the access information.
Optionally, when the access information includes a total rate interval, a number of packets L, and a resource set corresponding to each packet, the access unit 702 is specifically configured to determine a rate interval corresponding to each packet according to the total rate interval and the number of packets L; and selecting a target group according to the rate information to be used, the rate interval corresponding to each group and the resource set, and accessing.
Optionally, when the access information includes L +1 boundary values for dividing the total rate interval and a resource set corresponding to each group, the access unit 702 is specifically configured to determine, according to the L +1 boundary values, a rate interval corresponding to each group in the L groups; and selecting a target group according to the rate information to be used, the rate interval corresponding to each group and the resource set, and accessing.
The device to be accessed 70 shown in the embodiment of the present application may execute the technical solution of the method for accessing unauthorized packets on the device to be accessed 70 side shown in any one of the above embodiments, and the implementation principle and the beneficial effects thereof are similar to those of the method embodiment, and are not described here again.
Fig. 8 is a schematic structural diagram of another network device 80 provided in the embodiment of the present application, and for example, please refer to fig. 8, the network device 80 may include:
the processor 801 is configured to acquire rate information to be used of each device to be accessed in the M devices to be accessed; wherein M is an integer greater than or equal to 2.
The processor 801 is further configured to determine, according to the to-be-used rate information of each to-be-accessed device, a rate interval and a resource set corresponding to each of the L packets; wherein L is an integer greater than or equal to 1 and less than or equal to M.
A transmitter 802, configured to send access information to M devices to be accessed; the access information is used for indicating a rate interval and a resource set corresponding to each group, so that the M devices to be accessed are accessed according to the respective rate information to be used and the access information.
Optionally, the processor 801 is specifically configured to determine, according to the to-be-used rate information of each to-be-accessed device, a total rate interval corresponding to the M to-be-accessed devices and a total resource set required by the M to-be-accessed devices; the total rate interval is a union set of the rate intervals corresponding to each group, and the total resource set is a full set of the resource set corresponding to each group; and determining a rate interval and a resource set corresponding to each of the L groups according to the total rate interval and the total resource set.
Optionally, the processor 801 is specifically configured to divide the total rate interval by equal step length according to the number L of packets to obtain a rate interval corresponding to each packet; and determining the resource set corresponding to each group according to the sum of the rates of the rate intervals corresponding to each group and the total resource set.
Optionally, the access information includes a total rate interval, a packet number L, and a resource set corresponding to each packet.
Optionally, the processor 801 is specifically configured to perform equal resource division on the total resource set according to the number L of groups to obtain a resource set corresponding to each group; and dividing the total rate interval according to the resource amount of the resource set corresponding to each group and the to-be-used rate information of each to-be-accessed device to obtain the rate interval corresponding to each group.
Optionally, the access information includes L +1 boundary values for dividing the total rate interval, and a resource set corresponding to each packet.
Optionally, the processor 801 is specifically configured to operate in accordance with
Figure GPA0000300475220000161
And determining a total resource set required by the M devices to be accessed.
Wherein K represents a first constant, γ L Minimum boundary value, gamma, representing the total rate interval M Represents the maximum boundary value of the total rate interval, gamma represents the rate to be used, f (gamma) represents the probability distribution function corresponding to the rate to be used,
Figure GPA0000300475220000162
indicates the total rate interval [ gamma ] L ,γ M ]And C represents a second constant.
The network device 80 shown in the embodiment of the present application may execute the technical solution of the method for accessing unauthorized packets on the network device 80 side shown in any embodiment, and the implementation principle and the beneficial effect of the method are similar to those of the method embodiment, and are not described herein again.
Fig. 9 is a schematic structural diagram of another device to be accessed 90 according to an embodiment of the present application, for example, please refer to fig. 9, where the device to be accessed 90 may include:
a receiver 901, configured to receive access information sent by a network device; the access information is used for indicating a rate interval and a resource set corresponding to each of the L groups; the rate interval and the resource interval corresponding to each packet are determined by the network device according to the rate information to be used of the device 90 to be accessed, the total rate interval corresponding to the device 90 to be accessed and the required total resource set, and are determined according to the total rate interval and the total resource set.
And a processor 902, configured to perform access according to the rate information to be used and the access information.
Optionally, when the access information includes a total rate interval, a packet number L, and a resource set corresponding to each packet, the processor 902 is specifically configured to determine a rate interval corresponding to each packet according to the total rate interval and the packet number L; and selecting a target packet according to the rate information to be used, the rate interval corresponding to each packet and the resource set, and accessing.
Optionally, when the access information includes L +1 boundary values for dividing the total rate interval and a resource set corresponding to each packet, the processor 902 is specifically configured to determine, according to the L +1 boundary values, a rate interval corresponding to each packet in the L packets; and selecting a target group according to the rate information to be used, the rate interval corresponding to each group and the resource set, and accessing.
The device to be accessed 90 shown in the embodiment of the present application may execute the technical solution of the method for accessing unauthorized packets on the device to be accessed 90 side shown in any one of the above embodiments, and the implementation principle and the beneficial effects thereof are similar to those of the method embodiment and are not described herein again.
An embodiment of the present application further provides an unauthorized packet access system, which can be shown in fig. 1 as an example, and the unauthorized packet access system may include:
the network device shown in fig. 6 and the device to be accessed shown in fig. 7; or the network device shown in fig. 8 and the device to be accessed shown in fig. 9.
The access system for unauthorized packets shown in the embodiments of the present application can implement the technical solution of the access method for unauthorized packets shown in any of the embodiments, and the implementation principle and the beneficial effects thereof are similar to those of the method embodiments and are not described herein again.
An embodiment of the present application further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the method for accessing an unauthorized packet at a network device side in the embodiments corresponding to fig. 2 to 5 is executed, or when the computer program is executed by the processor, the method for accessing an unauthorized packet at a device side to be accessed in the embodiments corresponding to fig. 2 to 5 is executed, and an implementation principle and beneficial effects of the method are similar to those of the method embodiment, and are not described herein again.
An embodiment of the present application further provides a chip, where a computer program is stored on the chip, and a computer readable storage medium stores the computer program, and when the computer program is executed by a processor, the method for accessing an unauthorized packet at a network device side in the embodiments corresponding to fig. 2 to 4 is executed, or when the computer program is executed by the processor, the method for accessing an unauthorized packet at a device side to be accessed in the embodiments corresponding to fig. 2 to 4 is executed, where an implementation principle and beneficial effects of the method are similar to those of the method embodiment, and are not described herein again.
The processor in the above embodiments may be a general purpose processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic device, or discrete hardware components. The various methods, steps, and logic blocks disclosed in the embodiments of the present application may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in connection with the embodiments of the present application may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor. The software modules may be located in a Random Access Memory (RAM), a flash memory, a read-only memory (ROM), a programmable ROM, an electrically erasable programmable memory, a register, or other storage medium known in the art. The storage medium is located in a memory, and a processor reads instructions in the memory and combines hardware thereof to complete the steps of the method.
In the several embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional unit.

Claims (26)

1. An access method for unauthorized packets, comprising:
acquiring to-be-used rate information of each to-be-accessed device in M to-be-accessed devices; wherein M is an integer greater than or equal to 2;
determining a total rate interval corresponding to the M devices to be accessed according to the rate information to be used of each device to be accessed; according to
Figure FDA0003684546710000011
Determining a total resource set required by the M devices to be accessed; wherein K represents a first constant, γ L Minimum boundary value, gamma, representing the total rate interval M Represents the maximum boundary value of the total rate interval, gamma represents the rate to be used, f (gamma) represents the probability distribution function corresponding to the rate to be used,
Figure FDA0003684546710000012
indicates the total rate interval [ gamma ] LM ]The total rate information required by the M devices to be accessed, C represents a second constant; the total rate interval is a union of the rate intervals corresponding to each group, and the total resource set is a full set of the resource set corresponding to each group;
determining a rate interval and a resource set corresponding to each of the L groups according to the total rate interval and the total resource set; wherein L is an integer greater than or equal to 1 and less than or equal to M;
sending access information to the M devices to be accessed; the access information is used for indicating the rate interval and the resource set corresponding to each group, so that the M devices to be accessed are accessed according to the respective rate information to be used and the access information.
2. The method of claim 1, wherein the determining the rate interval and the set of resources for each of the L packets according to the total rate interval and the total set of resources comprises:
dividing the total rate interval by equal step length according to the number L of the packets to obtain a rate interval corresponding to each packet;
and determining the resource set corresponding to each group according to the sum of the rates of the rate intervals corresponding to each group and the total resource set.
3. The method of claim 2,
the access information comprises the total rate interval, the number L of packets and the resource set corresponding to each packet.
4. The method of claim 1, wherein the determining the rate interval and the set of resources for each of the L packets according to the total rate interval and the total set of resources comprises:
according to the number L of the groups, performing equal resource division on the total resource set to obtain a resource set corresponding to each group;
and dividing the total rate interval according to the resource amount of the resource set corresponding to each group and the to-be-used rate information of each to-be-accessed device to obtain the rate interval corresponding to each group.
5. The method of claim 4,
the access information includes L +1 boundary values dividing the total rate interval, and a resource set corresponding to each packet.
6. An access method for unauthorized packets, comprising:
receiving access information sent by network equipment; the access information is used for indicating a rate interval and a resource set corresponding to each of the L groups; the rate interval and the resource interval corresponding to each packet are the total rate interval corresponding to the M devices to be accessed, which is determined by the network device according to the to-be-used rate information of each device to be accessed in the M devices to be accessed, and according to the rate interval and the resource interval corresponding to each packet, the network device determines the total rate interval corresponding to the M devices to be accessed according to the to-be-used rate information of each device to be accessed in the M devices to be accessed
Figure FDA0003684546710000021
After determining a total resource set required by the M devices to be accessed, determining according to the total rate interval and the total resource set;
accessing according to the rate information to be used and the access information;
wherein K represents a first constant, γ L Minimum boundary value, gamma, representing the total rate interval M Represents the maximum boundary value of the total rate interval, gamma represents the rate to be used, f (gamma) represents the probability distribution function corresponding to the rate to be used,
Figure FDA0003684546710000022
indicating the total rateInterval [ gamma ] LM ]The total rate information required by the M devices to be accessed, C represents a second constant; the total rate interval is a union of the rate intervals corresponding to each group, and the total resource set is a full set of the resource set corresponding to each group.
7. The method of claim 6, wherein when the access information includes the total rate interval, the number of packets L, and the resource set corresponding to each packet, the accessing according to the rate information to be used and the access information comprises:
determining a rate interval corresponding to each packet according to the total rate interval and the packet number L;
and selecting a target group according to the rate information to be used, the rate interval corresponding to each group and the resource set, and accessing.
8. The method of claim 6, wherein when the access information includes L +1 boundary values for dividing the total rate interval and the resource set corresponding to each packet, the accessing according to the rate information to be used and the access information comprises:
determining a rate interval corresponding to each of the L groups according to the L +1 boundary values;
and selecting a target group according to the rate information to be used, the rate interval corresponding to each group and the resource set, and accessing.
9. A network device, comprising:
the device comprises an acquisition unit, a processing unit and a processing unit, wherein the acquisition unit is used for acquiring the to-be-used rate information of each to-be-accessed device in M to-be-accessed devices; wherein M is an integer greater than or equal to 2;
a determining unit, configured to determine, according to the to-be-used rate information of each to-be-accessed device, a total rate interval corresponding to the M to-be-accessed devices; according to
Figure FDA0003684546710000031
Determining a total resource set required by the M devices to be accessed; wherein K represents a first constant, γ L Minimum boundary value, gamma, representing the total rate interval M Represents the maximum boundary value of the total rate interval, gamma represents the rate to be used, f (gamma) represents the probability distribution function corresponding to the rate to be used,
Figure FDA0003684546710000032
indicates the total rate interval [ gamma ] LM ]The total rate information required by the M pieces of equipment to be accessed, C represents a second constant; the total rate interval is a union of the rate intervals corresponding to each group, and the total resource set is a full set of the resource set corresponding to each group;
determining a rate interval and a resource set corresponding to each of the L groups according to the total rate interval and the total resource set; wherein L is an integer greater than or equal to 1 and less than or equal to M;
a sending unit, configured to send access information to the M devices to be accessed; the access information is used for indicating the rate interval and the resource set corresponding to each group, so that the M devices to be accessed are accessed according to the respective rate information to be used and the access information.
10. The apparatus of claim 9,
the determining unit is specifically configured to divide the total rate interval by equal step length according to the number L of packets to obtain a rate interval corresponding to each packet; and determining the resource set corresponding to each group according to the sum of the rates of the rate intervals corresponding to each group and the total resource set.
11. The apparatus of claim 10,
the access information comprises the total rate interval, the number L of packets and the resource set corresponding to each packet.
12. The apparatus of claim 9,
the determining unit is specifically configured to perform equal resource division on the total resource set according to a group number L to obtain a resource set corresponding to each group; and dividing the total rate interval according to the resource amount of the resource set corresponding to each group and the to-be-used rate information of each to-be-accessed device to obtain the rate interval corresponding to each group.
13. The apparatus of claim 12,
the access information includes L +1 boundary values dividing the total rate interval, and a resource set corresponding to each packet.
14. A device to be accessed, comprising:
a receiving unit, configured to receive access information sent by a network device; the access information is used for indicating a rate interval and a resource set corresponding to each of the L groups; the rate interval and the resource interval corresponding to each packet are the total rate interval corresponding to the M devices to be accessed, which is determined by the network device according to the to-be-used rate information of each device to be accessed in the M devices to be accessed, and the total rate interval is determined by the network device according to the to-be-used rate information of each device to be accessed
Figure FDA0003684546710000041
After determining a total resource set required by the M devices to be accessed, determining according to the total rate interval and the total resource set;
the access unit is used for accessing according to the rate information to be used and the access information;
wherein K represents a first constant, γ L Minimum boundary value, gamma, representing the total rate interval M Representing said total rate intervalA maximum boundary value, gamma represents the rate to be used, f (gamma) represents the probability distribution function corresponding to the rate to be used,
Figure FDA0003684546710000042
indicates the total rate interval [ gamma ] LM ]The total rate information required by the M devices to be accessed, C represents a second constant; the total rate interval is a union of the rate intervals corresponding to each group, and the total resource set is a full set of the resource set corresponding to each group.
15. The apparatus according to claim 14, wherein when the access information includes the total rate interval, a number of packets L, and the resource set corresponding to each packet, the access unit is specifically configured to determine a rate interval corresponding to each packet according to the total rate interval and the number of packets L; and selecting a target group according to the rate information to be used, the rate interval corresponding to each group and the resource set, and accessing.
16. The apparatus according to claim 14, wherein when the access information includes L +1 boundary values for dividing the total rate interval and the resource set corresponding to each packet, the access unit is specifically configured to determine a rate interval corresponding to each packet in the L packets according to the L +1 boundary values; and selecting a target group according to the rate information to be used, the rate interval corresponding to each group and the resource set, and accessing.
17. A network device, comprising:
the processor is used for acquiring the rate information to be used of each device to be accessed in the M devices to be accessed; wherein M is an integer greater than or equal to 2;
the processor is further configured to determine a total rate corresponding to the M devices to be accessed according to the rate information to be used of each device to be accessedAn interval; according to
Figure FDA0003684546710000043
Determining a total resource set required by the M devices to be accessed; wherein K represents a first constant, γ L Minimum boundary value, gamma, representing the total rate interval M Represents the maximum boundary value of the total rate interval, gamma represents the rate to be used, f (gamma) represents the probability distribution function corresponding to the rate to be used,
Figure FDA0003684546710000044
indicates the total rate interval [ gamma ] LM ]The total rate information required by the M pieces of equipment to be accessed, C represents a second constant; the total rate interval is a union of the rate intervals corresponding to each group, and the total resource set is a full set of the resource set corresponding to each group;
determining a rate interval and a resource set corresponding to each of the L groups according to the total rate interval and the total resource set; wherein L is an integer greater than or equal to 1 and less than or equal to M;
a transmitter, configured to transmit access information to the M devices to be accessed; the access information is used for indicating the rate interval and the resource set corresponding to each group, so that the M devices to be accessed are accessed according to the respective rate information to be used and the access information.
18. The apparatus of claim 17,
the processor is specifically configured to divide the total rate interval by equal step length according to the number L of packets to obtain a rate interval corresponding to each packet; and determining the resource set corresponding to each group according to the sum of the rates of the rate intervals corresponding to each group and the total resource set.
19. The apparatus of claim 18,
the access information comprises the total rate interval, the number L of packets and the resource set corresponding to each packet.
20. The apparatus of claim 17,
the processor is specifically configured to perform equal resource division on the total resource set according to a group number L to obtain a resource set corresponding to each group; and dividing the total rate interval according to the resource amount of the resource set corresponding to each group and the to-be-used rate information of each to-be-accessed device to obtain the rate interval corresponding to each group.
21. The apparatus of claim 20,
the access information includes L +1 boundary values dividing the total rate interval, and a resource set corresponding to each packet.
22. A device to be accessed, comprising:
the receiver is used for receiving access information sent by the network equipment; the access information is used for indicating a rate interval and a resource set corresponding to each of the L groups; the rate interval and the resource interval corresponding to each packet are the total rate interval corresponding to the M devices to be accessed, which is determined by the network device according to the to-be-used rate information of each device to be accessed in the M devices to be accessed, and the total rate interval is determined by the network device according to the to-be-used rate information of each device to be accessed
Figure FDA0003684546710000051
After determining a total resource set required by the M devices to be accessed, determining according to the total rate interval and the total resource set;
the processor is used for accessing according to the rate information to be used and the access information;
wherein K represents a first constant, γ L Minimum boundary value, gamma, representing the total rate interval M Represents the maximum boundary value of the total rate interval, gamma represents the rate to be used, f (gamma) represents the probability distribution function corresponding to the rate to be used,
Figure FDA0003684546710000052
indicates the total rate interval [ gamma ] LM ]The total rate information required by the M devices to be accessed, C represents a second constant; the total rate interval is a union of the rate intervals corresponding to each group, and the total resource set is a full set of the resource set corresponding to each group.
23. The apparatus of claim 22, wherein when the access information comprises the total rate interval, a number of packets L, and a set of resources corresponding to each packet, the processor is specifically configured to determine a rate interval corresponding to each packet according to the total rate interval and the number of packets L; and selecting a target group according to the rate information to be used, the rate interval corresponding to each group and the resource set, and accessing.
24. The apparatus of claim 22, wherein when the access information includes L +1 boundary values for partitioning the total rate interval and the resource set corresponding to each packet, the processor is specifically configured to determine a rate interval corresponding to each packet of the L packets according to the L +1 boundary values; and selecting a target group according to the rate information to be used, the rate interval corresponding to each group and the resource set, and accessing.
25. An unauthorized packet access system, comprising:
a network device as claimed in any one of the preceding claims 9 to 13 and a device to be accessed as claimed in any one of the preceding claims 14 to 16;
alternatively, a network device as claimed in any one of claims 17 to 21 and a device to be accessed as claimed in any one of claims 22 to 24.
26. A computer-readable storage medium, characterized in that the computer-readable storage medium has stored thereon a computer program which, when being executed by a processor, performs the method for accessing unauthorized packets as recited in any one of claims 1 to 5 above, or which, when being executed by the processor, performs the method for accessing unauthorized packets as recited in any one of claims 6 to 8 above.
CN201880096487.4A 2018-08-14 2018-08-14 Unauthorized packet access method, device and system Active CN112567856B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2018/100513 WO2020034102A1 (en) 2018-08-14 2018-08-14 Unlicensed group-based access method, apparatus, and system

Publications (2)

Publication Number Publication Date
CN112567856A CN112567856A (en) 2021-03-26
CN112567856B true CN112567856B (en) 2022-09-16

Family

ID=69524617

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201880096487.4A Active CN112567856B (en) 2018-08-14 2018-08-14 Unauthorized packet access method, device and system

Country Status (2)

Country Link
CN (1) CN112567856B (en)
WO (1) WO2020034102A1 (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1761182A (en) * 2004-08-17 2006-04-19 三星电子株式会社 The apparatus and method of dividing frequency in OFDM mobile communication system
CN102316594A (en) * 2011-09-23 2012-01-11 北京邮电大学 Method for cross layer resource distribution and grouped dispatch in cognitive wireless network
CN102355736A (en) * 2011-08-04 2012-02-15 大唐移动通信设备有限公司 Method and device of determining and packet scheduling of thresholds for invocation
CN105392206A (en) * 2015-11-27 2016-03-09 京信通信技术(广州)有限公司 Scheduling method and baseband unit

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102076097B (en) * 2009-11-25 2014-03-05 华为技术有限公司 Resource scheduling method and base station
CN104168596B (en) * 2014-09-03 2017-10-24 重庆邮电大学 The mobile optimization method of handoff parameter is set for being grouped in LTE network based on mobile subscriber
CN106211348B (en) * 2015-05-07 2019-07-05 电信科学技术研究院 A kind of method and device of multiple access access
EP3306849B1 (en) * 2015-06-08 2023-08-02 LG Electronics Inc. Method and apparatus for transmitting and receiving data in wireless communication system
US10568081B2 (en) * 2016-03-21 2020-02-18 Samsung Electronics Co., Ltd. Scheduling uplink transmissions

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1761182A (en) * 2004-08-17 2006-04-19 三星电子株式会社 The apparatus and method of dividing frequency in OFDM mobile communication system
CN102355736A (en) * 2011-08-04 2012-02-15 大唐移动通信设备有限公司 Method and device of determining and packet scheduling of thresholds for invocation
CN102316594A (en) * 2011-09-23 2012-01-11 北京邮电大学 Method for cross layer resource distribution and grouped dispatch in cognitive wireless network
CN105392206A (en) * 2015-11-27 2016-03-09 京信通信技术(广州)有限公司 Scheduling method and baseband unit

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
RP-170376 "Status Report of Study on New Radio Access Technology";NTT DOCOMO等;《3GPP tsg_ran\TSG_RAN》;20170228;全文 *

Also Published As

Publication number Publication date
WO2020034102A1 (en) 2020-02-20
CN112567856A (en) 2021-03-26

Similar Documents

Publication Publication Date Title
US11272392B2 (en) Buffer status report processing method and apparatus
EP3340722A1 (en) Method and device for transmitting data
CN106954277B (en) Scheduling request processing method and device
MX2010012317A (en) Signalling resource allocation in a telecommunications network.
US11039448B2 (en) Resource scheduling method and apparatus
CN109561464B (en) Method and equipment for reporting buffer state and allocating resources
WO2016197396A1 (en) Network apparatus, terminal apparatus and resource allocation method
EP3451774A1 (en) Service data transmission method, user equipment and network device
US10225850B2 (en) Vehicular network communication method, and apparatuses
CN110690944B (en) Method and device for transmitting and determining priority of channel state information, storage medium and user equipment
US11758522B2 (en) Methods and apparatuses for determining a transport block size (TBS) for data transmission
CN110661608B (en) Communication method, communication device, computer readable medium and electronic equipment
CN108029106A (en) Definite and indicating means, the device of a kind of interface-free resources
KR101817449B1 (en) Method for transmitting signal in device to device proximity service, base station and user equipment
CN109691212B (en) Cell switching method and device for unauthorized uplink transmission
CN112567856B (en) Unauthorized packet access method, device and system
US20190230537A1 (en) Wireless communication method, terminal device, and access network device
CN107708206B (en) Data transmission method and terminal
JP2020072310A (en) Communication device, communication device control method, and program
US20200374063A1 (en) Resource allocation method and related device
CN114503467B (en) Data transmission method and device
JP2023521398A (en) Resource determination method and equipment
EP3104655A1 (en) Downlink signal transmission method, base station and user equipment
WO2022077383A1 (en) Control channel element location determination method and apparatus, and storage medium
WO2023011201A1 (en) Communication method and communication apparatus

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant