WO2019218926A1 - 接入控制方法、通信设备以及基站 - Google Patents
接入控制方法、通信设备以及基站 Download PDFInfo
- Publication number
- WO2019218926A1 WO2019218926A1 PCT/CN2019/086210 CN2019086210W WO2019218926A1 WO 2019218926 A1 WO2019218926 A1 WO 2019218926A1 CN 2019086210 W CN2019086210 W CN 2019086210W WO 2019218926 A1 WO2019218926 A1 WO 2019218926A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- level
- access
- uac
- communication device
- uac parameter
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/02—Access restriction performed under specific conditions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/02—Access restriction performed under specific conditions
- H04W48/06—Access restriction performed under specific conditions based on traffic conditions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/08—Access restriction or access information delivery, e.g. discovery data delivery
- H04W48/10—Access restriction or access information delivery, e.g. discovery data delivery using broadcasted information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/08—Access restriction or access information delivery, e.g. discovery data delivery
- H04W48/12—Access restriction or access information delivery, e.g. discovery data delivery using downlink control channel
Definitions
- the present application relates to the field of communications, and in particular, to an access control method, a communication device, and a base station.
- Access control is a solution for controlling congestion on the network side.
- Access control barring (ACB) is a general term for access control in long term evolution (LTE) systems.
- Unified access control (unified access control) UAC) is a general term for access control in the fifth generation mobile communication system (5G), LTE system, and 5G core network (5GC).
- 5G fifth generation mobile communication system
- LTE long term evolution
- UAC Unified access control
- 5G fifth generation mobile communication system
- 5G fifth generation mobile communication system
- 5G fifth generation mobile communication system
- 5G core network 5G core network
- CE-level Coverage enhancement level
- CE-level is used to indicate the number of times the user equipment repeatedly accesses the communication network system.
- CE-level is often used for machine-type communication (MTC) or narrowband Internet of Things (narrow band internet). Of things, NB-IoT).
- MTC machine-type communication
- Narrow band internet narrowband Internet of Things
- NB-IoT narrowband Internet of Things
- the access control method currently used is to configure an access category (AC) and an access identity (AI) in the unified access barring (UAC) broadcast parameters.
- the user equipment maps the access attempt to the AC, maps the UE configuration to the access identifier AI, and combines the UAC parameters to determine whether the access of the user equipment is prohibited.
- the access control mechanism currently used in the 5G system is the same signaling used by any UE when attempting to access, so that the UE attempting to access may access the system if the resource is used. If the UE accesses the system too much, it will cause the 5G system to be overloaded.
- An embodiment of the present application provides an access control method for determining whether a UE access is prohibited according to a UAC parameter determined by a CE-level, thereby controlling a probability that a UE with high resource consumption accesses the communication network system.
- the first aspect of the embodiment of the present application provides an access control method, including:
- the UE may determine the first unified access control UAC parameter corresponding to the first CE-level according to the first coverage enhancement level CE-level, and then according to the first The UAC parameter determines whether the access of the UE is forbidden, that is, the UE determines, according to the first UAC parameter, whether the access attempt of the UE is prohibited. In the description of this article, whether access is forbidden is equivalent to whether the access attempt is forbidden, and will not be limited later.
- the embodiment of the present application has the following advantages: since the UE can determine the UAC parameter according to the CE-level when performing the access control, the CE-level has a low number of repetitions and consumes less resources, and CE- The level is high and the number of repetitions is high. Therefore, when the UE accesses the network, the UE can determine the corresponding CE-level according to the UAC parameters, so as to know the corresponding resource consumption, the resource consumption is large, and the UE accesses the communication network system. The time is forbidden, so that the probability of the UE with high resource consumption accessing the communication network system can be controlled, so that more UEs with low resource consumption can access the communication network system.
- the UE may be configured according to the first The second UAC parameter corresponding to the CE-level determines whether the access is prohibited, and the second CE-level is higher than the first CE-level.
- the UE may determine the first UAC parameter corresponding to the first CE-level by using the first CE-level, and after determining whether the UE access is prohibited according to the first UAC parameter, the UE passes the first CE.
- the -level is changed to the second CE-level to achieve successful access to the communication network, thus improving the achievability of the solution.
- the UE may determine, according to the first UAC parameter, Whether the access is forbidden; after the access timer expires, the UE may determine whether the access is prohibited according to the second UAC parameter corresponding to the second CE-level.
- the UE may determine the first UAC parameter corresponding to the first CE-level by using the first CE-level, and determine, by the UE, whether the access of the UE is prohibited according to the first UAC parameter, and the UE starts the access.
- the controller may determine, according to the UE, that the access controller reaches the preset threshold, and if the UE determines that the access controller reaches the preset threshold, the UE may determine the second according to the second CE-level.
- the second UAC parameter corresponding to the CE-level, the second CE-level level is higher than the first CE-level level, and then the UE determines whether the UE access is prohibited according to the second UAC parameter.
- the UE may determine the second UAC parameter corresponding to the second CE-level before the controller reaches the preset threshold.
- the UE may perform the access according to the second CE-level, and then after the UE sends the information of the first CE-level, the UE according to the first CE-level performs signaling transmission.
- the CE-level level is restored to the true CE-level level for signaling transmission, and the non-authentic CE-level signaling is not continued. Transmission, thus improving the achievability of the solution.
- the method further includes:
- the UE may determine the first access category AC according to the first CE-level and the access attempt type of the access, and then the UE determines, according to the first UAC parameter and the first AC, whether the access is Prohibited.
- the UE since the UE can determine the access of the UAC parameter and the AC is determined, the diversity of the solution is increased, and the flexibility of implementing the solution is improved.
- the method further includes:
- the UE configuration is the device type of the UE.
- the UE since the UE can determine the access of the UAC parameter and the AI, the versatility of the solution is increased, and the flexibility of implementing the solution is improved.
- the method further includes:
- the UE may determine whether the access of the UE is prohibited by using the UAC parameter corresponding to the first CE-level determined by the first CE-level, the first AC, and the first AI, because the first UAC is based on
- the first CE-level determines that the network system can control the access of the UE according to the CE-level of the UE.
- the CE-level high indicates that the number of CE-level repeated accesses is large, and the resources used are large. Incoming, other UEs are inaccessible, so UEs with high CE-levels may be barred with higher probability, so that more UEs can be accessed, so that access control can be made according to resources.
- the UAC parameters are separately configured for the UE to achieve more effective congestion control.
- the third UAC parameter is a complete set of parameters, and the third UAC parameter is incomplete.
- the UE may use the third UAC parameter corresponding to the third CE-level and the first CE-level. Determining the first UAC parameter.
- the incompleteness described here means that the value configured in the UAC parameter is not the true value of the UAC parameter (for example, a differential value may be configured), or it may be that the UAC parameter is configured to derive the UAC.
- the parameter value of the parameter (for example, may be a scaling factor value).
- the completeness described herein means that the base station is configured with a UAC parameter as defined in the following embodiments.
- the UE when the UE cannot directly learn the first UAC parameter corresponding to the first CE-level, the UE may determine the first UAC parameter by using the complete third UAC parameter configured for other CE-levels, so that the UE may be known.
- CE-level the base station configures different UAC parameters according to the CE-level of the UE. The effect is that if the CE-level is high, the base station can make the access of the UE more difficult by increasing the access probability value. Thereby saving resources and enabling more UEs to access.
- the UE may be configured according to the third UAC parameter, the first CE-level, and the The difference value between the third UAC parameter and the first UAC parameter determines the first UAC parameter.
- the UE may be configured according to the third UAC parameter, the first CE-level, and the ninth implementation manner.
- a scaling factor determines the first UAC parameter.
- the scaling factor may include a scaling factor configured by using a broadcast message, or a predefined scaling factor.
- a third aspect of the embodiments of the present application provides a base station, including:
- the base station may configure a first unified access control UAC parameter for the user equipment UE according to the first CE-level, and then, after the UE accesses according to the second CE-level, the base station receives the first sent by the UE CE-level information, where the base station performs signaling transmission according to the first CE-level, and the second CE-level is higher than the first CE-level.
- the base station may use the first CE-level information sent by the UE to perform signaling transmission according to the first CE-level information sent by the UE after the UE accesses the base station by using the second CE-level, thereby enabling the base station to perform signaling transmission according to the first CE-level information sent by the UE.
- the UE uses one CE-level access to be disabled, the UE attempts to access with other higher-level CE-levels, so that more UEs access the base station, which improves the usability of the base station.
- a third aspect of the embodiments of the present application provides an access control method, including:
- the UE may determine a first unified access control UAC parameter corresponding to the maximum transmit power according to the maximum transmit power, and then determine, according to the first UAC parameter, whether the access of the UE is prohibited.
- the UE can determine the UAC parameter according to the maximum transmit power when performing the access control, and the gear of the maximum transmit power corresponds to the CE-level level, the lower the maximum transmit power, the CE- The lower the level of the level, the lower the number of repetitions of the CE-level, the fewer resources consumed, the higher the number of repetitions of the CE-level, and the more resources consumed. Therefore, the UE can determine the UAC parameters when accessing the network. Corresponding CE-level, so as to know the corresponding resource consumption, the resource consumption is large, and the UE is more likely to be prohibited when accessing the communication network system, so that the UE with high resource consumption can be controlled to access the communication network system. Probability enables more low resource consumption UEs to access the communication network system.
- the UE may determine, according to the maximum transmit power and the access attempt type of the access, a first access category. AC, then the UE determines, according to the first UAC parameter and the first AC, whether the access is prohibited.
- the UE may determine, according to the maximum transmit power and the UE configuration, a first access identifier AI, the UE Determining whether the access is prohibited according to the first UAC parameter and the first AI.
- the UE may determine the first access according to the maximum transmit power and the UE configuration. Identifying AI, and then determining, by the UE, whether the access is prohibited according to the first UAC parameter, the first AC, and the first AI.
- the level of the maximum transmit power can be known not only by the first UAC parameter, but also the value of the first AC and the first AI itself represents the maximum transmit power, according to the first AC, the first AI, and
- the first UAC parameter determines whether the access is forbidden
- the UEs with different maximum transmit powers can be distinguished, so that the UEs with different maximum transmit powers can be adjusted according to the congestion on the network side, and the level can be used when the network side is congested.
- the low maximum transmit power is used for access attempts, so that less resource usage is used, thereby achieving the purpose of controlling network resource usage.
- the fourth embodiment of the third aspect of the present application or the fourth embodiment of the third aspect of the present application, And determining, by the UE, the first UAC parameter according to the second UAC parameter corresponding to the second maximum transmit power and the first maximum transmit power, where the first maximum transmit power is the maximum transmit power.
- the base station separately configures UAC parameters according to different maximum transmit powers, so that the base station can separately control access of UEs with different maximum transmit powers, and the resource usage of the UE with low maximum transmit power is generally large, so this method
- the base station can be controlled to control access of UEs with different resource usages, thereby enabling more UEs to access the network.
- the UE in the fifth implementation manner of the embodiment of the present application, may be configured according to the second UAC parameter, the first maximum transmit power, and the first The difference value between the two UAC parameters and the first UAC parameter determines the first UAC parameter.
- the UE may be determined according to the second UAC parameter, the first maximum transmit power, and a scaling factor.
- the first UAC parameter may be determined according to the second UAC parameter.
- the scaling factor may include configuring a scaling factor by using a broadcast message, or a predefined scaling factor.
- the predefined scaling factor may be according to the first maximum transmit power and the second maximum The transmission power is calculated.
- a fourth aspect of the embodiments of the present application provides a communication apparatus having a function of implementing the behavior of the communication apparatus in the first aspect and the third aspect described above.
- This function can be implemented in hardware or in hardware by executing the corresponding software.
- the hardware or software includes one or more modules corresponding to the functions described above.
- a fifth aspect of the embodiments of the present application provides a base station, which has a function of implementing the behavior of a base station in the foregoing second aspect.
- This function can be implemented in hardware or in hardware by executing the corresponding software.
- the hardware or software includes one or more modules corresponding to the functions described above.
- a sixth aspect of the embodiments of the present application provides a computer storage medium for storing computer software instructions for use in the communication device of the fourth aspect, including a program for executing a communication device.
- a seventh aspect of the embodiments of the present application provides a computer storage medium for storing computer software instructions for a base station of the fifth aspect, which includes a program for executing a base station.
- the eighth aspect of the embodiments of the present application provides a computer program product, the computer program product comprising computer software instructions, which can be loaded by a processor to implement the method flow in the third aspect of the first aspect.
- FIG. 1 is a schematic diagram of an embodiment of an access control method according to an embodiment of the present application
- FIG. 2 is a schematic diagram of another embodiment of an access control method according to an embodiment of the present application.
- FIG. 3 is a schematic diagram of another embodiment of an access control method according to an embodiment of the present application.
- FIG. 5 is a schematic diagram of another embodiment of an access control method according to an embodiment of the present application.
- FIG. 6 is a schematic diagram of another embodiment of an access control method according to an embodiment of the present application.
- FIG. 7 is a schematic diagram of an embodiment of a communication device according to an embodiment of the present application.
- FIG. 8 is a schematic diagram of an embodiment of a base station in an embodiment of the present application.
- An embodiment of the present application provides an access control method, which is used by a UE to determine whether an access of a UE is prohibited according to a UAC parameter determined by a CE-level, thereby controlling access of the UE, and improving UE accessing the communication network. number.
- the UE obtains the UAC parameters broadcasted by the network side (the base station is used as an example of the network side in the embodiment of the present application), and then determines the AC and AI configured according to the UAC parameters, and combines the UAC parameters to determine Whether the access of the UE is prohibited.
- the network side the base station is used as an example of the network side in the embodiment of the present application
- determines the AC and AI configured according to the UAC parameters and combines the UAC parameters to determine Whether the access of the UE is prohibited.
- Table 1 is a mapping table that maps an access attempt to an AC.
- the AC in the 5G system has a total of 64 types of access attempts. The AC mainly distinguishes the type of service corresponding to the access attempt. Among the 64 ACs, AC 8-31 is called standardized AC, which is reserved for future standard expansion.
- AC32-63 is the operator classified AC, which refers to the AC defined by the operator. Other ACs have clear corresponding services. For example, AC0 indicates an access attempt caused by paging, AC2 indicates an emergency call, and AC3 indicates an access attempt initiated by the UE itself. AC4, 5, 6, and 7 each have their own specific instructions.
- the UE When the UE maps the AC, it operates in this way: the UE determines what type of access attempt is, and maps to the corresponding AC according to the AC mapping table. For example, the UE determines that the access attempt is a paging initiated UE call, and therefore the access attempt corresponds to AC0. When judging by the UAC, the UE determines whether to initiate the access attempt considering the value of the AC.
- the UE configuration is a description of the device type of the UE, the configuration type of the UE, and the like, and is configured by the UE according to the characteristics of the UE itself or according to the registration information of the UE in the network.
- the registration information of the UE may indicate the configuration information of the UE for the multimedia priority service, or the configuration information of the UE for the key service service, or the UE to the public land mobile network (PLMN), the exclusive PLMN, Configuration information and the like in the PLMN list and the like.
- PLMN public land mobile network
- the AI is mainly a parameter that is distinguished according to the device type of the UE.
- AI3-10 is reserved for future extensions of the protocol.
- the AI11-15 is configurable by the operator.
- AI1 and 2 refer to that the UE device supports multimedia and the UE device supports key services.
- the AI can be configured in the form of a bitmap in the configuration on the network side.
- the length of the configured AI bitmap can be 7, which means that this bitmap limits whether the access corresponding to 7 AIs is disabled.
- a bitmap of length 7 limits AI 1, 2, 11, 12, 13, 14, and 15 AI.
- a 1 in the bitmap indicates that the access corresponding to the AI is not disabled, and 0 indicates that the AI corresponds. Access is prohibited.
- the UE corresponding to the AI indicated by the bitmap does not judge according to the probability value method when determining whether the access is prohibited. See the example in the following paragraph for details.
- the broadcast signaling of the UAC includes several Barring Info sets.
- the number of restricted packets can be 2, 4, or 8.
- the restricted packets can be applicable to all PLMNs. It can also be configured separately for each PLMN.
- the information configured in a restricted information group includes at least: a limit probability, a forbidden time, and an AI.
- the limit probability is a threshold for determining whether the UE can access.
- the forbidden time is used to calculate the length of time that is prohibited.
- the AI is a bitmap indicating whether access corresponding to a specific number of AIs is prohibited.
- This restricted information group can be represented by the identity of the restricted information group. There is a correspondence between the AC and the restriction information group. For example, for 64 ACs, there are restriction information groups corresponding to the respective ACs. If there are 8 restricted information resource groups (identified as 0, 1, 2, 7...), the configuration information on the network side is configured as follows:
- the AC2:set 3 indicates that the restriction information group corresponding to the AC identified by 2 is the restriction information group with the identifier 3.
- the association between the AC and the restricted information group is configured on the network side.
- the AC corresponding to set 3 (such as AC2) determines whether the attempted access is prohibited according to the configuration of set3.
- the probability in the above example is the limit probability, and time is the length of time that is prohibited.
- the UAC restriction information group may also be configured as follows: a common barringinfo set and N (N may have a value of 2, 4, 8) different restricted barring sets (different BarringInfo set).
- a restricted information group (whether it is a common Barring Info set or a different BarringInfo set), including the limit probability, the prohibition duration, and the corresponding AI (usually using bitmap bitmaps to indicate which AIs are prohibited).
- For an AC it corresponds to a Barring Info.
- This restriction group can also be a common restriction group, or it can be a different restriction group.
- the common restriction information group is applicable to one or more ACs, and can be used by multiple ACs by using one restriction information group, which is the reason why the common restriction information group is introduced, and indicates the access control of the one or more ACs.
- AC 1, 2, and 3 use a common restriction information group, and the common restriction information group includes at least the following parameters: a probability, a time, and an AI, when the UE corresponding to AC1 initiates the access, Based on the parameters configured in the common restriction information group, it is determined whether the access attempt corresponding to the access is prohibited. Similarly, the UE corresponding to AC2 and AC3 also determines whether the access is prohibited according to the common restricted information group.
- the configuration contents of different restriction information groups and common restriction information groups are different, and one or more ACs may also use one different restriction information group. Which ACs are configured on the network side correspond to different restricted information groups.
- the network side is configured with two different restriction information groups, and AC 4, 5 is configured corresponding to the first different restriction information group, and AC 6, 7 corresponds to the second different restriction information group, which means that AC4 and
- the UE of the AC5 determines whether the access is prohibited according to the first different restriction information group, and the UE corresponding to the AC6 and the AC7 determines whether the access is prohibited according to the second different restriction information group.
- Each restriction group can be used by one or more ACs.
- the advantage of configuring different common restricted information groups and different restricted information groups is that the common restricted information group supports multiple ACs to use the common restricted information group, saving configuration signaling. Different restriction information groups increase configuration diversity.
- any one of the above two configuration methods may be adopted for the UAC configuration method.
- a CE-level corresponds to the number of times the corresponding signal is sent.
- the number of repeated transmissions corresponding to each CE-level is different. For terminals with a small CE-level level, the number of repetitions is small, and the number of terminals with a high CE-level level is repeated.
- the UAC side all UEs determine whether to access according to the parameters broadcast in the UAC. However, different UEs use different resources when accessing the mobile communication system. This is because the UEs with fewer repetitions occupy less resources, and the UEs with more repetitions occupy more resources. In the current technology, a total of four CE-levels are supported. When the UE accesses the network, the preamble and the CE-level are corresponding to each other, that is, the preamble is divided into four groups, and the network side can determine which CE-level the UE is by the preamble sent by the UE, and further, the network. The side and the UE will use the same repetition number of interaction signaling.
- Increasing the number of repetitions can help increase coverage, especially for upstream coverage, but at the same time it will increase resources.
- UE A is CE-level1, assuming that the corresponding repetition number is 4 times, and UE B is CE-level 2, assuming that the corresponding repetition number is 8 times.
- UE A repeats 4 times when transmitting the pilot, UE B Then repeat 8 times, and the length of the pilot is the same, then the number of repetitions will definitely cause more resources.
- the CE-level and the measurement result ⁇ for example, reference signal receiving power (RSRP) ⁇ , and the number of repetitions, resource usage, and the like are corresponding.
- RSRP reference signal receiving power
- the CE-level of the UE of RSRP measurement result ⁇ RSRP1 is 3.
- the CE-level and the number of repetitions also correspond. For example, the number of repetitions corresponding to CE-level 0 is 0, the number of repetitions corresponding to CE-level 1 is 4, and the number of repetitions corresponding to CE-level 2 is 8 times. The number of repetitions corresponding to level 3 is 16 times. Therefore, CE-level can be equivalently replaced with RSRP.
- the term "CE-level" used as a solution description may be equivalently replaced with an RSRP correlation value, a repetition number correlation value, a resource usage related value, and the like.
- the resource usage of the UE is considered.
- the 5G system can control the number of accesses of UEs with different resource consumption according to the resource consumption of the UE. In order to enable more UEs to access, UEs with smaller resource consumption are more likely to access, and resource consumption is reduced. The probability of a large UE access.
- Transmit power is one of the factors of AC mapping, or as one of the factors of UAC's differentiated parameter configuration, UAC can separately control UEs with different transmit power levels to achieve more effective congestion control.
- a CE-level fallback access mechanism is designed, so that the UE can try to access other CE-levels, which may improve the limitation probability of certain UEs (for example, UEs with low transmit power).
- the embodiments of the present application are mainly applied to a 5G system (also referred to as an NR system) and an LTE/5GC system, and are particularly applicable to a 5G system that combines an Internet of Things (IoT) scenario.
- a 5G system also referred to as an NR system
- an LTE/5GC system and are particularly applicable to a 5G system that combines an Internet of Things (IoT) scenario.
- IoT Internet of Things
- FIG. 1 is a schematic diagram of an embodiment of an access control method in an embodiment of the present application.
- An embodiment of the access control method in this embodiment of the present application includes:
- the UE determines, according to the first CE-level, a first UAC parameter corresponding to the first CE-level.
- the UE may first determine the first UAC parameter corresponding to the first CE-level according to the first CE-level.
- a UAC parameter refers to a UAC parameter corresponding to a CE-level. That is, the first CE-level and the third CE-level each have a UAC parameter.
- the number of CE-levels is generally a constant.
- a UAC parameter can include multiple restriction information groups. For example, the four restricted information groups constitute a UAC parameter, and the UAC parameter has a corresponding CE-level.
- UAC-BarringInfoSetList is a list of length 4, that is, there are 4 restricted information groups in the UAC parameters.
- the "uac-BarringFactor”, “uac-BarringTime”, and “uac-BarringForAccessIdentity” in the example 1 respectively indicate the parameters of the restriction probability, the prohibition duration, and the AI indication information in the UAC.
- a UAC parameter may further include a correspondence between the AC and the restriction information group, may indicate the correspondence of the AC to the restriction information group, and may also indicate the correspondence of the restriction information group to the AC.
- the identifier of the restricted information group can be represented by an integer value, or can be represented by a bitmap, or by other methods.
- the identity of the AC can be represented by an integer value, or by a bitmap, or by other methods.
- UAC-BarringInfoSetList List of restricted information groups configured with UAC parameters
- maxBarringInfoSet limit the maximum number of groups
- UAC-BarringInfoSet Restricted information group configured with UAC parameters
- uac-BarringInfo Configures restriction information for UAC parameters.
- a UAC parameter may further include: at least one of a plurality of different restriction information groups and one common restriction information group.
- a common constraint information group and eight different restriction information groups are all corresponding to CE-level 1.
- the nine sets are collectively referred to as a UAC parameter, and the UAC parameter is a CE-level1 parameter, which may be called a A UAC parameter; for another example, a common constraint group + two different restriction groups corresponding to CE-level 3, then the three sets are collectively referred to as a UAC parameter, and the UAC parameter is CE-level
- the parameter of 3 can be called the third UAC parameter.
- the correspondence between the UAC and the CE-level may be sequential (see the example in the following example 2), that is, the first UAC parameter corresponds to CE-level 1, the second UAC parameter corresponds to CE-level 2, and so on. .
- the "uac-barringPerCElist” in the example 2 there are a plurality of "UAC-BarringPerCE", that is, "uac-barringPerCElist” is a list composed of a plurality of "UAC-BarringPerCE", and each "UAC-BarringPerCE" represents one UAC parameters, each "UAC-BarringPerCE” corresponds to a CE-level.
- UAC-BarringPerPLMN UAC limit configuration for each PLMN
- plmn-IdentityIndex the identity of the PLMN
- uac-barringPerCEList Configuration list of UAC restriction information configured according to CE-level
- UAC-BarringPerCE UAC limit information for each CE-level
- UAC-BarringPerCatList List of UAC limit parameters configured according to AC
- UAC-BarringPerPLMN refers to the UAC parameter configuration under a public land mobile network (ie PLMN), including the UAC-BarringPerCEList list, which includes up to maxCElevel UAC-BarringPerPLMN-PerCE, which means that this UAC-BarringPerPLMN follows Configure the UAC parameters for CE-level. For example, if the length of the UAC-BarringPerPLMN list is 2, it means that two CE-level corresponding UAC parameters are configured for the PLMN, and the first UAC-BarringPerCE indicates the UAC parameter corresponding to the first CE-level. The second UAC-BarringPerCE indicates the UAC parameter corresponding to the second CE-level.
- the UAC parameters corresponding to each CE-level include a restriction information group configuration for the AC. For example, a CE-level UAC parameter includes: for 32 ACs, configure the correspondence between the AC and the BarringInfo set.
- the CE-level and the measurement result, and the number of repetitions and the like are corresponding. Therefore, in this embodiment, the CE-level may be replaced by an RSRP-related parameter and a repetition-number related parameter, for example, the UE.
- the first UAC parameter is determined according to the first RSRP measurement result thereof; or the UE determines the first UAC parameter according to the first repetition number thereof. In this embodiment, the first UAC parameter is determined by the UE according to the first CE-level or the first RSRP.
- the UE determines the first AC according to the first CE-level and the type of the access attempt.
- the UE may determine the first AC according to the first CE-level and the type of access attempt.
- the AC determined by the UE according to the CE-level and the access attempt type may be one or more of a standard AC (standardized AC) or an operator classified AC (operator classified AC).
- the CE-level related type refers to the access attempt type corresponding to the AC 8, 9, 10, and 11.
- the UE maps the UE configuration to the first AI according to the first CE-level.
- the UE may further determine the first AI according to the first CE-level and the UE configuration (ie, the device type of the UE).
- AI11-15 in Table 4 below is operator configurable.
- AI1 and 2 refer to that the UE device supports multimedia and the UE device supports key services. For example, the UE may map the device type supporting multimedia to AI1.
- the UE determines the AI according to the CE-level and the UE configuration, and the AI may be a reserved AI (reserved AI, which is reserved for extensions after the protocol), or may be UE configured AI (UE configuration AI, which is a defined AI, It refers to the network side configured to the UE, which is equivalent to the operator-defined AI. For example, refer to Table 4 below. AI11-15 itself is the value assigned to the UE on the network side. These AIs can be further combined with CE-level to correspond to different CE-levels. In this way, CE-level has a specific AI that can be corresponding. When UAC judges, it will consider what AI is and then decide whether to initiate an access attempt. In this way, CE-level is considered in UAC.
- the UE determines, according to the first UAC parameter, the first AC, and the first AI, whether the access of the UE is prohibited.
- the UE may determine whether the access of the UE is prohibited by using the first UAC parameter, the first AC, and the first AI.
- the UE maps the upcoming access attempt to the corresponding access category, and maps the UE configuration to the corresponding access identifier, and combines the first UAC parameter corresponding to the first CE-level configured in the broadcast information. Therefore, it is determined whether the access of the UE is prohibited.
- the UE determines whether the access attempt is forbidden, which means that the UE cannot initiate an access attempt, and the forbidden situation is as follows. 1) The UE can determine according to an access class bitmap of the access category configured in the broadcast signaling. Whether the UE is prohibited from accessing. 2) Alternatively, the UE determines whether an access attempt can be initiated based on a comparison between the random number generated by itself and the probability value in the broadcast. If the access attempt is forbidden, the UE does not initiate an access attempt according to the corresponding forbidden duration.
- the UE determines that its CE-level is 1, the UE maps its access attempt to the corresponding AC value, and maps its UE configuration to the corresponding AI value.
- the UAC-BarringPerCEList is a list of UAC parameters corresponding to multiple CE-levels.
- the UAC parameters corresponding to the multiple CE-levels are configured in the order of CE-level, that is, the first UAC in the UAC-BarringPerCEList.
- BarringPerCE is the CE-level 0 configuration
- the second UAC-BarringPerCE is the CE-level 1 configuration, and so on.
- the UAC configuration corresponding to the CE-level 1 includes a plurality of restricted information groups corresponding to the AC (that is, the UAC-BarringPerCE includes the UAC-BarringPerCatList, which indicates the configuration of the restricted access parameters for multiple ACs at a certain CE-level; UAC- BarringPerCatList is a list of multiple UAC-BarringPerCats that represent access parameter configurations for multiple ACs.
- the UE generates a random number, and judges whether the access attempt of the UE is prohibited by judging the relationship between the random number and the threshold.
- the access control may separately configure parameters according to resource usage to achieve more effective congestion control.
- a group of UEs is CE-level 1
- the number of repetitions is 4
- a group of UEs is CE-level 2
- the number of repetitions is 8.
- the network side controls which UE access is determined by the network side, and the network side can do the same: set the bar probability of the CE-level 2 (that is, the foregoing limit probability) to be lower, so that the network side can access
- the number of UEs will increase. Differentiating the UE by the amount of resources can control the limited access of the UE with high resource consumption, and increase the number of UEs allowed to access the network.
- step 101 to step 103 there is no absolute sequence, and step 102 may be performed first, and then steps 101 and 103 may be performed. Step 103 may be performed first, and step 103 and step 101 are performed. There is no limit here.
- the UE may also determine whether the access of the UE is prohibited according to the first UAC parameter, or the UE may determine whether the access of the UE is prohibited according to the first UAC parameter and the first AC, or the UE may according to the first UAC parameter and The first AI determines whether the access of the UE is prohibited, which is not limited herein.
- the UE can determine whether the access of the UE is prohibited according to the first UAC parameter and the first AC.
- the UE determines a corresponding AC value according to the access attempt, and the AI value is a default value.
- the default value may be a value stored on the UE side according to the UE's own capability.
- the UE is a UE that supports voice calls, and the voice is assumed.
- the UE may also determine whether the access of the UE is prohibited according to the first UAC parameter and the first AI. Similar to the above example, the AC value is changed to the default value, and the default AC value can be stored on the UE side.
- the UE may determine whether the access of the UE is prohibited by using the UAC parameter corresponding to the first CE-level determined by the first CE-level, the first AC, and the first AI, because the first UAC is based on
- the first CE-level determines that the network system can control the access of the UE according to the CE-level of the UE.
- the CE-level high indicates that the number of CE-level repeated accesses is large, and the resources used are large. If the incoming UE is inaccessible, the UEs with high CE-levels may be blocked from accessing, so that more UEs can be accessed. This allows access control to be used according to resource usage. Configure UAC parameters for the UE to achieve more effective congestion control.
- Another embodiment of the following control method includes:
- the base station configures a third UAC parameter for the UE.
- the base station may configure the third UAC parameter for the UE according to the third CE-level.
- a base station is described as an example of the network side.
- the small station, the macro station, the micro station, and the core network device may be used as the network side, which is not limited herein.
- the base station may configure a CE-level indication (CE-level indication) for indicating the CE-level in the UAC configuration.
- CE-level indication For example, see Example 3 below.
- the CE-level indication information "ce-levelIndication" is configured in the CE-level restriction information (BarringPerCE).
- UAC-BarringPerCE UAC limit information for each CE-level
- CE-level indication CE-level indication
- UAC-BarringPerCatList List of UAC limit parameters configured according to AC
- CE-level may also be indicated in the restriction information group, for example, see Example 4 below.
- UAC-BarringInfoSet Restricted information group configured with UAC parameters
- CE-level indication CE-level indication
- uac-BarringInfo Configures restriction information for UAC parameters.
- each CE-level has at least one common restricted information group and one different restricted information group. But there are two possible situations.
- Some CE-levels do not have corresponding configurations, that is, there are no common restrictions on information groups and no different restriction information groups. That is to say, some CE-levels may have unconfigured UAC parameters. For the case where there is no UAC parameter corresponding to the CE-level in the broadcast message:
- the UE can directly access the 5G system without being restricted by the access control.
- CE-level 0, 1, and 2 each have a common restriction information group and a different restriction information group, but CE-level 3 has no corresponding configuration, which means that CE-level 3 is not restricted by access control, that is, UE. It can directly access the network according to CE-level 3.
- the UE can adopt the default configuration.
- the default configuration may be a common restricted information group of the PLMN (English may be referred to as PLMN-common for short).
- the CE-level 3 configuration is a PLMN-common configuration, and the PLMN-common configuration includes a restriction information group configuration for the AC, and the CE-level 3 determines whether the access can be initiated according to the common restriction information group or different restriction information groups. .
- ce-levelIndication INTEGER(0..3) this field is used to indicate CE-level.
- ce-levelIndication INTEGER (0..3) the value range 0-3 indicates the corresponding CE-level level, 0 indicates that CE-level0 is corresponding, 1 indicates CE-level1, and so on.
- UAC-BarringInfoSet Restricted information group configured with UAC parameters
- CE-level indication CE-level indication
- uac-BarringInfo Configures restriction information for UAC parameters.
- CE-level indication is configured in the resource restriction group.
- the CE-level indication is configured in the resource restriction group.
- a CE-level UAC configuration has only a common restricted information group or only different restricted information groups.
- a common restricted information group For example, refer to the following example 6. It is shown that the parameters of the common restriction information group of CE-level 0 and the parameters of different restriction information groups of CE-level 1 are broadcast in the broadcast signaling, so that for CE-level 0, there is no configuration difference. To limit the parameters of the information group, it can be considered that CE-level 0 is only restricted by the common restriction information group. Similarly, CE-level 1 is only restricted by different restriction information groups.
- the UE receives a third UAC parameter sent by the base station.
- the base station carries the third UAC parameter in the broadcast information for broadcast, and the UE can receive the third UAC parameter sent by the base station.
- the third UAC parameter it is a complete set of configured parameters, including the probability of probability, the time of prohibition, and the configuration information of the AI.
- the UE determines the first UAC parameter according to the third UAC parameter of the third CE-level and the first CE-level.
- the UE may obtain the third UAC parameter. And determining, according to the third UAC parameter corresponding to the third CE-level and the first CE-level, the first UAC parameter corresponding to the first CE-level. Since the values of the respective parameters in the third UAC parameter are complete, the value of each parameter in the first UAC parameter can be determined by the following two methods.
- Method 1 The UE determines the first UAC parameter according to the third UAC parameter of the third CE-level, the first CE-level, and the difference value between the third UAC parameter and the first UAC parameter.
- the differential values are configured on the fields in Example 5.
- the UE may add each parameter value in the third UAC parameter to the configured difference value, thereby obtaining each parameter value in the first UAC parameter.
- the other U-parameters of the CE-level are configured with the difference value of the UAC parameters relative to the reference CE-level.
- the configuration value of a uac-BarringInfo of the base CE-level is:
- CE-levels for example, the reference CE-level is CE-level 0, and the other CE-levels are CE-level 1 are configured with a difference value compared to the reference CE-level, for example,
- the differential value configuration or the real value configuration is one of two.
- the advantage of configuring the difference value is that the value range can be appropriately reduced to save signaling.
- the range of values itself is: p00, p05, p10, p15, p20, p25, p30, p40, p50, p60, p70, p75, p80, p85, p90, p95, which requires 4 bits.
- the value range can be set to p-80, p-60, p-40, p-20, p0, p20, p4, p60, which requires 3 bits, which is equivalent to adding the offset value based on the reference configuration (although Signaling is saved, but the range of values may also be limited because there is no complete coverage of the 0%-100% range compared to indicating the true value). It should be noted that if the probability of adding the deviation value to the reference limit probability is smaller than 0, it means that the probability is 0, which is equivalent to complete prohibition. If the deviation value is added to the reference limit probability, the probability is greater than 1, indicating the probability. A value of 1, is equivalent to full permission.
- the Time field can also be applied with a differential configuration, that is, the difference between the forbidden durations in the configuration of the UAC parameter is configured in the forbidden duration field in the UAC parameter configuration.
- the base prohibition duration is 2 ms.
- the actual length of the duration is 6ms, and the UAC's forbidden duration field is configured with a 4ms difference.
- the AI bitmap field can also use a differential configuration with a similar principle. For example, the AI bitmap in the reference UAC is 110000000, the AI in this UAC is actually 1000000, and the difference (binary difference) between the two is 0100000. Then the difference is 0100000 configured on the AI field of this UAC.
- the differential configuration can also be seen as another method of numerical configuration, or it can guarantee the value range without saving signaling. For example, for the limit probability, 4bit is still used.
- Method 2 The UE determines the first UAC parameter according to the third UAC parameter of the third CE-level, the first CE-level, and the scaling factor.
- the method is based on the scaling factor and the CE-level based UAC is configured to save signaling overhead.
- the configuration of the reference CE-level (CE-level 0) is UAC-BarringPerCatList, and the scaling factors of other CE-levels with respect to the reference CE-level are configured in the UAC-CoeffPerCEList.
- UAC-CoeffPerCEList ⁇ 0.4,0.8,0.2 ⁇
- three scaling factors correspond to CE-level 1, 2, 3, respectively
- uac-BarringFactor of CE-level1 CE-level0 uac-BarringFactor*0.4
- CE-level1 uac-BarringTime CE-level0's uac-BarringTime*0.4
- CE-level2's uac-BarringFactor CE-level0's uac-BarringFactor*0.8
- CE-level2's uac-BarringTime CE-level0's uac-BarringTime*0.8
- CE-level3 uac-BarringFactor CE-level0 uac-BarringFactor*0.2
- CE-level3 uac-BarringTime CE-level0 uac-BarringTime*0.2.
- uac-CoeffPerCElist uac-CoeffPerCElist represents a list containing the scaling factors.
- uac-CoeffPerCELis List of scaling factors configured according to CE-level
- the scaling factor may be broadcast configured, for example, may be broadcast in the same SIB as the parameters of the UAC (eg, in SIB2), or may be broadcast in a different SIB than the parameters of the UAC.
- the common parameter of CE-level 2 is the common parameter of CE-level 1 multiplied by the scaling factor Coeff-CE-level 2
- the scaling factor can be applied to both the probability and the Time.
- the AI bitmap does not use the scaling factor, ie, the other CE-level AI bitmaps are the same as the reference CE-level AI bitmap configuration.
- the scaling factor may also be a predefined value in the protocol, for example, a value related to parameters such as the speed of the UE, the location of the UE, the transmit power of the UE, the antenna configuration of the UE, and the like.
- the UE determines a scaling factor according to a predefined value in the protocol, and combines the parameters in the broadcast with the scaling factor as a configuration parameter for determining whether an access attempt can be initiated.
- the UE is a static UE, ie, the moving speed is low
- the UAC corresponding to CE-level 2 and 3 is expanded by (1+alpha) times.
- the UE determines the first AC according to the first CE-level and the type of the access attempt.
- the UE determines the first AI according to the first CE-level and the UE configuration.
- the UE determines, according to the first UAC parameter, the first AC, and the first AI, whether the access of the UE is prohibited.
- the included configuration parameter group includes the following configurations.
- the configuration parameter group corresponding to CE-level 1 is configured as
- Steps 204 to 206 in this embodiment are similar to steps 202 to 204 in the foregoing embodiment, and details are not described herein again.
- steps 203 to 205 are not in an absolute sequence. Step 204 may be performed first, and then steps 203 and 205 may be performed. Step 205 may be performed first, and then steps 204 and 203 may be performed. No restrictions are imposed.
- step 204 and step 205 are optional steps, that is, the UE may also determine the first UAC parameter according to the third UAC parameter corresponding to the third CE-level and the first CE-level, or The first UAC parameter is determined according to one of the third UAC parameter, the first CE-level, the AC, or the AI corresponding to the third CE-level, which is not limited herein.
- the UE determines whether the access of the UE is prohibited according to the third UAC parameter of the third CE-level, the first AC, the first AI, and the first CE-level, so the UE cannot directly learn the first CE-
- the first UAC parameter may be determined by using the complete third UAC parameter configured for the other CE-level, so that the CE-level of the UE may be obtained, and the base station determines according to the CE-level of the UE. Whether the UE is allowed to access, if the CE-level is high, the base station can save resources by reducing the access probability of the UE, so that more UEs can access. Further, in the present embodiment, resources can be further saved due to the method using a differential configuration or a scaling factor.
- FIG. 3 is a schematic diagram of another embodiment of the access control method
- FIG. 4 is the embodiment. Example signaling flow chart of the CE-level fallback method.
- steps 301 to 303 in the following embodiments are similar to steps 101 to 103 and steps 203 to 205 in the foregoing embodiment, and steps 307 and 308 are the same as steps 102 and 103 in the above embodiment.
- 204 is similar to step 205 and will not be described again here.
- the network side configures a first UAC parameter for the UE according to the first CE-level.
- the UE determines, according to the first CE-level, a first UAC parameter corresponding to the first CE-level.
- the UE determines the first AC according to the first CE-level and the type of the access attempt.
- the UE determines the first AI according to the first CE-level and the UE configuration.
- the UE starts an access timer.
- step 305 is performed simultaneously with step 306. That is, when the UE determines whether the access of the UE is prohibited according to the first UAC parameter, the UE starts an access timer.
- the counter may also be used to determine whether the access of the UE is prohibited according to the first UAC parameter. Therefore, if the timer is turned on, it is judged whether the UE access is prohibited from being judged within the preset duration of the timer, and if the counter is turned on, it is determined whether the UE access is prohibited. It is necessary to make a judgment within the preset number of repetitions of the counter.
- the counter is calculated by counting once every failed access attempt. The timer continues to count, or the counter continues to count on the premise that the UE determines that the UE's access is prohibited according to the first UAC parameter. If the UE determines that the UE's access is not disabled according to the first UAC parameter, the timer stops counting and resets to the initial value, or the counter stops counting and resets to the initial value.
- the UE determines, according to the first UAC parameter, the first AC, and the first AI, whether the access of the UE is prohibited.
- the UE determines that the access of the UE is not prohibited according to the first UAC parameter, the first AC, and the first AI, then The UE initiates an access attempt to a communication network (e.g., a base station), and the access control timer is stopped.
- a communication network e.g., a base station
- the UE may determine according to the first UAC parameter, the first AC, and the first AI. Access is disabled, and step 306 is performed.
- the UE determines a second UAC parameter according to the second CE-level.
- the U E can select the UAC parameter corresponding to the higher CE-level and determine whether it can be accessed again.
- the UE may determine the second UAC parameter according to the second CE-level, and the second CE-level is higher than the first. CE-level rating. Specifically, if a timer is used, after the UE initiates the access attempt to reach the preset duration threshold of the timer, the UE may determine whether the access is prohibited according to the second UAC parameter determined by the second CE-level. If the counter is used, the UE may determine whether the access is prohibited according to the second UAC parameter determined by the second CE-level, after the UE initiates the access attempt but the number of access failures reaches the preset number of times of the counter.
- the second UAC parameter may be determined according to the second CE-level, or may be obtained according to the indication.
- the indication may be CE-level indication information, which is not limited herein.
- the UE determines the second AC according to the second CE-level and the type of the access attempt.
- the UE determines a second AI according to the second CE-level and the UE configuration.
- the UE determines, according to the second UAC parameter, the second AC, and the second AI, whether the access of the UE is prohibited.
- step 311 may be performed.
- steps 303 to 304 and steps 308 to 309 are optional steps, that is, the UE may also determine whether the access of the UE is prohibited according to only the second UAC parameter (or the first UAC parameter), or The UE may also determine whether the access of the UE is prohibited according to the second UAC parameter (or the first UAC parameter) and the second AC, or the UE may also according to the second UAC parameter (or the first UAC parameter) and the second AI. (or the first AI) determines if the UE's access is barred.
- the UE accesses according to the second CE-level.
- the UE may access the communication network by using the second CE-level.
- the UE sends the first signaling to the network side.
- the UE determines that the access of the UE is not prohibited according to the second UAC parameter, the second AC, and the second AI, and the UE starts performing the step 312 to the subsequent step 316, and the steps 312 to 316 are also referred to as random connection.
- RACH process random access channel
- the UE and the evolved base station or the Node B (eNB) exchange signaling, and in the signaling of the interaction, how many times the transmission is repeated is also corresponding to the CE-level determined by the UE. and also
- the number of times the UE transmits Msg1 to the network side is the number of repetitions corresponding to the second CE-level.
- the UE initiates Message1 to the network side according to the second UAC parameter.
- the first signaling, Message1 is generally abbreviated as Msg1, which refers to the first signaling of the RACH procedure, generally refers to the access pilot, which is sent by the UE to the network, not RRC signaling, which is only a pilot.
- the pilot (preamble) carried in the Msg1 and the CE-level of the UE have a corresponding relationship. Therefore, the network side determines the CE-level of the UE by detecting the pilot transmitted by the UE. At higher CE-levels, the interaction signaling between the UE and the network has a higher number of repetitions.
- Message 2 (the second signaling of the RACH process, which can be referred to as random access response, random access response) also repeats the number of repetitions corresponding to the CE-level.
- the subsequent Message 3 (the third signaling may refer to the radio resource control connection request, the radio resource command connection establishment request), and the demodulation of Message 4 (the fourth signaling may refer to the radio resource control connection.
- the number of repetitions of signaling such as the MPDCCH and the MTC physical downlink control channel (MPDCCH) of the MPDCCH and the message 4 (radio resource control connection) of the radio resource command connection establishment is also the CE- Level corresponds.
- the RACH process is only an example.
- the interaction signaling in the RACH process changes according to the status of the UE and the configuration of the network.
- the third signaling ie, Message3
- the fourth resource ie, Message4
- the radio resource command connection recovery command ie, Message4
- the network side sends a second access (random access response) to the UE.
- the network side After receiving the first signaling sent by the UE, the network side sends the second signaling of the random access response to the UE, and the number of times the network side repeatedly sends the second signaling to the UE is the number of times corresponding to the second CE-level.
- the UE sends a third signaling (radio resource control connection request) to the network side.
- the third signaling carries the first CE-level indication information used to indicate the first CE-level, and the UE notifies the network that the true CE-level is the first CE by using the first CE-level indication information in the third signaling.
- -level Whether the UE indicates that the CE-level indication information (CE-level indication) is selectable in the third signaling, that is, if the UE indicates the CE-level indication information in the third signaling, the UE is indicated.
- CE-level access in this embodiment, CE-level 3
- CE-level access in this embodiment, CE-level 1
- the network side sends a fourth resource (radio resource control connection) to the UE.
- the network side After receiving the third signaling of the connection establishment request sent by the UE, the network side sends an RRC connection establishment fourth signaling to the UE.
- the number of repetitions of the fourth signaling sent by the network side is the number of repetitions corresponding to the first CE-level.
- the first CE-level is the true CE-level.
- the MPDCCH for demodulating the fourth signaling is sent first.
- the UE clarifies the time-frequency resources used by the fourth signaling according to the indication of the MPDCCH, and then receives the fourth signaling.
- the UE sends a fifth signaling (radio resource control connection complete) to the network side.
- the UE After receiving the Msg4 sent by the network side, the UE sends an RRC connection confirmation Msg5 to the network side.
- the number of repetitions that the UE sends the Msg5 is also the number of repetitions corresponding to the first CE-level. That is, the number of repetitions that the UE sends the Msg5 is the number of repetitions corresponding to the true CE-level.
- the Msg1 sent by the UE can be carried.
- the pilot corresponding to the new CE-level that is, the non-authentic CE-level, the second CE-level in this embodiment
- the number of times the first signaling repetition is sent is a new CE-level (second CE-level) Level)
- the new CE-level does not reflect the situation of the real UE, so the Msg1, the MPDCCH, and the second signaling repeat the number of repetitions under the non-authentic CE-level (second CE-level).
- the UE carries the indication information indicating the true CE-level (first CE-level) in the third signaling sent to the network side, so that the subsequent signaling interaction (fourth signaling, fifth signaling) can be performed. The number of repetitions is restored to the number of repetitions corresponding to the true CE-level (first CE-level).
- the UE may determine the first UAC parameter corresponding to the first CE-level by using the first CE-level, and determine whether the UE access is prohibited according to the first UAC parameter, and the UE starts the access controller.
- the UE may determine whether the access controller reaches a preset threshold while the UE attempts to access the communication network. If the UE determines that the access controller reaches the preset threshold, the UE may determine the second CE according to the second CE-level.
- the second UAC parameter corresponding to the level, the second CE-level is different from the level of the first CE-level, and then the UE determines whether the UE access is prohibited according to the second UAC parameter, and if the UE successfully accesses the communication network, the UE
- the number of times the first signaling and the second signaling are repeated between the first signaling and the second signaling is a non-authentic CE-level level, that is, the number of repetitions corresponding to the second CE-level, but is transmitted by the UE to the network side.
- the third signaling carries the actual CE-level level, that is, the first CE-level indication information, and the subsequent fourth signaling and the fifth signaling interaction signaling are repeated with the corresponding CE-level repetition. frequency.
- the UE can use the CE-level fallback access mechanism in this embodiment to switch back to the second CE-level after the first CE-level is rolled back.
- the UE is attempted to access the communication system through other CE-levels, which can improve the access possibility of some UEs, for example, the UE with the lowest transmission power of the low gear.
- Another embodiment of the following access control method is to configure UAC parameters according to the gear position (also referred to as level) of the transmit power, and the maximum transmit power is considered in the UAC, which will be the largest.
- Transmit power is one of the factors of AC mapping, or as one of the factors of UAC's differentiated parameter configuration, UAC can separately control UEs with different maximum transmit power positions to achieve more effective congestion control.
- a UE with a maximum power of 14 dBm generally has a higher number of repetitions, that is, a higher CE-level than a UE with a maximum power of 23 dBm. Therefore, 14 dBm may occupy more resources to be connected.
- the UE and the 23 dBm UE are mixed together and controlled for access attempts.
- This low-power UE is more likely to be blocked from accessing.
- a UE may be widely available, and the number of connections of the UE may be very high (for example, smart sensors in machine type communication), and the applicable scenarios and applications of common terminal devices (for example, mobile terminals such as mobile phones and tablets)
- common terminal devices for example, mobile terminals such as mobile phones and tablets
- congestion control may be performed according to the transmission level, which is equivalent to congestion control according to an application scenario.
- the machine type communication scenario ie, the MTC scenario
- the network side can adjust for the low transmit power UE.
- FIG. 5 is a schematic diagram of another embodiment of an access control method.
- another embodiment of the access control method includes:
- the UE determines, according to a maximum transmit power, a first UAC parameter corresponding to a maximum transmit power.
- the UE may determine the first UAC parameter corresponding to the maximum transmit power according to the maximum transmit power, and the UE may indicate the UE maximum transmit power in the first UAC parameter. For example, in a UAC configuration, 1 bit can be used for indicating information so that the UE can determine its own maximum transmit power based on the indication information in the UAC parameters.
- the maximum transmit power of the UE is divided into two gears, and the maximum transmit power above 20 dBm is a high transmit power profile, which may also be referred to as a normal power class.
- the commonly used maximum transmit power is 23 dBm, 20 dBm or less.
- the maximum transmit power is a low power class.
- UE-Power UE maximum power information
- uac-barringInfoSetIndex uac limit packet identification
- the correspondence between the UAC and the maximum transmit power may be sequentially corresponding, that is, the first UAC parameter corresponds to CE-level 1, the second UAC parameter corresponds to CE-level 2, and so on.
- Example 9 where there are multiple UAC-BarringPerPowers in "uac-BarringPerPowerList", that is, "uac-BarringPerPowerList” is a list of multiple UAC-BarringPerPowers, each UAC-BarringPerPower" Represents a UAC parameter, each UAC-BarringPerPower" corresponds to a maximum transmit power value.
- the UE determines, according to a maximum transmit power and an access attempt type, a first AC.
- the UE may determine the first AC according to the maximum transmit power and the type of access attempt. See Table 5 below. Table 5 below is a mapping table for the UE to determine the first AC according to the maximum transmit power and the type of access attempt.
- AC8 is an AC introduced for low transmission power.
- Other ACs are ACs related to the business.
- the UE preferentially maps to the service-related AC.
- the UE preferentially maps to the power-related AC. For example, if the access attempt to be initiated by the UE is both an SMS message and an attempt initiated by the maximum transmit power of a low-order bit, the AC of the UE may correspond to AC-8 or AC-6, and the UE may First, the AC-6 corresponding to the access attempt is determined. If the access attempt corresponding to the AC-6 is disabled, the UE will map the AC of the access attempt to AC-8 in the next access attempt.
- the UE determines the first AI according to the maximum transmit power and the UE configuration.
- the UE may determine the first AI according to the maximum transmit power and the UE configuration.
- the mapping method is similar to the step 502. See Table 6 below. Table 6 below shows the UE determining the first AI according to the maximum transmit power and the UE configuration. Mapping table.
- AI-3 corresponds to the UE of the lower transmission power of the lower gear. Equivalently, the value of AI includes the maximum generated power of the lower gear.
- the UE determines, according to the first UAC parameter, the first AC, and the first AI, whether the access of the UE is prohibited.
- the UE determines the corresponding UAC parameter according to its maximum power situation, and determines whether the access is forbidden by determining the AC and AI values corresponding to the access attempt and combining the corresponding UAC parameters.
- This step is similar to step 204 and step 306 in the above embodiment, and is not specifically pursued here.
- the UE may determine, according to the three values, whether the access of the UE is prohibited.
- steps 501 to 503 are not in an absolute sequence. Step 502 may be performed first, and then steps 501 and 503 may be performed. Step 503 may be performed first, and steps 503 and 501 may be performed. There is no limit here.
- steps 502 and 503 are optional steps, that is, the UE may also determine whether the access of the UE is prohibited according to the first UAC parameter, or the UE may use the first UAC parameter and the first AC. It is determined whether the access of the UE is disabled, or the UE may determine whether the access of the UE is prohibited according to the first UAC parameter and the first AI, which is not limited herein.
- a UE can determine whether access of a UE is prohibited according to a first UAC parameter and a first AI.
- the UE determines a corresponding AC value according to the access attempt, and the AI value is a default value.
- the default value may be a value stored on the UE side according to the UE's own capability.
- the UE is a UE that supports voice calls, and the voice is assumed.
- the maximum power value is to determine which UAC corresponds to this maximum power value.
- the network side is configured with a set of UAC parameters, wherein each UAC parameter corresponds to a maximum power value (corresponding to a set of UACs corresponding to 23 dBm, and a set of UACs corresponding to 14 dBm).
- the UE determines which set of UACs it should use based on its maximum power value.
- the UE can determine whether the access of the UE is prohibited according to the mapped AC value and the UAC parameter configured on the network side.
- an example in which the UE determines whether the access of the UE is prohibited according to the first UAC parameter and the first AI is similar to the above example except that the AC value is set to a default value.
- the level of the maximum transmit power can be known not only by the first UAC parameter, but also the value of the first AC and the first AI itself represents the maximum transmit power, according to the first AC, the first AI, and the first
- a UAC parameter determines whether the access is forbidden
- the UEs with different maximum transmit powers can be distinguished, so that the UEs with different maximum transmit powers can be adjusted according to the congestion on the network side, and the network side can be used with a lower level of congestion.
- the maximum transmit power is used for access attempts, so that less resource usage is used, thereby achieving the purpose of controlling network resource usage.
- Figure 6 is another embodiment of an access control method. Another embodiment of the access control method includes:
- the network side configures a second UAC parameter for the UE.
- the network side may be a base station, and may also be a small station, a macro station, a micro station, a core network device, etc., which is not limited herein.
- the UE receives a second UAC parameter sent by the network side.
- the UE determines, according to the second UAC parameter of the second maximum transmit power, and the first maximum transmit power, the first UAC parameter.
- the UE may obtain the second UAC parameter. And determining, according to the second UAC parameter corresponding to the second maximum transmit power and the first maximum transmit power, a first UAC parameter corresponding to the first maximum transmit power. Since the values of the respective parameters in the second UAC parameter are complete, the value of each parameter in the first UAC parameter can be determined by the following two methods.
- Method 1 The UE determines a first UAC parameter according to a second UAC parameter of the second maximum transmit power, a first maximum transmit power, and a difference value between the second UAC parameter and the first UAC parameter.
- UAC-BarringPerPowerList is a list with a maximum length of maxPowerlevel.
- (SEQIENCE(SIZE(1..maxBarringInfoSet))OF UAC-BarringInfoSet)” in example 2 a certain list length in the range of 1 to maxBarringInfoSet can be configured, and if the list length is 2, it means that this example list includes The UAC parameter of the first maximum transmit power gear and the UAC parameter of the second maximum transmit power gear.
- the UAC corresponding to the low-range maximum transmit power can be differentially configured compared to the UAC of the highest-order maximum transmit power.
- the UAC parameter of the first maximum transmit power is used as a reference, and therefore, the UAC parameter corresponding to the second maximum transmit power is configured corresponding to the first maximum transmit power in the UAC parameter of the second maximum transmit power. The difference between the UAC parameters.
- step 203 is similar to step 203 in the foregoing embodiment, and details are not described herein again.
- Method 2 The UE determines the first UAC parameter according to the second UAC parameter, the first maximum transmit power, and the scaling factor of the second maximum transmit power.
- the UAC of the UE in the low-range maximum transmit power has a scaling factor of the UAC of the UE compared to the highest-order maximum transmit power (the second largest transmit power in this embodiment).
- the scaling factor can also be applied to different restricted information groups of UAC.
- the scaling factor can be in the same SIB configuration as the UAC (for example, both in SIB2), or it can be configured separately in another SIB (for example, the other is configured in SIB1).
- the scaling factor may also be a predefined value in the protocol.
- the content of this part is described in detail in step 203 in the foregoing embodiment, and details are not described herein again.
- the scaling factor used may be related to the maximum transmit power level of the UE.
- UE with the highest transmission power of the high-order bit scaling factor
- the UE is broadcasting
- the scaling factor on the UAC parameter for example, the UE calculates the scaling factor and multiplies it by the broadcasted UAC parameter as the basis for the UE to determine whether the access is prohibited.
- the network side broadcasts the CE-level 0, 1, 2, 3 UAC parameters.
- the scaling factor 14/23, which is approximately 0.6.
- the method for determining the first UAC parameter according to the second UAC parameter of the second maximum transmit power and the first maximum transmit power in this embodiment is not specifically limited.
- the UE determines the first AC according to the first maximum transmit power and the type of access attempt.
- the UE determines the first AI according to the first maximum transmit power and the UE configuration.
- the UE determines, according to the first UAC parameter, the first AC, and the first AI, whether the access of the UE is prohibited.
- step 604 and step 605 in this embodiment are optional steps, and the UE may also determine whether the access of the UE is prohibited according to the first UAC parameter, or the UE may also be based on the first UAC parameter and the AI or One of the ACs determines whether the access of the UE is forbidden, which is not limited herein.
- the UE determines whether the access of the UE is prohibited according to the second UAC parameter of the second maximum transmit power, the first AC, the first AI, and the first maximum transmit power, so the UE cannot directly learn the first maximum transmit.
- the first UAC parameter corresponding to the power the first UAC parameter may be determined by using the complete second UAC parameter configured for the other maximum transmit power, so that the maximum transmit power of the UE may be obtained, and the network side according to the maximum transmit power of the UE. If the maximum transmit power is high, the network side can save resources and enable more UEs to access by prohibiting the access of the UE. Further, in the present embodiment, since a method of using a differential configuration or a scaling factor is used, resources can be further saved.
- an embodiment of the access network element in the embodiment of the present application includes:
- the communication device 700 can vary considerably depending on configuration or performance, and can include one or more central processing units (CPUs) 701 (eg, one or more processors) and memory 705, the memory One or more applications or data are stored in 705.
- CPUs central processing units
- memory 705 the memory
- applications or data are stored in 705.
- the memory 705 can be volatile storage or persistent storage.
- the program stored in memory 705 can include one or more modules, each of which can include a series of instruction operations in the server.
- central processor 701 can be configured to communicate with memory 705 to perform a series of instruction operations in memory 705 on communication device 700.
- Communication device 700 may also include one or more power sources 702, one or more wired or wireless network interfaces 703, one or more input and output interfaces 704, and/or one or more operating systems, such as Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM and more.
- operating systems such as Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM and more.
- the process performed by the central processing unit 701 in the communication device 700 in this embodiment is similar to the method flow described in the foregoing embodiments shown in FIG. 1 to FIG. 6 and will not be described again.
- the beneficial effect of the embodiment of the present application is that the communication device can determine whether the access of the UE is prohibited by using the UAC parameter corresponding to the first CE-level determined by the first CE-level, the first AC, and the first AI, because the first The UAC is determined according to the first CE-level. Therefore, the network system can control the access of the UE according to the CE-level of the UE.
- the CE-level high indicates that the number of CE-level repeated accesses is large, and the resources used are large. Access to a communication device may result in the inaccessibility of other communication devices. Therefore, a communication device with a high CE-level may be prohibited from accessing, so that more communication devices can be accessed, so that access can be made.
- the control configures UAC parameters for the communication device according to the resource usage, so as to achieve more effective congestion control.
- an embodiment of a base station in this embodiment of the present application includes:
- the base station 800 can vary considerably depending on configuration or performance, and can include one or more central processing units (CPUs) 801 (eg, one or more processors) and a memory 805, the memory 805 There are one or more applications or data stored in it.
- CPUs central processing units
- memory 805 the memory 805
- applications or data stored in it There are one or more applications or data stored in it.
- the memory 805 can be volatile storage or persistent storage.
- the program stored in memory 805 can include one or more modules, each of which can include a series of instruction operations in the server.
- central processor 801 can be configured to communicate with memory 805, which performs a series of instruction operations in memory 805.
- Base station 800 can also include one or more power supplies 802, one or more wired or wireless network interfaces 803, one or more input and output interfaces 804, and/or one or more operating systems, such as Windows ServerTM, Mac OS XTM. , UnixTM, LinuxTM, FreeBSDTM and more.
- operating systems such as Windows ServerTM, Mac OS XTM. , UnixTM, LinuxTM, FreeBSDTM and more.
- the process performed by the central processing unit 801 in the base station 800 in this embodiment is similar to the method flow described in the foregoing embodiments shown in FIG. 1 to FIG. 6, and details are not described herein again.
- the beneficial effect of the embodiment of the present application is that, since the base station can access the base station by using the second CE-level, the base station can perform signaling transmission by using the first first CE-level according to the first CE-level information sent by the UE. Therefore, the UE can be attempted to access with other higher-level CE-levels after using one CE-level access, thereby enabling more UEs to access the base station, thereby improving the practicability of the base station.
- the disclosed system, apparatus, and method may be implemented in other manners.
- the device embodiments described above are merely illustrative.
- the division of the unit is only a logical function division.
- there may be another division manner for example, multiple units or components may be combined or Can be integrated into another system, or some features can be ignored or not executed.
- the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, and may be in an electrical, mechanical or other form.
- the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
- each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
- the above integrated unit can be implemented in the form of hardware or in the form of a software functional unit.
- the integrated unit if implemented in the form of a software functional unit and sold or used as a standalone product, may be stored in a computer readable storage medium.
- a computer readable storage medium A number of instructions are included to cause a computer device (which may be a personal computer, server, or network device, etc.) to perform all or part of the steps of the methods described in various embodiments of the present application.
- the foregoing storage medium includes: a U disk, a mobile hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disk, and the like. .
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
本申请实施例公开了接入控制方法、通信设备以及基站,用于UE根据CE-level确定的UAC参数确定UE的接入是否被禁止,从而能够控制资源消耗量高的UE接入通信网络系统的概率。本申请实施例方法包括:用户设备UE根据第一覆盖增强等级CE-level确定所述第一CE-level对应的第一统一接入控制UAC参数;所述UE根据所述第一UAC参数,确定所述UE的接入是否被禁止。
Description
本申请要求于2018年5月17日提交中国专利局、申请号为201810475264.0、发明名称为“接入控制方法、通信设备以及基站”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
本申请涉及通信领域,尤其涉及接入控制方法、通信设备以及基站。
接入控制是网络侧控制拥塞的解决办法,接入控制禁止(access controlbarring,ACB)是长期演进(long term evolution,LTE)系统中对接入控制的统称,统一接入控制(unified access control,UAC)是第五代移动通信系统(the fifth generation,5G)、LTE系统以及5G核心网(5G core network,5GC)中对接入控制的统称。网络侧在负载较大时,可以通过接入控制机制,禁止一些终端发起接入,达到限制网络负载的功能。覆盖增强等级(coverage enhancement level,CE-level)用于表示用户设备重复接入通信网络系统的次数,CE-level常用于机器类型通信(machine-type communication,MTC)或窄带物联网(narrow band internet of things,NB-IoT)。提高CE-level,可以提高接入的重复次数,从而能够提高通信网络网络系统的上行覆盖范围。
在5G系统中,目前使用的接入控制方法是在统一接入控制(unified access barring,UAC)广播参数中配置了接入类型(access category,AC)和接入标识(access identity,AI)的参数,然后用户设备将接入尝试映射为AC,将UE配置映射为接入标识AI,并结合UAC参数,确定用户设备的接入是否被禁止。
然而,目前在5G系统中的接入控制机制由于任何一个UE在尝试接入时使用的都是相同的信令,导致尝试接入的UE都有可能接入到系统中,如果使用资源多的UE过多接入了系统,将会导致5G系统负载过重。
发明内容
本申请实施例提供了一种接入控制方法,用于UE根据CE-level确定的UAC参数确定UE的接入是否被禁止,从而能够控制资源消耗量高的UE接入通信网络系统的概率。
本申请实施例第一方面提供了一种接入控制方法,包括:
当用户设备UE需要接入到通信网络中时,该UE可以根据第一覆盖增强等级CE-level确定所述第一CE-level对应的第一统一接入控制UAC参数,然后根据所述第一UAC参数,确定所述UE的接入是否被禁止,也就是说,UE根据所述第一UAC参数确定所述UE的接入尝试是否被禁止。在本文阐述中,接入是否被禁止等价于接入尝试是否被禁止,后面不再做限定。
从以上技术方案可以看出,本申请实施例具有以下优点:由于UE在进行接入控制时 能够根据CE-level确定UAC参数,CE-level低的重复次数少,消耗的资源较少,CE-level高的重复次数多,消耗的资源较多,因此UE在接入网络时能够根据UAC参数确定对应的CE-level,从而获知相应的资源消耗量,资源消耗量大,UE接入通信网络系统时就会被禁止,这样就能够控制高资源消耗量的UE接入通信网络系统的概率,使更多的低资源消耗量的UE能够接入到通信网络系统中。
基于本申请实施例第一方面,本申请实施例第一方面的第一种实施方式中,若所述UE根据所述第一UAC参数确定所述接入被禁止,则所述UE可以根据第二CE-level对应的第二UAC参数,确定所述接入是否被禁止,所述第二CE-level高于所述第一CE-level。
本申请实施例中,UE可以通过第一CE-level确定第一CE-level对应的第一UAC参数,在UE根据第一UAC参数确定UE的接入是否被禁止后,通过该将第一CE-level更改为第二CE-level从而实现成功接入通信网络,因此提高了本方案的可实现性。
基于本申请实施例第一方面的第一种实施方式,本申请实施例第一方面的第二种实施方式中,在接入计时器超时之前,所述UE可以根据所述第一UAC参数确定所述接入是否被禁止;在所述接入计时器超时之后,所述UE可以根据所述第二CE-level对应的所述第二UAC参数,确定所述接入是否被禁止。
本申请实施例中,由于UE可以通过第一CE-level确定第一CE-level对应的第一UAC参数,在UE根据第一UAC参数确定UE的接入是否被禁止的同时,UE开启接入控制器,在UE尝试接入通信网络的同时,UE可以判断接入控制器是否达到预设阈值,如果UE确定接入控制器达到预设阈值,则UE可以根据第二CE-level确定第二CE-level对应的第二UAC参数,第二CE-level的等级高于第一CE-level的等级,然后UE根据第二UAC参数确定UE的接入是否被禁止。
需要说明的是,UE可以在控制器达到预设阈值之前,就确定好第二CE-level对应的第二UAC参数。
基于本申请实施例第一方面的第一种实施方式或第二种实施方式,本申请实施例第一方面的第三种实施方式中,若所述UE根据所述第二UAC参数确定所述接入未被禁止,则所述UE可以根据所述第二CE-level进行所述接入,然后在所述UE发送所述第一CE-level的信息之后,所述UE根据所述第一CE-level进行信令传输。
本申请实施例中,由于在UE成功接入通信网络后,又将CE-level的等级恢复到真实的CE-level等级进行信令传输,而不会继续使用非真实的CE-level进行信令传输,因此提高了本方案的可实现性。
基于本申请实施例第一方面,本申请实施例第一方面的第四种实施方式中,所述方法还包括:
所述UE可以根据第一CE-level以及所述接入的接入尝试类型确定第一接入类别AC,然后UE根据所述第一UAC参数以及所述第一AC,确定所述接入是否被禁止。
本申请实施例中,由于UE能够UAC参数以及有很多种类的AC确定接入是否被禁止,因此增加了实现本方案的多样性,提高了实现本方案的灵活性。
基于本申请实施例第一方面,本申请实施例第一方面的第五种实施方式中,所述方法 还包括:
所述UE可以根据所述第一CE-level以及所述UE配置确定第一接入标识AI,然后UE根据所述第一UAC参数以及所述第一AI,确定所述接入是否被禁止,所述UE配置即为所述UE的设备类型。
本申请实施例中,由于UE能够UAC参数以及有很多种类的AI确定接入是否被禁止,因此增加了实现本方案的多样性,提高了实现本方案的灵活性。
基于本申请实施例第一方面的第四种实施方式,本申请实施例第一方面的第六种实施方式中,所述方法还包括:
所述UE可以根据所述第一CE-level以及所述UE配置确定第一接入标识AI,然后所述UE根据所述第一UAC参数、所述第一AC以及所述第一AI,确定接入是否被禁止。
本申请实施例中,UE通过根据第一CE-level确定的第一CE-level对应的UAC参数、第一AC以及第一AI,可以确定UE的接入是否被禁止,由于第一UAC是根据第一CE-level确定的,因此网络系统可以根据UE的CE-level控制UE的接入,CE-level高的说明CE-level重复接入的次数多,所使用资源多,如果此种UE接入,会导致其他更多的UE无法接入,因此CE-level高的UE可能会更高概率地被禁止接入,从而使更多的UE得以接入,这样就可以使接入控制按照资源使用量而分别为UE配置UAC参数,做到更有效的拥塞控制。
基于本申请实施例第一方面或本申请实施例第一方面的第四种实施方式至第六种实施方式中的任一种实施方式,本申请实施例第一方面第七种实施方式中,第三UAC参数中是一套完整的参数,而第三UAC参数中的参数则是不完整的,所述UE可以根据第三CE-level对应的第三UAC参数以及所述第一CE-level确定所述第一UAC参数。此处描述的不完整,是指UAC参数中配置的值不是这个UAC参数的真实值(例如,可能配置的是差分值),也可以指,这个UAC参数里配置的是用于推导出这个UAC参数的参数值(例如,可能是缩放因子值)。此处描述的完整,是指基站配置了下述实施例中所定义的一个UAC参数。
本申请实施例中,UE在不能直接获知第一CE-level对应的第一UAC参数时,可以通过为其他CE-level配置的完整的第三UAC参数确定第一UAC参数,从而可以获知UE的CE-level,基站根据UE的CE-level的高低分别配置不同的UAC参数,这样形成的效果是:如果CE-level高,则基站可以通过提高接入概率值使该UE的接入更困难,从而节省资源,使更多的UE能够接入。
基于本申请实施例第一方面的第七种实施方式,本申请实施例第一方面的第八种实施方式中,所述UE可以根据所述第三UAC参数、第一CE-level以及所述第三UAC参数与所述第一UAC参数的差分值确定所述第一UAC参数。
本申请实施例中,由于使用差分值确定UAC参数,因此能够进一步节省资源,提高了本方案的可实现性。
基于本申请实施例第一方面的第七种实施方式,本申请实施例第一方面的第九种实施方式中,所述UE可以根据所述第三UAC参数、所述第一CE-level以及缩放因子确定所述第一UAC参数。
本申请实施例中,由于使用缩放因子确定UAC参数,因此能够进一步节省资源,提高了本方案的可实现性。
基于本申请实施例第一方面的第九种实施方式,本申请实施例第一方面的第十种实施方式中,所述缩放因子可以包括通过广播消息配置的缩放因子、或者预定义的缩放因子。
本申请实施例中,由于有多种方式能够获得缩放因子,因此增加了实现本方案的多样性和灵活性。
本申请实施例第三方面提供了一种基站,包括:
基站可以根据第一CE-level为用户设备UE配置第一统一接入控制UAC参数,接着在所述UE根据第二CE-level接入之后,所述基站接收所述UE发送的所述第一CE-level的信息,随后所述基站根据所述第一CE-level进行信令传输,所述第二CE-level高于所述第一CE-level。
本申请实施例中,由于基站可以在UE通过第二CE-level接入基站后,根据UE发送的第一CE-level的信息,用真实的第一CE-level进行信令传输,因此能够使UE在使用一个CE-level接入被禁止后,用其他更高等级的CE-level尝试接入,从而使更多的UE接入到基站中,提高了基站的可实用性。
本申请实施例第三方面提供了一种接入控制方法,包括:
UE可以根据最大发射功率确定所述最大发射功率对应的第一统一接入控制UAC参数,然后根据所述第一UAC参数,确定所述UE的接入是否被禁止。
本申请实施例中,由于UE在进行接入控制时能够根据最大发射功率确定UAC参数,且最大发射功率的档位与CE-level的等级相对应,最大发射功率的档位越低,CE-level的等级也越低,而CE-level低的重复次数少,消耗的资源较少,CE-level高的重复次数多,消耗的资源较多,因此UE在接入网络时能够根据UAC参数确定对应的CE-level,从而获知相应的资源消耗量,资源消耗量大,UE接入通信网络系统时就更有可能会被禁止,这样就能够控制高资源消耗量的UE接入通信网络系统的概率,使更多的低资源消耗量的UE能够接入到通信网络系统中。
基于本申请实施例第三方面,本申请实施例第三方面的第一种实施方式中,所述UE可以根据所述最大发射功率以及所述接入的接入尝试类型确定第一接入类别AC,然后所述UE根据所述第一UAC参数以及所述第一AC,确定所述接入是否被禁止。
本申请实施例中,由于可以根据UAC参数以及多种种类AC确定UE的接入是否被禁止,因此提高了实现本方案的多样性和灵活性。
基于本申请实施例第三方面,本申请实施例第三方面的第二种实施方式中,所述UE可以根据所述最大发射功率以及所述UE配置确定第一接入标识AI,所述UE根据所述第一UAC参数以及所述第一AI,确定所述接入是否被禁止。
本申请实施例中,由于可以根据UAC参数以及多种种类AI确定UE的接入是否被禁止,因此提高了实现本方案的多样性和灵活性。
基于本申请实施例第三方面的第一种实施方式,本申请实施例第三方面的第三种实施方式中,所述UE可以根据所述最大发射功率以及所述UE配置确定第一接入标识AI,然后 所述UE根据所述第一UAC参数、所述第一AC以及所述第一AI,确定所述接入是否被禁止。
本申请实施例中,由于不仅通过第一UAC参数可以得知最大发射功率的等级,而且第一AC、第一AI的值本身就代表了最大发射功率,在根据第一AC、第一AI以及第一UAC参数判断接入是否被禁止时,就可以区分出不同最大发射功率的UE,这样可以根据网络侧的拥塞来调整不同最大发射功率的UE的接入,网络侧拥塞时可以使用等级较低的最大发射功率进行接入尝试,这样占用的资源使用量就较少,从而达到控制网络资源使用量的目的。
基于本申请实施例第三方面或本申请实施例第三方面的第一种实施方式至第三种实施方式中的任一种实施方式,本申请实施例第三方面的第四种实施方式中,所述UE根据第二最大发射功率对应的第二UAC参数以及第一最大发射功率确定所述第一UAC参数,所述第一最大发射功率为所述最大发射功率。
本申请实施例中,基站根据不同的最大发射功率分别配置UAC参数,这样基站可以分别控制不同最大发射功率UE的接入,由于低最大发射功率UE的资源使用量一般较大,因此这种方法可以使基站控制不同资源使用量的UE的接入,进而能使更多的UE接入网络。
基于本申请实施例第三方面的第四种实施方式,本申请实施例的第五种实施方式中,所述UE可以根据所述第二UAC参数、所述第一最大发射功率以及所述第二UAC参数与所述第一UAC参数的差分值确定所述第一UAC参数。
本申请实施例中,由于使用差分值确定UAC参数,因此能够进一步节省资源,提高了本方案的可实现性。
基于本申请实施例第三方面的第四种实施方式,本申请实施例的第六种实施方式中,所述UE可以根据所述第二UAC参数、所述第一最大发射功率以及缩放因子确定所述第一UAC参数。
本申请实施例中,由于使用缩放因子确定UAC参数,因此能够进一步节省资源,提高了本方案的可实现性。
基于本申请实施例第三方面的第六种实施方式,本申请实施例的第七种实施方式中,所述缩放因子可以包括通过广播消息配置缩放因子,或者预定义的缩放因子。
本申请实施例中,由于有多种方式能够获得缩放因子,因此增加了实现本方案的多样性和灵活性。
基于本申请实施例第三方面的第七种实施方式,本申请实施例的第八种实施方式中,所述预定义的缩放因子可以为根据所述第一最大发射功率和所述第二最大发射功率计算得到。
本申请实施例中,由于有具体的计算获得缩放因子的方法,因此提高了本方案的可实现性。
本申请实施例第四方面提供了一种通信装置,该通信装置具有实现上述第一方面和第三方面中通信装置行为的功能。该功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的模块。
本申请实施例第五方面提供了一种基站,该基站具有实现上述第二方面中基站行为的功能。该功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的模块。
本申请实施例第六方面提供了一种计算机存储介质,该计算机存储介质用于储存上述第四方面的通信装置所用的计算机软件指令,其包括用于执行为通信装置所设计的程序。
本申请实施例第七方面提供了一种计算机存储介质,该计算机存储介质用于储存为上述第五方面的基站所用的计算机软件指令,其包括用于执行为基站所设计的程序。
本申请实施例第八方面提供了一种计算机程序产品,该计算机程序产品包括计算机软件指令,该计算机软件指令可通过处理器进行加载来实现上述第一方面之第三方面中的方法流程。
图1为本申请实施例中接入控制方法的一个实施例示意图;
图2为本申请实施例中接入控制方法的另一个实施例示意图;
图3为本申请实施例中接入控制方法的另一个实施例示意图;
图4为本申请实施例中接入控制方法的一个信令流程图;
图5为本申请实施例中接入控制方法的另一个实施例示意图;
图6为本申请实施例中接入控制方法的另一个实施例示意图;
图7为本申请实施例中通信设备的一个实施例示意图;
图8为本申请实施例中基站的一个实施例示意图。
本申请的说明书和权利要求书及上述附图中的术语“第一”、“第二”、“第三”“第四”等(如果存在)是用于区别类似的对象,而不必用于描述特定的顺序或先后次序。应该理解这样使用的数据在适当情况下可以互换,以便这里描述的实施例能够以除了在这里图示或描述的内容以外的顺序实施。
本申请实施例提供了一种接入控制方法,用于UE根据CE-level确定的UAC参数确定UE的接入是否被禁止,从而能够控制UE的接入,提高接入到通信网络的UE的数目。
在5G系统中,UE通过获取网络侧(本申请实施例中以基站作为网络侧的一个例子进行说明)广播的UAC参数,然后根据UAC参数中配置的AC和AI,并结合该UAC参数,确定UE的接入是否被禁止。以下对本申请实施例中涉及的专业用语进行解释:
一、AC
参照下表1,表1是将接入尝试(access attempt)映射为AC的映射表。5G系统中的AC共有64种业务类型(type of access attempt)。AC主要是区分接入尝试对应的业务类型是什么。这64个AC中,AC 8-31称为standardized AC,是为了以后的标准扩展而预留的AC。AC32-63是operator classified AC,是指运营商自己定义的AC。其他的AC有 明确的对应的业务,例如,AC0表示paging引起的接入尝试,AC2表示紧急呼叫,AC3表示UE自己发起的接入尝试,AC4、5、6、7都有各自的具体说明。
UE在映射AC时,是这样操作的:UE判断接入尝试的类型(type)是什么,根据AC映射表,映射到对应的AC上。比如UE判断接入尝试是寻呼(paging)发起的UE呼叫,因此该接入尝试对应AC0。UE在UAC判断时,考虑到AC的值,决定是否发起该接入尝试。
表1
二、AI
AI共16种,下表2是将UE配置(也就是UE的设备类型)映射为AI的映射表。UE配置是对UE的设备类型、UE的配置类型等的描述,由UE根据UE本身的特性,或者,根据UE在网络中的注册信息而配置。比如,UE的注册信息中可以指示UE对多媒体优先级业务的配置信息,或者,UE对关键业务服务的配置信息,或者,UE对公共陆地移动网络(Apublic land mobile network,PLMN)、专属PLMN、PLMN列表等中的配置信息等。AI主要是根据UE的设备类型而区分的参数。AI3-10是为了协议以后的扩展而保留的。AI11-15是运营商可配置的。AI1、2是指UE设备支持多媒体、UE设备支持关键性业务。
表2
AI在网络侧的配置中,可以通过位图(bitmap)的形式而配置。例如,配置AI的bitmap的长度可以为7,这表示了这个bitmap限制了其中7个AI对应的接入是否被禁止。例如,长度为7的bitmap限制了AI=1、2、11、12、13、14、15共7种AI,位图中的1表示这个AI对应的接入没有被禁止,0表示这个AI对应的接入被禁止。位图所指示的AI对应的UE在判断接入是否被禁止时,不按照概率值方法而判断。具体可见下面一段中的举例。
三、UAC限制信息组(BarringInfo set)
有关UAC,所有UE都按照UAC中广播的参数,判断是否接入。UAC的广播信令中,包括了几个限制信息组(BarringInfo set),限制信息组的个数可以是2个、4个或8个等,这几个限制信息组可以是所有PLMN都适用的,也可以是每个PLMN分别配置的。一个限制信息组中配置的信息至少包括:限制概率、禁止时长、AI。其中,限制概率是判断UE是否可以接入的一个门限值,禁止时长用来计算,被禁止的时长,AI是一个位图,用来指示对应特定几个AI的接入是否被禁止。可以通过限制信息组的标识表示这个限制信息组。AC和限制信息组之间有对应关系。例如,对于64个AC,有各个AC对应的限制信息组,假设共有8个限制信息资源组(标识为0,1,2…7),则网络侧的配置信息中,会配置成如下 示例:
AC0:set 0
AC1:set 0
AC2:set 3
AC3:set 5
AC4:set 4
…
假设set 3的具体配置值为
BaringInfo set 3{
Probability=0.8
Time=6s
AI=1100000
}
其中,AC2:set 3表示了标识为2的AC对应的限制信息组为标识为3的限制信息组。这种AC和限制信息组的关联关系是网络侧配置的。这表示对应set 3的AC(比如AC2),根据set3的配置而判断尝试接入是否被禁止。例如,一个UE映射自己的接入尝试为AC=2,并且,映射UE配置为AI=2,如上的示例图所示,AI位图为“AI=1100000”,由于AI位图中指示了AI=2对应的比特(bit)为1,则这个UE的接入尝试没有被禁止,可以直接发起接入尝试。再例如,一个UE映射自己的接入尝试为AC=2,并且,映射UE配置为AI=4,则这个UE仍旧按照set3判断自己的接入尝试是否被禁止,UE生成一个随机值,当随机值大于probability=0.8时,UE的接入被禁止,当随机值小于等于0.8时,UE的接入没被禁止。以上示例图中的probability即为限制概率,time即为被禁止的时长。
UAC的限制信息组还有可能是如下配置方法:配置了一个共同限制信息组(common Barringinfo set)和N(N的值可以为2,4,8)个不同限制信息组(different BarringInfo set)。一个限制信息组中(不论是common Barring Info set,还是different BarringInfo set),包括了限制概率、禁止时长、对应的AI(一般用位图bitmap指示哪些AI被禁止)。对于一个AC,对应了一个限制信息组(Barring Info),这个限制信息组也可以是共同限制信息组,或者可以是不同限制信息组。共同限制信息组适用于1个或多个AC,使用1个限制信息组就能被多个AC使用,这是共同限制信息组被引入的原因,表示该1个或多个AC的接入控制被该共同限制信息组限制。举个例子,AC 1,2,3使用共同限制信息组,共同限制信息组至少包括以下参数:限制概率(probability)、禁止时长(time)、AI,则对应AC1的UE在发起接入时,根据该共同限制信息组中所配置的参数,判断这个接入所对应的接入尝试是否被禁止,同样的,对应AC2和AC3的UE也根据这个共同限制信息组判断接入是否被禁止。一般而言,不同限制信息组和共同限制信息组的配置内容是不同的,1个或多个AC也可以使用1个不同限制信息组。网络侧配置哪些AC是与不同限制信息组对应的。举个例子,网络侧配置了2个不同限制信息组,并且配置了AC 4,5对应第一个不同限制信息组,AC 6,7对应第二个不同限制信息组,这表示,对应AC4和AC5的UE根据第一 个不同限制信息组判断接入是否被禁止,对应AC6和AC7的UE根据第二个不同限制信息组判断接入是否被禁止。
共同限制信息组和不同限制信息组也可以根据接入控制参数组的组标识(set index)区分,也可以根据配置格式而区分。举个例子,set index=0的set是common BarringInfo set(共同限制信息组),其他set index代表了different BarringInfo set(不同限制信息组);或者,配置为第一个set的是common BarringInfo set(共同限制信息组),第二个、第三个等set是different BarringInfo set(不同限制信息组)。
还有一种可能是,共同限制信息组和不同限制信息组不做区分,两者均为限制信息组。每个限制信息组都可以被1个或多个AC所使用。
配置不同的共同限制信息组和不同限制信息组的好处是,共同限制信息组支持多个AC使用该共同限制信息组,节省配置信令。不同限制信息组增加配置多样性。
本发明的以下所有实施例中,有关UAC的配置方法均可以采用以上两种配置方法的任意其中一种。
四、CE-level
一个CE-level对应了相应的信号发送次数,每个CE-level对应的重复发送次数不同,CE-level等级小的终端,重复次数少,CE-level等级高的终端,重复次数多。
UAC方面,所有UE都按照UAC中广播的参数,判断是否接入。但是不同的UE在接入移动通信系统时,使用的资源大小有区别,这是因为重复次数少的UE占用的资源较少,重复次数多的UE占用的资源较多。在目前的技术中,共支持4个CE-level。UE在接入网络时,发送的导频(preamble)和CE-level是对应的即,preamble分为4组,网络侧通过UE发送的preamble就能判断出UE是哪个CE-level,进而,网络侧和UE会使用同一个重复次数交互信令。提高重复次数可以帮助提高覆盖范围,特别是上行覆盖范围,但同时占用资源也会随之增加。举个例子,UE A是CE-level1,假设对应重复次数是4次,UE B是CE-level2,假设对应重复次数是8次,这样的话,UE A发送导频时要重复4次,UE B则要重复8次,而导频的长度相同,那么重复次数多肯定会造成资源占用多。
CE-level和测量结果{例如,参考信号接收功率(reference signal receiving power,RSRP)},还有重复次数、资源使用量等是对应的。例如,RSRP门限(即RSRP测量结果门限)有3个:RSRP1、RSRP2、RSRP3,则这3个RSRP门限可以确定4个CE-level等级:RSRP测量结果>=RSRP3的UE的CE-level为0,RSRP2=<RSRP测量结果<=RSRP3的UE的CE-level为1,RSRP1=<RSRP测量结果<=RSRP2的UE的CE-level为2,RSRP测量结果<=RSRP1的UE的CE-level为3。CE-level和重复次数也对应的,例如,CE-level 0对应的重复次数是0次,CE-level 1对应的重复次数是4次,CE-level 2对应的重复次数是8次,CE-level 3对应的重复次数是16次。因此,CE-level可以等价替换为RSRP。在本发明的以下所有实施例中,作为方案阐述所使用的专业术语“CE-level”,也可以等价替换为RSRP相关值、重复次数相关值、资源使用量相关值等。
本申请实施例中,为了解决UAC的网络侧拥塞控制,考虑UE的资源使用情况。5G系统可以根据UE的资源消耗量,控制不同资源消耗量UE的接入数目,为了使更多的UE能够 接入,通常允许资源消耗量较小的UE更有可能接入,而降低资源消耗量大的UE接入的概率。
本申请实施例的解决方法主要有以下三种:
1、在UAC中考虑CE-level,使接入控制可以按照资源使用量而分别配置参数,做到更有效的拥塞控制。
2、发射功率作为AC映射的因素之一,或者,作为UAC的差异化参数配置的因素之一,使UAC可以分别控制不同发射功率等级的UE,做到更有效的拥塞控制。
3、设计了一种CE-level回退接入机制,使UE可以尝试通过其他CE-level接入,可能可以提高某些UE(如,低发射功率的UE)限制概率。
需要说明的是,本申请实施例主要应用于5G系统(也可称为NR系统)和LTE/5GC系统中,特别适用于结合了物联网(internet of thing,IoT)场景的5G系统。
参阅图1,图1是本申请实施例中接入控制方法的一个实施例示意图。本申请实施例中接入控制方法的一个实施例包括:
101、UE根据第一CE-level确定第一CE-level对应的第一UAC参数;
本实施例中,UE可以首先根据第一CE-level确定第一CE-level对应的第一UAC参数。一个UAC参数指一个CE-level对应的UAC参数,也就是说,第一CE-level和第三CE-level各自分别有一个UAC参数。CE-level的个数一般来说是一个常量。一个UAC参数可以包括多个限制信息组。例如,4个限制信息组组成了一个UAC参数,这个UAC参数有对应的CE-level,则如下示例1中,由第一行的“UAC-BarringInfoSetList”中的“SEQUENCE(SIZE(1..maxBarringInfoSet))”可知,如果SIZE为4,则表示UAC-BarringInfoSetList是个长度为4的列表,也就是说,在该UAC参数中有4个限制信息组。示例1中的“uac-BarringFactor”、“uac-BarringTime”、“uac-BarringForAccessIdentity”分别表示的是UAC中的限制概率、禁止时长和AI指示信息这几个参数。一个UAC参数中,还可以包括AC和限制信息组的对应关系,可以指示AC到限制信息组的对应,也可以指示限制信息组到AC的对应。限制信息组的标识可以用整数值表示,也可以用位图表示,或者其他方法指示。AC的标识可以用整数值表示,也可以用位图表示,或者其他方法指示。
示例1:
以上示例1中涉及到的英文的中文翻译如下:
UAC-BarringInfoSetList:配置了UAC参数的限制信息组列表
maxBarringInfoSet:限制信息组的最大个数
UAC-BarringInfoSet:配置了UAC参数的限制信息组
uac-BarringInfo:配置了UAC参数的限制信息
uac-BarringFactor:UAC中的限制概率
uac-BarringTime:UAC中的禁止时长
uac-BarringForAccessIdentity:UAC中指示限制AI的指示信息
BIT STRING:比特串
一个UAC参数还可以包括:多个不同限制信息组中的至少一个以及1个共同限制信息组。例如:1个共同限制信息组+8个不同限制信息组均对应的是CE-level 1,则这9个set合称为一个UAC参数,该UAC参数为CE-level1的参数,可以称为第一UAC参数;再举一个例子,1个共同限制信息组+2个不同限制信息组均对应的CE-level 3,则这3个set合称为1个UAC参数,该UAC参数为CE-level 3的参数,可以称为第三UAC参数。
UAC和CE-level的对应关系可以是顺序对应的(参见以下示例2中的例子),即,第一个UAC参数对应CE-level 1,第二个UAC参数对应CE-level 2,以此类推。示例2中的“uac-barringPerCElist”中有多个“UAC-BarringPerCE”,也就是说,“uac-barringPerCElist”是由多个“UAC-BarringPerCE”组成的列表,每一个“UAC-BarringPerCE”代表一个UAC参数,每一个“UAC-BarringPerCE”对应一个CE-level。
