CN112689247B - Terminal access method and device in cluster system and computer storage medium - Google Patents

Terminal access method and device in cluster system and computer storage medium Download PDF

Info

Publication number
CN112689247B
CN112689247B CN202011533195.8A CN202011533195A CN112689247B CN 112689247 B CN112689247 B CN 112689247B CN 202011533195 A CN202011533195 A CN 202011533195A CN 112689247 B CN112689247 B CN 112689247B
Authority
CN
China
Prior art keywords
access
random access
terminal
parameter
channel
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011533195.8A
Other languages
Chinese (zh)
Other versions
CN112689247A (en
Inventor
多国起
王飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Excera Technology Co ltd
Original Assignee
Shenzhen Excera Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Excera Technology Co ltd filed Critical Shenzhen Excera Technology Co ltd
Priority to CN202011533195.8A priority Critical patent/CN112689247B/en
Publication of CN112689247A publication Critical patent/CN112689247A/en
Application granted granted Critical
Publication of CN112689247B publication Critical patent/CN112689247B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a terminal access method, a device and a computer readable storage medium in a cluster system, wherein the method comprises the following steps: when the terminal needs to access the channel and meets the access condition, a random access process is adopted for access; when the access to the channel fails according to the related parameters broadcasted by the system, updating the predefined random access control parameters, and calculating the waiting time of the next access according to the backoff parameters broadcasted by the system; and dynamically adjusting the delay time of random access for accessing according to the predefined random access control parameter and backoff parameter from the preset times of channel access. The problem that the emergency capacity of the system is influenced when the number of the terminals connected into the cluster system is too large in the prior art is solved.

Description

Terminal access method and device in cluster system and computer storage medium
Technical Field
The present invention relates to the field of computer technologies, and in particular, to a method and an apparatus for accessing a terminal in a cluster system, and a computer storage medium.
Background
The Digital Trunking system widely used at present is mainly PDT (policy Digital reporting) and DMR (Digital Mobile Radio) Tier III. With the gradual improvement of the public safety and emergency communication fields, the number of cluster terminals is very large, and although the original protocol standard defines the rules of random access, in practical application, because the base number of the terminal is too large, a large number of collision is generated on request signals of the terminal in certain use scenes, and the signals interfere with each other, thereby seriously affecting the emergency capability of the system.
According to the experimental situation of the simulated practical application scenario, if 450 terminals initiate random access services, such as registration, under one base station, it takes 15-20 minutes for all terminals to register. This is a very serious problem for the public safety industry, the emergency communication industry. Therefore, the prior art also has the problem that the emergency capacity of the system is influenced when the number of the terminal accesses in the cluster system is too large.
Disclosure of Invention
The invention mainly aims to provide a method and a device for accessing terminals in a cluster system and a computer storage medium, and aims to solve the problem that the emergency capacity of the system is influenced when the number of the terminals accessed in the cluster system is too large in the prior art.
In order to achieve the above object, the present invention provides a terminal access method in a cluster system, where the terminal access method in the cluster system includes the following steps:
when a terminal needs to access a channel and meets access conditions, a random access flow is adopted for access;
when the access to the channel fails according to the related parameters broadcasted by the system, updating the predefined random access control parameters, and calculating the waiting time of the next access according to the backoff parameters broadcasted by the system;
and dynamically adjusting the delay time of random access for accessing according to the predefined random access control parameter and backoff parameter from the preset times of channel access.
In an embodiment, before the step of performing access by using a random access procedure when the terminal needs to access a channel and meets an access condition, the method further includes:
receiving a downlink broadcast random access signaling of a system;
and analyzing the relevant parameters of the random access signaling according to a random access protocol.
In one embodiment, the access condition is mask and traffic restriction compliance; the predefined random access control parameters include: a maximum number of retries of random access and a number of failures of random access.
In an embodiment, the dynamically adjusting the delay time of the random access for the access according to the predefined random access control parameter and backoff parameter from the channel access for the preset number of times includes:
when the waiting time obtained by the previous channel access failure calculation is reached for the preset times, the random access process is adopted for access;
checking whether the terminal receives the response of the system in the corresponding time;
when the terminal does not receive the response of the system in the corresponding time, updating the random access failure parameter;
judging whether the random access failure parameter is less than the maximum retry number of random access;
when the random access failure parameter is smaller than the maximum retry number of random access, dynamically calculating the random access delay time according to the current random access failure number and the backoff parameter; the more the dynamically calculated rule is, the more the random access failure times are, the more the probability is, the high-delay waiting access time is obtained;
and accessing a channel according to the delay time of the random access.
In one embodiment, the accessing the channel according to the related parameters broadcasted by the system includes:
performing mask matching according to the mask parameters broadcasted by the system;
when the matching is successful, judging whether the service is allowed according to the service parameters broadcasted by the system;
when the service is allowed, initiating a channel access request;
and setting a waiting response timer according to the random access response time limit parameter broadcasted by the system, and checking whether the terminal receives the response of the system in the corresponding time.
In one embodiment, the method further comprises one of the following steps:
when the matching is unsuccessful, carrying out random back-off;
and when the service is not allowed, performing random backoff.
In one embodiment, the method further comprises:
and when the random access failure parameter is equal to the maximum retry times of random access, giving up the current base station to restart the base station scanning process.
In one embodiment, the method further comprises:
and restarting the random access process when the random access failure parameter is equal to the maximum retry number of random access.
In order to achieve the above object, the present invention further provides a terminal access device in a cluster system, where the device includes a memory, a processor, and a terminal access program in the cluster system, where the terminal access program is stored in the memory and is executable on the processor, and when the terminal access program in the cluster system is executed by the processor, the terminal access device in the cluster system implements the steps of the terminal access method in the cluster system.
To achieve the above object, the present invention further provides a computer-readable storage medium, which stores a terminal access program in a cluster system, where the terminal access program in the cluster system implements the steps of the terminal access method in the cluster system when executed by a processor.
According to the terminal access determining method, device and computer storage medium in the cluster system, when the terminal needs to access a channel and meets the channel access condition, a random access flow is adopted for access; when the terminal fails to access the channel according to the relevant parameters broadcasted by the system, including but not limited to a 'mask' parameter, a 'service' parameter, a 'random access response time limit' parameter, a 'backoff' parameter and the like, updating the predefined random access control parameter, and calculating the waiting time of the next access according to the backoff parameter broadcasted by the system; the terminal dynamically adjusts the delay time of random access for access according to the predefined random access failure parameter and backoff parameter from the preset number of channel access; the more the random access failure times are, the more the probability of obtaining the high delay waiting access time is, so as to reduce the probability of terminal signaling collision, thereby solving the problem that the emergency capability of the system is influenced when the number of the terminal access in the cluster system is too large in the prior art.
Drawings
FIG. 1 is a schematic diagram of an apparatus according to an embodiment of the present invention;
fig. 2 is a flowchart illustrating a first embodiment of a terminal access method in a cluster system according to the present invention;
fig. 3 is a flowchart illustrating a second embodiment of a terminal access method in a cluster system according to the present invention;
fig. 4 is a flowchart illustrating a third embodiment of a terminal access method in a cluster system according to the present invention;
fig. 5 is a detailed flowchart of step S390 according to the third embodiment of the present invention.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
The main solution of the embodiment of the invention is as follows: when the terminal needs to access the channel and meets the channel access condition, a random access process is adopted for access; when the terminal fails to access the channel according to the relevant parameters of the system broadcast, including but not limited to a 'mask' parameter, a 'service' parameter, a 'random access response time limit' parameter, a 'backoff' parameter and the like, updating the predefined random access control parameter, and calculating the waiting time of the next access according to the backoff parameter of the system broadcast; the terminal dynamically adjusts the delay time of random access for access according to the predefined random access failure parameter and backoff parameter from the preset number of channel access; the more the random access failure times are, the more probability is to obtain the high-delay waiting access time so as to reduce the probability of terminal signaling collision, thereby solving the problem that the emergency capacity of the system is influenced when the number of the terminals accessed in the cluster system is too large in the prior art.
As an implementation manner, fig. 1 may be shown, where fig. 1 is a schematic structural diagram of an apparatus according to an embodiment of the present invention.
Processor 1100 may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method may be performed by integrated logic circuits of hardware or instructions in the form of software in the processor 1100. The processor 1100 described above may be a general purpose processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an application specific programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components. The various methods, steps and logic blocks disclosed in the embodiments of the present invention may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The software module may be located in ram, flash memory, rom, prom, or eprom, registers, etc. storage media as is well known in the art. The storage medium is located in the memory 1200, and the processor 1100 reads the information in the memory 1200 and performs the steps of the above method in combination with the hardware thereof.
It will be appreciated that memory 1200 in embodiments of the invention may be either volatile memory or nonvolatile memory, or may include both volatile and nonvolatile memory. The non-volatile Memory may be a Read Only Memory (ROM), a Programmable ROM (PROM), an Erasable PROM (EPROM), an Electrically Erasable PROM (EEPROM), or a flash Memory. Volatile Memory can be Random Access Memory (RAM), which acts as external cache Memory. By way of illustration and not limitation, many forms of RAM are available, such as Static random access memory (Static RAM, SRAM), dynamic Random Access Memory (DRAM), synchronous Dynamic random access memory (Synchronous DRAM, SDRAM), double Data Rate Synchronous Dynamic random access memory (ddr Data Rate SDRAM, ddr SDRAM), enhanced Synchronous SDRAM (ESDRAM), synchlink DRAM (SLDRAM), and Direct Rambus RAM (DRRAM). The memory 1200 of the systems and methods described in connection with the embodiments of the invention is intended to comprise, without being limited to, these and any other suitable types of memory.
For a software implementation, the techniques described in this disclosure may be implemented with modules (e.g., procedures, functions, and so on) that perform the functions described in this disclosure. The software codes may be stored in a memory and executed by a processor. The memory may be implemented within the processor or external to the processor.
Based on the above structure, an embodiment of the present invention is proposed.
Referring to fig. 2, fig. 2 is a first embodiment of a terminal access method in a trunking system according to the present invention, where the terminal access method in the trunking system includes the following steps:
step S110, when the terminal needs to access the channel and meets the access condition, the terminal adopts the random access flow to access.
In the present embodiment, the trunking system refers to a dedicated scheduling system having a set of radio channels, which is shared by a plurality of departments. The system consists of a dispatching station, a control center, a base station, a mobile station and the like. A plurality of basic systems (single base station or multiple base stations) can connect a regional network which is systematically managed by a regional manager having a switching control function, handles a handoff registration and a roaming, and the like. The frequency bands used by the system comprise a 200MHz frequency band, a 400MHz frequency band and an 800MHz frequency band, and the system has the characteristics of short connection time, high frequency utilization rate, economical use and the like. The wireless dispatching system can be used for realizing wireless dispatching systems belonging to different departments, sharing a group of frequencies without mutual interference and sharing a set of equipment.
