CN113613294A - Network access method, device, terminal equipment and storage medium - Google Patents
Network access method, device, terminal equipment and storage medium Download PDFInfo
- Publication number
- CN113613294A CN113613294A CN202110856799.4A CN202110856799A CN113613294A CN 113613294 A CN113613294 A CN 113613294A CN 202110856799 A CN202110856799 A CN 202110856799A CN 113613294 A CN113613294 A CN 113613294A
- Authority
- CN
- China
- Prior art keywords
- network
- redirection
- access
- access method
- accessible
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 49
- 238000011084 recovery Methods 0.000 claims abstract description 25
- 230000006855 networking Effects 0.000 claims abstract description 15
- 238000004590 computer program Methods 0.000 claims description 9
- 230000000977 initiatory effect Effects 0.000 claims description 8
- 238000004891 communication Methods 0.000 description 10
- 238000010586 diagram Methods 0.000 description 6
- 230000008569 process Effects 0.000 description 6
- 230000006870 function Effects 0.000 description 4
- 230000005540 biological transmission Effects 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 230000001360 synchronised effect Effects 0.000 description 2
- 238000001514 detection method Methods 0.000 description 1
- 230000007774 longterm Effects 0.000 description 1
- 238000005259 measurement Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012806 monitoring device Methods 0.000 description 1
- 230000011664 signaling Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000010408 sweeping Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/08—Access restriction or access information delivery, e.g. discovery data delivery
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W36/00—Hand-off or reselection arrangements
- H04W36/0005—Control or signalling for completing the hand-off
- H04W36/0011—Control or signalling for completing the hand-off for data sessions of end-to-end connection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W36/00—Hand-off or reselection arrangements
- H04W36/14—Reselecting a network or an air interface
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/16—Discovering, processing access restriction or access information
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The application provides a network access method, a network access device, terminal equipment and a storage medium. The network access method comprises the following steps: accessing a first network, wherein the first network is a non-independent networking network; receiving a redirection message sent by a first network, wherein the redirection message is used for indicating redirection to a second network, and the second network is an independent networking network; attempting to redirect to a second network based on the redirection message; if redirection to the second network fails, a connection recovery request is initiated, and the connection recovery request is used for indicating re-access to the first network. According to the embodiment of the application, the network drop time of the terminal equipment can be reduced.
Description
Technical Field
The present application relates to the field of communications, and in particular, to a network access method, apparatus, terminal device, and storage medium.
Background
Currently, standard communication protocols (e.g. 3GPP protocols) specify that when a terminal device receives redirection information, cell redirection is performed according to the redirection message. However, due to the network configuration problem, when the terminal device receives the redirection message, the terminal device cannot redirect to the specified cell according to the redirection message, and at this time, the terminal device may try redirection many times. In the time period of trying to redirect, the terminal device and the base station are in a disconnection state, and at this time, the terminal device cannot access the network, so that a network drop situation occurs, and the network drop time is too long, which may affect user experience.
Disclosure of Invention
The embodiment of the application provides a network access method, a network access device, terminal equipment and a storage medium, so as to reduce the network drop time of the terminal equipment.
In a first aspect, an embodiment of the present application provides a network access method, where the method includes:
accessing a first network, wherein the first network is a non-independent networking network;
receiving a redirection message sent by the first network, wherein the redirection message is used for indicating redirection to a second network, and the second network is an independent networking network;
attempting to redirect to the second network based on the redirect message;
if redirection to the second network fails, initiating a connection recovery request, where the connection recovery request is used to indicate re-access to the first network.
Optionally, determining a manner of failure in redirection to the second network includes at least one of:
access parameters sent by the second network are not received within a preset time length;
and receiving access refusing information sent by the second network.
Optionally, the access parameter includes at least one of: frequency band, frequency point, physical address, area tracking code, cell identification and location area code of cell.
Optionally, before accessing the first network, the network access method further includes:
searching the second network which can be accessed, and accessing the second network;
and if the second network which can be accessed is not searched, searching the first network which can be accessed.
Optionally, the searching for the accessible second network includes:
searching an accessible second network according to historical frequency points or full frequency bands, wherein the historical frequency points are frequency points which are successfully accessed to the second network before.
Optionally, after initiating the connection recovery request, the network access method includes:
detecting whether a signal coverage area of the first network is exceeded;
if yes, searching a currently accessible network;
one of the currently accessible networks is selected and accessed.
In a second aspect, an embodiment of the present application provides a network access apparatus, including:
the access module is used for accessing a first network, and the first network is a network which is not independently networked;
a message receiving module, configured to receive a redirection message sent by the first network, where the redirection message is used to instruct redirection to a second network, and the second network is an independent networking network;
a redirection module to attempt redirection to the second network based on the redirection message;
and the connection recovery module is used for initiating a connection recovery request if redirection to the second network fails, wherein the connection recovery request is used for indicating re-access to the first network.
Optionally, the apparatus further comprises:
the first searching module is used for searching the accessible second network and accessing the second network;
the second searching module is configured to search the accessible first network if the accessible second network is not searched.
In a third aspect, an embodiment of the present application provides a terminal device, which includes a memory and a processor, where the memory stores a computer program, and the processor is configured to implement the steps of the network access method when executing the power consumption optimization program.
Fourth, an embodiment of the present application provides a storage medium storing a computer program, which when executed by a processor, implements the steps of the above-described network access method.
According to the embodiment of the application, after the terminal equipment is accessed to the first network, the redirection message sent by the first network is received, the redirection is attempted to the second network according to the redirection message, if the redirection fails, the connection recovery request is initiated, so that the terminal equipment is accessed to the first network again, and therefore the terminal equipment is immediately accessed to the first network again to recover the network connection without continuously attempting the redirection.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings needed to be used in the description of the embodiments of the present application will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art that other drawings can be obtained according to these drawings without inventive exercise.
Fig. 1 is a schematic application environment diagram of a network access method in an embodiment of the present application;
FIG. 2 is an interaction diagram of a network access method according to an embodiment of the present application
Fig. 3 is a flowchart illustrating a network access method according to an embodiment of the present application;
fig. 4 is a flowchart illustrating a network access method according to another embodiment of the present application;
fig. 5 is a flowchart illustrating a network access method according to another embodiment of the present application;
fig. 6 is a flowchart illustrating a network access method according to another embodiment of the present application;
fig. 7 is a schematic structural diagram of a network access device according to an embodiment of the present application;
fig. 8 is a schematic structural diagram of a terminal device in an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some, but not all, embodiments of the present application. In the description of the present application, it is noted that the terms "first", "second", "third", and the like are used merely for distinguishing between descriptions and are not intended to indicate or imply relative importance.
In the description of the present application, it is also to be noted that, unless otherwise explicitly specified or limited, the terms "disposed" and "connected" are to be interpreted broadly; they may be connected directly or indirectly through intervening media, or they may be interconnected between two elements. The specific meaning of the above terms in the present application can be understood in a specific case by those of ordinary skill in the art.
Fig. 1 is a schematic architecture diagram of a communication system according to an embodiment of the present application. As shown in fig. 1, the communication system may comprise a terminal device 100 and a base station 210, 220, the terminal device 100 being communicable with either the base station 210 or the base station 220.
The terminal device 100 refers to a module capable of achieving a communication function or a device including the module, the terminal device 100 may be a mobile terminal or an intelligent device, the mobile terminal may specifically be at least one of a mobile phone, a tablet computer, a notebook computer, and the like, and the intelligent device may include at least one of a portable wearable device, an intelligent household appliance, and an intelligent monitoring device, such as an intelligent watch, an intelligent refrigerator, a sweeping robot car recorder, a security camera device, and the like; the module may be any one of a 2G communication module, a 3G communication module, a 4G communication module, a 5G communication module, and an NB-IoT module.
The base stations 210, 220 are used for scheduled transmission of paging information, scheduled transmission of broadcast information, forwarding of data or signaling, etc. Base stations include, but are not limited to: devices providing Base Station functionality in a 2G Network, such as Base Transceiver Stations (BTSs) and Base Station Controllers (BSCs), devices providing Base Station functionality in a 3G Network, such as node bs (nodebs) and Radio Network Controllers (RNCs), devices providing Base Station functionality in a 4G Network, such as evolved node bs (enodebs), or devices providing Base Station functionality in a WLAN (Wireless Local Area Network), such as Access Points (APs), where Base Station 210 provides a first Network and Base Station 210 provides a second Network.
The network access method provided by the embodiment of the application can be applied to the communication system shown in fig. 1. Fig. 2 is an interaction diagram of a network access method according to an embodiment of the present application. Fig. 3 is a flowchart illustrating a network access method according to an embodiment of the present application, where an execution subject of the network access method may be a terminal device with reference to fig. 2 and 3, and the method at least includes the following steps S10 to S40:
s10: a first network is accessed, the first network being a non-independently networked network.
The first network is a wireless network, and the networking mode of the first network is a Non-independent networking, and it should be noted that the Non-independent networking is different from an SA (stand-alone) network, but not a Non-independent networking, and the first network may be one of an LTE (Long Term Evolution) network, an NSA network, a 3G network, and a 2G network.
The terminal device searches for a cell (hereinafter referred to as a first cell for convenience of description) corresponding to the first network, then accesses the first cell, and finally accesses the first network. Taking the first network as an NSA network as an example, the terminal searches an LTE cell according to a history frequency point and a full frequency band, selects an LTE cell for cell access, and registers the NSA network with the terminal device if NR measurement is configured on the LTE cell.
In one embodiment, after accessing a first cell, a terminal device acquires access parameters of the first cell, where the access parameters of the first cell include, but are not limited to, at least one of the following: frequency band, frequency point, physical address, area tracking code, cell identification and location area code of cell.
The frequency range refers to the frequency range of electromagnetic waves, for example, the working frequency range of GSM900 is 890-960 MHz; as another example, the current domestic LTE is divided into four frequency bands: the frequency ranges of the A frequency band, the D frequency band, the E frequency band and the F frequency band are 2010 MHz-2025 MHz, 2570 MHz-2620 MHz, 2320 MHz-2370 MHz (2300 MHz-2400 MHz) and 1880 MHz-1920 MHz in sequence.
The frequency points are numbers given to fixed frequencies. For example, the working frequency band of GSM900 is 890-960 MHz, the frequency intervals are all 200KHz, 125 radio frequency bands are divided from 890MHz, 890.2MHz, 890.4MHz, 890.6MHz, 890.8MHz, 891MHz … … 915MHz according to the frequency interval of 200KHz, and each band is numbered from 1, 2, 3, 4 … … 125, and the obtained frequency points are frequency points. The frequency point can be used for identifying a suitable cell selected by the terminal equipment on the frequency point,
The Physical address refers to a Physical Cell Identity (PCI) that can distinguish wireless signals of a Cell, and thus, a Physical layer of the terminal device can distinguish different cells by the PCI.
The Area tracking code tac (tracking Area code) is used for location management of the terminal device. A Cell Identity (CID) is used to identify a Cell of a base station. Location area code (location area code) of the cell.
S20: and receiving a redirection message sent by the first network, wherein the redirection message is used for indicating redirection to a second network, and the second network is an independent networking network.
The redirection message may include RRC (Radio Resource Control) connection release sent by the base station. The second network refers to the SA network, i.e. the redirect message is used to indicate a redirection to the SA network.
S30: attempting a redirection to a second network based on the redirection message.
The terminal device searches the accessible second network corresponding to the cell (for convenience of description, referred to as a second cell hereinafter) according to the redirection message, and if the accessible second cell is searched, selects the second cell to access, and then accesses the second network, at this time, the terminal device is successfully redirected.
If the terminal equipment is successfully redirected, accessing a second network; otherwise, step S50 is executed. It should be understood that, during the time period when the terminal device attempts redirection, and after redirection fails and before network connection is recovered, the terminal device and the base station are in a disconnected state, and at this time, the terminal device does not access the network, and a network drop occurs.
S40: and if the redirection fails, initiating a connection recovery request, wherein the connection recovery request is used for indicating the first network to be accessed again.
The terminal equipment initiates a connection recovery request, such as a servicerequest, to the base station of the first network, and the base station feeds back a message for agreeing to recover the connection, and the terminal equipment re-accesses the first network according to the message.
In an embodiment, the terminal device may initiate a connection recovery request to the first cell according to the access parameter of the first cell, access the first cell after the base station feeds back a message agreeing to recover the connection, and then access the first network.
According to the embodiment of the application, after the terminal equipment is accessed to the first network, the redirection message sent by the first network is received, the redirection is attempted to the second network according to the redirection message, if the redirection fails, the connection recovery request is initiated, so that the terminal equipment is accessed to the first network again, and therefore the terminal equipment is immediately accessed to the first network again to recover the network connection without continuously attempting the redirection.
In an embodiment, if the terminal device does not receive the access parameter issued by the second network within the preset time length, the terminal device fails to redirect. The access parameter refers to an access parameter of the second cell.
The access parameter includes at least one of: frequency band, frequency point, physical address, area tracking code, cell identification and location area code of cell. For the detailed description of the access parameters, reference may be made to the description of the foregoing embodiments, which are not repeated herein. It should be understood that the terminal device indicates that the terminal device is successfully redirected as long as it receives any one or more of the access parameters issued by the second network, and otherwise indicates that the terminal device is unsuccessfully redirected if one of the access parameters is not received by the terminal device.
And if the terminal equipment receives the access rejection information issued by the second network, the terminal equipment fails to be redirected. The access refusing information indicates that the second network refuses the access of the terminal equipment, and the redirection of the terminal equipment fails.
Fig. 4 and fig. 5 are schematic flowcharts of a network access method according to another embodiment of the present application. Referring to fig. 4 and 5, before accessing the first network, the method further includes steps S11 to S13.
S11: searching for a second network that is accessible.
The accessible second network refers to a second network that satisfies preset network conditions, including but not limited to signal strength, bandwidth, and time delay.
If the accessible second network is searched, S12 is executed.
S12: and accessing a second network.
The terminal equipment searches the accessible second network according to the historical frequency point or the full frequency band, preferentially searches the accessible second network, and accesses the second network after searching the accessible second network. And the historical frequency point is a frequency point which is successfully accessed to the second network before.
For example, after the terminal device is powered on or enters a new environment, the terminal device preferentially searches for a second cell with a signal strength greater than a preset value, and accesses the second cell and then accesses the second network when the second cell with the signal strength greater than the preset value is searched.
If the terminal device does not search the accessible second network according to the historical frequency point and/or the full-band search, it may be that there is no accessible second network in the current environment, and at this time, the terminal device executes S13.
S13: an accessible first network is searched.
The accessible first network refers to a first network satisfying a preset network condition. The terminal device searches for an accessible first network, and then executes step S10.
On the basis of the embodiment described in the foregoing fig. 3, in this embodiment, an accessible second network is preferentially searched, and the second network is accessed after the accessible second network is searched, if the accessible second network is not searched, an accessible first network is searched, and the first network is accessed, and by setting a network search order of the terminal device, the terminal device can preferentially access the second network, and because the network search order is set, it can be determined that there is no accessible second network in the current environment, so that the terminal device immediately re-accesses the first network after redirection failure.
In addition, in the embodiment shown in fig. 4, if the accessible second network is not searched, current network environment information is recorded, where the network environment information is used to mark that no second network exists in the current environment, and the network environment information may be stored in the terminal device. The network environment information may include a Location Area Code (LAC) and identification information for identifying that there is no second network in the current environment. The location area code refers to a location area code of a cell corresponding to the first network, and by combining the location area code and the identification information, it can be determined that no second network exists in an area corresponding to the first network to which the terminal device is accessed.
When the terminal equipment executes redirection operation once according to the redirection message and redirection fails, whether network environment information is stored in the terminal equipment is inquired, if the network environment information is stored, the second network does not exist in the current network environment, a connection recovery request is sent to a base station corresponding to the second network, and a message which is fed back by the base station corresponding to the second network and agrees to recovery connection is received, so that the first network is accessed again.
Cell switching, that is, switching from a first cell to a second cell, may occur during redirection, and after redirection fails, if the position of the terminal device changes, so that the terminal device exceeds the coverage area of the first cell, the terminal device may exceed the signal coverage area of the first network, and at this time, the terminal device may not be re-accessed to the first network, and a network drop situation occurs. In view of the above, embodiments of the present application further provide a network access method. Referring to fig. 6, after initiating the resume connection request, the method further includes S51 through S53.
S51: it is detected whether a signal coverage area of the first network is exceeded.
The signal coverage area of the first network may refer to a signal coverage area of a first cell to which the terminal device in the first network is originally connected, or may refer to signal coverage areas of all first cells in the first network in a broad sense.
If the terminal device exceeds the signal coverage area of the first network, S52 is executed, and if the terminal device does not exceed the signal coverage area of the first network, S54 is executed.
S52: a currently accessible network is searched.
The currently accessible network may be one of an LTE network, an NSA network, a 3G network, and a 2G network.
S53: one of the currently accessible networks is selected and accessed.
According to the embodiment, the accessible network is searched again after the terminal equipment exceeds the signal coverage range of the first network, so that the condition of network drop caused by the fact that the terminal equipment exceeds the signal coverage range of the first network can be reduced.
S54: the first network is re-accessed.
And re-accessing the first network according to the connection recovery request.
It should be understood that, the sequence numbers of the steps in the foregoing embodiments do not mean the execution sequence, and the execution sequence of the processes should be determined by the functions and the inherent logic of the processes, for example, in some scenarios, the processes may be executed first by S20 and then by S10, and should not limit the implementation processes of the embodiments of the present application in any way.
An embodiment of the present application provides a cell redirection apparatus, as shown in fig. 7, the apparatus includes:
the access module 10 is configured to access a first network, where the first network is a non-independent networking network;
the message receiving module 20 is configured to receive a redirection message sent by a first network, where the redirection message is used to instruct redirection to a second network, and the second network is an independent networking network;
a redirection module 30 for attempting redirection to a second network based on the redirection message;
and the connection recovery module 40 is configured to initiate a connection recovery request if redirection to the second network fails, where the connection recovery request is used to indicate re-access to the first network.
In an embodiment, the cell redirection apparatus further includes:
the detection unit is used for detecting whether the terminal equipment exceeds a signal coverage area of the first cell;
the search unit is used for responding to the situation that the terminal equipment exceeds the signal coverage area of the first cell, and then the terminal equipment searches the cell which can be accessed currently;
and the second access unit is used for selecting one cell from the currently accessible cells to access.
For specific limitations of the cell redirection apparatus, reference may be made to the above limitations of the network access method, which is not described herein again. The modules in the cell redirection apparatus may be implemented in whole or in part by software, hardware, and a combination thereof. The modules can be embedded in a hardware form or independent of a processor in the terminal device, and can also be stored in a memory in the terminal device in a software form, so that the processor can call and execute operations corresponding to the modules.
In one embodiment, a terminal device is provided, as shown in fig. 8, and includes a memory, a processor, and a computer program stored in the memory and executable on the processor, and the processor implements the cell redirection steps described above when executing the computer program.
In one embodiment, a computer readable storage medium is provided, having stored thereon a computer program, which when executed by a processor, performs the steps of the above-described network access method.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in the embodiments provided herein may include non-volatile and/or volatile memory, among others. Non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), Synchronous Link DRAM (SLDRAM), Rambus Direct RAM (RDRAM), direct bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM).
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-mentioned division of the functional units and modules is illustrated, and in practical applications, the above-mentioned function distribution may be performed by different functional units and modules according to needs, that is, the internal structure of the apparatus is divided into different functional units or modules to perform all or part of the above-mentioned functions.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions in the embodiments of the present application.
Claims (10)
1. A method for network access, the method comprising:
accessing a first network, wherein the first network is a non-independent networking network;
receiving a redirection message sent by the first network, wherein the redirection message is used for indicating redirection to a second network, and the second network is an independent networking network;
attempting to redirect to the second network based on the redirect message;
if redirection to the second network fails, initiating a connection recovery request, where the connection recovery request is used to indicate re-access to the first network.
2. The network access method of claim 1, wherein determining the manner in which redirection to the second network fails comprises at least one of:
access parameters sent by the second network are not received within a preset time length;
and receiving access refusing information sent by the second network.
3. The network access method of claim 2, wherein the access parameters include at least one of: frequency band, frequency point, physical address, area tracking code, cell identification and location area code of cell.
4. The network access method of claim 1, wherein prior to accessing the first network, the network access method further comprises:
searching the second network which can be accessed, and accessing the second network;
and if the second network which can be accessed is not searched, searching the first network which can be accessed.
5. The network access method of claim 4, wherein the searching for the second network accessible comprises:
searching an accessible second network according to historical frequency points or full frequency bands, wherein the historical frequency points are frequency points which are successfully accessed to the second network before.
6. The network access method of any of claims 1 to 5, wherein after the initiating the resume connection request, the network access method comprises:
detecting whether a signal coverage area of the first network is exceeded;
if yes, searching a currently accessible network;
one of the currently accessible networks is selected and accessed.
7. A network access apparatus, the apparatus comprising:
the access module is used for accessing a first network, and the first network is a network which is not independently networked;
a message receiving module, configured to receive a redirection message sent by the first network, where the redirection message is used to instruct redirection to a second network, and the second network is an independent networking network;
a redirection module to attempt redirection to the second network based on the redirection message;
and the connection recovery module is used for initiating a connection recovery request if redirection to the second network fails, wherein the connection recovery request is used for indicating re-access to the first network.
8. The network access method of claim 7, wherein the apparatus further comprises:
the first searching module is used for searching the accessible second network and accessing the second network;
the second searching module is configured to search the accessible first network if the accessible second network is not searched.
9. A terminal device comprising a memory and a processor, wherein the memory has stored therein a computer program for implementing the steps of the network access method according to any one of claims 1 to 6 when executing the power consumption optimization program.
10. A storage medium storing a computer program, wherein the computer program, when executed by a processor, performs the steps of the network access method according to any one of claims 1 to 6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110856799.4A CN113613294A (en) | 2021-07-28 | 2021-07-28 | Network access method, device, terminal equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110856799.4A CN113613294A (en) | 2021-07-28 | 2021-07-28 | Network access method, device, terminal equipment and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113613294A true CN113613294A (en) | 2021-11-05 |
Family
ID=78305766
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110856799.4A Pending CN113613294A (en) | 2021-07-28 | 2021-07-28 | Network access method, device, terminal equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113613294A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115119283A (en) * | 2022-06-10 | 2022-09-27 | 京信网络系统股份有限公司 | Access method and device of wireless communication equipment, communication equipment and medium |
WO2024108760A1 (en) * | 2022-11-23 | 2024-05-30 | 荣耀终端有限公司 | Method and apparatus for avoiding service failure |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103209445A (en) * | 2012-01-17 | 2013-07-17 | 中兴通讯股份有限公司 | Method, device and system for redirection |
CN103384396A (en) * | 2012-05-04 | 2013-11-06 | 中兴通讯股份有限公司 | Method, device and system for redirecting mobile terminal to target network |
CN111107599A (en) * | 2019-12-30 | 2020-05-05 | 展讯通信(上海)有限公司 | Information transmission method, device, equipment and storage medium |
CN111436071A (en) * | 2019-01-14 | 2020-07-21 | 中国移动通信有限公司研究院 | Network selection method, device, related equipment and storage medium |
CN112423351A (en) * | 2020-12-08 | 2021-02-26 | 中国联合网络通信集团有限公司 | Network mode determination method and device |
CN112703767A (en) * | 2018-08-09 | 2021-04-23 | 高通股份有限公司 | Inter-system switching between independent mode and dependent mode |
CN113170385A (en) * | 2019-03-22 | 2021-07-23 | 华为技术有限公司 | Method and device for searching cell |
-
2021
- 2021-07-28 CN CN202110856799.4A patent/CN113613294A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103209445A (en) * | 2012-01-17 | 2013-07-17 | 中兴通讯股份有限公司 | Method, device and system for redirection |
CN103384396A (en) * | 2012-05-04 | 2013-11-06 | 中兴通讯股份有限公司 | Method, device and system for redirecting mobile terminal to target network |
CN112703767A (en) * | 2018-08-09 | 2021-04-23 | 高通股份有限公司 | Inter-system switching between independent mode and dependent mode |
CN111436071A (en) * | 2019-01-14 | 2020-07-21 | 中国移动通信有限公司研究院 | Network selection method, device, related equipment and storage medium |
CN113170385A (en) * | 2019-03-22 | 2021-07-23 | 华为技术有限公司 | Method and device for searching cell |
CN111107599A (en) * | 2019-12-30 | 2020-05-05 | 展讯通信(上海)有限公司 | Information transmission method, device, equipment and storage medium |
CN112423351A (en) * | 2020-12-08 | 2021-02-26 | 中国联合网络通信集团有限公司 | Network mode determination method and device |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115119283A (en) * | 2022-06-10 | 2022-09-27 | 京信网络系统股份有限公司 | Access method and device of wireless communication equipment, communication equipment and medium |
CN115119283B (en) * | 2022-06-10 | 2023-08-29 | 京信网络系统股份有限公司 | Access method and device of wireless communication equipment, communication equipment and medium |
WO2024108760A1 (en) * | 2022-11-23 | 2024-05-30 | 荣耀终端有限公司 | Method and apparatus for avoiding service failure |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20190313264A1 (en) | Support For Beam Failure Recovery On Secondary Cell In Mobile Communications | |
CN110677900B (en) | Paging processing method and related device | |
CN110859011B (en) | Communication method and related equipment | |
US20200288428A1 (en) | Location Information Reporting Method and Apparatus | |
CN102934513B (en) | Multi-card multi-standby terminal, synchronization method and device thereof | |
CN102421130B (en) | Multi-card multimode terminal as well as Inter-RAT cell reselection method and device | |
CN110636593B (en) | Connection mode control method, terminal and storage medium | |
US9392536B2 (en) | Systems and methods for cell selection and reselection by improving system information reading procedure | |
CN107333311B (en) | Method for preventing LTE terminal from repeatedly initiating tracking area updating process in idle state | |
EP3706474B1 (en) | Method for selecting cell, terminal device, and network device | |
US10587986B2 (en) | Method for locating idle-state user equipment and apparatus | |
CN113810937B (en) | Method, device, storage medium and chip for processing network registration exception | |
CN113613294A (en) | Network access method, device, terminal equipment and storage medium | |
WO2021003612A1 (en) | Mobility management method and apparatus, and terminal | |
CN106792947B (en) | RRC connection reestablishment method and base station | |
EP3120619B1 (en) | Method and wireless communication device for idle mode mobility management | |
EP2525599B1 (en) | Method and device for obtaining system information of cell | |
CN114245484A (en) | RRC connection recovery processing method and device, electronic equipment and storage medium | |
CN109963314B (en) | Method for realizing inclined base station in LTE (Long term evolution) system, communication system and source base station | |
JP6279419B2 (en) | User device and cell search method | |
US11546949B2 (en) | Paging processing method, network device, user equipment, and computer storage medium | |
EP4054224B1 (en) | Pseudo base station recognition method and apparatus, terminal device and network device | |
WO2024096800A1 (en) | Counting random access attempts | |
CN114071498A (en) | Voice service bearing method and device, computing equipment and storage medium | |
WO2023033689A1 (en) | Methods and network nodes for verifying cell relations in a wireless communication network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |