CN114698051A - Network access triggering method and device and network side equipment - Google Patents

Network access triggering method and device and network side equipment Download PDF

Info

Publication number
CN114698051A
CN114698051A CN202011602990.8A CN202011602990A CN114698051A CN 114698051 A CN114698051 A CN 114698051A CN 202011602990 A CN202011602990 A CN 202011602990A CN 114698051 A CN114698051 A CN 114698051A
Authority
CN
China
Prior art keywords
network
terminal
duration
timer
target terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011602990.8A
Other languages
Chinese (zh)
Other versions
CN114698051B (en
Inventor
韩鲁峰
康艳超
王文
张鹏飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN202011602990.8A priority Critical patent/CN114698051B/en
Priority to PCT/CN2021/141697 priority patent/WO2022143539A1/en
Publication of CN114698051A publication Critical patent/CN114698051A/en
Application granted granted Critical
Publication of CN114698051B publication Critical patent/CN114698051B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions
    • H04W48/06Access restriction performed under specific conditions based on traffic conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/18Selecting a network or a communication service

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application discloses a network access triggering method, a network access triggering device and network side equipment, and belongs to the technical field of wireless communication. The network access triggering method is applied to a first network, and comprises the following steps: determining that a target terminal needs to access a second network in the process that the target terminal receives service from the first network; starting a first timer corresponding to a target terminal, wherein the duration of the first timer is not completely the same for a plurality of different terminals; and triggering the target terminal to attempt to access the second network under the condition that the first timer is overtime.