In this embodiment, the digital trunking is a "dedicated mobile communication system", and the digital trunking communication is a novel mobile communication system that has emerged at the end of the twentieth century, and is an intelligent communication network that integrates interphone, GSM, CDMA, and image transmission, and that can implement arbitrary communication between individuals and a group, and can perform autonomous control, in addition to a personal mobile communication service that can be provided by a public mobile communication network (GSM, CDMA). The digital trunking communication has all functions of personal communication, can control and realize arbitrary communication between individuals and groups, has high confidentiality and rich functions, and really and comprehensively realizes the intellectualization of communication. Mobile communication systems can be classified into public mobile communication systems and private mobile communication systems according to the nature of their use. The trunking communication system belongs to a special mobile communication system, which is a special advanced command and dispatch system. It features that all available channels in the system are shared by all users in the system, and has the function of automatically selecting channels. It is a multi-purpose, high-performance wireless dispatch communication system sharing resources, sharing cost, sharing channel equipment and services. Because the cluster system mainly focuses on command, contact and scheduling, the application requirements of the cluster system can be met in various aspects of various industries such as railway transportation, road traffic, civil aviation and shipping, public security and fire protection, and the correspondence between major events and emergency events. The Digital Mobile Radio (DMR) can be preferably an open Digital trunking communication standard which is specially designed and established by the ETSI for middle and low end users, and is suitable for industries such as schools, hospitals, hotels and the like. The DMR adopts TDMA multiple access technology and four-carrier frequency shift keying modulation, the distance between channels is 12.5KHz, and the data rate is 9.6Kb/s. The DMR has the advantages of high utilization rate of frequency spectrum resources, compatibility with analog systems, large-area system networking and the like. PDT (police digital trunking) standard is a trunking communication standard with Chinese proprietary intellectual property rights, and can meet the requirements of users in most trunking communication industries by focusing on the development direction of future digital talkback technology. The PDT standard fully considers the situation of China, references and innovatively designs international mature standard technologies (such as Tetra, P25, DMR, MPT1327 and the like), follows five principles of high cost performance, safety and confidentiality, large regional system, expandability and backward compatibility, and effectively solves the problem of converged communication of various emergency communication networks.
In this embodiment, the terminal may be a device such as a mobile phone and an intercom, and when the terminal needs to access the channel and meets the access condition, the access channel, that is, the terminal requests to connect to the trunking system, where the access condition preferably meets the mask restriction and the service restriction. The terminal adopts a standard random access process to access the channel, the random access protocol can be preferably ALOHA protocol, and the ALOHA protocol and the CSMA/CD of the successor are random access or competition transmission protocols. Random access means a time when its transmission cannot be expected for any station; contention transmission refers to the use of the channel by which all transmitting stations are free to contend. The Aloha protocol, or Aloha technology, aloha network, is the earliest radio computer communication network in the world. It is the name of a research program at the university of hawaii in the united states in 1968. Designed by the Norman Amramson et al for their terrestrial wireless packet networks. In the early 70 s a packet switched computer network was developed using wireless broadcast technology, the earliest of the most basic wireless data communication protocols.
Step S120, when the channel access fails according to the related parameters broadcasted by the system, updating the predefined random access control parameters, and calculating the waiting time of the next access according to the backoff parameters broadcasted by the system.
In the present embodiment, referring to table 1, table 1 is a parameter of system broadcast.
Information unit name Length of
Tail block 1
Protective mark 1
Control signaling block operation code 6
Function set identification 8
Retention 2
Time slot synchronization 1
Version(s) 3
Offset of 1
Networking 1
Mask code 5
Business 2
Random access response time limit 4
Registration 1
Retreat 4
System identification code 16
Terminal address 24
TABLE 1
When the terminal fails to access the channel according to the relevant parameters broadcasted by the system, the relevant parameters include, but are not limited to: a "mask" parameter, a "traffic" parameter, a "random access response time limit" parameter, a "backoff" parameter, etc. Referring to table 2, table 2 calculates the time corresponding to the parameter "random access response time limit" for the terminal.
Random access response time limit Number of waiting frames
0 0
1 1
2 2
3 3
4 4
5 5
6 6
7 7
8 8
9 9
10 10
11 11
12 12
13 13
14 15
15 24
TABLE 2
Updating the predefined random access control parameter, where the random access control parameter may preferably be set by a user through a write-frequency software of the terminal, and the random access control parameter may be specifically set according to a specific application scenario, which is not limited herein. Two types of parameters may be preferred: the first type is a parameter for controlling a terminal channel access policy class, such as "maximum retry number of random access" defined in this embodiment; the second type is a parameter for dynamically adjusting the access delay, such as "random access failure times" defined in this embodiment. The predefined random control parameter is updated to update the "number of random access failures".
Referring to table 3, table 3 calculates the time corresponding to the "backoff" parameter for the terminal. And calculating the waiting time of accessing the channel next time according to the backoff parameters broadcasted by the system.
Retreat Number of backoff frames
0 Retention
1 1
2 2
3 3
4 4
5 5
6 8
7 11
8 15
9 20
10 26
11 33
12 41
13 50
14 70
15 100
TABLE 3
Step S130, starting from the preset channel access, dynamically adjusting the delay time of the random access according to the predefined random access control parameter and the backoff parameter for access.
