CN1223226C - Control and processing method for access probing - Google Patents

Control and processing method for access probing Download PDF

Info

Publication number
CN1223226C
CN1223226C CN 02131029 CN02131029A CN1223226C CN 1223226 C CN1223226 C CN 1223226C CN 02131029 CN02131029 CN 02131029 CN 02131029 A CN02131029 A CN 02131029A CN 1223226 C CN1223226 C CN 1223226C
Authority
CN
China
Prior art keywords
access
user
exploration
access exploration
control
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN 02131029
Other languages
Chinese (zh)
Other versions
CN1486107A (en
Inventor
郑平方
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN 02131029 priority Critical patent/CN1223226C/en
Publication of CN1486107A publication Critical patent/CN1486107A/en
Application granted granted Critical
Publication of CN1223226C publication Critical patent/CN1223226C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Abstract

The present invention relates to a control and processing method for access probing in the technical field of computer and communication, which a control and processing method for access probing. The present invention is characterized in that a threshold value is set, and maximum connecting access probing time is obtained; the time of customer access probing is controlled by comparing that whether an access probing counter is smaller than the maximum connecting access probing. The present invention uses a probability assessment method, introduces the concept of access probing blocking probability, uses reasonable mechanism to limit the times of corresponding continuous access probing, increases the reliability of system design and causes resources of mobile terminals to be reasonably and effectively utilized on the basis of ensuring certain continuous access probing mechanism control effect.

Description

A kind of control and treatment method of access exploration
Technical field
The present invention relates to the computer and the communications field, relate in particular to the access control applied technical field.
Background technology
Relevant prior art field, at first introduce several technological concepts involved in the present invention:
Random access procedure: before user and system set up professional the connection, need on a shared channel, send some for setting up the essential information of professional connection earlier to system.Because the moment that the user initiates to insert is at random, so generally this process is called " random access procedure ".In random access procedure, common one or more shared channel that uses of a plurality of users, consider that the user initiates to insert randomness constantly, a plurality of users may produce access demand simultaneously, if do not take some technical finesses, then a plurality of users' access attempts will be failed because of mutual access collision.Therefore, when system design, often adopt some technology to reduce to insert the probability of collision.Access exploration technology mentioned in this article promptly is one of common technology.
Access exploration: access exploration is meant after the user produces access demand, do not produce access attempts immediately, but produce a random number by the user earlier, and this random number and a threshold value receiving from system compared, just allow to initiate access attempts satisfying under system's defined terms, otherwise after then will waiting for certain hour, repeat above-mentioned process again, just initiate access attempts until satisfying system's defined terms.System determines this threshold value according to the current access customer charge situation of system, and therefore, by threshold value and user's access exploration process rationally is set, system can reach the purpose of regulating load, reducing the access collision.
Therefore and probability that can not busy channel the blocking probability of access exploration: in communication system, blocking probability generally is meant under the channel resource condition of limited, and when number of users was very big, each user.Usually definition blocking probability value is between 0.01-0.05.Equally, the blocking probability of access exploration is defined as the user in random access procedure, fails probability by access exploration.The blocking probability of access exploration can dynamically be adjusted according to the service scenario (grade) that system provides for the user and determine.
In existing computer and communication system, the basic process of access exploration is as follows:
(1) system is provided with a threshold value, is made as P for the purpose of convenient the description, and P belongs to [V1, V2], and this parameter is relevant with the load of system usually.And system is by necessarily being sent to user side by way of the parameter with this threshold value P and calculating V1, V2.
(2) user before initiating an access attempts, produces a random number R at every turn at random between [V1, V2].
(3) user compares this random number R and threshold value P, determine with certain rule whether the user can send an access attempts at current time, typical rule as regulation: if R more than or equal to P, then allows can send access attempts this user of current time, the user enters access procedure (4); Otherwise do not allow this user to send access attempts, return (2) and repeat process, till this access exploration success at current time.
(4) enter the access exploration process this user of current time, send access attempts.
As can be seen, the user is to the not directly restriction of number of times of access exploration from above-mentioned access exploration control procedure.
In access procedure, if the user is to the not directly restriction of number of times of test, may produce a lot of harmful effects to system design, the typical case is as when system loading is very big, system wishes by the access that threshold value P blocks other user is set, at this moment, P is made as 0, because the random number R that the user produces may be 0 hardly, if to the not directly restriction of number of times of access exploration, then the user can repeat down always, but this meaning that repeats to have lost access exploration, because the chance of success that inserts is possibility hardly, therefore waste user's resource.This situation is especially limited to the portable terminal calculation resources, the influence of energy supply limited devices is bigger.
Summary of the invention
For this reason, purpose of the present invention proposes a kind of rational access exploration processing method exactly, makes the resource of portable terminal obtain rationally and effectively utilizing.
The present invention is a kind of control and treatment method of access exploration, comprising following steps:
A, a threshold value is set, and the blocking probability of selected access exploration, this threshold value and related operation parameter are sent to user side;
B, user obtain maximum access exploration number of times continuously according to the blocking probability of described related operation parameter and access exploration, and with continuous access exploration counter O reset;
C, produce a random number, and continuous access exploration counter is added 1;
D, user with this random number and this threshold ratio determine whether the user can send an access attempts at current time; If meet the rule of setting, then enter step f, if do not meet, then enter step e;
Whether e, more continuous access exploration counter less than the continuous access exploration number of times of maximum, if comparative result is for being to return step c; If comparative result is not, then process ends;
F, this user enter access procedure, send access attempts.
The control and treatment method of described access exploration, wherein said steps d, judge by following rule:
If this random number more than or equal to this threshold value, then allows this user to send access attempts, the user enters step f; Otherwise, do not allow this user to send access attempts, enter step e.
The control and treatment method of described access exploration, the continuous access exploration number of times of wherein said maximum M
Figure C0213102900061
M is maximum access exploration number of times continuously, is the result of rounding operation, P 0Be the blocking probability of access exploration, N is a system parameters.
The control and treatment method of described access exploration, wherein said threshold value belong to [V1, V2], and V1, V2 are positive integers, V1≤V2.
The control and treatment method of described access exploration, wherein said random number belong to [V1, V2], and V1, V2 are positive integers, V1≤V2.
The control and treatment method of described access exploration, wherein said random number belong to [V1, V2], and V1, V2 are obtained by following formula:
V1+ (V2-V1) * random (x), wherein random (x) is the canonical function that the random number that provides of system takes place, x is the numerical value that can import arbitrarily.
Compare with prior art from the above mentioned, as can be seen: on the one hand, the present invention has kept the advantage of traditional access exploration technology, in addition, the present invention utilizes the probability Estimation method, on the basis that guarantees certain traditional access exploration technology control effect, introduce the control and treatment method of the blocking probability of access exploration, with reasonable mechanism corresponding access exploration number of times is continuously limited, increased the reliability of system design, avoided the unnecessary consumption of system resource, and, implementation of the present invention is simple, utilizes system's existing information parameter, does not increase the too much expense of system substantially.
Description of drawings
Fig. 1 is the continuous access exploration process handling process of user in the embodiment of the invention.
Embodiment
Below in conjunction with Figure of description the specific embodiment of the present invention is described.
The control and treatment method of access exploration of the present invention can be divided into following step and carry out:
A, system are provided with a threshold value, are made as P for the purpose of convenient the description, and P belongs to [V1, V2], and this parameter is relevant with the load of system usually.System is by necessarily being sent to user side by way of the parameter with this threshold value P and calculating V1, V2.Wherein, V1 and V2 relation, can be V1 less than V2, also can be equal.
B, user reach the blocking probability P of selected access exploration according to system's set-point 0, obtain maximum access exploration number of times M continuously, and the continuous access exploration counter of initialization Count=0, wherein M can be obtained by following formula:
Figure C0213102900071
Wherein, M is maximum access exploration number of times continuously, P 0Be the blocking probability of the access exploration selected, N is a system parameters, and wherein N, V1, these parameters of V2, Po all are the situations such as resource that network equipment can be used according to active user's load, system, determines according to complicated algorithm very, is not isolatedly to determine.And these parameters mainly are the resource management functions of system equipment, and it doesn't matter with the algorithm controls of mobile terminal side, and portable terminal only need use these parameters just passable.For purposes of the invention, the also parameter that mainly is to use these system equipments to send, specifically these parameters are that what how to obtain is not the emphasis of being concerned about.
C, user before initiating an access attempts, produce a random number R at random, and Count are added 1 at every turn between [V1, V2].Wherein, the method that random number produces is a lot, obtain [V1, V2] between random number R, can adopt following formula to generate: V1+ (V2-V1) * random (x), general procedure is such as the canonical function random (x) that all provides random number to take place in the c program, this function produces any random number between 0~1, and wherein x can import arbitrarily.
D, user compare this random number R and threshold value P, determine with certain rule whether the user can send an access attempts at current time, if meet the rule of setting, then enters step f, if do not meet, then enters step e.
Typical case as regulation: if R more than or equal to P, then allows can send access attempts this user of current time, the user enters and inserts step f; Otherwise do not allow this user to send access attempts, then enter and insert step e at current time;
In addition, if the P value not in the scope of [V1, V2], in the following several ways:
(1) P>V2, the random number R of generation belongs to [V1, V2], and then R<P sets up forever, and then this portable terminal can not take place to insert at random, that is to say, and system forbids that this user inserts;
(2) P<V1, then R>P sets up forever, and then random access procedure will take place in this portable terminal after selecting random number for the first time;
(3) for the situation of P=V1=V2, because random number R also can only equal V1 or V2, then after selecting random number for the first time random access procedure just takes place;
(4) for V1<P<V2, then to see the random number R of generation and the comparison of P, in the time of R>P, then random access procedure can take place.
If whether e, comparison Count for be, then show system also do not surpass predetermined threshold value, can also again initiate access attempts less than M, like this, return step c and repeat process; If for not, show that system surpasses or equals predetermined threshold value, then finishes access procedure.
F, enter access procedure, send access attempts this user of current time.Like this, just, avoided the generation of Infinite Cyclic situation by the mode of this setting threshold.
Below in conjunction with example, a concrete access procedure.Assumed condition is:
(1) system is provided with threshold value P=0 according to current access load condition, N=4 (N is used to calculate the scope [V1, V2] that randomizer produces random number, the scope that the randomizer that calculates in this example produces random number for [0,1 ..., 2 N-1]); System sends to user terminal by air-interface information;
(2) user produces even distribution normalized parameter R, and R is an integer, and belong to [0,1 ..., 2 N-1].
(3) the blocking probability Po=0.01 of access exploration.
As shown in Figure 1, be the handling process of user's continuous access exploration, as can be seen, one embodiment of the present of invention can comprise step:
A, system are provided with a threshold value P=0, N=4, and system is sent to user side by air-interface information with threshold value P, N.
B, the continuous access exploration counter of user's initialization Count=0.And according to given N value and blocking probability Po, calculate the maximum number of times M of access exploration continuously, its computational process is as follows:
Suppose that adopting equally distributed mode to produce produces normalization random integers R at random, scope be [0,1 ..., 2 N-1], the probability P of an access exploration R=0 then 1For:
P 1 = 1 2 N
So probability P of access exploration R ≠ 0 1:
P 1 ′ = 1 - P 1 = 1 - 1 2 N
Suppose that each access exploration is separate, then the probability P of continuous n R ≠ 0 nFor:
P n ′ = ( P 1 ′ ) n = ( 1 - 1 2 N ) n
According to the supposition of present embodiment, blocking probability Po is the probability of M test R ≠ 0 in this example, promptly is the P of n when equaling maximum access exploration number of times M continuously nSo:
P O = P M ′ = ( 1 - 1 2 N ) M
Thereby:
Figure C0213102900095
In this example, substitution parameter Po, N can get: M=72
(c) user is at every turn before initiating an access attempts, [0,1 ..., 2 N-1] produces normalization random integers R at random in equally distributed mode between, and Count is added 1.
(d) user with this random number R and 0 relatively determines with certain rule whether the user can send an access attempts at current time, regulation: if R more than or equal to P, then allows can send access attempts this user of current time, the user enters and inserts step f; Otherwise do not allow this user to send access attempts, enter step e at current time.
(e) relatively whether Count, then returns c and repeats process if be not greater than M; If for being, ending said process then.
(f) enter access procedure this user of current time, send access attempts.
According to the scheme that present embodiment proposes, following subordinate list has provided under the blocking probability of different access explorations, the maximum correspondence table of access exploration number of times continuously of random number range parameter N and M.(equally distributed randomizer is adopted in supposition)
When below providing continuous access exploration blocking probability Po and be between 0.005-0.05 modal value, the corresponding relation of the maximum access exploration number of times of random number range parameter N and M.Its computing formula is:
During Po=0.05:
N 1 2 3 4 5 6
M 5 11 23 47 95 191
During Po=0.02:
N 1 2 3 4 5 6
M 6 14 30 61 124 249
During Po=0.01:
N 1 2 3 4 5 6
M 7 17 35 72 146 293
During Po=0.005:
N 1 2 3 4 5 6
M 8 19 40 83 167 337
According to the above, for the present invention utilizes the probability Estimation method, introduce the notion of access exploration blocking probability, on the basis that guarantees the certain mechanism of access exploration continuously control effect, with reasonable mechanism the corresponding number of times of access exploration is continuously limited, increased the reliability of system design, made the resource of portable terminal rationally effectively obtain utilizing.
The above; only be the preferable embodiment of the present invention; but protection scope of the present invention is not limited thereto, and simple modification and equivalent structure that any person skilled in the art uses specification of the present invention and accompanying drawing content to be done change, and all should be encompassed in protection scope of the present invention.Therefore, protection scope of the present invention should be as the criterion with the protection range of claims.

Claims (6)

1, a kind of control and treatment method of access exploration, its feature may further comprise the steps:
A, a threshold value is set, and the blocking probability of selected access exploration, this threshold value and related operation parameter are sent to user side;
B, user obtain maximum access exploration number of times continuously according to the blocking probability of described related operation parameter and access exploration, and with continuous access exploration counter O reset;
C, produce a random number, and continuous access exploration counter is added 1;
D, user with this random number and this threshold ratio determine whether the user can send an access attempts at current time; If meet the rule of setting, then enter step f, if do not meet, then enter step e;
Whether e, more continuous access exploration counter less than the continuous access exploration number of times of maximum, if comparative result is for being to return step c; If comparative result is not, then process ends;
F, this user enter access procedure, send access attempts.
2, the control and treatment method of access exploration as claimed in claim 1 is characterized in that described steps d, judges by following rule:
If this random number more than or equal to this threshold value, then allows this user to send access attempts, the user enters step f; Otherwise, do not allow this user to send access attempts, enter step e.
3, the control and treatment method of access exploration as claimed in claim 1 is characterized in that the continuous access exploration number of times of described maximum
Figure C021310290002C1
Wherein M is maximum access exploration number of times continuously, is the result of rounding operation, P 0Be the blocking probability of access exploration, N is a system parameters.
4, as the control and treatment method of claim 1 or 2 or 3 described access explorations, it is characterized in that described threshold value belongs to [V1, V2], wherein, V1, V2 are positive integers, V1≤V2.
5, as the control and treatment method of claim 1 or 2 or 3 described access explorations, it is characterized in that described random number belongs to [V1, V2], wherein, V1, V2 are positive integers, V1≤V2.
6, as the control and treatment method of claim 1 or 2 or 3 described access explorations, it is characterized in that described random number belongs to [V1, V2], wherein V1, V2 are obtained by following formula: V1+ (V2-V1) * random (x), wherein random (x) is the canonical function that the random number that provides of system takes place, and x is the numerical value that can import arbitrarily.
CN 02131029 2002-09-24 2002-09-24 Control and processing method for access probing Expired - Fee Related CN1223226C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 02131029 CN1223226C (en) 2002-09-24 2002-09-24 Control and processing method for access probing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 02131029 CN1223226C (en) 2002-09-24 2002-09-24 Control and processing method for access probing

Publications (2)

Publication Number Publication Date
CN1486107A CN1486107A (en) 2004-03-31
CN1223226C true CN1223226C (en) 2005-10-12

Family

ID=34144747

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 02131029 Expired - Fee Related CN1223226C (en) 2002-09-24 2002-09-24 Control and processing method for access probing

Country Status (1)

Country Link
CN (1) CN1223226C (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101114873B (en) * 2006-07-26 2011-03-30 华为技术有限公司 Load control method and apparatus in random access process
CN101132622B (en) * 2006-08-20 2010-05-12 华为技术有限公司 Random access service quality control method
US9155104B2 (en) * 2012-03-15 2015-10-06 Via Telecom Co., Ltd. Device and method for access probe enhancements
CN104219773B (en) * 2013-05-29 2018-02-16 中国电信股份有限公司 Reverse access probe method for sending information and device

Also Published As

Publication number Publication date
CN1486107A (en) 2004-03-31

Similar Documents

Publication Publication Date Title
CN1097412C (en) Management method for extra expenses channel in mobile telecommunication system
CN1086095C (en) Packet switched radio channel admission control in cellular telecommunication system
CN1126410C (en) Methods of initiating reconfiguring of cell in mobile radio network
CN110297698B (en) Multi-priority dynamic current limiting method, device, server and storage medium
CN1835453A (en) Method of realizing load sharing in distributing system
CN1260917C (en) A control method for random access
CN1856148A (en) Management of business processing resourse in communication system
CN1223226C (en) Control and processing method for access probing
CN1231074C (en) Method of dynamic allocating radio channel resource for mobile station
CN108834175B (en) Queue-driven equipment access and resource allocation joint control method in mMTC network
CN1200852A (en) Method for adaptively switching between PCS authentication schemes
CN1382357A (en) Authentication of subscriber station
CN1885832A (en) Packet scheduling method and device for wireless communication system
CN1364038A (en) Communication system and resources division method
CN1202679C (en) Method for shearing capacity in CDMA mobile radio communication system
CN102158416B (en) Method and equipment for processing messages based on memory allocation
CN1863360A (en) Method and apparatus for managing resource in network
CN1719793A (en) Method for allocating channel resources
CN1553647A (en) Method for building permanent virtual connection
CN1852603A (en) Method and apparatus for dudging high-speed downward grouped access-in admittance
CN1889378A (en) Channel power distributing method in 3G mobile communication system
CN1283056C (en) Channel code resource utilization method in broadband CDMA system
CN113127208A (en) Method for limiting user access service based on thread
CN108810909B (en) Cell merging method, cell merging control device and network controller
CN1826009A (en) Method for establishing connection between access network and access terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20051012

Termination date: 20200924