WO2011035706A1 - 一种应用于请求接入基站的接入方法及基站 - Google Patents

一种应用于请求接入基站的接入方法及基站 Download PDF

Info

Publication number
WO2011035706A1
WO2011035706A1 PCT/CN2010/077130 CN2010077130W WO2011035706A1 WO 2011035706 A1 WO2011035706 A1 WO 2011035706A1 CN 2010077130 W CN2010077130 W CN 2010077130W WO 2011035706 A1 WO2011035706 A1 WO 2011035706A1
Authority
WO
WIPO (PCT)
Prior art keywords
base station
access
rnti
message
relay node
Prior art date
Application number
PCT/CN2010/077130
Other languages
English (en)
French (fr)
Inventor
张军平
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2011035706A1 publication Critical patent/WO2011035706A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/002Transmission of channel access control information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA
    • H04W74/0833Random access procedures, e.g. with 4-step access
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/04Large scale networks; Deep hierarchical networks
    • H04W84/042Public Land Mobile systems, e.g. cellular systems
    • H04W84/047Public Land Mobile systems, e.g. cellular systems using dedicated repeater stations

Definitions

  • the embodiments of the present invention relate to the field of communications, and in particular, to an access method and a base station applied to requesting access to a base station.
  • a User Equipment In a wireless communication system, a User Equipment (UE), or a mobile terminal, needs to access the UE when the UE needs to communicate with the base station.
  • the UE may initiate an access request by itself, or may be initiated by the base station first, and then the UE initiates the request.
  • the prior art has at least the following disadvantages:
  • the base station In the process of the UE accessing the base station, once the base station receives the access request, the UE can successfully access the base station, if there are other
  • the base station also agrees that the device accesses the base station, that is, the base station blindly agrees to the request to access the base station, and if a large number of UEs or other devices access the base station at the same time, This will result in a large workload for the base station after access.
  • An embodiment of the present invention provides an access method and a base station applied to request a base station to prevent a base station from blindly agreeing to request to access a base station.
  • an access method for applying to an access base station is provided, the party The law includes:
  • the base station returns a random access response to the object requesting access to the base station
  • the relay node is accessed to the base station.
  • a base station is further provided, where the base station includes: a receiving unit, a sending unit, an identifying unit, and a management unit; the receiving unit is configured to receive a random access request sent by an object requesting access to the base station The sending unit is configured to return a random access response to the object requesting access to the base station;
  • the receiving unit is further configured to: after the sending unit returns a random access response to the object that requests the accessing the base station, and receive an uplink scheduling access message that is sent by the object that requests the accessing the base station;
  • the identifying unit is configured to identify, according to a value of a space bit in an RRC Connection Reques message in the uplink scheduling access message, an object that requests to access a base station;
  • the management unit is configured to: when the object that is requested to access the base station is identified as a relay node, select the relay node to access the base station.
  • the base station Determining, by the value of the space bit in the Connect ion Reques t message, the object of the clearing access base station; if it is determined that the object of the requesting access base station is a relay node, accessing the relay node to the base station, Therefore, the base station can identify the object to be accessed, and after identifying the accessed object, the object to be accessed can be reasonably selected, thereby preventing the base station from blindly agreeing to the request to access the base station.
  • FIG. 1 is a flowchart of a first embodiment of an access method applied to a requesting access base station according to an embodiment of the present invention
  • FIG. 2 is a specific implementation timing diagram of a first embodiment of an access method applied to a requesting access base station according to an embodiment of the present invention
  • FIG. 3 is a flowchart of a second embodiment of an access method applied to requesting access to a base station according to an embodiment of the present invention
  • FIG. 4 is a specific implementation timing diagram of a second embodiment of an access method applied to a requesting access base station according to an embodiment of the present invention
  • FIG. 5 is a flowchart of a third embodiment of an access method applied to requesting access to a base station according to an embodiment of the present invention
  • FIG. 6 is a first implementation timing diagram of a third embodiment of an access method applied to a requesting access base station according to an embodiment of the present invention
  • FIG. 2 is a second implementation timing diagram of a third embodiment of an access method applied to requesting access to a base station according to an embodiment of the present invention
  • FIG. 8 is a fourth embodiment of an access method applied to requesting access to a base station according to an embodiment of the present invention.
  • FIG. 9 is a first specific implementation timing diagram of a fourth embodiment of an access method applied to a requesting access base station according to an embodiment of the present invention.
  • FIG. 10 is a second specific implementation timing diagram of a fourth embodiment of an access method applied to a requesting access base station according to an embodiment of the present invention.
  • FIG. 11 is a structural diagram of an access system applied to a requesting access base station according to an embodiment of the present invention
  • FIG. 12 is a structural diagram of a base station according to an embodiment of the present invention
  • FIG. 13 is a structural diagram of a relay node according to an embodiment of the present invention. detailed description
  • an LTE (Long Term Evolution) communication system is taken as an example for description.
  • a base station Evolve Node Base, eNB
  • multiple relay nodes. Relay node, RN
  • UE user terminals
  • the second mode is: the UE can communicate with the RN first, and then communicate with the base station through the RN.
  • the third mode is: when the UE directly communicates with the base station, the RN monitors or listens to the communication between the UE and the base station, and when the quality of the communication channel between the UE and the base station is not good, or is poor, the RN cooperates. Communication between the UE and the base station.
  • the RN can monitor multiple UEs.
  • the RN if the RN needs to access the base station in the current communication network, the RN has two ways of accessing the base station, one is based on the non-contention random access base station, and the other is based on the random access.
  • the RN Into the base station, and in the process based on the contention of the random access base station, further comprising the initial access based on the contention random access base station and the non-initial access based on the contention random access base station.
  • the base station needs to identify the object requesting access to the base station, and select the object to access the base station by using the system's predetermined priority access principle.
  • the UE also has an RN-like access to the base station, but only when the UE and the RN are simultaneously connected, in the process of accessing, the base station needs to determine and identify, and select between the UE and the RN.
  • the RN is in a non-contention based random access mode.
  • the base station knows the information of the RN, and the access mode is that the base station first sends an assigned random access sequence to the RN. Then, the RN sends a random access request message, and then the base station sends a random access response, that is, the base station uses a RA-RNTI (Random Access Radio Network Temporary Identifier) to scramble the PDCCH (Physical Downlink Control Channel, The physical downlink control channel transmits a random access response (RAR) to the RN.
  • the RAR may include a TEMPORARY C-RNTI (Cell Radio Network Temporary Identifier) and UL Grant information. At this point, it indicates that the access is complete.
  • the RN or the UE actively initiates an access request to the base station, and then the base station identifies and confirms the object that initiates the access request, that is, confirms that the access request is initiated.
  • the object is RN or UE.
  • the base station selects the object of the access request according to the priority access principle.
  • FIG. 1 is a flowchart of a first embodiment of an access method applied to a requesting access base station according to an embodiment of the present invention.
  • FIG. 1 is a flow chart of initial access based on a contention random access base station.
  • the base station before the relay node initially accesses the base station, the base station cannot know whether the object requested to access the base station is the RN or the UE.
  • Step S100 The base station receives a random access request message sent by the RN.
  • the random access request message includes a Preamble sequence.
  • the base station may receive a random access request sent by multiple RNs.
  • Step S102 the base station returns a random access response to the RN.
  • the base station uses the RA-RNTI (Random Access Radio Network Temporary Identifier) to the RN (Physical Downlink Control Channel) to the RN.
  • RA-RNTI Random Access Radio Network Temporary Identifier
  • the RN Physical Downlink Control Channel
  • RAR may include TEMPORARY C-RNTI and UL Grant information.
  • the RN after receiving the random access response sent by the base station, the RN generates a Scheduled Up Link Transmission message, where the uplink scheduling access message includes an RRC Connection Request message, and the RRC Connection Reques
  • the space bit in the t message is set to 1, and is sent to the base station according to the UL Grant (Up Link Grant) message indication.
  • the space bit in the RRC (Radio Resource Control) Connection Request message is set to 1, and the object used to identify the clearing access base station is a relay node, and is used for the base station to distinguish the request.
  • the object that enters the base station is the RN or the UE.
  • Step S104 The base station receives an uplink scheduling access message sent by the relay node.
  • Step S106 The base station determines a value of a space bit in an RRC Connection Request message in the uplink scheduling access information.
  • the base station determines that the value of the space bit in the RRC Connection Request message in the uplink scheduling access information is 1, it may be determined that the object of the current clearing access base station is a relay node.
  • the RRC Connection Request message The NAS (Non-Acces s St tum, Non-Access Stratum) identifier of the RN may be included. Certainly, the principle of identification may be set in the base station.
  • the object of the clearing access base station is set to
  • the RN may also set the object to be requested to access the base station as the UE, or may set the object of the access base station to be the RN when the value of the space bit in the RRC Connection Reques t message in the uplink scheduling access information is 0.
  • the object that requests access to the base station may also be set to the UE.
  • the base station needs to maintain the same standard principle as the RN and the UE.
  • Step S108 The base station determines to connect the relay node to the base station according to the priority access principle.
  • the priority access principle of the base station includes preferentially selecting the RN or preferentially selecting the UE.
  • the base station can use one of the principles as the current selection principle according to the current communication network conditions.
  • the base station can adjust the current selection principle to meet the needs of the communication network.
  • the preference is made to RN as the first priority principle. Therefore, in this embodiment, if the base station currently preferentially selects R, the base station will use the initiia 1 RN-1 dentity in the RRC Connection Reques t message as the message for resolving the access, that is, the AS identity of the R is used as the solution access.
  • the message that solves the access may also be referred to as a collision processing message.
  • the RN is sent through the Temporary C-RNTI.
  • the base station when the base station sends a message for resolving access to the RN through the Temporary C-RNTI, it can be considered that the base station agrees that the RN accesses the base station.
  • the eNB also manages the RN as a successfully accessed RN, that is, saves the C-RNTI of the successfully accessed R.
  • the Temporary C-RNTI can be used to demodulate the message for resolving the access, and the NAS identifier of the RN is taken out and the NAS identifier of the RN is used. Compare to determine if you are successfully accessing. If the same, Then determine that you have successfully accessed the base station. After the RN determines that it has successfully accessed the base station, set the TEMPORARY C-RNTI to C-RNTL.
  • the eNB and the UE need to send the uplink scheduling access message of the base station.
  • the s ace bit in the RRC Connect i on Reque st message is set to 1, for identifying that the object requesting access to the base station is a relay node, and the base station determines the space in the RRC Connection Request message in the uplink scheduling access information. The value of the bit is used to identify whether the current request for access is an RN.
  • the RN When it is determined to be an RN, the RN is determined to access the base station according to the priority principle, so that the base station can identify the object requested to be accessed, and identify the access. After the object, the object to be accessed can be reasonably selected, so that the base station can blindly agree to the request to access the base station, and the workload of the base station when the UE and the RN simultaneously access the base station can be reduced.
  • FIG. 2 is a specific implementation timing diagram of a first embodiment of an access method applied to a requesting access base station according to an embodiment of the present invention.
  • the RN when the time is N, the RN sends a random access sequence (Preamble sequence;) to the base station.
  • the base station sends the RN (Physical Downlink Control Channel) to the RN through the RA-RNTI plus the Physic Downlink Control Channel (Physical Downlink Control Channel).
  • RAR Physical Downlink Control Channel
  • the RN demodulates the RAR information through the RA-RNTI and saves the TEMPORARY C-RNTI.
  • the RN needs to send an uplink scheduling access message to the base station.
  • the uplink scheduling access message includes an RRC Connection Request message, and the space bit in the RRC Connection Request message is set to 1.
  • the RN sends an uplink scheduling access message to the base station.
  • the base station determines the value of the space bit in the RRC Connect i on Reque st message in the uplink scheduling access information.
  • the base station will RRC the RRC.
  • the initialRN-Identity is used as the message for resolving the access
  • the NAS identifier of the R is used as the message for resolving the access.
  • the RN is sent through the Temporary C-RNTI.
  • the R is managed as an RN with successful access, that is, the C-RNTI of the RN that successfully accesses is saved.
  • FIG. 3 is a flowchart of a second embodiment of an access method applied to a requesting access base station according to an embodiment of the present invention.
  • FIG. 3 is a flow chart of the RN non-initial access based on the contention random access base station, that is, the RN once accesses the base station, and now re-requests the access base station.
  • the base station receives the random access request message sent by the RN.
  • the random access request message includes a Pr eamb 1 e sequence.
  • the base station may receive a random access request sent by multiple RNs.
  • Step S302 the base station returns a random access response to the RN.
  • the base station uses the RA-RNTI (Random Access Radio Network Temporary Identifier) to the RN (Physical Downlink Control Channel) to the RN.
  • RA-RNTI Random Access Radio Network Temporary Identifier
  • the RN Physical Downlink Control Channel
  • RAR may include TEMPORARY C-RNTI and UL Grant information.
  • the RN after receiving the random access response sent by the base station, the RN generates a scheduled uplink link (Scheduled Up Link Transmission) message, where the message includes the C-RNTI of the RN.
  • the RN has visited the base station, and this time it is re-accessing the base station. Therefore, the C-RNTI of the RN is sent to the base station according to the UL Grant indication.
  • Step S304 the base station receives an uplink scheduling access message sent by the relay node.
  • Step S306 determining whether the RN has accessed the base station.
  • the base station matches the C-RNTI in the uplink scheduling access information with the C-RNTI of the saved RN to determine whether the RN is Once connected to the base station. If the C-RNTI in the uplink scheduling access information is the same as the C-RNTI of the saved RN, the RN has accessed the base station.
  • Step S3Q8 If it is determined that the RN has accessed the base station, the RN is selected to access the base station.
  • the base station sends a message for resolving access to the RN through the C-RNTI.
  • R Demodulation by C-RNTI The message that resolves the access is retrieved, and the NAS identifier of the RN is compared with its own NAS identifier to determine whether it is successfully accessed. If they are the same, it is determined that they themselves successfully access the base station.
  • the RN if the RN is in the non-initial access base station, when the RN requests to access the base station, after receiving the random access response returned by the base station, the RN needs to send the uplink scheduling access message of the base station.
  • the RRC Connect i on Reques t message includes a C-RNTI of the RN, and is used to determine whether the RN has accessed the base station. If it is determined that the RN has accessed the base station, the RN is selected to access the base station, so that the base station can be identified.
  • the object to be accessed, and after identifying the object to be accessed, can reasonably select the object to be accessed, thereby preventing the base station from blindly agreeing to the request to access the base station, and reducing the number of UEs and RNs simultaneously accessing the base station When, the base station's workload.
  • FIG. 4 is a specific implementation timing diagram of a second embodiment of an access method applied to a requesting access base station according to an embodiment of the present invention.
  • the RN when the time is N, the RN sends a random access sequence, that is, a Preamble sequence, to the base station.
  • the base station transmits the RAR to the RN through the RA-RNTI scrambling PDCCH (Phys i ca l Downl Int Contr chan Chan l).
  • the RN demodulates the RAR information by using the RA-RNTI.
  • the RN transmits an uplink scheduling access message including the RN-RNTI to the base station. After receiving the uplink scheduling access message sent by the RN, the base station determines whether the RN has accessed the base station.
  • FIG. 5 is a flowchart of a third embodiment of an access method applied to requesting access to a base station according to an embodiment of the present invention.
  • FIG. 5 is a flowchart of initial access by the RN and the UE based on the contention random access base station.
  • both the RN and the UE need to request access to the base station.
  • the base station receives the access request sent by the RN and the UE at the same time.
  • the base station cannot know whether the object requesting access to the base station is an RN or a UE.
  • Step S500 The base station receives a random access request sent by the RN and the UE.
  • the base station may receive a random access request sent by multiple RNs and multiple UEs.
  • Step S502 The base station returns a random access response to the RN and the UE.
  • the RN after receiving the random access response sent by the base station, the RN generates a scheduled uplink transmission (Scheduled Up Link Transmission) message, and the uplink scheduling access message includes an RRC Connection Request message, and the RRC Connection Request message is obtained.
  • the space bit in the message is set to 1, and is sent to the base station according to the UL Grant (Up Link Grant) message indication.
  • the space bit in the RRC Connection Request message is set to 1, and the object used to identify the access base station is a relay node, and the object used by the base station to distinguish the request to access the base station is the RN.
  • the UE after receiving the random access response sent by the base station, the UE generates an uplink scheduled access (Scheduled Up Link Transmission) message, where the uplink scheduling access message includes an RRC Connection Request message, and the RRC Connection Request message
  • the space bit is set to 0, and is sent to the base station according to the UL Grant (Up Link Grant) message indication.
  • the space bit in the RRC Connection Request message is set to 0, which is used to identify that the object to be requested to access the base station is a relay node, and the object used for the base station to distinguish the request to access the base station is the UE.
  • Step S504 The base station receives an uplink scheduling access message sent by the RN and the UE.
  • Step S506 Determining the value of the space bit in the RRC Connection Reques t message in the uplink scheduling access information.
  • Step S508 Determine, according to the value of the space bit in the RRC Connection Reques t message in the uplink scheduling access information, whether the object that requests the accessing the base station is the RN or the UE.
  • the base station determines that the value of the space bit in the RRC Connection Reques t message in the uplink scheduling access information is 1, it may be determined that the current requesting access to the base station is the RN C.
  • the base station determines the uplink scheduling.
  • the value of the space bit in the RRC Connection Reques t message in the access information is 0, it may be determined that the object currently requesting access to the base station is the UE.
  • Step S510 The base station selects an object that requests access to the base station to access the base station according to the priority access principle.
  • the priority access principle of the base station includes preferentially selecting the RN or preferentially selecting the UE.
  • the RN is preferred as the first priority.
  • the first type when the base station currently preferentially selects the RN, if it is determined in step S508 that both the RN and the UE request access, the value of the space bit in the RRC Connection Reques t message in the uplink scheduling access information is For 1, there is also 0.
  • the base station selects the RN access, and the base station uses the initi t ia lRN-Ident ty in the RRC Connection Reques t message as the message for resolving the access, that is, the NAS identifier of the R is used as the message for resolving the access.
  • the RN is sent through the Temporary C-RNTI.
  • the base station when the base station sends the message for resolving the access to the RN through the Temporary C-RNTI, it can be considered that the base station agrees that the RN accesses the base station.
  • the eNB also manages the RN as an RN with successful access, that is, saves the C-RNTI of the RN that successfully accesses.
  • the RN After the RN receives the message for resolving the access sent through the Temporary C-RNTI, it can solve the problem through the Temporary C-RNTI.
  • the information about the access is adjusted, and the NAS identifier of the RN is compared with its own NAS identifier to determine whether it is successfully accessed. If they are the same, it is determined that they themselves successfully access the base station. After the RN determines that it successfully accesses the base station, it sets the TEMPORARY C-RNTI to C_RNTI.
  • the second type when the eNB currently preferentially selects the RN, if it is determined in step S508 that only the RN, that is, the value of the space bit in the RRC Connec ti on Reques t message in the uplink scheduling access information is 1, The base station will handle the same process as the first case.
  • the third type when the base station currently preferentially selects the RN, if it is determined in step S508 that only the UE, that is, the value of the space bit in the RRC Connec ti on Reques t message in the uplink scheduling access information is 0,
  • the RN does not request access.
  • the base station will give priority to the UE, and the base station will select the UE to access.
  • the base station will use the initiating TU l-Identity in the RRC Connection Reques t message as the message for resolving the access, that is, the UE
  • the NAS identity is used as a message to resolve the access.
  • the UE is transmitted through the Temporary C-RNTI.
  • the base station when the base station sends the message for resolving the access to the UE through the Temporary C-RNTI, it can be considered that the base station agrees that the UE accesses the base station.
  • the base station also manages the UE as a UE with successful access, that is, saves the C-RNT I of the UE with successful access.
  • the UE may demodulate the message for resolving the access through the Temporary C-RNTI, and compare the NAS identifier of the UE with the NAS identifier of the UE itself. To determine if you are successfully accessing. If they are the same, it is determined that they have successfully accessed the base station.
  • the UE determines that it successfully accesses the base station, it sets the TEMPORARY C-RNTI to C_RNTI.
  • the fourth type when the base station currently preferentially selects the UE, if it is determined in step S508 that both the RN and the UE request access, the value of the space bit in the RRC Connection Reques t message in the uplink scheduling access information is For 1, there is also 0.
  • the base station will select the UE access, and the base station will select the RRC.
  • ini t ia l UE-Ident ty is used as a message for resolving the access, that is, the NAS identifier of the UE is used as a message for resolving the access.
  • the UE is transmitted through the Temporary C-RNTI.
  • the base station when the base station sends the message for resolving the access to the UE through the Temporary C-RNTI, it can be considered that the base station agrees that the UE accesses the base station.
  • the base station also manages the UE as a successfully accessed UE, that is, saves the C-RNTI of the successfully accessed UE.
  • the UE may demodulate the message for resolving the access through the Temporary C-RNTI, and compare the NAS identifier of the UE with the NAS identifier of the UE itself. To determine if you are successfully accessing.
  • the TEMPORARY C-RNTI is set to the C-RNTI.
  • the base station currently preferentially selects the UE, if it is determined in step S508 that only the RN is available, that is, in the uplink scheduling access information.
  • the value of the space bit in the RRC Connec ti on Reques t message is 1.
  • the base station Since no UE requests access, the base station selects R access, and the base station will initiate the RRC Connect ion Reques t message ini t ia lRN-Ident i As the message for resolving the access, the NAS identifier of the RN is used as a message for resolving the access.
  • the RN is sent through the Temporary C-RNTI.
  • the base station when the base station sends the message for resolving the access to the RN through the Temporary C-RNTI, it can be considered that the base station agrees that the RN accesses the base station.
  • the eNB also manages the RN as a successful RN, that is, saves the C-RNTI of the RN that successfully accesses.
  • the RN may demodulate the message for resolving the access through the Temporary C-RNTI, and take out the NAS identifier of the RN and compare it with the NAS identifier of the RN. To determine if you are successfully accessing. If they are the same, it is determined that they themselves successfully access the base station. After the RN determines that it successfully accesses the base station, it sets the TEMPORARY C-RNTI to C-RNTI.
  • step S508 When the base station currently preferentially selects the UE, if it is determined in step S508 that only the UE is available, That is, when the value of the space bit in the RRC Connection Request message in the uplink scheduling access information is 0, the base station will perform the same processing as the fourth case.
  • the RN and the UE are in the initial access to the base station, when the RN and the UE request to access the base station, after the RN and the UE receive the random access response returned by the base station, the RN needs to send the base station.
  • the space bit in the RRC Connection Request message in the uplink scheduling access message is set to 1, and is used to identify that the object to be requested to access the base station is a relay node, and the UE needs to send the RRC Connection Request in the uplink scheduling access message of the base station.
  • the space bit in the message is set to 0, so that the object for requesting access to the base station is the UE; the base station identifies the current clear by determining the value of the space bit in the RRC Connection Request message in the uplink scheduling access information.
  • the object to be accessed is the RN or the UE.
  • the RN is determined to access the base station according to the priority principle, so that the base station can identify the object to be accessed, and after identifying the accessed object, it can be reasonable.
  • the selection requests the access object, so that the base station can blindly agree to the request to access the base station, and thus the RN and the UE can be avoided.
  • the access request the confusion caused by the order, and can reduce the large amounts of RN and the UE simultaneously access the base station, the workload of the base station.
  • FIG. 6 is a timing diagram of a first implementation of a third embodiment of an access method applied to a requesting access base station according to an embodiment of the present invention.
  • the RN and the UE send a random access request to the base station.
  • the base station transmits the RAR to the RN and the UE through the RA-RNTI PDCCH (Physical Downlink Control Channel).
  • the RN and the UE demodulate the RAR information by using the RA-RNTI, and save the TEMPORARY C-RNTI.
  • the RN and the UE need to send an uplink scheduling access message to the base station.
  • the uplink scheduling access message sent by the RN includes an RRC Connection Request message, and the space bit in the RRC Connection Request message is Set to 1.
  • the uplink scheduling access message sent by the UE includes an RRC Connection Request message, and the space bit in the RRC Connection Request message is set to 0.
  • the RN and the UE send an uplink scheduling access message to the base station.
  • the base station determines the value of the space bit in the RRC Connection Request message in the uplink scheduling access information.
  • the base station will use the initialRN-Identity in the RRC Connection Request message as the message for resolving the access, that is, the NAS identifier of the R is used as the message for resolving the access.
  • the RN is sent through the Temporary C-RNTI.
  • the R is managed as an RN with successful access, that is, the C-RNTI of the RN that successfully accesses the RN.
  • Figure ⁇ is a fourth implementation timing diagram of a third embodiment of an access method applied to a requesting access base station in an embodiment of the present invention.
  • the RN and the UE send a random access request to the base station.
  • the base station transmits the RAR to the RN and the UE through the RA-RNTI PDCCH (Physical Downlink Control Channel).
  • the RN and the UE demodulate the RAR information through the RA-RNTI, and save the TEMPORARY C-RNTI.
  • the RN and the UE need to send an uplink scheduling access message to the base station.
  • the uplink scheduling access message sent by the RN includes an RRC Connection Request message, and the space bit in the RRC Connection Request message is set to 1.
  • the uplink scheduling access message sent by the UE includes an RRC Connection Request message, and the space bit in the RRC Connection Request message is set to 0.
  • the RN and the UE send an uplink scheduling access message to the base station.
  • the base station determines the value of the space bit in the RRC Connection Request message in the uplink scheduling access information.
  • the base station will use the initial UE-Identity in the RRC Connection Request message as the message for resolving the access.
  • the NAS identifier of the UE serves as a message for resolving the access.
  • the UE is transmitted through the Temporary C-RNTI.
  • the UE is managed as a UE with successful access, that is, the C-RNTI of the UE that successfully accesses is saved.
  • FIG. 8 is a flowchart of a fourth embodiment of an access method applied to requesting access to a base station according to an embodiment of the present invention.
  • FIG. 8 is a flowchart of a non-initial access of a RN and a UE based on a contention random access base station, that is, the RN and the UE have visited the base station, and now re-request the access base station.
  • Step S800 The base station receives a random access request message sent by the RN and the UE.
  • Step S802 the base station returns a random access response to the RN and the UE.
  • the RN after receiving the random access response sent by the base station, the RN generates an uplink scheduled access (Scheduled Access) message, where the message includes the C_RNTI of the RN. At this time, the RN has visited the base station, and this time it is re-accessing the base station. Therefore, the C-RNTI of the RN is sent to the base station according to the UL Grant indication.
  • the UE after receiving the random access response sent by the base station, the UE generates an uplink scheduled access (Scheduled) message, where the message includes the C-RNTI of the UE. At this time, the UE has accessed the base station, and this time, the UE is re-accessed to the base station. Therefore, the C-RNTI of the UE is sent to the base station according to the UL Grant indication.
  • Step S804 the base station receives an uplink scheduling access message sent by the RN and the UE.
  • Step S806 determining whether the RN or the UE has accessed the base station.
  • the base station matches the C-RNTI in the uplink scheduling access information of the RN with the C-RNTI of the saved RN to determine whether the RN has accessed the base station. If the C-RNTI in the uplink scheduling access information is the same as the C-RNTI of the saved RN, the RN has accessed the base station. In this embodiment, the base station matches the C-RNTI in the uplink scheduling access information of the UE with the C-RNTI of the saved UE to determine whether the UE has accessed the base station.
  • Step S808 The base station selects an object that requests access to the base station to access the base station according to the priority access principle.
  • the priority access principle of the base station includes preferentially selecting the RN or preferentially selecting the UE.
  • R is preferred as the first priority principle.
  • the first type When the eNB is currently preferentially selecting the RN, if it is determined in step S806 that the RN and the UE have accessed the base station, the base station selects the RN to access, and the base station sends a message for resolving the access to the RN C R through the C-RNTI.
  • the C-RNTI demodulates the addressed message, and the NAS identifier of the RN is compared with its own NAS identifier to determine whether it is successfully accessed. If they are the same, it is determined that they themselves successfully access the base station.
  • the second type when the base station currently preferentially selects the RN, if it is determined in step S806 that only the RN has accessed the base station, that is, the UE in the object that is currently requesting to access the base station has not accessed the base station, at this time, the base station Will be treated the same as the first case.
  • the third type When the eNB currently preferentially selects the RN, if it is determined in step S806 that only the UE has accessed the base station, that is, the RN in the object that is currently requesting to access the base station has not accessed the base station, since no RN has ever If there is no access, the base station will give priority to the UE, and the base station will select the UE to access.
  • the base station sends a message for resolving the access to the UE through the C-RNTI.
  • the UE demodulates the addressed message through the C-RNTI, and compares the NAS identifier of the UE with the NAS identifier of the UE to determine whether it is successfully accessed. If they are the same, it is determined that they themselves successfully access the base station.
  • the fourth type When the base station currently preferentially selects the UE, if it is determined in step S 806 that the RN and the UE have accessed the base station, the base station selects the UE to access, and the base station sends a message for resolving the access to the UE through the C-RNTI.
  • the UE demodulates the addressed message through the C-RNTI, and compares the NAS identifier of the UE with the NAS identifier of the UE to determine whether it is successfully accessed. If they are the same, then determine It itself successfully accesses the base station.
  • the fifth type when the base station currently preferentially selects the UE, if it is determined in step S806 that only the UE has accessed the base station, that is, the RN in the object that is currently requesting to access the base station has not accessed the base station, at this time, the base station Will be treated the same as the first case.
  • the sixth type when the base station currently preferentially selects the UE, if it is determined in step S806 that only the RN has accessed the base station, that is, the UE in the object that is currently requesting to access the base station has not accessed the base station, since no UE has ever If there is no access, the base station will give priority to the RN, and the base station will select the RN to access.
  • the base station sends a message for resolving the access to the RN through the C-RNTI.
  • the RN demodulates the addressed message through the C-RNTI, and compares the NAS identifier of the RN with its own NAS identifier to determine whether it successfully accesses itself. If they are the same, it is determined that they themselves successfully access the base station.
  • the RN and the UE are in the non-initial access base station, when the RN and the UE request to access the base station, after receiving the random access response returned by the base station, the RN needs to send the uplink scheduling of the base station.
  • the RRC Connec ti on Reques t message in the access message includes the C-RNTI of the RN, to determine whether the RN has accessed the base station, and the UE needs to send the RRC Connec ti on Reques in the uplink scheduling access message of the base station.
  • the t message includes the C-RNTI of the UE, to determine whether the RN has accessed the base station; if it is determined that the RN has accessed the base station, the RN is selected to access the base station, so that the base station can identify the object requested to be accessed. And after identifying the access object, the object to be accessed may be reasonably selected, so that the base station can blindly agree to the request to access the base station, and thus the confusion caused by the RN and the UE simultaneously requesting access can be avoided.
  • the order and can reduce the workload of the base station when a large number of UEs and Rs simultaneously access the base station.
  • FIG. 9 is a timing diagram of a first specific implementation of a fourth embodiment of an access method applied to a requesting access base station according to an embodiment of the present invention.
  • the RN and the UE send a random access request to the base station.
  • the base station transmits the RAR to the RN and the UE through the RA-RNTI PDCCH (Physical Downlink Control Channel).
  • the RN and the UE demodulate the RAR information through the RA-RNTI, and save the TEMPORARY C-RNTI.
  • the RN and the UE need to send an uplink scheduling access message to the base station.
  • the C-RNT I of the RN is included in the uplink scheduling access message sent by the RN.
  • the message includes the C-RNT I of the UE in the uplink scheduling access message sent by the UE.
  • the RN and the UE send an uplink scheduling access message to the base station.
  • the base station matches the C-RNTI in the uplink scheduling access information of the RN with the C-RNTI of the saved RN to determine whether the RN has accessed the base station.
  • the base station matches the C-RNT I of the uplink scheduling access information of the UE with the C-RNT I of the saved UE to determine whether the UE has accessed the base station. If it is determined that the RN accesses the base station, the base station will use the initial UE-Identity in the RRC Connection Request message as the message for resolving the access, and the NAS identifier of the RN is used as the message for resolving the access.
  • the RN is sent through the Temporary C-RNTI.
  • FIG. 10 is a second specific implementation timing diagram of a fourth embodiment of an access method applied to a requesting access base station according to an embodiment of the present invention.
  • the RN and the UE send a random access request to the base station.
  • the base station transmits the RAR to the RN and the UE through the RA-RNTI PDCCH (Physical Downlink Control Channel).
  • the RN and the UE demodulate the RAR information through the RA-RNTI, and save the TEMPORARY C-RNTI.
  • the RN and the UE need to send an uplink scheduling access message to the base station.
  • the C-RNT I of the RN is included in the uplink scheduling access message sent by the RN.
  • the message includes the C-RNT I of the UE in the uplink scheduling access message sent by the UE.
  • the RN and the UE send an uplink scheduling access message to the base station.
  • the base station receives the uplink adjustment After the access message is received, the base station matches the C-RNTI in the uplink scheduling access information of the RN with the C-RNTI of the saved RN to determine whether the RN has accessed the base station.
  • the base station matches the C-RNTI in the uplink scheduling access information of the UE with the C-RNTI of the saved UE to determine whether the UE has accessed the base station.
  • the base station will use the initiating message of the RRC Connection Reques t message as the message for resolving the access, that is, the AS identifier of the UE is used as the message for resolving the access. .
  • the UE is transmitted through the Temporary C-RNTI.
  • FIG. 11 is a structural diagram of an access system applied to requesting access to a base station according to an embodiment of the present invention.
  • the system includes a mobile terminal 11, a base station 12, and a relay node 13.
  • the mobile terminal 11 can directly communicate with the base station 12, and does not require the relay node 13 to cooperate.
  • the mobile terminal 11 can communicate with the relay node 13 first, and then through the relay node 13 and The base station 12 communicates.
  • the third mode is: while the mobile terminal 11 is in direct communication with the base station 12, the relay node 13 monitors or listens to the communication between the mobile terminal 11 and the base station 12, between the mobile terminal 11 and the base station 12.
  • the communication node is of poor quality or poor communication, and the relay node 13 cooperates with the communication between the mobile terminal 11 and the base station 12.
  • both the relay node 13 and the mobile terminal 11 may request to access the base station 12.
  • only the relay node 13 may separately request to access the base station 12, or only the mobile terminal may exist.
  • the terminal 11 requests the access to the base station 12 separately, and the relay node 13 and the mobile terminal 11 may simultaneously request to access the base station 12.
  • FIG. 12 is a structural diagram of a base station according to an embodiment of the present invention.
  • the base station 12 includes a receiving unit 120, an identifying unit 121, a storage unit 122, a management unit 123, and a transmitting unit 124.
  • the receiving unit 120 is configured to receive a random access request message sent by an object requesting access to the base station.
  • the object that requests access to the base station includes the RN and the UE, that is, the receiving RN. Or a random access request message sent by the UE.
  • the sending unit 124 is configured to send a random access response to the object that sends the random access request message when the receiving unit 120 receives the random access request message.
  • the transmitting unit 124 sends a random access response to the R or the UE.
  • the receiving unit 120 is further configured to: after the sending unit 124 sends the random access response, receive an uplink scheduling access message that is sent by the object that requests to access the base station.
  • the uplink scheduling access message sent by the RN includes an RRC Connection Request message, and the space bit in the RRC Connection Request message is set to 1, and the uplink scheduling access message sent by the UE includes the RRC. Connection Request message, and set the space bit in the RRC Connection Request message to 0.
  • the identifying unit 121 is configured to identify, according to a value of a space bit in the RRC Connection Request message in the uplink scheduling access information, an object that is determined to request access to the base station. In this embodiment, when the value of the space bit in the RRC Connection Request message in the uplink scheduling access information is 1, it is determined that the object currently requesting access to the base station is the RN. In this embodiment, when the value of the space bit in the RRC Connection Request message in the uplink scheduling access information is 0, it is determined that the object currently requesting access to the base station is the UE.
  • the management unit 123 is configured to select, after the identification unit 121 identifies the object requesting access to the base station, the object accessing the base station requesting access to the base station according to the priority access principle.
  • the priority access principle of the base station includes preferentially selecting R or preferentially selecting the UE.
  • the preference of R is the first priority.
  • the storage unit 122 is configured to save the C-RNTI of the selected access base station after the management unit 123 selects the target access base station that requests the access base station. In this embodiment, if the management unit 123 When R is selected to access the base station, the storage unit 122 saves the C-RNTI of the RN. If the management unit 123 selects the UE to access the base station, the storage unit 122 saves the C-RNTI of the UE. Of course, the storage unit 122 may also classify and store the RN and the UE that access the base station, that is, store multiple RNs of the access base station as one type, and store multiple UEs of the access base station as another type.
  • the RN and the UE are in the initial access to the base station, when the RN and the UE request to access the base station, after the RN and the UE receive the random access response returned by the base station, the RN needs to send the base station.
  • the space bit in the RRC Connection Request message in the uplink scheduling access message is set to 1, and is used to identify that the object to be requested to access the base station is a relay node, and the UE needs to send the RRC Connection Request in the uplink scheduling access message of the base station.
  • the space bit in the message is set to 0, so that the object for requesting access to the base station is the UE; the base station identifies the current clear by determining the value of the space bit in the RRC Connection Request message in the uplink scheduling access information.
  • the object to be accessed is the RN or the UE.
  • the RN is determined to access the base station according to the priority principle, so that the base station can identify the object to be accessed, and after identifying the accessed object, it can be reasonable.
  • the selection requests the access object, so that the base station can blindly agree to the request to access the base station, and thus the RN and the UE can be avoided. When the access request, the confusion caused by the order.
  • the RN receives a scheduled access response (Scheduled Up 1 Ink Transmission) message, and the message includes the C-RNTI of the RN.
  • the RN has visited the base station, and this time, the RN's C-RNTI is transmitted to the base station according to the ULGrant indication.
  • the UE after receiving the random access response sent by the base station, the UE generates a Scheduled Up Link Transmission message, where the message includes the C-RNTI of the UE.
  • the UE has accessed the base station, and this time, the UE re-accesses the base station, so the C-RNTI of the UE is sent according to the UL Grant indication. Base station.
  • the identification unit 121 is further configured to identify whether an object requesting access to the base station has been accessed to the base station. In this embodiment, the identifying unit 121 matches the C-RNTI in the uplink scheduling access information of the RN with the C-RNTI of the RN stored in the storage unit 122 to determine whether the RN has accessed the base station. If the C-RNTI in the uplink scheduling access information is the same as the C-RNTI of the RN stored in the storage unit 122, it indicates that the RN has accessed the base station. In this embodiment, the identifying unit 121 matches the C-RNTI in the uplink scheduling access information of the UE with the C-RNTI of the UE stored in the storage unit 122 to determine whether the UE has accessed the base station. If the C-RNTI in the uplink scheduling access information of the UE is the same as the C-RNTI of the saved UE, the UE has accessed the base station.
  • the management unit 123 is further configured to: when the identifying unit 121 identifies whether the object requesting access to the base station has accessed the base station, select an object accessing the base station requesting access to the base station according to the priority access principle.
  • the priority access principle of the base station includes preferentially selecting the RN or preferentially selecting the UE.
  • the RN is preferred as the first priority principle.
  • the RN When the UE requests to access the base station, after receiving the random access response returned by the base station, the RN needs to send the RRC Connection Reques t message in the uplink scheduling access message of the base station, including the C-RNTI of the RN, for determining Whether the RN has accessed the base station, and the UE needs to send the RRC Connection Reques t message in the uplink scheduling access message of the base station, including the C-RNTI of the UE, to determine whether the RN has accessed the base station;
  • the RN accesses the base station and selects the RN to access the base station, so that the base station can identify the object to be accessed, and after identifying the accessed object, the object to be requested can be reasonably selected, thereby avoiding the base station. Blindly agree to the request to access the base station, and thus Avoid the chaotic order caused when the RN and the UE request access at the same time.
  • FIG. 13 is a structural diagram of a relay node according to an embodiment of the present invention.
  • the relay node 13 includes a receiving unit 130, a processing unit 131, and a transmitting unit 132.
  • the sending unit 132 is configured to send a random access request message to the base station. After receiving the random access request message sent by the object requesting access to the base station, the base station sends a random access request message after receiving the random access request message sent by the RN.
  • the receiving unit 130 is configured to receive a random access response sent by the base station.
  • the processing unit 131 is configured to: after receiving the random access response sent by the base station, the receiving unit 130 generates an uplink scheduling access message, where the message includes an RRC Connection Request message, and sets the space bit in the RRC Connection Request message to 1.
  • the space bit in the RRC Connection Request message is set to 1, and the object used to identify the clearing access base station is a relay node, and the object used by the base station to distinguish the requesting access base station is the RN.
  • the sending unit 132 is further configured to send the uplink scheduling access message generated by the processing unit 131 to the base station.
  • the base station when the base station identifies that the object that requests the access to the base station is the RN, and selects the RN to access the base station, the base station can be regarded as the base station by transmitting the message for resolving the access to the RN through the Temporary C-RNTI. Agree that the RN accesses the base station.
  • the receiving unit 130 is further configured to use the Temporary C-RNTI to send the addressed message.
  • the processing unit 131 is further configured to demodulate the message for resolving the access by using the Temporary C-RNTI, and compare the NAS identifier of the RN with the NAS identifier of the RN to determine whether the user itself is successfully accessed. If they are the same, it is determined that they themselves successfully access the base station. After the RN determines that it successfully accesses the base station, it sets the TEMPORARY C-RNTI to C_RNTI. When the RN is a non-initial request to access the base station:
  • the processing unit 131 is further configured to: after receiving the random access response sent by the base station, the receiving unit 130 generates an uplink scheduling access message, where the message includes a C-RNTI of the RN.
  • the base station matches the C-RNTI in the uplink scheduling access information with the C-RNTI of the saved RN to determine whether the RN has accessed the base station. If the C-RNTI in the uplink scheduling access information is the same as the C-RNTI of the saved RN, the RN has accessed the base station.
  • the base station sends a message for resolving access to the RN through the C-RNTI.
  • the RRC in the uplink scheduling access message of the base station needs to be sent.
  • the space bit in the Connect ion Reques t message is set to 1, and is used to identify that the object requesting access to the base station is a relay node, so that the base station determines the s pace in the RRC Connection Reques t message in the uplink scheduling access information.
  • the value of the bit is used to identify whether the object currently dependent on the access is an RN.
  • the RN When it is determined to be the RN, the RN is determined to access the base station according to the priority principle, so that the base station can identify the object requested to be accessed, and when the access is identified After the object, the object to be accessed can be reasonably selected, so that the base station can blindly agree to the request to access the base station.
  • the RN when the RN is in the non-initial access base station, when the RN requests to access the base station, after receiving the random access response returned by the base station, the RN needs to send the uplink scheduling access message of the base station.
  • the RRC Connection Reques t message includes a C-RNTI of the RN, so that the base station determines whether the RN has accessed the base station, and if it is determined that the RN has accessed the base station, selecting the R to access the base station, thereby allowing The base station identifies the object to be accessed, and after identifying the accessed object, can reasonably select the object to be accessed, thereby preventing the base station from blindly agreeing to the request to access the base station.
  • the storage medium may be a magnetic disk, an optical disk, a read-only memory (ROM), or a random access memory (RAM).

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Description

一种应用于请求接 站的接入方法 站 本申请要求于 2009年 9月 24日提交中国专利局, 申请号为 200910190743.9, 发明名称为"一种应用于请求接入基站的接入方法及基站 "的中国专利申请的 优先权, 其全部内容通过引用结合在本申请中。 技术领域
本发明实施例涉及通信领域,特别是涉及一种应用于请求接入基站的接入 方法及基站。
背景技术
在无线通信系统中, 用户设备( User Equipment, UE ), 或称为移动终端, 在 UE需要与基站进行通信时, 需要该 UE接入基站。 UE可以自己主动发起 接入请求, 也可以由基站先发起, 再由 UE发起请求。 发明人在实现本发明的过程中, 发现现有技术至少存在以下缺点: 在 UE 接入基站的过程中, 一旦基站收到接入请求后, UE就可以成功的接入基站, 如果有其它的请求接入基站的设备也想接入基站时,基站同样会同意该设备接 入基站, 也就是说, 基站会盲目的同意接入基站的请求, 如果大量的 UE或其 它设备同时接入基站, 就会造成接入后基站的工作负载很大。
发明内容
本发明实施例提供一种应用于请求接入基站的接入方法及基站,以防止基 站盲目的同意接入基站的请求。 根据本发明的一方面,提供一种应用于请求接入基站的接入方法,所述方 法包括:
基站接收请求接入基站的对象发送的随机接入请求消息;
所述基站返回随机接入响应至所述请求接入基站的对象;
所述基站接收所述请求接入基站的对象发送的上行调度接入消息; 根据所述上行调度接入消息中的 RRC Connect ion Reques t消息中的 space 位的值, 识别所述请求接入基站的对象;
若识别所述请求接入基站的对象为中继节点,将所述中继节点接入所述基 站。
根据本发明的另一方面, 还提供一种基站, 所述基站包括: 接收单元, 发 送单元,识别单元及管理单元; 所述接收单元用于接收请求接入基站的对象发 送的随机接入请求消息;所述发送单元用于向所述请求接入基站的对象返回随 机接入响应;
其中,所述接收单元进一步用于所述发送单元返回随机接入响应至所述请 求接入基站的对象之后,接收所述请求接入基站的对象发送的上行调度接入消 息;
所述识别单元, 用于根据所述上行调度接入消息中的 RRC Connec t ion Reques t消息中的 space位的值, 识别所述请求接入基站的对象;
所述管理单元, 用于当识别所述请求接入基站的对象为中继节点时,选择 所述中继节点接入所述基站。
本发明实施例提供的技术方案, 根据所述上行调度接入消息中的 RRC
Connect ion Reques t消息中的 space位的值, 确定所述清求接入基站的对象; 若确定所述请求接入基站的对象为中继节点, 将所述中继节点接入所述基站, 从而可以让基站识别请求接入的对象, 并当识别接入的对象后, 可以合理的选 择请求接入的对象, 从而可以避免基站盲目的同意接入基站的请求。 附图说明
为了更清楚地说明本发明实施例中的技术方案, 下面将对实施例描述中 所需要使用的附图作简单地介绍,显而易见地, 下面描述中的附图仅仅是本发 明的一些实施例,对于本领域普通技术人员来讲, 在不付出创造性劳动性的前 提下, 还可以根据这些附图获得其他的附图。
图 1 为本发明实施例的应用于请求接入基站的接入方法的第一种实施例 的流程图;
图 2 为本发明实施例中应用于请求接入基站的接入方法的第一种实施例 的具体实施时序图;
图 3 为本发明实施例中应用于请求接入基站的接入方法的第二种实施例 的流程图;
图 4 为本发明实施例中应用于请求接入基站的接入方法的第二种实施例 的具体实施时序图;
图 5 为本发明实施例中应用于请求接入基站的接入方法的第三种实施例 的流程图;
图 6 为本发明实施例中应用于请求接入基站的接入方法的第三种实施例 的第一种实施时序图;
图 Ί 为本发明实施例中应用于请求接入基站的接入方法的第三种实施例 的第二种实施时序图;
图 8 为本发明实施例中应用于请求接入基站的接入方法的第四种实施例 的流程图;
图 9 为本发明实施例中应用于请求接入基站的接入方法的第四种实施例 的第一种具体实施时序图;
图 10为本发明实施例中应用于请求接入基站的接入方法的第四种实施例 的第二种具体实施时序图;
图 11为本发明实施例的应用于请求接入基站的接入系统的结构图; 图 12为本发明实施例的基站的结构图;
图 13为本发明实施例的中继节点的结构图。 具体实施方式
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清 楚、 完整地描述, 显然, 所描述的实施例仅仅是本发明一部分实施例, 而不是 全部的实施例。基于本发明中的实施例, 本领域普通技术人员在没有作出创造 性劳动前提下所获得的所有其他实施例, 都属于本发明保护的范围。
在本实施例中, 以 LTE ( Long Term Evolut ion, 长期演进)通信系统为 例进行描述说明,在该系统中,可以有基站(Evolve Node Base s ta t ion , eNB )、 多个中继节点 (Re lay node , RN )及多个用户终端 (User equi ment , UE ), 其中, 当然用户终端( User equi pment , UE )也可以包括移动终端。 在本实施 例中, 有三种通信方式, 第一种方式为: UE 可以和基站直接进行通信, 不需 要 RN进行协作, 第二种方式为: UE可以先与 RN通信,再通过 RN与基站通信, 第三种方式为: UE与基站直接通信的同时, RN对该 UE与基站的通信进行监控 或侦听, 当 UE与基站之间的通信信道质量不好, 或很差的时候, RN协作 UE 与基站之间的通信。 在本实施例中, RN可以监控多个 UE。 在本实施例中, 若当前通信网络, 只有 RN需要接入基站时, RN有两种接 入基站的方式,一种是基于非竟争随机接入基站, 另一种是基于竟争随机接入 基站, 而在基于竟争随机接入基站的过程中, 进一步包括初始接入基于竟争随 机接入基站和非初始接入基于竟争随机接入基站。
若当前通信网络,有 RN和 UE同时需要接入基站时,基站需要对请求接入 基站的对象进行识别, 并采用系统预定的优先接入原则选择接入基站的对象。 当然, 其中, UE也具有跟 RN—样的接入基站的方式, 只是当 UE跟 RN同时接 入时, 在接入的过程中, 基站需要判断识别, 对 UE和 RN之间进行选择。
在本实施例中, RN在基于非竟争随机接入的方式下, 此时, 基站已知 RN 的信息, 并且, 这种接入方式, 是先由基站向 RN发送指派随机接入序列, 再 由 RN 发送随机接入请求消息, 再由基站发送随机接入响应, 即基站通过 RA-RNTI ( Random Access Radio Network Temporary Identifier, 随机接入 无线网络临时标识)加扰 PDCCH (Physical Downlink Control Channel, 物 理下行控制信道)向 RN发送随机接入响应 ( Random Access Response, RAR )。 在本实施例中, RAR 可以包括 TEMPORARY C-RNTI ( Cell Radio Network Temporary Identifier )和 UL Grant信息。 此时, 表明接入完成。
在本实施例中,在基于竟争随机接入基站的方式中, 由 RN或 UE主动向基 站发起接入请求, 再由基站对发起接入请求的对象进行识别确认, 即确认发起 接入请求的对象是 RN还是 UE。 再由基站根据优先接入原则选择接入请求的对 象。
图 1 为本发明实施例的应用于请求接入基站的接入方法的第一种实施例 的流程图。 在本实施例中, 图 1为初始接入基于竟争随机接入基站的流程图。 在本实施例中,在中继节点初始接入基站前,基站无法得知请求接入基站的对 象是 RN还是 UE。
步骤 S100, 基站接收 RN发送的随机接入请求消息。 在本实施例中, 该随 机接入请求消息包括 Preamble序列。 在本实施例中, 基站可以接收到多个 RN 发送的随机接入请求。
步骤 S102,基站返回随机接入响应至 RN。在本实施例中,基站通过 RA-RNTI ( Random Access Radio Network Temporary Identifier, 随机接入无线网各 ι|έ时标只)力口 4尤 PDCCH (Physical Downlink Control Channel, 物理下行控 制信道) 向 RN发送随机接入响应 ( Random Access Response, RAR )。 在本实 施例中, RAR可以包括 TEMPORARY C-RNTI 和 UL Grant信息。
在本实施例中, 当 RN接收到基站发送的随机接入响应后, 生成上行调度 接入 ( Scheduled Up link transmission ) 消息, 上行调度接入消息中包括 RRC Connection Request消息, 并将 RRC Connect ion Reques t消息中的 space 位设置为 1, 及根据 UL Grant (Up Link Grant, 上行链路指示)消息指示发送 给基站。 在本实施例中, 将 RRC (Radio Resource Control, 无线资源控制) Connection Request消息中的 space位设置为 1, 是用来标识清求接入基站的 对象是中继节点, 并用于基站区别请求接入基站的对象是 RN还是 UE。
步骤 S104, 基站接收到中继节点发送的上行调度接入消息。
步骤 S106, 基站确定该上行调度接入信息中的 RRC Connection Request 消息中的 space位的值。在本实施例中, 当基站确定该上行调度接入信息中的 RRC Connection Request 消息中的 space位的值为 1时, 可以确定当前清求 接入基站的对象是中继节点。 在本实施例中, RRC Connection Request 消息 可以包括 RN的 NAS ( Non-Acces s St ra tum, 非接入层)标识。 当然, 在基站 的内部可以将识别的原则进行设置, 比如, 可以当上行调度接入信息中的 RRC Connect ion Reques t消息中的 space位的值为 1时, 设置清求接入基站的对 象为 RN, 也可以设置请求接入基站的对象为 UE, 也可以当上行调度接入信息 中的 RRC Connect ion Reques t消息中的 space位的值为 0时, 设置倚求接入 基站的对象为 RN, 也可以设置请求接入基站的对象为 UE, 当然, 在设置原则 时, 基站需要与 RN和 UE保持相同的标准原则。
步骤 S108, 基站根据优先接入原则确定将中继节点接入基站。 在本实施 例中, 基站的优先接入原则包括优先选择 RN或优先选择 UE。 当然, 基站可以 根据当前的通信网络状况来 将其中的一个原则作为当前的选择原则。 当然, 基站可以对当前的选择原则进行调整,以满足通信网络的需求。在本实施例中, 以优先选择 RN作为第一个优先考虑的原则。 因此, 在本实施例中, 若基站当 前优先选择 R 时, 基站会将该 RRC Connect ion Reques t 消息中 i n i t i a 1 RN- 1 den t i t y作为解决接入的消息, 即将 R 的 AS标识作为解决接入 的消息。 在本实施例中, 解决接入的消息也可以称之为碰撞处理消息。 通过 Temporary C-RNTI 发送 RN。 在本实施例中, 当基站通过 Temporary C-RNTI 将解决接入的消息发送给 RN时, 就可以认为是基站同意该 RN接入基站。在本 实施例中, 基站还将该 RN作为接入成功的 RN进行管理, 即保存接入成功的 R 的 C- RNTI。
当然, 在 RN接收到该通过 Temporary C-RNTI发送的解决接入的消息后, 可以通过 Temporary C-RNTI 解调该解决接入的消息, 取出其中的 RN的 NAS 标识与自己本身的 NAS标识进行比对,以确定自己本身是否成功接入。若相同, 则确定自己本身成功接入该基站。 当 RN 确定自己成功接入基站后, 将 TEMPORARY C- RNTI设置为 C-RNTL
本实施例提供的技术方案, 若 RN和 UE处于初始接入基站时, 当 RN请求 接入基站时, 当接收到基站返回的随机接入响应后,将需要发送基站的上行调 度接入消息中的 RRC Connect i on Reque s t消息中的 s ace位设置为 1, 以用 于标识请求接入基站的对象是中继节点,基站通过确定该上行调度接入信息中 的 RRC Connection Request消息中的 space位的值, 来识另确认当前清求接 入的对象是否为 RN, 当确定为 RN时, 根据优先原则确定 RN接入基站, 从而 可以让基站识别请求接入的对象, 并当识别接入的对象后, 可以合理的选择请 求接入的对象,从而可以避免基站盲目的同意接入基站的请求, 并可以减少大 量的 UE和 RN同时接入基站时, 基站的工作负载。
图 2 为本发明实施例中应用于请求接入基站的接入方法的第一种实施例 的具体实施时序图。
在图 2中, 当 N时刻, RN向基站发送随机接入序列(Preamble序列;), 在 M时刻, 基站通过 RA- RNTI加 4尤 PDCCH (Physical Downlink Control Channel, 物理下行控制信道 ) 向 RN发送 RAR。 RN通过 RA-RNTI解调出 RAR信息, 并保 存 TEMPORARY C-RNTI, 按照 UL Grant指示, RN需要向基站发送上行调度接入 消息。 上行调度接入消息中包括 RRC Connection Request 消息, 并将 RRC Connect ion Request消息中的 space位设置为 1。
在 K时刻时, RN向基站发送上行调度接入消息。 基站接收到上行调度接 入消息后, 确定该上行调度接入信息中的 RRC Connect i on Reque s t消息中的 space 位的值。 当确定 space 位的值为 1 时, 在 L 时刻, 基站会将该 RRC Connection Request消息中 initialRN-Identity作为解决接入的消息, 即将 R 的 NAS标识作为解决接入的消息。 通过 Temporary C-RNTI发送 RN。 并将该 R 作为接入成功的 RN进行管理, 即保存接入成功的 RN的 C-RNTI。
图 3 为本发明实施例中应用于请求接入基站的接入方法的第二种实施例 的流程图。
在本实施例中, 图 3为 RN非初始接入基于竟争随机接入基站的流程图, 即 RN曾经接入过基站, 现在再重新请求接入基站。
在本实施例中, 步骤 S 300, 基站接收 RN发送的随机接入请求消息。 在本 实施例中, 该随机接入请求消息包括 Pr eamb 1 e序列。 在本实施例中, 基站可 以接收到多个 RN发送的随机接入请求。
步骤 S302,基站返回随机接入响应至 RN。在本实施例中,基站通过 RA-RNTI ( Random Access Radio Network Temporary Identifier, 随机接入无线网各 ι|έ时标只)力口 4尤 PDCCH (Physical Downlink Control Channel, 物理下行控 制信道) 向 RN发送随机接入响应 ( Random Access Response, RAR )。 在本实 施例中, RAR可以包括 TEMPORARY C-RNTI 和 UL Grant信息。
在本实施例中, 当 RN接收到基站发送的随机接入响应后, 生成上行调度 接入 (Scheduled Up link transmission) 消息, 该消息中包括 RN的 C—RNTI。 由于此时, RN 曾经接入过基站, 此次为重新接入基站, 故, 将 RN的 C-RNTI 根据 UL Grant指示发送给基站。
步骤 S304, 基站接收到中继节点发送的上行调度接入消息。
步骤 S306, 确定该 RN是否曾经接入该基站。 在本实施例中, 基站将该上 行调度接入信息中 C-RNTI与保存的 RN的 C-RNTI进行匹配,来确定该 RN是否 曾经接入该基站。若上行调度接入信息中 C-RNTI与保存的 RN的 C-RNTI相同, 则说明该 RN曾经接入过该基站。
步骤 S3Q8, 若确定该 RN曾经接入该基站, 选择该 RN接入该基站。 在本 实施例中, 基站通过 C-RNTI发送解决接入的消息至 RN。 R 通过 C-RNTI解调 该解决接入的消息, 取出其中的 RN的 NAS标识与自己本身的 NAS标识进行比 对,以确定自己本身是否成功接入。若相同,则确定自己本身成功接入该基站。
本实施例提供的技术方案, 若 RN处于非初始接入基站时, 当 RN请求接入 基站时, 当接收到基站返回的随机接入响应后,将需要发送基站的上行调度接 入消息中的 RRC Connect i on Reques t消息包括 RN的 C-RNTI , 以用于确定该 RN是否曾经接入该基站, 若确定该 RN曾经接入该基站, 选择该 RN接入该基 站, 从而可以让基站识别请求接入的对象, 并当识别接入的对象后, 可以合理 的选择请求接入的对象,从而可以避免基站盲目的同意接入基站的请求, 并可 以减少大量的 UE和 RN同时接入基站时, 基站的工作负载。
图 4 为本发明实施例中应用于请求接入基站的接入方法的第二种实施例 的具体实施时序图。
在图 4中, 当 N时刻, RN向基站发送随机接入序列, 即 Preamble序列。 在 M时刻, 基站通过 RA- RNTI加扰 PDCCH ( Phys i ca l Downl ink Cont rol Channe l , 物理下行控制信道) 向 RN发送 RAR。 RN通过 RA-RNTI解调出 RAR 信息, 在 K时刻, 按照 UL Grant指示, RN向基站发送包括 RN-RNTI的上行调 度接入消息。基站接收到 RN发送的上行调度接入消息后, 确定该 RN是否曾经 接入该基站。 若确定该 RN曾经接入该基站, 基站在 L时刻, 通过 C-RNTI发送 解决接入的消息至 RN。 图 5 为本发明实施例中应用于请求接入基站的接入方法的第三种实施例 的流程图。
在本实施例中,图 5为 RN和 UE初始接入基于竟争随机接入基站的流程图。 在本实施例中, RN和 UE都需要请求接入基站, 此时, 基站会同时接收 RN和 UE发的接入请求。 在 UE和 RN初始接入基站前, 基站无法得知请求接入基站 的对象是 RN还是 UE。
步骤 S500, 基站接收 RN和 UE发送的随机接入请求。 在本实施例中, 基 站可以接收到多个 RN和多个 UE发送的随机接入请求。
步骤 S502, 基站返回随机接入响应至 RN和 UE。 在本实施例中, 当 RN接 收到基站发送的随机接入响应后, 生成上行调度接入 ( Scheduled Up link transmission) 消息, 上行调度接入消息中包括 RRC Connect ion Request消 息, 并将 RRC Connection Request 消息中的 space位设置为 1, 及根据 UL Grant (Up Link Grant, 上行链路指示)消息指示发送给基站。 在本实施例中, 将 RRC Connection Request消息中的 space位设置为 1, 是用来标识倚求接 入基站的对象是中继节点, 并用于基站区别请求接入基站的对象是 RN。
在本实施例中, 当 UE接收到基站发送的随机接入响应后, 生成上行调度 接入 ( Scheduled Up link transmission ) 消息, 上行调度接入消息中包括 RRC Connection Request消息, RRC Connection Request消息中的 space 位设置为 0, 及根据 UL Grant (Up Link Grant, 上行链路指示)消息指示发送 给基站。 在本实施例中, 将 RRC Connection Request消息中的 space位设置 为 0, 是用来标识请求接入基站的对象是中继节点, 并用于基站区别请求接入 基站的对象是 UE。 步骤 S504, 基站接收 RN和 UE发送的上行调度接入消息。
步骤 S506。 确定该上行调度接入信息中的 RRC Connect ion Reques t消息 中的 space位的值。
步骤 S508, 根据上行调度接入信息中的 RRC Connect ion Reques t消息中 的 space位的值确定请求接入基站的对象是 RN还是 UE。
在本实施例中, 当基站确定该上行调度接入信息中的 RRC Connect ion Reques t消息中的 space位的值为 1时, 可以确定当前请求接入基站的对象是 RNC 基站确定该上行调度接入信息中的 RRC Connect ion Reques t 消息中的 space位的值为 0时, 可以确定当前请求接入基站的对象是 UE。
步骤 S510, 基站根据优先接入原则选择请求接入基站的对象接入基站。 在本实施例中, 基站的优先接入原则包括优先选择 RN或优先选择 UE。 在本实 施例中, 以优先选择 RN作为第一个优先考虑的原则。
在本实施例中, 会存在几种情况:
第一种: 当基站当前优先选择 RN时, 若在步骤 S508 中, 确定同时有 RN 和 UE请求接入时, 即上行调度接入信息中的 RRC Connect ion Reques t消息中 的 space位的值有为 1的,也有为 0的。基站会选择 RN接入,基站会将该 RRC Connect ion Reques t消息中 ini t ia lRN-Ident i ty作为解决接入的消息, 即将 R 的 NAS标识作为解决接入的消息。 通过 Temporary C-RNTI发送 RN。 在本实 施例中, 当基站通过 Temporary C-RNTI将解决接入的消息发送给 RN时, 就可 以认为是基站同意该 RN接入基站。在本实施例中,基站还将该 RN作为接入成 功的 RN 进行管理, 即保存接入成功的 RN 的 C-RNTI。 在 RN接收到该通过 Temporary C-RNTI发送的解决接入的消息后, 可以通过 Temporary C-RNTI解 调该解决接入的消息, 取出其中的 RN的 NAS标识与自己本身的 NAS标识进行 比对, 以确定自己本身是否成功接入。 若相同, 则确定自己本身成功接入该基 站。 当 RN确定自己成功接入基站后, 将 TEMPORARY C-RNTI设置为 C_RNTI。
第二种: 当基站当前优先选择 RN时, 若在步骤 S508中, 确定只有 RN时, 即上行调度接入信息中的 RRC Connec t i on Reques t消息中的 space位的值都 为 1, 此时基站会跟第一种情况相同的处理。
第三种: 当基站当前优先选择 RN时, 若在步骤 S508中, 确定只有 UE时, 即上行调度接入信息中的 RRC Connec t i on Reques t消息中的 space位的值有 为 0时, 由于没有 RN请求接入, 此时, 基站会优先考虑 UE, 基站会选择 UE 接入, 基站会将该 RRC Connect ion Reques t消息中 ini t i a lUE-Ident i ty作为 解决接入的消息, 即将 UE的 NAS标识作为解决接入的消息。 通过 Temporary C-RNTI发送 UE。 在本实施例中, 当基站通过 Temporary C-RNTI将解决接入的 消息发送给 UE时, 就可以认为是基站同意该 UE接入基站。 在本实施例中, 基 站还将该 UE作为接入成功的 UE进行管理, 即保存接入成功的 UE的 C-RNT I。 在 UE接收到该通过 Temporary C-RNTI发送的解决接入的消息后, 可以通过 Temporary C-RNTI解调该解决接入的消息, 取出其中的 UE的 NAS标识与自己 本身的 NAS标识进行比对, 以确定自己本身是否成功接入。 若相同, 则确定自 己本身成功接入该基站。当 UE确定自己成功接入基站后,将 TEMPORARY C-RNTI 设置为 C_RNTI。
第四种: 当基站当前优先选择 UE时, 若在步骤 S508 中, 确定同时有 RN 和 UE请求接入时, 即上行调度接入信息中的 RRC Connect ion Reques t消息中 的 space位的值有为 1的,也有为 0的。基站会选择 UE接入,基站会将该 RRC Connect ion Reques t消息中 ini t ia lUE-Ident i ty作为解决接入的消息, 即将 UE的 NAS标识作为解决接入的消息。 通过 Temporary C-RNTI发送 UE。 在本实 施例中, 当基站通过 Temporary C-RNTI将解决接入的消息发送给 UE时, 就可 以认为是基站同意该 UE接入基站。在本实施例中,基站还将该 UE作为接入成 功的 UE 进行管理, 即保存接入成功的 UE 的 C-RNTI。 在 UE接收到该通过 Temporary C-RNTI发送的解决接入的消息后, 可以通过 Temporary C-RNTI解 调该解决接入的消息, 取出其中的 UE的 NAS标识与自己本身的 NAS标识进行 比对, 以确定自己本身是否成功接入。 若相同, 则确定自己本身成功接入该基 站。 当 UE确定自己成功接入基站后, 将 TEMPORARY C-RNTI设置为 C-RNTI 第五种: 当基站当前优先选择 UE时, 若在步骤 S508中, 确定只有 RN时, 即上行调度接入信息中的 RRC Connec t i on Reques t消息中的 space位的值都 为 1,由于没有 UE请求接入,基站会选择 R 接入,基站会将该 RRC Connect ion Reques t消息中 ini t ia lRN-Ident i ty作为解决接入的消息, 即将 RN的 NAS标 识作为解决接入的消息。 通过 Temporary C-RNTI发送 RN。 在本实施例中, 当 基站通过 Temporary C-RNTI将解决接入的消息发送给 RN时, 就可以认为是基 站同意该 RN接入基站。 在本实施例中, 基站还将该 RN作为接入成功的 RN进 行管理,即保存接入成功的 RN的 C-RNTI。在 RN接收到该通过 Temporary C-RNTI 发送的解决接入的消息后, 可以通过 Temporary C-RNTI解调该解决接入的消 息, 取出其中的 RN的 NAS标识与自己本身的 NAS标识进行比对, 以确定自己 本身是否成功接入。 若相同, 则确定自己本身成功接入该基站。 当 RN确定自 己成功接入基站后, 将 TEMPORARY C-RNTI设置为 C-RNTI。
第六种: 当基站当前优先选择 UE时, 若在步骤 S508中, 确定只有 UE时, 即上行调度接入信息中的 RRC Connection Request消息中的 space位的值有 为 0时, 此时基站会跟第四种情况相同的处理。
本实施例提供的技术方案, 若 RN和 UE处于初始接入基站时, 当 RN和 UE 请求接入基站时, 当 RN和 UE接收到基站返回的随机接入响应后, RN将需要 发送基站的上行调度接入消息中的 RRC Connection Request 消息中的 space 位设置为 1, 以用于标识请求接入基站的对象是中继节点, UE将需要发送基站 的上行调度接入消息中的 RRC Connection Request消息中的 space位设置为 0, 以用于标识请求接入基站的对象是 UE; 基站通过确定该上行调度接入信息 中的 RRC Connection Request消息中的 space位的值, 来识另确认当前清求 接入的对象是为 RN还是 UE, 当确定为 RN或 UE时, 根据优先原则确定 RN接 入基站, 从而可以让基站识别请求接入的对象, 并当识别接入的对象后, 可以 合理的选择请求接入的对象, 从而可以避免基站盲目的同意接入基站的请求, 并从而可以避免当 RN和 UE同时请求接入时,造成的混乱次序, 并可以减少大 量的 UE和 RN同时接入基站时, 基站的工作负载。
图 6 为本发明实施例中应用于请求接入基站的接入方法的第三种实施例 的第一种实施时序图。
在图 6中, 在 N时刻, RN和 UE会发送随机接入请求至基站。
在 M时刻, 基站通过 RA- RNTI加扰 PDCCH (Physical Downlink Control Channel, 物理下行控制信道) 向 RN和 UE发送 RAR。 RN和 UE通过 RA-RNTI 解调出 RAR信息, 并保存 TEMPORARY C-RNTI, 按照 UL Grant指示, RN和 UE 需要向基站发送上行调度接入消息。 RN发送的上行调度接入消息中包括 RRC Connect ion Request消息, 并将 RRC Connect ion Request消息中的 space位 设置为 1。 UE发送的上行调度接入消息中包括 RRC Connection Request消息, 并将 RRC Connection Request消息中的 space位设置为 0。
在 K时刻时, RN和 UE向基站发送上行调度接入消息。 基站接收到上行调 度接入消息后, 确定该上行调度接入信息中的 RRC Connection Request消息 中的 space位的值。 当确定 space位的值为 1时, 在 L时刻, 基站会将该 RRC Connection Request消息中 initialRN-Identity作为解决接入的消息, 即将 R 的 NAS标识作为解决接入的消息。 通过 Temporary C-RNTI发送 RN。 并将该 R 作为接入成功的 RN进行管理, 即保存接入成功的 RN的 C-RNTI。
图 Ί 为本发明实施例中应用于请求接入基站的接入方法的第三种实施例 的第四种实施时序图。
在图 7中, 在 N时刻, RN和 UE会发送随机接入请求至基站。
在 M时刻, 基站通过 RA-RNTI加扰 PDCCH (Physical Downlink Control Channel, 物理下行控制信道) 向 RN和 UE发送 RAR。 RN和 UE通过 RA-RNTI 解调出 RAR信息, 并保存 TEMPORARY C-RNTI, 按照 UL Grant指示, RN和 UE 需要向基站发送上行调度接入消息。 RN发送的上行调度接入消息中包括 RRC Connect ion Request消息, 并将 RRC Connect ion Request消息中的 space位 设置为 1。 UE发送的上行调度接入消息中包括 RRC Connection Request消息, 并将 RRC Connection Request消息中的 space位设置为 0。
在 K时刻时, RN和 UE向基站发送上行调度接入消息。 基站接收到上行调 度接入消息后, 确定该上行调度接入信息中的 RRC Connection Request消息 中的 space位的值。 当确定 space位的值为 0时, 在 L时刻, 基站会将该 RRC Connection Request消息中 initialUE-Identity作为解决接入的消息, 即将 UE的 NAS标识作为解决接入的消息。 通过 Temporary C-RNTI发送 UE。 并将该 UE作为接入成功的 UE进行管理, 即保存接入成功的 UE的 C-RNTI。
图 8 为本发明实施例中应用于请求接入基站的接入方法的第四种实施例 的流程图。 图 8为 RN和 UE非初始接入基于竟争随机接入基站的流程图, 即 RN和 UE曾经接入过基站, 现在再重新请求接入基站。
步骤 S800, 基站接收 RN和 UE发送的随机接入请求消息。
步骤 S802, 基站返回随机接入响应至 RN和 UE。
在本实施例中, 当 RN接收到基站发送的随机接入响应后, 生成上行调度 接入 ( Scheduled Up l ink t ransmi s s ion ) 消息, 该消息中包括 RN的 C_RNTI。 由于此时, RN 曾经接入过基站, 此次为重新接入基站, 故, 将 RN的 C-RNTI 根据 UL Grant指示发送给基站。 同时, 当 UE接收到基站发送的随机接入响应 后, 生成上行调度接入 ( Scheduled Up 1 ink t ransmi s s ion ) 消息, 该消息中 包括 UE的 C-RNTI。 由于此时, UE曾经接入过基站,此次为重新接入基站,故, 将 UE的 C-RNTI根据 UL Grant指示发送给基站。
步骤 S804, 基站接收到 RN和 UE发送的上行调度接入消息。
步骤 S806, 确定该 RN或 UE是否曾经接入该基站。 在本实施例中, 基站 将 RN的该上行调度接入信息中 C-RNTI与保存的 RN的 C-RNTI进行匹配,来确 定该 RN是否曾经接入该基站。 若上行调度接入信息中 C-RNTI与保存的 RN的 C-RNTI相同, 则说明该 RN曾经接入过该基站。 在本实施例中, 基站将 UE的 该上行调度接入信息中 C-RNTI与保存的 UE的 C-RNTI进行匹配, 来确定该 UE 是否曾经接入该基站。 若 UE 的上行调度接入信息中 C-RNTI 与保存的 UE 的 C-RNTI相同, 则说明该 UE曾经接入过该基站。 步骤 S808, 基站根据优先接入原则选择请求接入基站的对象接入基站。 在本实施例中, 基站的优先接入原则包括优先选择 RN或优先选择 UE。 在本实 施例中, 以优先选择 R 作为第一个优先考虑的原则。
在本实施例中, 会存在几种情况:
第一种: 当基站当前优先选择 RN时, 若在步骤 S806, 确定该 RN和 UE曾 经接入该基站,基站会选择 RN接入,基站通过 C-RNTI发送解决接入的消息至 RNC R 通过 C-RNTI解调该解决接入的消息, 取出其中的 RN的 NAS标识与自 己本身的 NAS标识进行比对, 以确定自己本身是否成功接入。 若相同, 则确定 自己本身成功接入该基站。
第二种: 当基站当前优先选择 RN时, 若在步骤 S806, 确定只有该 RN曾 经接入该基站, 即当前请求接入基站的对象中的 UE曾经没有接入过该基站, 此时, 基站会跟第一种情况相同的处理。
第三种: 当基站当前优先选择 RN时, 若在步骤 S806, 确定只有该 UE曾 经接入该基站, 即当前请求接入基站的对象中的 RN曾经没有接入过该基站, 由于没有 RN曾经没有接入, 此时, 基站会优先考虑 UE, 基站会选择 UE接入, 基站通过 C-RNTI发送解决接入的消息至 UE。 UE通过 C-RNTI解调该解决接入 的消息, 取出其中的 UE的 NAS标识与自己本身的 NAS标识进行比对, 以确定 自己本身是否成功接入。 若相同, 则确定自己本身成功接入该基站。
第四种: 当基站当前优先选择 UE时, 若在步骤 S 806, 确定该 RN和 UE曾 经接入该基站,基站会选择 UE接入,基站通过 C-RNTI发送解决接入的消息至 UE。 UE通过 C-RNTI解调该解决接入的消息, 取出其中的 UE的 NAS标识与自 己本身的 NAS标识进行比对, 以确定自己本身是否成功接入。 若相同, 则确定 自己本身成功接入该基站。
第五种: 当基站当前优先选择 UE时, 若在步骤 S806, 确定只有该 UE曾 经接入该基站, 即当前请求接入基站的对象中的 RN曾经没有接入过该基站, 此时, 基站会跟第一种情况相同的处理。
第六种: 当基站当前优先选择 UE时, 若在步骤 S806, 确定只有该 RN曾 经接入该基站, 即当前请求接入基站的对象中的 UE曾经没有接入过该基站, 由于没有 UE曾经没有接入, 此时, 基站会优先考虑 RN, 基站会选择 RN接入, 基站通过 C-RNTI发送解决接入的消息至 RN。 RN通过 C-RNTI解调该解决接入 的消息, 取出其中的 RN的 NAS标识与自己本身的 NAS标识进行比对, 以确定 自己本身是否成功接入。 若相同, 则确定自己本身成功接入该基站。
本实施例提供的技术方案, 若 RN和 UE处于非初始接入基站时, 当 RN和 UE请求接入基站时, 当接收到基站返回的随机接入响应后, RN将需要发送基 站的上行调度接入消息中的 RRC Connec t i on Reques t消息包括 RN的 C-RNTI , 以用于确定该 RN是否曾经接入该基站, UE将需要发送基站的上行调度接入消 息中的 RRC Connec t i on Reques t消息包括 UE的 C-RNTI , 以用于确定该 RN是 否曾经接入该基站; 若确定该 RN曾经接入该基站, 选择该 RN接入该基站, 从 而可以让基站识别请求接入的对象, 并当识别接入的对象后, 可以合理的选择 请求接入的对象,从而可以避免基站盲目的同意接入基站的请求, 并从而可以 避免当 RN和 UE同时请求接入时, 造成的混乱次序, 并可以减少大量的 UE和 R 同时接入基站时, 基站的工作负载。
图 9 为本发明实施例中应用于请求接入基站的接入方法的第四种实施例 的第一种具体实施时序图。 在图 9中, 在 N时刻, RN和 UE会发送随机接入请求至基站。
在 M时刻, 基站通过 RA-RNTI加扰 PDCCH (Physical Downlink Control Channel, 物理下行控制信道) 向 RN和 UE发送 RAR。 RN和 UE通过 RA-RNTI 解调出 RAR信息, 并保存 TEMPORARY C-RNTI, 按照 UL Grant指示, RN和 UE 需要向基站发送上行调度接入消息。 RN发送的上行调度接入消息中该消息中 包括 RN的 C-RNT I。 UE发送的上行调度接入消息中该消息中包括 UE的 C-RNT I。
在 K时刻时, RN和 UE向基站发送上行调度接入消息。 基站接收到上行调 度接入消息后, 基站将 RN的该上行调度接入信息中 C-RNTI 与保存的 RN 的 C-RNTI进行匹配, 来确定该 RN是否曾经接入该基站。 基站将 UE的该上行调 度接入信息中 C-RNT I与保存的 UE的 C-RNT I进行匹配,来确定该 UE是否曾经 接入该基站。 若确定 RN接入基站, 则在 L时刻, 基站会将该 RRC Connection Request消息中 initialUE-Identity作为解决接入的消息, 即将 RN的 NAS标 识作为解决接入的消息。 通过 Temporary C-RNTI发送 RN。
图 10为本发明实施例中应用于请求接入基站的接入方法的第四种实施例 的第二种具体实施时序图。
在图 10中, 在 N时刻, RN和 UE会发送随机接入请求至基站。
在 M时刻, 基站通过 RA-RNTI加扰 PDCCH (Physical Downlink Control Channel, 物理下行控制信道) 向 RN和 UE发送 RAR。 RN和 UE通过 RA-RNTI 解调出 RAR信息, 并保存 TEMPORARY C-RNTI, 按照 UL Grant指示, RN和 UE 需要向基站发送上行调度接入消息。 RN发送的上行调度接入消息中该消息中 包括 RN的 C-RNT I。 UE发送的上行调度接入消息中该消息中包括 UE的 C-RNT I。
在 K时刻时, RN和 UE向基站发送上行调度接入消息。 基站接收到上行调 度接入消息后, 基站将 RN的该上行调度接入信息中 C-RNTI 与保存的 RN 的 C-RNTI进行匹配, 来确定该 RN是否曾经接入该基站。 基站将 UE的该上行调 度接入信息中 C-RNTI与保存的 UE的 C-RNTI进行匹配,来确定该 UE是否曾经 接入该基站。若选择 UE接入过基站,则在 L时刻,基站会将该 RRC Connect ion Reques t消息中 ini t ia lUE-Ident i ty作为解决接入的消息, 即将 UE的 AS标 识作为解决接入的消息。 通过 Temporary C-RNTI发送 UE。
图 11为本发明实施例的应用于请求接入基站的接入系统的结构图。 在本 实施例中, 该系统包括移动终端 11、 基站 12和中继节点 13。
在本实施例中,移动终端 11可以和基站 12直接进行通信, 不需要中继节 点 13进行协作, 第二种方式为移动终端 11可以先与中继节点 13通信, 再通 过中继节点 13与基站 12通信, 第三种方式为: 移动终端 11与基站 12直接通 信的同时, 中继节点 13对该移动终端 11与基站 12的通信进行监控或侦听, 当移动终端 11与基站 12之间的通信信道质量不好,或很差的时候, 中继节点 13协作移动终端 11与基站 12之间的通信。 在本实施例中, 中继节点 13和移 动终端 11都可以请求接入基站 12, 当然, 在接入的环境下, 可以只存在中继 节点 13单独请求接入基站 12, 也可以只存在移动终端 11单独请求接入基站 12, 也可以存在中继节点 13和移动终端 11同时请求接入基站 12。
图 12为本发明实施例的基站的结构图。
在本实施例中,基站 12包括接收单元 120、识别单元 121、存储单元 122、 管理单元 123及发送单元 124。
在本实施例中,接收单元 120用于接收请求接入基站的对象发送的随机接 入请求消息。 在本实施例中, 请求接入基站的对象包括 RN和 UE, 即接收 RN 或 UE发送的随机接入请求消息。
发送单元 124用于当接收单元 120接收到随机接入请求消息时,向发送随 机接入请求消息的对象发送随机接入响应。 在本实施例中, 发送单元 124 向 R 或 UE发送随机接入响应。
接收单元 120还用于当发送单元 124发送后随机接入响应后,接收请求接 入基站的对象发送的上行调度接入消息。
若 RN和 UE是初始请求接入基站时, RN发送的上行调度接入消息中包括 RRC Connection Request消息, RRC Connection Request消息中的 space 位设置为 1, UE发送的上行调度接入消息中包括 RRC Connection Request消 息, 并将 RRC Connection Request消息中的 space位设置为 0。
识别单元 121用于根据该上行调度接入信息中的 RRC Connection Request 消息中的 space位的值, 来识别确定请求接入基站的对象。 在本实施例中, 当 识另 'J该上行调度接入信息中的 RRC Connection Request消息中的 space位的 值为 1 时, 确定当前请求接入基站的对象是 RN。 在本实施例中, 当识别该上 行调度接入信息中的 RRC Connection Request消息中的 space位的值为 0时, 确定当前请求接入基站的对象是 UE。
管理单元 123用于当识别单元 121识别确定请求接入基站的对象后,根据 优先接入原则选择请求接入基站的对象接入基站。在本实施例中,基站的优先 接入原则包括优先选择 R 或优先选择 UE。 在本实施例中, 以优先选择 R 作 为第一个优先考虑的原则。具体的实施过程可参见图 1、图 5中的实施例描述。
存储单元 122用于当管理单元 123选择请求接入基站的对象接入基站后, 将选择的接入基站的对象的 C-RNTI进行保存。在本实施例中,若管理单元 123 选择 R 接入基站, 则存储单元 122保存该 RN的 C-RNTI。 若管理单元 123选 择 UE接入基站, 则存储单元 122保存该 UE的 C-RNTI。 当然, 存储单元 122 还可以将接入基站的 RN和 UE进行分类存储, 即, 将接入基站的多个 RN作为 一类进行存储, 将接入基站的多个 UE作为另一类进行存储。
本实施例提供的技术方案, 若 RN和 UE处于初始接入基站时, 当 RN和 UE 请求接入基站时, 当 RN和 UE接收到基站返回的随机接入响应后, RN将需要 发送基站的上行调度接入消息中的 RRC Connection Request 消息中的 space 位设置为 1, 以用于标识请求接入基站的对象是中继节点, UE将需要发送基站 的上行调度接入消息中的 RRC Connection Request消息中的 space位设置为 0, 以用于标识请求接入基站的对象是 UE; 基站通过确定该上行调度接入信息 中的 RRC Connection Request消息中的 space位的值, 来识另确认当前清求 接入的对象是为 RN还是 UE, 当确定为 RN或 UE时, 根据优先原则确定 RN接 入基站, 从而可以让基站识别请求接入的对象, 并当识别接入的对象后, 可以 合理的选择请求接入的对象, 从而可以避免基站盲目的同意接入基站的请求, 并从而可以避免当 RN和 UE同时请求接入时, 造成的混乱次序。
若 RN和 UE是非初始请求接入基站时, 当 RN接收到基站发送的随机接入 响应后, 生成上行调度接入 ( Scheduled Up 1 ink transmission ) 消息, 该消 息中包括 RN的 C-RNTI。由于此时, RN曾经接入过基站,此次为重新接入基站, 故, 将 RN的 C-RNTI根据 ULGrant指示发送给基站。 同时, 当 UE接收到基站 发送的随机接入响应后, 生成上行调度接入 ( Scheduled Up link transmission)消息, 该消息中包括 UE的 C-RNTI。 由于此时, UE曾经接入过 基站, 此次为重新接入基站, 故, 将 UE的 C-RNTI根据 UL Grant指示发送给 基站。
识别单元 121还用于识别确定请求接入基站的对象是否曾经接入该基站。 在本实施例中,识别单元 121将 RN的该上行调度接入信息中 C-RNTI与存储单 元 122保存的 RN的 C-RNTI进行匹配, 来确定该 RN是否曾经接入该基站。 若 上行调度接入信息中 C-RNTI与存储单元 122保存的 RN的 C-RNTI相同, 则说 明该 RN曾经接入过该基站。在本实施例中,识别单元 121将 UE的该上行调度 接入信息中 C-RNTI与存储单元 122保存的 UE的 C-RNTI进行匹配, 来确定该 UE是否曾经接入该基站。 若 UE的上行调度接入信息中 C-RNTI与保存的 UE的 C-RNTI相同, 则说明该 UE曾经接入过该基站。
管理单元 123还用于当识别单元 121识别确定请求接入基站的对象是否曾 经接入该基站后,根据优先接入原则选择请求接入基站的对象接入基站。在本 实施例中, 基站的优先接入原则包括优先选择 RN或优先选择 UE。 在本实施例 中, 以优先选择 RN作为第一个优先考虑的原则。 具体的实施过程可参见图 3 和图 8中的实施例描述。
本实施例提供的技术方案, 若 RN和 UE处于非初始接入基站时, 当 RN和
UE请求接入基站时, 当接收到基站返回的随机接入响应后, RN将需要发送基 站的上行调度接入消息中的 RRC Connec t ion Reques t消息包括 RN的 C-RNTI , 以用于确定该 RN是否曾经接入该基站, UE将需要发送基站的上行调度接入消 息中的 RRC Connect ion Reques t消息包括 UE的 C-RNTI , 以用于确定该 RN是 否曾经接入该基站; 若确定该 RN曾经接入该基站, 选择该 RN接入该基站, 从 而可以让基站识别请求接入的对象, 并当识别接入的对象后, 可以合理的选择 请求接入的对象,从而可以避免基站盲目的同意接入基站的请求, 并从而可以 避免当 RN和 UE同时请求接入时, 造成的混乱次序。
图 13为本发明实施例的中继节点的结构图。 在本实施例中, 中继节点 13 包括接收单元 130、 处理单元 131及发送单元 132。
当 RN是初始请求接入基站时:
发送单元 132用于发送随机接入请求消息至基站。当基站接收到请求接入 基站的对象发送的随机接入请求消息后, 即接收 RN发送的随机接入请求消息 后, 会发送随机接入响应。
接收单元 130用于接收基站发送的随机接入响应。
处理单元 131用于当接收单元 130接收到基站发送的随机接入响应后,生 成上行调度接入消息, 该消息中包括 RRC Connection Request消息, 并将 RRC Connection Request 消息中的 space 位设置为 1。 在本实施例中, 将 RRC Connection Request消息中的 space位设置为 1, 是用来标识清求接入基站的 对象是中继节点, 并用于基站区别请求接入基站的对象是 RN。
发送单元 132还用于将处理单元 131 生成的上行调度接入消息发送至基 站。 在本实施例中, 当基站识别确定请求接入基站的对象为 RN, 并选择该 RN 接入基站时, 基站通过 Temporary C-RNTI将解决接入的消息发送给 RN时, 就 可以认为是基站同意该 RN接入基站。
接收单元 130还用于基站通过 Temporary C-RNTI发送的解决接入的消息。 处理单元 131还用于通过 Temporary C-RNTI解调该解决接入的消息, 取出其 中的 RN的 NAS标识与自己本身的 NAS标识进行比对, 以确定自己本身是否成 功接入。 若相同, 则确定自己本身成功接入该基站。 当 RN确定自己成功接入 基站后, 将 TEMPORARY C-RNTI设置为 C_RNTI。 当 RN是非初始请求接入基站时:
处理单元 131还用于当接收单元 130接收到基站发送的随机接入响应后, 生成上行调度接入消息, 该消息中包括 RN的 C-RNTI。 在本实施例中, 基站将 该上行调度接入信息中 C-RNTI与保存的 RN的 C-RNTI进行匹配, 来确定该 RN 是否曾经接入该基站。 若上行调度接入信息中 C-RNTI与保存的 RN的 C-RNTI 相同, 则说明该 RN曾经接入过该基站。基站通过 C-RNTI发送解决接入的消息 至 RN。
本实施例提供的技术方案, 若 RN处于初始接入基站时, 当 RN请求接入基 站时, 当接收到基站返回的随机接入响应后,将需要发送基站的上行调度接入 消息中的 RRC Connect ion Reques t消息中的 space位设置为 1, 以用于标识 请求接入基站的对象是中继节点, 使基站通过确定该上行调度接入信息中的 RRC Connect ion Reques t 消息中的 s pace位的值, 来识别确认当前倚求接入 的对象是否为 RN, 当确定为 RN时, 根据优先原则确定 RN接入基站, 从而可 以让基站识别请求接入的对象, 并当识别接入的对象后, 可以合理的选择请求 接入的对象, 从而可以避免基站盲目的同意接入基站的请求。
本实施例中提供的技术方案, 当 RN处于非初始接入基站时, 当 RN请求 接入基站时, 当接收到基站返回的随机接入响应后,将需要发送基站的上行调 度接入消息中的 RRC Connect ion Reques t消息包括 RN的 C-RNTI , 以用于使 基站确定该 RN是否曾经接入该基站, 若确定该 RN曾经接入该基站, 选择该 R 接入该基站, 从而可以让基站识别请求接入的对象, 并当识别接入的对象 后, 可以合理的选择请求接入的对象,从而可以避免基站盲目的同意接入基站 的请求。 本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流程, 是可以通过计算机程序来指令相关的硬件来完成,所述的程序可存储于一计算 机可读取存储介质中,该程序在执行时,可包括如上述各方法的实施例的流程。 其中,所述的存储介质可为磁碟、光盘、只读存储记忆体(Read-Only Memory, ROM )或随机存储记忆体 ( Random Access Memory, RAM )等。
最后应说明的是:以上实施例仅用以说明本发明的技术方案而非对其进行 限制,尽管参照较佳实施例对本发明进行了详细的说明, 本领域的普通技术人 员应当理解: 其依然可以对本发明的技术方案进行修改或者等同替换, 而这些 修改或者等同替换亦不能使修改后的技术方案脱离本发明技术方案的精神和 范围。

Claims

权 利 要 求
1、 一种应用于请求接入基站的接入方法, 其特征在于, 所述方法包括: 基站接收请求接入基站的对象发送的随机接入请求消息;
所述基站返回随机接入响应至所述请求接入基站的对象;
所述基站接收所述请求接入基站的对象发送的上行调度接入消息; 根据所述上行调度接入消息中的 RRC Connect ion Reques t消息中的 space 位的值, 识别所述请求接入基站的对象;
若识别所述请求接入基站的对象为中继节点,将所述中继节点接入所述基 站。
2、 根据权利要求 1所述的方法, 其特征在于, 还包括:
若识别所述请求接入基站的对象包括中继节点和移动终端时,根据优先接 入原则选择所述中继节点或移动终端接入所述基站。
3、 根据权利要求 2所述的方法, 其特征在于, 所述根据优先接入原则选 择所述中继节点或移动终端接入所述基站的步骤包括:
若所述优先接入原则为优先选择中继节点时,选择所述中继节点接入所述 基站; 或
若所述优先接入原则为优先选择移动终端时,选择所述移动终端接入所述 基站。
4、 根据权利要求 1所述的方法, 其特征在于, 还包括:
当选择所述请求接入基站的对象接入所述基站后,保存所述对象的小区无 线网络临时标识 C-RNT I。
5、 根据权利要求 4所述的方法, 其特征在于, 还包括: 根据所述上行调度接入消息中的 RRC Connect i on Reques t 消息中的 C-RNTI , 确定所述请求接入基站的对象是否曾经接入所述基站。
6、 根据权利要求 5所述的方法, 其特征在于, 若所述请求接入基站的对 象为中继节点时, 所述根据所述上行调度接入消息中的 RRC Connect ion Reques t消息中的 C-RNTI,确定所述请求接入基站的对象是否曾经接入所述基 站包括:
将所述上行调度接入信息中 C-RNTI 与保存的中继节点的 C-RNTI 进行匹 配;
若所述上行调度接入信息中 C-RNTI与保存的中断节点的 C-RNTI相同,确 定所述请求接入基站的中继节点曾经接入所述基站;
选择所述中继节点接入所述基站。
7、 根据权利要求 5所述的方法, 其特征在于, 若所述请求接入基站的对 象包括中继节点和移动终端时, 所述根据所述上行调度接入消息中的 RRC Connect ion Reques t消息中的 C_RNTI, 确定所述请求接入基站的对象是否曾 经接入所述基站包括:
将所述中继节点和移动终端的上行调度接入信息中 C-RNTI与保存的中继 节点和移动终端的 C-RNTI进行匹配;
若所述中继节点的上行调度接入信息中 C-RNTI 与保存的中断节点的 C-RNTI相同, 并且所述移动终端的上行调度接入信息中 C-RNTI与保存的移动 终端的 C-RNTI相同时, 确定所述中继节点和移动终端都曾经接入所述基站。
8、 一种基站, 其特征在于, 所述基站包括: 接收单元, 发送单元, 识别 单元及管理单元;所述接收单元用于接收请求接入基站的对象发送的随机接入 请求消息; 所述发送单元用于向所述请求接入基站的对象返回随机接入响应; 其中,所述接收单元进一步用于所述发送单元返回随机接入响应至所述请 求接入基站的对象之后,接收所述请求接入基站的对象发送的上行调度接入消 息;
所述识别单元, 用于根据所述上行调度接入消息中的 RRC Connec t ion
Reques t消息中的 space位的值, 识别所述请求接入基站的对象;
所述管理单元, 用于当识别所述请求接入基站的对象为中继节点时, 将所 述中继节点接入所述基站。
9、 根据权利要求 8所述的基站, 其特征在于, 所述管理单元还用于当所 述识别单元确定所述请求接入基站的对象包括中继节点和移动终端时,根据优 先接入原则选择所述中继节点或移动终端接入所述基站。
10、 根据权利要求 9所述的基站, 其特征在于, 所述管理单元还用于当所 述优先接入原则为优先选择中继节点时,选择所述中继节点接入所述基站; 或 当所述优先接入原则为优先选择移动终端时, 选择所述基站接入所述基站。
11、 根据权利要求 8所述的基站, 其特征在于, 还包括:
存储单元, 用于当所述管理单元选择所述对象接入所述基站后,保存所述 对象的 C-RNTI。
12、 根据权利要求 11所述的基站, 其特征在于, 所述识别单元还用于根 据所述上行调度接入消息中的 RRC Connect ion Reques t消息中的 C-RNTI , 确 定所述请求接入基站的对象是否曾经接入所述基站。
13、 根据权利要求 12所述的基站, 其特征在于, 所述请求接入基站的对 象为中继节点时, 所述识别单元进一步用于将所述上行调度接入信息中 C-RNTI与所述存储 单元中保存的中继节点的 C-RNTI 进行匹配, 若所述上行调度接入信息中 C-RNTI与保存的中断节点的 C-RNTI相同, 确定所述请求接入基站的继节点曾 经接入所述基站。
14、 根据权利要求 12所述的基站, 其特征在于, 若所述请求接入基站的 对象包括中继节点和移动终端时,
所述识别单元进一步用于将所述中继节点和移动终端的上行调度接入信 息中 C-RNTI与所述存储单元中的保存的中继节点和移动终端的 C-RNTI进行匹 配, 若所述中继节点的上行调度接入信息中 C-RNTI 与保存的中断节点的 C-RNTI相同, 并且所述移动终端的上行调度接入信息中 C-RNTI与保存的移动 终端的 C-RNTI相同时, 确定所述中继节点和移动终端都曾经接入所述基站。
PCT/CN2010/077130 2009-09-24 2010-09-20 一种应用于请求接入基站的接入方法及基站 WO2011035706A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN2009101907439A CN102036409A (zh) 2009-09-24 2009-09-24 一种应用于请求接入基站的接入方法及基站
CN200910190743.9 2009-09-24

Publications (1)

Publication Number Publication Date
WO2011035706A1 true WO2011035706A1 (zh) 2011-03-31

Family

ID=43795400

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2010/077130 WO2011035706A1 (zh) 2009-09-24 2010-09-20 一种应用于请求接入基站的接入方法及基站

Country Status (2)

Country Link
CN (1) CN102036409A (zh)
WO (1) WO2011035706A1 (zh)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108012341B (zh) * 2017-12-05 2021-04-06 南京邮电大学 一种窄带物联网中联合节点分簇及数据缓存的接入方法
CN109922512A (zh) * 2017-12-12 2019-06-21 华为技术有限公司 一种中继系统接入方法及装置

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1816197A (zh) * 2005-02-02 2006-08-09 华为技术有限公司 一种保证特权无线用户即时接网的方法
CN101026889A (zh) * 2007-04-05 2007-08-29 华为技术有限公司 一种锁定非法复制的移动终端的方法、系统及基站
CN101155405A (zh) * 2006-09-29 2008-04-02 北京三星通信技术研究有限公司 随机接入过程中解决碰撞的设备和方法
WO2009077418A1 (en) * 2007-12-14 2009-06-25 Nokia Siemens Networks Oy Identification of relay base stations in wireless networks

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1816197A (zh) * 2005-02-02 2006-08-09 华为技术有限公司 一种保证特权无线用户即时接网的方法
CN101155405A (zh) * 2006-09-29 2008-04-02 北京三星通信技术研究有限公司 随机接入过程中解决碰撞的设备和方法
CN101026889A (zh) * 2007-04-05 2007-08-29 华为技术有限公司 一种锁定非法复制的移动终端的方法、系统及基站
WO2009077418A1 (en) * 2007-12-14 2009-06-25 Nokia Siemens Networks Oy Identification of relay base stations in wireless networks

Also Published As

Publication number Publication date
CN102036409A (zh) 2011-04-27

Similar Documents

Publication Publication Date Title
JP6609037B2 (ja) Mtc ueランダムアクセス方法及び装置
US10225780B2 (en) Device and method of handling radio resource control connection resume procedure
WO2018014728A1 (zh) 系统信息传输方法、用户终端、网络侧设备、系统及存储媒介
CN109792287B (zh) 一种传输响应消息的方法和装置
WO2018121343A1 (zh) 非连续接收调整方法及装置
TW201018292A (en) Methods and apparatuses for performing preamble assignment for random access in a telecommunications system
TWI697247B (zh) 處理無線通訊系統中的連結的裝置及方法
JP5738483B2 (ja) ネットワークアタッチ方法、中継ノード及び移動管理装置
EP3200486B1 (en) Connection establishment method, device, and system
CN109196919A (zh) 用于服务提供商的查询的无线电资源控制过程
TW201826842A (zh) 信息傳輸的方法、終端設備和網絡設備
WO2008025290A1 (fr) Système de communication mobile, dispositif et procédé d'accès aléatoire
US8483144B2 (en) Method for enhancing RRC procedure re-initiation efficiency in a wireless communications system and related apparatus
US11190591B2 (en) Methods, systems, and computer readable media for resource optimization in group message delivery for narrowband internet of things (NB-IoT) devices
WO2015109543A1 (zh) 一种资源指示方法、装置和系统
TWI670985B (zh) 處理雙連結的裝置及方法
WO2022236484A1 (zh) Sdt失败上报的方法、终端设备和网络设备
US10999729B2 (en) Discovery method and device
CN112567791A (zh) 请求系统消息块的方法及装置、通信设备及存储介质
WO2011035706A1 (zh) 一种应用于请求接入基站的接入方法及基站
WO2018058617A1 (zh) 一种随机接入的方法及装置
WO2017113402A1 (zh) 一种接入网络的方法及接入设备
CA2980952A1 (en) Ip address allocation method in d2d communication and user equipment
WO2015024214A1 (zh) 一种随机接入方法及相关装置
CN111867126A (zh) 随机接入方法和装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 10818400

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 10818400

Country of ref document: EP

Kind code of ref document: A1