In this embodiment, the preset number of times may preferably be three times, and the terminal needs to dynamically adjust the delay time of the random access according to the predefined random access failure number and backoff parameters from the third channel access to access the channel. The more the dynamically adjusted rule is, the more the random access failure times are, the more the probability of obtaining the high-delay waiting access time is, so as to reduce the probability of terminal signaling collision.
In the technical scheme provided by the embodiment, when the terminal needs to access the channel and meets the channel access condition, a random access process is adopted for access; when the terminal fails to access the channel according to the relevant parameters of the system broadcast, including but not limited to a 'mask' parameter, a 'service' parameter, a 'random access response time limit' parameter, a 'backoff' parameter and the like, updating the predefined random access control parameter, and calculating the waiting time of the next access according to the backoff parameter of the system broadcast; the terminal dynamically adjusts the delay time of random access for access according to the predefined random access failure parameter and backoff parameter from the preset times of channel access; the more the random access failure times are, the more probability is to obtain the high-delay waiting access time so as to reduce the probability of terminal signaling collision, thereby solving the problem that the emergency capacity of the system is influenced when the number of the terminals accessed in the cluster system is too large in the prior art.
Referring to fig. 3, fig. 3 is a second embodiment of a terminal access method in a cluster system according to the present invention, including:
compared with the first embodiment, the second embodiment includes step S210 and step S220, and other steps are the same as those of the first embodiment and are not repeated.
Step S210, receiving a downlink broadcast random access signaling.
In this embodiment, the terminal receives a broadcast random access (C _ ALOHA) signaling of the downlink timing of the trunking system before accessing the channel.
Step S220, analyzing the relevant parameters of the random access signaling according to a random access protocol.
In this embodiment, the terminal parses the relevant parameters of the random access (C _ ALOHA) signaling according to the random access protocol (ALOHA protocol), and can refer to table 1.
Step S230, when the terminal needs to access the channel and meets the access condition, performing access by using a random access procedure.
Step S240, when the access to the channel fails according to the related parameters broadcasted by the system, updating the predefined random access control parameters, and calculating the waiting time for the next access according to the backoff parameters broadcasted by the system.
And step S250, starting to access the channel for the preset times, and dynamically adjusting the delay time of random access to access according to the predefined random access control parameter and backoff parameter.
In the technical solution provided in this embodiment, a terminal receives a broadcast random access (C _ ALOHA) signaling at a downlink timing of a trunking system before accessing a channel; the terminal analyzes the related parameters of a random access (C _ ALOHA) signaling according to a random access protocol (ALOHA protocol); this is a precondition for the terminal to access the channel.
Referring to fig. 4, fig. 4 is a third embodiment of a terminal access method in a cluster system of the present invention, including:
step S310, receiving the downlink broadcast random access signaling of the system.
Step S320, resolving the relevant parameters of the random access signaling according to the random access protocol.
And step S330, when the terminal needs to access the channel and meets the access condition, accessing by adopting a random access flow.
Compared with the second embodiment, the third embodiment includes step S340, step S350, step S360, and step S370, and other steps are the same as the second embodiment and are not repeated.
Step S340, performing mask matching according to the mask parameter broadcasted by the system.
In this embodiment, the terminal performs mask matching according to a mask parameter broadcasted by the system.
Step S350, when the matching is successful, whether the service is allowed is judged according to the service parameters broadcasted by the system.
In this embodiment, when the mask matching is successful, the terminal determines whether the service is allowed according to the service parameter broadcasted by the system.
Step S360, when the service is allowed, a channel access request is initiated.
In this embodiment, when the result of the determination is service allowance, a channel access request is initiated.
Step S370, setting a waiting response timer according to the random access response time limit parameter broadcasted by the system, and checking whether the terminal receives the response of the system within the corresponding time.
In this embodiment, the waiting response timer is set according to the random access response time limit parameter broadcasted by the system, and whether the terminal receives the response of the system within the corresponding time is checked, that is, whether the terminal successfully accesses the channel within the corresponding time is checked.
Step S380, when the terminal does not receive the response of the system within the corresponding time, updating the predefined random access control parameter, and calculating the waiting time for the next access according to the backoff parameter broadcasted by the system.
Step S390, starting from the preset number of channel accesses, dynamically adjusting the delay time of the random access according to the predefined random access control parameter and backoff parameter for performing the access.
In the technical scheme provided by the embodiment, the terminal performs mask matching according to a mask parameter broadcasted by the system; the terminal carries out mask matching according to the mask parameters broadcasted by the system; when the mask matching is successful, the terminal judges whether the service is allowed according to the service parameters broadcasted by the system; when the judgment result is that the service is allowed, initiating a channel access request; and setting a waiting response timer according to the random access response time limit parameter broadcasted by the system, and checking whether the terminal receives the response of the system in the corresponding time, namely checking whether the terminal successfully accesses the channel in the corresponding time.
In the above embodiment, one of the following steps is further included:
and step S410, when the matching is unsuccessful, performing random back-off.
In this embodiment, when the terminal fails to match the service parameters broadcasted by the system, a random back-off is performed.
And step S420, when the service is not allowed, performing random backoff.
In this embodiment, when the terminal determines that the service is not allowed according to the service parameter broadcasted by the system, a random backoff is performed.
Referring to fig. 5, fig. 5 shows the specific steps of step S390 in the third embodiment of the present invention, which includes:
step S510, when the waiting time obtained by the last access channel failure calculation reaches a preset number of times, access is performed by using a random access procedure.
In this embodiment, the preset number of times is preferably three times, and when the waiting time obtained by the second access channel failure calculation is reached, the random access procedure is adopted to access the channel, that is, the ALOHA protocol is used to access the channel.
Step S520, checking whether the terminal receives the response of the system within the corresponding time.
In this embodiment, the corresponding time is set by the wait response timer, and the corresponding time is calculated by the "random access response time limit" broadcasted by the system, specifically referring to table 2. The waiting response timer checks whether the terminal receives a response of the cluster system within a corresponding time.
Step S530, when the terminal does not receive the response of the system in the corresponding time, updating the random access failure parameter.
In this embodiment, when the wait response timer checks that the terminal does not receive the response of the system within the corresponding time, which indicates that the terminal fails to access the channel, the random access failure parameter is updated.
Step S540, determine whether the random access failure parameter is less than the maximum retry number of random access.
In this embodiment, it is determined whether the random access failure parameter is smaller than the maximum number of retries of random access.
Step S550, when the random access failure parameter is less than the maximum retry number of random access, dynamically calculating the random access delay time according to the current random access failure number and the backoff parameter; wherein, the more the dynamically calculated rule is according to the random access failure times, the more probability is to obtain the high delay waiting access time.
In this embodiment, when the random access failure parameter is smaller than the maximum retry number of random access, the random access delay time is dynamically calculated according to the current random access failure number and the backoff parameter; the more the dynamically calculated rule is, the more the random access failure times are, the more the high-delay waiting access time is obtained.
Step S560, accessing the channel according to the delay time of the random access
In this embodiment, the channel is accessed according to the calculated delay time of the random access. When the channel is congested, namely the number of the terminal requesting to access the cluster system is too large, the waiting time is increased, and the signal collision is reduced, so that the problems that the random access performance is poor and emergency cannot be dealt with under the cluster system are solved.
In the above embodiment, the method further includes:
step S610, when the random access failure parameter is equal to the maximum retry number of random access, abandoning the current base station to restart the base station scanning procedure.
In this embodiment, when the parameter of the random access failure is equal to the maximum retry number of the random access, that is, when the number of access failures of the terminal on the same channel reaches the upper limit, the current base station is abandoned to restart the scanning procedure of the base station. When the channel congestion returns to normal, namely the number of the terminals accessing the cluster system is normal, the terminals can quickly adjust the access strategy, the waiting time is reduced, and the real-time performance of the service is improved.
In the above embodiment, the method further includes:
in step S620, when the random access failure parameter is equal to the maximum retry number of random access, the random access procedure is restarted.
In this embodiment, when the random access failure parameter is equal to the maximum retry number of random access, that is, when the access failure number of the terminal on the same channel reaches the upper limit, the random access procedure is restarted. When the channel congestion returns to normal, namely the number of the terminals accessing the cluster system is normal, the terminals can quickly adjust the access strategy, the waiting time is reduced, and the real-time performance of the service is improved.
The invention also provides a terminal access device in the cluster system, which comprises a memory, a processor and a terminal access program in the cluster system, wherein the terminal access program is stored in the memory and can run on the processor, and when being executed by the processor, the terminal access program in the cluster system realizes the steps of the terminal access method in the cluster system.
The present invention also provides a computer-readable storage medium, which stores a terminal access program in a cluster system, and when the terminal access program in the cluster system is executed by a processor, the terminal access program in the cluster system implements the steps of the terminal access method in the cluster system as described above.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
It should be noted that in the claims, any reference signs placed between parentheses shall not be construed as limiting the claim. The word "comprising" does not exclude the presence of elements or steps not listed in a claim. The word "a" or "an" preceding an element does not exclude the presence of a plurality of such elements. The invention may be implemented by means of hardware comprising several distinct elements, and by means of a suitably programmed computer. In the unit claims enumerating several means, several of these means may be embodied by one and the same item of hardware. The usage of the words first, second and third, etcetera do not indicate any ordering. These words may be interpreted as names.
While preferred embodiments of the present invention have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including the preferred embodiment and all changes and modifications that fall within the scope of the invention.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.

Claims (8)

1. A terminal access method in a cluster system is characterized in that the terminal access method in the cluster system comprises the following steps:
when the terminal needs to access the channel and meets the access condition, a random access process is adopted for access;
when the access to the channel fails according to the related parameters broadcasted by the system, updating the predefined random access control parameters, and calculating the waiting time of the next access according to the backoff parameters broadcasted by the system;
starting to access a channel with preset times, and dynamically adjusting the delay time of random access to access according to the predefined random access control parameter and backoff parameter;
wherein, when the terminal needs to access the channel and meets the access condition, before the step of performing access by adopting the random access flow, the method further comprises the following steps:
receiving a downlink broadcast random access signaling of a system;
analyzing the related parameters of the random access signaling according to a random access protocol;
wherein the access condition is that a mask and a service limit are met; the predefined random access control parameters include: a maximum number of retries of random access and a number of failures of random access.
2. The method for accessing a terminal in a cluster system according to claim 1, wherein the dynamically adjusting the delay time of the random access according to the predefined random access control parameter and backoff parameter from the channel access for the preset number of times comprises:
when the waiting time obtained by the previous channel access failure calculation is reached for the preset times, the random access process is adopted for access;
checking whether the terminal receives the response of the system within the corresponding time;
when the terminal does not receive the response of the system in the corresponding time, updating the random access failure parameter;
judging whether the random access failure parameter is less than the maximum retry number of random access;
when the random access failure parameter is smaller than the maximum retry number of random access, dynamically calculating the random access delay time according to the current random access failure number and the backoff parameter; the more the dynamically calculated rule is, the more the random access failure times are, the more the probability is, the high-delay waiting access time is obtained;
and accessing a channel according to the delay time of the random access.
3. The method for accessing a terminal in a cluster system according to claim 2, wherein the accessing a channel according to the relevant parameters broadcasted by the system comprises:
performing mask matching according to the mask parameters broadcasted by the system;
when the matching is successful, judging whether the service is allowed according to the service parameters broadcasted by the system;
when the service is allowed, initiating a channel access request;
and setting a waiting response timer according to the random access response time limit parameter broadcasted by the system, and checking whether the terminal receives the response of the system in the corresponding time.
4. The method for accessing a terminal in a cluster system according to claim 3, further comprising one of the following steps:
when the matching is unsuccessful, carrying out random backoff;
and when the service is not allowed, performing random backoff.
5. The method for accessing a terminal in a cluster system according to claim 2, further comprising:
and when the random access failure parameter is equal to the maximum retry times of random access, giving up the current base station to restart the base station scanning process.
6. The method for accessing a terminal in a cluster system according to claim 2, further comprising:
and restarting the random access process when the random access failure parameter is equal to the maximum retry number of random access.
7. A terminal access device in a cluster system, the device comprising a memory, a processor and a terminal access program in the cluster system stored in the memory and operable on the processor, wherein the terminal access program in the cluster system, when executed by the processor, implements the steps of the terminal access method in the cluster system according to any one of claims 1 to 6.
8. A computer-readable storage medium, characterized in that the computer-readable storage medium stores a terminal access program in a cluster system, and the terminal access program in the cluster system, when executed by a processor, implements the steps of the terminal access method in the cluster system according to any one of claims 1 to 6.
CN202011533195.8A 2020-12-22 2020-12-22 Terminal access method and device in cluster system and computer storage medium Active CN112689247B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011533195.8A CN112689247B (en) 2020-12-22 2020-12-22 Terminal access method and device in cluster system and computer storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011533195.8A CN112689247B (en) 2020-12-22 2020-12-22 Terminal access method and device in cluster system and computer storage medium

Publications (2)

Publication Number Publication Date
CN112689247A CN112689247A (en) 2021-04-20
CN112689247B true CN112689247B (en) 2023-03-14

Family

ID=75450867

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011533195.8A Active CN112689247B (en) 2020-12-22 2020-12-22 Terminal access method and device in cluster system and computer storage medium

Country Status (1)

Country Link
CN (1) CN112689247B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102740492A (en) * 2011-04-01 2012-10-17 中兴通讯股份有限公司 Method and system for random access control
WO2020025023A1 (en) * 2018-08-01 2020-02-06 Oppo广东移动通信有限公司 Random access method, terminal device and network device
CN111836397A (en) * 2019-08-07 2020-10-27 维沃移动通信有限公司 Random access method, terminal and network side equipment

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102740492A (en) * 2011-04-01 2012-10-17 中兴通讯股份有限公司 Method and system for random access control
WO2020025023A1 (en) * 2018-08-01 2020-02-06 Oppo广东移动通信有限公司 Random access method, terminal device and network device
CN111836397A (en) * 2019-08-07 2020-10-27 维沃移动通信有限公司 Random access method, terminal and network side equipment

Also Published As

Publication number Publication date
CN112689247A (en) 2021-04-20

Similar Documents

Publication Publication Date Title
US11924750B2 (en) Apparatus and methods for generating and distributing policy in wireless networks
RU2426261C2 (en) Method and protocol for processing attempts at accessing communication system
US20120196608A1 (en) Network access method for m2m device and base station using the same
US9980248B2 (en) Method for device to access network, access point, network access device, and system
CN105144823A (en) Systems and methods for differentiated fast initial link setup
CN104521311A (en) Methods and apparatuses for handling connection setups in a telecommunications system
KR101721291B1 (en) Method and device of transmitting data in network linked heterogeneous systems
US11812478B2 (en) Network access method and apparatus
US10779225B2 (en) Methods, network nodes and wireless device for handling access information
WO2020191586A1 (en) Random access method and device, and storage medium
WO2020200014A1 (en) Method and device for communication
WO2016134526A1 (en) Random access method, user equipment and base station
TW202008838A (en) Random access method, terminal device, and storage medium
JP2000078653A (en) Resource assignment method for radio communication system
CN114765506A (en) PSFCH transmission method and device of secondary link and computer-readable storage medium
RU2731336C1 (en) Access method and terminal device
JP7213341B2 (en) Wireless communication method, network device, computer readable storage medium and computer program
RU2763168C1 (en) Method for receiving the downlink channel and terminal apparatus
CN109803442B (en) Method for sending synchronization signal, network equipment and terminal equipment
US9241284B2 (en) Multimode user equipment accessing wireless sensor network
CN112689247B (en) Terminal access method and device in cluster system and computer storage medium
Samir et al. An improved LTE RACH protocol for M2M applications
KR101620071B1 (en) Apparatus and method for setting frequency band, access point and method for setting frequency band
KR20150015264A (en) Method and apparatus for distributed association of wireless networks
WO2020223977A1 (en) Access control method and apparatus, and readable stroage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant