CN113038513A - Method, terminal device and storage medium for independent networking weak coverage - Google Patents

Method, terminal device and storage medium for independent networking weak coverage Download PDF

Info

Publication number
CN113038513A
CN113038513A CN202110276316.3A CN202110276316A CN113038513A CN 113038513 A CN113038513 A CN 113038513A CN 202110276316 A CN202110276316 A CN 202110276316A CN 113038513 A CN113038513 A CN 113038513A
Authority
CN
China
Prior art keywords
timer
candidate cell
state
disabled state
terminal equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110276316.3A
Other languages
Chinese (zh)
Inventor
王方
杨小林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN202110276316.3A priority Critical patent/CN113038513A/en
Publication of CN113038513A publication Critical patent/CN113038513A/en
Priority to PCT/CN2022/070139 priority patent/WO2022193798A1/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/02Arrangements for optimising operational condition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • H04L41/0813Configuration setting characterised by the conditions triggering a change of settings
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W60/00Affiliation to network, e.g. registration; Terminating affiliation with the network, e.g. de-registration
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

The embodiment of the invention discloses a method, terminal equipment and a storage medium for independent networking weak coverage, which are used for quickly forbidding a problem cell or a weak coverage cell, reducing bad experience caused by network problems and ensuring that a user can quickly register a better cell so as to carry out normal service. The method of the embodiment of the invention is applied to the terminal equipment and comprises the following steps: under the condition that a first timer is not overtime, if N times of low-layer failures of the terminal equipment trying to access a candidate cell are detected, setting the candidate cell in a forbidden state, and starting a second timer, wherein N is a positive integer; maintaining the candidate cell in a disabled state if the second timer has not expired; switching the candidate cell from the disabled state to a non-disabled state if the second timer expires.

Description

Method, terminal device and storage medium for independent networking weak coverage
Technical Field
The present invention relates to the field of communications, and in particular, to a method, a terminal device, and a storage medium for independent networking weak coverage.
Background
Independent networking (SA) is an important networking mode in the 5G era and is a future trend, and operators explicitly require support of SA capability when manufacturers deliver goods. At present, terminal manufacturers all follow the requirements of operators, and directly have independent networking SA (Security architecture) capability during shipment. However, the existing SA capability lacks flexible control, and more problems are encountered, which are mainly reflected in that the SA network cannot be registered, cannot perform basic functions (such as telephone and internet access), and even causes a certain power consumption problem. These all can lead to a poor experience for the user.
Disclosure of Invention
The embodiment of the invention provides a method, terminal equipment and a storage medium for independent networking weak coverage, which are used for rapidly forbidding a problem cell or a weak coverage cell when the SA network is not completely constructed, reducing bad experience caused by network problems and ensuring that a user can rapidly register a better cell so as to perform normal service.
A first aspect of the present application provides a method for independent networking weak coverage, which may include:
under the condition that a first timer is not overtime, if N times of low-layer failures of the terminal equipment trying to access a candidate cell are detected, setting the candidate cell in a forbidden state, and starting a second timer, wherein N is a positive integer;
maintaining the candidate cell in a disabled state if the second timer has not expired;
switching the candidate cell from the disabled state to a non-disabled state if the second timer expires.
A second aspect of the present application provides a terminal device, which may include:
the processing module is used for setting the candidate cell in a forbidden state and starting a second timer if detecting that the terminal equipment attempts to access the candidate cell and N times of low-layer failures occur under the condition that the first timer is not overtime, wherein N is a positive integer; maintaining the candidate cell in a disabled state if the second timer has not expired; switching the candidate cell from the disabled state to a non-disabled state if the second timer expires.
A third aspect of the present application provides a terminal device, which may include:
a memory storing executable program code;
a processor and transceiver coupled with the memory;
the transceiver and the processor invoke the executable program code stored in the memory for performing the method of the first aspect of the application.
A fourth aspect of the present application provides a computer-readable storage medium comprising instructions which, when executed on a processor, cause the processor to perform the method of the first aspect of the present application.
In another aspect, an embodiment of the present invention discloses a computer program product, which, when running on a computer, causes the computer to execute the method of the first aspect of the present application.
In another aspect, an embodiment of the present invention discloses an application publishing platform, where the application publishing platform is configured to publish a computer program product, where when the computer program product runs on a computer, the computer is caused to execute the method according to the first aspect of the present application.
According to the technical scheme, the embodiment of the invention has the following advantages:
in the embodiment of the application, under the condition that a first timer is not overtime, if it is detected that the terminal device attempts to access a candidate cell and N times of low-layer failures occur, the candidate cell is set to a forbidden state, and a second timer is started, wherein N is a positive integer; maintaining the candidate cell in a disabled state if the second timer has not expired; switching the candidate cell from the disabled state to a non-disabled state if the second timer expires. Namely, when the SA network is not completely constructed, the problem cell or the weak coverage cell can be forbidden quickly, bad experience caused by network problems is reduced, and a user can be ensured to register a better cell quickly, so that normal service is carried out.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the following briefly introduces the embodiments and the drawings used in the description of the prior art, and obviously, the drawings in the following description are only some embodiments of the present invention, and other drawings can be obtained according to the drawings.
Fig. 1 is a diagram illustrating a random access channel procedure in an embodiment of the present application;
fig. 2 is a schematic diagram of an embodiment of a method for weak coverage of independent networking in an embodiment of the present application;
FIG. 3 is a diagram of an embodiment of a terminal device in an embodiment of the present invention;
fig. 4 is a schematic diagram of another embodiment of the terminal device in the embodiment of the present invention.
Detailed Description
The embodiment of the invention provides a method, terminal equipment and a storage medium for independent networking weak coverage, which are used for rapidly forbidding a problem cell or a weak coverage cell when the SA network is not completely constructed, reducing bad experience caused by network problems and ensuring that a user can rapidly register a better cell so as to perform normal service.
In order to make the technical solutions of the present invention better understood by those skilled in the art, the technical solutions in the embodiments of the present invention will be described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all embodiments. The embodiments based on the present invention should fall into the protection scope of the present invention.
Independent networking (SA) is an important networking mode in the 5G era and is a future trend, and operators explicitly require support of SA capability when manufacturers deliver goods. However, currently, the construction schedules of SA networks in different cities are different for each large operator, and the construction levels of busy commercial areas and residential areas in the same city are also different, so that a large number of SA weak coverage places exist, and a user can encounter more problems in the use process, thereby affecting the user experience and product public praise.
However, at present, terminal equipment manufacturers all follow the requirements of operators, and the SA capability is directly provided during shipment. The existing SA capability lacks flexible control and can encounter more problems. The main manifestations are that SA network can not register, basic functions (such as telephone and internet access) can not be performed, and even a certain power consumption problem is brought. These all give the user a bad experience and in severe cases cause complaints and back-offs of the network.
The invention provides a method for weak SA coverage, so that terminal equipment can register a proper cell more quickly to carry out normal service requirements, the complaint problem caused by the initial construction of an SA network in certain areas can be reduced, and the expressive force of the terminal equipment can be improved to a certain extent.