示例2:
以上示例2中涉及到的英文的中文翻译如下:
UAC-BarringPerPLMN:每个PLMN的UAC限制配置
plmn-IdentityIndex:PLMN的标识
maxPLMN:PLMN个数的最大值
uac-barringPerCEList:按照CE-level配置的UAC限制信息配置列表
maxCElevel:CE-level个数的最大值
UAC-BarringPerCE:每个CE-level的UAC限制信息
UAC-BarringPerCatList:按照AC配置的UAC限制参数列表
这里的UAC-BarringPerPLMN是指一个公共陆地移动网络(即PLMN)下的UAC参数配置,包括了UAC-BarringPerCEList列表,这个列表包括最多为maxCElevel个UAC-BarringPerPLMN-PerCE,这表示,这个UAC-BarringPerPLMN按照CE-level配置UAC参数。举个例子,UAC-BarringPerPLMN这个列表的长度如果是2,表示对这个PLMN配置了2个CE-level对应的UAC参数,并且,第一个UAC-BarringPerCE表示第一个CE-level对应的UAC参数,第二个UAC-BarringPerCE表示第二个CE-level对应的UAC参数。每个CE-level对应的UAC参数包括针对于AC的限制信息组配置。举个例子:一个CE-level的UAC参数包括:对于32个AC,配置AC和限制信息组(BarringInfo set)的对应关系。
需要说明的是,如上所述,CE-level和测量结果,还有重复次数等是对应的,因此,本实施例中,CE-level可以用RSRP相关参数、重复次数相关参数代替,例如,UE根据其第一RSRP测量结果,确定第一UAC参数;或者,UE根据其第一重复次数,确定第一UAC参数。本实施例中对于UE根据第一CE-level还是第一RSRP确定第一UAC参数不做具体限定。
102、UE根据第一CE-level以及接入尝试类型确定第一AC;
本实施例中,UE可以根据第一CE-level以及接入尝试类型确定第一AC。
UE根据CE-level以及接入尝试类型确定的AC可以是标准AC(standardized AC),或者是运营商分类的AC(operator classified AC)中的一种或多种。例如,参照下表3,CE-level相关的type是指AC 8、9、10、11对应的接入尝试类型,当UE的接入尝试类型为CE-level=0时,UE可以将该接入尝试类型映射为AC=8。当接入尝试符合多种接入类型时(紧急呼叫除外),和CE-level相关的接入类型优先级较高,则接入类型优先映射到CE-level对应的AC上。例如,接入尝试如果既符合category 1,又符合category 8,则category=8。
表3
103、UE根据第一CE-level将UE配置映射为第一AI;
本实施例中,UE还可以根据第一CE-level以及UE配置(即UE的设备类型)确定第一AI。如上所述,下表4中的AI11-15是运营商可配置的。AI1、2是指UE设备支持多媒体、UE设备支持关键性业务。例如,UE可以将支持多媒体的设备类型映射为AI1。
UE根据CE-level以及UE配置确定AI,AI可以是reserved AI(预留AI,是指给协议以后的扩展而保留的),也可以是UE configured AI(UE配置AI,是定义的AI,这是指网络侧配置给UE的,相当于运营商自定义的AI)。例如:参见下表4,AI11-15本身是网络侧配置给UE的值,这些AI可以进一步和CE-level结合,分别对应到不同的CE-level上。这样,CE-level有特定的AI可以对应了,在UAC判断时,本来就会考虑AI 是什么再去判断是否发起接入尝试,这样,就把CE-level考虑到UAC中了。
表4
104、UE根据第一UAC参数、第一AC以及第一AI,确定UE的接入是否被禁止。
UE在确定第一UAC参数、第一AC以及第一AI之后,就可以使用第一UAC参数、第一AC以及第一AI确定UE的接入是否被禁止。
具体地,在5G系统的广播信息中,配置了针对不同场景的UAC参数。UE将即将发起的接入尝试映射到对应的接入类别上,并将UE配置映射到对应的接入标识上,并结合配置在广播信息中的与第一CE-level对应的第一UAC参数,从而确定UE的接入是否被禁止。
UE判断该接入尝试是否被禁止,是指UE不能发起接入尝试,被禁止的情况举例如下,1)UE根据配置在广播信令中的接入类别的位图(access class bitmap)可确定UE是否被禁止接入。2)或者,UE根据自己生成的随机数和广播中的概率值的比较,判断接入尝试是否可以发起。如果接入尝试被禁止,则UE按照对应的禁止时长,不再发起接入尝试。
例如,UE确定其CE-level为1,则UE将其接入尝试映射为对应的AC值,将其UE配置映射为对应的AI值,UE根据CE-level 1确定CE-level 1对应的UAC配置。假如,AC=2,AI=5,CE-level1对应的UAC配置为UAC-BarringPerCEList中的第二个配置。
UAC-BarringPerCEList是多个CE-level对应的UAC参数组成的列表,这多个CE-level对应的UAC参数是按照CE-level的顺序依次配置的,即,UAC-BarringPerCEList中的第一个UAC-BarringPerCE是CE-level 0的配置,第二个UAC-BarringPerCE是CE-level 1的配置,以此类推)。这个CE-level 1对应的UAC配置包括多个AC对应的限制信息组(即,UAC-BarringPerCE包括UAC-BarringPerCatList,表示了某个CE-level下对多个AC的限制接入参数配置;UAC-BarringPerCatList是多个UAC-BarringPerCat组成的列表,表示了对多个AC的接入参数配置)。
这样的话,这个UE判断CE-level 1下的AC=2对应的限制信息组是哪个,再通过这个限制信息组中的限制概率值或者AI位图配置,确定这个UE的接入是否被禁止。由于AI=5 不被AI配置所限制,所以UE生成一个随机数,通过判断随机数和门限值的关系,判断这个UE的接入尝试是否被禁止。或者,还可以不用随机数判断UE的接入尝试是否被禁止,例如,该UE对应的AI是AI位图所指示的AI(比如,AI=2),则UE根据位图中的1或0,直接可以确定接入尝试没被禁止还是被禁止,而不需要通过随机数判断。
此外,为了有助于理解,请参见上述具体实施例部分的第三点有关UAC、限制信息组的第一个例子的说明,具体此处不再赘述。
本实施例中,接入控制可以按照资源使用量而分别配置参数,做到更有效的拥塞控制。举个例子具体说:一组UE是CE-level 1,重复次数4,一组UE是CE-level 2,重复次数8。当网络侧拥塞时,网络侧如果接入一个CE-level 2的UE,消耗的资源相当于接入好几个CE-level 1的UE,使得网络接入的UE个数骤减。网络侧控制哪些UE接入是网络侧决定的,网络侧可以这样做:把CE-level 2的禁止(bar)概率(即前述的限制概率)设得更低,这样的话,网络侧可接入的UE个数会增加。按资源量区分UE,能控制高资源消耗量的UE有限的接入,使网络允许接入的UE个数增加。
需要说明的是,本实施例中的步骤101至步骤103没有绝对的先后顺序,可以先执行步骤102,再执行步骤101和103,也可以先执行步骤103,在执行步骤103和步骤101,具体此处不做限定。
此外,UE也可以仅根据第一UAC参数确定UE的接入是否被禁止,或者UE可以根据第一UAC参数以及第一AC确定UE的接入是否被禁止,或者UE可以根据第一UAC参数以及第一AI确定UE的接入是否被禁止,具体此处不做限定。
以下举一个UE可以根据第一UAC参数以及第一AC确定UE的接入是否被禁止的例子。UE根据接入尝试确定对应的AC值,而AI值是一个默认的值,这个默认值可以是根据UE自身能力而存储在UE侧的值,例如,UE是一个支持语音通话的UE,假设语音通话是一种运营商自定义的服务,那么UE在注册入网时就可以存储了默认的AI=15。因此,UE在判断一个接入尝试是否被禁止时,只需映射出AC值,而不需映射出AI值,再加上网络侧配置的UAC参数,则UE就可以确定UE的接入是否被禁止了。
UE也可以根据第一UAC参数以及第一AI确定UE的接入是否被禁止。和上述的例子类似,只是把AC值变成了默认值,这个默认的AC值可以存储在UE侧。
本申请实施例中,UE通过根据第一CE-level确定的第一CE-level对应的UAC参数、第一AC以及第一AI,可以确定UE的接入是否被禁止,由于第一UAC是根据第一CE-level确定的,因此网络系统可以根据UE的CE-level控制UE的接入,CE-level高的说明CE-level重复接入的次数多,所使用资源多,如果此种UE接入,会导致其他更多的UE无法接入,因此CE-level高的UE可能会被禁止接入,从而使更多的UE得以接入,这样就可以使接入控制按照资源使用量而分别为UE配置UAC参数,做到更有效的拥塞控制。
以上对接入控制方法的实施例进行了描述,以下对另一个接入控制方法的实施例进行描述,参见图2,以下控制方法的另一个实施例包括:
201、基站为UE配置第三UAC参数;
本实施例中,基站可以根据第三CE-level为UE配置第三UAC参数。
本实施例中,以基站作为网络侧的例子进行描述。本实施例中也可以以小站、宏站、微站、核心网设备作为网络侧,具体此处不做限定。
需要说明的是,基站在配置UAC参数时,可以在UAC的配置中,配置用于指示CE-level的CE-level指示信息(CE-level indication)。每个CE-level都至少有一组限制信息组。可以在按照CE-level配置UAC的参数中,指示CE-level的值,例如,参见以下示例3。
示例3:
在上述示例3中,在CE-level限制信息(BarringPerCE)中配置了CE-level的指示信息“ce-levelIndication”。
以上示例3中涉及到的英文的中文翻译如下:
UAC-BarringPerCE:每个CE-level的UAC限制信息
CE-level indication:CE-level指示信息
UAC-BarringPerCatList:按照AC配置的UAC限制参数列表
此外,也可以在限制信息组中指示CE-level的值,例如,参见以下示例4。
示例4:
在上述示例4中,在表示限制信息组的“UAC-BarringInfoSet::=SEQUENCE”中配置了CE-level的指示信息“CE-levelIndication”。
以上示例4中涉及到的英文的中文翻译如下:
UAC-BarringInfoSet:配置了UAC参数的限制信息组
CE-level indication:CE-level指示信息
uac-BarringInfo:配置了UAC参数的限制信息
uac-BarringFactor:UAC中的限制概率
uac-BarringTime:UAC中的禁止时长
uac-BarringForAccessIdentity:UAC中指示限制AI的指示信息
maxAccessIdentity:最大AI的指示信息
或者,每个CE-level都至少有一个共同限制信息组和一个不同限制信息组。但有两种可能的情况。
可能情况一:
有的CE-level没有对应的配置,即,既没有共同限制信息组,也没有不同限制信息组,也就是说,有的CE-level可能会存在没有配置的UAC参数。对于这种在广播消息中不存在CE-level对应的UAC参数的情况下:
1)UE可以不受接入控制的限制直接接入到5G系统中。例如,CE-level 0、1、2都各有一个共同限制信息组和一个不同限制信息组,但是CE-level3没有对应的配置,这表示CE-level3不受接入控制的限制,即,UE可以根据CE-level 3直接接入网络。
2)UE可以采用默认配置。默认配置可以是PLMN的共同限制信息组(英文可以简称为PLMN-common)。例如,CE-level 3的配置是PLMN-common配置,PLMN-common配置中包括针对于AC的限制信息组配置,则CE-level 3按照共同限制信息组或者不同限制信息组判断是否可以发起接入。
示例5:
示例5中,ce-levelIndication INTEGER(0..3),这个字段就是用来指示CE-level的。ce-levelIndication INTEGER(0..3),取值范围0-3表示对应的CE-level的等级,0表示对应的是CE-level0,1表示对应的是CE-level1,以此类推。
以上示例5中涉及到的英文的中文翻译如下:
UAC-BarringInfoSet:配置了UAC参数的限制信息组
CE-level indication:CE-level指示信息
uac-BarringInfo:配置了UAC参数的限制信息
uac-BarringFactor:UAC中的限制概率
uac-BarringTime:UAC中的禁止时长
uac-BarringForAccessIdentity:UAC中指示限制AI的指示信息
BIT STRING:比特串
CE-level indication也有可能配置在资源限制组中,类似的例子参照以上示例4。
可能情况二:
一个CE-level的UAC配置只有共同限制信息组或者只有不同限制信息组。例如,参见以下示例6表示了,广播信令中广播了CE-level 0的共同限制信息组的参数和CE-level1的不同限制信息组的参数,这样,对于CE-level 0,由于没有配置不同限制信息组的参数,可以认为CE-level 0只受共同限制信息组的约束,同理,CE-level 1只受不同限制信息组的约束。
示例6:
202、UE接收基站发送的第三UAC参数;
基站将第三UAC参数携带在广播信息中进行广播,UE可以接收基站发送的第三UAC参数。在第三UAC参数中是一整套完整的配置好的参数,包括了限制概率(probability)、禁止时长(time)以及AI的配置信息。
203、UE根据第三CE-level的第三UAC参数以及第一CE-level确定第一UAC参数;
当第一CE-level对应的第一UAC参数中的参数值不完整且UE需要确定是否可以通过该第一UAC参数接入到5G系统的通信网络中时,UE可以在获取第三UAC参数之后,根据第三CE-level对应的第三UAC参数以及第一CE-level来确定第一CE-level对应的第一UAC参数。由于第三UAC参数中的各个参数值是完整的,这样就可以通过以下两种方法确定第一UAC参数中的各个参数值。
方法一:UE根据第三CE-level的第三UAC参数、第一CE-level以及第三UAC参数与第一UAC参数的差分值确定第一UAC参数。参见示例5,示例5中的字段上配置的是差分值。UE可以将第三UAC参数中的各个参数值与配置的差分值相加,从而得到第一UAC参数中的各个参数值。
参见以下这段信令中配置的数值,除了基准CE-level的UAC参数组里配置的是真实 值,其他CE-level的UAC参数配置的都是相对于基准CE-level的UAC参数的差分值。例如,基准CE-level的某个uac-BarringInfo的配置值是:
其他CE-level(例如,基准CE-level为CE-level0,其他CE-level指CE-level1)中配置的是相比于基准CE-level的差分值,例如
则,CE-level1的真实uac-BarringInfo配置值是:
差分值配置还是真实值配置,是二选一的。配置差分值的好处在于,取值范围可以适当缩小,达到节省信令的目的。例如,对于限制概率,本身的取值范围是:p00,p05,p10,p15,p20,p25,p30,p40,p50,p60,p70,p75,p80,p85,p90,p95,这需要4bit。按照差分,取值范围可以设置为p-80,p-60,p-40,p-20,p0,p20,p4,p60这需要3bit,相当于在基准配置的基础上加上偏差值(虽然节省了信令,但是可能也限制了取值范围,因为相比于指示真实值,并没有完整覆盖0%-100%范围)。需要注意,如果在基准限制概率上加上了偏差值概率比0小,则表示概率为0,相当于完全禁止,如果在基准限制概率上加上了偏差值导致概率比1大,则表示概率为1,相当于完全允许。Time这个字段也可以应用差分配置,即,相对于基准UAC参数配置中的禁止时长的差值,配置在这个UAC参数配置中的禁止时长字段中,例如,基准禁止时长为2ms,这个UAC的禁止时长实际值为6ms,则这个UAC的禁止时长字段配置4ms差值。AI位图(bitmap)字段也可以使用类似原理的差分配置,例如,基准UAC中的AI位图为1100000,这个UAC中的AI实际为1000000,两者的差值(二进制差值)为0100000,则在这个UAC的AI字段上配置的是差值0100000。
差分配置可以只应用在Uac-BarringFactor和Uac-BarringTime这两个字段上,而Uac-BarringForAccessIdentity不是差分配置,即Uac-BarringForAccessIdentity上配置的是其他CE-level的真实值,相当于,在上面的例子中,CE-level1的真实Uac-BarringForAccessIdentity=010000。
差分配置也可以看做是数值配置的另一种方法,也可以在不节省信令的情况下,保证取值范围。例如,对于限制概率,仍旧使用4bit。
方法二:UE根据第三CE-level的第三UAC参数、第一CE-level以及缩放因子确定第一UAC参数。
本方法基于缩放因子,配置CE-level based UAC,可以节省信令开销。例如以下示例7,在示例7中,基准CE-level(CE-level 0)的配置是UAC-BarringPerCatList,其他CE-level相对于基准CE-level的缩放因子配置在UAC-CoeffPerCEList中。例如UAC-CoeffPerCEList={0.4,0.8,0.2},三个缩放因子分别对应CE-level 1、2、3,则CE-level1的uac-BarringFactor=CE-level0的uac-BarringFactor*0.4,CE-level1的uac-BarringTime=CE-level0的uac-BarringTime*0.4;CE-level2的uac-BarringFactor=CE-level0的uac-BarringFactor*0.8,CE-level2的uac-BarringTime=CE-level0的uac-BarringTime*0.8;CE-level3的uac-BarringFactor=CE-level0的uac-BarringFactor*0.2,CE-level3的uac-BarringTime=CE-level0的uac-BarringTime*0.2。
示例7:
在示例6中,“uac-CoeffPerCElist uac-CoeffPerCElist”表示的是一个包含了缩放因子的列表。
在以上示例7中涉及到的英文单词的翻译如下(有所重复的单词参照上述几个示例,此处不再赘述):
uac-CoeffPerCELis:按照CE-level配置的缩放因子列表
UAC-CoeffPerCE:每个CE-level的缩放因子
缩放因子可以是广播配置的,例如,可以和UAC的参数在相同的SIB中广播(例如,SIB2中),也可以和UAC的参数在不同的SIB中广播。例如,上面的示例7中,CE-level2的common参数是CE-level 1的common参数乘以缩放因子Coeff-CE-level 2,则CE-level 2 common set的probability=0.8*0.8,Time=6*0.8,CE-level 2 differentset的probability=0.6*0.8,Time=5*0.8.缩放因子可以既作用在probability上,也 可以作用在Time上。AI位图不使用缩放因子,即,其他CE-level的AI位图和基准CE-level的AI位图配置相同。
缩放因子也可以是协议中预定义的值,例如,和UE的速度、UE的位置、UE的发射功率、UE的天线配置等参数有关的数值。UE根据协议中预定义的值,确定缩放因子,将广播中的参数与缩放因子结合,作为判断是否可以发起接入接入尝试的配置参数。
例如,UE是偏静态UE,即,移动速度较低,协议可以预定义和移动速度相关的缩放因子alpha,假设alpha=UE速度/基准速度,基准速度是3km/h,一个偏静态UE的移动速度认为是300m/h,则alpha=0.1。假设网络侧广播了CE-level0对应的UAC(例如,probability=0.8,Time=8),则这个UE对应的CE-level1对应的UAC扩大(1+alpha=1.1)倍(probability=0.8*1.1,Time=8*1.1),CE-level 2、3对应的UAC均扩大(1+alpha)倍。
204、UE根据第一CE-level以及接入尝试类型确定第一AC;
205、UE根据第一CE-level以及UE配置确定第一AI;
206、UE根据第一UAC参数、第一AC以及第一AI,确定UE的接入是否被禁止。
例如,配置给UE的参数包括一个基准UAC配置UAC-BarringPerCatList,还包括一组缩放因子UAC-CoeffPerCEList={0.2,0.4,0.8}。
假设基准UAC对应CE-level0,包括的配置参数组包括如下配置
Uac-BarringInfoSet
{
Uac-BarringFactor=0.2
Uac-BarringTime=4
Uac-BarringForAccessIdentity=1010000
}
则CE-level1对应的配置参数组的配置为
Uac-BarringInfoSet
{
Uac-BarringFactor=0.2*0.2=0.04
Uac-BarringTime=4*0.2=0.8
Uac-BarringForAccessIdentity=1010000
}
本实施例中的步骤204至步骤206与上述实施例中的步骤202至204类似,此处不再赘述。
需要说明的是,本实施例中,步骤203至步骤205没有绝对的先后顺序,可以先执行步骤204,再执行步骤203和205,也可以先执行步骤205,再执行步骤204和203,具体此处不做限定。
此外,本实施例中,步骤204和步骤205是可选步骤,也就是说,UE也可以仅根据第三CE-level对应的第三UAC参数以及第一CE-level确定第一UAC参数,或者根据第三 CE-level对应的第三UAC参数、第一CE-level、AC或AI之中的其中一个确定第一UAC参数,具体此处不做限定。
本实施例中,UE根据第三CE-level的第三UAC参数、第一AC、第一AI以及第一CE-level确定UE的接入是否被禁止,因此UE在不能直接获知第一CE-level对应的第一UAC参数时,可以通过为其他CE-level配置的完整的第三UAC参数确定第一UAC参数,从而可以获知UE的CE-level,基站根据UE的CE-level的高低,确定是否允许UE接入,如果CE-level高,则基站可以通过降低该UE的接入概率从而节省资源,使更多的UE能够接入。进一步地,本实施例中由于使用了差分配置或者缩放因子的方法,能够进一步节省资源。
以上是接入控制方法的一个实施例,以下是接入控制方法的另一个实施例,参见图3和图4,图3是接入控制方法的另一个实施例的示意图,图4是本实施例CE-level回退方法的信令流程图。
需要说明的是,以下实施例中的步骤301至步骤303与上述实施例中的步骤101至103、步骤203至205类似,步骤307和步骤308与上述实施例中的步骤102和步骤103、步骤204和步骤205类似,此处不再赘述。
301、网络侧根据第一CE-level为UE配置第一UAC参数;
302、UE根据第一CE-level确定第一CE-level对应的第一UAC参数;
303、UE根据第一CE-level以及接入尝试类型确定第一AC;
304、UE根据第一CE-level以及UE配置确定第一AI;
305、UE开启接入计时器;
本实施例中,步骤305是和步骤306同时进行,也就是说,当UE根据第一UAC参数确定UE的接入是否被禁止的同时,UE开启接入计时器。
除了可以用接入计时器根据第一UAC参数确定UE的接入是否被禁止,也可以用计数器根据第一UAC参数确定UE的接入是否被禁止。因此,如果开启的是计时器的话,则判断UE的接入是否被禁止需要在计时器的预设时长之内进行判断,而如果开启的是计数器的话,则判断UE的接入是否被禁止则需要在计数器的预设重复次数之内进行判断。计数器的计算方法是,每经过一次失败的接入尝试,则累计计数一次。计时器继续计时,或者,计数器继续计数的前提是:UE根据第一UAC参数确定UE的接入是被禁止的。如果UE根据第一UAC参数确定UE的接入没被禁止,那么计时器停止计时并且重置为初始值,或者,计数器停止计数并且重置为初始值。
306、UE根据第一UAC参数、第一AC以及第一AI,确定UE的接入是否被禁止;
在接入计时器的预设阈值内,或者也可以说,在接入计时器超时之前,如果UE根据第一UAC参数、第一AC以及第一AI,确定UE的接入没有被禁止,则UE向通信网络(例如基站)发起接入尝试,接入控制计时器停止。
当UE发起接入尝试的时长达到接入控制器的预设阈值时,或者也可以说,在接入计时器超时时,则UE可以根据第一UAC参数、第一AC以及第一AI,确定接入被禁止,此时则执行步骤306。
307、UE根据第二CE-level确定第二UAC参数;
在接入计时器达到预设阈值后,或者可以说,在接入计时器超时之后,U E可以选择更高CE-level对应的UAC参数,再次判断是否可以接入。
本实施例中,在接入计时器达到预设阈值后(即接入计时器超时后),UE可以根据第二CE-level确定第二UAC参数,第二CE-level的等级高于第一CE-level的等级。具体地,如果使用的是计时器,则当UE发起接入尝试的时长达到计时器的预设时长阈值后,UE可以根据第二CE-level确定的第二UAC参数来判断接入是否被禁止如果使用的是计数器,则当UE发起接入尝试却接入失败的次数达到计数器的预设次数阈值后,UE可以根据第二CE-level确定的第二UAC参数来判断接入是否被禁止。
需要说明的是,第二UAC参数可以根据第二CE-level来确定,也可以根据指示获得,例如,这个指示可以是CE-level的指示信息,具体此处不做限定。
308、UE根据第二CE-level以及接入尝试类型确定第二AC;
309、UE根据第二CE-level以及UE配置确定第二AI;
310、UE根据第二UAC参数、第二AC以及第二AI,确定UE的接入是否被禁止;
如果UE根据第二UAC参数、第二AC以及第二AI,可以确定UE的接入未被禁止,则可以执行步骤311。
需要说明的是,步骤303至304、以及步骤308至309是可选步骤,也就是说,UE也可以仅根据第二UAC参数(或第一UAC参数)确定UE的接入是否被禁止,或者,UE也可以根据第二UAC参数(或第一UAC参数)以及第二AC确定UE的接入是否被禁止,或者,UE也可以根据第二UAC参数(或第一UAC参数)以及第二AI(或第一AI)确定UE的接入是否被禁止。
311、UE根据第二CE-level进行接入;
如果UE根据第二UAC参数、第二AC以及第二AI,确定UE的接入未被禁止,则UE可以通过第二CE-level接入通信网络。
312、UE向网络侧发送第一信令;
本实施例中,UE根据第二UAC参数、第二AC以及第二AI确定UE的接入未被禁止,UE开始执行本步骤312至后续的步骤316,步骤312至步骤316也称为随机接入流程(random access channel,RACH流程)。在RACH过程中,UE和演进的基站或节点B(eNB)之间交互发送信令,在该交互的信令中,重复发送多少次也是和UE确定的CE-level对应的。也
就是说,UE向网络侧发送Msg1所重复的次数是第二CE-level对应的重复次数。
参见图4的信令流程图,UE根据第二UAC参数向网络侧发起Message1。
第一信令即Message1,一般简写为Msg1,指RACH流程的第一个信令,一般指接入导频,是UE发给网络的,不是RRC信令,其只是一个导频。Msg1中所携带的导频(preamble)和UE的CE-level是有对应关系的,因此,网络侧通过检测UE发送的导频,就确定了UE的CE-level。在更高等级的CE-level下,UE和网络之间的交互信令都有更高的重复次数。
Message 2(RACH流程的第二个信令,可以指random access response,随机接入响 应)也会重复CE-level对应的重复次数。同样地,后续的Message 3(第三个信令,可以指radio resource control connection request,无线资源命令连接建立请求)、用于解调Message 4(第四个信令,可以指radio resource control connection,无线资源命令连接建立)的MPDCCH、Message 4(radio resource control connection,无线资源命令连接建立)的机器型通信物理下行控制信道(MTC physical Downlink Control Channel,MPDCCH)等信令的重复次数也是和CE-level对应的。
需要注意的是,这里的RACH流程只是一个举例,根据UE的状态、网络的配置等原因,RACH流程中交互信令有所变化。例如:第三信令(即Message3)也可以是radio resource control connection resume request,无线资源命令连接恢复建立请求;第四信令(即Message4)也可以是radio resource controlconnection resume,无线资源命令连接恢复命令。
313、网络侧向UE发送第二信令(random access response,随机接入响应);
网络侧在接收到UE发送的第一信令之后,会向UE发送随机接入响应第二信令,网络侧向UE重复发送第二信令的次数是第二CE-level对应的次数。
314、UE向网络侧发送第三信令(radio resource controlconnection request,无线资源命令连接建立请求);
第三信令中携带有用来指示第一CE-level的第一CE-level指示信息,UE通过第三信令中的第一CE-level指示信息通知网络侧真正的CE-level是第一CE-level。UE有否在第三信令中指示CE-level的指示信息(CE-level indication)是可选择的,也就是说,如果UE在第三信令中指示了CE-level指示信息,则表示UE是根据新的(即非真实的)CE-level接入的(本实施例中指的是CE-level3),如果UE没有在第三信令中指示CE-level指示信息,则表示UE是按照真实的CE-level接入的(本实施例中指的是CE-level1)。
315、网络侧向UE发送第四信令(radio resource control connection,无线资源命令连接建立);
网络侧在接收到UE发送的连接建立请求第三信令之后,会向UE发送RRC连接建立第四信令。网络侧发送第四信令所重复的次数为第一CE-level对应的重复次数,如前所述,第一CE-level为真实的CE-level。
网络侧在发送第四信令之前,会先发送用于解调第四信令的MPDCCH。UE接收了这个MPDCCH之后,会根据MPDCCH的指示明确第四信令所使用的时频资源,进而去接收第四信令。
316、UE向网络侧发送第五信令(无线资源命令连接确认,radio resource control connection complete)。
UE在接收到网络侧发送的Msg4之后,会向网络侧发送RRC连接确认Msg5。UE发送Msg5所重复的次数也为第一CE-level对应的重复次数,也就是说,UE发送Msg5所重复的次数为真实的CE-level对应的重复次数。
综上所述,本实施例中,如果UE选择了新的CE-level,并根据该新的CE-level的UAC参数与网络侧(例如基站)连接成功,那么,UE发送的Msg1中可以携带新的CE-level (即非真实的CE-level,本实施例中为第二CE-level)对应的导频,并且发送第一信令重复的次数是新的CE-level(第二CE-level)对应的重复次数。但是该新的CE-level并没有反应真实的UE的情况,因此Msg1、MPDCCH、第二信令都重复了非真实的CE-level(第二CE-level)下的重复次数。UE在发送到网络侧的第三信令中携带了指示真实的CE-level(第一CE-level)的指示信息,从而可以使后续的信令交互(第四信令、第五信令)的重复次数恢复为真实的CE-level(第一CE-level)对应的重复次数。
本实施例中,UE可以通过第一CE-level确定第一CE-level对应的第一UAC参数,在UE根据第一UAC参数确定UE的接入是否被禁止的同时,UE开启接入控制器,在UE尝试接入通信网络的同时,UE可以判断接入控制器是否达到预设阈值,如果UE确定接入控制器达到预设阈值,则UE可以根据第二CE-level确定第二CE-level对应的第二UAC参数,第二CE-level与第一CE-level的等级不相同,然后UE根据第二UAC参数确定UE的接入是否被禁止,如果UE成功接入通信网络,则UE和网络侧之间的交互信令第一信令和第二信令所重复的次数是非真实的CE-level等级,即第二CE-level对应的重复次数,但在UE向网络侧发送的第三信令中则携带真实的CE-level等级,即第一CE-level的指示信息,并使后续的第四信令和第五信令的交互信令重复与第一CE-level对应的重复次数。由于UE在用第一CE-level尝试接入失败时,可以使用本实施例中的CE-level回退接入机制,由第一CE-level回退后切换成第二CE-level,从而可以使UE尝试通过其他CE-level接入通信系统,这样可以提高部分UE的接入可能性,例如,低档位的最大发射功率的UE。
以上是接入控制方法的一个实施例,以下接入控制方法的另一个实施例是按照发射功率的档位(也可以称为等级)配置UAC参数,在UAC中考虑了最大发射功率,将最大发射功率作为一种AC映射的因素之一,或者,作为UAC的差异化参数配置的因素之一,使UAC可以分别控制不同最大发射功率档位的UE,做到更有效的拥塞控制。最大功率为14dBm的UE相比于最大功率为23dBm的UE,一般来说,会有更高的重复次数,即,更高的CE-level,所以说,14dBm可能会占用更多的资源才能接入到网络中,按CE-level配置的思路,这种UE和23dBm的UE是混在一起被一起控制进行接入尝试的,这种低功率UE被禁止接入的可能性更高。然而,这种UE又可能是广泛存在的,UE的连接数可能非常高(例如,机器类型通信中的智能传感器),其适用场景和普通的终端设备(例如,手机、平板等移动终端)应用场景差别较大。如果和普通的场景混在一起控制的话,可能会影响如机器类型通信场景下的数据采集效率。因此,以下的实施例中可以按照发射等级分别做拥塞控制,相当于按照应用场景做拥塞控制。当机器类型通信场景(即MTC场景)比较重要时,网络侧可以针对低发射功率UE作调整。
参见图5,图5是接入控制方法的另一个实施例的示意图。在以下的实施例中,接入控制方法的另一个实施例包括:
501、UE根据最大发射功率确定最大发射功率对应的第一UAC参数;
本实施例中,UE可以根据最大发射功率确定最大发射功率对应的第一UAC参数,UE可以在第一UAC参数中指示UE的最大发射功率(UE maximum transmittion power)。例如,在UAC配置中,可以使用1比特(bit)用于指示信息,从而UE可以根据UAC参数中的指 示信息确定自身的最大发射功率。
例如,UE最大发射功率分为两档,20dBm以上的最大发射功率为高发射功率档,也可称为正常发射功率档(normal power class),一般常用的最大发射功率是23dBm,20dBm及以下的最大发射功率为低发射功率档(low power class)。参见以下示例7,UE可以用UAC参数的“UE-power=TRUE”表示低发射功率档,用UAC参数的“U-power=FALSE”表示高发射功率,这样的话,当UE读取到指示信息“UE-power=TRUE”,则UE可以确定携带该指示信息“UE-power=TRUE”的UAC参数为低发射功率的UAC参数,而当UE读取到指示信息“U-power=FALSE”,则UE可以确定携带该指示信息“U-power=FALSE”的UAC参数为高发射功率的UAC参数。
示例8:
以上示例8中涉及到的英文单词翻译如下,有重复出现的单词请参照上述几个示例,在此不再赘述:
UE-Power:UE最大功率信息
maxAccessCat:AC个数的最大值
uac-barringInfoSetIndex:uac限制信息组标识
此外,UAC和最大发射功率的对应关系可以是顺序对应的,即,第一个UAC参数对应CE-level 1,第二个UAC参数对应CE-level 2,以此类推。参见以下示例9,示例9中的“uac-BarringPerPowerList”中有多个UAC-BarringPerPower”,也就是说,“uac-BarringPerPowerList”是由多个UAC-BarringPerPower”组成的列表,每一个UAC-BarringPerPower”代表一个UAC参数,每一个UAC-BarringPerPower”对应一个最大发射功率值。
示例9:
以上示例9中涉及的英文单词的中文翻译请参照上述几个示例。
502、UE根据最大发射功率以及接入尝试类型确定第一AC;
本实施例中,UE可以根据最大发射功率以及接入尝试类型确定第一AC,参见下表5,下表5为UE根据最大发射功率以及接入尝试类型确定第一AC的映射表。
表5
在上表5中,AC8是针对低发射功率而引入的AC。其他AC都是和业务相关的AC。
若接入尝试符合多个AC,UE优先映射到业务相关的AC,在第一次接入被禁止时,UE再次尝试接入时,则优先映射到功率相关的AC。举个例子,UE要发起的接入尝试既是一个SMS信息,又是一个低档位的最大发射功率所发起的尝试,则这个UE的AC可以对应AC-8,也可以对应AC-6,则UE首先确定该接入尝试对应的AC-6,若AC-6对应的接入尝试 被禁止,则UE在下一次接入尝试时,会把该接入尝试的AC映射为AC-8。
503、UE根据最大发射功率以及UE配置确定第一AI;
本实施例中,UE可以根据最大发射功率以及UE配置确定第一AI,映射的方法与步骤502类似,请参见下表6,下表6为UE根据最大发射功率以及UE配置确定第一AI的映射表。
表6
在上表6中,AI-3对应于较低档位的最大发射功率的UE。相当于,AI的值中,包括了较低档位的最大发生功率这种情况。
504、UE根据第一UAC参数、第一AC以及第一AI确定UE的接入是否被禁止;
UE根据自身最大功率情况,确定对应的UAC参数,并通过判断接入尝试对应的AC和AI值,结合对应的UAC参数,判断接入是否被禁止。
本步骤与上述实施例中的步骤204和步骤306类似,具体此处不再追诉。
UE在得到第一UAC参数、第一AC以及第一AI的值之后,可以根据这三个数值确定UE的接入是否被禁止。
需要说明的是,本实施例中的步骤501至步骤503没有绝对的先后顺序,可以先执行步骤502,再执行步骤501和503,也可以先执行步骤503,在执行步骤503和步骤501,具体此处不做限定。
此外,本实施例中,步骤502和503是可选步骤,也就是说,UE也可以仅根据第一UAC参数确定UE的接入是否被禁止,或者UE可以根据第一UAC参数以及第一AC确定UE的接入是否被禁止,或者UE可以根据第一UAC参数以及第一AI确定UE的接入是否被禁止,具体此处不做限定。
举一个UE可以根据第一UAC参数以及第一AI确定UE的接入是否被禁止的例子。UE根据接入尝试确定对应的AC值,而AI值是一个默认的值,这个默认值可以是根据UE自身能力而存储在UE侧的值,例如,UE是一个支持语音通话的UE,假设语音通话是一种运营商自定义的服务,那么UE在注册入网时就可以存储了默认的AI=15。因此,UE在判断一个 接入尝试是否被禁止时,只需映射出AC值,而不需映射出AI值。最大功率值是为了确定这个最大功率值对应的UAC是哪个。例如,网络侧配置了一组UAC参数,其中,每一个UAC参数对应了一个最大功率值(对应23dBm有一组UAC,对应14dBm有一组UAC)。UE根据自己的最大功率值,确定自己应该使用哪一组UAC。UE根据映射出的AC值以及网络侧配置的UAC参数,就可以确定UE的接入是否被禁止。
此外,UE根据第一UAC参数以及第一AI确定UE的接入是否被禁止的例子与上述例子类似,只是把AC值设为默认值。
本实施例中,由于不仅通过第一UAC参数可以得知最大发射功率的等级,而且第一AC、第一AI的值本身就代表了最大发射功率,在根据第一AC、第一AI以及第一UAC参数判断接入是否被禁止时,就可以区分出不同最大发射功率的UE,这样可以根据网络侧的拥塞来调整不同最大发射功率的UE的接入,网络侧拥塞时可以使用等级较低的最大发射功率进行接入尝试,这样占用的资源使用量就较少,从而达到控制网络资源使用量的目的。
以上是接入控制方法的一个实施例,以下接入控制方法的另一个实施例。需要说明的是,本实施例中的步骤601至602与上述实施例中的步骤201至202类似,步骤604至步骤606与上述实施例中的步骤502至504类似,此处不再赘述。
参见图6,图6是接入控制方法的另一个实施例。接入控制方法的另一个实施例包括:
601、网络侧为UE配置第二UAC参数;
本实施例中,网络侧可以为基站,还可以为小站、宏站、微站、核心网设备等,具体此处不做限定。
602、UE接收网络侧发送的第二UAC参数;
603、UE根据第二最大发射功率的第二UAC参数以及第一最大发射功率确定第一UAC参数;
当第一最大发射功率对应的第一UAC参数中的参数值不完整且UE需要确定是否可以通过该第一UAC参数接入到5G系统的通信网络中时,UE可以在获取第二UAC参数之后,根据第二最大发射功率对应的第二UAC参数以及第一最大发射功率来确定第一最大发射功率对应的第一UAC参数。由于第二UAC参数中的各个参数值是完整的,这样就可以通过以下两种方法确定第一UAC参数中的各个参数值。
方法一:UE根据第二最大发射功率的第二UAC参数、第一最大发射功率以及第二UAC参数与第一UAC参数的差分值确定第一UAC参数。
参见上述示例9,在上述示例9中,例如,UAC-BarringPerPowerList是一个列表,长度最多为maxPowerlevel。由示例2中的“(SEQUENCE(SIZE(1..maxBarringInfoSet))OF UAC-BarringInfoSet)”可配置某个在1到maxBarringInfoSet范围内长度的列表长度,假设列表长度为2,则表示这个示例列表包括了第一最大发射功率档位的UAC参数和第二最大发射功率档位的UAC参数。
低档位最大发射功率对应的UAC可以相比于高档位最大发射功率的UAC做差分配置。本实施例中,是以第一最大发射功率的UAC参数作为基准,因此在第二最大发射功率的 UAC参数里配置的是第二最大发射功率对应的UAC相比于第一最大发射功率对应的UAC参数的差值。
本步骤与上述实施例中步骤203类似,具体此处不再赘述。
方法二:UE根据第二最大发射功率的第二UAC参数、第一最大发射功率以及缩放因子确定第一UAC参数。
在方法二中,缩放因子的配置有两种方式。
1、低档位最大发射功率(本实施例中为第一最大发射功率)下UE的UAC相比于高档位最大发射功率(本实施例中为第二最大发射功率)下UE的UAC有缩放因子,可以在广播信令中配置该缩放因子。例如,正常UAC(本实施例中为第二UAC)的普通配置中,probability=0.4,time=8s,乘以缩放因子0.6,低档位最大发射功率下(本实施例中为第一最大发射功率)UE的probability=0.4*0.6,time=8*0.6。缩放因子也可应用于UAC的不同限制信息组中。缩放因子可与UAC在同一个SIB配置(例如都在SIB2中配置),也可分开在另一个SIB中配置(例如另一个在SIB1中配置)。
此外,缩放因子也可以是协议中预定义的值,有关本部分内容在上述实施例中的步骤203中有详细描述,此处不再赘述。
2、UE发起接入时,所用的缩放因子可以与UE最大发射功率档位有关。低档位最大发射功率的UE(本实施例中为第一最大发射功率的UE)/高档位最大发射功率的UE(本实施例中为第二最大发射功率的UE)=缩放因子,UE在广播的UAC参数上考虑缩放因子,如UE计算出缩放因子,并与广播的UAC参数相乘,作为该UE用于判断接入是否被禁止的根据例如,网络侧广播了CE-level 0、1、2、3的UAC参数。对于14dBmUE,缩放因子=14/23,约为0.6。第一最大发射功率的UE对应的CE-level 0的参数是广播的CE-level 0的参数和缩放因子的共同效果。例如,广播的CE-level0的probability=0.5,time=7,则这个UE对应的CE-level 0的probability=0.5*0.6,time=7*0.6。
本实施例中根据第二最大发射功率的第二UAC参数以及第一最大发射功率确定第一UAC参数的方法具体不做限定。
604、UE根据第一最大发射功率以及接入尝试类型确定第一AC;
605、UE根据第一最大发射功率以及UE配置确定第一AI;
606、UE根据第一UAC参数、第一AC以及第一AI,确定UE的接入是否被禁止。
需要说明的是,本实施例中的步骤604和步骤605是可选步骤,UE也可以仅根据第一UAC参数确定UE的接入是否被禁止,或者UE也可以根据第一UAC参数以及AI或AC中的其中一个确定UE的接入是否被禁止,具体此处不做限定。
本实施例中,UE根据第二最大发射功率的第二UAC参数、第一AC、第一AI以及第一最大发射功率确定UE的接入是否被禁止,因此UE在不能直接获知第一最大发射功率对应的第一UAC参数时,可以通过为其他最大发射功率配置的完整的第二UAC参数确定第一UAC参数,从而可以获知UE的最大发射功率,网路侧根据UE的最大发射功率的档位高低,确定是否允许UE接入,如果最大发射功率高,则网络侧可以通过禁止该UE的接入从而节省资源,使更多的UE能够接入。进一步地,本实施例中由于使用了差分配置或者缩放因 子的方法,能够进一步节省资源。
上面对本申请实施例中的接入控制方法进行了描述,下面对本申请实施例中的通信设备进行描述,请参阅图7,本申请实施例中接入网网元一个实施例包括:
该通信设备700可因配置或性能不同而产生比较大的差异,可以包括一个或一个以上中央处理器(central processing units,CPU)701(例如,一个或一个以上处理器)和存储器705,该存储器705中存储有一个或一个以上的应用程序或数据。
其中,存储器705可以是易失性存储或持久存储。存储在存储器705的程序可以包括一个或一个以上模块,每个模块可以包括对服务器中的一系列指令操作。更进一步地,中央处理器701可以设置为与存储器705通信,在通信设备700上执行存储器705中的一系列指令操作。
通信设备700还可以包括一个或一个以上电源702,一个或一个以上有线或无线网络接口703,一个或一个以上输入输出接口704,和/或,一个或一个以上操作系统,例如Windows ServerTM,Mac OS XTM,UnixTM,LinuxTM,FreeBSDTM等等。
本实施例中通信设备700中的中央处理器701所执行的流程与前述图1至6所示的实施例中描述的方法流程类似,此处不再赘述。
本申请实施例的有益效果是通信设备通过根据第一CE-level确定的第一CE-level对应的UAC参数、第一AC以及第一AI,可以确定UE的接入是否被禁止,由于第一UAC是根据第一CE-level确定的,因此网络系统可以根据UE的CE-level控制UE的接入,CE-level高的说明CE-level重复接入的次数多,所使用资源多,如果此种通信设备接入,会导致其他更多的通信设备无法接入,因此CE-level高的通信设备可能会被禁止接入,从而使更多的通信设备得以接入,这样就可以使接入控制按照资源使用量而分别为通信设备配置UAC参数,做到更有效的拥塞控制。
请参阅图8,本申请实施例中基站的一个实施例包括:
该基站800可因配置或性能不同而产生比较大的差异,可以包括一个或一个以上中央处理器(central processing units,CPU)801(例如,一个或一个以上处理器)和存储器805,该存储器805中存储有一个或一个以上的应用程序或数据。
其中,存储器805可以是易失性存储或持久存储。存储在存储器805的程序可以包括一个或一个以上模块,每个模块可以包括对服务器中的一系列指令操作。更进一步地,中央处理器801可以设置为与存储器805通信,在基站800上执行存储器805中的一系列指令操作。
基站800还可以包括一个或一个以上电源802,一个或一个以上有线或无线网络接口803,一个或一个以上输入输出接口804,和/或,一个或一个以上操作系统,例如Windows ServerTM,Mac OS XTM,UnixTM,LinuxTM,FreeBSDTM等等。
本实施例中基站800中的中央处理器801所执行的流程与前述图1至6所示的实施例中描述的方法流程类似,此处不再赘述。
本申请实施例的有益效果是,由于基站可以在UE通过第二CE-level接入基站后,根据UE发送的第一CE-level的信息,用真实的第一CE-level进行信令传输,因此能够使 UE在使用一个CE-level接入被禁止后,用其他更高等级的CE-level尝试接入,从而使更多的UE接入到基站中,提高了基站的可实用性。
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统,装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
在本申请所提供的几个实施例中,应该理解到,所揭露的系统,装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。
所述集成的单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、磁碟或者光盘等各种可以存储程序代码的介质。
以上所述,以上实施例仅用以说明本申请的技术方案,而非对其限制;尽管参照前述实施例对本申请进行了详细的说明,本领域的普通技术人员应当理解:其依然可以对前述各实施例所记载的技术方案进行修改,或者对其中部分技术特征进行等同替换;而这些修改或者替换,并不使相应技术方案的本质脱离本申请各实施例技术方案的精神和范围。
Claims (29)
- 一种接入控制方法,其特征在于,包括:通信装置根据第一覆盖增强等级CE-level确定所述第一CE-level对应的第一统一接入控制UAC参数;所述通信装置根据所述第一UAC参数,确定所述通信装置的接入是否被禁止。
- 根据权利要求1所述的方法,其特征在于,所述方法还包括:若所述通信装置根据所述第一UAC参数确定所述接入被禁止,则所述通信装置根据第二CE-level对应的第二UAC参数,确定所述接入是否被禁止,所述第二CE-level高于所述第一CE-level。
- 根据权利要求2所述的方法,其特征在于:所述通信装置根据所述第一UAC参数,确定所述接入是否被禁止包括:在接入计时器超时之前,所述通信装置根据所述第一UAC参数确定所述接入是否被禁止;所述通信装置根据第二CE-level对应的第二UAC参数,确定所述接入是否被禁止包括:在所述接入计时器超时之后,所述通信装置根据所述第二CE-level对应的所述第二UAC参数,确定所述接入是否被禁止。
- 根据权利要求2或3所述的方法,其特征在于,所述方法还包括:若所述通信装置根据所述第二UAC参数确定所述接入未被禁止,则所述通信装置根据所述第二CE-level进行所述接入;所述通信装置发送所述第一CE-level的信息;在所述通信装置发送所述第一CE-level的信息之后,所述通信装置根据所述第一CE-level进行信令传输。
- 根据权利要求1所述的方法,其特征在于,所述方法还包括:所述通信装置根据所述第一CE-level以及所述接入的接入尝试类型确定第一接入类别AC;所述通信装置根据所述第一UAC参数,确定所述通信装置的接入是否被禁止包括:所述通信装置根据所述第一UAC参数以及所述第一AC,确定所述接入是否被禁止。
- 根据权利要求1所述的方法,其特征在于,所述方法还包括:所述通信装置根据所述第一CE-level以及所述通信装置配置确定第一接入标识AI;所述通信装置根据所述第一UAC参数,确定所述通信装置的接入是否被禁止包括:所述通信装置根据所述第一UAC参数以及所述第一AI,确定所述接入是否被禁止。
- 根据权利要求5所述的方法,其特征在于,所述方法还包括:所述通信装置根据所述第一CE-level以及所述通信装置配置确定第一接入标识AI;所述通信装置根据所述第一UAC参数以及所述第一AC,确定所述通信装置的接入是否被禁止包括:所述通信装置根据所述第一UAC参数、所述第一AC以及所述第一AI,确定所述接入是否被禁止。
- 根据权利要求1或5至7中任一项所述的方法,其特征在于,用户设备通信装置根据第一覆盖增强等级CE-level确定第一统一接入控制UAC参数包括:所述通信装置根据第三CE-level对应的第三UAC参数以及所述第一CE-level确定所述第一UAC参数。
- 根据权利要求8所述的方法,其特征在于,所述通信装置根据第三CE-level对应的第三UAC参数以及所述第一CE-level确定所述第一UAC参数包括:所述通信装置根据所述第三UAC参数、所述第一CE-level以及所述第三UAC参数与所述第一UAC参数的差分值确定所述第一UAC参数。
- 根据权利要求8所述的方法,其特征在于,所述通信装置根据第三CE-level的第三UAC参数以及所述第一CE-level确定所述第一UAC参数包括:所述通信装置根据所述第三UAC参数、所述第一CE-level以及缩放因子确定所述第一UAC参数。
- 根据权利要求10所述的方法,其特征在于,所述缩放因子包括:通过广播消息配置的缩放因子,或者预定义的缩放因子。
- 一种接入控制方法,其特征在于,包括:通信装置根据第一CE-level为用户设备UE配置第一统一接入控制UAC参数;在所述UE根据第二CE-level接入之后,所述通信装置接收所述UE发送的所述第一CE-level的信息,所述第二CE-level高于所述第一CE-level;所述通信装置根据所述第一CE-level进行信令传输。
- 一种通信装置,其特征在于,包括处理器,所述处理器与存储器耦合,读取并执行所述存储器中的指令,以实现:根据第一覆盖增强等级CE-level确定所述第一CE-level对应的第一统一接入控制UAC参数;根据所述第一UAC参数,确定所述通信装置的接入是否被禁止。
- 根据权利要求13所述的通信装置,其特征在于,所述处理器还用于若所述通信装置根据所述第一UAC参数确定所述接入被禁止,则根据第二CE-level对应的第二UAC参数,确定所述接入是否被禁止,所述第二CE-level高于所述第一CE-level。
- 根据权利要求14所述的通信装置,其特征在于,所述处理器具体用于在接入计时器超时之前,根据所述第一UAC参数确定所述接入是否被禁止;在所述接入计时器超时之后,根据所述第二CE-level对应的所述第二UAC参数,确定所述接入是否被禁止。
- 根据权利要求14或15所述的通信装置,其特征在于,所述处理器还用于若根据所述第二UAC参数确定所述接入未被禁止,则根据所述第二CE-level进行所述接入;发送所述第一CE-level的信息;在发送所述第一CE-level的信息之后,根据所述第一CE-level进行信令传输。
- 根据权利要求13所述的通信装置,其特征在于,所述处理器还用于根据所述第一CE-level以及所述接入的接入尝试类型确定第一接入类别AC;根据所述第一UAC参数以及所述第一AC,确定所述接入是否被禁止。
- 根据权利要求13所述的通信装置,其特征在于,所述处理器还用于根据所述第一 CE-level以及所述通信装置配置确定第一接入标识AI;根据所述第一UAC参数以及所述第一AI,确定所述接入是否被禁止。
- 根据权利要求17所述的通信装置,其特征在于,所述处理器还用于根据所述第一CE-level以及所述通信装置配置确定第一接入标识AI;根据所述第一UAC参数、所述第一AC以及所述第一AI,确定所述接入是否被禁止。
- 根据权利要求13或17至19中任一项所述的通信装置,其特征在于,所述处理器具体用于根据第三CE-level对应的第三UAC参数以及所述第一CE-level确定所述第一UAC参数。
- 根据权利要求20所述的通信装置,其特征在于,所述处理器具体用于根据所述第三UAC参数、第一CE-level以及所述第三UAC参数与所述第一UAC参数的差分值确定所述第一UAC参数。
- 根据权利要求20所述的通信装置,其特征在于,所述处理器具体用于根据所述第三UAC参数、所述第一CE-level以及缩放因子确定所述第一UAC参数。
- 根据权利要求22所述的通信装置,其特征在于,所述缩放因子包括通过广播消息配置的缩放因子,或者预定义的缩放因子。
- 一种通信装置,其特征在于,包括处理器,所述处理器与存储器耦合,读取并执行所述存储器中的指令,以实现:根据第一CE-level为用户设备UE配置第一统一接入控制UAC参数;在所述UE根据第二CE-level接入之后,接收所述UE发送的所述第一CE-level的信息;根据所述第一CE-level进行信令传输,所述第二CE-level高于所述第一CE-level。
- 一种包含指令的计算机程序产品,其特征在于,当其在计算机上运行时,使得所述计算机执行如权利要求1至11中任一项所述的方法。
- 一种包含指令的计算机程序产品,其特征在于,当其在计算机上运行时,使得所述计算机执行如权利要求12所述的方法。
- 一种计算机可读存储介质,其特征在于,包括指令,当所述指令在计算机上运行时,使得计算机执行如权利要求1至11中任一项所述的方法。
- 一种计算机可读存储介质,其特征在于,包括指令,当所述指令在计算机上运行时,使得计算机执行如权利要求12中任一项所述的方法。
- 一种接入控制系统,其特征在于,所述接入控制系统包括如权利要求13至23中的任一项所述的通信装置,以及如权利要求24所述的通信装置。
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP19802672.6A EP3780748A4 (en) | 2018-05-17 | 2019-05-09 | ACCESS CONTROL PROCEDURE, COMMUNICATION DEVICE AND BASE STATION |
US17/096,594 US11641616B2 (en) | 2018-05-17 | 2020-11-12 | Access control method, communications device, and base station |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810475264.0A CN110505672B (zh) | 2018-05-17 | 2018-05-17 | 接入控制方法、通信设备以及基站 |
CN201810475264.0 | 2018-05-17 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US17/096,594 Continuation US11641616B2 (en) | 2018-05-17 | 2020-11-12 | Access control method, communications device, and base station |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2019218926A1 true WO2019218926A1 (zh) | 2019-11-21 |
Family
ID=68539536
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2019/086210 WO2019218926A1 (zh) | 2018-05-17 | 2019-05-09 | 接入控制方法、通信设备以及基站 |
Country Status (4)
Country | Link |
---|---|
US (1) | US11641616B2 (zh) |
EP (1) | EP3780748A4 (zh) |
CN (1) | CN110505672B (zh) |
WO (1) | WO2019218926A1 (zh) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111786848A (zh) * | 2020-06-02 | 2020-10-16 | 北京电信技术发展产业协会 | 5g终端统一接入控制的协议一致性测试方法和系统 |
CN113766668A (zh) * | 2020-06-05 | 2021-12-07 | 中山大学 | 一种窄带物联网动态随机接入控制及资源分配方法 |
WO2022178766A1 (zh) * | 2021-02-25 | 2022-09-01 | Oppo广东移动通信有限公司 | 无线通信方法、终端设备和网络设备 |
EP4199597A4 (en) * | 2020-09-04 | 2024-02-28 | Huawei Technologies Co., Ltd. | COMMUNICATION EQUIPMENT AND METHOD |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11432260B2 (en) * | 2019-07-15 | 2022-08-30 | Qualcomm Incorporated | Unified access control parameter update |
CN114128164A (zh) * | 2019-07-26 | 2022-03-01 | Oppo广东移动通信有限公司 | 一种信息处理方法、网络设备、用户设备 |
CN115474259A (zh) * | 2020-04-09 | 2022-12-13 | 中兴通讯股份有限公司 | 在无线通信中配置接入控制参数 |
US12028895B2 (en) * | 2021-03-29 | 2024-07-02 | Qualcomm Incorporated | Techniques for requesting coverage enhancement for random access procedures in wireless communications systems |
CN115175270A (zh) * | 2021-04-02 | 2022-10-11 | 北京紫光展锐通信技术有限公司 | 通信方法、装置、可读取存储介质和计算机设备 |
US11991757B2 (en) | 2021-08-05 | 2024-05-21 | Qualcomm Incorporated | Random access channel coverage enhancement |
CN113891391B (zh) * | 2021-09-14 | 2023-03-14 | 哲库科技(北京)有限公司 | 搜网方法、装置、终端设备及存储介质 |
CN118805403A (zh) * | 2022-04-22 | 2024-10-18 | 中兴通讯股份有限公司 | 用于在无线网络中节电的方法、设备和系统 |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170048760A1 (en) * | 2015-08-14 | 2017-02-16 | Qualcomm Incorporated | MOBILITY DESIGN FOR eMTC |
US20170135025A1 (en) * | 2015-11-06 | 2017-05-11 | Nokia Solutions And Networks Oy | Method and apparatus for implementing access control |
CN107277870A (zh) * | 2016-04-01 | 2017-10-20 | 宏达国际电子股份有限公司 | 处理交递的装置及方法 |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101453770A (zh) * | 2007-12-07 | 2009-06-10 | 华为技术有限公司 | 一种测量控制方法和装置 |
US10631330B2 (en) * | 2015-04-03 | 2020-04-21 | Qualcomm Incorporated | Random access procedures under coverage limitations |
CN107734595B (zh) * | 2016-08-12 | 2020-08-04 | 中兴通讯股份有限公司 | 接入控制方法及装置、系统 |
CN110234171B (zh) | 2016-08-12 | 2023-04-14 | 中兴通讯股份有限公司 | 一种无线资源配置方法和装置 |
KR102129977B1 (ko) * | 2017-02-02 | 2020-07-06 | 주식회사 케이티 | 액세스 제어 방법 및 장치 |
WO2018165909A1 (zh) * | 2017-03-15 | 2018-09-20 | 富士通株式会社 | 接入禁止方法、装置以及通信系统 |
WO2018191880A1 (zh) * | 2017-04-19 | 2018-10-25 | 北京小米移动软件有限公司 | 控制网络接入的方法及装置 |
US11109298B2 (en) * | 2017-07-14 | 2021-08-31 | Lg Electronics Inc. | Method and apparatus for updating ACB-related parameters |
CN109587812B (zh) * | 2017-09-28 | 2022-12-06 | 中兴通讯股份有限公司 | 随机接入参数确定方法及装置 |
-
2018
- 2018-05-17 CN CN201810475264.0A patent/CN110505672B/zh active Active
-
2019
- 2019-05-09 EP EP19802672.6A patent/EP3780748A4/en active Pending
- 2019-05-09 WO PCT/CN2019/086210 patent/WO2019218926A1/zh unknown
-
2020
- 2020-11-12 US US17/096,594 patent/US11641616B2/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170048760A1 (en) * | 2015-08-14 | 2017-02-16 | Qualcomm Incorporated | MOBILITY DESIGN FOR eMTC |
US20170135025A1 (en) * | 2015-11-06 | 2017-05-11 | Nokia Solutions And Networks Oy | Method and apparatus for implementing access control |
CN107277870A (zh) * | 2016-04-01 | 2017-10-20 | 宏达国际电子股份有限公司 | 处理交递的装置及方法 |
Non-Patent Citations (2)
Title |
---|
CHINA TELECOM: "TP on UAC for eLTE", 3GPP TSG-RAN WG2 MEETING #102, R2-1806945, 11 May 2018 (2018-05-11), XP051464479 * |
See also references of EP3780748A4 |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111786848A (zh) * | 2020-06-02 | 2020-10-16 | 北京电信技术发展产业协会 | 5g终端统一接入控制的协议一致性测试方法和系统 |
CN113766668A (zh) * | 2020-06-05 | 2021-12-07 | 中山大学 | 一种窄带物联网动态随机接入控制及资源分配方法 |
CN113766668B (zh) * | 2020-06-05 | 2023-12-15 | 中山大学 | 一种窄带物联网动态随机接入控制及资源分配方法 |
EP4199597A4 (en) * | 2020-09-04 | 2024-02-28 | Huawei Technologies Co., Ltd. | COMMUNICATION EQUIPMENT AND METHOD |
WO2022178766A1 (zh) * | 2021-02-25 | 2022-09-01 | Oppo广东移动通信有限公司 | 无线通信方法、终端设备和网络设备 |
Also Published As
Publication number | Publication date |
---|---|
US11641616B2 (en) | 2023-05-02 |
EP3780748A1 (en) | 2021-02-17 |
US20210076303A1 (en) | 2021-03-11 |
CN110505672B (zh) | 2020-12-15 |
EP3780748A4 (en) | 2021-06-09 |
CN110505672A (zh) | 2019-11-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2019218926A1 (zh) | 接入控制方法、通信设备以及基站 | |
US10070371B2 (en) | Extended access barring | |
CN109691215B (zh) | 通信方法及其用户设备、网络设备 | |
US20140171061A1 (en) | Network access delay for eab-configured ues and/or group-based addressed ues | |
WO2012146101A1 (zh) | Eab参数处理方法及装置、接入处理方法、装置及系统 | |
JP2013532930A (ja) | セルラネットワークにおけるセル・バーリングのための方法及びプログラム | |
WO2014176863A1 (zh) | 接入控制方法及装置 | |
US20180324890A1 (en) | Event-triggered mode switching for a mobile terminal | |
KR20190133678A (ko) | 이동 원거리 통신 시스템을 위한 장치 및 방법 | |
IL268179A (en) | Access method and terminal | |
WO2017029597A1 (en) | System and method for providing control information for application-specific congestion control for data communication | |
WO2021259358A1 (zh) | 一种部分带宽切换方法及装置 | |
EP3272182B1 (en) | Event-triggered mode switching for a mobile terminal | |
CN108076447B (zh) | 一种面向业务的mtc设备动态接入控制方法与装置 | |
WO2022151431A1 (zh) | 通信方法及装置 | |
CN114173423A (zh) | 用于子信道选择性传输站点的多用户rts帧和多用户cts帧 | |
WO2022188717A1 (zh) | 信息传输方法、装置及系统 | |
CN117956551A (zh) | 小区接入方法、通信装置及存储介质 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 19802672 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 2019802672 Country of ref document: EP Effective date: 20201111 |