Description

Network access triggering method and device and network side equipment
Technical Field
The application belongs to the technical field of wireless communication, and particularly relates to a network access triggering method, a network access triggering device and network side equipment.
Background
In the prior art, when a first network may fail to provide normal service when some disaster event (disaster) occurs, a terminal or User Equipment (UE) in the first network will attempt to access at a second network.
After the Disaster of the first network is over, the Inbound roamers (disasser Inbound roamers) should perform network reselection, and the terminal accessing the second network due to the Disaster of the first network will try to access the first network. That is, when the disaster condition is no longer applicable, all UEs of a Public Land Mobile Network (PLMN) that were previously in a disaster state (currently served by another PLMN and currently in 5G Mobility Management Idle (5 GMM-Idle) mode) will perform PLMN reselection and return to the PLMN where the disaster condition occurred previously.
As can be seen, in the prior art, a large number of first network UEs simultaneously access a second network due to a disaster (disaster) of the first network, which may cause congestion of the second network. Or, after a large amount of first network UEs access the second network due to a disaster of the first network, the first network recovers to be normal, and congestion of the first network may be caused when the large amount of first network UEs return to the first network.
Disclosure of Invention
Embodiments of the present application provide a method and an apparatus for triggering network access, and a network side device, which can solve a problem of congestion of a second network caused when a large number of UEs receiving services from a first network change to the second network.
In a first aspect, a method for triggering network access is provided, where the method is applied to a first network, and the method includes: determining that a target terminal needs to access a second network in the process of receiving service from the first network by the target terminal; starting a first timer corresponding to a target terminal, wherein the duration of the first timer is not completely the same for a plurality of different terminals; and triggering the target terminal to attempt to access the second network under the condition that the first timer is overtime.
In a second aspect, an apparatus for triggering network access is provided, the apparatus comprising: the determining module is used for determining that the target terminal needs to be accessed to a second network in the process that the target terminal receives the service from the first network; the starting module is used for starting a first timer corresponding to the target terminal, wherein the time lengths of the first timers corresponding to a plurality of different terminals are not completely the same; and the triggering module is used for triggering the target terminal to try to access the second network under the condition that the first timer is overtime.
In a third aspect, a network side device is provided, which includes a processor, a memory, and a program or instructions stored on the memory and executable on the processor, and when executed by the processor, the program or instructions implement the steps of the method according to the first aspect.
In a fourth aspect, a readable storage medium is provided, on which a program or instructions are stored, which when executed by a processor, implement the steps of the method according to the first aspect.
In a fifth aspect, a chip is provided, where the chip includes a processor and a communication interface, where the communication interface is coupled to the processor, and the processor is configured to execute a program or instructions of a network-side device to implement the steps of the method according to the first aspect.
In a sixth aspect, a computer program product is provided, comprising a processor, a memory, and a program or instructions stored on the memory and executable on the processor, which when executed by the processor, implements the steps of the method according to the first aspect.
In the embodiment of the application, in the process that a target terminal receives a service from a first network, if the first network determines that the target terminal needs to access a second network, a first network device starts a first timer, wherein for a plurality of different target terminals, the durations of the first timer are not completely the same; and then triggering the target terminal to try to access the second network when the first timer is timed out. Therefore, the problem that a large number of target terminals simultaneously try to access the second network to cause congestion of the second network can be avoided.
Drawings
Fig. 1 shows a schematic diagram of a wireless communication system to which embodiments of the present application are applicable;
fig. 2 is a flowchart illustrating a triggering method of a network access method according to an embodiment of the present application;
fig. 3 is a schematic flowchart illustrating another triggering method of a network access method according to an embodiment of the present application;
fig. 4 is a schematic flowchart illustrating a triggering method of a network access method according to an embodiment of the present application;
fig. 5 is a schematic flowchart illustrating a triggering method of a network access method according to an embodiment of the present application;
fig. 6 is a schematic structural diagram illustrating a triggering apparatus of a network access method according to an embodiment of the present application;
fig. 7 is a schematic structural diagram of a communication device provided in an embodiment of the present application;
fig. 8 shows a hardware structure diagram of a network-side device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some, but not all, embodiments of the present application. All other embodiments that can be derived from the embodiments given herein by a person of ordinary skill in the art are intended to be within the scope of the present disclosure.
The terms first, second and the like in the description and in the claims of the present application are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It should be understood that the data so used are interchangeable under appropriate circumstances such that embodiments of the application can be practiced in sequences other than those illustrated or described herein, and the terms "first" and "second" used herein generally do not denote any order, nor do they denote any order, for example, the first object may be one or more. In addition, "and/or" in the specification and the claims means at least one of connected objects, and a character "/" generally means that a preceding and succeeding related objects are in an "or" relationship.
It is noted that the technology described in the embodiments of the present application is not limited to Long Term Evolution (LTE)/LTE Evolution (LTE-Advanced, LTE-a)The system may also be used in other wireless communication systems, such as Code Division Multiple Access (CDMA), Time Division Multiple Access (TDMA), Frequency Division Multiple Access (FDMA), Orthogonal Frequency Division Multiple Access (OFDMA), Single-carrier Frequency-Division Multiple Access (SC-FDMA), and other systems. The terms "system" and "network" in the embodiments of the present application are often used interchangeably, and the described techniques can be used for both the above-mentioned systems and radio technologies, as well as for other systems and radio technologies. The following description describes a New Radio (NR) system for purposes of example, and NR terminology is used in much of the description below, but the techniques may also be applied to applications other than NR system applications, such as generation 6 (6)thGeneration, 6G) communication system.
Fig. 1 shows a schematic diagram of a wireless communication system to which embodiments of the present application are applicable. The wireless communication system includes a terminal 11 and a network-side device 12. Wherein, the terminal 11 may also be called as a terminal Device or a User Equipment (UE), the terminal 11 may be a Mobile phone, a Tablet Personal Computer (Tablet Personal Computer), a Laptop Computer (Laptop Computer) or a notebook Computer, a Personal Digital Assistant (PDA), a palmtop Computer, a netbook, a super-Mobile Personal Computer (UMPC), a Mobile Internet Device (MID), a Wearable Device (Wearable Device) or a vehicle-mounted Device (VUE), a pedestrian terminal (PUE), and other terminal side devices, the Wearable Device includes: bracelets, earphones, glasses and the like. It should be noted that the embodiment of the present application does not limit the specific type of the terminal 11. The network-side device 12 may be a Base Station or a core network, where the Base Station may be referred to as a node B, an evolved node B, an access point, a Base Transceiver Station (BTS), a radio Base Station, a radio Transceiver, a Basic Service Set (BSS), an Extended Service Set (ESS), a node B, an evolved node B (eNB), a home node B, a home evolved node B, a WLAN access point, a WiFi node, a Transmit Receive Point (TRP), or some other suitable term in the field, as long as the same technical effect is achieved, the Base Station is not limited to a specific technical vocabulary, and it should be noted that, in the embodiment of the present application, only the Base Station in the NR system is taken as an example, but a specific type of the Base Station is not limited.
The following describes in detail a network access triggering scheme provided in the embodiments of the present application through specific embodiments and application scenarios thereof with reference to the accompanying drawings.
Fig. 2 shows a flowchart of a method for triggering network access in an embodiment of the present application, where the method 200 may be performed by a first network. In other words, the method may be performed by software or hardware installed on a network side device (e.g., a base station) of the first network. As shown in fig. 2, the method may include the following steps.
S210, in the process that the target terminal receives the service from the first network, the target terminal is determined to need to be accessed to a second network.
In the embodiment of the application, when the target terminal is normally served by the first network, and the first network finds that the second network is available, the target terminal is determined to need to access the second network.
In one possible implementation, the determining, by the first network, that the target terminal needs to access the second network may include: the first network is found to begin to disaster and the second network can provide services normally. For example, when the UE is in the connected state, the first network finds that the first network is beginning to suffer a disaster, and may not be able to provide normal services, while the second network is able to provide normal services. For example, some network elements of the first network may have a disaster, but other network elements are still available, and the available network elements may send a disaster notification to the UE.
In another possible implementation manner, the determining, by the first network, that the target terminal needs to access the second network may include: and determining that the second network is recovered to be normal, wherein the target terminal receives service from the second network before the second network is in disaster, and accesses the first network after the second network is in disaster. For example, when the UE is in a connected state in the second network, the second network has a disaster, the UE attempts and accesses the first network, and after the second network recovers to normal, the first network determines that the second network recovers, and all UEs in the second network that were previously in the disaster state should perform network reselection, that is, all UEs in the second network that were previously in the disaster state need to access the second network.
S212, starting a first timer corresponding to the target terminal, wherein the time lengths of the first timers corresponding to a plurality of different terminals are not completely the same.
In this embodiment, each of the terminals corresponds to a first timer, and the durations of the first timers corresponding to some terminals in the durations of the first timers are different, or the durations of the first timers corresponding to all terminals in the durations of the first timers are different from each other.
S214, triggering the target terminal to attempt to access the second network when the first timer is over time.
In the embodiment of the application, in the process that a target terminal receives a service from a first network, if the first network determines that the target terminal needs to access a second network, a first network device starts a first timer, wherein for a plurality of different target terminals, the durations of the first timer are not completely the same; and then triggering the target terminal to try to access the second network when the first timer is timed out. Therefore, the problem that a large number of target terminals simultaneously try to access the second network to cause congestion of the second network can be avoided.
In one possible implementation, the duration of the first timer may be determined according to a random value within a predetermined range. That is, in this possible implementation, before starting the first timer, the method further includes: and taking a random value in a preset range, and determining the time length of the first timer corresponding to the target terminal according to the random value. For example, the duration of the first timer may be a random value within a predetermined range, or a duration calculated according to the random value. By this possible implementation, it can be ensured that the target terminal randomly accesses the second network within a predetermined range, rather than simultaneously accessing the second network.
In a possible implementation manner, the first network may also determine the duration of the first timer according to the target parameter information. That is, in this possible implementation, before starting the first timer, the method further includes: and determining the duration of the first timer according to the target parameter information.
In the foregoing possible implementation manner, optionally, the target parameter information may include at least one of:
(1) identification information of the target terminal; for example, the duration of the first timer corresponding to the target terminal may be calculated according to the identification information of the target terminal.
(2) Identification information of the first network. For example, the ID of the first network.
(3) And the subscription information of the target terminal. For example, subscription information of the target terminal, such as priority, etc., may be used as the calculation reference information.
Optionally, the subscription information of the target terminal may include a priority of the target terminal, and when determining the duration of the first timer, the duration of the first timer corresponding to the terminal with the higher priority is shorter. For example, in the event of a disaster in the first network, a UE with a lower priority may be given a timer that is calculated to be longer to allow the UE to access the second network later and to provide normal service to the UE later.
(4) Identification information of the second network. For example, the ID of the second network.
In the foregoing possible implementation manner, optionally, when determining the duration of the first timer according to the target parameter information, the principle of determining the duration of the first timer may include: if the second network and the first network are equivalent networks, the duration of the first timer corresponding to the first terminal is less than the duration of the first timer corresponding to the second terminal, wherein the first network is a home network of the first terminal, and the first network is not the home network of the second terminal. For example, when a disaster occurs in the first network, it may be guaranteed that the home terminal of the first network is preferentially changed to the second network, and therefore, for the target terminal belonging to the first network, the duration of the corresponding first timer is less than that of the target terminal not belonging to the first network.
In practical application, whether the first network and the second network are equivalent networks and whether the target terminal is a home terminal of the first network may be determined according to the identifier of the first network, the identifier of the second network and the subscription information of the target terminal.
In the foregoing possible implementation manner, optionally, when determining the duration of the first timer according to the target parameter information, the principle of determining the duration of the first timer may include: the duration of the first timer corresponding to a first terminal is less than the duration of the first timer corresponding to a second terminal, where the second network is a forbidden (forbidden) network of the second terminal, and the second network is a non-forbidden network of the first terminal. The second network is a prohibited network of the second terminal, which means that when the second terminal attempts to access the second network, the second network rejects the access of the second terminal for reasons such as "PLMN nothing allowed" and the like. For example, the second network does not have a subscription with the first network for normal service, and if the UE attempts to access the second network in the absence of a disaster, the UE will be rejected by the reason "PLMN not allowed", that is, the second network is a forbidden network of the UE. In this possible implementation, since the second network is a prohibited network of the second terminal, an earlier attempt by the second terminal to access the second network may also be rejected, and thus may leave the first network later and enter the second network later.
In practical application, whether the second network is a forbidden network of the target terminal may be determined according to the identifier of the second network and the subscription information of the target terminal, so that the duration of the first timer corresponding to the target terminal may be determined.
In the foregoing possible implementation manner, optionally, when determining the duration of the first timer according to the target parameter information, the principle of determining the duration of the first timer may include: if the second network and the first network are equivalent networks, the duration of the first timer corresponding to the first terminal is greater than the duration of the second timer corresponding to the second terminal, wherein the second network is a home network of the first terminal, and the second network is not the home network of the second terminal. For example, for a UE belonging to the second network, when the second network is in a disaster, the UE changes to an equivalent network of the second network (i.e., the first network), and when the second network recovers, because the first network is the equivalent network of the second network, the first network may provide normal service for the UE, and the UE may leave the first network later, so that the duration of the first timer corresponding to the UE may be longer. Therefore, in this possible implementation manner, for the target terminal belonging to the second network, the duration of the corresponding first timer is greater than that of the target terminal not belonging to the second network.
In the foregoing possible implementation manner, optionally, when determining the duration of the first timer according to the target parameter information, the principle of determining the duration of the first timer may include: the duration of the first timer corresponding to a first terminal is greater than the duration of the first timer corresponding to a second terminal, wherein the first network is a forbidden network of the second terminal, and the first network is a non-forbidden network of the first terminal. In this possible implementation, since the first network is a forbidden network of the second terminal, such UEs require to leave the first network as soon as possible, and the duration of the first timer corresponding to such UEs is small. For example, the second network does not subscribe to the first network for normal service, and if the UE attempts to access the first network and is to be rejected by the cause "PLMN nothing allowed" in the absence of a disaster, it is required for such UE to leave the first network as soon as possible so that the first network stops serving it. If the second network is the home network of the UE, the UE is returned to its home network as soon as possible, so that the forbidden network (i.e. the first network) of the UE stops serving the UE as soon as possible.
Fig. 3 shows another flowchart of a method for triggering network access in the embodiment of the present application, where the method 300 may be performed by a terminal, a target network, and an original network. In other words, the method may be performed by software or hardware installed on the terminal, the network-side device of the target network, and the network-side device of the original network. As shown in fig. 3, the method may include the following steps.
S301. the UE currently receives service in the original network.
S302, the original network finds that the target network is available.
The method 200 may be used for discovering that the target network is the same as that for determining that the target terminal needs to access the second network by the first network, which may specifically refer to the related description in the method 200 and is not described herein again.
S303, the original network starts a target timer corresponding to the UE.
Wherein, the durations of the target timers corresponding to different UEs are not completely the same. The original network may determine the duration of the target timer in a manner that the first network determines the duration of the first timer corresponding to the target terminal in the method 200, which is specifically referred to the related description in the method 200 and is not described herein again.
S304, the target timer is overtime.
S305. the original network informs the UE that the target network is available, which may inform the terminal through signaling, such as a release message, or a registration reject message.
And S306, after receiving the information which is sent by the original network and is available by the target network, the UE tries to access the target network.
In the embodiment of the application, in the process that the UE receives the service from the original network, if the original network finds that the target network is available, the original network equipment starts a target timer corresponding to the UE; then, when a target timer expires, the UE is triggered to attempt to access the target network. Therefore, the problem that a large number of UEs attempt to access the target network at the same time to cause the congestion of the target network can be avoided.
Fig. 4 shows a further flowchart of a method for triggering network access in the embodiment of the present application, where the method 400 may be performed by a terminal, a first network, and a second network. In other words, the method may be performed by software or hardware installed on the terminal, the network-side device of the first network, and the network-side device of the second network. As shown in fig. 4, the method may include the following steps.
And S401, the UE normally serves in the first network.
S402, the first network is in disaster, and the second network is in normal service.
And S403, the first network starts a first timer corresponding to the UE.
For example, a part of network elements of the first network are in a disaster, but a part of the network elements are still available, and the available network elements may send a disaster notification to the UE, where the UE may be currently in, but is not limited to, a connected state.
The durations of the first timers corresponding to different UEs are not completely the same. The first network may determine the duration of the first timer in a manner that the first network determines the duration of the first timer corresponding to the target terminal in the method 200.
For example, the first network may take a random value for a different UE. Alternatively, the first network may use information of the UE (e.g., UE ID), information of the second network (i.e., target network) (e.g., second network ID), subscription information of the UE (e.g., priority), and the like as the calculation reference information.
The principle that the first network determines the duration of the first timer may include at least one of the following:
(1) a UE with a lower priority may be given a timer that is calculated to be longer to require the UE to access the second network later and to provide normal service to the UE later.
(2) The second network is Equivalent to the first network, for example, the UE belongs to the first network, and the second network is a peer-to-peer Home network (ehplmn) of the Home network of the UE, and for the UE belonging to the first network, it is required to leave the first network and enter the second network as soon as possible to obtain normal service as soon as possible, and therefore, the first timer corresponding to the UE belonging to the first network is shorter than the first timer corresponding to the UE not belonging to the first network.
(3) If the second network is a forbidden network of the UE, for example, the second network does not have a subscription with a home network (i.e., the first network) for normal service, when a disaster does not occur, if the UE attempts to access the second network and is to be rejected by the reason "PLMN not allowed", the duration of the first timer corresponding to the UE of the second network as a forbidden network is longer than the duration of the first timer corresponding to the UE of the second network as a non-forbidden network, that is, the UE of the second network as a forbidden network may leave the first network later and enter the second network.
S404, the first timer is overtime.
S405, the first network informs the UE that the first network has a disaster, and the terminal is triggered to try to access the second network;
s406. after receiving the notification message in S405, the ue attempts access at the second network.
Fig. 5 shows a further flowchart of a method 500 for triggering network access in the embodiment of the present application, where the method may be performed by a terminal, a first network, and a second network. In other words, the method may be performed by software or hardware installed on the terminal, the network-side device of the first network, and the network-side device of the second network. As shown in fig. 5, the method may include the following steps.
S501. the ue receives normal service in the second network.
In the embodiment of the present application, before S501, when the UE receives normal service in the first network, the first network has a disaster, and the UE accesses the second network.
In a specific application, the UE may access the second network by using the method described in the method 400, which is not limited to this, and the UE may also access the second network by using other methods, which is not limited in this embodiment of the present application.
S502, the first network recovers to be normal.
S503, after the second network finds that the first network which originally has the disaster recovers to be normal, the second network starts a second timer corresponding to the UE.
And the duration of the second timers corresponding to different UEs is not completely the same. The first network may determine the duration of the second timer in a manner that the first network determines the duration of the first timer corresponding to the target terminal in the method 200.
For example, the second network may take a random value for a different UE. Alternatively, the second network may use information of the UE (e.g., UE ID), information of the second network (i.e., target network) (e.g., second network ID), subscription information of the UE (e.g., priority), and the like as the calculation reference information.
Wherein the principle that the second network determines the duration of the second timer may include at least one of:
(1) the UE with lower priority may be given a longer timer to request the UE to access the first network later.
(2) If the first network is an equivalent network to the second network, for example, the second network is a home network of the UE, and the first network is an EHPLMN network of the home network of the UE, the UE belonging to the first network (for example, the first network is an HPLMN of the UE) may leave the second network later, so that the duration of the second timer corresponding to the UE belonging to the first network is longer than the duration of the second timer corresponding to the UE not belonging to the first network.
(3) The second network is the forbidden network of the UE, for example, the second network does not sign normal service with the first network, that is, if the UE is trying to access the second network and is rejected by the reason "PLMN not allowed" in case of no disaster, for such UE, for example, the first network is the HPLMN of the UE, it is required to leave the second network as soon as possible to return the UE to its home network as soon as possible so that the second network stops serving it. Therefore, the duration of the second timer corresponding to the UE in which the second network is the prohibited network is less than the duration of the second timer corresponding to the UE in which the second network is the non-prohibited network.
S504, the second timer is overtime;
s505, the second network informs the UE that the first network recovers to normal through signaling, for example, the terminal is triggered to try to access the first network through connection release signaling, registration rejection signaling and the like;
s506, after receiving the information that the first network recovers from the second network, the UE tries to access the first network.
It should be noted that, in the network access triggering method provided in the embodiment of the present application, the execution subject may be a network access triggering device, or a control module in the network access triggering device, configured to execute the network access triggering method. In the embodiment of the present application, a method for a triggering device of a network access to execute a network access is taken as an example, and a triggering device of a network access provided in the embodiment of the present application is described.
Fig. 6 is a schematic structural diagram of a triggering apparatus for network access according to an embodiment of the present application, and as shown in fig. 6, the apparatus 600 may include: a determination module 601, an initiation module 602, and a trigger module 603.
In this embodiment of the present application, the determining module 601 is configured to determine that a target terminal needs to access a second network in a process that the target terminal receives a service from the first network; a starting module 602, configured to start a first timer corresponding to the target terminal, where durations of the first timers corresponding to multiple different terminals are not completely the same; a triggering module 603, configured to trigger the target terminal to attempt to access the second network when the first timer is expired.
In this embodiment of the application, the determining module 601 determining that the target terminal needs to access the second network includes: the beginning of the first network is found to be out of disaster and the second network can provide services normally.
In this embodiment of the application, the determining module 601 determining that the target terminal needs to access the second network includes: and determining that the second network is recovered to be normal, wherein the target terminal receives service from the second network before the second network is in disaster, and accesses the first network after the second network is in disaster.
In this embodiment of the application, the determining module 601 is further configured to take a random value within a predetermined range, and determine, according to the random value, a duration of the first timer corresponding to the target terminal.
In this embodiment of the application, the determining module 601 is further configured to determine a duration of the first timer according to the target parameter information.
In an embodiment of the present application, the target parameter information includes at least one of:
identification information of the target terminal;
identification information of the first network;
the subscription information of the target terminal;
identification information of the second network.
In an embodiment of the present application, the subscription information of the target terminal includes: and the priority of the target terminal is higher, wherein the duration of the first timer corresponding to the target terminal with higher priority is shorter.
In this embodiment of the application, the principle that the determining module 601 determines the duration of the first timer includes: if the second network and the first network are equivalent networks, the duration of the first timer corresponding to a first target terminal is less than the duration of the first timer corresponding to a second target terminal, wherein the first network is a home network of the first target terminal, and the first network is not the home network of the second target terminal.
In this embodiment of the application, the principle that the determining module 601 determines the duration of the first timer includes: the duration of the first timer corresponding to a first target terminal is less than the duration of the first timer corresponding to a second target terminal, wherein the second network is a forbidden network of the second target terminal, and the second network is a non-forbidden network of the first target terminal.
In this embodiment of the application, the principle that the determining module 601 determines the duration of the first timer includes: if the second network and the first network are equivalent networks, the duration of the first timer corresponding to the first terminal is greater than the duration of the second timer corresponding to the second terminal, wherein the second network is a home network of the first terminal, and the first network is not the home network of the second terminal.
In this embodiment of the application, the principle that the determining module 601 determines the duration of the first timer includes: the duration of the first timer corresponding to a first terminal is greater than the duration of the first timer corresponding to a second terminal, wherein the first network is a forbidden network of the second terminal, and the first network is a non-forbidden network of the first terminal.
The triggering device for network access in the embodiment of the present application may be a device, or may be a component, an integrated circuit, or a chip in a network side device. The apparatus may be a network side device. For example, the network-side device may include, but is not limited to, the types of the network-side device 12 listed above, and the embodiment of the present application is not particularly limited.
The triggering device in the embodiment of the present application may be a device that may have an operating system. The operating system may be an Android (Android) operating system, an ios operating system, or other possible operating systems, and embodiments of the present application are not limited specifically.
The triggering device provided in the embodiment of the present application may be a device capable of implementing each process implemented by the first network or the second network in the method embodiments of fig. 2 to fig. 5, and achieve the same technical effect, and is not described herein again to avoid repetition.
Optionally, as shown in fig. 7, an embodiment of the present application further provides a communication device 700, which includes a processor 701, a memory 702, and a program or an instruction stored in the memory 702 and executable on the processor 701, for example, when the communication device 700 is a network-side device, the program or the instruction is executed by the processor 701 to implement each process of the foregoing network access triggering method embodiment, and the same technical effect can be achieved, and details are not described here to avoid repetition.
Specifically, the embodiment of the application further provides a network side device. As shown in fig. 8, the network device 800 includes: antenna 801, radio frequency device 802, baseband device 803. The antenna 801 is connected to a radio frequency device 802. In the uplink direction, the rf device 802 receives information via the antenna 801 and sends the received information to the baseband device 803 for processing. In the downlink direction, the baseband device 803 processes information to be transmitted and transmits the information to the radio frequency device 802, and the radio frequency device 802 processes the received information and transmits the processed information through the antenna 801.
The above band processing means may be located in the baseband means 803, and the method performed by the first network or the second network in the above embodiments may be implemented in the baseband means 803, and the baseband means 803 includes a processor 804 and a memory 805.
The baseband apparatus 803 may include, for example, at least one baseband board, on which a plurality of chips are disposed, as shown in fig. 8, where one chip, for example, the processor 804, is connected to the memory 805 to call up the program in the memory 805 to perform the network device operations shown in the above method embodiments.
The baseband device 803 may further include a network interface 806, such as a Common Public Radio Interface (CPRI), for exchanging information with the radio frequency device 802.
Specifically, the network side device of the embodiment of the present invention further includes: the instructions or programs stored in the memory 805 and capable of being executed on the processor 804, and the processor 804 calls the instructions or programs in the memory 805 to execute the methods executed by the modules shown in fig. 6, and achieve the same technical effects, which are not described herein for avoiding repetition.
The embodiment of the present application further provides a readable storage medium, where a program or an instruction is stored on the readable storage medium, and when the program or the instruction is executed by a processor, the program or the instruction implements each process of the foregoing triggering method for network access, and can achieve the same technical effect, and in order to avoid repetition, details are not repeated here.
The processor is the processor in the network side device in the above embodiment. The readable storage medium includes a computer readable storage medium, such as a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and so on.
The embodiment of the present application further provides a chip, where the chip includes a processor and a communication interface, the communication interface is coupled to the processor, and the processor is configured to run a network-side device program or an instruction, so as to implement each process of the above embodiment of the network access triggering method, and achieve the same technical effect, and in order to avoid repetition, the details are not repeated here.
A computer program product is provided, which includes a processor, a memory, and a program or an instruction stored in the memory and executable on the processor, and when the program or the instruction is executed by the processor, the program or the instruction implements each process of the above-mentioned triggering method for network access, and can achieve the same technical effect, and in order to avoid repetition, the detailed description is omitted here.
It should be understood that the chips mentioned in the embodiments of the present application may also be referred to as a system-on-chip, a system-on-chip or a system-on-chip, etc.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element. Further, it should be noted that the scope of the methods and apparatus of the embodiments of the present application is not limited to performing the functions in the order illustrated or discussed, but may include performing the functions in a substantially simultaneous manner or in a reverse order based on the functions involved, e.g., the methods described may be performed in an order different than that described, and various steps may be added, omitted, or combined. In addition, features described with reference to certain examples may be combined in other examples.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present application may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (such as a mobile phone, a computer, a server, or a network device) to execute the method according to the embodiments of the present application.
While the present embodiments have been described with reference to the accompanying drawings, it is to be understood that the invention is not limited to the precise embodiments described above, which are meant to be illustrative and not restrictive, and that various changes may be made therein by those skilled in the art without departing from the spirit and scope of the invention as defined by the appended claims.

Claims (24)

1. A method for triggering network access is applied to a first network, and is characterized in that the method comprises the following steps:
determining that a target terminal needs to access a second network in the process that the target terminal receives service from the first network;
starting a first timer corresponding to the target terminal, wherein the time lengths of the first timers corresponding to a plurality of different terminals are not completely the same;
and triggering the target terminal to attempt to access the second network under the condition that the first timer is overtime.
2. The method of claim 1, wherein determining that the target terminal needs to access a second network comprises:
the first network is found to begin to disaster and the second network can provide services normally.
3. The method of claim 1, wherein determining that the target terminal needs to access a second network comprises:
and determining that the second network is recovered to be normal, wherein the target terminal receives services from the second network before the second network is in disaster, and accesses the first network after the second network is in disaster.
4. The method of any of claims 1 to 3, wherein prior to starting the first timer, the method further comprises:
and taking a random value in a preset range, and determining the time length of the first timer corresponding to the target terminal according to the random value.
5. The method of any of claims 1 to 3, wherein prior to starting the first timer, the method further comprises:
and determining the duration of the first timer according to the target parameter information.
6. The method of claim 5, wherein the target parameter information comprises at least one of:
identification information of the target terminal;
identification information of the first network;
the subscription information of the target terminal;
identification information of the second network.
7. The method of claim 6, wherein the subscription information of the target terminal comprises: and the priority of the target terminal, wherein the higher the priority is, the shorter the duration of the first timer corresponding to the terminal is.
8. The method of claim 6, wherein determining the duration of the first timer comprises: if the second network and the first network are equivalent networks, the duration of the first timer corresponding to the first terminal is less than the duration of the first timer corresponding to the second terminal, wherein the first network is a home network of the first terminal, and the first network is not the home network of the second terminal.
9. The method of claim 6, wherein determining the duration of the first timer comprises: the duration of the first timer corresponding to a first terminal is less than the duration of the first timer corresponding to a second terminal, wherein the second network is a forbidden network of the second terminal, and the second network is a non-forbidden network of the first terminal.
10. The method of claim 6, wherein determining the duration of the first timer comprises: if the second network and the first network are equivalent networks, the duration of the first timer corresponding to the first terminal is greater than the duration of the second timer corresponding to the second terminal, wherein the second network is a home network of the first terminal, and the second network is not the home network of the second terminal.
11. The method of claim 6, wherein determining the duration of the first timer comprises: the duration of the first timer corresponding to a first terminal is greater than the duration of the first timer corresponding to a second terminal, wherein the first network is a forbidden network of the second terminal, and the first network is a non-forbidden network of the first terminal.
12. An apparatus for triggering network access, the apparatus comprising:
the determining module is used for determining that the target terminal needs to be accessed to a second network in the process that the target terminal receives the service from the first network;
the starting module is used for starting a first timer corresponding to the target terminal, wherein the time lengths of the first timers corresponding to a plurality of different terminals are not completely the same;
and the triggering module is used for triggering the target terminal to try to access the second network under the condition that the first timer is overtime.
13. The apparatus of claim 12, wherein the means for determining that the target terminal needs to access a second network comprises:
the beginning of the first network is found to be out of disaster and the second network can provide services normally.
14. The apparatus of claim 12, wherein the means for determining that the target terminal needs to access a second network comprises:
and determining that the second network is recovered to be normal, wherein the target terminal receives service from the second network before the second network is in disaster, and accesses the first network after the second network is in disaster.
15. The apparatus according to any one of claims 12 to 14,
the determining module is further configured to take a random value within a predetermined range, and determine the duration of the first timer corresponding to the target terminal according to the random value.
16. The apparatus according to any one of claims 12 to 14,
the determining module is further configured to determine a duration of the first timer according to the target parameter information.
17. The apparatus of claim 16, wherein the target parameter information comprises at least one of:
identification information of the target terminal;
identification information of the first network;
the subscription information of the target terminal;
identification information of the second network.
18. The apparatus of claim 17, wherein the subscription information of the target terminal comprises: and the priority of the target terminal is higher, wherein the duration of the first timer corresponding to the target terminal with higher priority is shorter.
19. The apparatus of claim 17, wherein the determining module determines the duration of the first timer based on a rule comprising: if the second network and the first network are equivalent networks, the duration of the first timer corresponding to a first target terminal is less than the duration of the first timer corresponding to a second target terminal, wherein the first network is a home network of the first target terminal, and the first network is not the home network of the second target terminal.
20. The apparatus of claim 17, wherein the determining module determines the duration of the first timer based on a rule comprising: the duration of the first timer corresponding to a first target terminal is less than the duration of the first timer corresponding to a second target terminal, wherein the second network is a forbidden network of the second target terminal, and the second network is a non-forbidden network of the first target terminal.
21. The apparatus of claim 17, wherein the determining module determines the duration of the first timer based on a rule comprising: if the second network and the first network are equivalent networks, the duration of the first timer corresponding to the first terminal is greater than the duration of the second timer corresponding to the second terminal, wherein the second network is a home network of the first terminal, and the first network is not the home network of the second terminal.
22. The apparatus of claim 17, wherein the determining module determines the duration of the first timer based on a rule comprising: the duration of the first timer corresponding to a first terminal is greater than the duration of the first timer corresponding to a second terminal, wherein the first network is a forbidden network of the second terminal, and the first network is a non-forbidden network of the first terminal.
23. A network-side device comprising a processor, a memory, and a program or instructions stored on the memory and executable on the processor, wherein the program or instructions, when executed by the processor, implement the steps of the method for triggering network access according to any one of claims 1 to 11.
24. A readable storage medium, characterized in that it stores thereon a program or instructions which, when executed by the processor, implement the steps of the method of triggering of network access according to any one of claims 1 to 11.
CN202011602990.8A 2020-12-29 2020-12-29 Triggering method and device for network access and network side equipment Active CN114698051B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202011602990.8A CN114698051B (en) 2020-12-29 2020-12-29 Triggering method and device for network access and network side equipment
PCT/CN2021/141697 WO2022143539A1 (en) 2020-12-29 2021-12-27 Network access trigger method and apparatus, and network-side device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011602990.8A CN114698051B (en) 2020-12-29 2020-12-29 Triggering method and device for network access and network side equipment

Publications (2)

Publication Number Publication Date
CN114698051A true CN114698051A (en) 2022-07-01
CN114698051B CN114698051B (en) 2024-01-26

Family

ID=82132112

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011602990.8A Active CN114698051B (en) 2020-12-29 2020-12-29 Triggering method and device for network access and network side equipment

Country Status (2)

Country Link
CN (1) CN114698051B (en)
WO (1) WO2022143539A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2024032545A1 (en) * 2022-08-12 2024-02-15 维沃移动通信有限公司 Disaster roaming method and apparatus, terminal, first communication device, and second network

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1761220A (en) * 2004-10-11 2006-04-19 华为技术有限公司 Implementation method for reselecting network
EP2840862A1 (en) * 2013-08-19 2015-02-25 Koninklijke KPN N.V. Network selection method and user device configured for performing such a method

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107466080A (en) * 2017-08-22 2017-12-12 深圳市万普拉斯科技有限公司 Network reselection method, device, computer-readable recording medium and mobile terminal

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1761220A (en) * 2004-10-11 2006-04-19 华为技术有限公司 Implementation method for reselecting network
EP2840862A1 (en) * 2013-08-19 2015-02-25 Koninklijke KPN N.V. Network selection method and user device configured for performing such a method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
QUALCOMM INCORPORATED: "Addition of Key Issue on prevention of signalling overload in PLMNs without Disaster Condition for MINT", 3GPP TSG-CT WG1 MEETING #127-E C1-207684 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2024032545A1 (en) * 2022-08-12 2024-02-15 维沃移动通信有限公司 Disaster roaming method and apparatus, terminal, first communication device, and second network

Also Published As

Publication number Publication date
WO2022143539A1 (en) 2022-07-07
CN114698051B (en) 2024-01-26

Similar Documents

Publication Publication Date Title
CN109565896B (en) Low power RRC operation method and apparatus
EP3627916B1 (en) Method for paging and terminal device
WO2017210888A1 (en) Paging method, apparatus, and system
US11477722B2 (en) Changing access control parameters in a wireless network
RU2746891C1 (en) Mode of transition, network device and terminal device
US20240224215A1 (en) Method and user equipment for handling communication in satellite communication network
CN110351830B (en) Communication method and communication device
WO2022143539A1 (en) Network access trigger method and apparatus, and network-side device
WO2021189254A1 (en) Method and apparatus for sidelink resource re-evaluation
US20230083832A1 (en) Information indication method and apparatus and communication device
EP3606181A1 (en) Method for terminal device to access network, terminal device and network device
US20190141678A1 (en) Method and apparatus for resource allocation
CN112470501B (en) Paging message processing method and device
CN114143701A (en) Device searching and registering method and network side device
EP4221352A1 (en) Network change method and apparatus, and terminal
CN112423317B (en) Different network switching processing method, information configuration method, user equipment and network equipment
WO2022027639A1 (en) Signal receiving method, signal sending method, terminal device and storage medium
WO2023150962A1 (en) Methods and apparatuses for handling a relay link with tau and rnau in l2 u2n relay case
CN111294844B (en) Beam failure recovery method, user terminal and computer-readable storage medium
CN114554624A (en) Communication indication method, device and network side equipment
CN117178606A (en) Random access channel configuration based on fragmentation
CN116438867A (en) Periodic registration update procedure for non-allowed service areas
CN114845361A (en) Network access method, device, terminal equipment and network equipment
CN115334616A (en) Relay UE, remote UE and processing method and device for access network of remote UE
CN116686327A (en) Measurement enhancement for L1-RSRP

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant