CN114698051B - Triggering method and device for network access and network side equipment - Google Patents

Triggering method and device for network access and network side equipment Download PDF

Info

Publication number
CN114698051B
CN114698051B CN202011602990.8A CN202011602990A CN114698051B CN 114698051 B CN114698051 B CN 114698051B CN 202011602990 A CN202011602990 A CN 202011602990A CN 114698051 B CN114698051 B CN 114698051B
Authority
CN
China
Prior art keywords
network
terminal
timer
target terminal
duration
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011602990.8A
Other languages
Chinese (zh)
Other versions
CN114698051A (en
Inventor
韩鲁峰
康艳超
王文
张鹏飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN202011602990.8A priority Critical patent/CN114698051B/en
Priority to PCT/CN2021/141697 priority patent/WO2022143539A1/en
Publication of CN114698051A publication Critical patent/CN114698051A/en
Application granted granted Critical
Publication of CN114698051B publication Critical patent/CN114698051B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions
    • H04W48/06Access restriction performed under specific conditions based on traffic conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/18Selecting a network or a communication service

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application discloses a triggering method and device for network access and network side equipment, and belongs to the technical field of wireless communication. The triggering method of the network access is applied to a first network, and comprises the following steps: in the process that a target terminal receives service from the first network, determining that the target terminal needs to be accessed to a second network; starting a first timer corresponding to a target terminal, wherein the duration of the first timer is not identical for a plurality of different terminals; and triggering the target terminal to attempt to access the second network under the condition that the first timer is overtime.

Description

Triggering method and device for network access and network side equipment
Technical Field
The application belongs to the technical field of wireless communication, and particularly relates to a triggering method and device for network access and network side equipment.
Background
In the prior art, when a first network may not be able to provide normal services when some disaster event (dis) occurs, a terminal or User Equipment (UE) in the first network will attempt to access in a second network.
And after the first network disaster condition is over, the inbound roamer (Disaster Inbound roamers) should perform a network reselection due to the disaster, and the terminal accessing the second network due to the first network disaster will attempt to access the first network. That is, when the disaster condition is no longer applicable, all UEs of the public land mobile network (Public Land Mobile Network, PLMN) that were previously in the disaster state, currently served by another PLMN and currently in the 5G mobility management IDLE (5GS Mobility Management Idle,5GMM-IDLE) mode, will perform PLMN reselection and return to the PLMN that had previously experienced the disaster condition.
It can be seen that in the prior art, a large number of first network UEs may cause congestion of a second network when they access the second network simultaneously due to a disaster (dis) of the first network. Or, after a large number of first network UEs access to the second network due to the disaster of the first network, the first network returns to normal, and the first network may be congested when a large number of first network UEs return to the first network.
Disclosure of Invention
The embodiment of the application provides a triggering method and device for network access and network side equipment, which can solve the problem of congestion of a second network caused when a large number of UE (user equipment) receiving services from a first network are changed to the second network.
In a first aspect, a method for triggering network access is provided, which is applied to a first network, and the method includes: determining that a target terminal needs to be accessed to a second network in the process of receiving service from the first network by the target terminal; starting a first timer corresponding to a target terminal, wherein the duration of the first timer is not identical for a plurality of different terminals; and triggering the target terminal to attempt to access the second network under the condition that the first timer is overtime.
In a second aspect, there is provided a triggering device for network access, the device comprising: a determining module, configured to determine, in a process that a target terminal receives a service from the first network, that the target terminal needs to access a second network; the starting module is used for starting the first timers corresponding to the target terminals, wherein the duration of the first timers corresponding to the different terminals is not identical; and the triggering module is used for triggering the target terminal to try to access the second network under the condition that the first timer is overtime.
In a third aspect, a network side device is provided, the network side device comprising a processor, a memory and a program or instructions stored on the memory and executable on the processor, the program or instructions implementing the steps of the method according to the first aspect when executed by the processor.
In a fourth aspect, there is provided a readable storage medium having stored thereon a program or instructions which when executed by a processor perform the steps of the method according to the first aspect.
In a fifth aspect, a chip is provided, the chip comprising a processor and a communication interface, the communication interface and the processor being coupled, the processor being configured to execute a program or instructions of a network-side device, to implement the steps of the method according to the first aspect.
In a sixth aspect, there is provided a computer program product comprising a processor, a memory and a program or instructions stored on the memory and executable on the processor, the program or instructions when executed by the processor implementing the steps of the method according to the first aspect.
In the embodiment of the application, in the process that a target terminal receives a service from a first network, the first network determines that the target terminal needs to be accessed to a second network, and then first network equipment starts a first timer, wherein for a plurality of different target terminals, the duration of the first timer is not identical; and then triggering the target terminal to attempt to access the second network when the first timer expires. Thus, the problem that a large number of target terminals attempt to access the second network at the same time, resulting in congestion of the second network, can be avoided.
Drawings
Fig. 1 shows a schematic diagram of a wireless communication system to which embodiments of the present application are applicable;
fig. 2 is a schematic flow chart of a triggering method of a network access method according to an embodiment of the present application;
fig. 3 is another flow chart of a triggering method of a network access method according to an embodiment of the present application;
fig. 4 is a schematic flowchart of another method for triggering a network access method according to an embodiment of the present application;
fig. 5 shows a further flowchart of a triggering method of the network access method according to the embodiment of the present application;
fig. 6 is a schematic structural diagram of a triggering device of a network access method according to an embodiment of the present application;
fig. 7 shows a schematic structural diagram of a communication device according to an embodiment of the present application;
fig. 8 shows a schematic hardware structure of a network side device according to an embodiment of the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are some, but not all, of the embodiments of the present application. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments in the present application are within the scope of the protection of the present application.
The terms first, second and the like in the description and in the claims, are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate, such that embodiments of the present application may be implemented in sequences other than those illustrated or described herein, and that the "first" and "second" distinguished objects generally are of the type and do not limit the number of objects, e.g., the first object may be one or more. Furthermore, in the description and claims, "and/or" means at least one of the connected objects, and the character "/" generally means a relationship in which the associated object is an "or" before and after.
It is noted that the techniques described in embodiments of the present application are not limited to long term evolution (Long Term Evolution, LTE)/LTE evolution (LTE-Advanced, LTE-a) systems, but may also be used in other wireless communication systems, such as code division multiple access (Code Division Multiple Access, CDMA), time division multiple access (Time Division Multiple Access, TDMA), frequency division multiple access (Frequency Division Multiple Access, FDMA), orthogonal frequency division multiple access (Orthogonal Frequency Division Multiple Access, OFDMA), single-carrier frequency division multiple access (Single-carrier Frequency-Division Multiple Access, SC-FDMA), and other systems. The terms "system" and "network" in embodiments of the present application are often used interchangeably, and the techniques described may be used for both the above-mentioned systems and radio technologies, as well as other systems and radio technologies. The following description describes a new air interface (NR) system for purposes of example and uses NR terminology in much of the description that follows, but these techniques are also applicable to applications other than NR system applications, such as generation 6 (6) th Generation, 6G) communication system.
Fig. 1 shows a schematic diagram of a wireless communication system to which embodiments of the present application are applicable. The wireless communication system includes a terminal 11 and a network device 12. The terminal 11 may also be called a terminal Device or a User Equipment (UE), and the terminal 11 may be a terminal-side Device such as a mobile phone, a tablet Computer (Tablet Personal Computer), a Laptop (Laptop Computer) or a notebook (Personal Digital Assistant, PDA), a palm Computer, a netbook, an ultra-mobile personal Computer (ultra-mobile personal Computer, UMPC), a mobile internet Device (Mobile Internet Device, MID), a Wearable Device (or a vehicle-mounted Device (VUE), a pedestrian terminal (PUE), and the Wearable Device includes: a bracelet, earphone, glasses, etc. Note that, the specific type of the terminal 11 is not limited in the embodiment of the present application. The network side device 12 may be a base station or a core network, wherein the base station may be called a node B, an evolved node B, an access point, a base transceiver station (Base Transceiver Station, BTS), a radio base station, a radio transceiver, a basic service set (Basic Service Set, BSS), an extended service set (Extended Service Set, ESS), a node B, an evolved node B (eNB), a home node B, a home evolved node B, a WLAN access point, a WiFi node, a transmission and reception point (TransmittingReceivingPoint, TRP), or some other suitable terminology in the field, and the base station is not limited to a specific technical vocabulary so long as the same technical effect is achieved, and it should be noted that, in the embodiment of the present application, only the base station in the NR system is taken as an example, but the specific type of the base station is not limited.
The following describes in detail the triggering scheme of the network access provided in the embodiment of the present application through specific embodiments and application scenarios thereof with reference to the accompanying drawings.
Fig. 2 shows a flow diagram of a method for triggering network access in an embodiment of the present application, and the method 200 may be performed by a first network. In other words, the method may be performed by software or hardware installed on a network-side device (e.g., a base station) of the first network. As shown in fig. 2, the method may include the following steps.
S210, determining that the target terminal needs to be accessed to a second network in the process of receiving the service from the first network by the target terminal.
In the embodiment of the application, when the target terminal is in normal service of the first network, the first network determines that the target terminal needs to access the second network when the second network is found to be available.
In one possible implementation, the determining, by the first network, that the target terminal needs to access the second network may include: the first network is found to start to have a disaster, and the second network can normally provide services. For example, when the UE is in a connected state, the first network discovers that the first network starts to generate a disaster, and may not provide normal service, while the second network can provide the service normally. For example, some network elements of a portion of the first network may be involved in a disaster, but other network elements may still be available, and the available network elements may send a disaster notification to the UE.
In another possible implementation manner, the determining, by the first network, that the target terminal needs to access the second network may include: and determining that the second network is recovered to be normal, wherein the target terminal receives service from the second network before the second network is in disaster, and accesses the first network after the second network is in disaster. For example, when the UE is in the connected state in the second network, the second network is in a disaster, the UE tries and accesses the first network, after the second network is restored to be normal, the first network determines that the second network is restored, and all UEs in the second network in the disaster state previously should perform network reselection, that is, all UEs in the second network in the disaster state previously need to access the second network.
S212, starting a first timer corresponding to the target terminal, wherein the duration of the first timers corresponding to the different terminals is not identical.
In this embodiment of the present application, each of the plurality of terminals corresponds to one first timer, and durations of the first timers corresponding to some of the plurality of first timers are different, or durations of the first timers corresponding to all of the plurality of terminals are different from each other.
And S214, triggering the target terminal to attempt to access the second network under the condition that the first timer is overtime.
In the embodiment of the application, in the process that a target terminal receives a service from a first network, the first network determines that the target terminal needs to be accessed to a second network, and then first network equipment starts a first timer, wherein for a plurality of different target terminals, the duration of the first timer is not identical; and then triggering the target terminal to attempt to access the second network when the first timer expires. Thus, the problem that a large number of target terminals attempt to access the second network at the same time, resulting in congestion of the second network, can be avoided.
In one possible implementation, the duration of the first timer may be determined according to a random value within a predetermined range. That is, in this possible implementation, before starting the first timer, the method further includes: and taking a random value in a preset range, and determining the duration of the first timer corresponding to the target terminal according to the random value. For example, the duration of the first timer may be a random value within a predetermined range, or a duration calculated from a random value. By this possible implementation, it may be ensured that the target terminal accesses the second network randomly within a predetermined range, instead of accessing the second network simultaneously.
In one possible implementation, the first network may also determine the duration of the first timer according to the target parameter information. That is, in this possible implementation, before starting the first timer, the method further includes: and determining the duration of the first timer according to the target parameter information.
In the foregoing possible implementation manner, optionally, the target parameter information may include at least one of the following:
(1) Identification information of the target terminal; for example, the duration of the first timer corresponding to the target terminal may be calculated according to the identification information of the target terminal.
(2) Identification information of the first network. For example, the ID of the first network.
(3) Subscription information of the target terminal. For example, subscription information such as priority or the like of the target terminal may be used as calculation reference information.
Optionally, the subscription information of the target terminal may include the priority of the target terminal, and when determining the duration of the first timer, the duration of the first timer corresponding to the terminal with the higher priority is shorter. For example, in the event of a disaster in the first network, a UE with a lower priority may be given the option to calculate a longer timer to access the second network later and provide normal service to the UE later.
(4) Identification information of the second network. For example, the ID of the second network.
In the foregoing possible implementation manner, optionally, when determining the duration of the first timer according to the target parameter information, the determining the principle of the duration of the first timer may include: if the second network and the first network are equivalent networks, the duration of the first timer corresponding to the first terminal is smaller than that of the first timer corresponding to the second terminal, wherein the first network is a home network of the first terminal, and the first network is not the home network of the second terminal. For example, when a disaster occurs in the first network, it may be preferentially guaranteed that the home terminal of the first network changes to the second network, so that for the target terminal belonging to the first network, the duration of the corresponding first timer is smaller than that of the target terminal not belonging to the first network.
In practical application, whether the first network and the second network are equivalent networks or not and whether the target terminal is a home terminal of the first network or not can be determined according to the identification of the first network, the identification of the second network and the subscription information of the target terminal.
In the foregoing possible implementation manner, optionally, when determining the duration of the first timer according to the target parameter information, the determining the principle of the duration of the first timer may include: the duration of the first timer corresponding to a first terminal is smaller than the duration of the first timer corresponding to a second terminal, wherein the second network is a forbidden (forbidden) network of the second terminal, and the second network is a non-forbidden network of the first terminal. The second network being the forbidden network of the second terminal means that the second terminal refuses to access the second terminal for reasons such as "PLMN non allowed" when the second terminal attempts to access the second network. For example, if the second network does not sign up for normal service with the first network, and if the UE is attempting to access the second network in the absence of a disaster, the second network is rejected by the cause "PLMN non allowed", i.e. the second network is a forbidden network for the UE. In this possible implementation, since the second network is a forbidden network of the second terminal, the second terminal may also be denied that it has attempted to access the second network earlier, and thus may leave the first network later and enter the second network later.
In practical application, whether the second network is the forbidden network of the target terminal or not can be determined according to the identification of the second network and the subscription information of the target terminal, so that the duration of the first timer corresponding to the target terminal can be determined.
In the foregoing possible implementation manner, optionally, when determining the duration of the first timer according to the target parameter information, the determining the principle of the duration of the first timer may include: if the second network and the first network are equivalent networks, the time length of the first timer corresponding to the first terminal is longer than the time length of the second timer corresponding to the second terminal, wherein the second network is a home network of the first terminal, and the second network is not the home network of the second terminal. For example, for a UE belonging to the second network, when a disaster occurs in the second network, the equivalent network of the second network (i.e., the first network) is changed, and when the second network is restored, since the first network is the equivalent network of the second network, the first network can provide normal service for the UE, and the UE can leave the first network later, so that the duration of the first timer corresponding to the UE can be longer. In this possible implementation, therefore, for a target terminal belonging to the second network, the corresponding first timer has a duration greater than that of a target terminal not belonging to the second network.
In the foregoing possible implementation manner, optionally, when determining the duration of the first timer according to the target parameter information, the determining the principle of the duration of the first timer may include: the time length of the first timer corresponding to the first terminal is longer than that of the first timer corresponding to the second terminal, wherein the first network is a forbidden network of the second terminal, and the first network is a non-forbidden network of the first terminal. In this possible implementation, since the first network is a forbidden network of the second terminal, such UEs require to leave the first network as soon as possible, and the duration of the first timer corresponding to such UEs is small. For example, the second network and the first network do not sign up for normal service, and if a UE is attempting to access the first network in the absence of a disaster, and will be rejected by the reason "PLMN non allowed", it is required for such UE to leave the first network as soon as possible, so that the first network stops serving it. If the second network is the home network of the UE, the UE is returned to its home network as soon as possible, so that the forbidden network (i.e., the first network) of the UE stops serving as soon as possible.
Fig. 3 shows another flow diagram of a method for triggering network access in an embodiment of the present application, and the method 300 may be performed by a terminal, a target network, and an original network. In other words, the method may be performed by software or hardware installed on the terminal, the network-side device of the target network, and the network-side device of the original network. As shown in fig. 3, the method may include the following steps.
S301. The UE currently receives service in the original network.
S302, the original network discovers that the target network is available.
The original network discovery target network may be the same as that in the method 200 for determining that the target terminal needs to access the second network by the first network, and specifically, reference may be made to the related description in the method 200, which is not repeated herein.
S303, the original network starts a target timer corresponding to the UE.
The duration of the target timers corresponding to different UEs is not identical. The original network may determine the duration of the target timer by adopting a manner of determining the duration of the first timer corresponding to the target terminal by the first network in the method 200, which is specifically referred to the related description in the method 200 and will not be repeated herein.
S304, the target timer times out.
S305. the original network informs the UE that the target network is available, which may be signaled to the terminal, for example, a release message, or a registration reject message.
S306, after receiving the information available to the target network from the original network, the UE attempts to access the target network.
In the embodiment of the application, in the process that the UE receives the service from the original network, the original network discovers that the target network is available, and then the original network equipment starts a target timer corresponding to the UE; and then triggering the UE to attempt to access the target network when the target timer expires. Therefore, the problem that a large number of UE try to access the target network at the same time, so that the target network is congested can be avoided.
Fig. 4 shows a further flow diagram of a method for triggering network access in an embodiment of the present application, which method 400 may be performed by a terminal, a first network and a second network. In other words, the method may be performed by software or hardware installed on the terminal, the network-side device of the first network, and the network-side device of the second network. As shown in fig. 4, the method may include the following steps.
S401. the ue is normally served in the first network.
S402, disaster occurs in the first network, and the second network serves normally.
S403, the first network starts a first timer corresponding to the UE.
For example, a partial network element disaster of the first network, but still a partial network element is available, the available network element may send a disaster notification to the UE, wherein the UE may be currently in, but is not limited to, a connected state.
The duration of the first timers corresponding to different UEs is not identical. The first network may determine the duration of the first timer by using a manner of determining the duration of the first timer corresponding to the target terminal by using the first network in the method 200.
For example, the first network may take on a random value for different UEs. Alternatively, the first network may use information of the UE (e.g., UE ID), information of the second network (i.e., target network) (e.g., second network ID), subscription information of the UE (e.g., priority), etc. as calculation reference information.
The principle that the first network determines the duration of the first timer may include at least one of the following:
(1) A lower priority UE may be given the longer timer calculated to require the UE to access the second network later and to provide normal service to the UE later.
(2) The second network is a network Equivalent to the first network, for example, the UE belongs to the first network, the second network is a peer Home network (EHPLMNE) of the Home network of the UE, and for the UE belonging to the first network, it is required to leave the first network as soon as possible to enter the second network to acquire the normal service as soon as possible, so that the first timer corresponding to the UE belonging to the first network is shorter than the first timer corresponding to the UE not belonging to the first network.
(3) If the second network is a network of the forbidden of the UE, for example, the second network does not sign up with the home network (i.e. the first network), when no disaster occurs, if the UE is attempting to access the second network and will be rejected by the reason "PLMN non allowed", the second network is a first timer corresponding to the UE of the forbidden network longer than a first timer corresponding to the UE of the second network is a non-forbidden network, i.e. the UE of the second network is forbidden to leave the first network later and enter the second network later.
S404, the first timer times out.
S405, the first network informs UE that a disaster occurs in the first network, and triggers the terminal to attempt to access the second network;
s406. After receiving the notification message in S405, the UE attempts to access in the second network.
Fig. 5 shows a further flowchart of a method for triggering network access in an embodiment of the present application, where the method 500 may be performed by a terminal, a first network and a second network. In other words, the method may be performed by software or hardware installed on the terminal, the network-side device of the first network, and the network-side device of the second network. As shown in fig. 5, the method may include the following steps.
S501. the ue receives normal service in the second network.
In the embodiment of the present application, before S501, when the UE receives a normal service in the first network, the first network disasters, and the UE accesses to the second network.
In a specific application, the UE may access the second network by using the method described in the method 400, which is not limited to this, and the UE may access the second network by using other methods, which are not limited in the embodiments of the present application.
S502, the first network is restored to be normal.
S503, after the second network finds that the first network with the original disaster is recovered to be normal, the second network starts a second timer corresponding to the UE.
The duration of the second timers corresponding to different UEs is not identical. The first network may determine the duration of the second timer by using a manner of determining the duration of the first timer corresponding to the target terminal by the first network in the method 200.
For example, the second network may take on a random value for a different UE. Alternatively, the second network may use information of the UE (e.g., UE ID), information of the second network (i.e., target network) (e.g., second network ID), subscription information of the UE (e.g., priority), etc. as calculation reference information.
Wherein the second network determining the duration of the second timer may comprise at least one of:
(1) A lower priority UE may be given the longer timer to calculate later requests for access to the first network.
(2) If the first network is an equivalent network to the second network, for example, the second network is a home network of the UE, and the first network is an EHPLMN network of the home network of the UE, the UE belonging to the first network (for example, the first network is an HPLMN of the UE) may leave the second network later, so that a duration of the second timer corresponding to the UE belonging to the first network is longer than a duration of the second timer corresponding to the UE not belonging to the first network.
(3) The second network is a forbidden network of the UE, for example, the second network and the first network do not sign up for normal service, i.e. if the UE is attempting to access the second network when no disaster occurs, if the UE is to be rejected by the cause "PLMN not allowed", for such UE, for example, the first network is the HPLMN of the UE, it is required to leave the second network as soon as possible, and the UE returns to its home network as soon as possible, so that the second network stops serving. Therefore, the duration of the second timer corresponding to the UE of the second network being the forbidden network is smaller than the duration of the second timer corresponding to the UE of the second network being the non-forbidden network.
S504, the second timer times out;
s505, the second network informs the UE that the first network is recovered to be normal through signaling, for example, through connection release signaling, registration rejection signaling and the like, and triggers the terminal to try to access the first network;
s506, after receiving the information of the first network restoring to normal sent by the second network, the UE tries to access the first network.
It should be noted that, in the triggering method of network access provided in the embodiment of the present application, the execution body may be a triggering device of network access, or a control module for executing the triggering method of network access in the triggering device of network access. In the embodiment of the present application, a triggering method for executing network access by a triggering device for network access is taken as an example, and the triggering device for network access provided in the embodiment of the present application is described.
Fig. 6 is a schematic structural diagram of a triggering device for network access according to an embodiment of the present application, as shown in fig. 6, the device 600 may include: a determining module 601, a starting module 602 and a triggering module 603.
In this embodiment of the present application, the determining module 601 is configured to determine that, in a process that a target terminal receives a service from the first network, the target terminal needs to access a second network; a starting module 602, configured to start a first timer corresponding to the target terminal, where durations of the first timers corresponding to the multiple different terminals are not identical; and the triggering module 603 is configured to trigger the target terminal to attempt to access the second network if the first timer expires.
In this embodiment, the determining module 601 determines that the target terminal needs to access the second network includes: the first network is found to start to have a disaster, and the second network can normally provide services.
In this embodiment, the determining module 601 determines that the target terminal needs to access the second network includes: and determining that the second network is recovered to be normal, wherein the target terminal receives service from the second network before the second network is in disaster, and accesses the first network after the second network is in disaster.
In this embodiment of the present application, the determining module 601 is further configured to take a random value within a predetermined range, and determine a duration of the first timer corresponding to the target terminal according to the random value.
In this embodiment of the present application, the determining module 601 is further configured to determine a duration of the first timer according to the target parameter information.
In an embodiment of the present application, the target parameter information includes at least one of the following:
identification information of the target terminal;
identification information of the first network;
subscription information of the target terminal;
identification information of the second network.
In this embodiment of the present application, the subscription information of the target terminal includes: and the priority of the target terminal, wherein the time length of the first timer corresponding to the target terminal with higher priority is shorter.
In this embodiment, the determining module 601 determines the duration of the first timer according to the principle that the first timer includes: if the second network and the first network are equivalent networks, the duration of the first timer corresponding to the first target terminal is smaller than the duration of the first timer corresponding to the second target terminal, wherein the first network is a home network of the first target terminal, and the first network is not the home network of the second target terminal.
In this embodiment, the determining module 601 determines the duration of the first timer according to the principle that the first timer includes: the duration of the first timer corresponding to the first target terminal is smaller than the duration of the first timer corresponding to the second target terminal, wherein the second network is a forbidden network of the second target terminal, and the second network is a non-forbidden network of the first target terminal.
In this embodiment, the determining module 601 determines the duration of the first timer according to the principle that the first timer includes: if the second network and the first network are equivalent networks, the time length of the first timer corresponding to the first terminal is longer than the time length of the second timer corresponding to the second terminal, wherein the second network is a home network of the first terminal, and the first network is not the home network of the second terminal.
In this embodiment, the determining module 601 determines the duration of the first timer according to the principle that the first timer includes: the time length of the first timer corresponding to the first terminal is longer than that of the first timer corresponding to the second terminal, wherein the first network is a forbidden network of the second terminal, and the first network is a non-forbidden network of the first terminal.
The triggering device for network access in the embodiment of the application may be a device, or may be a component, an integrated circuit, or a chip in the network side device. The apparatus may be a network side device. By way of example, the network-side devices may include, but are not limited to, the types of network-side devices 12 listed above, and embodiments of the present application are not specifically limited.
The triggering device in the embodiment of the present application may be a device that may be a device having an operating system. The operating system may be an Android operating system, an ios operating system, or other possible operating systems, which are not specifically limited in the embodiments of the present application.
The triggering device provided in this embodiment of the present application may be a device capable of implementing each process implemented by the first network or the second network in the method embodiment of fig. 2 to 5, and achieve the same technical effects, so that repetition is avoided, and no further description is given here.
Optionally, as shown in fig. 7, the embodiment of the present application further provides a communication device 700, including a processor 701, a memory 702, and a program or an instruction stored in the memory 702 and capable of running on the processor 701, for example, when the communication device 700 is a network side device, the program or the instruction implements each process of the above-mentioned triggering method embodiment of network access when being executed by the processor 701, and the same technical effects can be achieved, so that repetition is avoided and redundant description is omitted herein.
Specifically, the embodiment of the application also provides network side equipment. As shown in fig. 8, the network device 800 includes: an antenna 801, a radio frequency device 802, and a baseband device 803. The antenna 801 is connected to a radio frequency device 802. In the uplink direction, the radio frequency device 802 receives information via the antenna 801, and transmits the received information to the baseband device 803 for processing. In the downlink direction, the baseband device 803 processes information to be transmitted, and transmits the processed information to the radio frequency device 802, and the radio frequency device 802 processes the received information and transmits the processed information through the antenna 801.
The above-described band processing means may be located in the baseband means 803, and the method performed by the first network or the second network in the above embodiments may be implemented in the baseband means 803, the baseband means 803 including the processor 804 and the memory 805.
The baseband device 803 may, for example, comprise at least one baseband board, on which a plurality of chips are disposed, as shown in fig. 8, where one chip, for example, a processor 804, is connected to the memory 805, so as to invoke a program in the memory 805 to perform the network device operations shown in the above method embodiment.
The baseband device 803 may further comprise a network interface 806 for interacting with the radio frequency device 802, such as a common public radio interface (common public radio interface, CPRI for short).
Specifically, the network side device of the embodiment of the present invention further includes: instructions or programs stored in the memory 805 and executable on the processor 804, the processor 804 invokes the instructions or programs in the memory 805 to perform the methods performed by the modules shown in fig. 6, and achieve the same technical effects, and are not described herein in detail to avoid repetition.
The embodiment of the present application further provides a readable storage medium, where a program or an instruction is stored on the readable storage medium, and when the program or the instruction is executed by a processor, the processes of the above-mentioned network access triggering method embodiment are implemented, and the same technical effects can be achieved, so that repetition is avoided, and no further description is given here.
The processor is a processor in the network side device described in the foregoing embodiment. The readable storage medium includes a computer readable storage medium such as a Read-Only Memory (ROM), a random access Memory (Random Access Memory, RAM), a magnetic disk or an optical disk, and the like.
The embodiment of the application further provides a chip, the chip includes a processor and a communication interface, the communication interface is coupled with the processor, the processor is configured to run a network side device program or instruction, implement each process of the above network access triggering method embodiment, and achieve the same technical effect, so that repetition is avoided, and no further description is provided here.
A computer program product is provided, where the computer program product includes a processor, a memory, and a program or an instruction stored in the memory and capable of running on the processor, where the program or the instruction when executed by the processor implements each process of the above-mentioned network access triggering method embodiment, and the same technical effects can be achieved, and for avoiding repetition, a description is omitted herein.
It should be understood that the chips referred to in the embodiments of the present application may also be referred to as system-on-chip chips, or the like.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element. Furthermore, it should be noted that the scope of the methods and apparatus in the embodiments of the present application is not limited to performing the functions in the order shown or discussed, but may also include performing the functions in a substantially simultaneous manner or in an opposite order depending on the functions involved, e.g., the described methods may be performed in an order different from that described, and various steps may also be added, omitted, or combined. Additionally, features described with reference to certain examples may be combined in other examples.
From the above description of the embodiments, it will be clear to those skilled in the art that the above-described embodiment method may be implemented by means of software plus a necessary general hardware platform, but of course may also be implemented by means of hardware, but in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art in the form of a software product stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk), comprising several instructions for causing a terminal (which may be a mobile phone, a computer, a server, or a network device, etc.) to perform the method described in the embodiments of the present application.
The embodiments of the present application have been described above with reference to the accompanying drawings, but the present application is not limited to the above-described embodiments, which are merely illustrative and not restrictive, and many forms may be made by those of ordinary skill in the art without departing from the spirit of the present application and the scope of the claims, which are also within the protection of the present application.

Claims (18)

1. A method for triggering network access, applied to a first network, the method comprising:
in the process that a target terminal receives service from a first network, determining that the target terminal needs to be accessed to a second network;
starting a first timer corresponding to the target terminal, wherein the duration of the first timers corresponding to the different terminals is not identical;
triggering the target terminal to attempt to access the second network under the condition that the first timer is overtime;
wherein, before starting the first timer, the method further comprises:
taking a random value in a preset range, and determining the duration of the first timer corresponding to the target terminal according to the random value; or alternatively, the first and second heat exchangers may be,
Determining the duration of the first timer according to target parameter information, wherein the target parameter information comprises at least one of the following:
identification information of the target terminal;
identification information of the first network;
subscription information of the target terminal;
identification information of the second network.
2. The method of claim 1, wherein determining that the target terminal needs to access a second network comprises:
the first network is found to start to have a disaster, and the second network can normally provide services.
3. The method of claim 1, wherein determining that the target terminal needs to access a second network comprises:
and determining that the second network is recovered to be normal, wherein the target terminal receives service from the second network before the second network is in disaster, and accesses the first network after the second network is in disaster.
4. The method of claim 1, wherein the subscription information of the target terminal comprises: and the priority of the target terminal, wherein the time length of the first timer corresponding to the terminal with higher priority is shorter.
5. The method of claim 1, wherein determining the first timer duration comprises: if the second network and the first network are equivalent networks, the duration of the first timer corresponding to the first terminal is smaller than that of the first timer corresponding to the second terminal, wherein the first network is a home network of the first terminal, and the first network is not the home network of the second terminal.
6. The method of claim 1, wherein determining the first timer duration comprises: the duration of the first timer corresponding to the first terminal is smaller than the duration of the first timer corresponding to the second terminal, wherein the second network is a forbidden network of the second terminal, and the second network is a non-forbidden network of the first terminal.
7. The method of claim 1, wherein determining the first timer duration comprises: if the second network and the first network are equivalent networks, the time length of the first timer corresponding to the first terminal is longer than the time length of the second timer corresponding to the second terminal, wherein the second network is a home network of the first terminal, and the second network is not the home network of the second terminal.
8. The method of claim 1, wherein determining the first timer duration comprises: the time length of the first timer corresponding to the first terminal is longer than that of the first timer corresponding to the second terminal, wherein the first network is a forbidden network of the second terminal, and the first network is a non-forbidden network of the first terminal.
9. A triggering device for network access, the device comprising:
a determining module, configured to determine, in a process that a target terminal receives a service from a first network, that the target terminal needs to access a second network;
the starting module is used for starting the first timers corresponding to the target terminals, wherein the duration of the first timers corresponding to the different terminals is not identical;
the triggering module is used for triggering the target terminal to try to access the second network under the condition that the first timer is overtime;
the determining module is further configured to take a random value in a predetermined range, and determine a duration of the first timer corresponding to the target terminal according to the random value; or alternatively, the first and second heat exchangers may be,
and the method is also used for determining the duration of the first timer according to target parameter information, wherein the target parameter information comprises at least one of the following:
identification information of the target terminal;
identification information of the first network;
subscription information of the target terminal;
identification information of the second network.
10. The apparatus of claim 9, wherein the means for determining that the target terminal needs to access a second network comprises:
The first network is found to start to have a disaster, and the second network can normally provide services.
11. The apparatus of claim 9, wherein the means for determining that the target terminal needs to access a second network comprises:
and determining that the second network is recovered to be normal, wherein the target terminal receives service from the second network before the second network is in disaster, and accesses the first network after the second network is in disaster.
12. The apparatus of claim 9, wherein the subscription information of the target terminal comprises: and the priority of the target terminal, wherein the time length of the first timer corresponding to the target terminal with higher priority is shorter.
13. The apparatus of claim 9, wherein the determining module determines the principle of the duration of the first timer comprises: if the second network and the first network are equivalent networks, the duration of the first timer corresponding to the first target terminal is smaller than the duration of the first timer corresponding to the second target terminal, wherein the first network is a home network of the first target terminal, and the first network is not the home network of the second target terminal.
14. The apparatus of claim 9, wherein the determining module determines the principle of the duration of the first timer comprises: the duration of the first timer corresponding to the first target terminal is smaller than the duration of the first timer corresponding to the second target terminal, wherein the second network is a forbidden network of the second target terminal, and the second network is a non-forbidden network of the first target terminal.
15. The apparatus of claim 9, wherein the determining module determines the principle of the duration of the first timer comprises: if the second network and the first network are equivalent networks, the time length of the first timer corresponding to the first terminal is longer than the time length of the second timer corresponding to the second terminal, wherein the second network is a home network of the first terminal, and the first network is not the home network of the second terminal.
16. The apparatus of claim 9, wherein the determining module determines the principle of the duration of the first timer comprises: the time length of the first timer corresponding to the first terminal is longer than that of the first timer corresponding to the second terminal, wherein the first network is a forbidden network of the second terminal, and the first network is a non-forbidden network of the first terminal.
17. A network side device comprising a processor, a memory and a program or instruction stored on the memory and executable on the processor, which when executed by the processor, implements the steps of the method of triggering network access according to any one of claims 1 to 8.
18. A readable storage medium, characterized in that it has stored thereon a program or instructions, which when executed by a processor, implement the steps of the triggering method for network access according to any of claims 1 to 8.
CN202011602990.8A 2020-12-29 2020-12-29 Triggering method and device for network access and network side equipment Active CN114698051B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202011602990.8A CN114698051B (en) 2020-12-29 2020-12-29 Triggering method and device for network access and network side equipment
PCT/CN2021/141697 WO2022143539A1 (en) 2020-12-29 2021-12-27 Network access trigger method and apparatus, and network-side device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011602990.8A CN114698051B (en) 2020-12-29 2020-12-29 Triggering method and device for network access and network side equipment

Publications (2)

Publication Number Publication Date
CN114698051A CN114698051A (en) 2022-07-01
CN114698051B true CN114698051B (en) 2024-01-26

Family

ID=82132112

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011602990.8A Active CN114698051B (en) 2020-12-29 2020-12-29 Triggering method and device for network access and network side equipment

Country Status (2)

Country Link
CN (1) CN114698051B (en)
WO (1) WO2022143539A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117641492A (en) * 2022-08-12 2024-03-01 维沃移动通信有限公司 Disaster roaming method, disaster roaming device, terminal, first communication equipment and second network

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1761220A (en) * 2004-10-11 2006-04-19 华为技术有限公司 Implementation method for reselecting network
EP2840862A1 (en) * 2013-08-19 2015-02-25 Koninklijke KPN N.V. Network selection method and user device configured for performing such a method

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107466080A (en) * 2017-08-22 2017-12-12 深圳市万普拉斯科技有限公司 Network reselection method, device, computer-readable recording medium and mobile terminal

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1761220A (en) * 2004-10-11 2006-04-19 华为技术有限公司 Implementation method for reselecting network
EP2840862A1 (en) * 2013-08-19 2015-02-25 Koninklijke KPN N.V. Network selection method and user device configured for performing such a method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
Addition of Key Issue on prevention of signalling overload in PLMNs without Disaster Condition for MINT;QUALCOMM INCORPORATED;3GPP TSG-CT WG1 Meeting #127-e C1-207684;第5.X.1节 *

Also Published As

Publication number Publication date
CN114698051A (en) 2022-07-01
WO2022143539A1 (en) 2022-07-07

Similar Documents

Publication Publication Date Title
CN109076446B (en) Access control method and device
JP6910445B2 (en) Communication methods, access network devices, and terminals
US11570750B2 (en) Method for paging, access network device, and terminal device
US11477722B2 (en) Changing access control parameters in a wireless network
RU2746891C1 (en) Mode of transition, network device and terminal device
EP3834467B1 (en) Method for handling of network slice overload
US20210345151A1 (en) Information reporting method, information receiving method, terminal device, and network device
EP3661278A1 (en) Method for paging, and access network device, terminal device and core network device
EP3993524A1 (en) Communication method and device
CN114698051B (en) Triggering method and device for network access and network side equipment
CN116711382A (en) Method and user equipment for handling communications in a satellite communications network
WO2021189254A1 (en) Method and apparatus for sidelink resource re-evaluation
US20230083832A1 (en) Information indication method and apparatus and communication device
EP3606181A1 (en) Method for terminal device to access network, terminal device and network device
US20190141678A1 (en) Method and apparatus for resource allocation
EP4221352A1 (en) Network change method and apparatus, and terminal
CN112470501A (en) Paging message processing method and device
US20230111158A1 (en) Method and apparatus for suspending secondary cell group
WO2022027639A1 (en) Signal receiving method, signal sending method, terminal device and storage medium
CN112423317B (en) Different network switching processing method, information configuration method, user equipment and network equipment
WO2023150962A1 (en) Methods and apparatuses for handling a relay link with tau and rnau in l2 u2n relay case
CN111294844B (en) Beam failure recovery method, user terminal and computer-readable storage medium
CN114554624A (en) Communication indication method, device and network side equipment
CN114698017A (en) Information reporting method and device and network side equipment
JP2023538692A (en) Method and apparatus for beam failure detection and recovery in sidelinks

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant