WO2019061204A1 - 接入控制方法和装置 - Google Patents

接入控制方法和装置 Download PDF

Info

Publication number
WO2019061204A1
WO2019061204A1 PCT/CN2017/104126 CN2017104126W WO2019061204A1 WO 2019061204 A1 WO2019061204 A1 WO 2019061204A1 CN 2017104126 W CN2017104126 W CN 2017104126W WO 2019061204 A1 WO2019061204 A1 WO 2019061204A1
Authority
WO
WIPO (PCT)
Prior art keywords
access control
terminal device
control mode
information
access
Prior art date
Application number
PCT/CN2017/104126
Other languages
English (en)
French (fr)
Inventor
王宏
权威
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to PCT/CN2017/104126 priority Critical patent/WO2019061204A1/zh
Priority to CN201780094731.9A priority patent/CN111066346B/zh
Priority to EP17927016.0A priority patent/EP3678420A4/en
Publication of WO2019061204A1 publication Critical patent/WO2019061204A1/zh
Priority to US16/829,884 priority patent/US11317338B2/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions
    • H04W48/06Access restriction performed under specific conditions based on traffic conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/0231Traffic management, e.g. flow control or congestion control based on communication conditions
    • H04W28/0236Traffic management, e.g. flow control or congestion control based on communication conditions radio quality, e.g. interference, losses or delay
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • H04W48/12Access restriction or access information delivery, e.g. discovery data delivery using downlink control channel

Definitions

  • the embodiments of the present application relate to communication technologies, and in particular, to an access control method and apparatus.
  • Machine Type Communication refers to the machine-to-machine communication (M2M), which is a technology for transferring data from one terminal to another.
  • M2M machine-to-machine communication
  • wireless network access it refers to an electronic device with wireless access capability, which can directly access the wireless network through a SIM/USIM card, or can be relayed by a gateway device through Bluetooth, Zigbee, etc.
  • the wireless network in turn, communicates with the MTC server or another device.
  • MTC communication does not pursue data transmission rate, multi-band, multi-antenna and full-duplex transmission, but pursues longer terminal device battery time and lower terminal device cost, that is, the terminal is required to achieve low power consumption. Low cost.
  • MTC-type terminals such as water meters, electricity meters, etc.
  • the signal coverage strength of the terminal cannot meet the signal reception requirements, so the MTC is enhanced to enable the base station and the terminal to support extended coverage (Coverage enhancement), and the main method for implementing extended coverage It is repeated to send uplink or downlink signals multiple times, and achieves the purpose of improving data reception success rate by multiple receiving and combining.
  • the more times the transmission is repeated the more time-frequency resources are consumed.
  • the degree of enhanced coverage for example, according to the number of repeated transmissions, different enhanced coverage levels are separated, and different enhanced coverage levels correspond to different repeated transmission times.
  • the enhanced coverage level is higher, more repeated transmissions are required, and more resources are consumed. Due to the large amount of terminal deployment of the MTC type, if the network accepts the connection establishment request of all terminals in a short time, the network will be congested.
  • An embodiment of the present invention provides an access control method and apparatus, to prevent a terminal device in a network from being impacted on a network when accessing a network at the same time, and reducing network congestion.
  • the embodiment of the present application provides an access control method, including: receiving, by a terminal device, access control configuration information sent by a network device, where the access control configuration information is used to indicate access control corresponding to at least one coverage area.
  • the terminal device determines the coverage of the terminal device; the terminal device determines an access control mode of the terminal device according to the access control configuration information and the coverage of the terminal device.
  • the access control configuration information includes at least one access control mode information, where the access control mode information corresponds to at least one coverage area; Determining the access control mode of the terminal device according to the access control configuration information and the coverage of the terminal device, where the terminal device acquires the terminal device from the at least one access control mode information
  • the access control mode information corresponding to the coverage area determines the access control mode of the terminal device according to the access control mode information corresponding to the coverage of the terminal device.
  • the access control configuration information further includes at least one probability factor
  • the method further includes: The terminal device determines an access probability according to the coverage area corresponding to the terminal device and the at least one probability factor; and determining, by the terminal device, whether the access control mode is performed according to the access probability.
  • the terminal device determines, according to the access probability, whether to perform the access control mode
  • the method includes: the terminal device acquires a first random number, and when the first random number is greater than the access probability, determining to perform the access control mode, when the first random number is not greater than the access When the probability is determined, it is determined that the access control mode is not executed; or
  • the terminal device acquires a first random number, and when the first random number is smaller than the access probability, determining to perform the access control mode, when the first random number is not less than the access probability, It is determined that the access control mode is not executed.
  • the access control configuration information includes at least one probability factor, Determining the access control configuration information and the coverage of the terminal device to determine the access control mode of the terminal device, including: determining, by the terminal device, the access according to the coverage area corresponding to the terminal device and the at least one probability factor Probability; the terminal device determines an access control mode of the terminal device according to the access probability.
  • the terminal device determines, according to the access probability, access control of the terminal device
  • the method includes: the terminal device acquires a second random number, and when the second random number is greater than the access probability, determining that the access control mode is a first access control mode, when the second random number When the number is not greater than the access probability, determining that the access control mode is the second access control mode; or the terminal device acquiring the second random number, where the second random number is smaller than the access probability And determining that the access control mode is the first access control mode, and when the second random number is not less than the access probability, determining that the access control mode is the second access control mode.
  • the access control manner includes: accessing a current cell, or entering a preset access control The process, or camping on the current cell, or not accessing the current cell, or not entering the preset access control process, or not camping on the current cell; wherein the preset access control process includes an extended access restriction EAB process Any one or more of a specific service access control SSAC process, an access level restriction ACB process, and a specific application access control ACDC process; the first access control mode and the second access control mode are the Enter any two of the control methods.
  • the first access control mode and the second access control mode may be two access control modes set in the terminal device, and the terminal device may determine that the access control configuration information is sent by the network device. One of them serves as an access control method for the terminal device.
  • the method when the access control mode of the terminal device is the non-access to the current cell
  • the method further includes: The terminal device starts the timer, and notifies the non-access stratum that the current cell is forbidden to access; or, when the access control mode of the terminal device is that the non-resident is not camped on the current cell, the method further includes: The terminal device performs cell reselection.
  • the receiving, by the terminal device, the access control configuration information that is sent by the network device receives the system information sent by the network device, where the system information carries the access control configuration information; wherein the system information is one of the following information types; the system information block SIB2, the system information block SIB14, System information block SIB1 and main system information block MIB.
  • the method further includes: receiving, by the terminal device, an indication message sent by the network device And the indication message is used to indicate that the access control configuration information has been updated or is about to be updated; and the terminal device acquires the updated access control configuration information according to the indication message.
  • the indication message includes one bit information
  • the terminal device is configured according to the indication message.
  • Obtaining the updated access control configuration information where the terminal device acquires the updated access control configuration information according to the one-bit information;
  • the indication message includes M bit information, where M is the number of the at least one access control mode information, each bit bit information corresponds to one access control mode information, and the terminal device acquires an update according to the indication message.
  • the access control configuration information includes: the terminal device acquires bit position information of the terminal device from the M bit information, and determines access of the terminal device according to the bit bit information of the terminal device Whether the control mode information has been updated or is about to be updated. When the access control mode information of the terminal device is updated or is about to be updated, the terminal device acquires updated access control configuration information, where the bit of the terminal device The information is a bit corresponding to the access control mode information corresponding to the coverage of the terminal device; or
  • the indication information includes N pieces of bit information, N is the number of the at least one coverage area, each bit bit information corresponds to one coverage area, and the terminal device acquires the updated access control configuration according to the indication message.
  • the information includes: the terminal device acquires bit bit information corresponding to the coverage of the terminal device from the N bit information, and determines the terminal device according to the bit bit information corresponding to the coverage of the terminal device. Whether the access control mode information corresponding to the coverage area has been updated or is about to be updated. When the access control mode information corresponding to the coverage of the terminal device has been updated or is about to be updated, the terminal device acquires the updated access control configuration. information.
  • the embodiment of the present application provides an access control method, including: determining, by a network device, access control configuration information, where the access control configuration information is used to indicate an access control mode corresponding to at least one coverage area; The network device sends the access control configuration information to the terminal device, where the access control configuration information is used to determine an access control mode of the terminal device.
  • the access control configuration information includes at least one access control mode information, where the access control mode information corresponds to at least one coverage area, where the The inbound control mode information is used to indicate an access control mode corresponding to the at least one coverage area corresponding thereto, and the at least one access control mode information is used to determine an access control mode of the terminal device.
  • the access control configuration information further includes at least one probability factor, the at least one probability factor Used to determine The access probability of the terminal device, where the access probability is used to determine whether to perform an access control mode of the terminal.
  • the access control configuration information includes at least one probability factor, the at least one probability factor And determining an access probability of the terminal device, where the access probability is used to determine an access control mode of the terminal device.
  • the access control manner includes: accessing a current cell, or entering a preset access control Flowing, or not accessing the current cell, or camping on the current cell, or not camping on the current cell, or not entering the preset access control process; wherein the preset access control process includes an extended access restriction EAB process Any one or more of the specific service access control SSAC process, the access level limit ACB process, and the specific application access control ACDC process.
  • the network device sends the access control configuration information to the terminal device, including: The network device sends the access control configuration information to the terminal device by using system information; wherein the system information is one of the following information types: a system information block SIB2, a system information block SIB14, a system information block SIB1, and Main system information block MIB.
  • system information is one of the following information types: a system information block SIB2, a system information block SIB14, a system information block SIB1, and Main system information block MIB.
  • the method further includes: the network device sending an indication message to the terminal device, in another possible implementation manner of the second aspect, The indication message is used to indicate that the access control configuration information has been updated or is about to be updated; wherein the indication message is carried in a paging message and/or system information.
  • the indication message includes one bit information, where the one bit information is used to indicate The access control configuration information has been updated or is about to be updated; or,
  • the indication message includes M bit information, where M is the number of the at least one access control mode information, and each bit information corresponds to one access control mode information, and each bit information is used to indicate a corresponding The access control mode information has been updated or will be updated soon; or,
  • the indication information includes N pieces of bit information, where N is the number of the at least one coverage range, each bit bit information corresponds to one coverage area, and each bit bit information is used to indicate access corresponding to the coverage area corresponding thereto. Control information has been updated or will be updated soon.
  • the embodiment of the present application provides a device, which may be a terminal device, or a component of a terminal device structure, or a device that is structurally independent of a terminal device, and the device has the foregoing first aspect or The function of the behavior of the terminal device in any of the implementations of the first aspect.
  • This function can be implemented in hardware or in hardware by executing the corresponding software.
  • the hardware or software includes one or more modules corresponding to the functions described above.
  • the embodiment of the present application provides a device, which may be a terminal device, or a component of a terminal device structure, or a device that is structurally independent of a terminal device, and includes: a processor, a memory, and a bus and a communication interface; the memory is configured to store a computer execution instruction, the processor is connected to the memory through the bus, and when the terminal device is running, the processor executes the computer execution instruction stored in the memory to enable the terminal device An access control method as in the above first aspect or any one of the first aspects.
  • an embodiment of the present application provides a computer readable storage medium, configured to store computer software instructions used by the terminal device, when the computer is running on a computer, to enable the computer to perform the first aspect or the first An access control method of any of the aspects.
  • the embodiment of the present application provides a computer program product including instructions, when the computer program product is run on a computer, the computer can perform the access control method of any one of the foregoing first aspect or the first aspect .
  • the embodiment of the present application provides a device, which may be a network device, or a component of a network device structure, or a device that is structurally independent of a network device, and the device has the foregoing second aspect or The function of network device behavior in any of the implementations of the second aspect.
  • This function can be implemented in hardware or in hardware by executing the corresponding software.
  • the hardware or software includes one or more modules corresponding to the functions described above.
  • the embodiment of the present application provides a device, which may be a network device, or a component of a network device, or a device that is structurally independent of a network device, where the device includes: a processor, a memory, a bus, and a communication interface; the memory is configured to store a computer execution instruction, the processor is connected to the memory through the bus, and when the network device is running, the processor executes the computer execution instruction stored by the memory, so that the network device performs The access control method of any of the foregoing second aspect or the second aspect.
  • the embodiment of the present application provides a computer readable storage medium for storing computer software instructions used by the network device, when the computer is running on a computer, so that the computer can execute the second aspect or the second An access control method of any of the aspects.
  • the embodiment of the present application provides a computer program product including instructions, when the computer program is run on a computer, the computer can perform the access control method of any one of the foregoing second aspect or the second aspect. .
  • an embodiment of the present application provides a chip, including: a memory and a processor;
  • the memory is configured to store program instructions
  • the processor is configured to invoke the program instruction stored in the memory to implement the access control method according to any one of the first aspect or the first aspect.
  • the embodiment of the present application provides a chip, including: a memory and a processor;
  • the memory is configured to store program instructions
  • the processor is configured to invoke the program instruction stored in the memory to implement the access control method according to any one of the second aspect or the second aspect.
  • the embodiment of the present application provides a storage medium, including: a readable storage medium and a computer program, where the computer program is used to implement the connection according to the first aspect or any one of the first aspects.
  • a storage medium including: a readable storage medium and a computer program, where the computer program is used to implement the connection according to the first aspect or any one of the first aspects.
  • the embodiment of the present application provides a storage medium, including: a readable storage medium and a computer program, where the computer program is used to implement the connection according to any one of the second aspect or the second aspect.
  • a storage medium including: a readable storage medium and a computer program, where the computer program is used to implement the connection according to any one of the second aspect or the second aspect.
  • the embodiment of the present application provides a program product, where the program product includes a computer program, where the computer program is stored in a readable storage medium, and at least one processor of the communication device can be from the readable storage medium The computer program is read, the at least one processor executing the computer program causing the communication device to implement the access control method as described in the first aspect or any one of the first aspects.
  • the embodiment of the present application provides a program product, where the program product includes a computer program, where the computer program is stored in a readable storage medium, and at least one processor of the communication device can be from the readable storage medium Reading the computer program, the at least one processor executing the computer program such that the communication device implements as a second The access control method of any of the aspects or the implementation of the second aspect.
  • the network device sends the access control configuration information to the terminal device, where the access control configuration information is used to indicate the access control mode information corresponding to the at least one coverage area, and the terminal device according to the access control
  • the configuration information and the coverage of the terminal device determine the access control mode of the terminal device, and perform corresponding operations in the access control mode of the terminal device, thereby preventing the terminal device in the network from simultaneously accessing the network, causing impact on the network and reducing Network congestion.
  • FIG. 1 is a schematic diagram of an application scenario of an access control method according to the present application
  • FIG. 3 is a flowchart of another access control method according to the present application.
  • FIG. 5 is a flowchart of another access control method according to the present application.
  • FIG. 6 is a flowchart of another access control method according to the present application.
  • FIG. 10 is a flowchart of still another access control method according to the present application.
  • FIG. 11 is a schematic structural diagram of a terminal device according to the present application.
  • FIG. 12 is a schematic structural diagram of another terminal device according to the present application.
  • FIG. 13 is a schematic structural diagram of a chip of the present application.
  • FIG. 14 is a schematic structural diagram of a network device according to the present application.
  • 15 is a schematic structural diagram of another network device according to the present application.
  • 16 is a schematic structural view of another chip of the present application.
  • FIG. 1 is a schematic diagram of an application scenario of an access control method according to the present application.
  • the access control method of the present application may be specifically applied to a Long Term Evolution (LTE) communication system, and a terminal device passes through a base station.
  • the (eNB) accesses the core network, and the base station provides functions such as radio resource management, organization and transmission of paging messages, and organization and transmission of broadcast messages.
  • the access control method of the present application can configure access control to terminal devices of different coverage areas. The method enables the terminal device to access the network in the access control mode configured by the base station, thereby preventing the terminal device in the network from simultaneously accessing the network and causing impact on the network, thereby reducing network congestion.
  • the access control method of the present application can also be applied to a 5G communication system, and correspondingly, the eNB is replaced by a DU or a CU.
  • the access control method can also be applied to any applicable communication system.
  • the network device and the terminal device are the network side device and the terminal side device in the corresponding communication system.
  • the network device in the present application may specifically refer to a wireless access device, and may be, for example, an evolved base station eNB, a distributed unit (DU), a centralized unit (CU), a base station NodeB, and a base station in a future communication system.
  • a wireless access device may be, for example, an evolved base station eNB, a distributed unit (DU), a centralized unit (CU), a base station NodeB, and a base station in a future communication system.
  • DU distributed unit
  • CU centralized unit
  • NodeB base station NodeB
  • the specific technology and the specific device configuration adopted by the network device are not limited in the embodiment of the present application.
  • the terminal device involved in the present application specifically refers to a wireless access device, and may be, for example, a terminal, a user equipment (UE), a mobile station (MS), a mobile terminal (mobile terminal, MT) and so on.
  • the terminal device may be a mobile phone, a tablet (Pad), a computer with wireless transceiver function, a Machine Type Communication (MTC) terminal, a virtual reality (VR) terminal, and an augmented reality (Augmented Reality).
  • MTC Machine Type Communication
  • VR virtual reality
  • AR Augmented Reality
  • wireless terminal in industrial control wireless terminal in self driving, wireless terminal in remote medical surgery, wireless terminal in transportation safety Wireless terminals in smart cities, wireless terminals in smart homes, and so on.
  • the MTC terminal is an electronic device using MTC technology, and the electronic device supports low power consumption, low complexity, and coverage enhancement.
  • the wireless terminal in a smart grid such as an electric meter or a water meter, may be used.
  • the MTC technology is for the development of the Internet of Things (IoT), and the communication technology introduced by the 3GPP in the evolution of the LTE technology is specifically used for communication of low-power, low-cost electronic devices.
  • the network devices and terminal devices of the present application can be deployed on land, including indoors or outdoors, hand-held or on-board; they can also be deployed on the water; they can also be deployed on aircraft, balloons, and satellites in the air.
  • the application scenarios of the network device and the terminal device are not limited in the embodiment of the present application.
  • the "coverage” involved in the present application refers specifically to an area where the reference signal strength satisfies certain conditions, and the strength of the reference signal of the network device in the area is determined by the terminal device in the area, and the condition can be flexibly set according to requirements, and different conditions
  • the coverage area of the network device can be divided into one or multiple coverage areas, and the coverage of the coverage area is the granularity of the access control, and the terminal in the coverage area of the network device is controlled.
  • the condition may be an intensity range of the reference signal, and the strength of the terminal device measuring the reference signal is within the intensity range, and the coverage is the coverage of the terminal device.
  • the strength of the reference signal may be a reference signal receiving power (RSRP), a reference signal receiving quality (RSRQ), or a parameter signal to interference and noise ratio (Signal Interfernece).
  • RSRP reference signal receiving power
  • RSRQ reference signal receiving quality
  • SINR Noise Ratio
  • the Reference Signal refers to a "pilot" signal, which is a known signal that is provided by the transmitting end to the receiving end for channel estimation or channel sounding.
  • a network device acts as a transmitting end and a terminal device acts as a receiving end.
  • the “coverage” of the MTC terminal device may be a coverage corresponding to one or more coverage enhancement (CE) levels.
  • CE coverage enhancement
  • the “access control mode” involved in the present application may be used to indicate that the terminal device accesses the current cell, enters a preset access control procedure, or camps on the current cell, or does not access the current cell, or does not enter the pre-entry. Set the access control procedure or not to camp on the current cell. It should be noted that the specific behavior of the terminal device indicated by the foregoing access control mode may be different according to different scenarios or implementations, and is not specifically limited herein. Wherein the preset The access control process includes any one or more of an extended access restriction EAB process, a specific service access control SSAC process, an access level restriction ACB process, and a specific application access control ACDC process.
  • FIG. 2 is a flowchart of an access control method according to the present application.
  • the present embodiment relates to a network device and a terminal device. As shown in FIG. 2, the method in this embodiment may include:
  • Step 101 The network device determines access control configuration information, where the access control configuration information is used to indicate an access control mode corresponding to at least one coverage area.
  • the network device may determine the access control configuration information according to the load state of the network, and the determining manner of the access control configuration information may be flexibly set according to the access control requirement of the network.
  • the access control configuration information may be used to indicate an access control mode corresponding to one or more coverage areas.
  • the access control methods corresponding to different coverage areas may be the same or different.
  • the network device can configure the access control mode to the terminal devices in different coverage areas by using the access control configuration information, so that the terminal device can access the network by using the access control mode corresponding to the coverage area of the terminal device.
  • Step 102 The network device sends the access control configuration information to the terminal device, where the terminal device receives the access control configuration information sent by the network device.
  • the access control configuration information is used to determine an access control mode of the terminal device.
  • the network device may send the access control configuration information in a broadcast manner, and the specific message carrying the access control configuration information may be flexibly set according to requirements.
  • Step 103 The terminal device determines a coverage range of the terminal device.
  • the terminal device determines the coverage of the terminal device according to the signal strength of the measurement network device.
  • Step 104 The terminal device determines an access control mode of the terminal device according to the access control configuration information and the coverage of the terminal device.
  • the access control mode of the terminal device may be any one of the foregoing access control modes.
  • the terminal device performs the access control mode according to the terminal device. The corresponding operation. Therefore, the terminal device determines the access control mode corresponding to the coverage of the terminal device by sending the access control configuration information to the terminal device.
  • the specific implementation manner of the access control mode that the network device indicates that the at least one coverage area corresponds to the access control configuration information may include two types.
  • An implementation manner is: direct indication mode: the foregoing access control configuration information may include at least one access control mode information, where the access control mode information corresponds to at least one coverage area, and the access control mode information is used to indicate And the access control mode corresponding to the at least one coverage area, the at least one access control mode information is used to determine an access control mode of the terminal device; and another achievable mode, an indirect indication mode:
  • the foregoing access control configuration information includes at least one probability factor, where the at least one probability factor is used to determine an access probability of the terminal device, and the access probability is used to determine an access control mode of the terminal device.
  • the foregoing access control modes of the present application may specifically have many different setting modes.
  • An implementation manner includes accessing a current cell or entering a preset access control process. Specifically, the terminal device determines, according to the access control configuration information and the coverage of the terminal device, the access control mode of the terminal device to access the current cell or enter a preset access control process. When the access control mode of the terminal device is to access the current cell, the terminal device may request to access the network device. When the access control mode of the terminal device is to enter the preset access control process, the terminal device may enter a preset access control process to further determine whether to prohibit the connection. In.
  • the access control mode includes entering a preset access control procedure or not accessing a current cell. Specifically, the terminal device determines, according to the access control configuration information and the coverage of the terminal device, that the access control mode of the terminal device does not access the current cell or enters a preset access control process. When the access control mode of the terminal device is not accessing the current cell, the terminal device may start a timer, and the terminal device may notify the non-access stratum (NAS) layer to access the network at the RRC layer. The device is limited. During the operation of the timer, the terminal device no longer requests access to the network device at the RRC layer. When the access control mode of the terminal device is to enter the preset access control process, the terminal device may enter a preset access control process to further determine whether to prohibit access.
  • NAS non-access stratum
  • the access control mode includes accessing the current cell or not accessing the current cell.
  • the terminal device determines, according to the access control configuration information and the coverage of the terminal device, the access control mode of the terminal device to access the current cell or not to access the current cell.
  • the terminal device may request to access the network device.
  • the terminal device may start a timer, and the terminal device may notify the NAS layer that the access network device is restricted at the RRC layer. During the operation of the timer, the terminal device no longer requests access to the network device at the RRC layer.
  • the access control mode includes camping to the current cell or not camping on the current cell. Specifically, the terminal device determines, according to the access control configuration information and the coverage of the terminal device, the access control mode of the terminal device to camp on the current cell or not camp on the current cell. When the access control mode of the terminal device is to camp on the current cell, the terminal device may camp under the current network device and request access to the network device. When the access control mode of the terminal device is not to camp on the current cell, the terminal device reselects the resident network device and does not reside in the cell of the current network device.
  • the value of the bit "0" indicates one of the foregoing implementation modes.
  • the value "1" of the bit indicates another access control mode.
  • the access control mode includes accessing the current cell or entering the preset access control flow.
  • the value of the bit "0" indicates that the current cell is accessed.
  • the value of the bit is "1" to indicate the entry.
  • the access control procedure is set, or the value of the bit "0" indicates that the preset access control procedure is entered, and the value of the bit "1" indicates access to the current cell.
  • the foregoing preset access control process may include an Extended Access Barring (EAB) process, a Service Specific Access Control (SSAC) process, and an Access Class Barring (ACB) process. And any one or more of the Application Specific Access Class Barring (ACDC) processes.
  • EAB Extended Access Barring
  • SSAC Service Specific Access Control
  • ACDC Access Class Barring
  • EAB, SSAC, ACB, and ACDC processes are not limited, and may be the same as the prior art, or may be performed on the prior art process without changing the implementation function. Some adjustments or changes can be determined by those skilled in the art as processes such as EAB, SSAC, ACB, ACDC, and the like. This embodiment of the present application is not limited thereto.
  • the specific implementation manner of the foregoing step 102 may be: the network device broadcasts system information, where the system information carries the access control configuration information.
  • the system information is one of the following information types: a system information block SIB2, a system information block SIB14, a system information block SIB1, and a main system information block MIB.
  • the network device sends the access control configuration information to the terminal device, where the access control configuration information is used to indicate the access control mode corresponding to the at least one coverage area, and the terminal device uses the access control configuration information and the The coverage of the terminal device determines the access control mode of the terminal device, and performs corresponding operations in the access control mode of the terminal device, thereby preventing the terminal device in the network from simultaneously accessing the network, causing impact on the network and reducing network congestion.
  • FIG. 3 is a flowchart of another access control method according to the present application.
  • the access control configuration information is directly explained by using a direct indication manner.
  • the method in this embodiment may include:
  • Step 201 The network device determines the access control configuration information, where the access control configuration information includes at least one access control mode information, where the access control mode information corresponds to at least one coverage area.
  • the access control configuration information may include at least one access control mode information, where the access control mode information is used to indicate at least one coverage, and the access control mode information is used to indicate the at least one coverage corresponding thereto.
  • the at least one access control mode information is used to determine an access control mode of the terminal device.
  • the corresponding relationship between the coverage and the access control mode information may be: the correspondence between the achievable mode and the coverage and the access control mode information is one-to-one correspondence, that is, each coverage area corresponds to one access control mode. Information; another achievable manner, the correspondence between the coverage and the access control mode information is many-to-one, that is, multiple coverage areas correspond to one access control mode information. It can be flexibly set according to requirements.
  • each coverage area corresponds to one access control mode information, so that the access control modes of each coverage area are independent of each other, and the access control mode settings of multiple coverage areas are more flexible.
  • multiple coverage areas correspond to one access control mode information, which can reduce the resource size occupied by the access control configuration information.
  • the at least one access control mode information may be a bit string or a bitmap, that is, one access control mode information may be one bit.
  • the length of the access control configuration information can be flexibly set according to the access control requirement. For example, if one bit is set to correspond to one coverage, the number of bits of the access control configuration information and the number of coverage areas are Equivalent, each bit is used to indicate the access control mode in a coverage area. Of course, it can be understood that one bit can be set to correspond to two coverage ranges, which are not illustrated here.
  • an access control mode information may also be multiple bits, for example, three bits, and each three bits are used to indicate an access control mode under at least one coverage. It can be flexibly set according to requirements.
  • the at least one access control mode information may also be a list, that is, an access control mode information may be a parameter carried in a row in the list, and the terminal device may determine, according to the parameter, an access control mode indicated by the row. For example, if one line is set to correspond to one coverage area, the number of rows of the access control configuration information is equal to the number of coverage areas, and each line is used to indicate an access control mode under a coverage area, which is understandable. You can also set one line to correspond to two coverage areas, which are not illustrated here.
  • the at least one coverage area is at least one coverage area configured in advance.
  • the network device may pre-configure at least one coverage area, that is, divide the coverage area of the network device in advance, and notify the terminal device of the condition that each coverage area satisfies the signal strength, and the terminal device may determine the terminal device according to the measured signal strength of the terminal device. Coverage.
  • the access control configuration information may further include coverage information for indicating the at least one coverage, by which the division of the coverage is indicated to the terminal device.
  • the access control configuration information further includes The three measured values are a1, a2 and a3, respectively, and the three measured values indicate four coverage ranges, namely coverage 1, coverage 2, coverage 3 and coverage 4, wherein the signal measurement of coverage 1 If the result is less than a1, the signal measurement result of the coverage 2 satisfies the ratio of a1 and less than a2, and the signal measurement result of the coverage 3 satisfies the ratio of a2 and less than a3, and the signal measurement result of the coverage 4 satisfies the ratio of a4 or more.
  • the network device can flexibly adjust the coverage division in the network according to the access control requirements.
  • the foregoing coverage information may specifically include at least one RSRP value.
  • the foregoing a1, a2, and a3 are RSRP values.
  • Step 202 The network device sends the access control configuration information to the terminal device, where the terminal device receives the access control configuration information sent by the network device.
  • Step 203 The terminal device determines a coverage range of the terminal device.
  • Step 204 The terminal device obtains the access control mode information corresponding to the coverage of the terminal device from the at least one access control mode information, and determines the access control mode of the terminal device according to the access control mode information corresponding to the coverage of the terminal device.
  • the access control configuration information is 0101, where the first bit corresponds to the coverage area 1, the second bit corresponds to the coverage area 2, and so on, and the fourth bit corresponds to the coverage area 4.
  • the terminal device belongs to the coverage area 1, and the terminal device The device obtains the value of the first bit of the access control configuration information, that is, 0, where "0" indicates that the current cell is not camped, and the terminal device determines that the access control mode of the terminal device does not camp on the current cell.
  • the network device sends the access control configuration information to the terminal device, where the access control configuration information includes at least one access control mode information, and the terminal device determines the location according to the at least one access control mode information and the coverage of the terminal device.
  • the access control mode of the terminal device performs the corresponding operation in the access control mode of the terminal device, thereby reducing the load of the network device according to the coverage range, and preventing the terminal device in the network from simultaneously accessing the network, thereby reducing the impact on the network. Network congestion.
  • FIG. 4 is a flowchart of another access control method of the present application.
  • the access control configuration information may further include at least one probability factor, the at least one probability factor.
  • the method for determining the access probability of the terminal device, where the access probability is used to determine whether to perform the access control mode of the terminal, as shown in FIG. 4, the method in this embodiment may include:
  • Step 301 The network device determines access control configuration information, where the access control configuration information includes at least one access control mode information and at least one probability factor.
  • step 201 of the embodiment shown in FIG. 3 For the specific explanation of the at least one access control mode information, refer to step 201 of the embodiment shown in FIG. 3, and details are not described herein again.
  • Step 302 The network device sends the access control configuration information to the terminal device, where the terminal device receives the access control configuration information sent by the network device.
  • Step 303 The terminal device determines a coverage range of the terminal device.
  • Step 304 The terminal device obtains the access control mode information corresponding to the coverage of the terminal device from the at least one access control mode information, and determines the access control mode of the terminal device according to the access control mode information corresponding to the coverage of the terminal device.
  • step 304 For a detailed explanation of the step 304, reference may be made to the step 204 of the embodiment shown in FIG. 3, and details are not described herein again.
  • Step 305 The terminal device determines an access probability according to the coverage area corresponding to the terminal device and the at least one probability factor.
  • Step 306 The terminal device determines, according to the access probability, whether to perform the access control mode.
  • An implementation manner of the step 306 may be: the terminal device acquires a first random number, and when the first random number is greater than the access probability, determining to perform the access control mode, when When the first random number is not greater than the access probability, it is determined that the access control mode is not performed.
  • Another implementation manner of step 306 may be: the terminal device acquires a first random number, and when the first random number is less than the access probability, determining to perform the access control mode, when the first When a random number is not less than the access probability, it is determined that the access control mode is not executed.
  • An implementation manner of the terminal device acquiring the first random number may be that the terminal device generates the first random number, and another implementation manner may be that the terminal device obtains the first random number from another device or module, and the specific implementation is implemented.
  • the method can be flexibly set according to the method.
  • an implementation manner of the step 305 may be: the terminal device may determine the access probability according to the received power RSRP of the measurement reference signal of the terminal device, and at least one probability factor.
  • the terminal device may be according to the formula (1). ) Determine the access probability.
  • the receiving power RSRP of the terminal device measurement reference signal is related to the coverage area corresponding to the terminal device.
  • n is the number of the at least one probability factor
  • n is an arbitrary natural number.
  • the network device sends the access control configuration information to the terminal device, where the access control configuration information includes at least one access control mode information and at least one probability factor, and the terminal device according to the at least one access control mode information and the terminal device
  • the coverage of the terminal device determines the access control mode of the terminal device, and the terminal device further determines whether to perform the access control mode according to the at least one probability factor, so as to reduce the load of the network device according to the coverage, and avoid the terminal device in the network simultaneously Into the network, the impact on the network, reducing network congestion.
  • the terminal devices in the same coverage area can implement different access control by using at least one probability factor.
  • FIG. 5 is a flowchart of another access control method according to the present application.
  • the access control configuration information is specifically explained by using an indirect indication manner.
  • the method in this embodiment may include:
  • Step 401 The network device determines access control configuration information, where the access control configuration information includes at least one probability factor.
  • the at least one probability factor is used to determine an access probability of the terminal device, where the access probability is used to determine an access control mode of the terminal device.
  • Step 402 The network device sends the access control configuration information to the terminal device, where the terminal device receives the access control configuration information sent by the network device.
  • Step 403 The terminal device determines a coverage range of the terminal device.
  • Step 404 The terminal device determines an access probability according to the coverage area corresponding to the terminal device and the at least one probability factor.
  • the terminal device can receive the RSRP according to the measurement reference signal of the terminal device And the at least one probability factor determines the access probability.
  • the terminal device may determine the access probability according to the above formula (1).
  • the receiving power RSRP of the measurement reference signal of the terminal device is related to the coverage range corresponding to the terminal device.
  • Step 405 The terminal device determines an access control mode of the terminal device according to the access probability.
  • the terminal device may obtain the second random number, and when the second random number is greater than the access probability, determine that the access control mode is the first access control mode. And determining, when the random number is not greater than the access probability, the access control mode is a second access control mode.
  • Another implementation manner of the step 404 is that the terminal device acquires the second random number, and when the second random number is smaller than the access probability, determining that the access control mode is the first access control mode, When the random number is not less than the access probability, determining that the access control mode is the second access control mode.
  • the first access control mode and the second access control mode are any two of the foregoing access control modes.
  • the first access control mode may be accessing the current cell, and the second access control mode. It is possible to enter the preset access control process.
  • the first access control mode and the second access control mode may be two access control modes set in the terminal device, and the access control configuration information sent by the network device, the terminal device It can be determined that one of them is the access control mode of the terminal device.
  • An implementation manner of the terminal device acquiring the second random number may be that the terminal device generates the second random number, and another implementation manner may be that the terminal device obtains the second random number from another device or module, and the specific implementation is implemented.
  • the method can be flexibly set according to the method.
  • the network device sends the access control configuration information to the terminal device, where the access control configuration information includes at least one probability factor, and the terminal device determines the access control of the terminal device according to the at least one probability factor and the coverage of the terminal device.
  • the corresponding operation is performed in the access control mode of the terminal device, so that the load of the network device is reduced according to the coverage, and the terminal device in the network is prevented from simultaneously accessing the network, causing impact on the network and reducing network congestion.
  • FIG. 6 is a flowchart of another access control method according to the present application.
  • the terminal device receives the access control configuration information sent by the network device, the terminal device performs corresponding The operation is specifically explained.
  • the access control mode is used to access the current cell or enter the preset access control process.
  • the method in this embodiment may include:
  • the access control mode of the terminal device in this embodiment specifically refers to an access control mode corresponding to the coverage of the terminal device.
  • Step 501 The terminal device receives a connection establishment request sent by the NAS layer at the RRC layer.
  • the terminal device sends a connection establishment request at the NAS layer.
  • Step 502 The terminal device determines, according to the access control configuration information and the coverage of the terminal device, the access control mode of the terminal device at the RRC layer.
  • the terminal device performs detection of the coverage-based access control mode when receiving the connection establishment request sent by the NAS layer. Specifically, the terminal device determines an access control manner corresponding to the coverage of the terminal device according to the access control configuration information and the coverage of the terminal device.
  • a specific implementation manner of the step in any of the foregoing embodiments may be used in the specific implementation manner, and details are not described herein again.
  • Step 503 When the access control mode of the terminal device is accessing the current cell, the terminal device requests access to the network device at the RRC layer.
  • Step 504 When the access control mode of the terminal device is to enter the preset access control process, the terminal device performs a preset access control process.
  • the network device sends the access control configuration information to the terminal device, and the terminal device determines the access control mode of the terminal device according to the access control configuration information and the coverage of the terminal device, and the access control mode of the terminal device
  • the corresponding operations are performed to reduce the load of the network device according to the coverage, and the terminal devices in the network are simultaneously connected to the network, causing impact on the network and reducing network congestion.
  • FIG. 7 is a flowchart of still another access control method of the present application.
  • the terminal device receives the access control configuration information sent by the network device, the terminal device performs corresponding The operation is specifically explained.
  • the access control mode the current cell is not accessed or the preset access control process is taken as an example.
  • the method in this embodiment may include:
  • the access control mode of the terminal device in this embodiment specifically refers to an access control mode corresponding to the coverage of the terminal device.
  • Step 601 The terminal device receives a connection establishment request sent by the NAS layer at the RRC layer.
  • the terminal device sends a connection establishment request at the NAS layer.
  • Step 602 The terminal device determines, according to the access control configuration information and the coverage of the terminal device, the access control mode of the terminal device at the RRC layer.
  • the terminal device performs detection of the coverage-based access control mode when receiving the connection establishment request sent by the NAS layer. Specifically, the terminal device determines an access control manner corresponding to the coverage of the terminal device according to the access control configuration information and the coverage of the terminal device.
  • a specific implementation manner of the step in any of the foregoing embodiments may be used in the specific implementation manner, and details are not described herein again.
  • Step 603 When the access control mode of the terminal device is not accessing the current cell, the terminal device starts a timer, and notifies the NAS layer that access is prohibited. During the running of the timer, the terminal device does not request to be connected at the RRC layer. Enter the network device.
  • the terminal device notifies the NAS layer that the access is prohibited at the RRC layer, and may also notify the NAS layer of the reason why the access is prohibited.
  • the reason why the access is prohibited may be limited by the coverage.
  • the RRC layer notifies the NAS layer that the connection has been canceled, and the NAS layer can re-send the connection establishment request to the RRC layer.
  • Step 604 When the access control mode of the terminal device is to enter the preset access control process, the terminal device performs a preset access control process.
  • the network device sends the access control configuration information to the terminal device, and the terminal device determines the access control mode of the terminal device according to the access control information and the coverage of the terminal device, and performs the access control mode of the terminal device. Corresponding operations, so as to reduce the load of the network device according to the coverage, avoid the terminal equipment in the network accessing the network at the same time, impact on the network, and reduce network congestion.
  • the access control mode in this embodiment does not access the current cell or enters a preset access control process, where the terminal devices in some coverage areas are directly prohibited from being accessed, thereby reducing the network device more quickly and effectively. load.
  • FIG. 8 is a flowchart of still another access control method of the present application.
  • the terminal device After receiving the access control configuration information sent by the network device, the terminal device performs corresponding The operation is specifically explained.
  • the access control mode is used to access the current cell or not to access the current cell.
  • the method in this embodiment may include:
  • the access control mode of the terminal device in this embodiment specifically refers to an access control mode corresponding to the coverage of the terminal device.
  • Step 701 The terminal device receives a connection establishment request sent by the NAS layer at the RRC layer.
  • the terminal device sends a connection establishment request at the NAS layer.
  • Step 702 The terminal device determines, according to the access control configuration information and the coverage of the terminal device, the access control mode of the terminal device at the RRC layer.
  • the terminal device performs detection of the coverage-based access control mode when receiving the connection establishment request sent by the NAS layer. Specifically, the terminal device determines an access control manner corresponding to the coverage of the terminal device according to the access control configuration information and the coverage of the terminal device.
  • a specific implementation manner of the step in any of the foregoing embodiments may be used in the specific implementation manner, and details are not described herein again.
  • Step 703 When the access control mode of the terminal device is not accessing the current cell, the terminal device starts a timer, and notifies the NAS layer that access is prohibited. During the running of the timer, the terminal device does not request to be connected at the RRC layer. Enter the network device.
  • the terminal device notifies the NAS layer that the access is prohibited at the RRC layer, and may also notify the NAS layer of the reason why the access is prohibited.
  • the reason why the access is prohibited is limited by the coverage.
  • the RRC layer notifies the NAS layer that the connection has been canceled, and the NAS layer can re-send the connection establishment request to the RRC layer.
  • Step 704 When the access control mode of the terminal device is to access the current cell, the terminal device requests access to the network device at the RRC layer.
  • the access control method in this embodiment may be executed after any one or more of the existing EAB process, the SSAC process, the ACB process, and the ACDC process.
  • the access control method of the embodiment is performed.
  • the network device sends the access control configuration information to the terminal device, and the terminal device determines the access control mode of the terminal device according to the access control information and the coverage of the terminal device, and performs the access control mode of the terminal device. Corresponding operations, so as to reduce the load of the network device according to the coverage, avoid the terminal equipment in the network accessing the network at the same time, impact on the network, and reduce network congestion.
  • FIG. 9 is a flowchart of still another method for access control according to the present application.
  • the terminal device receives the access control configuration information sent by the network device, the terminal device performs corresponding The operation is specifically explained.
  • the example in which the access control mode is to camp on the current cell or not to camp on the current cell is as an example.
  • the method in this embodiment may include:
  • the access control mode of the terminal device in this embodiment specifically refers to an access control mode corresponding to the coverage of the terminal device.
  • Step 801 The terminal device receives a connection establishment request sent by the NAS layer at the RRC layer.
  • the terminal device sends a connection establishment request at the NAS layer.
  • Step 802 The terminal device determines, according to the access control configuration information and the coverage of the terminal device, the access control mode of the terminal device at the RRC layer.
  • the terminal device performs detection of the coverage-based access control mode when receiving the connection establishment request sent by the NAS layer. Specifically, the terminal device determines an access control manner corresponding to the coverage of the terminal device according to the access control configuration information and the coverage of the terminal device.
  • a specific implementation manner of the step in any of the foregoing embodiments may be used in the specific implementation manner, and details are not described herein again.
  • Step 803 When the access control mode of the terminal device is not to camp on the current cell, the terminal device reselects the resident network device.
  • Step 804 When the access control mode of the terminal device is to camp on the current cell, the terminal device camps on the current network device, and requests access to the network device.
  • the access control configuration information of this embodiment may be specifically sent by using SIB1.
  • the terminal device may not read the SIB2, thereby saving power consumption of the terminal device.
  • the network device sends the access control configuration information to the terminal device, where the access control configuration information is used to indicate that the access control mode of the terminal device is to camp on the current cell or not to camp on the current cell, that is, by controlling whether the terminal device is It can be used to control the access of terminal devices with different coverages, thereby reducing the load of the network devices according to the coverage, preventing the terminal devices in the network from simultaneously accessing the network, causing impact on the network and reducing network congestion.
  • FIG. 10 is a flowchart of still another access control method of the present application.
  • the network device may further send an indication message to the terminal device, where the indication message is used to indicate access control.
  • the configuration information has been updated or is about to be updated.
  • the method in this embodiment may specifically include:
  • Step 901 The network device sends an indication message to the terminal device, where the terminal device receives the indication message sent by the network device.
  • the indication message is used to indicate that the access control configuration information has been updated or is about to be updated, and the indication message may be carried in a paging message and/or system information.
  • the network device after the access control configuration information of the network device changes, the network device sends an indication message to the terminal device, and the terminal device reads the updated access control configuration information in the system information according to the indication message.
  • the network device when the access control configuration information of the network device is about to change, the network device sends an indication message to the terminal device, and the terminal device re-reads the updated access control configuration in the system information according to the indication message. information. Thereby saving power consumption of the terminal device.
  • Step 902 The terminal device acquires updated access control configuration information according to the indication message.
  • the network device may send a paging message to the terminal device, where the paging message carries the indication message, where the indication message is carried in the paging message as an example.
  • the terminal learns that the access control configuration information has been updated or is about to be updated, so that the system information is re-read and the updated access control configuration information is obtained.
  • the indication message includes one bit information, where the one bit information is used to indicate that the access control configuration information has been updated or is about to be updated.
  • an implementation manner of the foregoing step 902 may be: the terminal device acquires updated access control configuration information according to the one-bit information.
  • the indication message includes M bit information, where M is the number of the at least one access control mode information, and each bit information corresponds to one access control mode information, and each bit information The information indicating that the access control mode corresponding thereto has been updated or is about to be updated, where M is an arbitrary integer.
  • an implementation manner of the foregoing step 902 may be: the terminal device acquires bit bit information of the terminal device from the M bit information, and determines the location according to the bit bit information of the terminal device. Whether the access control mode information of the terminal device has been updated or is about to be updated. When the access control mode information of the terminal device is updated or is about to be updated, the terminal device acquires updated access control configuration information, where the The bit information of the terminal device is the The bit corresponding to the access control mode information corresponding to the coverage of the terminal device.
  • the indication information includes N bit information, where N is the number of the at least one coverage range, each bit position information corresponds to a coverage range, and each bit bit information is used to indicate a corresponding The access control information corresponding to the coverage has been updated or will be updated soon.
  • M is an arbitrary integer.
  • an implementation manner of the foregoing step 902 may be: the terminal device acquires bit bit information corresponding to the coverage of the terminal device from the N bit information, according to the coverage of the terminal device. The corresponding bit position information determines whether the access control mode information corresponding to the coverage of the terminal device has been updated or is about to be updated. When the access control mode information corresponding to the coverage of the terminal device has been updated or is about to be updated, The terminal device obtains updated access control configuration information.
  • the network device sends the access control configuration information to the terminal device, where the access control configuration information is used to indicate the access control mode corresponding to the at least one coverage area, and the terminal device according to the access control configuration information and the coverage of the terminal device
  • the scope determines the access control mode of the terminal device, and performs corresponding operations in the access control mode of the terminal device, thereby preventing the terminal device in the network from simultaneously accessing the network, causing impact on the network and reducing network congestion.
  • the network device may send an indication message to the terminal device, so that the terminal device obtains the updated access control configuration information according to the indication message in time to implement access control of the terminal device in the network. Flexible adjustment of the way.
  • the access control device of the present application may be a terminal device or a network device, which is used to implement the access control method of the foregoing embodiment.
  • the method or the step implemented by the terminal device may also be implemented by a chip inside the terminal device.
  • the method or step implemented by the network device may also be implemented by a chip inside the network device.
  • FIG. 11 is a schematic structural diagram of a terminal device according to the present application. As shown in FIG. 11, the terminal device in this embodiment includes: a receiving module 11 and a processing module 12.
  • the receiving module 11 is configured to receive the access control configuration information that is sent by the network device, where the access control configuration information is used to indicate an access control mode corresponding to the at least one coverage area;
  • the processing module 12 is configured to determine a coverage of the terminal device, and determine an access control mode of the terminal device according to the access control configuration information and a coverage of the terminal device.
  • the access control configuration information includes at least one access control mode information, where the access control mode information corresponds to at least one coverage; the processing module 12 is configured to: access from the at least one The control mode information is used to obtain the access control mode information corresponding to the coverage of the terminal device, and the access control mode of the terminal device is determined according to the access control mode information corresponding to the coverage of the terminal device.
  • the access control configuration information further includes at least one probability factor
  • the processing module 12 is further configured to: determine an access probability according to the coverage area corresponding to the terminal device, the at least one probability factor; Determining whether to perform the access control mode according to the access probability.
  • the processing module 12 is configured to: acquire a first random number, and when the first random number is greater than the access probability, determine to perform the access control mode, when the first random number When the number is not greater than the access probability, determining that the access control mode is not performed; or acquiring a first random number, and determining, when the first random number is smaller than the access probability, performing the access control The method determines that the access control mode is not performed when the first random number is not less than the access probability.
  • the access control configuration information includes at least one probability factor
  • the processing module 12 is configured to: determine an access probability according to the coverage area corresponding to the terminal device and the at least one probability factor; The access probability determines an access control mode of the terminal device.
  • n is an arbitrary natural number.
  • the processing module 12 is configured to: acquire a second random number, and when the second random number is greater than the access probability, determine that the access control mode is a first access control mode, Determining, when the second random number is not greater than the access probability, the access control mode is a second access control mode; or acquiring a second random number, where the second random number is smaller than the When the probability is entered, the access control mode is determined to be the first access control mode, and when the second random number is not less than the access probability, the access control mode is determined to be the second access control mode.
  • the access control mode includes accessing a current cell, or entering a preset access control procedure, or camping on a current cell, or not accessing a current cell, or not entering a preset access control process. Or not camping on the current cell; wherein the preset access control process includes any one of an extended access restriction EAB process, a specific service access control SSAC process, an access level restriction ACB process, and a specific application access control ACDC process. Or multiple;
  • the first access control mode and the second access control mode are any two of the access control modes.
  • the processing module 12 when the access control mode of the terminal device is the non-access to the current cell, the processing module 12 is further configured to: start a timer, and notify the non-access stratum that the current cell prohibits access. ;or,
  • the processing module 102 is further configured to perform cell reselection when the access control mode of the terminal device is that the camping does not camp on the current cell.
  • the receiving module 11 is further configured to: receive an indication message sent by the network device, where the indication message is used to indicate that the access control configuration information has been updated or is about to be updated;
  • the processing module 12 is further configured to obtain updated access control configuration information according to the indication message.
  • the indication message includes one bit information
  • the processing module 12 is configured to: obtain updated access control configuration information according to the one bit information; or
  • the indication message includes M bit information, M is the number of the at least one access control mode information, and each bit bit information corresponds to one access control mode information, and the processing module 12 is configured to: Obtaining the bit information of the terminal device in the M bit information, and determining, according to the bit bit information of the terminal device, whether the access control mode information of the terminal device has been updated or is about to be updated, when the terminal device is connected When the control mode information is updated or is about to be updated, the updated access control configuration information is obtained, where the bit bit information of the terminal device is a bit corresponding to the access control mode information corresponding to the coverage of the terminal device; or,
  • the indication information includes N bit information, where N is the number of the at least one coverage, each bit information corresponds to one coverage, and the processing module 12 is configured to: from the N bit information Obtaining the bit position information corresponding to the coverage of the terminal device, and determining, according to the bit position information corresponding to the coverage of the terminal device, whether the access control mode information corresponding to the coverage of the terminal device has been updated or is about to be updated.
  • the access control mode information corresponding to the coverage of the terminal device has been updated or is about to be updated, the updated access control configuration information is obtained.
  • the terminal device of the implementation may further include a sending module 13 for sending information or a message to other devices.
  • the terminal device described in this embodiment may be used to implement the technical solution of the chip execution of the terminal device or the terminal device in the foregoing method embodiments, and the implementation principle and the technical effect are similar.
  • the function of each module may refer to the method embodiment. The corresponding description in the description will not be repeated here.
  • FIG. 12 is a schematic structural diagram of another terminal device according to the present application. As shown in FIG. 12, the terminal device in this embodiment includes: a receiver 21 and a processor 22.
  • the above receiving module 11 may be the receiver 21 in this embodiment.
  • the receiver 21 can also correspond to the transceiver.
  • the terminal device that can be understood can also include the transmitter 23.
  • the above sending module 13 can be the transmitter 23 in this embodiment, and the transmitter 23 can also correspond to the transceiver.
  • the above processing module 12 can be embedded in hardware or in a processor 22 independent of the terminal device.
  • the receiver 21 may include a necessary radio frequency communication device such as a mixer.
  • the processor 22 may include a central processing unit (CPU), a digital signal processor (DSP), a microcontroller (Microcontroller Unit (MCU), and an application specific integrated circuit (ASIC). Or at least one of a Field-Programmable Gate Array (FPGA).
  • CPU central processing unit
  • DSP digital signal processor
  • MCU microcontroller
  • ASIC application specific integrated circuit
  • FPGA Field-Programmable Gate Array
  • the terminal device of this embodiment may further include a memory 24 for storing program instructions, and the processor 22 is configured to invoke program instructions in the memory 24 to execute the foregoing solution.
  • the program instructions may be implemented in the form of a software functional unit and can be sold or used as a standalone product, which may be any form of computer readable storage medium. Based on such understanding, all or part of the technical solution of the present application may be embodied in the form of a software product, including a plurality of instructions for causing a computer device, specifically the processor 22, to execute the terminal in each embodiment of the present application. All or part of the steps of the device.
  • the foregoing computer readable storage medium includes: a USB flash drive, a mobile hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disk, and the like. The medium of the code.
  • the terminal device described above in this embodiment may be used to implement the technical solution of the chip execution of the terminal device or the terminal device in the foregoing method embodiments, and the implementation principle and the technical effect are similar.
  • the function of each device may refer to the method embodiment. The corresponding description in the description will not be repeated here.
  • FIG. 13 is a schematic structural diagram of a chip according to the present application.
  • the chip in this embodiment may be a chip of a terminal device, and the chip in this embodiment may include: a memory 31 and a processor 32.
  • the memory 31 is communicatively coupled to the processor 32.
  • the chip may further include other structures or units constituting the chip, for example, interfaces, slots, and the like, which are not limited herein.
  • the above receiving module 11, processing module 12 and transmitting module 13 may be embedded in hardware independent of or independent of the processor 32 of the chip.
  • the memory 31 is used to store program instructions, and the processor 32 is used to call the program instructions in the memory 31 to execute the above scheme.
  • the chip described above in this embodiment may be used to implement the technical solution of the terminal device or its internal chip in the foregoing method embodiments of the present application.
  • the implementation principle and the technical effect are similar.
  • the function of each module may refer to the method embodiment. The corresponding description will not be repeated here.
  • FIG. 14 is a schematic structural diagram of a network device according to the present application. As shown in FIG. 14, the network device in this embodiment may include: a processing module 41 and a sending module 42.
  • the processing module 41 is configured to determine access control configuration information, where the access control configuration information is used to indicate an access control mode corresponding to at least one coverage area.
  • the sending module 42 is configured to send the access control configuration information to the terminal device, where the access control configuration information is used to determine an access control mode of the terminal device.
  • the access control configuration information includes at least one access control mode information, where the access control mode information corresponds to at least one coverage, and the access control mode information is used to indicate the corresponding The at least one access control mode information is used to determine an access control mode of the terminal device.
  • the access control configuration information includes at least one probability factor, the at least one probability factor is used to determine an access probability of the terminal device, and the access probability is used to determine the terminal device Access control mode.
  • the access control mode includes accessing a current cell, or entering a preset access control procedure, or not accessing a current cell, or camping on a current cell, or not camping on a current cell, or Do not enter the preset access control process;
  • the preset access control process includes any one or more of an extended access restriction EAB process, a specific service access control SSAC process, an access level restriction ACB process, and a specific application access control ACDC process.
  • the sending module 42 is further configured to: send an indication message to the terminal device, where the indication message is used to indicate that the access control configuration information has been updated or is about to be updated; wherein the indication message is Carry in the paging message and / or system information.
  • the indication message includes one bit information, where the one bit information is used to indicate that the access control configuration information has been updated or is about to be updated; or
  • the indication message includes M bit information, where M is the number of the at least one access control mode information, and each bit information corresponds to one access control mode information, and each bit information is used to indicate a corresponding The access control mode information has been updated or will be updated soon; or,
  • the indication information includes N pieces of bit information, where N is the number of the at least one coverage range, each bit bit information corresponds to one coverage area, and each bit bit information is used to indicate access corresponding to the coverage area corresponding thereto. Control information has been updated or will be updated soon.
  • the network device of the present implementation may further include a receiving module 43 for transmitting information or messages to other devices.
  • the network device described above in this embodiment may be used to implement the technical solution of the chip execution of the network device/network device in the foregoing method embodiments, and the implementation principle and the technical effect are similar.
  • the function of each module may refer to the method embodiment. The corresponding description in the description will not be repeated here.
  • FIG. 15 is a schematic structural diagram of another network device according to the present application. As shown in FIG. 15, the network device in this embodiment includes: a processor 51 and a transmitter 52.
  • the above processing module 41 can be embedded in hardware or in a processor 51 independent of the network device.
  • the above transmitting module 42 may be the transmitter 52 in this embodiment.
  • the transmitter 52 can also be a corresponding transceiver.
  • the network device that can be understood can also include a receiver 53.
  • the above receiving module 43 can be the implementation. In the example of the receiver 53, the receiver 53 can also correspond to the transceiver.
  • the transmitter 52 may include a necessary radio frequency communication device such as a mixer.
  • the processor 51 may include at least one of a CPU, a DSP, an MCU, an ASIC, or an FPGA.
  • the network device of this embodiment may further include a memory 54 for storing program instructions, and the processor 51 is configured to invoke program instructions in the memory 54 to execute the foregoing solution.
  • the network device described above in this embodiment may be used to implement the technical solution of the chip execution of the network device or the network device in the foregoing method embodiments, and the implementation principle and the technical effect are similar.
  • the function of each device may refer to the method embodiment. The corresponding description in the description will not be repeated here.
  • the chip of this embodiment may be a chip of a network device, and the chip of this embodiment may include: a memory 61 and a processor 62.
  • the memory 61 is communicatively coupled to the processor 62.
  • the processor 62 can include, for example, at least one of a CPU, a DSP, an MCU, an ASIC, or an FPGA. It should be noted that the chip may further include other structures or units constituting the chip, for example, interfaces, slots, and the like, which are not limited herein.
  • receiving module 43, processing module 41 and transmitting module 42 may be embedded in hardware or in a processor 62 independent of the chip.
  • the memory 61 is used to store program instructions, and the processor 62 is used to call program instructions in the memory 61 to execute the above scheme.
  • the program instructions may be implemented in the form of a software functional unit and can be sold or used as a standalone product, which may be any form of computer readable storage medium. Based on such understanding, all or part of the technical solutions of the present application may be embodied in the form of a software product, including a plurality of instructions for causing a computer device, specifically a processor 62, to perform the network in various embodiments of the present application. All or part of the steps of the device.
  • the aforementioned computer readable storage medium includes: a U disk, a mobile hard disk, a ROM, a RAM, a magnetic disk, or an optical disk, and the like, which can store program codes.
  • the chip described above in this embodiment may be used to implement the technical solution of the network device or its internal chip in the foregoing method embodiments of the present application, and the implementation principle and the technical effect are similar.
  • the function of each module may refer to the method embodiment. The corresponding description will not be repeated here.
  • the division of the module in the embodiment of the present application is schematic, and is only a logical function division, and the actual implementation may have another division manner.
  • the functional modules in the embodiments of the present application may be integrated into one processing module, or each module may exist physically separately, or two or more modules may be integrated into one module.
  • the above integrated modules can be implemented in the form of hardware or in the form of software functional modules.
  • the integrated modules if implemented in the form of software functional modules and sold or used as separate products, may be stored in a computer readable storage medium.
  • a computer readable storage medium A number of instructions are included to cause a computer device (which may be a personal computer, server, or network device, etc.) or a processor to perform all or part of the steps of the methods described in various embodiments of the present application.
  • the foregoing storage medium includes various media that can store program codes, such as a USB flash drive, a mobile hard disk, a ROM, a RAM, a magnetic disk, or an optical disk.
  • the computer program product includes one or more computer instructions.
  • the computer can be a general purpose computer, a special purpose computer, a computer network, or other programmable device.
  • the computer instructions can be stored in a computer readable storage medium or transferred from one computer readable storage medium to another computer readable storage medium, for example, the computer instructions can be from a website site, computer, server or data center Transfer to another website site, computer, server, or data center by wire (eg, coaxial cable, fiber optic, digital subscriber line (DSL), or wireless (eg, infrared, wireless, microwave, etc.).
  • the computer readable storage medium can be any available media that can be accessed by a computer or a data storage device such as a server, data center, or the like that includes one or more available media.
  • the usable medium may be a magnetic medium (eg, a floppy disk, a hard disk, a magnetic tape), an optical medium (eg, a DVD), or a semiconductor medium (such as a solid state disk (SSD)).

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请实施例提供一种接入控制方法和装置。本申请的接入控制方法,包括:网络设备向终端设备发送接入控制配置信息,所述接入控制配置信息用于指示至少一个覆盖范围对应的接入控制方式信息,终端设备根据接入控制配置信息和该终端设备的覆盖范围确定该终端设备的接入控制方式。本申请实施例可以避免网络内的终端设备同时接入网络时对网络造成冲击,减少网络拥塞。

Description

接入控制方法和装置 技术领域
本申请实施例涉及通信技术,尤其涉及一种接入控制方法和装置。
背景技术
机器类型通信(Machine Type Communication,MTC)是指机器与机器之间的通信(Machine to Machine,M2M),是将数据从一台终端传送到另一台终端的技术。针对无线网络接入来说,是指具有无线接入能力的电子设备,可以通过SIM/USIM卡直接接入无线网络,或是可以通过蓝牙、Zigbee等方式,由一个网关设备进行中继接入无线网络,进而实现与MTC服务器或是另一台设备进行通信。
MTC通信不追求数据传输速率、多频段、多天线以及全双工传输,而是追求较长的终端装置电池时间和较低廉的终端装置成本,即要求终端能够实现低功耗(Low power consumption)、低成本(Low cost)。MTC类型的终端的应用场景,例如水表、电表等,终端的信号覆盖强度无法满足信号接收要求,因此对MTC进行增强,使基站和终端能够支持扩展覆盖(Coverage enhancement),实现扩展覆盖的主要方法是重复多次发送上行或下行信号,通过多次接收合并实现提高数据接收成功率的目的。
然而,重复发送的次数越多,所消耗的时频资源越多。根据增强覆盖的程度,例如根据重复发送的次数,分出不同的增强覆盖等级,不同的增强覆盖等级对应着不同的重复发送次数。当增强覆盖等级较高时,需要更多的重复发送次数,消耗的资源也越多。由于MTC类型的终端部署量较大,网络在短时间内如果接受所有终端的连接建立请求时,会造成网络拥塞。
发明内容
本申请实施例提供一种接入控制方法和装置,以避免网络内的终端设备同时接入网络时对网络造成冲击,减少网络拥塞。
第一方面,本申请实施例提供一种接入控制方法,包括:终端设备接收网络设备发送的接入控制配置信息,所述接入控制配置信息用于指示至少一个覆盖范围对应的接入控制方式;所述终端设备确定所述终端设备的覆盖范围;所述终端设备根据所述接入控制配置信息和所述终端设备的覆盖范围确定所述终端设备的接入控制方式。
结合第一方面,在第一方面的一种可能的实现方式中,所述接入控制配置信息包括至少一个接入控制方式信息,所述接入控制方式信息对应至少一个覆盖范围;所述终端设备根据所述接入控制配置信息和所述终端设备的覆盖范围确定所述终端设备的接入控制方式,包括:所述终端设备从所述至少一个接入控制方式信息中获取所述终端设备的覆盖范围对应的接入控制方式信息,根据所述终端设备的覆盖范围对应的接入控制方式信息确定所述终端设备的接入控制方式。
结合第一方面或第一方面的一种可能的实现方式,在第一方面的另一种可能的实现方式中,所述接入控制配置信息还包括至少一个概率因子,所述方法还包括:所述终端设备根据所述终端设备对应的覆盖范围、所述至少一个概率因子确定接入概率;所述终端设备根据所述接入概率确定是否执行所述接入控制方式。
结合第一方面或第一方面的任一种可能的实现方式,在第一方面的另一种可能的实现方式中,所述终端设备根据所述接入概率确定是否执行所述接入控制方式,包括:所述终端设备获取第一随机数,当所述第一随机数大于所述接入概率时,确定执行所述接入控制方式,当所述第一随机数不大于所述接入概率时,确定不执行所述接入控制方式;或者,
所述终端设备获取第一随机数,当所述第一随机数小于所述接入概率时,确定执行所述接入控制方式,当所述第一随机数不小于所述接入概率时,确定不执行所述接入控制方式。
结合第一方面或第一方面的任一种可能的实现方式,在第一方面的另一种可能的实现方式中,所述接入控制配置信息包括至少一个概率因子,所述终端设备根据所述接入控制配置信息和所述终端设备的覆盖范围确定所述终端设备的接入控制方式,包括:所述终端设备根据所述终端设备对应的覆盖范围和所述至少一个概率因子确定接入概率;所述终端设备根据所述接入概率确定所述终端设备的接入控制方式。
结合第一方面或第一方面的任一种可能的实现方式,在第一方面的另一种可能的实现方式中,所述终端设备根据所述终端设备对应的覆盖范围和所述至少一个概率因子确定接入概率,包括:所述终端设备根据公式p=kn×qn+kn-1×qn-1+kn-2×qn-2+......+k1×q1+k0,确定所述接入概率;其中,p为所述接入概率,q为终端设备测量参考信号的接收功率RSRP或接收质量RSRQ,{kn,kn-1,kn-2,......,k0}为所述至少一个概率因子,n为任意自然数。
结合第一方面或第一方面的任一种可能的实现方式,在第一方面的另一种可能的实现方式中,所述终端设备根据所述接入概率确定所述终端设备的接入控制方式,包括:所述终端设备获取第二随机数,当所述第二随机数大于所述接入概率时,确定所述接入控制方式为第一接入控制方式,当所述第二随机数不大于所述接入概率时,确定所述接入控制方式为第二接入控制方式;或者,所述终端设备获取第二随机数,当所述第二随机数小于所述接入概率时,确定所述接入控制方式为第一接入控制方式,当所述第二随机数不小于所述接入概率时,确定所述接入控制方式为第二接入控制方式。
结合第一方面或第一方面的任一种可能的实现方式,在第一方面的另一种可能的实现方式中,所述接入控制方式包括接入当前小区、或者进入预设接入控制流程、或者驻留到当前小区,或者不接入当前小区、或者不进入预设接入控制流程、或者不驻留到当前小区;其中,所述预设接入控制流程包括扩展访问限制EAB流程、特定服务访问控制SSAC流程、接入等级限制ACB流程和特定应用访问控制ACDC流程中任意一项或者多项;所述第一接入控制方式和所述第二接入控制方式为所述接入控制方式中任意两项。
其中,所述第一接入控制方式和所述第二接入控制方式可以为设置在终端设备中的两个接入控制方式,通过网络设备发送的接入控制配置信息,终端设备可以确定将其中一个作为所述终端设备的接入控制方式。
结合第一方面或第一方面的任一种可能的实现方式,在第一方面的另一种可能的实现方式中,当所述终端设备的接入控制方式为所述不接入当前小区时,所述方法还包括:所 述终端设备启动定时器,并通知非接入层当前小区禁止接入;或者,当所述终端设备的接入控制方式为所述不驻留到当前小区时,所述方法还包括:所述终端设备进行小区重选。
结合第一方面或第一方面的任一种可能的实现方式,在第一方面的另一种可能的实现方式中,所述终端设备接收网络设备发送的接入控制配置信息,包括:所述终端设备接收所述网络设备发送的系统信息,所述系统信息携带所述接入控制配置信息;其中,所述系统信息为以下信息类型中的一种;系统信息块SIB2、系统信息块SIB14、系统信息块SIB1以及主系统信息块MIB。
结合第一方面或第一方面的任一种可能的实现方式,在第一方面的另一种可能的实现方式中,所述方法还包括:所述终端设备接收所述网络设备发送的指示消息,所述指示消息用于指示所述接入控制配置信息已经更新或者即将更新;所述终端设备根据所述指示消息获取更新后的接入控制配置信息。
结合第一方面或第一方面的任一种可能的实现方式,在第一方面的另一种可能的实现方式中,所述指示消息包括一比特位信息,所述终端设备根据所述指示消息获取更新后的接入控制配置信息,包括:所述终端设备根据所述一比特位信息获取更新后的接入控制配置信息;或者,
所述指示消息包括M个比特位信息,M为所述至少一个接入控制方式信息的个数,每一比特位信息对应一个接入控制方式信息,所述终端设备根据所述指示消息获取更新后的接入控制配置信息,包括:所述终端设备从所述M个比特位信息中获取所述终端设备的比特位信息,根据所述终端设备的比特位信息确定所述终端设备的接入控制方式信息是否已经更新或即将更新,当所述终端设备的接入控制方式信息更新或即将更新时,所述终端设备获取更新后的接入控制配置信息,其中,所述终端设备的比特位信息为所述终端设备的覆盖范围对应的接入控制方式信息对应的比特位;或者,
所述指示信息包括N个比特位信息,N为所述至少一个覆盖范围的个数,每一比特位信息对应一个覆盖范围,所述终端设备根据所述指示消息获取更新后的接入控制配置信息,包括:所述终端设备从所述N个比特位信息中获取所述终端设备的覆盖范围对应的比特位信息,根据所述终端设备的覆盖范围对应的比特位信息确定所述终端设备的覆盖范围对应的接入控制方式信息是否已经更新或即将更新,当所述终端设备的覆盖范围对应的接入控制方式信息已经更新或即将更新时,所述终端设备获取更新后的接入控制配置信息。
第二方面,本申请实施例提供一种接入控制方法,包括:网络设备确定接入控制配置信息,所述接入控制配置信息用于指示至少一个覆盖范围对应的接入控制方式;所述网络设备向终端设备发送所述接入控制配置信息,所述接入控制配置信息用于确定所述终端设备的接入控制方式。
结合第二方面,在第二方面的一种可能的实现方式中,所述接入控制配置信息包括至少一个接入控制方式信息,所述接入控制方式信息对应至少一个覆盖范围,所述接入控制方式信息用于指示与其对应的所述至少一个覆盖范围所对应的接入控制方式,所述至少一个接入控制方式信息用于确定所述终端设备的接入控制方式。
结合第二方面或第二方面的一种可能的实现方式,在第二方面的另一种可能的实现方式中,所述接入控制配置信息还包括至少一个概率因子,所述至少一个概率因子用于确定 所述终端设备的接入概率,所述接入概率用于确定是否执行所述终端的接入控制方式。
结合第二方面或第二方面的任一种可能的实现方式,在第二方面的另一种可能的实现方式中,所述接入控制配置信息包括至少一个概率因子,所述至少一个概率因子用于确定所述终端设备的接入概率,所述接入概率用于确定所述终端设备的接入控制方式。
结合第二方面或第二方面的任一种可能的实现方式,在第二方面的另一种可能的实现方式中,所述接入控制方式包括接入当前小区、或者进入预设接入控制流程、或者不接入当前小区、或者驻留到当前小区、或者不驻留到当前小区、或者不进入预设接入控制流程;其中,所述预设接入控制流程包括扩展访问限制EAB流程、特定服务访问控制SSAC流程、接入等级限制ACB流程和特定应用访问控制ACDC流程中任意一项或者多项。
结合第二方面或第二方面的任一种可能的实现方式,在第二方面的另一种可能的实现方式中,所述网络设备向终端设备发送所述接入控制配置信息,包括:所述网络设备通过系统信息向所述终端设备发送所述接入控制配置信息;其中,所述系统信息为以下信息类型中的一种:系统信息块SIB2、系统信息块SIB14、系统信息块SIB1以及主系统信息块MIB。
结合第二方面或第二方面的任一种可能的实现方式,在第二方面的另一种可能的实现方式中,所述方法还包括:所述网络设备向所述终端设备发送指示消息,所述指示消息用于指示所述接入控制配置信息已经更新或者即将更新;其中,所述指示消息携带在寻呼消息和/或系统信息中。
结合第二方面或第二方面的任一种可能的实现方式,在第二方面的另一种可能的实现方式中,所述指示消息包括一比特位信息,所述一比特位信息用于指示所述接入控制配置信息已经更新或者即将更新;或者,
所述指示消息包括M个比特位信息,M为所述至少一个接入控制方式信息的个数,每一比特位信息对应一个接入控制方式信息,每一比特位信息用于指示与其对应的接入控制方式信息已经更新或者即将更新;或者,
所述指示信息包括N个比特位信息,N为所述至少一个覆盖范围的个数,每一比特位信息对应一个覆盖范围,每一比特位信息用于指示与其对应的覆盖范围对应的接入控制信息已经更新或者即将更新。
第三方面,本申请实施例提供一种装置,该装置可以为终端设备,或者终端设备结构上的组成部分,又或者是结构上独立于终端设备的装置,该装置具有实现上述第一方面或第一方面的任意一项实现方式中终端设备行为的功能。该功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的模块。
第四方面,本申请实施例提供一种装置,该装置可以为终端设备,或者终端设备结构上的组成部分,又或者是结构上独立于终端设备的装置,该装置包括:处理器、存储器、总线和通信接口;该存储器用于存储计算机执行指令,该处理器与该存储器通过该总线连接,当该终端设备运行时,该处理器执行该存储器存储的该计算机执行指令,以使该终端设备执行如上述第一方面或第一方面的任意一项实现方式的接入控制方法。
第五方面,本申请实施例提供了一种计算机可读存储介质,用于储存为上述终端设备所用的计算机软件指令,当其在计算机上运行时,使得计算机可以执行上述第一方面或第一方面的任意一项实现方式的接入控制方法。
第六方面,本申请实施例提供了一种包含指令的计算机程序产品,当其在计算机上运行时,使得计算机可以执行上述第一方面或第一方面的任意一项实现方式的接入控制方法。
第七方面,本申请实施例提供一种装置,该装置可以为网络设备,或者网络设备结构上的组成部分,又或者是结构上独立于网络设备的装置,该装置具有实现上述第二方面或第二方面的任意一项实现方式中网络设备行为的功能。该功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的模块。
第八方面,本申请实施例提供一种该装置可以为网络设备,或者网络设备结构上的组成部分,又或者是结构上独立于网络设备的装置,该装置包括:处理器、存储器、总线和通信接口;该存储器用于存储计算机执行指令,该处理器与该存储器通过该总线连接,当该网络设备运行时,该处理器执行该存储器存储的该计算机执行指令,以使该网络设备执行如上述第二方面或第二方面的任意一项实现方式的接入控制方法。
第九方面,本申请实施例提供了一种计算机可读存储介质,用于储存为上述网络设备所用的计算机软件指令,当其在计算机上运行时,使得计算机可以执行上述第二方面或第二方面的任意一项实现方式的接入控制方法。
第十方面,本申请实施例提供了一种包含指令的计算机程序产品,当其在计算机上运行时,使得计算机可以执行上述第二方面或第二方面的任意一项实现方式的接入控制方法。
第十一方面,本申请实施例提供一种芯片,包括:存储器和处理器;
所述存储器,用于存储程序指令;
所述处理器,用于调用所述存储器中存储的所述程序指令以实现如第一方面或第一方面的任意一项实现方式所述的接入控制方法。
第十二方面,本申请实施例提供一种芯片,包括:存储器和处理器;
所述存储器,用于存储程序指令;
所述处理器,用于调用所述存储器中存储的所述程序指令以实现如第二方面或第二方面的任意一项实现方式所述的接入控制方法。
第十三方面,本申请实施例提供一种存储介质,包括:可读存储介质和计算机程序,所述计算机程序用于实现如第一方面或第一方面的任意一项实现方式所述的接入控制方法。
第十四方面,本申请实施例提供一种存储介质,包括:可读存储介质和计算机程序,所述计算机程序用于实现如第二方面或第二方面的任意一项实现方式所述的接入控制方法。
第十五方面,本申请实施例提供一种程序产品,所述程序产品包括计算机程序,所述计算机程序存储在可读存储介质中,通信设备的至少一个处理器可以从所述可读存储介质读取所述计算机程序,所述至少一个处理器执行所述计算机程序使得通信设备实施如第一方面或第一方面的任意一项实现方式所述的接入控制方法。
第十六方面,本申请实施例提供一种程序产品,所述程序产品包括计算机程序,所述计算机程序存储在可读存储介质中,通信设备的至少一个处理器可以从所述可读存储介质读取所述计算机程序,所述至少一个处理器执行所述计算机程序使得通信设备实施如第二 方面或第二方面的任意一项实现方式所述的接入控制方法。
本申请实施例接入控制方法和装置,网络设备向终端设备发送接入控制配置信息,该接入控制配置信息用于指示至少一个覆盖范围对应的接入控制方式信息,终端设备根据接入控制配置信息和该终端设备的覆盖范围确定该终端设备的接入控制方式,以该终端设备的接入控制方式执行相应操作,从而避免网络内的终端设备同时接入网络,对网络造成冲击,减少网络拥塞。
附图说明
为了更清楚地说明本申请实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作一简单地介绍。
图1为本申请接入控制方法的一种应用场景的示意图;
图2为本申请的一种接入控制方法的流程图;
图3为本申请的另一种接入控制方法的流程图;
图4为本申请的另一种接入控制方法的流程图;
图5为本申请的另一种接入控制方法的流程图;
图6为本申请的另一种接入控制方法的流程图;
图7为本申请的再一种接入控制方法的流程图;
图8为本申请的又一种接入控制方法的流程图;
图9为本申请的又一种接入控制方法的流程图;
图10为本申请的又一种接入控制方法的流程图;
图11为本申请的一种终端设备的结构示意图;
图12为本申请的另一种终端设备的结构示意图;
图13为本申请的一种芯片的结构示意图;
图14为本申请的一种网络设备的结构示意图;
图15为本申请的另一种网络设备的结构示意图;
图16为本申请的另一种芯片的结构示意图。
具体实施方式
为使本申请实施例的目的、技术方案和优点更加清楚,下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚、完整地描述。
图1为本申请接入控制方法的一种应用场景的示意图,如图1所示,本申请的接入控制方法具体可以应用于长期演进(Long Term Evolution,LTE)通信系统,终端设备通过基站(eNB)接入核心网,基站提供无线资源管理、寻呼消息的组织和发送以及广播消息的组织和发送等功能,本申请的接入控制方法可以向不同覆盖范围的终端设备配置接入控制方式,使得终端设备以基站配置的接入控制方式接入网络,从而避免网络内的终端设备同时接入网络而对网络造成的冲击,减少网络拥塞。
需要说明的是,本申请的接入控制方法也可以应用于5G通信系统中,相应的,使用DU或者CU替换上述eNB。所述接入控制方法还可以应用于任意适用的通信系统中,网络设备和终端设备为相应通信系统中的网络侧设备和终端侧设备。
本申请所涉及的网络设备具体可以指无线接入设备,例如可以是演进型基站eNB、分布单元(Distributed Unit,DU)、集中单元(Centralized Unit,CU)、基站NodeB、未来通信系统中的基站gNB或WiFi系统中的接入节点等,本申请的实施例对该网络设备所采用的具体技术和具体设备形态不做限定。
本申请所涉及的终端设备具体指无线接入设备,例如可以是也可以称为终端(Terminal)、用户设备(user equipment,UE)、移动台(mobile station,MS)、移动终端(mobile terminal,MT)等。终端设备可以是手机(mobile phone)、平板电脑(Pad)、带无线收发功能的电脑、机器类型通信(Machine Type Communication,MTC)终端、虚拟现实(Virtual Reality,VR)终端、增强现实(Augmented Reality,AR)终端、工业控制(industrial control)中的无线终端、无人驾驶(self driving)中的无线终端、远程手术(remote medical surgery)中的无线终端、运输安全(transportation safety)中的无线终端、智慧城市(smart city)中的无线终端、智慧家庭(smart home)中的无线终端等等。
其中,MTC终端是使用MTC技术的电子设备,该电子设备支持低功耗、低复杂度和覆盖范围增强,例如可以是智能电网(smart grid)中的无线终端,如电表,也可以是水表等。MTC技术是为了迎合物联网(Internet of Things,IoT)的发展,3GPP在LTE技术演进上引入的通信技术,具体用于低功耗、低成本的电子设备的通信。
本申请的网络设备和终端设备可以部署在陆地上,包括室内或室外、手持或车载;也可以部署在水面上;还可以部署在空中的飞机、气球和人造卫星上。本申请的实施例对网络设备和终端设备的应用场景不做限定。
本申请所涉及的“覆盖范围”具体指参考信号强度满足一定条件的区域,在该区域内的终端设备测量网络设备参考信号的强度满足该条件,该条件可以根据需求进行灵活设置,不同条件的选取可以将网络设备的覆盖区域划分为一个或者多个覆盖范围,进而以划分的覆盖范围为接入控制的粒度,对网络设备覆盖区域内的终端进行接入控制。举例而言,该条件可以是参考信号的强度范围,终端设备测量参考信号的强度在该强度范围内,则该覆盖范围为终端设备的覆盖范围。其中,参考信号的强度具体可以是参考信号接收功率(Reference Signal Receiving Power,RSRP),也可以是参考信号接收质量(Reference Signal Receiving Quality,RSRQ),也可以是参数信号信干噪比(Signal Interfernece Noise Ratio,SINR),当然也可以是其他测量量,此处不一一举例说明。
其中,参考信号(Reference Signal,RS)指“导频”信号,是由发射端提供给接收端用于信道估计或信道探测的一种已知信号。例如,网络设备作为发射端,终端设备作为接收端。
一种可实现方式,MTC终端设备的“覆盖范围”可以是一个或者多个覆盖增强(Coverage Enhancement,CE)等级(level)对应的覆盖范围。
本申请所述涉及的“接入控制方式”可以用于指示终端设备接入当前小区、或者进入预设接入控制流程、或者驻留到当前小区,或者不接入当前小区、或者不进入预设接入控制流程、或者不驻留到当前小区。这里需要说明的是,上述接入控制方式所指示的终端设备的具体行为可以根据不同的场景或实现而不同,这里不做具体限定。其中,所述预设 接入控制流程包括扩展访问限制EAB流程、特定服务访问控制SSAC流程、接入等级限制ACB流程和特定应用访问控制ACDC流程中任意一项或者多项。
图2为本申请的一种接入控制方法的流程图,本实施例涉及网络设备和终端设备,如图2所示,本实施例的方法可以包括:
步骤101、网络设备确定接入控制配置信息,该接入控制配置信息用于指示至少一个覆盖范围对应的接入控制方式。
具体的,网络设备可以根据自身的负载状态确定接入控制配置信息,该接入控制配置信息的确定方式可以根据网络的接入控制需求进行灵活设置。该接入控制配置信息可以用于指示一个或者多个覆盖范围对应的接入控制方式。不同覆盖范围对应的接入控制方式可以相同,也可以不同。网络设备可以通过该接入控制配置信息向位于不同覆盖范围的终端设备配置接入控制方式,使得终端设备可以使用自身所在的所属覆盖范围对应的接入控制方式接入网络。
步骤102、网络设备向终端设备发送接入控制配置信息,终端设备接收网络设备发送的接入控制配置信息。
其中,该接入控制配置信息用于确定终端设备的接入控制方式。具体的,网络设备可以以广播的方式发送该接入控制配置信息,携带该接入控制配置信息的具体消息可以根据需求进行灵活设置。
步骤103、终端设备确定该终端设备的覆盖范围。
其中,终端设备根据测量网络设备的信号强度确定该终端设备的覆盖范围。
步骤104、终端设备根据接入控制配置信息和该终端设备的覆盖范围确定该终端设备的接入控制方式。
其中,该终端设备的接入控制方式可以是上述接入控制方式中任意一种,其具体解释说明可以参见上述说明,此处不再赘述,进而终端设备根据该终端设备的接入控制方式执行相应操作。从而通过向终端设备发送接入控制配置信息,使得终端设备确定该终端设备的覆盖范围对应的接入控制方式。
上述网络设备通过接入控制配置信息指示至少一个覆盖范围对应的接入控制方式的具体实现方式可以包括两种。一种可实现方式为,直接指示方式:上述接入控制配置信息可以包括至少一个接入控制方式信息,所述接入控制方式信息对应至少一个覆盖范围,所述接入控制方式信息用于指示与其对应的所述至少一个覆盖范围所对应的接入控制方式,所述至少一个接入控制方式信息用于确定所述终端设备的接入控制方式;另一种可实现方式,间接指示方式:上述接入控制配置信息包括至少一个概率因子,所述至少一个概率因子用于确定所述终端设备的接入概率,所述接入概率用于确定所述终端设备的接入控制方式。
本申请的上述接入控制方式具体可以有很多不同的设置方式。
一种可实现方式,该接入控制方式包括接入当前小区、或者进入预设接入控制流程。具体的,终端设备根据接入控制配置信息和终端设备的覆盖范围确定该终端设备的接入控制方式为接入当前小区、或者进入预设接入控制流程。当该终端设备的接入控制方式为接入当前小区时,则终端设备可以请求接入网络设备。当该终端设备的接入控制方式为进入预设接入控制流程时,则终端设备可以进入预设接入控制流程,以进一步确定是否禁止接 入。
另一种可实现方式,该接入控制方式包括进入预设接入控制流程、或者不接入当前小区。具体的,终端设备根据接入控制配置信息和终端设备的覆盖范围确定该终端设备的接入控制方式为不接入当前小区、或者进入预设接入控制流程。当该终端设备的接入控制方式为不接入当前小区时,则终端设备可以启动一个定时器,并且终端设备在RRC层可以通知非接入层(Non-access stratum,NAS)层接入网络设备受到限制。在该定时器运行期间,终端设备在RRC层不再请求接入网络设备。当该终端设备的接入控制方式为进入预设接入控制流程时,则终端设备可以进入预设接入控制流程,以进一步确定是否禁止接入。
再一种可实现方式,该接入控制方式包括接入当前小区、或者不接入当前小区。具体的,终端设备根据接入控制配置信息和终端设备的覆盖范围确定该终端设备的接入控制方式为接入当前小区、或者不接入当前小区。当该终端设备的接入控制方式为接入当前小区时,则终端设备可以请求接入网络设备。当该终端设备的接入控制方式为不接入当前小区时,则终端设备可以启动一个定时器,并且终端设备在RRC层可以通知NAS层接入网络设备受到限制。在该定时器运行期间,终端设备在RRC层不再请求接入网络设备。
又一种可实现方式。该接入控制方式包括驻留到当前小区、或者不驻留到当前小区。具体的,终端设备根据接入控制配置信息和终端设备的覆盖范围确定该终端设备的接入控制方式为驻留到当前小区、或者不驻留到当前小区。当该终端设备的接入控制方式为驻留到当前小区时,则终端设备可以在当前网络设备下驻留,并请求接入该网络设备。当该终端设备的接入控制方式为不驻留到当前小区,则终端设备重新选择驻留的网络设备,不再驻留在当前的网络设备的小区中。
可以理解的,使用上述比特位的方式指示如上述任一种可实现方式的接入控制方式时,比特位的取值“0”指示上述任一种可实现方式中的一种接入控制方式,比特位的取值“1”指示另一种接入控制方式。以接入控制方式包括接入当前小区、或者进入预设接入控制流程为例做举例说明,比特位的取值“0”指示接入当前小区,比特位的取值“1”指示进入预设接入控制流程,或者,比特位的取值“0”指示进入预设接入控制流程,比特位的取值“1”指示接入当前小区。
其中,上述预设接入控制流程具体可以包括扩展访问限制(Extended Access Barring,EAB)流程、特定服务访问控制(Service Specific Access Control,SSAC)流程、接入等级限制(Access Class Barring,ACB)流程和特定应用访问控制(Application specific access class barring,ACDC)流程中任意一项或者多项。
需要说明的是,本申请对上述EAB、SSAC、ACB、ACDC流程包括的具体步骤不做限制,其可以与现有技术相同,也可以在不改变实现功能的前提下对现有技术的流程做一些调整或者改变,本领域技术人员仍可以确定为EAB、SSAC、ACB、ACDC等流程。本申请实施例对此不再限制。
可选的,上述步骤102的具体实现方式可以为:网络设备广播系统信息,该系统信息携带接入控制配置信息。其中,所述系统信息为以下信息类型中的一种:系统信息块SIB2、系统信息块SIB14、系统信息块SIB1以及主系统信息块MIB。
本实施例,网络设备向终端设备发送接入控制配置信息,该接入控制配置信息用于指示至少一个覆盖范围对应的接入控制方式,终端设备根据接入控制配置信息和该 终端设备的覆盖范围确定该终端设备的接入控制方式,以该终端设备的接入控制方式进行相应操作,从而避免网络内的终端设备同时接入网络,对网络造成冲击,减少网络拥塞。
下面采用几个具体的实施例,对图2所示方法实施例的技术方案进行详细说明。
图3为本申请的另一种接入控制方法的流程图,本实施例对接入控制配置信息采用直接指示方式进行具体解释说明,如图3所示,本实施例的方法可以包括:
步骤201、网络设备确定接入控制配置信息,该接入控制配置信息包括至少一个接入控制方式信息,该接入控制方式信息对应至少一个覆盖范围。
其中,上述接入控制配置信息可以包括至少一个接入控制方式信息,所述接入控制方式信息对应至少一个覆盖范围,所述接入控制方式信息用于指示与其对应的所述至少一个覆盖范围所对应的接入控制方式,所述至少一个接入控制方式信息用于确定所述终端设备的接入控制方式。其中,覆盖范围与接入控制方式信息的对应关系具体可以为:一种可实现方式、覆盖范围与接入控制方式信息的对应关系为一一对应,即每一个覆盖范围对应一个接入控制方式信息;另一种可实现方式,覆盖范围与接入控制方式信息的对应关系为多对一,即多个覆盖范围对应一个接入控制方式信息。其可以根据需求进行灵活设置。
可以理解的,采用一一对应的方式,每一个覆盖范围对应一个接入控制方式信息,可以使每个覆盖范围的接入控制方式相互独立,多个覆盖范围的接入控制方式设置更为灵活。采用多对一的方式,多个覆盖范围对应一个接入控制方式信息,可以减少接入控制配置信息占用的资源大小。
其中,该至少一个接入控制方式信息具体可以是比特串(bitstring),也可以是比特图(bitmap),即一个接入控制方式信息可以为一个比特位。该接入控制配置信息的长度可以根据接入控制需求进行灵活设置,举例而言,设置一个比特位对应一个覆盖范围,那么该接入控制配置信的比特位的个数与覆盖范围的个数相等,每个比特位用于指示一个覆盖范围下的接入控制方式,当然可以理解的,也可以设置一个比特位对应两个覆盖范围,此处不一一举例说明。
当然可以理解的,一个接入控制方式信息也可以为多个比特位,例如三个比特位,每三个比特位用于指示至少一个覆盖范围下的接入控制方式。其可以根据需求进行灵活设置。
该至少一个接入控制方式信息具体也可以是列表,即一个接入控制方式信息可以为该列表中一行中所携带的参数,终端设备根据该参数可以确定该行所指示的接入控制方式。举例而言,设置一行对应一个覆盖范围,那么该接入控制配置信的列表的行数与覆盖范围的个数相等,每一行用于指示一个覆盖范围下的接入控制方式,当然可以理解的,也可以设置一行对应两个覆盖范围,此处不一一举例说明。
一种可实现方式,上述至少一个覆盖范围为预先配置的至少一个覆盖范围。网络设备可以预先配置至少一个覆盖范围,即预先将网络设备的覆盖区域进行划分,并将各个覆盖范围满足信号强度的条件告知终端设备,终端设备可以根据自身测量的信号强度,确定该终端设备的覆盖范围。
另一种可实现方式,上述至少一个覆盖范围为网络设备动态指示给终端设备的,具体 的,该接入控制配置信息还可以包括用于指示所述至少一个覆盖范围的覆盖范围信息,通过该覆盖范围信息向终端设备指示覆盖范围的划分。举例而言,该接入控制配置信息还包括n个测量值,该n个测量值用于指示n+1个覆盖范围,以n=3为例进行举例说明,该接入控制配置信息还包括3个测量值,分别为a1、a2和a3,该3个测量值指示4个覆盖范围,分别为覆盖范围1、覆盖范围2、覆盖范围3和覆盖范围4,其中,覆盖范围1的信号测量结果满足小于a1,覆盖范围2的信号测量结果满足大于等于a1且小于a2,覆盖范围3的信号测量结果满足大于等于a2且小于a3,覆盖范围4的信号测量结果满足大于等于a4。网络设备可以根据接入控制需求灵活调整网络中的覆盖范围划分。
可选的,上述覆盖范围信息具体可以包括至少一个RSRP值,例如,上述a1、a2和a3均为RSRP值。
步骤202、网络设备向终端设备发送接入控制配置信息,终端设备接收网络设备发送的接入控制配置信息。
步骤203、终端设备确定该终端设备的覆盖范围。
步骤204、终端设备从至少一个接入控制方式信息中获取终端设备的覆盖范围对应的接入控制方式信息,根据终端设备的覆盖范围对应的接入控制方式信息确定终端设备的接入控制方式。
举例而言,接入控制配置信息为0101,其中,第一位对应覆盖范围1,第二位对应覆盖范围2,依次类推,第四位对应覆盖范围4,终端设备属于覆盖范围1,则终端设备获取该接入控制配置信息的第一位的值,即0,“0”表示不驻留当前小区,则终端设备确定该终端设备的接入控制方式为不驻留当前小区。
本实施例,网络设备向终端设备发送接入控制配置信息,该接入控制配置信息包括至少一个接入控制方式信息,终端设备根据至少一个接入控制方式信息和该终端设备的覆盖范围确定该终端设备的接入控制方式,以该终端设备的接入控制方式执行相应操作,从而按照覆盖范围来减少网络设备的负载,避免网络内的终端设备同时接入网络,对网络造成的冲击,减少网络拥塞。
图4为本申请的另一种接入控制方法的流程图,本实施例与图3所示实施例的区别在于,接入控制配置信息还可以包括至少一个概率因子,所述至少一个概率因子用于确定终端设备的接入概率,所述接入概率用于确定是否执行所述终端的接入控制方式,如图4所示,本实施例的方法可以包括:
步骤301、网络设备确定接入控制配置信息,该接入控制配置信息包括至少一个接入控制方式信息和至少一个概率因子。
其中,上述至少一个接入控制方式信息的具体解释说明可以参见图3所示实施例的步骤201,此处不再赘述。
步骤302、网络设备向终端设备发送接入控制配置信息,终端设备接收网络设备发送的接入控制配置信息。
步骤303、终端设备确定该终端设备的覆盖范围。
步骤304、终端设备从至少一个接入控制方式信息中获取终端设备的覆盖范围对应的接入控制方式信息,根据终端设备的覆盖范围对应的接入控制方式信息确定终端设备的接入控制方式。
其中,步骤304的具体解释说明可以参见图3所示实施例的步骤204,此处不再赘述。
步骤305、终端设备根据所述终端设备对应的覆盖范围和所述至少一个概率因子确定接入概率。
步骤306、终端设备根据所述接入概率确定是否执行所述接入控制方式。
其中,步骤306的一种可实现方式可以为:所述终端设备获取第一随机数,当所述第一随机数大于所述接入概率时,确定执行所述接入控制方式,当所述第一随机数不大于所述接入概率时,确定不执行所述接入控制方式。步骤306的另一种可实现方式可以为:所述终端设备获取第一随机数,当所述第一随机数小于所述接入概率时,确定执行所述接入控制方式,当所述第一随机数不小于所述接入概率时,确定不执行所述接入控制方式。
其中,终端设备获取第一随机数的一种可实现方式可以为,终端设备生成第一随机数,另一种实现方式可以为终端设备从其他装置或模块处获取第一随机数,其具体实现方式可以根据进行灵活设置。
可选的,步骤305的一种可实现方式可以为:终端设备可以根据终端设备的测量参考信号的接收功率RSRP、至少一个概率因子确定接入概率,可选的,终端设备可以根据公式(1)确定接入概率。其中,终端设备测量参考信号的接收功率RSRP与终端设备对应的覆盖范围相关。
p=kn×qn+kn-1×qn-1+kn-2×qn-2+......+k1×q1+k0    (1)
其中,p为所述接入概率,q为终端设备测量参考信号的接收功率RSRP或接收质量RSRQ,{kn,kn-1,kn-2,......,k0}为所述至少一个概率因子,n+1为所述至少一个概率因子的个数,n为任意自然数。
本实施例,网络设备向终端设备发送接入控制配置信息,该接入控制配置信息包括至少一个接入控制方式信息和至少一个概率因子,终端设备根据至少一个接入控制方式信息和该终端设备的覆盖范围确定该终端设备的接入控制方式,该终端设备进一步根据至少一个概率因子确定是否执行该接入控制方式,从而按照覆盖范围来减少网络设备的负载,避免网络内的终端设备同时接入网络,对网络造成的冲击,减少网络拥塞。并且,同一覆盖范围中的终端设备可以通过至少一个概率因子实现不同的接入控制。
需要说明的是,本申请所述涉及的RSRP参与计算的部分,均可以用于RSRQ、SINR或者其他测量量作为替换,此处不一一举例说明。
图5为本申请的另一种接入控制方法的流程图,本实施例对接入控制配置信息采用间接指示方式进行具体解释说明,如图5所示,本实施例的方法可以包括:
步骤401、网络设备确定接入控制配置信息,该接入控制配置信息包括至少一个概率因子。
其中,该至少一个概率因子用于确定该终端设备的接入概率,该接入概率用于确定该终端设备的接入控制方式。
步骤402、网络设备向终端设备发送接入控制配置信息,终端设备接收网络设备发送的接入控制配置信息。
步骤403、终端设备确定该终端设备的覆盖范围。
步骤404、终端设备根据终端设备对应的覆盖范围和至少一个概率因子确定接入概率。
其中,一种可实现方式,终端设备可以根据终端设备的测量参考信号的接收功率RSRP 和至少一个概率因子确定接入概率,可选的,终端设备可以根据上述公式(1)确定接入概率。其中,终端设备的测量参考信号的接收功率RSRP与终端设备对应的覆盖范围相关。
步骤405、终端设备根据接入概率确定终端设备的接入控制方式。
其中,步骤405的一种可实现方式可以为:终端设备获取第二随机数,当所述第二随机数大于所述接入概率时,确定所述接入控制方式为第一接入控制方式,当所述随机数不大于所述接入概率时,确定所述接入控制方式为第二接入控制方式。步骤404的另一种可实现方式可以为:终端设备获取第二随机数,当所述第二随机数小于所述接入概率时,确定所述接入控制方式为第一接入控制方式,当所述随机数不小于所述接入概率时,确定所述接入控制方式为第二接入控制方式。
其中,第一接入控制方式和第二接入控制方式为上述接入控制方式中任意两项,举例而言,该第一接入控制方式可以为接入当前小区,第二接入控制方式可以为进入预设接入控制流程。
需要说明的是,其中,该第一接入控制方式和该第二接入控制方式可以为设置在终端设备中的两个接入控制方式,通过网络设备发送的接入控制配置信息,终端设备可以确定将其中一个作为该终端设备的接入控制方式。
其中,终端设备获取第二随机数的一种可实现方式可以为,终端设备生成第二随机数,另一种实现方式可以为终端设备从其他装置或模块处获取第二随机数,其具体实现方式可以根据进行灵活设置。
本实施例,网络设备向终端设备发送接入控制配置信息,该接入控制配置信息包括至少一个概率因子,终端设备根据至少一个概率因子和该终端设备的覆盖范围确定该终端设备的接入控制方式,以该终端设备的接入控制方式执行相应操作,从而按照覆盖范围来减少网络设备的负载,避免网络内的终端设备同时接入网络,对网络造成的冲击,减少网络拥塞。
图6为本申请的另一种接入控制方法的流程图,本实施例在上述任一实施例的基础上,对终端设备接收网络设备发送的接入控制配置信息之后,该终端设备执行相应操作进行具体解释说明,其中,以接入控制方式为接入当前小区或进入预设接入控制流程为例进行举例说明,如图6所示,本实施例的方法可以包括:
本实施例的该终端设备的接入控制方式具体指该终端设备的覆盖范围对应的接入控制方式。
步骤501、终端设备在RRC层接收NAS层发送的连接建立请求。
相应的,终端设备在NAS层发送连接建立请求。
步骤502、终端设备在RRC层根据接入控制配置信息和终端设备的覆盖范围确定该终端设备的接入控制方式。
其中,终端设备在接收到NAS层发送的连接建立请求时,执行检测基于覆盖范围的接入控制方式。具体的,终端设备根据接入控制配置信息和终端设备的覆盖范围确定该终端设备的覆盖范围对应的接入控制方式。其具体实现方式可以采用上述任一实施例中该步骤的具体实现方式,此处不再赘述。
步骤503、当该终端设备的接入控制方式为接入当前小区时,终端设备在RRC层向网络设备请求接入。
步骤504、当该终端设备的接入控制方式为进入预设接入控制流程时,终端设备执行预设接入控制流程。
本实施例,网络设备向终端设备发送接入控制配置信息,终端设备根据接入控制配置信息和该终端设备的覆盖范围确定该终端设备的接入控制方式,以该终端设备的接入控制方式执行相应操作,从而按照覆盖范围来减少网络设备的负载,避免网络内的终端设备同时接入网络,对网络造成的冲击,减少网络拥塞。
图7为本申请的再一种接入控制方法的流程图,本实施例在上述任一实施例的基础上,对终端设备接收网络设备发送的接入控制配置信息之后,该终端设备执行相应操作进行具体解释说明,其中,以接入控制方式为不接入当前小区或进入预设接入控制流程为例进行举例说明,如图7所示,本实施例的方法可以包括:
本实施例的该终端设备的接入控制方式具体指该终端设备的覆盖范围对应的接入控制方式。
步骤601、终端设备在RRC层接收NAS层发送的连接建立请求。
相应的,终端设备在NAS层发送连接建立请求。
步骤602、终端设备在RRC层根据接入控制配置信息和终端设备的覆盖范围确定该终端设备的接入控制方式。
其中,终端设备在接收到NAS层发送的连接建立请求时,执行检测基于覆盖范围的接入控制方式。具体的,终端设备根据接入控制配置信息和终端设备的覆盖范围确定该终端设备的覆盖范围对应的接入控制方式。其具体实现方式可以采用上述任一实施例中该步骤的具体实现方式,此处不再赘述。
步骤603、当该终端设备的接入控制方式为不接入当前小区时,终端设备启动定时器,并通知NAS层接入被禁止,在定时器运行期间,终端设备在RRC层不再请求接入网络设备。
其中,终端设备在RRC层通知NAS层接入被禁止,还可以将接入被禁止原因告知NAS层,该接入被禁止原因可以为受到覆盖范围的限制。当定时器超时时,RRC层通知NAS层,禁止已经取消,NAS层可以再次向RRC层发送的连接建立请求。
步骤604、当该终端设备的接入控制方式为进入预设接入控制流程时,终端设备执行预设接入控制流程。
本实施例,网络设备向终端设备发送接入控制配置信息,终端设备根据接入控制信息和该终端设备的覆盖范围确定该终端设备的接入控制方式,以该终端设备的接入控制方式执行相应操作,从而按照覆盖范围来减少网络设备的负载,避免网络内的终端设备同时接入网络,对网络造成的冲击,减少网络拥塞。
并且,本实施例的接入控制方式为不接入当前小区或者进入预设接入控制流程,其中,对一些覆盖范围内的终端设备直接禁止接入,从而更快速、有效的降低网络设备的负载。
图8为本申请的又一种接入控制方法的流程图,本实施例在上述任一实施例的基础上,对终端设备接收网络设备发送的接入控制配置信息之后,该终端设备执行相应操作进行具体解释说明,其中,以接入控制方式为接入当前小区或不接入当前小区为例进行举例说明,如图8所示,本实施例的方法可以包括:
本实施例的该终端设备的接入控制方式具体指该终端设备的覆盖范围对应的接入控制方式。
步骤701、终端设备在RRC层接收NAS层发送的连接建立请求。
相应的,终端设备在NAS层发送连接建立请求。
步骤702、终端设备在RRC层根据接入控制配置信息和终端设备的覆盖范围确定该终端设备的接入控制方式。
其中,终端设备在接收到NAS层发送的连接建立请求时,执行检测基于覆盖范围的接入控制方式。具体的,终端设备根据接入控制配置信息和终端设备的覆盖范围确定该终端设备的覆盖范围对应的接入控制方式。其具体实现方式可以采用上述任一实施例中该步骤的具体实现方式,此处不再赘述。
步骤703、当该终端设备的接入控制方式为不接入当前小区时,终端设备启动定时器,并通知NAS层接入被禁止,在定时器运行期间,终端设备在RRC层不再请求接入网络设备。
其中,终端设备在RRC层通知NAS层接入被禁止,还可以将接入被禁止原因告知NAS层,该接入被禁止原因为受到覆盖范围的限制。当定时器超时时,RRC层通知NAS层,禁止已经取消,NAS层可以再次向RRC层发送的连接建立请求。
步骤704、当该终端设备的接入控制方式为接入当前小区时,终端设备在RRC层向网络设备请求接入。
需要说明的是,本实施例的接入控制方法可以在现有的EAB流程、SSAC流程、ACB流程和ACDC流程中任意一项或者多项之后执行。可选的,在上述现有的检测流程的结果为允许接入时,再执行本实施例的接入控制方法。
本实施例,网络设备向终端设备发送接入控制配置信息,终端设备根据接入控制信息和该终端设备的覆盖范围确定该终端设备的接入控制方式,以该终端设备的接入控制方式执行相应操作,从而按照覆盖范围来减少网络设备的负载,避免网络内的终端设备同时接入网络,对网络造成的冲击,减少网络拥塞。
图9为本申请的又一种接入控制方法的流程图,本实施例在上述任一实施例的基础上,对终端设备接收网络设备发送的接入控制配置信息之后,该终端设备执行相应操作进行具体解释说明,其中,以接入控制方式为驻留当前小区或不驻留当前小区为例进行举例说明,如图9所示,本实施例的方法可以包括:
本实施例的该终端设备的接入控制方式具体指该终端设备的覆盖范围对应的接入控制方式。
步骤801、终端设备在RRC层接收NAS层发送的连接建立请求。
相应的,终端设备在NAS层发送连接建立请求。
步骤802、终端设备在RRC层根据接入控制配置信息和终端设备的覆盖范围确定该终端设备的接入控制方式。
其中,终端设备在接收到NAS层发送的连接建立请求时,执行检测基于覆盖范围的接入控制方式。具体的,终端设备根据接入控制配置信息和终端设备的覆盖范围确定该终端设备的覆盖范围对应的接入控制方式。其具体实现方式可以采用上述任一实施例中该步骤的具体实现方式,此处不再赘述。
步骤803、当该终端设备的接入控制方式为不驻留当前小区时,终端设备重新选择驻留的网络设备。
步骤804、当该终端设备的接入控制方式为驻留当前小区时,终端设备驻留当前的网络设备,并向网络设备请求接入。
本实施例的接入控制配置信息具体可以通过SIB1发送。当终端设备根据该接入控制配置信息确定该终端设备的覆盖范围对应的接入控制方式为不驻留当前小区时,终端设备可以不再读取SIB2,从而节省终端设备的功耗。
本实施例,网络设备向终端设备发送接入控制配置信息,该接入控制配置信息用于指示终端设备的接入控制方式为驻留当前小区或者不驻留当前小区,即通过控制终端设备是否可以驻留,来控制不同覆盖范围的终端设备的接入,从而按照覆盖范围来减少网络设备的负载,避免网络内的终端设备同时接入网络,对网络造成的冲击,减少网络拥塞。
图10为本申请的又一种接入控制方法的流程图,本实施例在上述任一实施例的基础上,网络设备还可以向终端设备发送指示消息,该指示消息用于指示接入控制配置信息已经更新或者即将更新,如图10所示,本实施例的方法具体可以包括:
步骤901、网络设备向终端设备发送指示消息,终端设备接收网络设备发送的指示消息。
其中,该指示消息用于指示所述接入控制配置信息已经更新或者即将更新,该指示消息可以携带在寻呼消息和/或系统信息中。
一种可实现方式,当网络设备的该接入控制配置信息发生变化后,网络设备向终端设备发送指示消息,终端设备根据该指示消息读取系统信息中的更新后的接入控制配置信息。另一种实现方式,当网络设备的该接入控制配置信息即将发生变化时,网络设备向终端设备发送指示消息,终端设备根据该指示消息重新读取系统信息中的更新后的接入控制配置信息。从而节省终端设备的功耗。
步骤902、终端设备根据指示消息获取更新后的接入控制配置信息。
其中,以指示消息携带在寻呼消息中为例进行举例说明,当接入控制配置信息发生已经更新或者即将更新时,网络设备可以向终端设备发送寻呼消息,该寻呼消息携带该指示消息,终端收到该指示消息后获知该接入控制配置信息发生已经更新或者即将更新,从而重新读取系统信息,获取更新后的接入控制配置信息。
可选的,一种可实现方式,该指示消息包括一比特位信息,所述一比特位信息用于指示所述接入控制配置信息已经更新或者即将更新。相应的,上述步骤902的一种可实现方式可以为:所述终端设备根据所述一比特位信息获取更新后的接入控制配置信息。
另一种可实现方式,该指示消息包括M个比特位信息,M为所述至少一个接入控制方式信息的个数,每一比特位信息对应一个接入控制方式信息,每一比特位信息用于指示与其对应的接入控制方式信息已经更新或者即将更新,其中,M为任意整数。相应的,上述步骤902的一种可实现方式可以为:所述终端设备从所述M个比特位信息中获取所述终端设备的比特位信息,根据所述终端设备的比特位信息确定所述终端设备的接入控制方式信息是否已经更新或即将更新,当所述终端设备的接入控制方式信息更新或即将更新时,所述终端设备获取更新后的接入控制配置信息,其中,所述终端设备的比特位信息为所述 终端设备的覆盖范围对应的接入控制方式信息对应的比特位。
再一种可实现方式,该指示信息包括N个比特位信息,N为所述至少一个覆盖范围的个数,每一比特位信息对应一个覆盖范围,每一比特位信息用于指示与其对应的覆盖范围对应的接入控制信息已经更新或者即将更新。其中,M为任意整数。相应的,上述步骤902的一种可实现方式可以为:所述终端设备从所述N个比特位信息中获取所述终端设备的覆盖范围对应的比特位信息,根据所述终端设备的覆盖范围对应的比特位信息确定所述终端设备的覆盖范围对应的接入控制方式信息是否已经更新或即将更新,当所述终端设备的覆盖范围对应的接入控制方式信息已经更新或即将更新时,所述终端设备获取更新后的接入控制配置信息。
本实施例,网络设备向终端设备发送接入控制配置信息,该接入控制配置信息用于指示至少一个覆盖范围对应的接入控制方式,终端设备根据接入控制配置信息和该终端设备的覆盖范围确定该终端设备的接入控制方式,以该终端设备的接入控制方式进行相应操作,从而避免网络内的终端设备同时接入网络,对网络造成的冲击,减少网络拥塞。当接入控制配置信息已经更新或即将更新时,网络设备可以向终端设备发送指示消息,以使得终端设备及时根据指示消息获取更新后的接入控制配置信息,实现网络内终端设备的接入控制方式的灵活调整。
可以理解的,本申请的接入控制装置可以是终端设备,也可以是网络设备,其用于实现上述实施例的接入控制方法。
可以理解的,上述各个实施例中,由终端设备实现的方法或步骤,也可以是由终端设备内部的芯片实现的。由网络设备实现的方法或者步骤,也可以是由网络设备内部的芯片实现的。
图11为本申请的一种终端设备的结构示意图,如图11所示,本实施例的终端设备,包括:接收模块11和处理模块12。
接收模块11,用于接收网络设备发送的接入控制配置信息,所述接入控制配置信息用于指示至少一个覆盖范围对应的接入控制方式;
处理模块12,用于确定所述终端设备的覆盖范围;根据所述接入控制配置信息和所述终端设备的覆盖范围确定所述终端设备的接入控制方式。
在一些实施例中,所述接入控制配置信息包括至少一个接入控制方式信息,所述接入控制方式信息对应至少一个覆盖范围;所述处理模块12用于:从所述至少一个接入控制方式信息中获取所述终端设备的覆盖范围对应的接入控制方式信息,根据所述终端设备的覆盖范围对应的接入控制方式信息确定所述终端设备的接入控制方式。
在一些实施例中,所述接入控制配置信息还包括至少一个概率因子,所述处理模块12还用于:根据所述终端设备对应的覆盖范围、所述至少一个概率因子确定接入概率;根据所述接入概率确定是否执行所述接入控制方式。
在一些实施例中,所述处理模块12用于:获取第一随机数,当所述第一随机数大于所述接入概率时,确定执行所述接入控制方式,当所述第一随机数不大于所述接入概率时,确定不执行所述接入控制方式;或者,获取第一随机数,当所述第一随机数小于所述接入概率时,确定执行所述接入控制方式,当所述第一随机数不小于所述接入概率时,确定不执行所述接入控制方式。
在一些实施例中,所述接入控制配置信息包括至少一个概率因子,所述处理模块12用于:根据所述终端设备对应的覆盖范围和所述至少一个概率因子确定接入概率;根据所述接入概率确定所述终端设备的接入控制方式。
在一些实施例中,所述处理模块12用于:根据公式p=kn×qn+kn-1×qn-1+kn-2×qn-2+......+k1×q1+k0,确定所述接入概率;
其中,p为所述接入概率,q为终端设备测量参考信号的接收功率RSRP或接收质量RSRQ,{kn,kn-1,kn-2,......,k0}为所述至少一个概率因子,n为任意自然数。
在一些实施例中,所述处理模块12用于:获取第二随机数,当所述第二随机数大于所述接入概率时,确定所述接入控制方式为第一接入控制方式,当所述第二随机数不大于所述接入概率时,确定所述接入控制方式为第二接入控制方式;或者,获取第二随机数,当所述第二随机数小于所述接入概率时,确定所述接入控制方式为第一接入控制方式,当所述第二随机数不小于所述接入概率时,确定所述接入控制方式为第二接入控制方式。
在一些实施例中,所述接入控制方式包括接入当前小区、或者进入预设接入控制流程、或者驻留到当前小区,或者不接入当前小区、或者不进入预设接入控制流程、或者不驻留到当前小区;其中,所述预设接入控制流程包括扩展访问限制EAB流程、特定服务访问控制SSAC流程、接入等级限制ACB流程和特定应用访问控制ACDC流程中任意一项或者多项;
所述第一接入控制方式和所述第二接入控制方式为所述接入控制方式中任意两项。
在一些实施例中,当所述终端设备的接入控制方式为所述不接入当前小区时,所述处理模块12还用于:启动定时器,并通知非接入层当前小区禁止接入;或者,
当所述终端设备的接入控制方式为所述不驻留到当前小区时,所述处理模块102还用于:进行小区重选。
在一些实施例中,所述接收模块11还用于:接收所述网络设备发送的指示消息,所述指示消息用于指示所述接入控制配置信息已经更新或者即将更新;
所述处理模块12还用于根据所述指示消息获取更新后的接入控制配置信息。
在一些实施例中,所述指示消息包括一比特位信息,所述处理模块12用于:根据所述一比特位信息获取更新后的接入控制配置信息;或者,
所述指示消息包括M个比特位信息,M为所述至少一个接入控制方式信息的个数,每一比特位信息对应一个接入控制方式信息,所述处理模块12用于:从所述M个比特位信息中获取所述终端设备的比特位信息,根据所述终端设备的比特位信息确定所述终端设备的接入控制方式信息是否已经更新或即将更新,当所述终端设备的接入控制方式信息更新或即将更新时,获取更新后的接入控制配置信息,其中,所述终端设备的比特位信息为所述终端设备的覆盖范围对应的接入控制方式信息对应的比特位;或者,
所述指示信息包括N个比特位信息,N为所述至少一个覆盖范围的个数,每一比特位信息对应一个覆盖范围,所述处理模块12用于:从所述N个比特位信息中获取所述终端设备的覆盖范围对应的比特位信息,根据所述终端设备的覆盖范围对应的比特位信息确定所述终端设备的覆盖范围对应的接入控制方式信息是否已经更新或即将更新,当所述终端设备的覆盖范围对应的接入控制方式信息已经更新或即将更新时,获取更新后的接入控制配置信息。
当然可以理解的,本实施的终端设备还可以包括发送模块13,用于向其他设备发送信息或者消息。
本实施例以上所述的终端设备,可以用于执行上述各方法实施例中终端设备或终端设备的芯片执行的技术方案,其实现原理和技术效果类似,其中各个模块的功能可以参考方法实施例中相应的描述,此处不再赘述。
图12为本申请的另一种终端设备的结构示意图,如图12所示,本实施例的终端设备,包括:接收器21和处理器22。
在硬件实现上,以上接收模块11可以是本实施例中的接收器21。该接收器21也可以对应收发器,可以理解的终端设备还可以包括发送器23,以上发送模块13可以是本实施例中的发送器23,该发送器23也可以对应收发器。以上处理模块12可以以硬件形式内嵌于或独立于终端设备的处理器22中。
所述接收器21可以包括混频器等必要的射频通信器件。所述处理器22可以包括中央处理单元(Central Processing Unit,CPU)、数字信号处理器(digital signal processor,DSP)、微控制器(Microcontroller Unit,MCU)、专用集成电路(Application Specific Integrated Circuit,ASIC)或现场可编程逻辑门阵列(Field-Programmable Gate Array,FPGA)中的至少一个。
可选地,本实施例的终端设备还可以包括存储器24,存储器24用于存储程序指令,处理器22用于调用存储器24中的程序指令执行上述方案。
所述程序指令可以以软件功能单元的形式实现并能够作为独立的产品销售或使用,所述存储器24可以是任意形式的计算机可读取存储介质。基于这样的理解,本申请的技术方案的全部或部分可以以软件产品的形式体现出来,包括若干指令用以使得一台计算机设备,具体可以是处理器22,来执行本申请各个实施例中终端设备的全部或部分步骤。而前述的计算机可读存储介质包括:U盘、移动硬盘、只读存储器(Read-Only Memory,ROM)、随机存取存储器(Random Access Memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。
本实施例以上所述的终端设备,可以用于执行上述各方法实施例中终端设备或终端设备的芯片执行的技术方案,其实现原理和技术效果类似,其中各个器件的功能可以参考方法实施例中相应的描述,此处不再赘述。
图13为本申请的一种芯片的结构示意图,如图13所示,本实施例的芯片可以是终端设备的芯片,本实施例的芯片可以包括:存储器31和处理器32。存储器31与处理器32通信连接。需要说明的是,所述芯片还可以包含组成芯片的其它结构或单元,例如,接口、插槽等,这里不做限定。
在硬件实现上,以上接收模块11、处理模块12和发送模块13可以以硬件形式内嵌于或独立于芯片的处理器32中。
其中,存储器31用于存储程序指令,处理器32用于调用存储器31中的程序指令执行上述方案。
本实施例以上所述的芯片,可以用于执行本申请上述各方法实施例中终端设备或其内部芯片的技术方案,其实现原理和技术效果类似,其中各个模块的功能可以参考方法实施例中相应的描述,此处不再赘述。
图14为本申请的一种网络设备的结构示意图,如图14所示,本实施例的网络设备可以包括:处理模块41和发送模块42。
处理模块41,用于确定接入控制配置信息,所述接入控制配置信息用于指示至少一个覆盖范围对应的接入控制方式。
发送模块42,用于向终端设备发送所述接入控制配置信息,所述接入控制配置信息用于确定所述终端设备的接入控制方式。
在一些实施例中,所述接入控制配置信息包括至少一个接入控制方式信息,所述接入控制方式信息对应至少一个覆盖范围,所述接入控制方式信息用于指示与其对应的所述至少一个覆盖范围所对应的接入控制方式,所述至少一个接入控制方式信息用于确定所述终端设备的接入控制方式。
在一些实施例中,所述接入控制配置信息包括至少一个概率因子,所述至少一个概率因子用于确定所述终端设备的接入概率,所述接入概率用于确定所述终端设备的接入控制方式。
在一些实施例中,所述接入控制方式包括接入当前小区、或者进入预设接入控制流程、或者不接入当前小区、或者驻留到当前小区、或者不驻留到当前小区、或者不进入预设接入控制流程;
其中,所述预设接入控制流程包括扩展访问限制EAB流程、特定服务访问控制SSAC流程、接入等级限制ACB流程和特定应用访问控制ACDC流程中任意一项或者多项。
在一些实施例中,所述发送模块42还用于:向所述终端设备发送指示消息,所述指示消息用于指示所述接入控制配置信息已经更新或者即将更新;其中,所述指示消息携带在寻呼消息和/或系统信息中。
在一些实施例中,所述指示消息包括一比特位信息,所述一比特位信息用于指示所述接入控制配置信息已经更新或者即将更新;或者,
所述指示消息包括M个比特位信息,M为所述至少一个接入控制方式信息的个数,每一比特位信息对应一个接入控制方式信息,每一比特位信息用于指示与其对应的接入控制方式信息已经更新或者即将更新;或者,
所述指示信息包括N个比特位信息,N为所述至少一个覆盖范围的个数,每一比特位信息对应一个覆盖范围,每一比特位信息用于指示与其对应的覆盖范围对应的接入控制信息已经更新或者即将更新。
当然可以理解的,本实施的网络设备还可以包括接收模块43,用于向其他设备发送信息或者消息。
本实施例以上所述的网络设备,可以用于执行上述各方法实施例中网络设备/网络设备的芯片执行的技术方案,其实现原理和技术效果类似,其中各个模块的功能可以参考方法实施例中相应的描述,此处不再赘述。
图15为本申请的另一种网络设备的结构示意图,如图15所示,本实施例的网络设备,包括:处理器51和发送器52。
在硬件实现上,以上处理模块41可以以硬件形式内嵌于或独立于网络设备的处理器51中。以上发送模块42可以是本实施例中的发送器52。该发送器52也可以对应收发器,可以理解的网络设备还可以包括接收器53,以上接收模块43可以是本实施 例中的接收器53,该接收器53也可以对应收发器。
所述发送器52可以包括混频器等必要的射频通信器件。所述处理器51可以包括CPU、DSP、MCU、ASIC或FPGA中的至少一个。
可选地,本实施例的网络设备还可以包括存储器54,存储器54用于存储程序指令,处理器51用于调用存储器54中的程序指令执行上述方案。
本实施例以上所述的网络设备,可以用于执行上述各方法实施例中网络设备或网络设备的芯片执行的技术方案,其实现原理和技术效果类似,其中各个器件的功能可以参考方法实施例中相应的描述,此处不再赘述。
图16为本申请的另一种芯片的结构示意图,如图16所示,本实施例的芯片可以是网络设备的芯片,本实施例的芯片可以包括:存储器61和处理器62。存储器61与处理器62通信连接。所述处理器62例如可以包括CPU、DSP、MCU、ASIC或FPGA的至少一个。需要说明的是,所述芯片还可以包含组成芯片的其它结构或单元,例如,接口、插槽等,这里不做限定。
在硬件实现上,以上接收模块43、处理模块41和发送模块42可以以硬件形式内嵌于或独立于芯片的处理器62中。
其中,存储器61用于存储程序指令,处理器62用于调用存储器61中的程序指令执行上述方案。
所述程序指令可以以软件功能单元的形式实现并能够作为独立的产品销售或使用,所述存储器可以是任意形式的计算机可读取存储介质。基于这样的理解,本申请的技术方案的全部或部分可以以软件产品的形式体现出来,包括若干指令用以使得一台计算机设备,具体可以是处理器62,来执行本申请各个实施例中网络设备的全部或部分步骤。而前述的计算机可读存储介质包括:U盘、移动硬盘、ROM、RAM、磁碟或者光盘等各种可以存储程序代码的介质。
本实施例以上所述的芯片,可以用于执行本申请上述各方法实施例中网络设备或其内部芯片的技术方案,其实现原理和技术效果类似,其中各个模块的功能可以参考方法实施例中相应的描述,此处不再赘述。
需要说明的是,本申请实施例中对模块的划分是示意性的,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式。在本申请的实施例中的各功能模块可以集成在一个处理模块中,也可以是各个模块单独物理存在,也可以两个或两个以上模块集成在一个模块中。上述集成的模块既可以采用硬件的形式实现,也可以采用软件功能模块的形式实现。
所述集成的模块如果以软件功能模块的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)或处理器(processor)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、ROM、RAM、磁碟或者光盘等各种可以存储程序代码的介质。
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实 现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行所述计算机程序指令时,全部或部分地产生按照本申请实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质,(例如,软盘、硬盘、磁带)、光介质(例如,DVD)、或者半导体介质(例如固态硬盘Solid State Disk(SSD))等。

Claims (37)

  1. 一种接入控制方法,其特征在于,包括:
    终端设备接收网络设备发送的接入控制配置信息,所述接入控制配置信息用于指示至少一个覆盖范围对应的接入控制方式;
    所述终端设备确定所述终端设备的覆盖范围;
    所述终端设备根据所述接入控制配置信息和所述终端设备的覆盖范围确定所述终端设备的接入控制方式。
  2. 根据权利要求1所述的方法,其特征在于,所述接入控制配置信息包括至少一个接入控制方式信息,所述接入控制方式信息对应至少一个覆盖范围;
    所述终端设备根据所述接入控制配置信息和所述终端设备的覆盖范围确定所述终端设备的接入控制方式,包括:
    所述终端设备从所述至少一个接入控制方式信息中获取所述终端设备的覆盖范围对应的接入控制方式信息,根据所述终端设备的覆盖范围对应的接入控制方式信息确定所述终端设备的接入控制方式。
  3. 根据权利要求2所述的方法,其特征在于,所述接入控制配置信息还包括至少一个概率因子,所述方法还包括:
    所述终端设备根据所述终端设备对应的覆盖范围和所述至少一个概率因子确定接入概率;
    所述终端设备根据所述接入概率确定是否执行所述接入控制方式。
  4. 根据权利要求3所述的方法,其特征在于,所述终端设备根据所述接入概率确定是否执行所述接入控制方式,包括:
    所述终端设备获取第一随机数,当所述第一随机数大于所述接入概率时,确定执行所述接入控制方式,当所述第一随机数不大于所述接入概率时,确定不执行所述接入控制方式;
    或者,
    所述终端设备获取第一随机数,当所述第一随机数小于所述接入概率时,确定执行所述接入控制方式,当所述第一随机数不小于所述接入概率时,确定不执行所述接入控制方式。
  5. 根据权利要求1所述的方法,其特征在于,所述接入控制配置信息包括至少一个概率因子,所述终端设备根据所述接入控制配置信息和所述终端设备的覆盖范围确定所述终端设备的接入控制方式,包括:
    所述终端设备根据所述终端设备对应的覆盖范围和所述至少一个概率因子确定接入概率;
    所述终端设备根据所述接入概率确定所述终端设备的接入控制方式。
  6. 根据权利要求3或5所述的方法,其特征在于,所述终端设备根据所述终端设备对应的覆盖范围和所述至少一个概率因子确定接入概率,包括:
    所述终端设备根据公式p=kn×qn+kn-1×qn-1+kn-2×qn-2+......+k1×q1+k0,确定所述接入概率;
    其中,p为所述接入概率,q为终端设备测量参考信号的接收功率RSRP或接收质量 RSRQ,{kn,kn-1,kn-2,......,k0}为所述至少一个概率因子,n为任意自然数。
  7. 根据权利要求5或6所述的方法,其特征在于,所述终端设备根据所述接入概率确定所述终端设备的接入控制方式,包括:
    所述终端设备获取第二随机数,当所述第二随机数大于所述接入概率时,确定所述接入控制方式为第一接入控制方式,当所述第二随机数不大于所述接入概率时,确定所述接入控制方式为第二接入控制方式;
    或者,
    所述终端设备获取第二随机数,当所述第二随机数小于所述接入概率时,确定所述接入控制方式为第一接入控制方式,当所述第二随机数不小于所述接入概率时,确定所述接入控制方式为第二接入控制方式。
  8. 根据权利要求1至7任一项所述的方法,其特征在于,所述接入控制方式包括接入当前小区、或者进入预设接入控制流程、或者驻留到当前小区,或者不接入当前小区、或者不进入预设接入控制流程、或者不驻留到当前小区;
    其中,所述预设接入控制流程包括扩展访问限制EAB流程、特定服务访问控制SSAC流程、接入等级限制ACB流程和特定应用访问控制ACDC流程中任意一项或者多项。
  9. 根据权利要求8所述的方法,其特征在于,当所述终端设备的接入控制方式为所述不接入当前小区时,所述方法还包括:所述终端设备启动定时器,并通知非接入层当前小区禁止接入;或者,
    当所述终端设备的接入控制方式为所述不驻留到当前小区时,所述方法还包括:所述终端设备进行小区重选。
  10. 根据权利要求1至9任一项所述的方法,其特征在于,所述方法还包括:
    所述终端设备接收所述网络设备发送的指示消息,所述指示消息用于指示所述接入控制配置信息已经更新或者即将更新;
    所述终端设备根据所述指示消息获取更新后的接入控制配置信息。
  11. 根据权利要求10所述的方法,其特征在于,所述指示消息包括一比特位信息,所述终端设备根据所述指示消息获取更新后的接入控制配置信息,包括:所述终端设备根据所述一比特位信息获取更新后的接入控制配置信息;或者,
    所述指示消息包括M个比特位信息,M为所述至少一个接入控制方式信息的个数,每一比特位信息对应一个接入控制方式信息,所述终端设备根据所述指示消息获取更新后的接入控制配置信息,包括:所述终端设备从所述M个比特位信息中获取所述终端设备的比特位信息,根据所述终端设备的比特位信息确定所述终端设备的接入控制方式信息是否已经更新或即将更新,当所述终端设备的接入控制方式信息更新或即将更新时,所述终端设备获取更新后的接入控制配置信息,其中,所述终端设备的比特位信息为所述终端设备的覆盖范围对应的接入控制方式信息对应的比特位;或者,
    所述指示信息包括N个比特位信息,N为所述至少一个覆盖范围的个数,每一比特位信息对应一个覆盖范围,所述终端设备根据所述指示消息获取更新后的接入控制配置信息,包括:所述终端设备从所述N个比特位信息中获取所述终端设备的覆盖范围对应的比特位信息,根据所述终端设备的覆盖范围对应的比特位信息确定所述终端设备的覆盖范围对应的接入控制方式信息是否已经更新或即将更新,当所述终端设备的覆盖范围对应的接 入控制方式信息已经更新或即将更新时,所述终端设备获取更新后的接入控制配置信息。
  12. 一种接入控制方法,其特征在于,包括:
    网络设备确定接入控制配置信息,所述接入控制配置信息用于指示至少一个覆盖范围对应的接入控制方式;
    所述网络设备向终端设备发送所述接入控制配置信息,所述接入控制配置信息用于确定所述终端设备的接入控制方式。
  13. 根据权利要求12所述的方法,其特征在于,所述接入控制配置信息包括至少一个接入控制方式信息,所述接入控制方式信息对应至少一个覆盖范围,所述接入控制方式信息用于指示与其对应的所述至少一个覆盖范围所对应的接入控制方式,所述至少一个接入控制方式信息用于确定所述终端设备的接入控制方式。
  14. 根据权利要求13所述的方法,其特征在于,所述接入控制配置信息还包括至少一个概率因子,所述至少一个概率因子用于确定所述终端设备的接入概率,所述接入概率用于确定是否执行所述终端的接入控制方式。
  15. 根据权利要求12所述的方法,其特征在于,所述接入控制配置信息包括至少一个概率因子,所述至少一个概率因子用于确定所述终端设备的接入概率,所述接入概率用于确定所述终端设备的接入控制方式。
  16. 根据权利要求12至15任一项所述的方法,其特征在于,所述接入控制方式包括接入当前小区、或者进入预设接入控制流程、或者不接入当前小区、或者驻留到当前小区、或者不驻留到当前小区、或者不进入预设接入控制流程;
    其中,所述预设接入控制流程包括扩展访问限制EAB流程、特定服务访问控制SSAC流程、接入等级限制ACB流程和特定应用访问控制ACDC流程中任意一项或者多项。
  17. 根据权利要求12至16任一项所述的方法,其特征在于,所述方法还包括:
    所述网络设备向所述终端设备发送指示消息,所述指示消息用于指示所述接入控制配置信息已经更新或者即将更新;
    其中,所述指示消息携带在寻呼消息和/或系统信息中。
  18. 根据权利要求17所述的方法,其特征在于,所述指示消息包括一比特位信息,所述一比特位信息用于指示所述接入控制配置信息已经更新或者即将更新;或者,
    所述指示消息包括M个比特位信息,M为所述至少一个接入控制方式信息的个数,每一比特位信息对应一个接入控制方式信息,每一比特位信息用于指示与其对应的接入控制方式信息已经更新或者即将更新;或者,
    所述指示信息包括N个比特位信息,N为所述至少一个覆盖范围的个数,每一比特位信息对应一个覆盖范围,每一比特位信息用于指示与其对应的覆盖范围对应的接入控制信息已经更新或者即将更新。
  19. 一种装置,其特征在于,包括:
    接收器,用于接收网络设备发送的接入控制配置信息,所述接入控制配置信息用于指示至少一个覆盖范围对应的接入控制方式;
    处理器,用于确定终端设备的覆盖范围;
    所述处理器,还用于根据所述接入控制配置信息和所述终端设备的覆盖范围确定所述终端设备的接入控制方式。
  20. 根据权利要求19所述的装置,其特征在于,所述接入控制配置信息包括至少一个接入控制方式信息,所述接入控制方式信息对应至少一个覆盖范围;
    所述处理器用于:从所述至少一个接入控制方式信息中获取所述终端设备的覆盖范围对应的接入控制方式信息,根据所述终端设备的覆盖范围对应的接入控制方式信息确定所述终端设备的接入控制方式。
  21. 根据权利要求20所述的装置,其特征在于,所述接入控制配置信息还包括至少一个概率因子,所述处理器还用于:
    根据所述终端设备对应的覆盖范围和所述至少一个概率因子确定接入概率;根据所述接入概率确定是否执行所述接入控制方式。
  22. 根据权利要求21所述的装置,其特征在于,所述处理器用于:
    获取第一随机数,当所述第一随机数大于所述接入概率时,确定执行所述接入控制方式,当所述第一随机数不大于所述接入概率时,确定不执行所述接入控制方式;
    或者,
    获取第一随机数,当所述第一随机数小于所述接入概率时,确定执行所述接入控制方式,当所述第一随机数不小于所述接入概率时,确定不执行所述接入控制方式。
  23. 根据权利要求19所述的装置,其特征在于,所述接入控制配置信息包括至少一个概率因子,所述处理器用于:
    根据所述终端设备对应的覆盖范围和所述至少一个概率因子确定接入概率;根据所述接入概率确定所述终端设备的接入控制方式。
  24. 根据权利要求21或23所述的装置,其特征在于,所述处理器用于:
    根据公式p=kn×qn+kn-1×qn-1+kn-2×qn-2+......+k1×q1+k0,确定所述接入概率;
    其中,p为所述接入概率,q为终端设备测量参考信号的接收功率RSRP或接收质量RSRQ,{kn,kn-1,kn-2,......,k0}为所述至少一个概率因子,n为任意自然数。
  25. 根据权利要求23或24所述的装置,其特征在于,所述处理器用于:
    获取第二随机数,当所述第二随机数大于所述接入概率时,确定所述接入控制方式为第一接入控制方式,当所述第二随机数不大于所述接入概率时,确定所述接入控制方式为第二接入控制方式;
    或者,
    获取第二随机数,当所述第二随机数小于所述接入概率时,确定所述接入控制方式为第一接入控制方式,当所述第二随机数不小于所述接入概率时,确定所述接入控制方式为第二接入控制方式。
  26. 根据权利要求19至25任一项所述的装置,所述接入控制方式包括接入当前小区、或者进入预设接入控制流程、或者驻留到当前小区,或者不接入当前小区、或者不进入预设接入控制流程、或者不驻留到当前小区;
    其中,所述预设接入控制流程包括扩展访问限制EAB流程、特定服务访问控制SSAC流程、接入等级限制ACB流程和特定应用访问控制ACDC流程中任意一项或者多项;
    所述第一接入控制方式和所述第二接入控制方式为所述接入控制方式中任意两项。
  27. 根据权利要求25所述的装置,其特征在于,当所述终端设备的接入控制方式为所述不接入当前小区时,所述处理器还用于:启动定时器,并通知非接入层当前小区禁止 接入;或者,
    当所述终端设备的接入控制方式为所述不驻留到当前小区时,所述处理器还用于:进行小区重选。
  28. 根据权利要求19至27任一项所述的装置,其特征在于,所述接收器还用于:接收所述网络设备发送的指示消息,所述指示消息用于指示所述接入控制配置信息已经更新或者即将更新;
    所述处理器还用于根据所述指示消息获取更新后的接入控制配置信息。
  29. 根据权利要求28所述的装置,其特征在于,所述指示消息包括一比特位信息,所述处理器用于:根据所述一比特位信息获取更新后的接入控制配置信息;或者,
    所述指示消息包括M个比特位信息,M为所述至少一个接入控制方式信息的个数,每一比特位信息对应一个接入控制方式信息,所述处理器用于:从所述M个比特位信息中获取所述终端设备的比特位信息,根据所述终端设备的比特位信息确定所述终端设备的接入控制方式信息是否已经更新或即将更新,当所述终端设备的接入控制方式信息更新或即将更新时,获取更新后的接入控制配置信息,其中,所述终端设备的比特位信息为所述终端设备的覆盖范围对应的接入控制方式信息对应的比特位;或者,
    所述指示信息包括N个比特位信息,N为所述至少一个覆盖范围的个数,每一比特位信息对应一个覆盖范围,所述处理器用于:从所述N个比特位信息中获取所述终端设备的覆盖范围对应的比特位信息,根据所述终端设备的覆盖范围对应的比特位信息确定所述终端设备的覆盖范围对应的接入控制方式信息是否已经更新或即将更新,当所述终端设备的覆盖范围对应的接入控制方式信息已经更新或即将更新时,获取更新后的接入控制配置信息。
  30. 一种装置,其特征在于,包括:
    处理器,用于确定接入控制配置信息,所述接入控制配置信息用于指示至少一个覆盖范围对应的接入控制方式;
    发送器,用于向终端设备发送所述接入控制配置信息,所述接入控制配置信息用于确定所述终端设备的接入控制方式。
  31. 根据权利要求30所述的装置,其特征在于,所述接入控制配置信息包括至少一个接入控制方式信息,所述接入控制方式信息对应至少一个覆盖范围,所述接入控制方式信息用于指示与其对应的所述至少一个覆盖范围所对应的接入控制方式,所述至少一个接入控制方式信息用于确定所述终端设备的接入控制方式。
  32. 根据权利要求30所述的装置,其特征在于,所述接入控制配置信息包括至少一个概率因子,所述至少一个概率因子用于确定所述终端设备的接入概率,所述接入概率用于确定所述终端设备的接入控制方式。
  33. 根据权利要求30至32任一项所述的装置,其特征在于,所述接入控制方式包括接入当前小区、或者进入预设接入控制流程、或者不接入当前小区、或者驻留到当前小区、或者不驻留到当前小区、或者不进入预设接入控制流程;
    其中,所述预设接入控制流程包括扩展访问限制EAB流程、特定服务访问控制SSAC流程、接入等级限制ACB流程和特定应用访问控制ACDC流程中任意一项或者多项。
  34. 根据权利要求30至33任一项所述的装置,其特征在于,所述发送器还用于:
    向所述终端设备发送指示消息,所述指示消息用于指示所述接入控制配置信息已经更新或者即将更新;
    其中,所述指示消息携带在寻呼消息和/或系统信息中。
  35. 根据权利要求34所述的装置,其特征在于,所述指示消息包括一比特位信息,所述一比特位信息用于指示所述接入控制配置信息已经更新或者即将更新;或者,
    所述指示消息包括M个比特位信息,M为所述至少一个接入控制方式信息的个数,每一比特位信息对应一个接入控制方式信息,每一比特位信息用于指示与其对应的接入控制方式信息已经更新或者即将更新;或者,
    所述指示信息包括N个比特位信息,N为所述至少一个覆盖范围的个数,每一比特位信息对应一个覆盖范围,每一比特位信息用于指示与其对应的覆盖范围对应的接入控制信息已经更新或者即将更新。
  36. 一种接入控制装置,其特征在于,包括:存储器和处理器;
    所述存储器,用于存储程序指令;
    所述处理器,用于调用所述存储器中存储的所述程序指令以实现如权利要求1至18任一项所述的接入控制方法。
  37. 一种计算机存储介质,其上存储有计算机程序或指令,其特征在于,当所述计算机程序或指令被处理器或计算机执行时,实现如权利要求1至18任一项所述的接入控制方法。
PCT/CN2017/104126 2017-09-28 2017-09-28 接入控制方法和装置 WO2019061204A1 (zh)

Priority Applications (4)

Application Number Priority Date Filing Date Title
PCT/CN2017/104126 WO2019061204A1 (zh) 2017-09-28 2017-09-28 接入控制方法和装置
CN201780094731.9A CN111066346B (zh) 2017-09-28 2017-09-28 接入控制方法和装置
EP17927016.0A EP3678420A4 (en) 2017-09-28 2017-09-28 ACCESS CONTROL METHOD AND DEVICE
US16/829,884 US11317338B2 (en) 2017-09-28 2020-03-25 Access control method and apparatus

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/104126 WO2019061204A1 (zh) 2017-09-28 2017-09-28 接入控制方法和装置

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US16/829,884 Continuation US11317338B2 (en) 2017-09-28 2020-03-25 Access control method and apparatus

Publications (1)

Publication Number Publication Date
WO2019061204A1 true WO2019061204A1 (zh) 2019-04-04

Family

ID=65902529

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/104126 WO2019061204A1 (zh) 2017-09-28 2017-09-28 接入控制方法和装置

Country Status (4)

Country Link
US (1) US11317338B2 (zh)
EP (1) EP3678420A4 (zh)
CN (1) CN111066346B (zh)
WO (1) WO2019061204A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP4145909A4 (en) * 2020-05-19 2023-10-18 Huawei Technologies Co., Ltd. COMMUNICATION METHOD AND COMMUNICATION DEVICE

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114071646B (zh) * 2020-07-31 2023-04-07 维沃移动通信有限公司 接入控制方法、装置、终端及网络设备
EP4221351A4 (en) * 2020-09-29 2023-11-01 Guangdong Oppo Mobile Telecommunications Corp., Ltd. WIRELESS COMMUNICATION METHOD, TERMINAL DEVICE AND NETWORK DEVICE
CN112969177B (zh) * 2021-01-29 2023-03-14 展讯半导体(南京)有限公司 终端接入方法及装置、存储介质、接入点、核心网、终端

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102469549A (zh) * 2010-11-18 2012-05-23 中兴通讯股份有限公司 一种网络接入方法和系统
CN104378730A (zh) * 2014-11-06 2015-02-25 中国电子科技集团公司第二十八研究所 一种m2m业务在蜂窝无线通信系统中的接入系统
CN104581757A (zh) * 2013-10-18 2015-04-29 中兴通讯股份有限公司 一种m2m网络中的m2m终端主动切换方法及装置
WO2016163745A1 (ko) * 2015-04-06 2016-10-13 엘지전자 주식회사 무선 통신 시스템에서 릴레이의 선택 및 릴레이를 통한 신호 송수신 방법 및 이를 위한 장치

Family Cites Families (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090047931A1 (en) * 2007-08-17 2009-02-19 Qualcomm Incorporated Method and apparatus for wireless access control
CN102045810B (zh) * 2009-10-09 2014-01-08 华为技术有限公司 机器类型通讯终端设备接入网络的方法、装置和系统
US8837443B2 (en) * 2010-08-13 2014-09-16 Sharp Kabushiki Kaisha Reducing congestion in wireless communication networks
GB2491098B (en) * 2011-05-16 2015-05-20 Intel Corp Accessing a base station
US9326311B2 (en) * 2013-12-13 2016-04-26 Blackberry Limited Managing connection retries due to access class barring
KR102155754B1 (ko) * 2014-02-10 2020-09-14 삼성전자 주식회사 단말 능력 및 가입자 정보에 따른 네트워크 접속 제어 방법 및 그 장치
EP3120639B1 (en) * 2014-03-21 2018-09-26 Sony Corporation D2d scheduling based on priorities
CN106797596B (zh) * 2014-11-17 2019-12-06 华为技术有限公司 一种接入控制方法、装置和网络设备
EP3094137B1 (en) 2015-05-11 2019-01-02 HTC Corporation Device for handling system information
CN106330843B (zh) * 2015-07-02 2020-01-14 株式会社理光 用于区域受限访问的系统和方法
US9913181B1 (en) * 2015-08-26 2018-03-06 Sprint Spectrum L.P. Reference signal power variation to indicate load information
US10390291B2 (en) * 2016-08-17 2019-08-20 Telefonaktiebolaget Lm Ericsson (Publ) Risk aware validity assessment of system information
CN106255112B (zh) * 2016-08-19 2020-02-11 杭州迪普科技股份有限公司 无线局域网接入方法及装置
CN106792983B (zh) * 2017-01-03 2019-11-12 北京邮电大学 一种接入控制方法及系统
CN107105482A (zh) * 2017-06-06 2017-08-29 深圳市乃斯网络科技有限公司 终端wifi接入控制方法及系统
CN109151836A (zh) * 2017-06-19 2019-01-04 中国移动通信有限公司研究院 一种接入方法、网络设备及移动通信终端

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102469549A (zh) * 2010-11-18 2012-05-23 中兴通讯股份有限公司 一种网络接入方法和系统
CN104581757A (zh) * 2013-10-18 2015-04-29 中兴通讯股份有限公司 一种m2m网络中的m2m终端主动切换方法及装置
CN104378730A (zh) * 2014-11-06 2015-02-25 中国电子科技集团公司第二十八研究所 一种m2m业务在蜂窝无线通信系统中的接入系统
WO2016163745A1 (ko) * 2015-04-06 2016-10-13 엘지전자 주식회사 무선 통신 시스템에서 릴레이의 선택 및 릴레이를 통한 신호 송수신 방법 및 이를 위한 장치

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP3678420A4 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP4145909A4 (en) * 2020-05-19 2023-10-18 Huawei Technologies Co., Ltd. COMMUNICATION METHOD AND COMMUNICATION DEVICE

Also Published As

Publication number Publication date
CN111066346A (zh) 2020-04-24
US11317338B2 (en) 2022-04-26
EP3678420A1 (en) 2020-07-08
EP3678420A4 (en) 2020-09-16
US20200229070A1 (en) 2020-07-16
CN111066346B (zh) 2022-03-29

Similar Documents

Publication Publication Date Title
CN112602356B (zh) 用于在功率节省模式下进行信令传递的装置和方法
EP3358777B1 (en) Method, base station, terminal and system for transmitting system information
US10674380B2 (en) On-demand system information for wireless terminal in connected state
US20180092027A1 (en) Providing and obtaining system information for remote wireless terminal
CN107027095B (zh) 机器对机器(m2m)终端、基站和方法
US10939410B2 (en) Communication method, user equipment, and network device
US11317338B2 (en) Access control method and apparatus
US10165624B2 (en) Method and system for operating coverage-limited devices
US9832715B2 (en) Network-controlled network selection procedure
CN110431909B (zh) 用于移动电信系统的设备和方法
KR20210114985A (ko) 패킷 웨이크업 신호의 송신 방법 및 장치
KR20150050496A (ko) 이동성 상태 추정(mse)또는 이동성 이력 정보의 보고
EP3937543A1 (en) Tracking area code transmission in non-terrestrial networks
US20230388904A1 (en) Communications devices, infrastructure equipment and methods
US11290945B2 (en) Methods, apparatus and systems for indicating a configuration of access control information in a wireless communication
WO2022077796A1 (zh) 一种通信方法及装置
WO2019041261A1 (zh) 一种通信方法及设备
CN114828152A (zh) 系统信息更新方法与装置、中继设备、终端及存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17927016

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 2017927016

Country of ref document: EP

Effective date: 20200331