In the embodiments of the present application, a terminal device may also be referred to as a User Equipment (UE), an access terminal, a subscriber unit, a subscriber station, a mobile station, a remote terminal, a mobile device, a User terminal, a wireless communication device, a User agent, a User Equipment, or the like.
The terminal device may be a Station (ST) in a WLAN, and may be a cellular phone, a cordless phone, a Session Initiation Protocol (SIP) phone, a Wireless Local Loop (WLL) station, a Personal Digital Assistant (PDA) device, a handheld device with Wireless communication function, a computing device or other processing device connected to a Wireless modem, a vehicle-mounted device, a wearable device, a terminal device in a next generation communication system such as an NR Network, or a terminal device in a future evolved Public Land Mobile Network (PLMN) Network, and the like.
In the embodiment of the application, the terminal equipment can be deployed on land, including indoor or outdoor, handheld, wearable or vehicle-mounted; can also be deployed on the water surface (such as a ship and the like); and may also be deployed in the air (e.g., airplanes, balloons, satellites, etc.).
In this embodiment, the terminal device may be a Mobile Phone (Mobile Phone), a tablet computer (Pad), a computer with a wireless transceiving function, a Virtual Reality (VR) terminal device, an Augmented Reality (AR) terminal device, a wireless terminal device in industrial control (industrial control), a wireless terminal device in self driving (self driving), a wireless terminal device in remote medical (remote medical), a wireless terminal device in smart grid (smart grid), a wireless terminal device in transportation safety (transportation safety), a wireless terminal device in city (smart city), a wireless terminal device in smart home (smart home), or the like.
By way of example and not limitation, in the embodiments of the present application, the terminal device may also be a wearable device. Wearable equipment can also be called wearable intelligent equipment, is the general term of applying wearable technique to carry out intelligent design, develop the equipment that can dress to daily wearing, like glasses, gloves, wrist-watch, dress and shoes etc.. A wearable device is a portable device that is worn directly on the body or integrated into the clothing or accessories of the user. The wearable device is not only a hardware device, but also realizes powerful functions through software support, data interaction and cloud interaction. The generalized wearable smart device includes full functionality, large size, and can implement full or partial functionality without relying on a smart phone, such as: smart watches or smart glasses and the like, and only focus on a certain type of application functions, and need to be used in cooperation with other devices such as smart phones, such as various smart bracelets for physical sign monitoring, smart jewelry and the like.
First, a brief description will be made below of several cases of low layer failure (low layer failure) involved in the embodiments of the present application, as follows:
(1) t300 timeout
Referring to 3gpp 38.331, as shown in table 1, the start/end (stop) and time (expiry) of T300 will be described in detail.
Figure BDA0002976775850000051
TABLE 1T 300
(2) Radio Link Failure (RLF)
Referring to 3gpp 38.3315.3.10.3, radio link failure Detection (Detection of radio link failure).
(3) Random Access Channel (RACH) failure
Referring to 3gpp 38.3009.2.6, Random Access Procedure (Random Access Procedure). Fig. 1 is a schematic diagram of a random access channel procedure in the embodiment of the present application.
Second, description of parameters
1) rrc _ state _ condition: indicating whether the current feature is in a connected state or an idle state and taking effect by default in both scenes;
2) counter (counter): indicating the current failure times, and counting the times by the low layer failure to share one counter;
3) short _ monitor _ duration z: indicating short monitoring time, namely, taking RLF occurring N times within the current default time T1 and T1 as an abnormal scene;
bar _ time: indicating a cell set to a disabled state (bar cell) time, a current default time T2;
long _ monitor _ duration: indicating long monitoring time, at the current default time T3, the low layer failure is again bar after the cell (cell) is disabled (bar) and 1 or more times T3.
In the embodiments of the present application, a terminal device may also be referred to as a User Equipment (UE), an access terminal, a subscriber unit, a subscriber station, a mobile station, a remote terminal, a mobile device, a User terminal, a wireless communication device, a User agent, a User Equipment, or the like.
The terminal device may be a Station (ST) in a WLAN, and may be a cellular phone, a cordless phone, a Session Initiation Protocol (SIP) phone, a Wireless Local Loop (WLL) station, a Personal Digital Assistant (PDA) device, a handheld device with Wireless communication function, a computing device or other processing device connected to a Wireless modem, a vehicle-mounted device, a wearable device, a terminal device in a next generation communication system such as an NR Network, or a terminal device in a future evolved Public Land Mobile Network (PLMN) Network, and the like.
In the embodiment of the application, the terminal equipment can be deployed on land, including indoor or outdoor, handheld, wearable or vehicle-mounted; can also be deployed on the water surface (such as a ship and the like); and may also be deployed in the air (e.g., airplanes, balloons, satellites, etc.).
In this embodiment, the terminal device may be a Mobile Phone (Mobile Phone), a tablet computer (Pad), a computer with a wireless transceiving function, a Virtual Reality (VR) terminal device, an Augmented Reality (AR) terminal device, a wireless terminal device in industrial control (industrial control), a wireless terminal device in self driving (self driving), a wireless terminal device in remote medical (remote medical), a wireless terminal device in smart grid (smart grid), a wireless terminal device in transportation safety (transportation safety), a wireless terminal device in city (smart city), a wireless terminal device in smart home (smart home), or the like.
By way of example and not limitation, in the embodiments of the present application, the terminal device may also be a wearable device. Wearable equipment can also be called wearable intelligent equipment, is the general term of applying wearable technique to carry out intelligent design, develop the equipment that can dress to daily wearing, like glasses, gloves, wrist-watch, dress and shoes etc.. A wearable device is a portable device that is worn directly on the body or integrated into the clothing or accessories of the user. The wearable device is not only a hardware device, but also realizes powerful functions through software support, data interaction and cloud interaction. The generalized wearable smart device includes full functionality, large size, and can implement full or partial functionality without relying on a smart phone, such as: smart watches or smart glasses and the like, and only focus on a certain type of application functions, and need to be used in cooperation with other devices such as smart phones, such as various smart bracelets for physical sign monitoring, smart jewelry and the like.
The technical solution of the present application is further described below by way of an embodiment, as shown in fig. 2, which is a schematic diagram of an embodiment of a method for weak coverage of independent networking in the embodiment of the present application, and the method may include:
201. under the condition that a first timer is not overtime, if N times of low-layer failures of the terminal equipment trying to access a candidate cell are detected, the candidate cell is set to a forbidden state, and a second timer is started, wherein N is a positive integer.
Optionally, under the condition that the first timer is not overtime, if it is detected that the terminal device attempts to access the candidate cell and N times of low-layer failures occur, setting the candidate cell in a disabled state, and starting the second timer, may include: under the condition that a first timer is not overtime, if N times of low-layer failures of the terminal device trying to access the candidate cell are detected, the candidate cell is set to be in a forbidden state, a second timer and a third timer are started, and the duration of the third timer is longer than that of the second timer.
Optionally, the low-level failure includes: any one of a T300 timeout, a radio link failure detection (RLF), and a Random Access Channel (RACH) failure.
Optionally, the scenario to which the method is applied includes at least one of the following: radio Resource Control (RRC) initially establishes, reconstructs, and switches scenarios.
Illustratively, the first timer corresponds to T1, the second timer corresponds to T2, the third timer corresponds to T3, T1 may be 150ms, T2 may be 300ms, and T3 may be 600 ms. The value of N may be 3. According to the cell disabling strategy for the SA weak coverage, when RRC is initially established, N times of low layer failure occur within T1 time, the detected candidate cell is set to be in a disabled state, and a second timer and a third timer are started. That is, it can be understood that the terminal device detects an abnormal scenario satisfying the disabled state, the bar cell duration T2 and the monitoring duration T3 are started, and T3 is greater than T2.
202. Maintaining the candidate cell in a disabled state if the second timer has not expired.
The maintaining the candidate cell in the disabled state if the second timer has not expired may include: and under the condition that the second timer is not overtime and the terminal equipment is in an idle (idle) state or a connected (connect) state, the terminal equipment keeps the candidate cell in a forbidden state.
Illustratively, if T2 has not timed out, in neither the idle state nor the connect state, the terminal device will not respond to the network event, i.e., the cell is always bar when T2 has not timed out.
203. Switching the candidate cell from the disabled state to a non-disabled state if the second timer expires.
Optionally, after the terminal device switches the candidate cell from the disabled state to the non-disabled state, the method further includes: and the terminal equipment retries to access the candidate cell in the non-forbidden state.
Optionally, when the second timer expires, the terminal device switches the candidate cell from the disabled state to a non-disabled state, which may include but is not limited to the following implementation manners:
mode 1: and if the second timer is overtime and the third timer is not overtime, if the terminal equipment detects that the candidate cell in the non-forbidden state is tried to be accessed by the terminal equipment and a low-layer failure occurs, the terminal equipment sets the candidate cell in the non-forbidden state to be in the forbidden state again, and resets the second timer and the third timer.
Optionally, if it is detected that the terminal device attempts to access the candidate cell in the non-forbidden state and a low-layer failure occurs, the terminal device resets the candidate cell in the non-forbidden state to the forbidden state, and resets the second timer and the third timer, which may include: if detecting that one or more low-layer failures occur when the terminal equipment attempts to access the candidate cell in the non-forbidden state, the terminal equipment sets the candidate cell in the non-forbidden state to the forbidden state again, and resets the second timer and the third timer.
For example, if T2 times out, T3 does not time out, and at this time, the terminal device fails to perform low layer failure once again in the problem cell, the bar cell is reset, and T2 and T3 are re-timed.
Mode 2: and restarting the first timer and retrying to access the candidate cell under the condition that the second timer is overtime and the third timer is overtime.
Optionally, the restarting, by the terminal device, the first timer to retry attempting to access the candidate cell may include: and the terminal equipment restarts the first timer, retries the attempt to access the candidate cell and detects the low-layer failure.
Illustratively, if T2 times out, T3 times out, and no low layer failure occurs again in the problem cell, the judgment of the problem scene is restarted. Then, the access to the problem cell can be retried, and whether the low layer failure occurs or not can be detected.
Optionally, the method further includes: and under the condition of triggering network re-searching, the terminal equipment switches the candidate cell from the forbidden state to the non-forbidden state and tries to access the candidate cell in the non-forbidden state.
Optionally, the network re-searching scenario may include: the terminal equipment is in a scene of a flight mode or a switching network mode.
Optionally, the method further includes: and if the terminal equipment switches the candidate cell in the forbidden state to the non-forbidden state, the candidate cell trying to access the non-forbidden state has low-layer failure, and the second timer is not overtime, the candidate cell in the non-forbidden state is set to the forbidden state again, and the second timer and the third timer are restarted.
Optionally, if the terminal device switches the candidate cell in the disabled state to the non-disabled state, the terminal device attempts to access the candidate cell in the non-disabled state once, and if a low layer failure occurs and the second timer is not timed out, the terminal device re-sets the candidate cell in the non-disabled state to the disabled state, and restarts the second timer and the third timer.
Illustratively, when the operation such as the flight mode or the network switching mode triggers network searching again, the terminal device is allowed to retry the network searching of the cell currently carried out by the bar once, if the network searching still has low layer failure and T2 does not time out, the bar cell is restarted, and T2 and T3 are restarted.
Optionally, the method further includes: and after the terminal equipment is restarted, clearing the information of the first timer, the second timer, the third timer, the counter and the candidate cell in the forbidden state, wherein the counter is used for counting the number of times of the low-layer failure.
For example, after the terminal device is restarted, the timers T1, T2, T3, the counter and the bar cell information are all cleared.
In the embodiment of the application, under the condition that a first timer is not overtime, if it is detected that the terminal device attempts to access a candidate cell and N times of low-layer failures occur, the candidate cell is set to a forbidden state, and a second timer is started, wherein N is a positive integer; maintaining the candidate cell in a disabled state if the second timer has not expired; switching the candidate cell from the disabled state to a non-disabled state if the second timer expires. Namely, when the SA network is not completely constructed, the problem cell or the weak coverage cell can be forbidden quickly, bad experience caused by network problems is reduced, and a user can be ensured to register a better cell quickly, so that normal service is carried out. Meanwhile, network complaints and market quit caused by SA problems can be reduced.
The counter can be shared for low layer failure, so that the weak coverage cell and the problem cell can be forbidden quickly; the parameter values mentioned in the application can be flexibly customized. The embodiment of the application can be applied to a scene during initial establishment of RRC and also can be applied to a low layer failure scene triggered in the process of reconstruction and switching, and is not particularly limited.
As shown in fig. 3, which is a schematic diagram of an embodiment of a terminal device in the embodiment of the present invention, the schematic diagram may include:
a processing module 301, configured to, if it is detected that the terminal device attempts to access a candidate cell and N times of low-layer failures occur when the first timer is not overtime, set the candidate cell in a disabled state, and start a second timer, where N is a positive integer; maintaining the candidate cell in a disabled state if the second timer has not expired; switching the candidate cell from the disabled state to a non-disabled state if the second timer expires.
Optionally, the processing module 301 is specifically configured to set the candidate cell to a disabled state, and start a second timer and a third timer, where a duration of the third timer is greater than a duration of the second timer; if the second timer is overtime and the third timer is not overtime, if the terminal equipment is detected to have low-layer failure in trying to access the candidate cell in the non-forbidden state, the candidate cell in the non-forbidden state is set to the forbidden state again, and the second timer and the third timer are reset; and restarting the first timer and retrying to access the candidate cell under the condition that the second timer is overtime and the third timer is overtime.
Optionally, the processing module 301 is specifically configured to retry to access the candidate cell in the non-forbidden state.
Optionally, the processing module 301 is further configured to switch the candidate cell from the disabled state to the non-disabled state and attempt to access the candidate cell in the non-disabled state under the condition that network re-search is triggered.
Optionally, the processing module 301 is further configured to, if the terminal device switches the candidate cell in the disabled state to the non-disabled state, and the candidate cell trying to access the non-disabled state fails to have a lower layer and the second timer is not timed out, re-set the candidate cell in the non-disabled state to the disabled state, and restart the second timer and the third timer.
Optionally, the processing module 301 is further configured to clear information of the first timer, the second timer, the third timer, a counter and the candidate cell in the disabled state after the terminal device is restarted, where the counter is used to count the number of times of the low layer failure.
Optionally, the low-level failure includes: any one of a T300 timeout, radio Link failure detection (RLF), and Random Access Channel (RACH) failure.
Optionally, the scenario to which the method is applied includes at least one of the following: RRC initial setup, reestablishment, and handover scenarios.
As shown in fig. 4, which is a schematic diagram of another embodiment of the terminal device in the embodiment of the present invention, the schematic diagram may include:
fig. 4 is a block diagram illustrating a partial structure of a mobile phone related to a terminal device provided in an embodiment of the present invention. Referring to fig. 4, the handset includes: radio Frequency (RF) circuit 410, memory 420, input unit 430, display unit 440, sensor 450, audio circuit 460, wireless fidelity (WiFi) module 470, processor 480, and power supply 490. Those skilled in the art will appreciate that the handset configuration shown in fig. 4 is not intended to be limiting and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components.
The following describes each component of the mobile phone in detail with reference to fig. 4:
the RF circuit 410 may be used for receiving and transmitting signals during information transmission and reception or during a call, and in particular, receives downlink information of a base station and then processes the received downlink information to the processor 480; in addition, the data for designing uplink is transmitted to the base station. In general, the RF circuit 410 includes, but is not limited to, an antenna, at least one Amplifier, a transceiver, a coupler, a Low Noise Amplifier (LNA), a duplexer, and the like. In addition, the RF circuitry 410 may also communicate with networks and other devices via wireless communications. The wireless communication may use any communication standard or protocol, including but not limited to Global System for Mobile communication (GSM), General Packet Radio Service (GPRS), Code Division Multiple Access (CDMA), Wideband Code Division Multiple Access (WCDMA), Long Term Evolution (LTE), email, Short Messaging Service (SMS), and the like.
The memory 420 may be used to store software programs and modules, and the processor 480 executes various functional applications and data processing of the mobile phone by operating the software programs and modules stored in the memory 420. The memory 420 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the cellular phone, and the like. Further, the memory 420 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
The input unit 430 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the cellular phone. Specifically, the input unit 430 may include a touch panel 431 and other input devices 432. The touch panel 431, also called a touch screen, may collect touch operations of a user on or near the touch panel 431 (e.g., operations of the user on or near the touch panel 431 using any suitable object or accessory such as a finger or a stylus) and drive the corresponding connection device according to a preset program. Alternatively, the touch panel 431 may include two parts of a touch detection device and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, sends the touch point coordinates to the processor 480, and receives and executes commands sent from the processor 480. In addition, the touch panel 431 may be implemented in various types, such as a resistive type, a capacitive type, an infrared ray, and a surface acoustic wave. The input unit 430 may include other input devices 432 in addition to the touch panel 431. In particular, other input devices 432 may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control keys, switch keys, etc.), a trackball, a mouse, a joystick, and the like.
The display unit 440 may be used to display information input by the user or information provided to the user and various menus of the cellular phone. The Display unit 440 may include a Display panel 441, and optionally, the Display panel 441 may be configured in the form of a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like. Further, the touch panel 431 may cover the display panel 441, and when the touch panel 431 detects a touch operation on or near the touch panel 431, the touch panel is transmitted to the processor 480 to determine the type of the touch event, and then the processor 480 provides a corresponding visual output on the display panel 441 according to the type of the touch event. Although the touch panel 431 and the display panel 441 are shown in fig. 4 as two separate components to implement the input and output functions of the mobile phone, in some embodiments, the touch panel 431 and the display panel 441 may be integrated to implement the input and output functions of the mobile phone.
The handset may also include at least one sensor 450, such as a light sensor, motion sensor, and other sensors. Specifically, the light sensor may include an ambient light sensor that adjusts the brightness of the display panel 441 according to the brightness of ambient light, and a proximity sensor that turns off the display panel 441 and/or the backlight when the mobile phone is moved to the ear. As one of the motion sensors, the accelerometer sensor can detect the magnitude of acceleration in each direction (generally, three axes), can detect the magnitude and direction of gravity when stationary, and can be used for applications of recognizing the posture of a mobile phone (such as horizontal and vertical screen switching, related games, magnetometer posture calibration), vibration recognition related functions (such as pedometer and tapping), and the like; as for other sensors such as a gyroscope, a barometer, a hygrometer, a thermometer, and an infrared sensor, which can be configured on the mobile phone, further description is omitted here.
Audio circuit 460, speaker 461, microphone 462 may provide an audio interface between the user and the cell phone. The audio circuit 460 may transmit the electrical signal converted from the received audio data to the speaker 461, and convert the electrical signal into a sound signal for output by the speaker 461; on the other hand, the microphone 462 converts the collected sound signal into an electrical signal, which is received by the audio circuit 460 and converted into audio data, which is then processed by the audio data output processor 480 and then transmitted to, for example, another cellular phone via the RF circuit 410, or output to the memory 420 for further processing.
WiFi belongs to short-distance wireless transmission technology, and the mobile phone can help a user to receive and send e-mails, browse webpages, access streaming media and the like through the WiFi module 470, and provides wireless broadband Internet access for the user. Although fig. 4 shows the WiFi module 470, it is understood that it does not belong to the essential constitution of the handset, and can be omitted entirely as needed within the scope not changing the essence of the invention.
The processor 480 is a control center of the mobile phone, connects various parts of the entire mobile phone by using various interfaces and lines, and performs various functions of the mobile phone and processes data by operating or executing software programs and/or modules stored in the memory 420 and calling data stored in the memory 420, thereby integrally monitoring the mobile phone. Optionally, processor 480 may include one or more processing units; preferably, the processor 480 may integrate an application processor, which mainly handles operating systems, user interfaces, application programs, etc., and a modem processor, which mainly handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into processor 480.
The handset also includes a power supply 490 (e.g., a battery) for powering the various components, which may preferably be logically connected to the processor 480 via a power management system, so that the power management system may perform functions such as managing charging, discharging, and power consumption.
Although not shown, the mobile phone may further include a camera, a bluetooth module, etc., which are not described herein.
In this embodiment of the present invention, the processor 480 is configured to, if it is detected that the terminal device attempts to access the candidate cell and has N times of low-layer failures, set the candidate cell in a disabled state and start a second timer when the first timer is not overtime, where N is a positive integer; maintaining the candidate cell in a disabled state if the second timer has not expired; switching the candidate cell from the disabled state to a non-disabled state if the second timer expires.
Optionally, the processor 480 is specifically configured to set the candidate cell to a disabled state, and start a second timer and a third timer, where a duration of the third timer is greater than a duration of the second timer; if the second timer is overtime and the third timer is not overtime, if the terminal equipment is detected to have low-layer failure in trying to access the candidate cell in the non-forbidden state, the candidate cell in the non-forbidden state is set to the forbidden state again, and the second timer and the third timer are reset; and restarting the first timer and retrying to access the candidate cell under the condition that the second timer is overtime and the third timer is overtime.
Optionally, the processor 480 is specifically configured to retry to access the candidate cell in the non-forbidden state.
Optionally, the processor 480 is further configured to switch the candidate cell from the disabled state to the non-disabled state and attempt to access the candidate cell in the non-disabled state under the condition that network re-search is triggered.
Optionally, the processor 480 is further configured to, if the terminal device switches the candidate cell in the disabled state to the non-disabled state, and the candidate cell trying to access the non-disabled state fails to have a lower layer and the second timer is not timed out, re-set the candidate cell in the non-disabled state to the disabled state, and restart the second timer and the third timer.
Optionally, the processor 480 is further configured to clear information of the first timer, the second timer, the third timer, a counter and the candidate cell in the disabled state after the terminal device is restarted, where the counter is configured to count the number of times of the low layer failure.
Optionally, the low-level failure includes: any one of a T300 timeout, radio Link failure detection (RLF), and Random Access Channel (RACH) failure.
Optionally, the scenario to which the method is applied includes at least one of the following: RRC initial setup, reestablishment, and handover scenarios.
In the above embodiments, the implementation may be wholly or partially realized by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product.
The computer program product includes one or more computer instructions. When loaded and executed on a computer, cause the processes or functions described in accordance with the embodiments of the invention to occur, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored on a computer readable storage medium or transmitted from one computer readable storage medium to another, for example, from one website, computer, server, or data center to another website, computer, server, or data center via wire (e.g., coaxial cable, fiber optic, Digital Subscriber Line (DSL)) or wireless (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that a computer can store or a data storage device, such as a server, a data center, etc., that is integrated with one or more available media. The usable medium may be a magnetic medium (e.g., floppy Disk, hard Disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., Solid State Disk (SSD)), among others.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the embodiments provided in the present invention, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present invention, and not for limiting the same; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (11)

1. A method for weak coverage of independent networking is applied to terminal equipment, and is characterized by comprising the following steps:
under the condition that a first timer is not overtime, if N times of low-layer failures of the terminal equipment trying to access a candidate cell are detected, setting the candidate cell in a forbidden state, and starting a second timer, wherein N is a positive integer;
maintaining the candidate cell in a disabled state if the second timer has not expired;
switching the candidate cell from the disabled state to a non-disabled state if the second timer expires.
2. The method of claim 1, wherein setting the candidate cell to a disabled state and starting a second timer comprises:
setting the candidate cell to be in a forbidden state, and starting a second timer and a third timer, wherein the duration of the third timer is greater than that of the second timer;
the switching the candidate cell from the disabled state to a non-disabled state if the second timer expires further comprises:
if the second timer is overtime and the third timer is not overtime, if the terminal equipment is detected to have low-layer failure in trying to access the candidate cell in the non-forbidden state, the candidate cell in the non-forbidden state is set to the forbidden state again, and the second timer and the third timer are reset;
and restarting the first timer and retrying to access the candidate cell under the condition that the second timer is overtime and the third timer is overtime.
3. The method according to claim 1 or 2, wherein after the terminal device switches the candidate cell from the disabled state to a non-disabled state, the method further comprises:
and the terminal equipment retries to access the candidate cell in the non-forbidden state.
4. The method according to claim 1 or 2, characterized in that the method further comprises:
and under the condition of triggering network re-searching, the terminal equipment switches the candidate cell from the forbidden state to the non-forbidden state and tries to access the candidate cell in the non-forbidden state.
5. The method of claim 4, further comprising:
and if the terminal equipment switches the candidate cell in the forbidden state to the non-forbidden state, the candidate cell trying to access the non-forbidden state has low-layer failure, and the second timer is not overtime, the candidate cell in the non-forbidden state is set to the forbidden state again, and the second timer and the third timer are restarted.
6. The method according to claim 1 or 2, characterized in that the method further comprises:
and after the terminal equipment is restarted, clearing the first timer, the second timer, the third timer, a counter and the information of the candidate cells in the forbidden state, wherein the counter is used for counting the times of the low-layer failure.
7. The method of claim 1 or 2, wherein the low-level failure comprises: any one of a T300 timeout, radio Link failure detection (RLF), and Random Access Channel (RACH) failure.
8. The method according to claim 1 or 2, characterized in that the scenario in which the method is applied comprises at least one of the following: RRC initial setup, reestablishment, and handover scenarios.
9. A terminal device, comprising:
the processing module is used for setting the candidate cell in a forbidden state and starting a second timer if detecting that the terminal equipment attempts to access the candidate cell and N times of low-layer failures occur under the condition that the first timer is not overtime, wherein N is a positive integer; maintaining the candidate cell in a disabled state if the second timer has not expired; switching the candidate cell from the disabled state to a non-disabled state if the second timer expires.
10. Terminal equipment, characterized by, includes:
a memory storing executable program code;
a processor coupled with the memory;
the processor calls the executable program code stored in the memory for performing the method of any one of claims 1-8.
11. A computer-readable storage medium comprising instructions that, when executed on a processor, cause the processor to perform the method of any one of claims 1-8.
CN202110276316.3A 2021-03-15 2021-03-15 Method, terminal device and storage medium for independent networking weak coverage Pending CN113038513A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202110276316.3A CN113038513A (en) 2021-03-15 2021-03-15 Method, terminal device and storage medium for independent networking weak coverage
PCT/CN2022/070139 WO2022193798A1 (en) 2021-03-15 2022-01-04 Method for standalone weak coverage, and terminal device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110276316.3A CN113038513A (en) 2021-03-15 2021-03-15 Method, terminal device and storage medium for independent networking weak coverage

Publications (1)

Publication Number Publication Date
CN113038513A true CN113038513A (en) 2021-06-25

Family

ID=76468826

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110276316.3A Pending CN113038513A (en) 2021-03-15 2021-03-15 Method, terminal device and storage medium for independent networking weak coverage

Country Status (2)

Country Link
CN (1) CN113038513A (en)
WO (1) WO2022193798A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022193798A1 (en) * 2021-03-15 2022-09-22 Oppo广东移动通信有限公司 Method for standalone weak coverage, and terminal device and storage medium
WO2023011226A1 (en) * 2021-08-06 2023-02-09 中国电信股份有限公司 Network access mode switching method and apparatus, and storage medium and electronic device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108632916A (en) * 2017-03-20 2018-10-09 南昌黑鲨科技有限公司 Processing method and processing device after multiple random access failure
CN111836317A (en) * 2019-08-14 2020-10-27 维沃移动通信有限公司 Reporting method of state information, terminal and network equipment
US20200383027A1 (en) * 2019-05-31 2020-12-03 Apple Inc. Cellular Enhancements for Application Mobility
CN112203361A (en) * 2020-10-12 2021-01-08 Oppo(重庆)智能科技有限公司 Method and device for processing radio link failure, terminal and storage medium

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11051211B2 (en) * 2017-04-13 2021-06-29 Samsung Electronics Co., Ltd Method and system for managing 4G-5G inter-network switching
CN107682909B (en) * 2017-11-22 2020-06-26 Oppo广东移动通信有限公司 Control method and device for connecting access point
CN113038513A (en) * 2021-03-15 2021-06-25 Oppo广东移动通信有限公司 Method, terminal device and storage medium for independent networking weak coverage

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108632916A (en) * 2017-03-20 2018-10-09 南昌黑鲨科技有限公司 Processing method and processing device after multiple random access failure
US20200383027A1 (en) * 2019-05-31 2020-12-03 Apple Inc. Cellular Enhancements for Application Mobility
CN111836317A (en) * 2019-08-14 2020-10-27 维沃移动通信有限公司 Reporting method of state information, terminal and network equipment
CN112203361A (en) * 2020-10-12 2021-01-08 Oppo(重庆)智能科技有限公司 Method and device for processing radio link failure, terminal and storage medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022193798A1 (en) * 2021-03-15 2022-09-22 Oppo广东移动通信有限公司 Method for standalone weak coverage, and terminal device and storage medium
WO2023011226A1 (en) * 2021-08-06 2023-02-09 中国电信股份有限公司 Network access mode switching method and apparatus, and storage medium and electronic device

Also Published As

Publication number Publication date
WO2022193798A1 (en) 2022-09-22

Similar Documents

Publication Publication Date Title
CN111385787B (en) State switching method, mobile terminal, network equipment and communication system
US20180158225A1 (en) Method and apparatus for switching real-time image in instant messaging
CN110198545A (en) A kind of secondary cell group adding method, terminal device and host node
CN103501386B (en) The method of automatic call and terminal
CN106604314B (en) WiFi roaming network access method and terminal equipment
CN110505638B (en) Measurement control method, terminal and network side equipment
US11076354B2 (en) Cell handover method and terminal device
CN113225755B (en) Method for optimizing inter-system transformation, terminal device and storage medium
WO2023060988A1 (en) Reestablishment method in communication abnormality, terminal device, and storage medium
WO2022193798A1 (en) Method for standalone weak coverage, and terminal device and storage medium
CN110022567A (en) A kind of data transmission method and user terminal
KR20210040112A (en) Measurement method, terminal and network side equipment
CN111818593A (en) Network switching method and terminal
CN111885748B (en) Method for releasing RRC connection, terminal equipment and network equipment
CN110677897A (en) Network search control method, terminal and computer readable storage medium
US20230224798A1 (en) Wireless communication method, terminal device, and network device
CN104854952B (en) A kind of control method and equipment of RRC connection
WO2022252716A1 (en) Method for acquiring timer parameters, terminal device, and storage medium
CN110891262A (en) Bluetooth pairing method, system and terminal equipment
CN112954823B (en) Method for reestablishing data connection, terminal equipment and storage medium
CN110913454A (en) Cell determination method and terminal equipment
CN111615158A (en) Updating method, reconstruction request processing method, terminal and network equipment
CN113596872B (en) Configuration method of radio resource control connection, terminal equipment and network equipment
CN114158100B (en) Network switching method and device, mobile terminal and readable storage medium
CN113596907A (en) Call processing method, terminal device and computer-readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination