WO2019205893A1 - 控制方法、网络设备和终端 - Google Patents

控制方法、网络设备和终端 Download PDF

Info

Publication number
WO2019205893A1
WO2019205893A1 PCT/CN2019/080773 CN2019080773W WO2019205893A1 WO 2019205893 A1 WO2019205893 A1 WO 2019205893A1 CN 2019080773 W CN2019080773 W CN 2019080773W WO 2019205893 A1 WO2019205893 A1 WO 2019205893A1
Authority
WO
WIPO (PCT)
Prior art keywords
limit
random access
access request
sending
terminal
Prior art date
Application number
PCT/CN2019/080773
Other languages
English (en)
French (fr)
Inventor
李男
丁海煜
黄宇红
Original Assignee
中国移动通信有限公司研究院
中国移动通信集团有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中国移动通信有限公司研究院, 中国移动通信集团有限公司 filed Critical 中国移动通信有限公司研究院
Priority to US17/050,232 priority Critical patent/US11805553B2/en
Publication of WO2019205893A1 publication Critical patent/WO2019205893A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/0205Traffic management, e.g. flow control or congestion control at the air interface
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/0247Traffic management, e.g. flow control or congestion control based on conditions of the access network or the infrastructure network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/0289Congestion control
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/16Central resource management; Negotiation of resources or communication parameters, e.g. negotiating bandwidth or QoS [Quality of Service]
    • H04W28/24Negotiating SLA [Service Level Agreement]; Negotiating QoS [Quality of Service]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA
    • H04W74/0833Random access procedures, e.g. with 4-step access

Definitions

  • the present disclosure relates to the field of communication technologies, and in particular to a control method, a network device, and a terminal.
  • the mobile communication technology represented by 4G has driven the rapid development of the mobile Internet, bringing the communication of people to an unprecedented height.
  • 5G will develop from the "Internet of everybody" to the Internet of Things era of "connected people” and “interconnected objects” with more imaginative space.
  • IoT applications Due to the demand for ultra-long-range coverage of IoT applications, operators typically use low-band frequencies such as 800MHz/900MHz to provide IoT services, which have very limited bandwidth. Therefore, in the era of 5G Internet of Things in the future, in certain business scenarios, such as remote meter reading and reporting data, sharing bicycles in the hot spots such as subway stations to update location information, a large number of IoT terminals will be randomly selected to initiate random access. The incoming request causes congestion of the cell random access resources.
  • the present disclosure provides a control method, a network device, and a terminal, which are used to solve the problem that a terminal randomly initiates a random access request and causes a cell random access resource to be congested in the related art.
  • an embodiment of the present disclosure provides the following solution:
  • a control method comprising:
  • the first limit is: a preset hexadecimal value of the preset number of bits.
  • the value of the first limit value is directly represented by a preset hexadecimal value of the preset number of bits; or the value of the first limit value is jointly represented by a coefficient and an index, where the coefficient is a preset hexadecimal value of at least one of the preset number of bits, the index being represented by a preset hexadecimal value of the remaining digits of the preset number of bits; or, the first limit is taken
  • the value consists of a first part represented by at least one bit 0 and a second part represented by a predetermined hexadecimal value of the remaining number of bits in the preset number of bits.
  • the step of sending the first limit includes: transmitting a corresponding first limit according to the access type, the terminal protocol version, the category, the QoS requirement, the access request type, the terminal brand, and/or the terminal model.
  • the control method further includes: sending an algorithm identifier, where the algorithm corresponding to the algorithm identifier is a target algorithm used by the terminal to calculate the second limit.
  • the first limit value and/or the algorithm identifier is dynamically configured or periodically configured.
  • the first limit value and/or the algorithm identifier are configured according to a load of the network device.
  • the first limit value and/or the algorithm identifier is configured according to a number of random access requests received within the first time window or a predicted value according to the number of random access requests accessed within the second time window.
  • the first limit is configured according to a load of the network device, including:
  • the first limit is lowered by at least one adjustment step; or, when the load of the network device is less than the second threshold, the first A limit value is raised by at least one adjustment step.
  • the algorithm identifier is configured according to a load of the network device, including:
  • the first limit is configured according to the number of random access requests received in the first time window or the predicted value of the number of random access requests accessed in the second time window, including:
  • the first limit is increased by at least one adjustment step; or, the number of random access requests received within the first time window is greater than a seventh threshold or the number of random access requests received within the second time window.
  • the first limit is lowered by at least one adjustment step.
  • the algorithm identifier is configured according to the number of random access requests received in the first time window or the predicted value according to the number of random access requests accessed in the second time window, including:
  • the control method further includes: receiving, by the terminal, a random access request carrying a second limit, or a random access request and a second limit.
  • the second limit is obtained by the terminal calculating the terminal identifier and/or the first information according to the target algorithm or the preset algorithm corresponding to the algorithm identifier.
  • the first information includes: a first field and/or a second field
  • the second limit is obtained by the terminal calculating, according to the target algorithm or the preset algorithm corresponding to the algorithm identifier, the terminal identifier and/or the first field and/or the second field of the first information.
  • first field or the second field is: a fixed length or a variable length field
  • the second field is a padding value of a preset hexadecimal.
  • the first field includes: algorithm identification information used when determining the second limit, time domain resource information for sending a random access request, time domain resource number for sending a random access request, and frequency of sending a random access request. At least one of domain resource information, a frequency domain resource number for transmitting a random access request, preamble information for transmitting a random access request, a preamble number for transmitting a random access request, and a network identifier.
  • the random access request carrying the second limit, or the random access request and the second limit are sent if the second limit is less than or equal to the first limit; or And the random access request carrying the second limit, or the random access request and the second limit are sent if the second limit is greater than or equal to the first limit.
  • the control method further includes: when the second limit is less than or equal to the first limit, sending a random access response to the terminal; or, when the second limit is greater than or equal to the first limit At the time of the value, a random access response is sent to the terminal.
  • the second access value is included in the random access response.
  • the control method further includes: receiving the terminal identifier and/or the second information sent by the terminal; the second information includes: a first field and/or a second field; and the first field includes: determining the second limit The algorithm identification information used, the time domain resource information for sending the random access request, the time domain resource number for sending the random access request, the frequency domain resource information for sending the random access request, and the frequency domain resource number for sending the random access request, Sending at least one of preamble information of the random access request, a preamble number for sending the random access request, and a network identifier; the second field includes: a padding value of the preset hexadecimal value used when determining the second limit value .
  • the control method further includes: using the algorithm to identify a corresponding target algorithm or a preset algorithm to calculate the terminal identifier and/or the second information, to obtain a third limit;
  • the target algorithm or the preset algorithm corresponding to the algorithm identifier includes one of a one-way function algorithm, a hash function algorithm, and an elliptic function algorithm.
  • the control method further includes: when the second limit value is equal to the third limit value, sending a connection establishment complete message or sending a random access request success message to the terminal; or, the third limit value is less than the Sending a connection establishment complete message or sending a random access request success message to the terminal when the first limit is reached; or
  • the control method further includes: when the second limit is greater than the first limit, sending a connection establishment complete message or sending a random access request success message to the terminal; or, when the second limit is greater than Or equal to the first limit, and when the third limit is equal to the second limit, send a connection establishment complete message or send a random access request success message to the terminal.
  • the control method further includes: when the second limit value and the third limit value are not equal, sending a connection establishment failure message or sending a random access request failure message to the terminal; or, in the second limit Sending a connection establishment failure message or sending a random access request failure message to the terminal when the value is greater than or equal to the first limit; or, the second limit is equal to the third limit, and the second When the limit value is greater than or equal to the first limit value, the connection establishment failure message or the random access request failure message is sent to the terminal.
  • the control method further includes: when the second limit is less than or equal to the first limit, sending a connection establishment failure message or sending a random access request failure message; or, at the second limit is equal to And a third connection value, and when the second limit is less than or equal to the first limit, sending a connection establishment failure message or sending a random access request failure message.
  • An embodiment of the present disclosure further provides a control method, including:
  • the first limit is used for at least one of load control, congestion control, and access control.
  • the first limit is: a preset hexadecimal value of the preset number of bits.
  • the value of the first limit value is directly represented by a preset hexadecimal value of the preset number of bits; or the value of the first limit value is jointly represented by a coefficient and an index, where the coefficient is a preset hexadecimal value of at least one of the preset number of bits, the index being represented by a preset hexadecimal value of the remaining digits of the preset number of bits; or, the first limit is taken
  • the value consists of a first part represented by at least one bit 0 and a second part represented by a predetermined hexadecimal value of the remaining number of bits in the preset number of bits.
  • the control method further includes: receiving an algorithm identifier.
  • the control method further includes: calculating, according to the target algorithm or the preset algorithm, the terminal identifier and/or the first information, to obtain a second limit.
  • the first information includes: a first field and/or a second field
  • the second limit is obtained by the terminal calculating, according to the target algorithm or the preset algorithm corresponding to the algorithm identifier, the terminal identifier and/or the first field and/or the second field of the first information.
  • first field or the second field is: a fixed length or a variable length field
  • the second field is a padding value of a preset hexadecimal.
  • the first field includes: algorithm identification information used when determining the second limit, time domain resource information for sending a random access request, time domain resource number for sending a random access request, and frequency of sending a random access request. At least one of domain resource information, a frequency domain resource number for transmitting a random access request, preamble information for transmitting a random access request, a preamble number for transmitting a random access request, and a network identifier.
  • the control method further includes: when the second limit is less than or equal to the first limit, sending a random access request carrying the second limit, or sending a random access request and the second limit Or, when the second limit is greater than or equal to the first limit, send a random access request carrying the second limit, or send a random access request and the second limit.
  • the control method further includes: receiving a random access response
  • the random access response is: the network device sends a random access response to the terminal when the second limit is less than or equal to the first limit; or, when the second limit is greater than or equal to the The first limit is sent to the terminal.
  • the second access value is included in the random access response.
  • the control method further includes: transmitting a terminal identifier and/or second information; the second information includes: a first field and/or a second field; and the first field includes: used when determining the second limit Algorithm identification information, time domain resource information for sending a random access request, time domain resource number for sending a random access request, frequency domain resource information for transmitting a random access request, frequency domain resource number for transmitting a random access request, and random transmission At least one of the preamble information of the access request, the preamble number of the random access request, and the network identifier; the second field includes: a padding value of the preset hexadecimal value used when determining the second limit.
  • the control method further includes: receiving a connection establishment complete message or sending a random access request success message;
  • connection establishment completion message or the sending random access request success message is sent by the network device when the second limit value is equal to the third limit value; or, the third limit value is smaller than the first limit value Transmitted; or, when the second limit is less than or equal to the first limit, and the third limit is equal to the second limit.
  • the control method further includes: receiving a connection establishment complete message or sending a random access request success message;
  • connection establishment completion message or the sending random access request success message is sent by the network device when the second limit is greater than the first limit; or, when the second limit is greater than or equal to the first A limit value that is sent when the third limit value is equal to the second limit value.
  • the control method further includes: receiving a connection establishment failure message or sending a random access request failure message;
  • connection establishment failure message or the sending random access request failure message is sent by the network device when the second limit value and the third limit value are not equal; or, when the second limit value is greater than or equal to the Transmitted when the first limit is stated; or when the second limit is equal to the third limit, and the second limit is greater than or equal to the first limit.
  • the control method further includes: receiving a connection establishment failure message or sending a random access request failure message;
  • connection establishment failure message or the sending random access request failure message is sent by the network device when the second limit is less than or equal to the first limit; or, the second limit is equal to the third limit A value that is sent when the second limit is less than or equal to the first limit.
  • An embodiment of the present disclosure further provides a network device, including:
  • the transceiver is configured to send a first limit, where the first limit is used for at least one of load control, congestion control, and access control.
  • the transceiver is further configured to: send an algorithm identifier, where the algorithm corresponding to the algorithm is a target algorithm used by the terminal to calculate the second limit.
  • the transceiver is further configured to: receive, by the terminal, a random access request that carries the second limit, or a random access request and a second limit.
  • the transceiver is further configured to: when the second limit is less than or equal to the first limit, send a random access response to the terminal; or
  • the control method further includes: the transceiver is further configured to: receive the terminal identifier and/or the second information sent by the terminal; the second information includes: a first field and/or a second field;
  • the first field includes: algorithm identifier information used when determining the second limit value, time domain resource information for sending a random access request, a time domain resource number for sending a random access request, and a frequency domain resource for sending a random access request. At least one of information, a frequency domain resource number for transmitting a random access request, preamble information for transmitting a random access request, a preamble number for transmitting a random access request, and a network identifier;
  • the second field includes a padding value of a preset hexadecimal value used when determining the second limit value.
  • the network device further includes: a processor, configured to use the algorithm to identify a corresponding target algorithm or a preset algorithm to calculate the terminal identifier and/or the second information, to obtain a third limit;
  • the target algorithm or the preset algorithm corresponding to the algorithm identifier includes one of a one-way function algorithm, a hash function algorithm, and an elliptic function algorithm.
  • the transceiver is further configured to: when the second limit and the third limit are equal, send a connection establishment complete message or a random access request success message to the terminal; or, at the third limit When the first limit is smaller than the first limit, the connection establishment complete message or the random access request success message is sent to the terminal; or, the second limit is less than or equal to the first limit, and the third limit When the value is equal to the second limit, the connection establishment completion message or the random access request success message is sent to the terminal.
  • the transceiver is further configured to: when the second limit is greater than the first limit, send a connection setup complete message or send a random access request success message to the terminal; or, in the second limit When the value is greater than or equal to the first limit, and the third limit is equal to the second limit, the connection establishment complete message or the random access request success message is sent to the terminal.
  • the transceiver is further configured to: when the second limit value and the third limit value are not equal, send a connection establishment failure message or a random access request failure message to the terminal; or, in the foregoing When the second limit value is greater than or equal to the first limit value, sending a connection establishment failure message or sending a random access request failure message to the terminal; or, in the second limit value being equal to the third limit value, When the second limit is greater than or equal to the first limit, the terminal sends a connection establishment failure message or sends a random access request failure message.
  • the transceiver is further configured to: when the second limit is less than or equal to the first limit, send a connection setup failure message or send a random access request failure message; or, in the second limit When the value is equal to the third limit, and the second limit is less than or equal to the first limit, the connection establishment failure message or the random access request failure message is sent.
  • An embodiment of the present disclosure further provides a terminal, including:
  • the transceiver is configured to receive a first limit; the first limit is used for at least one of load control, congestion control, and access control.
  • the transceiver is further configured to: receive an algorithm identifier.
  • the terminal further includes: a processor, configured to calculate, according to the target algorithm or the preset algorithm, the terminal identifier and/or the first information, to obtain a second limit.
  • the transceiver is specifically configured to: when the second limit is less than or equal to the first limit, send a random access request that carries the second limit, or send a random access request and the second The limit value; or, when the second limit is greater than or equal to the first limit, send a random access request carrying the second limit, or send the random access request and the second limit.
  • the transceiver is further configured to: receive a random access response
  • the random access response is: the network device sends a random access response to the terminal when the second limit is less than or equal to the first limit; or, when the second limit is greater than or equal to the The first limit is sent to the terminal.
  • the second access value is included in the random access response.
  • the terminal further includes: a sending terminal identifier and/or second information; the second information includes: a first field and/or a second field;
  • the first field includes: algorithm identifier information used when determining the second limit value, time domain resource information for sending a random access request, a time domain resource number for sending a random access request, and a frequency domain resource for sending a random access request. At least one of information, a frequency domain resource number for transmitting a random access request, preamble information for transmitting a random access request, a preamble number for transmitting a random access request, and a network identifier;
  • the second field includes a padding value of a preset hexadecimal value used when determining the second limit value.
  • the transceiver is further configured to: receive a connection establishment complete message or send a random access request success message;
  • connection establishment completion message or the sending random access request success message is sent by the network device when the second limit value is equal to the third limit value; or, the third limit value is smaller than the first limit value Transmitted; or, when the second limit is less than or equal to the first limit, and the third limit is equal to the second limit.
  • the transceiver is further configured to: receive a connection establishment complete message or send a random access request success message;
  • connection establishment completion message or the sending random access request success message is sent by the network device when the second limit is greater than the first limit; or, when the second limit is greater than or equal to the first A limit value that is sent when the third limit value is equal to the second limit value.
  • the transceiver is further configured to: receive a connection establishment failure message or send a random access request failure message;
  • connection establishment failure message or the sending random access request failure message is sent by the network device when the second limit value and the third limit value are not equal; or, when the second limit value is greater than or equal to the Transmitted when the first limit is stated; or when the second limit is equal to the third limit, and the second limit is greater than or equal to the first limit.
  • the transceiver is further configured to: receive a connection establishment failure message or send a random access request failure message;
  • connection establishment failure message or the sending random access request failure message is sent by the network device when the second limit is less than or equal to the first limit; or, the second limit is equal to the third limit a value that is sent when the second limit is less than or equal to the first limit.
  • An embodiment of the present disclosure further provides a control method, including:
  • the network device sends a first limit, where the first limit is used for at least one of load control, congestion control, and access control;
  • the terminal determines a second limit, and when the second limit is less than or equal to the first limit, sends a random access request carrying the second limit to the network device, or a random access request and a second limit a value; or, when the second limit is greater than or equal to the first limit, sending, to the network device, a random access request carrying the second limit, or a random access request and a second limit;
  • the network device sends a random access response when the second limit is less than or equal to the first limit, or sends a random access when the second limit is greater than or equal to the first limit response.
  • the control method further includes: the terminal sending the terminal identifier and/or the second information;
  • the network device sends a connection establishment complete message or a random access request success message to the terminal; or sends a connection establishment failure message or a random access request failure message to the terminal.
  • Embodiments of the present disclosure also provide a communication device comprising: a processor, a memory storing a computer program, and when the computer program is executed by the processor, performing the method as described above.
  • Embodiments of the present disclosure also provide a computer readable storage medium comprising instructions that, when executed by a computer, cause a computer to perform the method as described above.
  • the foregoing solution of the present disclosure by transmitting a first limit for load control, congestion control, or random access to a terminal, enables the terminal to perform random access according to the first limit; and avoiding the terminal from initiating a random access request.
  • the resulting random access resources of the cell are congested.
  • FIG. 1 is a flowchart of a method for controlling a network device side according to an embodiment of the present disclosure
  • FIG. 2 is another flowchart of a method for controlling a network device side according to an embodiment of the present disclosure
  • FIG. 3 is a flowchart of a method for controlling a terminal side according to an embodiment of the present disclosure
  • FIG. 4 is a schematic structural diagram of a network device according to the present disclosure.
  • FIG. 5 is a schematic structural diagram of a terminal according to the present disclosure.
  • FIG. 6 is a schematic structural diagram of a communication device according to the present disclosure.
  • the embodiments of the present disclosure are directed to the problem of initiating a random access request in a large number of IoT terminals in the related art, causing congestion of the cell random access resources, and proposing a control method, a network device, and a terminal. It is possible to avoid cell random access resource congestion caused by the terminal initiating a random access request.
  • a first embodiment of the present disclosure provides a control method, which is applied to a network device, and includes:
  • Sending a first limit specifically, the network device sends a first limit to the terminal, where the first limit is used for at least one of load control, congestion control, and access control, where the access control may be a terminal Control of random access networks.
  • the network device configures the first limit, and sends the first limit to the terminal.
  • the first limit may be sent to the sending terminal in a broadcast manner.
  • the first limit here may specifically be a preset hexadecimal value of a preset number of bits.
  • the first limit value is represented by an 8-digit hexadecimal number, and the value is 0x1903a30b; or the first limit value is represented by an 11-digit decimal number, and the value is 10000293940; or, the first limit value is 5 Characterized by a bit binary number, the value is 00100.
  • the value of the first limit value may be directly represented by a preset hexadecimal value of the preset number of bits.
  • the first limit value may be directly characterized by an 8-bit hexadecimal number 0x1903a30b, first The value corresponding to the limit value is 0x1903a30b; or the value of the first limit value may also be jointly represented by a coefficient and an index, the coefficient being a predetermined hexadecimal of at least one of the preset number of bits.
  • the numerical value indicates that the index is represented by a preset hexadecimal value of the remaining digits in the preset number of bits; for example, the first limit is represented by an 8-digit hexadecimal number, and the first two hexadecimal digits The number is used to represent the index of the first limit value corresponding to the value, and the last 6 hexadecimal number is used to represent the coefficient corresponding to the first limit value. Assuming the first limit value is 0x1903a30b, the first two hexadecimal numbers 0x19 is the exponent, and the last 6 hexadecimal digits 0x03a30b are coefficients.
  • the value of the first limit value may be composed of a first part and a second part, the first part being represented by at least one bit 0, and the second part being represented by the remaining number of bits in the preset number of bits
  • the default hexadecimal value is indicated.
  • the first part of the first limit is 0000000, which is used to characterize the difficulty factor
  • the second part is 11101, which is used to characterize the limit. If the control access principle is to allow the terminal to initiate an access request when the second limit is less than or equal to the first limit, the network device may increase the access difficulty by increasing the number of bits in the first part 0, or may reduce the access difficulty.
  • the number of bits of 0 is used to reduce the access difficulty; if the control access principle is to allow the terminal to initiate an access request when the second limit is greater than or equal to the first limit, the network device can reduce the number of bits in the first part 0. To improve access difficulty, you can also reduce the access difficulty by increasing the number of bits in the first part.
  • the sending, by the network device, the first limit to the terminal may include: according to an access type, a protocol version, a category, a QoS requirement, an access request type (such as a contention access request, a non-contention access request) of the terminal,
  • the terminal brand and/or the terminal model sends a corresponding first limit to the terminal.
  • the network device may configure different first limit values for different access service types, different protocol versions of the terminal, different terminal categories, different QoS requirements, contention access requests, non-contention access requests, and/or brand configuration of the terminal.
  • the network device sends a first limit sequence for random access control, and each value in the sequence corresponds to a specific access type (by configuring different first limit values for different access service types, multiple service categories can be implemented.
  • the access priority control for example, can preferentially guarantee the voice service access); or the network device configures different first limits for the Release 15 version terminal and the Release 16 version terminal (the new version terminal has strong computing power and can pass Set different first limits to ensure the fairness of different versions of terminal access).
  • the network device can also configure different first limits by combining various conditions to implement effective access control in complex situations in an actual network.
  • the network device may configure the first limit of the voice service of the non-contention access request type to be 0001111.
  • the access probability is 16/128, which is approximately equal to 12.5%.
  • the first limit of the data service configuration for the non-contention access request type is 0001000 (the access probability is 9/128, which is approximately equal to 7%).
  • the first limit of the voice service configuration of the incoming request type is 0000100 (the access probability is 5/128, which is approximately equal to 4%), and the first limit of the data service for the contention request type is 0000010 (the access probability is 3). /128, approximately equal to 2.3%).
  • a second embodiment of the present disclosure provides a control method, which is applied to a network device, and includes:
  • Step 11 Send the first limit, where the first limit is sent to the terminal, where the first limit is used for at least one of load control, congestion control, and access control, where the access control may be Control of the terminal random access network;
  • Step 12 Send an algorithm identifier, where the algorithm identifier is sent to the terminal, where the algorithm identifier is used to identify a target algorithm, and the terminal uses the target algorithm to calculate a second limit.
  • the network device sends the first limit value and an algorithm identifier, and the terminal uses the algorithm of the algorithm identifier indication to obtain a value for initiating random access control, hereinafter referred to as a second limit value;
  • the algorithm herein may include One-way function algorithms or hash function algorithms or elliptic function algorithms, but are not limited to these function algorithms.
  • Each value of the algorithm identifier corresponds to a specific algorithm.
  • the algorithm identifier 1 corresponds to the hash SHA256 algorithm
  • the algorithm identifier 2 corresponds to the scrypt algorithm
  • the algorithm identifier 3 corresponds to the hash blake algorithm, where the algorithm is a one-way function.
  • the network side device and the terminal may also agree on an algorithm.
  • the network side device only needs to send the first limit of the random access request, as described in the foregoing first embodiment.
  • the cell terminal covered by the network device cannot access the network; otherwise, when the calculation difficulty corresponding to the first limit is particularly small, a large number of terminals of the cell covered by the network device are initiated.
  • the incoming request causes congestion. Therefore, the first limit is required to support periodic configuration or dynamic configuration, and the matching with the network load is implemented to achieve effective control of congestion.
  • the first limit and/or the algorithm identifier are periodically configured or dynamically configured by the network device.
  • the first limit value and/or the algorithm identifier may be configured, where the network device dynamically configures the first limit value and/or the algorithm identifier according to a load condition; or the network device is configured according to the first
  • the first limit and/or the algorithm identifier are configured by the number of random access requests received within a time window or based on predicted values of the number of access random access requests within the second time window.
  • the network side device may configure the first limit value according to a load value (the load value may include a random access resource load value or a control channel resource load value or a shared data channel resource load value) to implement computation complexity on the terminal. (or difficulty) regulation, in turn to achieve control over the number of accessible terminals in the time window.
  • a load value may include a random access resource load value or a control channel resource load value or a shared data channel resource load value
  • the configuring, by the network device, the first limit according to the load may specifically include:
  • the first limit value is lowered by at least one adjustment a step (for example, adjusting the first limit value from 0001000 to 0000100), optionally, the first limit value may be lowered by at least one adjustment step at an effective time of the adjustment period; or
  • the first limit value is raised by at least one adjustment step ( For example, the first limit value is adjusted from 0000100 to 0001000); alternatively, the first limit value may be increased by at least one adjustment step at the effective time of the adjustment period.
  • control access principle is that the second limit is greater than or equal to the first limit, the method is similar, but the adjustment direction is reversed and will not be described again.
  • the configuring, by the network device, the algorithm identifier according to the load condition may include:
  • the algorithm identifier is changed (for example, SHA256 becomes SHA1, and the difficulty is lowered).
  • the algorithm identifier may be changed when the network device is in effect at an adjustment period.
  • the network device configures the first limit according to the number of random access requests received in the first time window or according to the predicted value of the number of access random access requests in the second time window. Specifically, it may include:
  • the first limit value is increased by at least one adjustment step (for example, the first limit value is adjusted from 0000100 to 0001000); optionally, when the network device is in effect at the time of the adjustment period, The first limit is increased by at least one adjustment step; or
  • the number of random access requests received by the network device in the first time window is greater than a seventh threshold or the predicted value of the number of access random access requests in the second time window is greater than an eighth threshold
  • the first limit value is lowered by at least one adjustment step (for example, the first limit value is adjusted from 0001000 to 0000100), and optionally, when the network device is in effect at the time of the adjustment period, The first limit is lowered by at least one adjustment step.
  • the network device configures the algorithm identifier according to the number of random access requests received in the first time window or the predicted value of the number of access random access requests in the second time window.
  • the number of random access requests received by the network device in the first time window is less than a ninth threshold or the predicted value of the number of access random access requests in the second time window is less than a tenth threshold. Change the algorithm ID when the value (that is, when the difficulty adjustment is started when the set time interval unit is reached); or
  • the number of random access requests received by the network device in the first time window is greater than the eleventh threshold or the predicted value of the number of access random access requests in the second time window is greater than the twelfth Change the algorithm ID when the threshold is exceeded.
  • the algorithm identifier may be changed when the network device is in effect at an adjustment period.
  • the network side device when the load value of the network side device is less than the thirteenth threshold, the network side device does not broadcast the first limit value and/or the algorithm identifier.
  • the first to thirteenth threshold values may or may not be equal.
  • a third embodiment of the present disclosure provides a control method, which is applied to a network device, and includes:
  • Step 21 Send a first limit, specifically, sending a first limit to the terminal, where the first limit is used for at least one of load control, congestion control, and access control, and the access control is a terminal random Access network control;
  • Step 22 Send an algorithm identifier.
  • the algorithm may send an algorithm identifier to the terminal, where the algorithm identifier is used to identify a target algorithm, and the terminal uses the target algorithm to calculate a second limit.
  • Step 23 Receive a random access request that is sent by the terminal and that carries the second limit, or receive a random access request and a second limit that are sent by the terminal.
  • the second limit is obtained by the terminal calculating the terminal identifier and/or the first information according to the target algorithm or a preset algorithm.
  • the first information herein may include: a first field and a second field; where the first field is a fixed length or a variable length field, and the second field may also be a fixed length or a variable length field.
  • the second field can be a padding value of the default hexadecimal.
  • the first field here includes: algorithm identification information used when determining the second limit value, time domain resource information for sending a random access request, number of a time domain resource for sending a random access request, and a frequency domain for sending a random access request. At least one of resource information, a number of a frequency domain resource for transmitting a random access request, preamble information for transmitting a random access request, a preamble number for transmitting a random access request, and a network identifier.
  • the terminal identifier includes an International Mobile Subscriber Identification Number (IMSI) or an International Mobile Equipment Identity (IMEI) or a temporary subscriber identification number TMSI or S-TMSI, etc.; Including network cell ID, Global cell ID, PLMN, and so on.
  • the terminal uses the algorithm corresponding to the algorithm identifier (such as SHA256) to calculate the input preset first information, and when the second field is a variable value, the first limit is calculated by changing the length and/or content of the second field.
  • the HA256 function operation can convert input data of different lengths into values of 256 bits in length.
  • the algorithm may be used to calculate a corresponding algorithm or a preset algorithm to calculate a terminal identifier, to obtain a second limit, or to calculate a first field and a terminal identifier of the input preset first information, to obtain a second limit. Or calculating the second field and the terminal identifier of the input preset first information, obtaining a second limit, or calculating the first field, the second field, and the terminal identifier of the input preset first information, to obtain Second limit.
  • the preset algorithm here may be an algorithm stipulated by a protocol or the like.
  • the random access request carrying the second limit, or the random access request and the second limit are initiated by the terminal if the second limit is less than or equal to the first limit. Or, initiated if the second limit is greater than or equal to the first limit.
  • the terminal identifies the corresponding algorithm by using an algorithm, and obtains different second limits by changing the content of the second field.
  • control method may further include the step 24, specifically:
  • the random access response may further include a second limit.
  • the random access response may further include a second limit.
  • control method may further include:
  • Step 25 Receive a terminal identifier and/or second information sent by the terminal, where the second information includes: a first field and/or a second field;
  • the first field includes: algorithm identifier information used when determining the second limit value, time domain resource information for sending a random access request, a time domain resource number for sending a random access request, and a frequency domain resource for sending a random access request. At least one of information, a frequency domain resource number for transmitting a random access request, preamble information for transmitting a random access request, a preamble number for transmitting a random access request, and a network identifier;
  • the second field includes a padding value of a preset hexadecimal value used when determining the second limit value.
  • the second information here may be a subset of the first information described above, and may of course be the same as the first information described above.
  • control method may further include:
  • Step 26 The algorithm is used to identify a corresponding target algorithm or a preset algorithm to calculate the terminal identifier and/or the second information, to obtain a third limit.
  • the target algorithm or the preset algorithm corresponding to the algorithm identifier includes one of a one-way function algorithm, a hash function algorithm, and an elliptic function algorithm.
  • control method may further include the step 27, specifically:
  • Step 271) when the second limit value is equal to the third limit value, send a connection establishment complete message or send a random access request success message to the terminal; or
  • Step 272 when the third limit is smaller than the first limit, send a connection establishment complete message or send a random access request success message to the terminal;
  • Step 273 when the second limit is less than or equal to the first limit, and the third limit is equal to the second limit, send a connection establishment complete message to the terminal or send random access. Request a success message; or,
  • Step 274) when the second limit is greater than the first limit, send a connection establishment complete message or send a random access request success message to the terminal;
  • Step 275 when the second limit is greater than or equal to the first limit, and the third limit is equal to the second limit, send a connection setup complete message to the terminal or send random access. Request a success message; or,
  • Step 276) when the second limit value and the third limit value are not equal, send a connection establishment failure message or a random access request failure message to the terminal; or
  • Step 277) when the second limit is greater than or equal to the first limit, sending a connection establishment failure message or sending a random access request failure message to the terminal; or
  • Step 278) when the second limit is equal to the third limit, and the second limit is greater than or equal to the first limit, send a connection establishment failure message or send a random access request to the terminal. Failure message; or,
  • Step 279) when the second limit is less than or equal to the first limit, sending a connection establishment failure message or sending a random access request failure message;
  • Step 280 when the second limit is equal to the third limit, and the second limit is less than or equal to the first limit, send a connection establishment failure message or send a random access request failure message.
  • the situation described in the above step 241) may be combined with any one of the steps 271), 272), 273), 276), 279), 280); the situation described in the above step 242 may be combined with the step 271) Combination of any of 272), 274), 275), 276), 277), and 278).
  • the terminal may perform the calculation according to the second field of the first information, and when the second limit is obtained, the network device also adopts the target algorithm.
  • the second field is calculated to obtain a third limit, and the random access procedure of the terminal is authenticated according to the third limit and the second limit. It can be checked at one time whether it is the value generated by the algorithm, which can effectively avoid the terminal adopting the pseudo-random method to deceive the network to obtain the preferential random access fraud.
  • the above method is realized based on the characteristics that the output value of the algorithm such as the one-way function, the hash function and the elliptic function is completely random relationship with the input value.
  • the terminal knows the limit of the allowed access sent by the network, the corresponding answer cannot be obtained by the pseudo-random method, and the network device provides through the terminal.
  • the validity of the limit can be verified by calculating all or part of the input parameters in the first information of the limit.
  • the part of the information for calculating the limit such as the time domain, the frequency domain, and/or the code domain resource used for transmitting the random access request, is determined by the network device according to the received random access request, the terminal reports the school.
  • the first information of the service only needs to contain other input information and values in addition to the above information.
  • the network device can effectively control access policies of different services, different versions of terminals, and different network loads by adjusting or configuring the first limit, and the applicable scenario is rich;
  • the network device sends the algorithm identifier, and the terminal uses the algorithm to identify the corresponding algorithm, and calculates the content or length of the second field to obtain a second limit that satisfies the access condition, and initiates a random access request, so that the terminal can enable the terminal to Access, no congestion will occur.
  • the method described in the foregoing embodiment of the present disclosure has a small protocol flow change and a signaling overhead, and is highly available.
  • a fourth embodiment of the present disclosure provides a control method, which is applied to a terminal, and includes:
  • Step 31 Receive a first limit. Specifically, the first limit is received from the network device, where the first limit is used for at least one of load control, congestion control, and access control, and the access control may be Is the control of the terminal random access network;
  • the first limit is: a preset hexadecimal value of a preset number of bits. For example, an 8-digit hexadecimal value.
  • the value of the first limit value is directly represented by a preset hexadecimal value of the preset number of bits; or the value of the first limit value is jointly represented by a coefficient and an index, wherein the coefficient is determined by the a preset hexadecimal value of at least one of the preset number of bits, the index being represented by a preset hexadecimal value of the remaining number of bits in the preset number of bits; or the value of the first limit is determined by
  • the first part is composed of a second part, the first part is represented by at least one bit 0, and the second part is represented by a preset hexadecimal value of the remaining number of bits in the preset number of bits.
  • the first limit here has the same meaning as the first limit described in the above first, second and third embodiments, and all the definitions of the first limit in the above embodiments are applicable to this embodiment.
  • control method may further include:
  • Step 32 Receive an algorithm identifier from the network device, where the algorithm identifier is used to identify a target algorithm.
  • Step 33 Calculate the first information according to the target algorithm or a preset algorithm to obtain a second limit.
  • the second information includes: a first field and/or a second field; specifically, calculating a first field and/or a second field of the second information according to the target algorithm or a preset algorithm to obtain a second limit value.
  • the first field or the second field herein is a fixed length or a variable length field.
  • the second field here may be a fixed length or a variable length of a preset hexadecimal padding value.
  • the first field herein includes: algorithm identification information used when determining the second limit value, time domain resource information for sending a random access request, time domain resource number for sending a random access request, and frequency of sending a random access request. At least one of domain resource information, a frequency domain resource number for transmitting a random access request, preamble information for transmitting a random access request, a preamble number for transmitting a random access request, and a network identifier.
  • the method may further include:
  • Step 34 When the second limit is less than or equal to the first limit, send a random access request carrying the second limit to the network device, or send a random access request and a second limit.
  • the method may further include: Step 35, receiving a random access response.
  • the random access response is: the network device sends a random access response to the terminal when the second limit is less than or equal to the first limit; or, when the second limit is greater than or equal to the The first limit is sent to the terminal.
  • the second access value is included in the random access response.
  • control method may further include:
  • Step 36 Send a terminal identifier and/or second information, where the second information includes: a first field and/or a second field;
  • the first field includes: algorithm identifier information used when determining the second limit value, time domain resource information for sending a random access request, a time domain resource number for sending a random access request, and a frequency domain resource for sending a random access request. At least one of information, a frequency domain resource number for transmitting a random access request, preamble information for transmitting a random access request, a preamble number for transmitting a random access request, and a network identifier;
  • the second field includes a padding value of a preset hexadecimal value used when determining the second limit value.
  • control method may further include:
  • Step 37 Receive a connection establishment complete message or send a random access request success message; or receive a connection establishment failure message or send a random access request failure message;
  • connection establishment completion message or the sending random access request success message is sent by the network device when the second limit value is equal to the third limit value; or, the third limit value is smaller than the first limit value Transmitted; or, when the second limit is less than or equal to the first limit, and the third limit is equal to the second limit.
  • connection establishment completion message or the sending random access request success message is sent by the network device when the second limit is greater than the first limit; or, when the second limit is greater than or equal to The first limit value is sent, and the third limit value is equal to the second limit value.
  • connection establishment failure message or the sending random access request failure message is sent by the network device when the second limit value and the third limit value are not equal; or, when the second limit value is greater than or equal to the Transmitted when the first limit is stated; or when the second limit is equal to the third limit, and the second limit is greater than or equal to the first limit.
  • connection establishment failure message or the sending random access request failure message is sent by the network device when the second limit is less than or equal to the first limit; or, the second limit is equal to
  • the third limit value is transmitted when the second limit value is less than or equal to the first limit value.
  • the terminal uses the algorithm to identify the corresponding algorithm, and performs calculation by adjusting the content or length of the second field to obtain a second limit that satisfies the access condition (for example, the second limit is less than the first limit), and A random access request is initiated, which enables the terminal to access without congestion.
  • the network device verifies the second limit carried by the terminal in the random access request, and can check whether the value is in accordance with the algorithm requirement in one time, and can effectively prevent the terminal from adopting a pseudo-random method to deceive the network to obtain the preferential random access fraud. .
  • the method described in the foregoing embodiment of the present disclosure has a small protocol flow change and a signaling overhead, and is highly available.
  • the fifth embodiment of the present disclosure further provides a network device 40, including:
  • the transceiver is configured to send a first limit, where the first limit is used for at least one of load control, congestion control, and access control.
  • the transceiver is further configured to: send an algorithm identifier, where the algorithm corresponding to the algorithm is a target algorithm used by the terminal to calculate the second limit.
  • the transceiver is further configured to: receive, by the terminal, a random access request that carries the second limit, or a random access request and a second limit.
  • the transceiver is further configured to: when the second limit is less than or equal to the first limit, send a random access response to the terminal; or
  • the control method further includes: the transceiver is further configured to: receive the terminal identifier and/or the second information sent by the terminal; the second information includes: a first field and/or a second field;
  • the first field includes: algorithm identifier information used when determining the second limit value, time domain resource information for sending a random access request, a time domain resource number for sending a random access request, and a frequency domain resource for sending a random access request. At least one of information, a frequency domain resource number for transmitting a random access request, preamble information for transmitting a random access request, a preamble number for transmitting a random access request, and a network identifier;
  • the second field includes a padding value of a preset hexadecimal value used when determining the second limit value.
  • the network device further includes: a processor, configured to use the algorithm to identify a corresponding target algorithm or a preset algorithm to calculate the terminal identifier and/or the second information, to obtain a third limit;
  • the target algorithm or the preset algorithm corresponding to the algorithm identifier includes one of a one-way function algorithm, a hash function algorithm, and an elliptic function algorithm.
  • the transceiver is further configured to: when the second limit and the third limit are equal, send a connection establishment complete message or send a random access request success message to the terminal; or
  • the transceiver is further configured to: when the second limit is greater than the first limit, send a connection setup complete message or a random access request success message to the terminal; or
  • the transceiver is further configured to: when the second limit value and the third limit value are not equal, send a connection establishment failure message or a random access request failure message to the terminal; or
  • the transceiver is further configured to: when the second limit is less than or equal to the first limit, send a connection setup failure message or send a random access request failure message; or
  • the network device may further include a memory, and the transceiver and the processor are communicably connected through a bus interface or an interface, and the transceiver and the memory may also be communicatively connected through a bus interface or an interface.
  • the functions of the above transceivers can also be implemented by a processor.
  • an embodiment of the present disclosure further provides a terminal 50, including:
  • the transceiver is configured to receive a first limit; the first limit is used for at least one of load control, congestion control, and access control.
  • the transceiver is further configured to: receive an algorithm identifier.
  • the terminal further includes: a processor, configured to calculate, according to the target algorithm or the preset algorithm, the terminal identifier and/or the first information, to obtain a second limit.
  • the transceiver is specifically configured to: when the second limit is less than or equal to the first limit, send a random access request that carries the second limit, or send a random access request and the second Limit; or,
  • the random access request carrying the second limit is sent, or the random access request and the second limit are sent.
  • the transceiver is further configured to: receive a random access response
  • the random access response is: the network device sends a random access response to the terminal when the second limit is less than or equal to the first limit; or, when the second limit is greater than or equal to the The first limit is sent to the terminal.
  • the second access value is included in the random access response.
  • the terminal further includes: a sending terminal identifier and/or second information; the second information includes: a first field and/or a second field;
  • the first field includes: algorithm identifier information used when determining the second limit value, time domain resource information for sending a random access request, a time domain resource number for sending a random access request, and a frequency domain resource for sending a random access request. At least one of information, a frequency domain resource number for transmitting a random access request, preamble information for transmitting a random access request, a preamble number for transmitting a random access request, and a network identifier;
  • the second field includes a padding value of a preset hexadecimal value used when determining the second limit value.
  • the transceiver is further configured to: receive a connection establishment complete message or send a random access request success message;
  • connection establishment completion message or the sending random access request success message is sent by the network device when the second limit value is equal to the third limit value; or, the third limit value is smaller than the first limit value Transmitted; or, when the second limit is less than or equal to the first limit, and the third limit is equal to the second limit.
  • the transceiver is further configured to: receive a connection establishment complete message or send a random access request success message;
  • connection establishment completion message or the sending random access request success message is sent by the network device when the second limit is greater than the first limit; or, when the second limit is greater than or equal to the first A limit value that is sent when the third limit value is equal to the second limit value.
  • the transceiver is further configured to: receive a connection establishment failure message or send a random access request failure message;
  • connection establishment failure message or the sending random access request failure message is sent by the network device when the second limit value and the third limit value are not equal; or, when the second limit value is greater than or equal to the Transmitted when the first limit is stated; or when the second limit is equal to the third limit, and the second limit is greater than or equal to the first limit.
  • the transceiver is further configured to: receive a connection establishment failure message or send a random access request failure message;
  • connection establishment failure message or the sending random access request failure message is sent by the network device when the second limit is less than or equal to the first limit; or, the second limit is equal to the third limit A value that is sent when the second limit is less than or equal to the first limit.
  • the terminal may further include a memory, and the transceiver and the processor are communicably connected through a bus interface or an interface, and the transceiver and the memory may also be communicably connected through a bus interface or an interface.
  • the functions of the above transceivers can also be implemented by a processor.
  • the terminal of the present disclosure may also include other components that implement the above methods, such as a user interface.
  • An embodiment of the present disclosure further provides a control method, including:
  • Step 510 The network device sends a first limit, where the first limit is used for at least one of load control, congestion control, and access control.
  • Step 511 The terminal receives the first limit.
  • Step 512 The terminal determines a second limit, and when the second limit is less than or equal to the first limit, sends a random access request carrying the second limit to the network device, or a random access request and a second limit; or, when the second limit is greater than or equal to the first limit, sending a random access request carrying the second limit to the network device, or a random access request and a second limit value;
  • Step 513 The network device receives the random access request carrying the second limit, or the random access request and the second limit.
  • Step 514 The network device sends a random access response when the second limit is less than or equal to the first limit, or sends when the second limit is greater than or equal to the first limit. Random access response.
  • control method may further include:
  • Step 515 The terminal sends the terminal identifier and/or the second information.
  • Step 516 The network device sends a connection establishment complete message or a random access request success message to the terminal, or sends a connection establishment failure message or a random access request failure message to the terminal.
  • a communication device 60 of the present disclosure includes a processor 62, a memory 63 storing a computer program, and when the computer program is executed by the processor 62, performs the method as described in the above embodiments.
  • the communication device may be the foregoing network device, or may be the foregoing terminal, and the communication device may further include: a transceiver 61, and the processor 62 is communicably connected through a bus interface or an interface, and the transceiver 61 and the memory 63 can also be connected via a bus interface or an interface.
  • the functions of the above transceivers can also be implemented by a processor.
  • the communication device of the present disclosure may further include other components for implementing the above method. All the implementations in the foregoing method embodiments are applicable to the embodiment of the communication device, and the same technical effects can be achieved.
  • the communication device may be the terminal in the foregoing embodiment, or may be the network device, such as a base station, in the foregoing embodiment.
  • Embodiments of the present disclosure also provide a computer readable storage medium comprising instructions that, when executed by a computer, cause a computer to perform the method as described above.
  • the disclosed apparatus and method may be implemented in other manners.
  • the device embodiments described above are merely illustrative.
  • the division of the unit is only a logical function division.
  • there may be another division manner for example, multiple units or components may be combined or Can be integrated into another system, or some features can be ignored or not executed.
  • the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, and may be in an electrical, mechanical or other form.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
  • each functional unit in various embodiments of the present disclosure may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
  • the functions may be stored in a computer readable storage medium if implemented in the form of a software functional unit and sold or used as a standalone product. Based on such understanding, a portion of the technical solution of the present disclosure that contributes in essence or to the related art or a part of the technical solution may be embodied in the form of a software product stored in a storage medium, including several The instructions are for causing a computer device (which may be a personal computer, server, or network device, etc.) to perform all or part of the steps of the methods described in various embodiments of the present disclosure.
  • the foregoing storage medium includes various media that can store program codes, such as a USB flash drive, a mobile hard disk, a ROM, a RAM, a magnetic disk, or an optical disk.
  • the objects of the present disclosure can also be achieved by running a program or a set of programs on any computing device.
  • the computing device can be a well-known general purpose device.
  • the objects of the present disclosure may also be realized by merely providing a program product including program code for implementing the method or apparatus. That is to say, such a program product also constitutes the present disclosure, and a storage medium storing such a program product also constitutes the present disclosure.
  • the storage medium may be any known storage medium or any storage medium developed in the future.
  • various components or steps may be decomposed and/or recombined.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Quality & Reliability (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本公开的实施例提供一种控制方法、网络设备和终端。其中,处理方法包括:发送第一限值,所述第一限值用于负载控制、拥塞控制、接入控制中的至少一种。

Description

控制方法、网络设备和终端
相关申请的交叉引用
本申请主张在2018年4月28日在中国提交的中国专利申请号No.201810402062.3的优先权,其全部内容通过引用包含于此。
技术领域
本公开涉及通信技术领域,特别是指一种控制方法、网络设备和终端。
背景技术
以4G为代表的移动通信技术带动了移动互联网的飞速发展,将人与人的通信带到了前所未有的发展高度。未来5G将从“人人互联”发展为更具想象空间的“人物互联”和“物物互联”的物联网时代。由于物联网应用具有超远覆盖的需求,运营商通常会将低频段如800MHz/900MHz用于提供物联网服务,这些频段的带宽非常有限。因此,在未来5G万物互联的时代,在特定业务场景下,如远程抄表定时上报数据、共享单车在地铁站等热点区域集中更新位置信息等,大量的物联网终端将会集中的发起随机接入请求,造成小区随机接入资源拥塞。
发明内容
本公开提供了一种控制方法、网络设备和终端,用以解决相关技术中,终端集中发起随机接入请求,造成小区随机接入资源拥塞的问题。
为解决上述技术问题,本公开的实施例提供如下方案:
一种控制方法,包括:
发送第一限值,所述第一限值用于负载控制、拥塞控制、接入控制中的至少一种。
其中,所述第一限值为:预设位数的预设进制数值。
其中,所述第一限值的取值由所述预设位数的预设进制数值直接表示;或者,所述第一限值的取值由系数和指数共同表示,所述系数由所述预设位 数中至少一位的预设进制数值表示,所述指数由所述预设位数中剩余的位数的预设进制数值表示;或者,所述第一限值的取值由第一部分和第二部分组成,所述第一部分由至少一位0表示,所述第二部分由所述预设位数中剩余的位数的预设进制数值表示。
其中,发送第一限值的步骤,包括:根据接入类型、终端协议版本、类别、QoS要求、接入请求类型、终端品牌和/或终端型号,发送对应的第一限值。
其中,控制方法,还包括:发送算法标识,所述算法标识对应的算法是终端计算第二限值采用的目标算法。
其中,所述第一限值和/或所述算法标识是动态配置或者周期性配置的。
其中,根据网络设备的负载配置所述第一限值和/或所述算法标识;或者,
根据第一时间窗口内接收到的随机接入请求的数目或者根据第二时间窗口内接入的随机接入请求的数目的预测值配置所述第一限值和/或所述算法标识。
其中,根据网络设备的负载配置所述第一限值,包括:
在所述网络设备的负载大于第一门限值时,将所述第一限值调低至少一个调整阶梯;或者,在所述网络设备的负载小于第二门限值时,将所述第一限值调高至少一个调整阶梯。
其中,根据网络设备的负载配置所述算法标识,包括:
在所述网络设备的负载大于第三门限值时,改变算法标识;或者,在所述网络设备的负载小于第四门限值时,改变算法标识。
其中,根据第一时间窗口内接收到的随机接入请求的数目或者根据第二时间窗口内接入的随机接入请求的数目的预测值配置所述第一限值,包括:
在第一时间窗口内接收到的随机接入请求的数目小于第五门限值或者在第二时间窗口内接收的随机接入请求的数目的预测值小于第六门限值时,将所述第一限值调高至少一个调整阶梯;或者,在第一时间窗口内接收到的随机接入请求的数目大于第七门限值或者在第二时间窗口内接收的随机接入请求的数目的预测值大于第八门限值时,将所述第一限值调低至少一个调整阶梯。
其中,根据第一时间窗口内接收到的随机接入请求的数目或者根据第二时间窗口内接入的随机接入请求的数目的预测值配置所述算法标识,包括:
在第一时间窗口内接收到的随机接入请求的数目小于第九门限值或者在第二时间窗口内接收的随机接入请求的数目的预测值小于第十门限值时,改变算法标识;或者
在第一时间窗口内接收到的随机接入请求的数目大于第十一门限值或者在第二时间窗口内接收的随机接入请求的数目的预测值大于第十二门限值时,改变算法标识。
其中,控制方法还包括:接收终端发送的携带第二限值的随机接入请求,或者,随机接入请求和第二限值。
其中,所述第二限值是终端根据算法标识对应的目标算法或者预设算法对终端标识和/或第一信息进行计算得到的。
其中,所述第一信息包括:第一字段和/或第二字段;
所述第二限值是终端根据所述算法标识对应的目标算法或者预设算法对所述终端标识和/或所述第一信息的第一字段和/或第二字段进行计算得到的。
其中,所述第一字段或第二字段为:固定长度或者可变长度的字段;或者
所述第二字段为预设进制的填充值。
其中,所述第一字段包括:确定第二限值时采用的算法标识信息、发送随机接入请求的时域资源信息、发送随机接入请求的时域资源编号、发送随机接入请求的频域资源信息、发送随机接入请求的频域资源编号、发送随机接入请求的前导码信息、发送随机接入请求的前导码编号、网络标识中的至少一种。
其中,所述携带第二限值的随机接入请求,或者,随机接入请求和第二限值是在所述第二限值小于或者等于所述第一限值的情况下发送的;或者,所述携带第二限值的随机接入请求,或者,随机接入请求和第二限值是在所述第二限值大于或者等于所述第一限值的情况下发送的。
其中,控制方法还包括:在所述第二限值小于或者等于所述第一限值时,向终端发送随机接入响应;或者,在所述第二限值大于或者等于所述第一限 值时,向终端发送随机接入响应。
其中,所述随机接入响应中包括所述第二限值。
其中,控制方法还包括:接收终端发送的终端标识和/或第二信息;所述第二信息包括:第一字段和/或第二字段;所述第一字段包括:确定第二限值时采用的算法标识信息、发送随机接入请求的时域资源信息、发送随机接入请求的时域资源编号、发送随机接入请求的频域资源信息、发送随机接入请求的频域资源编号、发送随机接入请求的前导码信息、发送随机接入请求的前导码编号、网络标识中的至少一种;所述第二字段包括:确定第二限值时采用的预设进制的填充值。
其中,控制方法还包括:采用所述算法标识对应的目标算法或者预设算法对所述终端标识和/或第二信息进行计算,得到第三限值;
所述算法标识对应的目标算法或者预设算法包括:单向函数算法、散列函数算法和椭圆函数算法中的一种。
其中,控制方法还包括:在所述第二限值与第三限值相等时,向终端发送连接建立完成消息或者发送随机接入请求成功消息;或者,在所述第三限值小于所述第一限值时,向终端发送连接建立完成消息或者发送随机接入请求成功消息;或者,
在所述第二限值小于或者等于所述第一限值,且所述第三限值与所述第二限值相等时,向终端发送连接建立完成消息或者发送随机接入请求成功消息。
其中,控制方法,还包括:在所述第二限值大于所述第一限值时,向终端发送连接建立完成消息或者发送随机接入请求成功消息;或者,在所述第二限值大于或者等于所述第一限值,且所述第三限值与所述第二限值相等时,向终端发送连接建立完成消息或者发送随机接入请求成功消息。
其中,控制方法,还包括:在所述第二限值与所述第三限值不等时,向终端发送连接建立失败消息或者发送随机接入请求失败消息;或者,在所述第二限值大于或者等于所述第一限值时,向终端发送连接建立失败消息或者发送随机接入请求失败消息;或者,在所述第二限值等于所述第三限值,且所述第二限值大于或者等于所述第一限值时,向终端发送连接建立失败消息 或者发送随机接入请求失败消息。
其中,控制方法,还包括:在所述第二限值小于或者等于所述第一限值时,发送连接建立失败消息或发送随机接入请求失败消息;或者,在所述第二限值等于第三限值,且所述第二限值小于或者等于所述第一限值时,发送连接建立失败消息或发送随机接入请求失败消息。
本公开的实施例还提供一种控制方法,包括:
接收第一限值;所述第一限值用于负载控制、拥塞控制、接入控制中的至少一种。
其中,所述第一限值为:预设位数的预设进制数值。
其中,所述第一限值的取值由所述预设位数的预设进制数值直接表示;或者,所述第一限值的取值由系数和指数共同表示,所述系数由所述预设位数中至少一位的预设进制数值表示,所述指数由所述预设位数中剩余的位数的预设进制数值表示;或者,所述第一限值的取值由第一部分和第二部分组成,所述第一部分由至少一位0表示,所述第二部分由所述预设位数中剩余的位数的预设进制数值表示。
其中,控制方法,还包括:接收算法标识。
其中,控制方法,还包括:根据所述算法标识对应的目标算法或者预设算法对终端标识和/或第一信息进行计算,得到第二限值。
其中,所述第一信息包括:第一字段和/或第二字段;
所述第二限值是终端根据所述算法标识对应的目标算法或者预设算法对所述终端标识和/或所述第一信息的第一字段和/或第二字段进行计算得到的。
其中,所述第一字段或第二字段为:固定长度或者可变长度的字段;或者
所述第二字段为预设进制的填充值。
其中,所述第一字段包括:确定第二限值时采用的算法标识信息、发送随机接入请求的时域资源信息、发送随机接入请求的时域资源编号、发送随机接入请求的频域资源信息、发送随机接入请求的频域资源编号、发送随机接入请求的前导码信息、发送随机接入请求的前导码编号、网络标识中的至少一种。
其中,控制方法,还包括:在第二限值小于或者等于所述第一限值时,发送携带第二限值的随机接入请求,或者,发送随机接入请求和所述第二限值;或者,在第二限值大于或者等于所述第一限值时,发送携带第二限值的随机接入请求,或者,发送随机接入请求和所述第二限值。
其中,控制方法,还包括:接收随机接入响应;
所述随机接入响应是:网络设备在所述第二限值小于或者等于所述第一限值时,向终端发送随机接入响应;或者,在所述第二限值大于或者等于所述第一限值时,向终端发送的。
其中,所述随机接入响应中包括所述第二限值。
其中,控制方法,还包括:发送终端标识和/或第二信息;所述第二信息包括:第一字段和/或第二字段;所述第一字段包括:确定第二限值时采用的算法标识信息、发送随机接入请求的时域资源信息、发送随机接入请求的时域资源编号、发送随机接入请求的频域资源信息、发送随机接入请求的频域资源编号、发送随机接入请求的前导码信息、发送随机接入请求的前导码编号、网络标识中的至少一种;所述第二字段包括:确定第二限值时采用的预设进制的填充值。
其中,控制方法还包括:接收连接建立完成消息或者发送随机接入请求成功消息;
所述连接建立完成消息或者发送随机接入请求成功消息是网络设备在所述第二限值与第三限值相等时发送的;或者,在所述第三限值小于所述第一限值时发送的;或者,在所述第二限值小于或者等于所述第一限值,且所述第三限值与所述第二限值相等时发送的。
其中,控制方法还包括:接收连接建立完成消息或者发送随机接入请求成功消息;
所述连接建立完成消息或者发送随机接入请求成功消息是网络设备在所述第二限值大于所述第一限值时发送的;或者,在所述第二限值大于或者等于所述第一限值,且所述第三限值与所述第二限值相等时发送的。
其中,控制方法还包括:接收连接建立失败消息或者发送随机接入请求失败消息;
所述连接建立失败消息或者发送随机接入请求失败消息是网络设备在所述第二限值与所述第三限值不等时发送的;或者,在所述第二限值大于或者等于所述第一限值时发送的;或者,在所述第二限值等于所述第三限值,且所述第二限值大于或者等于所述第一限值时发送的。
其中,控制方法还包括:接收连接建立失败消息或者发送随机接入请求失败消息;
所述连接建立失败消息或者发送随机接入请求失败消息是网络设备在所述第二限值小于或者等于所述第一限值时发送的;或者,在所述第二限值等于第三限值,且所述第二限值小于或者等于所述第一限值时,发送的。
本公开的实施例还提供一种网络设备,包括:
收发机,用于发送第一限值,所述第一限值用于负载控制、拥塞控制、接入控制中的至少一种。
其中,所述收发机还用于:发送算法标识,所述算法标识对应的算法是终端计算第二限值采用的目标算法。
其中,所述收发机还用于:接收终端发送的携带第二限值的随机接入请求,或者,随机接入请求和第二限值。
其中,所述收发机还用于:在所述第二限值小于或者等于所述第一限值时,向终端发送随机接入响应;或者,
在所述第二限值大于或者等于所述第一限值时,向终端发送随机接入响应。
其中,控制方法还包括:所述收发机还用于:接收终端发送的终端标识和/或第二信息;所述第二信息包括:第一字段和/或第二字段;
所述第一字段包括:确定第二限值时采用的算法标识信息、发送随机接入请求的时域资源信息、发送随机接入请求的时域资源编号、发送随机接入请求的频域资源信息、发送随机接入请求的频域资源编号、发送随机接入请求的前导码信息、发送随机接入请求的前导码编号、网络标识中的至少一种;
所述第二字段包括:确定第二限值时采用的预设进制的填充值。
其中,网络设备还包括:处理器,用于采用所述算法标识对应的目标算法或者预设算法对所述终端标识和/或第二信息进行计算,得到第三限值;
所述算法标识对应的目标算法或者预设算法包括:单向函数算法、散列函数算法和椭圆函数算法中的一种。
其中,所述收发机还用于:在所述第二限值与第三限值相等时,向终端发送连接建立完成消息或者发送随机接入请求成功消息;或者,在所述第三限值小于所述第一限值时,向终端发送连接建立完成消息或者发送随机接入请求成功消息;或者,在所述第二限值小于或者等于所述第一限值,且所述第三限值与所述第二限值相等时,向终端发送连接建立完成消息或者发送随机接入请求成功消息。
其中,所述收发机还用于:在所述第二限值大于所述第一限值时,向终端发送连接建立完成消息或者发送随机接入请求成功消息;或者,在所述第二限值大于或者等于所述第一限值,且所述第三限值与所述第二限值相等时,向终端发送连接建立完成消息或者发送随机接入请求成功消息。
其中,所述收发机还用于:在所述第二限值与所述第三限值不等时,向终端发送连接建立失败消息或者发送随机接入请求失败消息;或者,在所述第二限值大于或者等于所述第一限值时,向终端发送连接建立失败消息或者发送随机接入请求失败消息;或者,在所述第二限值等于所述第三限值,且所述第二限值大于或者等于所述第一限值时,向终端发送连接建立失败消息或者发送随机接入请求失败消息。
其中,所述收发机还用于:在所述第二限值小于或者等于所述第一限值时,发送连接建立失败消息或发送随机接入请求失败消息;或者,在所述第二限值等于第三限值,且所述第二限值小于或者等于所述第一限值时,发送连接建立失败消息或发送随机接入请求失败消息。
本公开的实施例还提供一种终端,包括:
收发机,用于接收第一限值;所述第一限值用于负载控制、拥塞控制、接入控制中的至少一种。
其中,所述收发机还用于:接收算法标识。
其中,终端还包括:处理器,用于根据所述算法标识对应的目标算法或者预设算法对终端标识和/或第一信息进行计算,得到第二限值。
其中,所述收发机具体用于:在第二限值小于或者等于所述第一限值时, 发送携带第二限值的随机接入请求,或者,发送随机接入请求和所述第二限值;或者,在第二限值大于或者等于所述第一限值时,发送携带第二限值的随机接入请求,或者,发送随机接入请求和所述第二限值。
其中,所述收发机还用于:接收随机接入响应;
所述随机接入响应是:网络设备在所述第二限值小于或者等于所述第一限值时,向终端发送随机接入响应;或者,在所述第二限值大于或者等于所述第一限值时,向终端发送的。
其中,所述随机接入响应中包括所述第二限值。
其中,终端还包括:发送终端标识和/或第二信息;所述第二信息包括:第一字段和/或第二字段;
所述第一字段包括:确定第二限值时采用的算法标识信息、发送随机接入请求的时域资源信息、发送随机接入请求的时域资源编号、发送随机接入请求的频域资源信息、发送随机接入请求的频域资源编号、发送随机接入请求的前导码信息、发送随机接入请求的前导码编号、网络标识中的至少一种;
所述第二字段包括:确定第二限值时采用的预设进制的填充值。
其中,所述收发机还用于:接收连接建立完成消息或者发送随机接入请求成功消息;
所述连接建立完成消息或者发送随机接入请求成功消息是网络设备在所述第二限值与第三限值相等时发送的;或者,在所述第三限值小于所述第一限值时发送的;或者,在所述第二限值小于或者等于所述第一限值,且所述第三限值与所述第二限值相等时发送的。
其中,所述收发机还用于:接收连接建立完成消息或者发送随机接入请求成功消息;
所述连接建立完成消息或者发送随机接入请求成功消息是网络设备在所述第二限值大于所述第一限值时发送的;或者,在所述第二限值大于或者等于所述第一限值,且所述第三限值与所述第二限值相等时发送的。
其中,所述收发机还用于:接收连接建立失败消息或者发送随机接入请求失败消息;
所述连接建立失败消息或者发送随机接入请求失败消息是网络设备在所 述第二限值与所述第三限值不等时发送的;或者,在所述第二限值大于或者等于所述第一限值时发送的;或者,在所述第二限值等于所述第三限值,且所述第二限值大于或者等于所述第一限值时发送的。
其中,所述收发机还用于:接收连接建立失败消息或者发送随机接入请求失败消息;
所述连接建立失败消息或者发送随机接入请求失败消息是网络设备在所述第二限值小于或者等于所述第一限值时发送的;或者,在所述第二限值等于第三限值,且所述第二限值小于或者等于所述第一限值时发送的。
本公开的实施例还提供一种控制方法,包括:
网络设备发送第一限值,所述第一限值用于负载控制、拥塞控制、接入控制中的至少一种;
终端接收所述第一限值;
终端确定第二限值,在所述第二限值小于或者等于所述第一限值时,向网络设备发送携带第二限值的随机接入请求,或者,随机接入请求和第二限值;或者,在所述第二限值大于或者等于所述第一限值时,向网络设备发送携带第二限值的随机接入请求,或者,随机接入请求和第二限值;
网络设备接收所述携带第二限值的随机接入请求,或者,随机接入请求和第二限值;
网络设备在所述第二限值小于或者等于所述第一限值时,发送随机接入响应;或者,在所述第二限值大于或者等于所述第一限值时,发送随机接入响应。
其中,控制方法,还包括:终端发送终端标识和/或第二信息;
网络设备向终端发送连接建立完成消息或者发送随机接入请求成功消息;或者向终端发送连接建立失败消息或者发送随机接入请求失败消息。
本公开的实施例还提供一种通信设备,包括:处理器、存储有计算机程序的存储器,所述计算机程序被处理器运行时,执行如上所述的方法。
本公开的实施例还提供一种计算机可读存储介质,包括指令,当所述指令在计算机运行时,使得计算机执行如上所述的方法。
本公开的上述方案至少包括以下有益效果:
本公开的上述方案,通过向终端发送用于负载控制、拥塞控制或者随机接入的第一限值,使终端可以根据该第一限值进行随机接入;避免终端集中发起随机接入请求,造成的小区随机接入资源拥塞。
附图说明
图1为本公开的实施例网络设备侧的控制方法的一流程图;
图2为本公开的实施例网络设备侧的控制方法的另一流程图;
图3为本公开的实施例终端侧的控制方法的流程图;
图4为本公开的网络设备的结构示意图;
图5为本公开的终端的结构示意图;
图6为本公开的通信设备的结构示意图。
具体实施方式
下面将参照附图更详细地描述本公开的示例性实施例。虽然附图中显示了本公开的示例性实施例,然而应当理解,可以以各种形式实现本公开而不应被这里阐述的实施例所限制。相反,提供这些实施例是为了能够更透彻地理解本公开,并且能够将本公开的范围完整的传达给本领域的技术人员。
本公开的实施例针对相关技术中大量的物联网终端集中的发起随机接入请求,造成小区随机接入资源拥塞的问题,提出一种控制方法、网络设备和终端。能够避免终端集中发起随机接入请求造成的小区随机接入资源拥塞。
本公开的第一实施例,提供一种控制方法,应用于网络设备,包括:
发送第一限值,具体的,网络设备向终端发送第一限值,所述第一限值用于负载控制、拥塞控制、接入控制中的至少一种,其中,接入控制可以是终端的随机接入网络的控制。
该实施例中,网络设备配置第一限值,并向终端发送第一限值,具体可以以广播的方式向发终端发送该第一限值。
这里的第一限值具体可以为预设位数的预设进制数值。
例如,所述第一限值采用8位十六进制数来表征,数值为0x1903a30b;或者所述第一限值采用11位十进制数来表征,数值为10000293940;或者, 第一限值采用5位二进制数来表征,数值为00100。
这里,所述第一限值的取值可以由所述预设位数的预设进制数值直接表示,例如,第一限值可直接表征为8位的十六进制数0x1903a30b,第一限值对应取值也即为0x1903a30b;或者,所述第一限值的取值也可以由系数和指数共同表示,所述系数由所述预设位数中的至少一位的预设进制数值表示,所述指数由所述预设位数中剩余的位数的预设进制数值表示;比如,第一限值采用8位十六进制数来表征,前2位十六进制数来表征第一限值对应取值的指数,后6位十六进制数来表征第一限值对应取值的系数,假设第一限值为0x1903a30b,则前2位十六进制数0x19为指数,后6位十六进制数0x03a30b为系数,第一限值对应取值的计算公式为T=系数*a^(b*(指数-c)),其中,a,b,c均为整数,例如,T=系数*2^(8*(指数-3)),即T=0x03a30b*2^(0x8*(0x19-0x03)),这里的0x表示十六进制。
这里,所述第一限值的取值可以由第一部分和第二部分组成,所述第一部分由至少一位0表示,所述第二部分由所述预设位数中剩余的位数的预设进制数值表示。例如,第一限值的第一部分为0000000,用来表征难度系数,第二部分为11101,用来表征限值。若控制接入原则为在第二限值小于或等于第一限值时,允许终端发起接入请求的话,网络设备可以通过增加第一部分0的位数来提升接入难度,也可以通过减少第一部分0的位数来降低接入难度;若控制接入原则为在第二限值大于或等于第一限值时,允许终端发起接入请求的话,网络设备可以通过减少第一部分0的位数来提升接入难度,也可以通过增加第一部分0的位数来降低接入难度。
该实施例中,网络设备向终端发送第一限值可以包括:根据终端的接入类型、协议版本、类别、QoS要求、接入请求类型(如竞争接入请求、非竞争接入请求)、终端品牌和/或终端型号,向终端发送对应的第一限值。比如,网络设备可以针对终端不同接入业务类型、终端不同协议版本、不同终端类别、不同QoS要求、竞争接入请求、非竞争接入请求和/或终端的品牌配置不同的第一限值,网络设备发送用于随机接入控制的第一限值序列,序列中的每个数值对应特定接入类型(通过给不同接入业务类型配置不同的第一限值,可以实现多种业务类别的接入优先级的控制,例如,可优先保障语音业务接 入);或者,网络设备为Release 15版本终端和Release 16版本终端配置不同的第一限值(新版本终端的计算能力强,可以通过设置不同的第一限值来保证不同版本的终端接入的公平性)。网络设备也可以通过结合多种条件来配置不同的第一限值,实现对实际网络中的复杂情况下进行有效的接入控制。例如,若控制接入原则为在第二限值小于或等于第一限值时,允许终端发起接入请求的话,网络设备可以为非竞争接入请求类型的语音业务配置第一限值为0001111(接入概率为16/128,约等于12.5%),为非竞争接入请求类型的数据业务配置第一限值为0001000(接入概率为9/128,约等于7%),为竞争接入请求类型的语音业务配置第一限值为0000100(接入概率为5/128,约等于4%),为竞争接入请求类型的数据业务配置第一限值为0000010(接入概率为3/128,约等于2.3%)。
如图1所示,本公开的第二实施例,提供一种控制方法,应用于网络设备,包括:
步骤11,发送第一限值,具体可以是向终端发送第一限值,所述第一限值用于负载控制、拥塞控制、接入控制中的至少一种,这里的接入控制可以是终端随机接入网络的控制;
步骤12,发送算法标识,具体可以是向终端发送算法标识,所述算法标识用于标识一目标算法,终端采用该目标算法计算第二限值。
该实施例中,网络设备发送第一限值和一算法标识,终端采用所述算法标识指示的算法,来获取发起随机接入控制的数值,以下称为第二限值;这里的算法可以包括单向函数算法或者散列函数算法或者椭圆函数算法,但不限于这些函数算法。
所述算法标识的每个取值对应特定算法,例如,算法标识1对应哈希SHA256算法,算法标识2对应scrypt算法,算法标识3对应哈希blake算法,这里的算法为单向函数。
网络侧设备和终端也可以约定算法,对应的,网络侧设备只需要发送随机接入请求第一限值,如上述第一实施例所述。
当第一限值对应的计算难度特别大,将导致网络设备覆盖的小区终端无法接入网络;反之,当第一限值对应的计算难度特别小,将导致网络设备覆 盖的小区大量终端发起接入请求,造成拥塞,因此,所述第一限值是需要支持可周期性配置或动态配置的,实现与网络负载的匹配,达到有效控制拥塞的目的。
该实施例中,所述第一限值和/或所述算法标识由网络设备周期性配置或者动态配置。
当然,配置所述第一限值和/或所述算法标识,具体可以是所述网络设备根据负载情况动态配置所述第一限值和/或所述算法标识;或者所述网络设备根据第一时间窗口内接收到的随机接入请求的数目或者根据第二时间窗口内接入随机接入请求的数目的预测值配置所述第一限值和/或所述算法标识。
这里,网络侧设备可根据负载值(负载值可以包括随机接入资源负载值或控制信道资源负载值或共享数据信道资源负载值)来配置所述第一限值,来实现对终端计算复杂度(或者难度)的调控,进而实现对时间窗口内可接入终端数目的控制。
该实施例中,所述网络设备根据负载情况配置所述第一限值具体可以包括:
1)若控制接入原则为在第二限值小于或等于第一限值时,在所述网络设备的负载值大于第一门限值时,将所述第一限值调低至少一个调整阶梯(例如,将第一限值从0001000,调整到0000100),可选的,可以在调整周期的生效时刻,将所述第一限值调低至少一个调整阶梯;或者
2)若控制接入原则为在第二限值小于或等于第一限值时,在所述网络设备的负载值小于第二门限时,将所述第一限值调高至少一个调整阶梯(例如,将第一限值从0000100,调整到0001000);可选的,可以在调整周期的生效时刻,将所述第一限值调高至少一个调整阶梯。
若控制接入原则为在第二限值大于或等于第一限值时,方法类似,只是调整方向相反,不再赘述。
该实施例中,所述网络设备根据负载情况配置所述算法标识具体可以包括:
1)在所述网络设备的负载值大于第三门限值时,改变算法标识(例如,SHA1变为SHA256,难度提升);或者
2)在所述网络设备的负载值小于第四门限值时,改变算法标识(例如,SHA256变为SHA1,难度下降)。
可选的,可以在所述网络设备在调整周期的生效时刻,改变算法标识。
该实施例中,所述网络设备根据第一时间窗口内接收到的随机接入请求的数目或者根据第二时间窗口内接入随机接入请求的数目的预测值配置所述第一限值,具体可以包括:
1)所述网络设备在第一时间窗口内接收到的随机接入请求的数目小于第五门限值或者根据第二时间窗口内接入随机接入请求的数目的预测值小于第六门限值时,将所述第一限值调高至少一个调整阶梯(例如,将第一限值从0000100,调整到0001000);可选的,可以在所述网络设备在调整周期的生效时刻,将所述第一限值调高至少一个调整阶梯;或者
2)所述网络设备在第一时间窗口内接收到的随机接入请求的数目大于第七门限值或者根据第二时间窗口内接入随机接入请求的数目的预测值大于第八门限值时,将所述第一限值调低至少一个调整阶梯(例如,将第一限值从0001000,调整到0000100),可选的,可以在所述网络设备在调整周期的生效时刻,将所述第一限值调低至少一个调整阶梯。
该实施例中,所述网络设备根据第一时间窗口内接收到的随机接入请求的数目或者根据第二时间窗口内接入随机接入请求的数目的预测值配置所述算法标识,具体可以包括:
1)所述网络设备在第一时间窗口内接收到的随机接入请求的数目小于第九门限值或者根据第二时间窗口内接入随机接入请求的数目的预测值小于第十门限值(即在到达设定的时间间隔单位时,开始进行难度调整)时,改变算法标识;或者
2)所述网络设备在第一时间窗口内接收到的随机接入请求的数目大于第十一门限值或者根据第二时间窗口内接入随机接入请求的数目的预测值大于第十二门限值时,改变算法标识。
可选的,可以在所述网络设备在调整周期的生效时刻,改变算法标识。
进一步的,本公开的实施例中,当网络侧设备的负载值小于第十三门限时,网络侧设备不广播所述第一限值和/或算法标识。
本公开的上述实施例中,第一至第十三门限值可以相等,也可以不相等。
如图2所示,本公开的第三实施例,提供一种控制方法,应用于网络设备,包括:
步骤21,发送第一限值,具体的,可以向终端发送第一限值,所述第一限值用于负载控制、拥塞控制、接入控制中的至少一种,接入控制是终端随机接入网络的控制;
步骤22,发送算法标识,具体的,可以向终端发送算法标识,所述算法标识用于标识一目标算法,终端采用该目标算法计算第二限值;
步骤23,接收终端发送的携带有第二限值的随机接入请求,或者,接收终端发送的随机接入请求和第二限值;
这里的第二限值,是终端根据所述目标算法或者预设算法对终端标识和/或第一信息进行计算得到的。
这里的第一信息可以包括:第一字段和第二字段;这里的第一字段为固定长度或者可变长度的字段,第二字段也可以为固定长度或者可变长度的字段。第二字段可以为预设进制的填充值。
这里的第一字段包括:确定第二限值时采用的算法标识信息、发送随机接入请求的时域资源信息、发送随机接入请求的时域资源的编号、发送随机接入请求的频域资源信息、发送随机接入请求的频域资源的编号、发送随机接入请求的前导码信息、发送随机接入请求的前导码编号、网络标识中的至少一种。所述终端标识包括国际移动用户识别码(International Mobile Subscriber Identification Number,IMSI)或国际移动设备身份码(International Mobile Equipment Identity,IMEI)或临时的用户识别号码TMSI或S-TMSI等;所述网络标识包括网络小区ID、Global cell ID、PLMN等。
例如,终端采用算法标识对应的算法(如SHA256)对输入的预设第一信息进行计算,第二字段为可变数值时,通过改变第二字段的长度和/或内容来计算满足第一限值要求的第二限值;第二限值的位数是固定的(哈希函数等单向函数或散列运算函数的输入数据的长度可以是固定或可变的,输出值的位数是固定且绝不雷同的值),例如,HA256函数运算可以将不同长度的输入数据转化为长度为256比特的数值。
当然,也可以采用算法标识对应的算法或者预设算法对终端标识进行计算,得到第二限值,或者对输入的预设第一信息的第一字段和终端标识进行计算,得到第二限值,或者对输入的预设第一信息的第二字段和终端标识进行计算,得到第二限值,或者对输入的预设第一信息的第一字段、第二字段以及终端标识进行计算,得到第二限值。这里的预设算法可以是协议约定的算法等。
该实施例中,携带第二限值的随机接入请求,或者,随机接入请求和第二限值是终端在所述第二限值小于或者等于所述第一限值的情况下发起的;或者是,在所述第二限值大于或者等于所述第一限值的情况下发起的。终端采用算法标识对应的算法,并通过改变第二字段内容来获得不同的第二限值。
进一步的,该实施例中,所述控制方法还可以包括步骤24,具体包括:
241)在所述第二限值小于或者等于所述第一限值时,向终端发送随机接入响应;可选的,该随机接入响应中还可以包括第二限值。或者,
242)在所述第二限值大于或者等于所述第一限值时,向终端发送随机接入响应;可选的,该随机接入响应中还可以包括第二限值。
进一步的,该实施例中,所述控制方法还可以包括:
步骤25,接收终端发送的终端标识和/或第二信息;所述第二信息包括:第一字段和/或第二字段;
所述第一字段包括:确定第二限值时采用的算法标识信息、发送随机接入请求的时域资源信息、发送随机接入请求的时域资源编号、发送随机接入请求的频域资源信息、发送随机接入请求的频域资源编号、发送随机接入请求的前导码信息、发送随机接入请求的前导码编号、网络标识中的至少一种;
所述第二字段包括:确定第二限值时采用的预设进制的填充值。
这里的第二信息可以是上述第一信息的子集,当然也可以与上述第一信息相同。
进一步的,该实施例中,所述控制方法还可以包括:
步骤26,采用所述算法标识对应的目标算法或者预设算法对所述终端标识和/或第二信息进行计算,得到第三限值;
所述算法标识对应的目标算法或者预设算法包括:单向函数算法、散列 函数算法和椭圆函数算法中的一种。
进一步的,该实施例中,所述控制方法还可以包括步骤27,具体包括:
步骤271),在所述第二限值与第三限值相等时,向终端发送连接建立完成消息或者发送随机接入请求成功消息;或者,
步骤272),在所述第三限值小于所述第一限值时,向终端发送连接建立完成消息或者发送随机接入请求成功消息;或者,
步骤273),在所述第二限值小于或者等于所述第一限值,且所述第三限值与所述第二限值相等时,向终端发送连接建立完成消息或者发送随机接入请求成功消息;或者,
步骤274),在所述第二限值大于所述第一限值时,向终端发送连接建立完成消息或者发送随机接入请求成功消息;或者,
步骤275),在所述第二限值大于或者等于所述第一限值,且所述第三限值与所述第二限值相等时,向终端发送连接建立完成消息或者发送随机接入请求成功消息;或者,
步骤276),在所述第二限值与所述第三限值不等时,向终端发送连接建立失败消息或者发送随机接入请求失败消息;或者,
步骤277),在所述第二限值大于或者等于所述第一限值时,向终端发送连接建立失败消息或者发送随机接入请求失败消息;或者,
步骤278),在所述第二限值等于所述第三限值,且所述第二限值大于或者等于所述第一限值时,向终端发送连接建立失败消息或者发送随机接入请求失败消息;或者,
步骤279),在所述第二限值小于或者等于所述第一限值时,发送连接建立失败消息或发送随机接入请求失败消息;或者,
步骤280),在所述第二限值等于第三限值,且所述第二限值小于或者等于所述第一限值时,发送连接建立失败消息或发送随机接入请求失败消息。
其中,上述步骤241)所述的情况可以和步骤271)、272)、273)、276)、279)、280)中的任一种情况组合;上述步骤242所述的情况可以和步骤271)、272)、274)、275)、276)、277)、278)中的任一种情况组合。
该实施例中,如果终端采用所述算法标识对应的目标算法,具体可以根 据第一信息的第二字段进行计算,得到第二限值时,网络设备同样也采用所述目标算法,对所述第二字段进行计算,得到第三限值,根据第三限值和第二限值,对终端的随机接入流程进行鉴权校验。可一次性的检验是否为符合算法要求产生的数值,可有效避免终端采取伪随机方法来欺骗网络获得优先随机接入的欺诈行为。上述方法是基于单向函数、散列函数和椭圆函数等算法的输出值与输入值间是完全随机关系的特点实现的。即输入值与输出值之间没有固定关联,是随机产生的输出值,因此,即使终端知道网络发送的允许接入的限值,也无法通过伪随机方法获得对应的答案,网络设备通过终端提供的计算所述限值的第一信息中的全部或部分输入参数,即可对限值的合法性做出校验。当计算所述限值的部分信息如发送随机接入请求采用的时域、频域和/或码域资源是网络设备根据接收到的随机接入请求即可判断获得时,终端上报的为校验服务的第一信息只需要包含除上述信息之外的其它输入信息及数值。
本公开的上述实施例中,网络设备通过调整或者配置第一限值可以有效控制不同业务、不同版本终端、不同网络负载下的接入策略,适用场景丰富;
网络设备通过发送算法标识,终端利用算法标识对应的算法,通过调整第二字段的内容或者长度进行计算,获得满足接入条件的第二限值,并发起随机接入请求,这样可以使终端能够接入,不会发生拥塞。
本公开的上述实施例所述的方法协议流程改变和信令开销较小,可用性较强。
如图3所示,本公开的第四实施例,提供一种控制方法,应用于终端,包括:
步骤31,接收第一限值;具体的,可以是从网络设备接收第一限值,所述第一限值用于负载控制、拥塞控制、接入控制中的至少一种,接入控制可以是终端随机接入网络的控制;
该实施例中,所述第一限值为:预设位数的预设进制数值。比如,8位的16进制数值。
其中,所述第一限值的取值由所述预设位数的预设进制数值直接表示;或者所述第一限值的取值由系数和指数共同表示,所述系数由所述预设位数 中至少一位的预设进制数值表示,所述指数由所述预设位数中剩余的位数的预设进制数值表示;或者所述第一限值的取值由第一部分和第二部分组成,所述第一部分由至少一位0表示,第二部分由所述预设位数中剩余的位数的预设进制数值表示。
这里的第一限值与上述第一、二、三实施例中所述的第一限值的含义相同,上述实施例中的所有关于第一限值的释义均适用于该实施例中。
进一步的,该控制方法,还可以包括:
步骤32,从所述网络设备接收算法标识,所述算法标识用于标识一目标算法;
步骤33,根据所述目标算法或者预设算法对第一信息进行计算,得到第二限值。
这里的第二限值的含义以及计算方法均和上述第一、二、三实施例中的相同。这里的第二信息包括:第一字段和/或第二字段;具体的,根据所述目标算法或者预设算法对第二信息的第一字段和/或第二字段进行计算,得到第二限值。
这里的所述第一字段或第二字段为:固定长度或者可变长度的字段。
这里的第二字段可以为固定长度或者可变长度的预设进制的填充值。
这里的所述第一字段包括:确定第二限值时采用的算法标识信息、发送随机接入请求的时域资源信息、发送随机接入请求的时域资源编号、发送随机接入请求的频域资源信息、发送随机接入请求的频域资源编号、发送随机接入请求的前导码信息、发送随机接入请求的前导码编号、网络标识中的至少一种。
该实施例中,进一步,该方法还可以包括:
步骤34,在所述第二限值小于或者等于所述第一限值时,向网络设备发送携带第二限值的随机接入请求,或者,发送随机接入请求和第二限值。
进一步的,该方法还可以包括:步骤35,接收随机接入响应。
所述随机接入响应是:网络设备在所述第二限值小于或者等于所述第一限值时,向终端发送随机接入响应;或者,在所述第二限值大于或者等于所述第一限值时,向终端发送的。
该实施例中,所述随机接入响应中包括所述第二限值。
本公开的实施例中,进一步的,控制方法还可以包括:
步骤36,发送终端标识和/或第二信息;所述第二信息包括:第一字段和/或第二字段;
所述第一字段包括:确定第二限值时采用的算法标识信息、发送随机接入请求的时域资源信息、发送随机接入请求的时域资源编号、发送随机接入请求的频域资源信息、发送随机接入请求的频域资源编号、发送随机接入请求的前导码信息、发送随机接入请求的前导码编号、网络标识中的至少一种;
所述第二字段包括:确定第二限值时采用的预设进制的填充值。
本公开的实施例中,进一步的,控制方法还可以包括:
步骤37,接收连接建立完成消息或者发送随机接入请求成功消息;或者接收连接建立失败消息或者发送随机接入请求失败消息;
所述连接建立完成消息或者发送随机接入请求成功消息是网络设备在所述第二限值与第三限值相等时发送的;或者,在所述第三限值小于所述第一限值时发送的;或者,在所述第二限值小于或者等于所述第一限值,且所述第三限值与所述第二限值相等时发送的。
或者,所述连接建立完成消息或者发送随机接入请求成功消息是网络设备在所述第二限值大于所述第一限值时发送的;或者,在所述第二限值大于或者等于所述第一限值,且所述第三限值与所述第二限值相等时发送的。
所述连接建立失败消息或者发送随机接入请求失败消息是网络设备在所述第二限值与所述第三限值不等时发送的;或者,在所述第二限值大于或者等于所述第一限值时发送的;或者,在所述第二限值等于所述第三限值,且所述第二限值大于或者等于所述第一限值时发送的。
或者,所述连接建立失败消息或者发送随机接入请求失败消息是网络设备在所述第二限值小于或者等于所述第一限值时发送的;或者,在所述第二限值等于第三限值,且所述第二限值小于或者等于所述第一限值时,发送的。
需要说明的是,该实施例中的所有与上述网络设备的方法实施例中相同的用语以及相同的表述的含义均相同,上述所有实施例的具体实现方式也同样适用于该终端的实施例中,也能达到相同的技术效果。
该实施例中,终端利用算法标识对应的算法,通过调整第二字段的内容或者长度进行计算,获得满足接入条件(例如,第二限值小于第一限值)的第二限值,并发起随机接入请求,这样可以使终端能够接入,不会发生拥塞。
网络设备校验终端的随机接入请求携带的第二限值,可一次性的检验是否为符合算法要求产生的数值,可有效避免终端采取伪随机方法来欺骗网络获得优先随机接入的欺诈行为。
本公开的上述实施例所述的方法协议流程改变和信令开销较小,可用性较强。
如图4所示,与上述第一、二、三实施例相对应的,本公开的第五实施例还提供一种网络设备40,包括:
收发机,用于发送第一限值,所述第一限值用于负载控制、拥塞控制、接入控制中的至少一种。
其中,所述收发机还用于:发送算法标识,所述算法标识对应的算法是终端计算第二限值采用的目标算法。
其中,所述收发机还用于:接收终端发送的携带第二限值的随机接入请求,或者,随机接入请求和第二限值。
其中,所述收发机还用于:在所述第二限值小于或者等于所述第一限值时,向终端发送随机接入响应;或者,
在所述第二限值大于或者等于所述第一限值时,向终端发送随机接入响应。
其中,控制方法还包括:所述收发机还用于:接收终端发送的终端标识和/或第二信息;所述第二信息包括:第一字段和/或第二字段;
所述第一字段包括:确定第二限值时采用的算法标识信息、发送随机接入请求的时域资源信息、发送随机接入请求的时域资源编号、发送随机接入请求的频域资源信息、发送随机接入请求的频域资源编号、发送随机接入请求的前导码信息、发送随机接入请求的前导码编号、网络标识中的至少一种;
所述第二字段包括:确定第二限值时采用的预设进制的填充值。
其中,网络设备还包括:处理器,用于采用所述算法标识对应的目标算法或者预设算法对所述终端标识和/或第二信息进行计算,得到第三限值;
所述算法标识对应的目标算法或者预设算法包括:单向函数算法、散列函数算法和椭圆函数算法中的一种。
其中,所述收发机还用于:在所述第二限值与第三限值相等时,向终端发送连接建立完成消息或者发送随机接入请求成功消息;或者,
在所述第三限值小于所述第一限值时,向终端发送连接建立完成消息或者发送随机接入请求成功消息;或者,
在所述第二限值小于或者等于所述第一限值,且所述第三限值与所述第二限值相等时,向终端发送连接建立完成消息或者发送随机接入请求成功消息。
其中,所述收发机还用于:在所述第二限值大于所述第一限值时,向终端发送连接建立完成消息或者发送随机接入请求成功消息;或者,
在所述第二限值大于或者等于所述第一限值,且所述第三限值与所述第二限值相等时,向终端发送连接建立完成消息或者发送随机接入请求成功消息。
其中,所述收发机还用于:在所述第二限值与所述第三限值不等时,向终端发送连接建立失败消息或者发送随机接入请求失败消息;或者,
在所述第二限值大于或者等于所述第一限值时,向终端发送连接建立失败消息或者发送随机接入请求失败消息;或者,
在所述第二限值等于所述第三限值,且所述第二限值大于或者等于所述第一限值时,向终端发送连接建立失败消息或者发送随机接入请求失败消息。
其中,所述收发机还用于:在所述第二限值小于或者等于所述第一限值时,发送连接建立失败消息或发送随机接入请求失败消息;或者,
在所述第二限值等于第三限值,且所述第二限值小于或者等于所述第一限值时,发送连接建立失败消息或发送随机接入请求失败消息。
需要说明的是,上述第一、二以及三实施例所述的方法的所有实现方式均适用于该网络设备的实施例中,也能达到相同的技术效果。且进一步的,该网络设备的实施例中,网络设备还可以包括存储器,收发机与处理器通过总线接口或者接口通信连接,收发机与存储器也可以通过总线接口或者接口通信连接。上述收发机的功能,也可以由处理器实现。
如图5所示,本公开的实施例还提供一种终端50,包括:
收发机,用于接收第一限值;所述第一限值用于负载控制、拥塞控制、接入控制中的至少一种。
其中,所述收发机还用于:接收算法标识。
其中,终端还包括:处理器,用于根据所述算法标识对应的目标算法或者预设算法对终端标识和/或第一信息进行计算,得到第二限值。
其中,所述收发机具体用于:在第二限值小于或者等于所述第一限值时,发送携带第二限值的随机接入请求,或者,发送随机接入请求和所述第二限值;或者,
在第二限值大于或者等于所述第一限值时,发送携带第二限值的随机接入请求,或者,发送随机接入请求和所述第二限值。
其中,所述收发机还用于:接收随机接入响应;
所述随机接入响应是:网络设备在所述第二限值小于或者等于所述第一限值时,向终端发送随机接入响应;或者,在所述第二限值大于或者等于所述第一限值时,向终端发送的。
其中,所述随机接入响应中包括所述第二限值。
其中,终端还包括:发送终端标识和/或第二信息;所述第二信息包括:第一字段和/或第二字段;
所述第一字段包括:确定第二限值时采用的算法标识信息、发送随机接入请求的时域资源信息、发送随机接入请求的时域资源编号、发送随机接入请求的频域资源信息、发送随机接入请求的频域资源编号、发送随机接入请求的前导码信息、发送随机接入请求的前导码编号、网络标识中的至少一种;
所述第二字段包括:确定第二限值时采用的预设进制的填充值。
其中,所述收发机还用于:接收连接建立完成消息或者发送随机接入请求成功消息;
所述连接建立完成消息或者发送随机接入请求成功消息是网络设备在所述第二限值与第三限值相等时发送的;或者,在所述第三限值小于所述第一限值时发送的;或者,在所述第二限值小于或者等于所述第一限值,且所述第三限值与所述第二限值相等时发送的。
其中,所述收发机还用于:接收连接建立完成消息或者发送随机接入请求成功消息;
所述连接建立完成消息或者发送随机接入请求成功消息是网络设备在所述第二限值大于所述第一限值时发送的;或者,在所述第二限值大于或者等于所述第一限值,且所述第三限值与所述第二限值相等时发送的。
其中,所述收发机还用于:接收连接建立失败消息或者发送随机接入请求失败消息;
所述连接建立失败消息或者发送随机接入请求失败消息是网络设备在所述第二限值与所述第三限值不等时发送的;或者,在所述第二限值大于或者等于所述第一限值时发送的;或者,在所述第二限值等于所述第三限值,且所述第二限值大于或者等于所述第一限值时发送的。
其中,所述收发机还用于:接收连接建立失败消息或者发送随机接入请求失败消息;
所述连接建立失败消息或者发送随机接入请求失败消息是网络设备在所述第二限值小于或者等于所述第一限值时发送的;或者,在所述第二限值等于第三限值,且所述第二限值小于或者等于所述第一限值时,发送的。
需要说明的是,上述第四实施例所述的方法的所有实现方式均适用于该终端的实施例中,也能达到相同的技术效果。且进一步的,该终端的实施例中,终端还可以包括存储器,收发机与处理器通过总线接口或者接口通信连接,收发机与存储器也可以通过总线接口或者接口通信连接。上述收发机的功能,也可以由处理器实现。本公开的终端还可以包括实现上述方法的其它部件,如用户接口。
本公开的实施例还提供一种控制方法,包括:
步骤510,网络设备发送第一限值,所述第一限值用于负载控制、拥塞控制、接入控制中的至少一种;
步骤511,终端接收所述第一限值;
步骤512,终端确定第二限值,在所述第二限值小于或者等于所述第一限值时,向网络设备发送携带第二限值的随机接入请求,或者,随机接入请求和第二限值;或者,在所述第二限值大于或者等于所述第一限值时,向网 络设备发送携带第二限值的随机接入请求,或者,随机接入请求和第二限值;
步骤513,网络设备接收所述携带第二限值的随机接入请求,或者,随机接入请求和第二限值;
步骤514,网络设备在所述第二限值小于或者等于所述第一限值时,发送随机接入响应;或者,在所述第二限值大于或者等于所述第一限值时,发送随机接入响应。
进一步的,该控制方法,还可以包括:
步骤515,终端发送终端标识和/或第二信息;
步骤516,网络设备向终端发送连接建立完成消息或者发送随机接入请求成功消息;或者向终端发送连接建立失败消息或者发送随机接入请求失败消息。
需要说明的是,上述网络设备侧的以及终端侧的所有方法的实施例的实现方式均适用于该实施例中,也能达到相同的技术效果,在此不再赘述。
如图6所示,本公开的一种通信设备60,包括:处理器62、存储有计算机程序的存储器63,所述计算机程序被处理器62运行时,执行如上述实施例所述的方法。
需要说明的是,该通信设备可以是上述的网络设备,也可以是上述的终端,该通信设备还可以包括:收发机61,与处理器62通过总线接口或者接口通信连接,收发机61与存储器63也可以通过总线接口或者接口通信连接。上述收发机的功能,也可以由处理器实现。本公开的通信设备还可以包括实现上述方法的其它部件,上述方法实施例中的所有实现方式均适用于该通信设备的实施例中,也能达到相同的技术效果。该通信设备可以是上述实施例中所述终端,也可以是上述实施例中所述的网络设备,如基站。
本公开的实施例还提供一种计算机可读存储介质,包括指令,当所述指令在计算机运行时,使得计算机执行如上所述的方法。
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方 法来实现所描述的功能,但是这种实现不应认为超出本公开的范围。
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
在本公开所提供的实施例中,应该理解到,所揭露的装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本公开各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。
所述功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本公开的技术方案本质上或者说对相关技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本公开各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、ROM、RAM、磁碟或者光盘等各种可以存储程序代码的介质。
此外,需要指出的是,在本公开的装置和方法中,显然,各部件或各步骤是可以分解和/或重新组合的。这些分解和/或重新组合应视为本公开的等效方案。并且,执行上述系列处理的步骤可以自然地按照说明的顺序按时间顺 序执行,但是并不需要一定按照时间顺序执行,某些步骤可以并行或彼此独立地执行。对本领域的普通技术人员而言,能够理解本公开的方法和装置的全部或者任何步骤或者部件,可以在任何计算装置(包括处理器、存储介质等)或者计算装置的网络中,以硬件、固件、软件或者它们的组合加以实现,这是本领域普通技术人员在阅读了本公开的说明的情况下运用他们的基本编程技能就能实现的。
因此,本公开的目的还可以通过在任何计算装置上运行一个程序或者一组程序来实现。所述计算装置可以是公知的通用装置。因此,本公开的目的也可以仅仅通过提供包含实现所述方法或者装置的程序代码的程序产品来实现。也就是说,这样的程序产品也构成本公开,并且存储有这样的程序产品的存储介质也构成本公开。显然,所述存储介质可以是任何公知的存储介质或者将来所开发出来的任何存储介质。还需要指出的是,在本公开的装置和方法中,显然,各部件或各步骤是可以分解和/或重新组合的。这些分解和/或重新组合应视为本公开的等效方案。并且,执行上述系列处理的步骤可以自然地按照说明的顺序按时间顺序执行,但是并不需要一定按照时间顺序执行。某些步骤可以并行或彼此独立地执行。
以上所述是本公开的可选实施方式,应当指出,对于本技术领域的普通技术人员来说,在不脱离本公开所述原理的前提下,还可以作出若干改进和润饰,这些改进和润饰也应视为本公开的保护范围。

Claims (66)

  1. 一种控制方法,包括:
    发送第一限值,所述第一限值用于负载控制、拥塞控制、接入控制中的至少一种。
  2. 根据权利要求1所述的控制方法,其中,所述第一限值为:预设位数的预设进制数值。
  3. 根据权利要求2所述的控制方法,其中,
    所述第一限值的取值由所述预设位数的预设进制数值直接表示;或者,
    所述第一限值的取值由系数和指数共同表示,所述系数由所述预设位数中至少一位的预设进制数值表示,所述指数由所述预设位数中剩余的位数的预设进制数值表示;或者,
    所述第一限值的取值由第一部分和第二部分组成,所述第一部分由至少一位0表示,所述第二部分由所述预设位数中剩余的位数的预设进制数值表示。
  4. 根据权利要求1所述的控制方法,其中,发送第一限值的步骤,包括:
    根据接入类型、终端协议版本、类别、QoS要求、接入请求类型、终端品牌和/或终端型号,发送对应的第一限值。
  5. 根据权利要求1所述的控制方法,还包括:
    发送算法标识,所述算法标识对应的算法是终端计算第二限值采用的目标算法。
  6. 根据权利要求5所述的控制方法,其中,所述第一限值和/或所述算法标识是动态配置或者周期性配置的。
  7. 根据权利要求1或6所述的控制方法,其中,
    根据网络设备的负载配置所述第一限值和/或所述算法标识;或者,
    根据第一时间窗口内接收到的随机接入请求的数目或者根据第二时间窗口内接入的随机接入请求的数目的预测值配置所述第一限值和/或所述算法标识。
  8. 根据权利要求7所述的控制方法,其中,根据网络设备的负载配置所 述第一限值,包括:
    在所述网络设备的负载大于第一门限值时,将所述第一限值调低至少一个调整阶梯;或者
    在所述网络设备的负载小于第二门限值时,将所述第一限值调高至少一个调整阶梯。
  9. 根据权利要求7所述的控制方法,其中,根据网络设备的负载配置所述算法标识,包括:
    在所述网络设备的负载大于第三门限值时,改变算法标识;或者
    在所述网络设备的负载小于第四门限值时,改变算法标识。
  10. 根据权利要求7所述的控制方法,其中,根据第一时间窗口内接收到的随机接入请求的数目或者根据第二时间窗口内接入的随机接入请求的数目的预测值配置所述第一限值,包括:
    在第一时间窗口内接收到的随机接入请求的数目小于第五门限值或者在第二时间窗口内接收的随机接入请求的数目的预测值小于第六门限值时,将所述第一限值调高至少一个调整阶梯;或者,
    在第一时间窗口内接收到的随机接入请求的数目大于第七门限值或者在第二时间窗口内接收的随机接入请求的数目的预测值大于第八门限值时,将所述第一限值调低至少一个调整阶梯。
  11. 根据权利要求7所述的控制方法,其中,根据第一时间窗口内接收到的随机接入请求的数目或者根据第二时间窗口内接入的随机接入请求的数目的预测值配置所述算法标识,包括:
    在第一时间窗口内接收到的随机接入请求的数目小于第九门限值或者在第二时间窗口内接收的随机接入请求的数目的预测值小于第十门限值时,改变算法标识;或者
    在第一时间窗口内接收到的随机接入请求的数目大于第十一门限值或者在第二时间窗口内接收的随机接入请求的数目的预测值大于第十二门限值时,改变算法标识。
  12. 根据权利要求1或5所述的控制方法,还包括:
    接收终端发送的携带第二限值的随机接入请求,或者,随机接入请求和 第二限值。
  13. 根据权利要求12所述的控制方法,其中,所述第二限值是终端根据算法标识对应的目标算法或者预设算法对终端标识和/或第一信息进行计算得到的。
  14. 根据权利要求13所述的控制方法,其中,所述第一信息包括:第一字段和/或第二字段;
    所述第二限值是终端根据所述算法标识对应的目标算法或者预设算法对所述终端标识和/或所述第一信息的第一字段和/或第二字段进行计算得到的。
  15. 根据权利要求14所述的控制方法,其中,
    所述第一字段或第二字段为:固定长度或者可变长度的字段;或者
    所述第二字段为预设进制的填充值。
  16. 根据权利要求14所述的控制方法,其中,
    所述第一字段包括:确定第二限值时采用的算法标识信息、发送随机接入请求的时域资源信息、发送随机接入请求的时域资源编号、发送随机接入请求的频域资源信息、发送随机接入请求的频域资源编号、发送随机接入请求的前导码信息、发送随机接入请求的前导码编号、网络标识中的至少一种。
  17. 根据权利要求12所述的控制方法,其中,
    所述携带第二限值的随机接入请求,或者,随机接入请求和第二限值是在所述第二限值小于或者等于所述第一限值的情况下发送的;或者,
    所述携带第二限值的随机接入请求,或者,随机接入请求和第二限值是在所述第二限值大于或者等于所述第一限值的情况下发送的。
  18. 根据权利要求12所述的控制方法,还包括:
    在所述第二限值小于或者等于所述第一限值时,向终端发送随机接入响应;或者,
    在所述第二限值大于或者等于所述第一限值时,向终端发送随机接入响应。
  19. 根据权利要求18所述的控制方法,其中,所述随机接入响应中包括所述第二限值。
  20. 根据权利要求18所述的控制方法,还包括:
    接收终端发送的终端标识和/或第二信息;所述第二信息包括:第一字段和/或第二字段;
    所述第一字段包括:确定第二限值时采用的算法标识信息、发送随机接入请求的时域资源信息、发送随机接入请求的时域资源编号、发送随机接入请求的频域资源信息、发送随机接入请求的频域资源编号、发送随机接入请求的前导码信息、发送随机接入请求的前导码编号、网络标识中的至少一种;
    所述第二字段包括:确定第二限值时采用的预设进制的填充值。
  21. 根据权利要求20所述的控制方法,还包括:
    采用所述算法标识对应的目标算法或者预设算法对所述终端标识和/或第二信息进行计算,得到第三限值;
    所述算法标识对应的目标算法或者预设算法包括:单向函数算法、散列函数算法和椭圆函数算法中的一种。
  22. 根据权利要求21所述的控制方法,还包括:
    在所述第二限值与第三限值相等时,向终端发送连接建立完成消息或者发送随机接入请求成功消息;或者,
    在所述第三限值小于所述第一限值时,向终端发送连接建立完成消息或者发送随机接入请求成功消息;或者,
    在所述第二限值小于或者等于所述第一限值,且所述第三限值与所述第二限值相等时,向终端发送连接建立完成消息或者发送随机接入请求成功消息。
  23. 根据权利要求21所述的控制方法,还包括:
    在所述第二限值大于所述第一限值时,向终端发送连接建立完成消息或者发送随机接入请求成功消息;或者,
    在所述第二限值大于或者等于所述第一限值,且所述第三限值与所述第二限值相等时,向终端发送连接建立完成消息或者发送随机接入请求成功消息。
  24. 根据权利要求21所述的控制方法,还包括:
    在所述第二限值与所述第三限值不等时,向终端发送连接建立失败消息或者发送随机接入请求失败消息;或者,
    在所述第二限值大于或者等于所述第一限值时,向终端发送连接建立失败消息或者发送随机接入请求失败消息;或者,
    在所述第二限值等于所述第三限值,且所述第二限值大于或者等于所述第一限值时,向终端发送连接建立失败消息或者发送随机接入请求失败消息。
  25. 根据权利要求21所述的控制方法,还包括:
    在所述第二限值小于或者等于所述第一限值时,发送连接建立失败消息或发送随机接入请求失败消息;或者,
    在所述第二限值等于第三限值,且所述第二限值小于或者等于所述第一限值时,发送连接建立失败消息或发送随机接入请求失败消息。
  26. 一种控制方法,包括:
    接收第一限值;所述第一限值用于负载控制、拥塞控制、接入控制中的至少一种。
  27. 根据权利要求26所述的控制方法,其中,所述第一限值为:预设位数的预设进制数值。
  28. 根据权利要求27所述的控制方法,其中,
    所述第一限值的取值由所述预设位数的预设进制数值直接表示;或者,
    所述第一限值的取值由系数和指数共同表示,所述系数由所述预设位数中至少一位的预设进制数值表示,所述指数由所述预设位数中剩余的位数的预设进制数值表示;或者,
    所述第一限值的取值由第一部分和第二部分组成,所述第一部分由至少一位0表示,所述第二部分由所述预设位数中剩余的位数的预设进制数值表示。
  29. 根据权利要求26所述的控制方法,还包括:
    接收算法标识。
  30. 根据权利要求26或29所述的控制方法,还包括:
    根据所述算法标识对应的目标算法或者预设算法对终端标识和/或第一信息进行计算,得到第二限值。
  31. 根据权利要求30所述的控制方法,其中,所述第一信息包括:第一字段和/或第二字段;
    所述第二限值是终端根据所述算法标识对应的目标算法或者预设算法对所述终端标识和/或所述第一信息的第一字段和/或第二字段进行计算得到的。
  32. 根据权利要求31所述的控制方法,其中,所述第一字段或第二字段为:固定长度或者可变长度的字段;或者
    所述第二字段为预设进制的填充值。
  33. 根据权利要求31所述的控制方法,其中,所述第一字段包括:确定第二限值时采用的算法标识信息、发送随机接入请求的时域资源信息、发送随机接入请求的时域资源编号、发送随机接入请求的频域资源信息、发送随机接入请求的频域资源编号、发送随机接入请求的前导码信息、发送随机接入请求的前导码编号、网络标识中的至少一种。
  34. 根据权利要求31所述的控制方法,还包括:
    在第二限值小于或者等于所述第一限值时,发送携带第二限值的随机接入请求,或者,发送随机接入请求和所述第二限值;或者,
    在第二限值大于或者等于所述第一限值时,发送携带第二限值的随机接入请求,或者,发送随机接入请求和所述第二限值。
  35. 根据权利要求34所述的控制方法,还包括:
    接收随机接入响应;
    所述随机接入响应是:网络设备在所述第二限值小于或者等于所述第一限值时,向终端发送随机接入响应;或者,在所述第二限值大于或者等于所述第一限值时,向终端发送的。
  36. 根据权利要求35所述的控制方法,其中,所述随机接入响应中包括所述第二限值。
  37. 根据权利要求35所述的控制方法,还包括:
    发送终端标识和/或第二信息;所述第二信息包括:第一字段和/或第二字段;
    所述第一字段包括:确定第二限值时采用的算法标识信息、发送随机接入请求的时域资源信息、发送随机接入请求的时域资源编号、发送随机接入请求的频域资源信息、发送随机接入请求的频域资源编号、发送随机接入请求的前导码信息、发送随机接入请求的前导码编号、网络标识中的至少一种;
    所述第二字段包括:确定第二限值时采用的预设进制的填充值。
  38. 根据权利要求37所述的控制方法,还包括:
    接收连接建立完成消息或者发送随机接入请求成功消息;
    所述连接建立完成消息或者发送随机接入请求成功消息是网络设备在所述第二限值与第三限值相等时发送的;或者,在所述第三限值小于所述第一限值时发送的;或者,在所述第二限值小于或者等于所述第一限值,且所述第三限值与所述第二限值相等时发送的。
  39. 根据权利要求37所述的控制方法,还包括:
    接收连接建立完成消息或者发送随机接入请求成功消息;
    所述连接建立完成消息或者发送随机接入请求成功消息是网络设备在所述第二限值大于所述第一限值时发送的;或者,在所述第二限值大于或者等于所述第一限值,且所述第三限值与所述第二限值相等时发送的。
  40. 根据权利要求37所述的控制方法,还包括:
    接收连接建立失败消息或者发送随机接入请求失败消息;
    所述连接建立失败消息或者发送随机接入请求失败消息是网络设备在所述第二限值与所述第三限值不等时发送的;或者,在所述第二限值大于或者等于所述第一限值时发送的;或者,在所述第二限值等于所述第三限值,且所述第二限值大于或者等于所述第一限值时发送的。
  41. 根据权利要求37所述的控制方法,还包括:
    接收连接建立失败消息或者发送随机接入请求失败消息;
    所述连接建立失败消息或者发送随机接入请求失败消息是网络设备在所述第二限值小于或者等于所述第一限值时发送的;或者,在所述第二限值等于第三限值,且所述第二限值小于或者等于所述第一限值时,发送的。
  42. 一种网络设备,包括:
    收发机,用于发送第一限值,所述第一限值用于负载控制、拥塞控制、接入控制中的至少一种。
  43. 根据权利要求42所述的网络设备,其中,所述收发机还用于:发送算法标识,所述算法标识对应的算法是终端计算第二限值采用的目标算法。
  44. 根据权利要求42或43所述的网络设备,其中,所述收发机还用于: 接收终端发送的携带第二限值的随机接入请求,或者,随机接入请求和第二限值。
  45. 根据权利要求44所述的网络设备,其中,所述收发机还用于:
    在所述第二限值小于或者等于所述第一限值时,向终端发送随机接入响应;或者,
    在所述第二限值大于或者等于所述第一限值时,向终端发送随机接入响应。
  46. 根据权利要求44所述的网络设备,其中,所述收发机还用于:接收终端发送的终端标识和/或第二信息;所述第二信息包括:第一字段和/或第二字段;
    所述第一字段包括:确定第二限值时采用的算法标识信息、发送随机接入请求的时域资源信息、发送随机接入请求的时域资源编号、发送随机接入请求的频域资源信息、发送随机接入请求的频域资源编号、发送随机接入请求的前导码信息、发送随机接入请求的前导码编号、网络标识中的至少一种;
    所述第二字段包括:确定第二限值时采用的预设进制的填充值。
  47. 根据权利要求45或46所述的网络设备,还包括:
    处理器,用于采用所述算法标识对应的目标算法或者预设算法对所述终端标识和/或第二信息进行计算,得到第三限值;
    所述算法标识对应的目标算法或者预设算法包括:单向函数算法、散列函数算法和椭圆函数算法中的一种。
  48. 根据权利要求47所述的网络设备,其中,所述收发机还用于:
    在所述第二限值与第三限值相等时,向终端发送连接建立完成消息或者发送随机接入请求成功消息;或者,
    在所述第三限值小于所述第一限值时,向终端发送连接建立完成消息或者发送随机接入请求成功消息;或者,
    在所述第二限值小于或者等于所述第一限值,且所述第三限值与所述第二限值相等时,向终端发送连接建立完成消息或者发送随机接入请求成功消息。
  49. 根据权利要求47所述的网络设备,其中,所述收发机还用于:
    在所述第二限值大于所述第一限值时,向终端发送连接建立完成消息或者发送随机接入请求成功消息;或者,
    在所述第二限值大于或者等于所述第一限值,且所述第三限值与所述第二限值相等时,向终端发送连接建立完成消息或者发送随机接入请求成功消息。
  50. 根据权利要求47所述的网络设备,其中,所述收发机还用于:
    在所述第二限值与所述第三限值不等时,向终端发送连接建立失败消息或者发送随机接入请求失败消息;或者,
    在所述第二限值大于或者等于所述第一限值时,向终端发送连接建立失败消息或者发送随机接入请求失败消息;或者,
    在所述第二限值等于所述第三限值,且所述第二限值大于或者等于所述第一限值时,向终端发送连接建立失败消息或者发送随机接入请求失败消息。
  51. 根据权利要求47所述的网络设备,其中,所述收发机还用于:
    在所述第二限值小于或者等于所述第一限值时,发送连接建立失败消息或发送随机接入请求失败消息;或者,
    在所述第二限值等于第三限值,且所述第二限值小于或者等于所述第一限值时,发送连接建立失败消息或发送随机接入请求失败消息。
  52. 一种终端,包括:
    收发机,用于接收第一限值;所述第一限值用于负载控制、拥塞控制、接入控制中的至少一种。
  53. 根据权利要求52所述的终端,其中,
    所述收发机还用于:接收算法标识。
  54. 根据权利要求53所述的终端,还包括:
    处理器,用于根据所述算法标识对应的目标算法或者预设算法对终端标识和/或第一信息进行计算,得到第二限值。
  55. 根据权利要求54所述的终端,其中,所述收发机具体用于:在第二限值小于或者等于所述第一限值时,发送携带第二限值的随机接入请求,或者,发送随机接入请求和所述第二限值;或者,
    在第二限值大于或者等于所述第一限值时,发送携带第二限值的随机接 入请求,或者,发送随机接入请求和所述第二限值。
  56. 根据权利要求55所述的终端,其中,所述收发机还用于:接收随机接入响应;
    所述随机接入响应是:网络设备在所述第二限值小于或者等于所述第一限值时,向终端发送随机接入响应;或者,在所述第二限值大于或者等于所述第一限值时,向终端发送的。
  57. 根据权利要求56所述的终端,其中,所述随机接入响应中包括所述第二限值。
  58. 根据权利要求56所述的终端,还包括:
    发送终端标识和/或第二信息;所述第二信息包括:第一字段和/或第二字段;
    所述第一字段包括:确定第二限值时采用的算法标识信息、发送随机接入请求的时域资源信息、发送随机接入请求的时域资源编号、发送随机接入请求的频域资源信息、发送随机接入请求的频域资源编号、发送随机接入请求的前导码信息、发送随机接入请求的前导码编号、网络标识中的至少一种;
    所述第二字段包括:确定第二限值时采用的预设进制的填充值。
  59. 根据权利要求58所述的终端,其中,所述收发机还用于:
    接收连接建立完成消息或者发送随机接入请求成功消息;
    所述连接建立完成消息或者发送随机接入请求成功消息是网络设备在所述第二限值与第三限值相等时发送的;或者,在所述第三限值小于所述第一限值时发送的;或者,在所述第二限值小于或者等于所述第一限值,且所述第三限值与所述第二限值相等时发送的。
  60. 根据权利要求58所述的终端,其中,所述收发机还用于:接收连接建立完成消息或者发送随机接入请求成功消息;
    所述连接建立完成消息或者发送随机接入请求成功消息是网络设备在所述第二限值大于所述第一限值时发送的;或者,在所述第二限值大于或者等于所述第一限值,且所述第三限值与所述第二限值相等时发送的。
  61. 根据权利要求58所述的终端,其中,所述收发机还用于:接收连接建立失败消息或者发送随机接入请求失败消息;
    所述连接建立失败消息或者发送随机接入请求失败消息是网络设备在所述第二限值与所述第三限值不等时发送的;或者,在所述第二限值大于或者等于所述第一限值时发送的;或者,在所述第二限值等于所述第三限值,且所述第二限值大于或者等于所述第一限值时发送的。
  62. 根据权利要求58所述的终端,其中,所述收发机还用于:接收连接建立失败消息或者发送随机接入请求失败消息;
    所述连接建立失败消息或者发送随机接入请求失败消息是网络设备在所述第二限值小于或者等于所述第一限值时发送的;或者,在所述第二限值等于第三限值,且所述第二限值小于或者等于所述第一限值时发送的。
  63. 一种控制方法,包括:
    网络设备发送第一限值,所述第一限值用于负载控制、拥塞控制、接入控制中的至少一种;
    终端接收所述第一限值;
    终端确定第二限值,在所述第二限值小于或者等于所述第一限值时,向网络设备发送携带第二限值的随机接入请求,或者,随机接入请求和第二限值;或者,在所述第二限值大于或者等于所述第一限值时,向网络设备发送携带第二限值的随机接入请求,或者,随机接入请求和第二限值;
    网络设备接收所述携带第二限值的随机接入请求,或者,随机接入请求和第二限值;
    网络设备在所述第二限值小于或者等于所述第一限值时,发送随机接入响应;或者,在所述第二限值大于或者等于所述第一限值时,发送随机接入响应。
  64. 根据权利要求63所述的控制方法,还包括:
    终端发送终端标识和/或第二信息;
    网络设备向终端发送连接建立完成消息或者发送随机接入请求成功消息;或者向终端发送连接建立失败消息或者发送随机接入请求失败消息。
  65. 一种通信设备,包括:处理器、存储有计算机程序的存储器,所述计算机程序被处理器运行时,执行如权利要求1至25任一项所述的方法或者26至41任一项所述的方法。
  66. 一种计算机可读存储介质,包括指令,当所述指令在计算机运行时,使得计算机执行如权利要求1至25任一项所述的方法或者26至41任一项所述的方法。
PCT/CN2019/080773 2018-04-28 2019-04-01 控制方法、网络设备和终端 WO2019205893A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US17/050,232 US11805553B2 (en) 2018-04-28 2019-04-01 Control method, network device, and terminal

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201810402062.3A CN110418371B (zh) 2018-04-28 2018-04-28 一种控制方法、网络设备和终端
CN201810402062.3 2018-04-28

Publications (1)

Publication Number Publication Date
WO2019205893A1 true WO2019205893A1 (zh) 2019-10-31

Family

ID=68294884

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/080773 WO2019205893A1 (zh) 2018-04-28 2019-04-01 控制方法、网络设备和终端

Country Status (3)

Country Link
US (1) US11805553B2 (zh)
CN (1) CN110418371B (zh)
WO (1) WO2019205893A1 (zh)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110691420A (zh) * 2019-09-30 2020-01-14 东南大学 一种基于防作弊随机数的新型物联网接入方式
CN114222375B (zh) * 2021-12-16 2024-01-12 东南大学 一种区块链无线网络的随机接入动态控制方法

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101114873A (zh) * 2006-07-26 2008-01-30 华为技术有限公司 一种随机接入过程中的负载控制方法及装置
CN101848495A (zh) * 2009-03-27 2010-09-29 中兴通讯股份有限公司 随机接入处理方法和处理系统
CN102740374A (zh) * 2011-04-01 2012-10-17 中兴通讯股份有限公司 接入控制方法及系统
CN102740493A (zh) * 2011-04-02 2012-10-17 中兴通讯股份有限公司 终端接入控制调整方法及系统
CN105792382A (zh) * 2016-05-24 2016-07-20 电子科技大学 一种基于acb的海量终端接入过载控制方法

Family Cites Families (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101222756A (zh) * 2007-01-12 2008-07-16 鼎桥通信技术有限公司 一种随机接入方法及系统
US20120163512A1 (en) * 2009-11-06 2012-06-28 Niklas Johansson Processing nodes and methods of estimating interference in a radio telecommunication network
US9137733B2 (en) * 2011-03-15 2015-09-15 At&T Mobility Ii Llc Dynamic control of cell reselection parameters
EP2733966B8 (en) * 2012-11-15 2018-05-23 Deutsche Telekom (UK) Limited Method for enhancing machine type communication between a mobile communication network and a machine type communication device
CN104796942A (zh) * 2015-04-20 2015-07-22 天津大学 一种基于LTE-Advanced系统的随机接入过载控制方法
CN105007594B (zh) * 2015-06-04 2018-06-15 重庆邮电大学 Lte-a异构网络中一种联合优化mlb与mro的方法
US10638405B2 (en) * 2016-01-08 2020-04-28 Telefonaktiebolaget Lm Ericsson (Publ) Access control in a network comprising network slices
EP3440864A1 (en) * 2016-04-06 2019-02-13 Sony Corporation Base station, virtual cell, user equipment
US10433343B2 (en) * 2016-07-28 2019-10-01 Asustek Computer Inc. Method and apparatus for improving random access procedure in a wireless communication system
US9888385B1 (en) * 2016-12-19 2018-02-06 Kwangwoon University Industry-Academic Collaboration Foundation Method for subscriber authentication in cellular IoT device, IoT device for subscriber authentication, and base station apparatus for subscriber authentication
US10813097B2 (en) * 2017-06-14 2020-10-20 Qualcomm Incorporated System and method for transmitting beam failure recovery request
WO2019006807A1 (zh) * 2017-07-07 2019-01-10 华为技术有限公司 随机接入的方法、终端设备和网络设备
MX2020003467A (es) * 2017-09-28 2020-08-03 Ericsson Telefon Ab L M Procedimiento de acceso aleatorio de haces multiples en ejecucion de traspaso.
CN110418335A (zh) * 2018-04-28 2019-11-05 中国移动通信有限公司研究院 一种信息处理方法、网络设备及终端
EP4091277A1 (en) * 2020-01-16 2022-11-23 Lenovo (Singapore) Pte. Ltd. Retransmitting a transport block with sidelink feedback not enabled
EP4040910A1 (en) * 2021-02-06 2022-08-10 Deutsche Telekom AG Contention based random access procedure for mobile communications

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101114873A (zh) * 2006-07-26 2008-01-30 华为技术有限公司 一种随机接入过程中的负载控制方法及装置
CN101848495A (zh) * 2009-03-27 2010-09-29 中兴通讯股份有限公司 随机接入处理方法和处理系统
CN102740374A (zh) * 2011-04-01 2012-10-17 中兴通讯股份有限公司 接入控制方法及系统
CN102740493A (zh) * 2011-04-02 2012-10-17 中兴通讯股份有限公司 终端接入控制调整方法及系统
CN105792382A (zh) * 2016-05-24 2016-07-20 电子科技大学 一种基于acb的海量终端接入过载控制方法

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
HUAWEI: "Add Use Case and definition for distribution of Total PRB Usage for UL/DL", 3GPP TSG-SA5 MEETING #118 S5-182117, 13 April 2018 (2018-04-13), XP051420886 *

Also Published As

Publication number Publication date
US11805553B2 (en) 2023-10-31
CN110418371A (zh) 2019-11-05
US20210084691A1 (en) 2021-03-18
CN110418371B (zh) 2021-08-06

Similar Documents

Publication Publication Date Title
US11310266B2 (en) Mobile communication method, apparatus, and device
US10848970B2 (en) Network authentication method, and related device and system
US11089520B2 (en) Session migration method and device
US11246033B2 (en) Authentication method, and related device and system
CN107835204B (zh) 配置文件策略规则的安全控制
US9590987B2 (en) Dynamic distribution of authentication sessions
WO2017166221A1 (zh) 无线接入控制方法、装置及系统
US10681546B2 (en) Processing method for sim card equipped terminal access to 3GPP network and apparatus
CN107809776B (zh) 信息处理方法、装置以及网络系统
TW201505464A (zh) 無線上網流量共用控制方法及系統
US10172003B2 (en) Communication security processing method, and apparatus
CN109327882B (zh) 接入控制方法、通信设备和具有存储功能的设备
WO2023283789A1 (zh) 一种安全通信方法及装置、终端设备、网络设备
WO2019205893A1 (zh) 控制方法、网络设备和终端
TWI751265B (zh) 接入方法和終端
WO2021008515A1 (zh) 网络切片架构下的数据传输的方法和装置
WO2021239098A1 (zh) 业务获取方法、装置、通信设备及可读存储介质
KR102047846B1 (ko) 통신 시스템에서 콘텐츠 제공 방법 및 장치
CN115836539A (zh) 通信方法、装置及系统
CN112219425B (zh) 调整功率的方法、终端设备、芯片和存储介质
EP4394666A1 (en) Framework for a machine learning model and/or machine learning application adaptation for a target in a communications network
WO2023044883A1 (zh) 一种通信方法及装置、通信设备
WO2024092838A1 (zh) 一种数据传输方法及装置
CN111385839B (zh) QoS配置方法、装置和通信系统以及存储介质
US20180295507A1 (en) Radio Device Hardware Security System for Wireless Spectrum Usage

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19792486

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 09/03/2021)

122 Ep: pct application non-entry in european phase

Ref document number: 19792486

Country of ref document: EP

Kind code of ref document: A1