CN116347542A - Cell access method, device and storage medium - Google Patents

Cell access method, device and storage medium Download PDF

Info

Publication number
CN116347542A
CN116347542A CN202111609704.5A CN202111609704A CN116347542A CN 116347542 A CN116347542 A CN 116347542A CN 202111609704 A CN202111609704 A CN 202111609704A CN 116347542 A CN116347542 A CN 116347542A
Authority
CN
China
Prior art keywords
cell
random access
network system
forbidden
disabling
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111609704.5A
Other languages
Chinese (zh)
Inventor
吴诚
罗志
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Mobile Software Co Ltd
Original Assignee
Beijing Xiaomi Mobile Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xiaomi Mobile Software Co Ltd filed Critical Beijing Xiaomi Mobile Software Co Ltd
Priority to CN202111609704.5A priority Critical patent/CN116347542A/en
Publication of CN116347542A publication Critical patent/CN116347542A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA
    • H04W74/0833Random access procedures, e.g. with 4-step access
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/08Reselecting an access point
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/16Performing reselection for specific purposes
    • H04W36/18Performing reselection for specific purposes for allowing seamless reselection, e.g. soft reselection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/24Reselection being triggered by specific parameters
    • H04W36/30Reselection being triggered by specific parameters by measured or perceived connection quality data
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present disclosure relates to a cell access method, apparatus and storage medium, to solve the problems in the related art, and reduce repeated access to an unsuccessfully camped cell in the cell access process. The method comprises the following steps: initiating random access to a first cell, and determining a random access result to the first cell, wherein the network system of the first cell is a first network system; if the random access result meets a preset condition, disabling the first cell and initiating random access to a second cell, wherein the network system of the second cell is a second network system, and the access priority of the second network system is lower than that of the first network system; and after the random access to the second cell is successful, the second cell is resided.

Description

Cell access method, device and storage medium
Technical Field
The disclosure relates to the field of communication technologies, and in particular, to a cell access method, a cell access device and a storage medium.
Background
With the rapid development of 5GNR (New Radio), 5G related products are gradually coming into the public's view. Because the construction of the 5G independent network is at the initial stage of 5G network construction at present, the construction of the 5G independent network is not perfect, and compared with the 5G network, the 4G network is relatively stable.
Disclosure of Invention
To overcome the problems in the related art, the present disclosure provides a cell access method, apparatus, and storage medium.
According to a first aspect of an embodiment of the present disclosure, there is provided a cell access method, including:
initiating random access to a first cell, and determining a random access result to the first cell, wherein the network system of the first cell is a first network system;
if the random access result meets a preset condition, disabling the first cell and initiating random access to a second cell, wherein the network system of the second cell is a second network system, and the access priority of the second network system is lower than that of the first network system;
after the random access to the second cell is successful, residing in the second cell;
optionally, if the random access result meets a preset condition, disabling the first cell includes:
if the random access to the first cell fails, determining the number of times of the random access failure to the first cell;
and when the number of times of random access failure to the first cell is greater than or equal to a preset threshold value, the first cell is forbidden.
Optionally, if the random access result meets a preset condition, disabling the first cell includes:
if the random access to the first cell is successful, a radio resource control connection request is sent to a base station corresponding to the first cell;
determining whether feedback information of the base station for the radio resource control connection request is received;
and if the feedback information is not received, disabling the first cell.
Optionally, the method further comprises:
and if the feedback information is received, disabling the first cell when the feedback information characterizes that the radio resource control connection cannot be established with the base station.
Optionally, the method further comprises:
and if the forbidden time length of the first cell is greater than or equal to the forbidden time length threshold, the forbidden of the first cell is released.
Optionally, after camping on the second cell, the method further comprises:
when the terminal equipment is in an idle state, if the forbidden duration of the first cell is smaller than the forbidden duration threshold, initiating random access to a third cell, wherein the network system of the third cell is the first network system;
And if the random access to the third cell is successful, switching the resident cell from the second cell to the third cell, and releasing the disabling of the first cell.
Optionally, when determining that the terminal device is in the idle state, if the forbidden duration of the first cell is less than the forbidden duration threshold, initiating random access to a third cell, including:
when the terminal equipment is in an idle state, if the tracking area code of the second cell is detected to be changed, or a base station corresponding to the second cell is received to instruct the terminal equipment to switch to a cell of a first network system, random access is initiated to the third cell when the forbidden duration of the first cell is smaller than the forbidden duration threshold.
According to a second aspect of embodiments of the present disclosure, there is provided a cell access device, comprising:
the determining module is configured to initiate random access to a first cell and determine a random access result to the first cell, wherein the network system of the first cell is a first network system;
the disabling module is configured to disable the first cell and initiate random access to a second cell when the random access result meets a preset condition, wherein the network system of the second cell is a second network system, and the access priority of the second network system is lower than that of the first network system;
And the residence module is configured to reside in the second cell after the random access to the second cell is successful.
According to a third aspect of embodiments of the present disclosure, there is provided a cell access device, comprising:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to:
initiating random access to a first cell, and determining a random access result to the first cell, wherein the network system of the first cell is a first network system;
if the random access result meets a preset condition, disabling the first cell and initiating random access to a second cell, wherein the network system of the second cell is a second network system, and the access priority of the second network system is lower than that of the first network system;
and after the random access to the second cell is successful, the second cell is resided.
According to a fourth aspect of embodiments of the present disclosure, there is provided a computer readable storage medium having stored thereon computer program instructions which, when executed by a processor, implement the steps of the cell access method provided by the first aspect of the present disclosure.
The technical scheme provided by the embodiment of the disclosure can comprise the following beneficial effects: after random access is initiated to a first cell, determining a random access result to the first cell, and disabling the first cell when the random access result meets a preset condition, wherein the network system of the first cell is a first network system. And in order to ensure the internet function of the user, when the random access result meets the preset condition, initiating random access to a second cell, and after the random access to the second cell is successful, residing the second cell, wherein the network system of the second cell is a second network system. The access priority of the second network system is lower than that of the first network system. By adopting the method, when the random access result meets the preset condition, the first cell is forbidden, repeated access to the first cell when the first cell cannot be successfully resided can be reduced, communication resources are saved, and power consumption of terminal equipment in the cell access process is reduced.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the disclosure and together with the description, serve to explain the principles of the disclosure.
Fig. 1 is a flow chart illustrating a method of cell access according to an exemplary embodiment.
Fig. 2 is a flow chart illustrating a method of cell access according to another exemplary embodiment.
Fig. 3 is a block diagram illustrating a cell access device according to an example embodiment.
Fig. 4 is a block diagram illustrating a cell access device according to an example embodiment.
Detailed Description
Reference will now be made in detail to exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numbers in different drawings refer to the same or similar elements, unless otherwise indicated. The implementations described in the following exemplary examples are not representative of all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with some aspects of the present disclosure as detailed in the accompanying claims.
In the related art, for some terminal products that can use 4G and 5G, in order to enable users to enjoy the benefits of 5G surfing, operators typically set the terminal products to access 5G cells preferentially according to the related protocols. Under the condition that the 5G cell is prioritized, if the terminal equipment cannot access the 5G cell, the 4G cell can be accessed to ensure the internet surfing function of the user. While the terminal device is in idle state, the accessible 5G cell may be searched again so that a handover from a 4G cell to a 5G cell may be made. In this way, although the terminal equipment can be ensured to reside in the optimal cell (namely, the 5G cell) to the maximum extent, the situation that the terminal equipment fails to access the 5G cell frequently occurs due to imperfect construction of the 5G independent networking. If the terminal device is switched to the 4G cell after the access to the 5G cell fails, and the terminal device is in an idle state, the terminal device may try to access the 5G cell again under the condition that no other accessible 5G cell is nearby, and the access may still fail, so that the terminal device repeatedly accesses the 5G cell in a cyclic manner, which causes unnecessary power consumption of the terminal device.
Accordingly, the present disclosure provides a cell access method, device and storage medium to solve the problems in the related art.
Fig. 1 is a flowchart illustrating a cell access method according to an exemplary embodiment, which is used in a terminal as shown in fig. 1, and includes the following steps.
In step S101, random access is initiated to a first cell, and a random access result to the first cell is determined.
The network system of the first cell is a first network system.
In the field of communication technology, an area to be covered by a communication network may be divided into a plurality of cells, and a corresponding base station is set up in each cell to provide services for user equipment within the range of the cell. The user equipment can be a mobile phone, a tablet, a personal business assistant, a notebook and other terminal equipment. When the terminal equipment used by the user is in the range of a certain cell, the connection of the base station corresponding to the cell can be established by initiating random access to the cell.
Illustratively, random access is initiated to a first cell and a random access result for the first cell is determined. Wherein, the random access result comprises random access success and random access failure. It should be noted that, if random access to the first cell fails, the terminal device cannot camp on the first cell. If the random access to the first cell is successful, a radio resource control (Radio Resource Control, RRC) request may be sent to the base station corresponding to the first cell to obtain the service provided by the base station. If the transmitted radio resource control request does not get the response of the base station or the base station refuses the radio resource control request, the terminal device cannot acquire the service provided by the base station. In this case the terminal device is still unable to camp on the first cell. If the random access to the first cell is successful and an RCC connection is established with the base station by sending a radio resource control request, the terminal device may camp on the first cell and acquire the service provided by the base station.
In step S102, if the random access result meets a preset condition, the first cell is disabled and random access is initiated to the second cell.
The network system of the second cell is a second network system, and the access priority of the second network system is lower than that of the first network system.
The first network system may be a 5G network system, and the second network system may be a 4G network system, which is not specifically limited in the present disclosure, as long as the access priority of the second network system is lower than that of the first network system.
It should be understood that if the random access result of the first cell meets the preset condition, it indicates that there may be a problem of network abnormality in the first cell, which causes the terminal device to be unable to access the cell. At this time, the neighboring cell of the first cell may be searched, and when the neighboring cell of the first cell is searched, random access is initiated to the neighboring cell. If the random access result of the neighbor cell does not meet the preset condition, the neighbor cell can be resided. If the neighbor cell of the first cell is not searched, or the random access result of the neighbor cell meets the preset condition, random access can be initiated to the second cell in order to ensure the internet function of the user. The network system of the second cell is a second network system. The access priority of the second network system is lower than that of the first network system.
In step S103, after the random access to the second cell is successful, the second cell is camped.
It should be noted that, because the first network system is adopted in the first cell, the network speed of the first cell may be higher than that of the second cell. However, the base station arrangement of the second cell may be more sophisticated than that of the first cell, that is, the probability of successful random access to the second cell and camping on the second cell is higher. Because the network speed of the first cell adopting the first network system is higher than that of the second cell adopting the second network system, the cell adopting the first network system can be considered as the optimal cell.
In the present disclosure, if random access to the second cell is successful, the second cell may be camped on.
It should be noted that, in the related art, if the random access to the first cell fails, the second cell is switched in. And after the second cell is resided, if the terminal equipment is in an idle state, the random access to the first cell is restarted. In case that the cause of the random access failure of the first cell is not eliminated, the terminal device may repeatedly initiate the random access to the first cell, thereby causing unnecessary power consumption of the terminal device. In the technical scheme provided by the embodiment of the disclosure, under the condition that the random access result of the first cell meets the preset condition, the first cell is forbidden, so that repeated access of the terminal equipment to the first cell when the terminal equipment resides in the second cell and is in an idle state is reduced, unnecessary power consumption of the terminal equipment is effectively reduced, and heating and high power consumption of the terminal equipment are avoided.
That is, by adopting the method of the present disclosure, by disabling the first cell when the random access result satisfies the preset condition, repeated access to the first cell can be reduced, communication resources can be saved, and power consumption of the terminal device in the cell access process can be reduced.
Alternatively, the step S102 may be: if the random access to the first cell fails, determining the number of times of the random access to the first cell, and when the number of times of the random access to the first cell is greater than or equal to a preset threshold value, disabling the first cell.
That is, if the random access to the first cell fails, it may be determined whether to disable the first cell according to the number of times of the random access to the first cell fails.
It can be appreciated that if the result of random access to the first cell fails, the terminal device cannot camp on the first cell. In this case, in order to reduce the error, to avoid disabling the first cell due to some temporary anomalies that cause random access failures, it may be determined whether to disable the first cell based on the number of random access failures to the first cell.
For example, the first cell may be disabled when the number of random access failures to the first cell is greater than or equal to a preset threshold. The preset threshold may be set according to an actual situation, and if the preset threshold is set to 1 time, the first cell is immediately disabled when the random access of the first cell fails. If the preset threshold is set to be other value larger than 1, the first cell can be disabled when the random access of the first cell fails for a plurality of times. Therefore, the first cell can be prevented from being forbidden due to some temporary anomalies which cause random access failure, and the control accuracy of the cell access is improved.
Optionally, the step S102 may further be: if the random access to the first cell is successful, the radio resource control connection request is sent to the base station corresponding to the first cell, whether the feedback information of the base station aiming at the radio resource control connection request is received is determined, and if the feedback information is not received, the first cell is forbidden.
That is, if the random access to the first cell is successful, it may be determined whether to disable the first cell according to whether feedback information sent by the base station corresponding to the first cell is received.
It can be understood that if the random access result to the first cell is successful, the terminal device sends a radio resource control request to the base station corresponding to the first cell, so as to obtain the service provided by the base station. However, if the transmitted radio resource request does not get the response of the base station, it may indicate that there may be a network abnormality in the current first cell, which causes the terminal device to be unable to establish a radio resource control connection with the base station. In this case, the first cell may be disabled when no feedback information is received. In a possible manner, to reduce the error and avoid disabling the first cell due to some transient anomalies that result in a failure to establish a radio resource control connection with the base station, the first cell may be disabled when none of the radio resource requests sent within the preset time period has received a response from the base station, i.e. the first cell is disabled when no feedback information has been received within the preset time period.
Optionally, the step S102 may further be: if the random access to the first cell is successful, a radio resource control connection request is sent to a base station corresponding to the first cell, whether feedback information of the base station aiming at the radio resource control connection request is received is determined, and if the feedback information is received, the first cell is forbidden when the feedback information characterizes that the radio resource control connection cannot be established with the base station.
That is, if the random access to the first cell is successful and the feedback information transmitted by the base station is received, it may be determined whether to disable the first cell according to the content characterized by the feedback information.
It can be understood that if the random access result to the first cell is successful, the terminal device sends a radio resource control request to the base station corresponding to the first cell, so as to obtain the service provided by the base station. After the terminal device transmits the radio resource control request to the base station, feedback information transmitted by the base station for the radio resource control request may be received. When the feedback information sent by the base station indicates that the radio resource control connection cannot be established with the base station, the current base station may be indicated to have reached an upper limit on the connection with other terminal equipment, or other problems that cause the radio resource control connection cannot be established in the current base station may exist. In this case, the first cell may be disabled directly to avoid the terminal device repeatedly sending a radio resource control request to the base station in case the base station has a problem, thereby avoiding unnecessary power consumption of the terminal device.
Optionally, the method provided by the embodiment of the present disclosure may further include:
and if the forbidden time length of the first cell is greater than or equal to the forbidden time length threshold, the forbidden of the first cell is released.
It should be noted that, whether the problem that the first cell occurs and makes the terminal device unable to access the cell, or the problem that the base station corresponding to the first cell occurs and makes the terminal device unable to establish a radio resource control connection with the base station, these problems may be temporary, and these temporary problems may be naturally improved or manually solved after a period of time, so that the terminal device may access the first cell, and/or the radio resource control connection of the base station corresponding to the first cell may be established. On this basis, it is obviously not preferable to always disable the first cell. Instead, the disabling of the first cell may be released when the disabling time period of the first cell is greater than or equal to the disabling time period threshold. Thus, the first cell or the abnormal base station corresponding to the first cell can be successfully accessed and resided in the first cell when the abnormal base station is eliminated.
Optionally, after the step S103, the method provided by the embodiment of the present disclosure may further include:
When the terminal equipment is in an idle state, if the forbidden duration of the first cell is smaller than the forbidden duration threshold, initiating random access to a third cell, wherein the network system of the third cell is the first network system.
If the random access to the third cell is successful, the resident cell is switched from the second cell to the third cell, and the disabling of the first cell is released.
It can be appreciated that, when the terminal device resides in the second cell and is in the idle state, in order to make the terminal device reside in the optimal cell (i.e. the cell adopting the first network system) to the maximum extent, the terminal device may search the first cell again and perform random access. In the present disclosure, since the first cell is already disabled, when it is determined that the terminal device is in an idle state and the disabling time period for the first cell is less than the disabling time period threshold, the network searching can be performed for the third cell and random access can be performed. The network system of the third cell is the first network system. After the random access to the third cell is successful, the cell in which the terminal equipment resides can be switched from the second cell to the third cell, so that the terminal equipment resides in an optimal cell, and better service is provided for the user. In case the internet function of the user has been secured by camping on the third cell, the disabling of the first cell may be released.
Furthermore, it should be noted that there may be a plurality of third cells, and when the disabling time period of the first cell is less than the disabling time period threshold, the first cell may not be included in the range of searching for the third cell. When the forbidden time length of the first cell is greater than or equal to the forbidden time length threshold, the first cell can be included in the range of searching the third cell for the network. After searching the third cell, a target third cell can be determined, and random access is initiated to the target third cell, wherein the target third cell can be the cell with the strongest signal detected by the terminal equipment at the current position.
Optionally, when determining that the terminal device is in the idle state, if the disabling duration of the first cell is less than the disabling duration threshold, initiating random access to the third cell may include:
when the terminal equipment is in an idle state, if the tracking area code of the second cell is detected to be changed, or the base station corresponding to the second cell is received to instruct the terminal equipment to switch to the cell of the first network system, when the forbidden duration of the first cell is smaller than the forbidden duration threshold, random access is initiated to the third cell.
It should be noted that there may be a plurality of first cells and second cells. The cell in which the terminal device initiates random access may be the cell in which the signal detected by the terminal device at the current location is strongest. Therefore, if the location of the terminal device is changed, the cell with the strongest signal may be changed.
On the basis, aiming at the current position of the terminal equipment, the first cell of the terminal equipment initiating random access can be the first cell with the strongest signal, and if the random access result of the terminal equipment to the first cell meets the preset condition, the second cell initiating random access and residing can be the second cell with the strongest signal. Accordingly, if the location of the terminal device is changed, both the first cell and the second cell with the strongest signals may be changed for the terminal device with the changed location. If the terminal equipment initiates random access to the changed first cell, the terminal equipment is likely to successfully access and camp on the changed first cell. In this case, in order to make the terminal device reside in the optimal cell (i.e., the cell adopting the first network system) to the maximum extent, thereby providing better service for the user, when it is detected that the location of the terminal device is changed, and the disabling time period of the first cell is less than the disabling time period threshold, random access is initiated to the third cell. The third cell may be a cell with the strongest signal for the terminal device after the change of location.
It should be noted that whether the location of the terminal device has changed may be determined by detecting whether the tracking area code of the second cell has changed. The tracking area code (Tacking area code, TAC) is a code of a Tracking Area (TA), which is an area composed of neighboring cells, and each cell belongs to a tracking area. When the tracking area changes, the cell in which the terminal device is located also changes.
In addition, when the terminal device resides in the second cell and is in the idle state, the base station corresponding to the second cell may detect whether the terminal device has the condition of accessing the first network system. On the basis, if the second cell detects that the terminal equipment has the condition of accessing the first network system, the base station corresponding to the second cell can send a cell switching instruction to the terminal equipment, and the cell switching instruction can be used for indicating the terminal equipment to switch to the cell of the first network system. If the terminal device has a component accessing the first network system, the terminal device can be considered to have a condition of accessing the first network system.
Therefore, when the base station corresponding to the second cell is received to instruct the terminal equipment to switch to the cell of the first network system, and the forbidden duration of the first cell is smaller than the forbidden duration threshold, random access can be initiated to the third cell.
The step S102 may further include: and adding the information of the first cell into a forbidden cell list.
Wherein the forbidden cell list is used for storing information of forbidden cells. Accordingly, disabling the first cell may include: and deleting the information of the first cell in the forbidden cell list.
It should be noted that disabling the first cell may be achieved by adding information of the first cell to the disabled cell list. The forbidden cell list is used for storing forbidden cell information, and the forbidden cell information can comprise identification information, forbidden conditions, forbidden solution conditions and the like. It will be appreciated that the identification information may be used to identify different first cells. The disabling condition may be a preset condition that causes the first cell to be added to the forbidden cell list, such as at least one condition of the first cell random access failure, the first cell random access success but not receiving feedback information of the base station, and the first cell random access success and the received feedback information of the base station indicating that an RRC connection cannot be established with the base station, as described above. The disable-release condition may be that the disable time length of the first cell is greater than or equal to the disable time length threshold, or that the terminal device successfully resides in the third cell.
It will be appreciated that in the case where disabling a first cell is implemented by adding information of the first cell to a forbidden cell list, disabling the first cell may be implemented by deleting the information of the first cell from the forbidden cell list.
By the method, when the random access result of the first cell meets the preset condition, the first cell is forbidden, repeated access to the first cell when the first cell cannot be successfully resided is reduced, communication resources are saved, and power consumption of terminal equipment in the cell access process is reduced.
Fig. 2 is a flow chart illustrating a method of cell access according to another exemplary embodiment, as shown in fig. 2, including the following steps.
In step S201, random access is initiated to a first cell, where the network system of the first cell is a 5G network system.
In step S2011, it is determined whether the random access is successful, if so, step S2012 is entered, otherwise step S2014 is entered. The network system of the second cell is a 4G network system, and the access priority of the 4G network system is lower than that of the 5G network system.
In step S2012, the number of random access failures to the first cell is determined.
In step S2013, if the number of random access failures to the first cell is greater than or equal to the preset threshold, step S202 is performed.
In step S2014, a radio resource control connection request is transmitted to the base station corresponding to the first cell.
In step S2015, it is determined whether feedback information of the base station for the radio resource control connection request is received, and if not, the process proceeds to step S2016, otherwise, the process proceeds to step S2017.
In step S2016, if no feedback information is received, the process proceeds to step S202.
In step S2017, if feedback information is received and the feedback information indicates that a radio resource control connection cannot be established with the base station, the process proceeds to step S202.
In step S202, the first cell is disabled and random access is initiated to the second cell.
In step S203, if the random access to the second cell is successful, the second cell is camped.
In step S204, it is determined whether the terminal device is in an idle state, if the terminal device is not in an idle state, step S2041 is entered, otherwise step S205 is entered.
In step S2041, camping on the second cell is continued.
In step S205, it is determined whether the forbidden duration for the first cell is less than a forbidden duration threshold. If yes, go to step S206, otherwise go to step S208.
In step S206, random access is initiated to the third cell, where the network system of the third cell is a 5G network system.
In step S207, the random access to the third cell is successful, the camping cell is switched from the second cell to the third cell, and the disabling of the first cell is released.
In step S208, the disabling of the first cell is released.
The specific embodiments of the above steps are illustrated in detail above, and will not be repeated here. It should be further understood that for the above method embodiments, which are described as a series of combinations of actions for simplicity of description, those skilled in the art will appreciate that the above described embodiments are of a preferred embodiment and the steps involved are not necessarily required by the present disclosure.
After initiating random access to the 5G cell, the method determines the random access result to the 5G cell, and disables the 5G cell when the random access result meets the preset condition. In order to ensure the internet function of the user, when the random access result meets the preset condition, initiating random access to the 4G cell, and after the random access to the 4G cell is successful, residing in the 4G cell. By adopting the method, when the 5G cell cannot be successfully resided and the random access result of the 5G cell meets the preset condition, the 5G cell is forbidden, repeated access to the 5G cell when the 5G cell cannot be successfully resided is reduced, communication resources are saved, and power consumption of terminal equipment in the cell access process is reduced.
Fig. 3 is a block diagram of a cell access device, according to an example embodiment. Referring to fig. 2, the apparatus 100 includes a determination module 101, a disabling module 102, and a resident module 103.
The determining module 101 is configured to initiate random access to a first cell, and determine a random access result to the first cell, where a network system of the first cell is a first network system;
the disabling module 102 is configured to disable the first cell and initiate random access to a second cell when the random access result meets a preset condition, where a network system of the second cell is a second network system, and an access priority of the second network system is lower than that of the first network system;
the camping module 103 is configured to camp on the second cell after random access to the second cell is successful.
By the device, after random access is initiated to the first cell, the random access result of the first cell is determined, and when the random access result meets the preset condition, the first cell is forbidden, and the network system of the first cell is the first network system. And in order to ensure the internet function of the user, when the random access result meets the preset condition, initiating random access to a second cell, and after the random access to the second cell is successful, residing the second cell, wherein the network system of the second cell is a second network system. The access priority of the second network system is lower than that of the first network system. By adopting the device disclosed by the invention, when the random access result meets the preset condition, the first cell is forbidden, repeated access to the first cell when the first cell cannot be successfully resided is reduced, communication resources are saved, and power consumption of terminal equipment is reduced.
Optionally, the disabling module 102 is further configured to:
determining the number of times of random access failure to the first cell when the random access to the first cell fails;
and when the number of random access failures to the first cell is greater than or equal to a preset threshold value, disabling the first cell.
Optionally, the disabling module 102 is further configured to:
when the random access to the first cell is successful, a radio resource control connection request is sent to a base station corresponding to the first cell;
determining whether feedback information of the base station for the radio resource control connection request is received;
and if the feedback information is not received, disabling the first cell.
Optionally, the apparatus 100 further comprises a processing module configured to:
if the feedback information is received, disabling the first cell when the feedback information characterizes that a radio resource control connection cannot be established with the base station.
Optionally, the apparatus 100 further includes a first disabling module configured to:
and when the forbidden time length of the first cell is greater than or equal to the forbidden time length threshold, the first cell is forbidden.
Optionally, the apparatus 100 further comprises a second disabling module configured to:
After the second cell is resided, when the terminal equipment is in an idle state, if the forbidden duration of the first cell is smaller than the forbidden duration threshold, initiating random access to a third cell, wherein the network system of the third cell is the first network system;
if the random access to the third cell is successful, the resident cell is switched from the second cell to the third cell, and the disabling of the first cell is released.
Optionally, the second disabling module is further configured to:
when the terminal equipment is in an idle state, if the tracking area code of the second cell is detected to be changed, or a base station corresponding to the second cell is received to instruct the terminal equipment to switch to the cell of the first network system, when the forbidden duration of the first cell is smaller than the forbidden duration threshold, random access is initiated to the third cell.
The specific manner in which the various modules perform the operations in the apparatus of the above embodiments have been described in detail in connection with the embodiments of the method, and will not be described in detail herein.
The present disclosure also provides a computer readable storage medium having stored thereon computer program instructions which, when executed by a processor, implement the steps of the cell access method provided by the present disclosure.
Fig. 4 is a block diagram illustrating an apparatus 200 for cell access according to an example embodiment. For example, apparatus 200 may be a mobile phone, computer, digital broadcast terminal, messaging device, game console, tablet device, medical device, exercise device, personal digital assistant, or the like.
Referring to fig. 4, the apparatus 200 may include one or more of the following components: a processing component 202, a memory 204, a power component 206, a multimedia component 208, an audio component 210, an input/output (I/O) interface 212, a sensor component 214, and a communication component 216.
The processing component 202 generally controls overall operation of the apparatus 200, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations. The processing component 202 may include one or more processors 220 to execute instructions to perform all or part of the steps of the cell access method described above. Further, the processing component 202 can include one or more modules that facilitate interactions between the processing component 202 and other components. For example, the processing component 202 may include a multimedia module to facilitate interaction between the multimedia component 208 and the processing component 202.
The memory 204 is configured to store various types of data to support operations at the apparatus 200. Examples of such data include instructions for any application or method operating on the device 200, contact data, phonebook data, messages, pictures, videos, and the like. The memory 204 may be implemented by any type or combination of volatile or nonvolatile memory devices such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disk.
The power component 206 provides power to the various components of the device 200. The power components 206 may include a power management system, one or more power sources, and other components associated with generating, managing, and distributing power for the device 200.
The multimedia component 208 includes a screen between the device 200 and the user that provides an output interface. In some embodiments, the screen may include a Liquid Crystal Display (LCD) and a Touch Panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive input signals from a user. The touch panel includes one or more touch sensors to sense touches, swipes, and gestures on the touch panel. The touch sensor may sense not only the boundary of a touch or slide action, but also the duration and pressure associated with the touch or slide operation. In some embodiments, the multimedia component 208 includes a front-facing camera and/or a rear-facing camera. The front camera and/or the rear camera may receive external multimedia data when the apparatus 200 is in an operation mode, such as a photographing mode or a video mode. Each front camera and rear camera may be a fixed optical lens system or have focal length and optical zoom capabilities.
The audio component 210 is configured to output and/or input audio signals. For example, the audio component 210 includes a Microphone (MIC) configured to receive external audio signals when the device 200 is in an operational mode, such as a call mode, a recording mode, and a voice recognition mode. The received audio signals may be further stored in the memory 204 or transmitted via the communication component 216. In some embodiments, audio component 210 further includes a speaker for outputting audio signals.
The I/O interface 212 provides an interface between the processing assembly 202 and peripheral interface modules, which may be keyboards, click wheels, buttons, etc. These buttons may include, but are not limited to: homepage button, volume button, start button, and lock button.
The sensor assembly 214 includes one or more sensors for providing status assessment of various aspects of the apparatus 200. For example, the sensor assembly 214 may detect the on/off state of the device 200, the relative positioning of the components, such as the display and keypad of the device 200, the sensor assembly 214 may also detect a change in position of the device 200 or a component of the device 200, the presence or absence of user contact with the device 200, the orientation or acceleration/deceleration of the device 200, and a change in temperature of the device 200. The sensor assembly 214 may include a proximity sensor configured to detect the presence of nearby objects in the absence of any physical contact. The sensor assembly 214 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications. In some embodiments, the sensor assembly 214 may also include an acceleration sensor, a gyroscopic sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
The communication component 216 is configured to facilitate communication between the apparatus 200 and other devices in a wired or wireless manner. The device 200 may access a wireless network based on a communication standard, such as WiFi,2G or 3G, or a combination thereof. In one exemplary embodiment, the communication component 216 receives broadcast signals or broadcast related information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, the communication component 216 further includes a Near Field Communication (NFC) module to facilitate short range communications. For example, the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, infrared data association (IrDA) technology, ultra Wideband (UWB) technology, bluetooth (BT) technology, and other technologies.
In an exemplary embodiment, the apparatus 200 may be implemented by one or more Application Specific Integrated Circuits (ASICs), digital Signal Processors (DSPs), digital Signal Processing Devices (DSPDs), programmable Logic Devices (PLDs), field Programmable Gate Arrays (FPGAs), controllers, microcontrollers, microprocessors, or other electronic elements for performing the above-described cell access methods.
In an exemplary embodiment, a non-transitory computer readable storage medium is also provided, such as memory 204, comprising instructions executable by processor 220 of apparatus 200 to perform the above-described cell access method. For example, the non-transitory computer readable storage medium may be ROM, random Access Memory (RAM), CD-ROM, magnetic tape, floppy disk, optical data storage device, etc.
In another exemplary embodiment, a computer program product is also provided, comprising a computer program executable by a programmable apparatus, the computer program having code portions for performing the above-described cell access method when executed by the programmable apparatus.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure. This application is intended to cover any adaptations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It is to be understood that the present disclosure is not limited to the precise arrangements and instrumentalities shown in the drawings, and that various modifications and changes may be effected without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.

Claims (10)

1. A method of cell access, comprising:
initiating random access to a first cell, and determining a random access result to the first cell, wherein the network system of the first cell is a first network system;
If the random access result meets a preset condition, disabling the first cell and initiating random access to a second cell, wherein the network system of the second cell is a second network system, and the access priority of the second network system is lower than that of the first network system;
and after the random access to the second cell is successful, the second cell is resided.
2. The method of claim 1, wherein disabling the first cell if the random access result satisfies a preset condition comprises:
if the random access to the first cell fails, determining the number of times of the random access failure to the first cell;
and when the number of times of random access failure to the first cell is greater than or equal to a preset threshold value, the first cell is forbidden.
3. The method of claim 1, wherein disabling the first cell if the random access result satisfies a preset condition comprises:
if the random access to the first cell is successful, a radio resource control connection request is sent to a base station corresponding to the first cell;
determining whether feedback information of the base station for the radio resource control connection request is received;
And if the feedback information is not received, disabling the first cell.
4. A method according to claim 3, characterized in that the method further comprises:
and if the feedback information is received, disabling the first cell when the feedback information characterizes that the radio resource control connection cannot be established with the base station.
5. The method according to any one of claims 1-4, further comprising:
and if the forbidden time length of the first cell is greater than or equal to the forbidden time length threshold, the forbidden of the first cell is released.
6. The method according to any of claims 1-4, wherein after camping on the second cell, the method further comprises:
when the terminal equipment is in an idle state, if the forbidden duration of the first cell is smaller than the forbidden duration threshold, initiating random access to a third cell, wherein the network system of the third cell is the first network system;
and if the random access to the third cell is successful, switching the resident cell from the second cell to the third cell, and releasing the disabling of the first cell.
7. The method of claim 6, wherein when determining that the terminal device is in the idle state, if the forbidden duration for the first cell is less than the forbidden duration threshold, initiating random access for a third cell comprises:
When the terminal equipment is in an idle state, if the tracking area code of the second cell is detected to be changed, or a base station corresponding to the second cell is received to instruct the terminal equipment to switch to a cell of a first network system, random access is initiated to the third cell when the forbidden duration of the first cell is smaller than the forbidden duration threshold.
8. A cell access device, comprising:
the determining module is configured to initiate random access to a first cell and determine a random access result to the first cell, wherein the network system of the first cell is a first network system;
the disabling module is configured to disable the first cell and initiate random access to a second cell when the random access result meets a preset condition, wherein the network system of the second cell is a second network system, and the access priority of the second network system is lower than that of the first network system;
and the residence module is configured to reside in the second cell after the random access to the second cell is successful.
9. A cell access device, comprising:
a processor;
A memory for storing processor-executable instructions;
wherein the processor is configured to:
initiating random access to a first cell, and determining a random access result to the first cell, wherein the network system of the first cell is a first network system;
if the random access result meets a preset condition, disabling the first cell and initiating random access to a second cell, wherein the network system of the second cell is a second network system, and the access priority of the second network system is lower than that of the first network system;
and after the random access to the second cell is successful, the second cell is resided.
10. A computer readable storage medium having stored thereon computer program instructions, which when executed by a processor, implement the steps of the method of any of claims 1 to 7.
CN202111609704.5A 2021-12-24 2021-12-24 Cell access method, device and storage medium Pending CN116347542A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111609704.5A CN116347542A (en) 2021-12-24 2021-12-24 Cell access method, device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111609704.5A CN116347542A (en) 2021-12-24 2021-12-24 Cell access method, device and storage medium

Publications (1)

Publication Number Publication Date
CN116347542A true CN116347542A (en) 2023-06-27

Family

ID=86890319

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111609704.5A Pending CN116347542A (en) 2021-12-24 2021-12-24 Cell access method, device and storage medium

Country Status (1)

Country Link
CN (1) CN116347542A (en)

Similar Documents

Publication Publication Date Title
US20230300793A1 (en) Method for sending paging cause and method for acquiring paging cause
CN111465078B (en) Wireless network searching method and device and storage medium
CN108496390B (en) Data transmission method and device in unauthorized cell, base station and user equipment
CN106792937B (en) Method and device for processing call request
CN109804662B (en) Bandwidth part switching method and device
CN107094094B (en) Application networking method and device and terminal
KR102436552B1 (en) Cell type indication method, apparatus and computer readable storage medium
CN105357735B (en) Method and device for accessing cell
CN109451840B (en) Cell residence method and device and user equipment
US11197192B2 (en) Network connection management method, device and system
CN109314902B (en) Access control method, device and storage medium
CN110268746B (en) Cell switching method and device, switching configuration method and device and user equipment
CN105227426B (en) Application interface switching method and device and terminal equipment
CN106201738B (en) System broadcast calling method and device
CN108632939B (en) Paging method, paging device and computer readable storage medium
CN114449542B (en) Cell registration method, device and medium
CN106792570B (en) Positioning method and device
CN114339904B (en) Cell switching method, cell switching device and storage medium
CN116347542A (en) Cell access method, device and storage medium
CN113873614B (en) Access control limiting method and device
CN112187326A (en) Antenna control method, device, equipment and storage medium
CN116828405B (en) Short message transmission method and device, storage medium, terminal and network equipment
CN109565890B (en) Competition random access method and device
CN116582880B (en) Signal intensity detection method and device, electronic equipment and storage medium
WO2023221142A1 (en) Reselection priority determination method and apparatus, and reselection priority configuration sending method and apparatus

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination