WO2020042010A1 - 接入控制限制方法及装置 - Google Patents

接入控制限制方法及装置 Download PDF

Info

Publication number
WO2020042010A1
WO2020042010A1 PCT/CN2018/102942 CN2018102942W WO2020042010A1 WO 2020042010 A1 WO2020042010 A1 WO 2020042010A1 CN 2018102942 W CN2018102942 W CN 2018102942W WO 2020042010 A1 WO2020042010 A1 WO 2020042010A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
restriction
attempt
access
access attempt
Prior art date
Application number
PCT/CN2018/102942
Other languages
English (en)
French (fr)
Inventor
李艳华
Original Assignee
北京小米移动软件有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 北京小米移动软件有限公司 filed Critical 北京小米移动软件有限公司
Priority to PCT/CN2018/102942 priority Critical patent/WO2020042010A1/zh
Priority to US17/271,513 priority patent/US11805475B2/en
Priority to CN201880001854.8A priority patent/CN109196912A/zh
Publication of WO2020042010A1 publication Critical patent/WO2020042010A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access, e.g. scheduled or random access
    • H04W74/002Transmission of channel access control information
    • H04W74/006Transmission of channel access control information in the downlink, i.e. towards the terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access, e.g. scheduled or random access
    • H04W74/08Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access]
    • H04W74/0833Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access] using a random access procedure
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/20Manipulation of established connections
    • H04W76/27Transitions between radio resource control [RRC] states
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W80/00Wireless network protocols or protocol adaptations to wireless operation
    • H04W80/02Data link layer protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/18Management of setup rejection or failure

Definitions

  • the present disclosure relates to the field of communication technologies, and in particular, to an access control restriction method and device.
  • the working mechanism of AC (Access Control) restriction is based on the access level (Access Class) of the terminal and the type of call (Call Type) initiated by the terminal. Obtain the corresponding access control restriction parameters, and make an access control restriction decision (AC check).
  • AC is also introduced in the enhanced coverage scenarios of NB-IOT (Narrowband Internet of Things, NB-IoT) and eMTC (enhanced machine type of communication).
  • NB-IOT Nearband Internet of Things
  • eMTC enhanced machine type of communication
  • the purpose of the restriction mechanism is to restrict users whose cell edges are at an enhanced coverage.
  • AC restriction mechanisms in enhanced coverage scenarios are restricted from coverage enhancement level (CE level).
  • the terminal fails the access attempt at one CE level and the access attempt fails at the next CE level, the terminal will continue to try at the current CE level, resulting in a large number of LF.
  • embodiments of the present disclosure provide an access control restriction method and device.
  • an access control restriction method is provided.
  • the method is used for a terminal, and the method includes:
  • the corresponding access attempt restriction is performed according to the corresponding access attempt restriction manner.
  • the setting rule includes first indication information, and the first indication information is used to represent an early termination attempt;
  • the determining a corresponding access attempt restriction mode according to a set rule includes:
  • a first restriction mode is determined according to the first instruction information, and the first restriction mode is an early termination attempt on the specified coverage enhancement level.
  • the corresponding access attempt restriction according to the corresponding access attempt restriction mode includes:
  • the media access control MAC layer of the terminal generates error notification information, where the error notification information is used to indicate that a random access process error has occurred, and sends the error notification information to a radio resource control RRC layer of the terminal.
  • the setting rule includes a specified number of attempts, or second instruction information used to characterize the specified number of attempts;
  • the determining a corresponding access attempt restriction mode according to a set rule includes:
  • a second restriction mode is determined according to the specified number of attempts, and the second restriction mode is to perform an access attempt at the specified coverage enhancement level according to the specified number of attempts.
  • the corresponding access attempt restriction according to the corresponding access attempt restriction mode includes:
  • the MAC layer of the terminal continues access attempts at the specified coverage enhancement level until the number of failed attempts reaches the specified number of attempts, the MAC layer of the terminal generates error notification information, which is used to indicate that a random access process has occurred And send the error notification information to the RRC layer of the terminal.
  • the error notification information includes a cause indication of the occurrence of the random access procedure error.
  • the method further includes:
  • the RRC layer of the terminal After receiving the error notification information, the RRC layer of the terminal terminates the RRC timer in advance according to the error notification information, and notifies the MAC layer of the terminal to stop continuing the attempt.
  • the method further includes:
  • the RRC layer of the terminal After receiving the error notification information, the RRC layer of the terminal does not terminate the RRC timer in advance according to the error notification information, and provides the MAC layer of the terminal with a method of continuing to perform access attempts at the specified coverage enhancement level. Additional conditions.
  • the setting rule is prescribed by a communication protocol or written in the terminal in a form of firmware.
  • the setting rule is notified by the base station to the terminal through a system message or designated signaling;
  • the determining a corresponding access attempt restriction mode according to a set rule includes:
  • the terminal determines an access attempt restriction manner corresponding to the designated coverage enhancement level according to the setting rule included in the designated signaling;
  • the terminal determines an access attempt restriction manner corresponding to the specified coverage enhancement level according to the setting rule included in the system message.
  • system message or designated signaling further includes a valid time and / or a valid area using the set rule
  • the determining a corresponding access attempt restriction mode according to a set rule includes:
  • an access attempt restriction manner corresponding to the specified coverage enhancement level is determined according to the setting rule.
  • an access control restriction device is provided.
  • the device is used for a terminal.
  • the device includes:
  • An access attempt module configured to perform an access attempt at a designated coverage enhancement level
  • a determining module configured to determine a corresponding access attempt restriction mode according to a set rule when the access attempt fails
  • the restriction module is configured to perform corresponding access attempt restriction according to the corresponding access attempt restriction mode.
  • the setting rule includes first indication information, and the first indication information is used to represent an early termination attempt;
  • the determining module includes:
  • a first determining submodule is configured to determine a first restriction mode according to the first instruction information, and the first restriction mode is an early termination attempt on the specified coverage enhancement level.
  • the restriction module includes:
  • a first processing submodule configured to generate error notification information for a media access control MAC layer of the terminal, where the error notification information is used to indicate that a random access process error has occurred, and send the error notification information to the The radio resources of the terminal control the RRC layer.
  • the setting rule includes a specified number of attempts or second indication information used to characterize the specified number of attempts;
  • the determining module includes:
  • a second determining submodule is configured to determine a second restriction mode according to the specified number of attempts, and the second restriction mode is to perform an access attempt at the specified coverage enhancement level according to the specified number of attempts.
  • the restriction module includes:
  • the second processing submodule is configured to continue to perform an access attempt at the specified coverage enhancement level until the number of failed attempts reaches the specified number of attempts, and the MAC layer of the terminal generates error notification information, the error notification information It is used to indicate that a random access process error has occurred, and send the error notification information to the RRC layer of the terminal.
  • the error notification information includes a cause indication of the occurrence of the random access procedure error.
  • the apparatus further includes:
  • the stop-and-continue attempt module is configured to, after the RRC layer of the terminal receives the error notification information, terminate the RRC timer in advance according to the error notification information, and notify the MAC layer of the terminal to stop the attempt.
  • the apparatus further includes:
  • the continuation attempt module is configured such that, after receiving the error notification information, the RRC layer of the terminal does not terminate the RRC timer in advance according to the error notification information, and provides the MAC layer of the terminal to continue to cover the specified coverage. Additional conditions for enhanced access attempts.
  • the setting rule is prescribed by a communication protocol or written in the terminal in a form of firmware.
  • the setting rule is notified by the base station to the terminal through a system message or designated signaling;
  • the determining module includes:
  • a third determining submodule is configured to, when the designated signaling includes the setting rule, the terminal determines the designated coverage enhancement level correspondence according to the setting rule included in the designated signaling. Access attempt restriction method;
  • a fourth determination sub-module is configured to, when the designated signaling does not include the setting rule, the terminal determines the designated coverage enhancement level correspondence according to the setting rule included in the system message. Access attempts are restricted.
  • system message or designated signaling further includes a valid time and / or a valid area using the set rule;
  • the determining module includes:
  • a fifth determining sub-module is configured to determine an access attempt restriction manner corresponding to the specified coverage enhancement level according to the setting rule within an effective time and / or effective area of the setting rule.
  • a non-transitory computer-readable storage medium stores a computer program, and the computer program is configured to execute the access control restriction method according to the first aspect .
  • an access control limit device is provided.
  • the device is used for a terminal.
  • the device includes:
  • Memory for storing processor-executable instructions
  • the processor is configured to:
  • the corresponding access attempt restriction is performed according to the corresponding access attempt restriction manner.
  • a terminal in the present disclosure makes an access attempt at a designated coverage enhancement level, when the access attempt is an unsuccessful attempt, it can determine the corresponding access attempt restriction method according to the set rules, and respond according to the corresponding access attempt restriction method. Restriction of access attempts, which can avoid unlimited access attempts at the specified coverage enhancement level, thereby saving resource consumption and improving the reliability of access control restrictions
  • Fig. 1 is a flow chart showing a method for restricting access control according to an exemplary embodiment
  • Fig. 2 is an application scenario diagram of an access control restriction method according to an exemplary embodiment
  • Fig. 3 is a flow chart showing another method for restricting access control according to an exemplary embodiment
  • Fig. 4 is a flow chart showing another method for restricting access control according to an exemplary embodiment
  • Fig. 5 is a flow chart showing another method for restricting access control according to an exemplary embodiment
  • Fig. 6 is a block diagram showing an access control restriction device according to an exemplary embodiment
  • Fig. 7 is a block diagram showing another apparatus for restricting access control according to an exemplary embodiment
  • Fig. 8 is a block diagram showing another apparatus for restricting access control according to an exemplary embodiment
  • Fig. 9 is a block diagram showing another apparatus for restricting access control according to an exemplary embodiment.
  • Fig. 10 is a block diagram showing another apparatus for restricting access control according to an exemplary embodiment
  • Fig. 11 is a block diagram of another apparatus for restricting access control according to an exemplary embodiment
  • Fig. 12 is a block diagram showing another apparatus for restricting access control according to an exemplary embodiment
  • Fig. 13 is a block diagram showing another apparatus for restricting access control according to an exemplary embodiment
  • Fig. 14 is a schematic structural diagram of an access control restriction device according to an exemplary embodiment.
  • the terms first, second, third, etc. may be used in this disclosure to describe various information, such information should not be limited to these terms. These terms are only used to distinguish the same type of information from each other.
  • the indication information may also be referred to as second information, and similarly, the second information may also be referred to as indication information.
  • the word “if” as used herein can be interpreted as “at” or "when” or "in response to determination”.
  • Fig. 1 is a flowchart illustrating an access control restriction method according to an exemplary embodiment
  • Fig. 2 is an application scenario diagram of an access control restriction method according to an exemplary embodiment
  • the access control restriction The method may be applied to a terminal, and the terminal may be a UE (User Equipment); as shown in FIG. 1, the access control restriction method may include the following steps 110-130:
  • step 110 an access attempt is made at a designated coverage enhancement level.
  • the designated coverage enhancement level may be the next coverage enhancement level to which the terminal migrates after access failure of a certain coverage enhancement level.
  • three coverage enhancement levels are divided, namely CE Level0, CE Level1, and CE Level2. If the terminal can access CE Level 0 normally, but then the terminal fails to access CE level 0 due to poor channel conditions, then the terminal can migrate to CE level 1 for access attempts. If it passes, it can access CE level 1. And initiate a random access process.
  • step 120 when the access attempt is a failed attempt, the corresponding access attempt restriction mode is determined according to the set rule.
  • the terminal determines a corresponding access attempt restriction method according to a set rule, and responds according to the access attempt restriction method. Access attempts are restricted.
  • the access attempt restriction mode is a first restriction mode
  • the first restriction mode is used to represent an early termination attempt of the specified coverage enhancement level.
  • FIG. 3 For a specific implementation process, refer to the embodiment shown in FIG. 3.
  • the access attempt restriction mode is a second restriction mode
  • the second restriction mode is used to indicate that an access attempt is performed at the specified coverage enhancement level according to the specified number of attempts.
  • Manner 1 The setting rule is prescribed by a communication protocol or written in the terminal in the form of firmware.
  • Manner 2 The setting rule is notified by the base station to the terminal through a system message or designated signaling.
  • the designated signaling is a dedicated signaling used by the base station to notify the terminal to enter an idle state or a suspended state.
  • the method may include:
  • the terminal determines an access attempt restriction method corresponding to the designated coverage enhancement level according to the setting rule included in the designated signaling ;
  • the terminal determines an access attempt restriction method corresponding to the designated coverage enhancement level according to the setting rule included in the system message .
  • Manner 3 In addition to the contents in Manner 2, the system message or designated signaling also includes a valid time and / or valid area using the setting rule.
  • the method may include:
  • the valid time may be a system appointment or a network configuration, for example, within 300 seconds.
  • the effective area can also be system-approved or network-configured. If it is system-approved, it can be limited to the cell and / or RAN-based Notification Area (RNA) and / or tracking area ( Tracking Area (TA); if configured by the network, a cell list and / or a RAN-based notification area list and / or a tracking area list may be configured.
  • RNA RAN-based Notification Area
  • TA Tracking Area
  • RAN is an abbreviation for Radio Access Network (Radio Access Network).
  • step 130 the corresponding access attempt restriction is performed according to the corresponding access attempt restriction mode.
  • a base station and a terminal are included.
  • the enhanced coverage scenario such as: NB-IOT or eMTC
  • the terminal fails to access the coverage enhancement level, it can migrate to the next coverage enhancement level for access.
  • an access attempt restriction method corresponding to the coverage enhancement level may be determined according to a set rule at this time, and the access attempt restriction may be performed according to the access attempt restriction manner.
  • the corresponding access attempt restriction method when an access attempt is performed at a designated coverage enhancement level, when the access attempt is a failed attempt, the corresponding access attempt restriction method can be determined according to the set rules, and the corresponding access attempt restriction method can be used. Corresponding access attempt restrictions, which can avoid unlimited access attempts at designated coverage enhancement levels, thereby saving resource consumption and improving the reliability of access control restrictions.
  • Fig. 3 is a flow chart showing another method for restricting access control according to an exemplary embodiment.
  • the method for restricting access control can be applied to a terminal, and the setting rule is established on the basis of the method shown in Fig. 1
  • the first instruction information is included, and the first instruction information is used to represent an early termination attempt.
  • the setting rule is specified by a communication protocol or written in the terminal in the form of firmware.
  • the setting rule is notified by the base station to the terminal through a system message or designated signaling; when step 120 is performed, as shown in FIG. 3, the following step 310 may be included:
  • a first restriction mode is determined according to the first instruction information, and the first restriction mode is an early termination attempt for the specified coverage enhancement level.
  • step 320 when step 130 is performed, as shown in FIG. 3, the following step 320 may be included:
  • the MAC (Media Access Control) layer of the terminal generates error notification information, which is used to indicate that a random access process error has occurred, and sends the error notification information to the RRC ( Radio Resource Control (Radio Resource Control) layer.
  • the error notification information may include a cause indication of the occurrence of the random access process error.
  • the access control restriction method may further include step 330:
  • step 330 after receiving the error notification information, the RRC layer of the terminal terminates the RRC timer in advance according to the error notification information, and notifies the MAC layer of the terminal to stop further attempts.
  • the RRC timer can be T300.
  • the access control restriction method may further include step 340:
  • step 340 after receiving the error notification information, the RRC layer of the terminal does not terminate the RRC timer in advance according to the error notification information, and provides additional conditions for the MAC layer of the terminal to continue the access attempt at the specified coverage enhancement level.
  • the additional condition may be a specified number of continued attempts; after the attempt is completed to reach the specified number of continued attempts, the terminal is again notified of a random access process error in the RRC layer; the attached condition may also be an indication that the terminal continues to be in The specified coverage enhancement level is retried and the number of continuation attempts corresponding to the specified coverage enhancement level is attempted; after the attempt is completed to reach the indicated number of continuation attempts, the RRC layer of the terminal is notified again that a random access process error has occurred.
  • the MAC layer of the terminal may continue to make access attempts at the specified coverage enhancement level according to the number of continued attempts provided by the RRC layer of the terminal; when the number of failed attempts reaches the number of continued attempts provided by the RRC layer of the terminal, the terminal The MAC layer can generate error notification information again and send the regenerated error notification information to the terminal's RRC layer, and the terminal's RRC layer decides whether to stop trying or continue to provide access at the specified coverage enhancement level. Additional conditions to try, and so on.
  • the terminal's MAC can also notify the terminal of the RRC layer that a random access process error has occurred, and the terminal's RRC layer Deciding whether to stop further attempts or conditional access attempts improves the accuracy of access control restrictions.
  • Fig. 4 is a flowchart illustrating another access control restriction method according to an exemplary embodiment.
  • the access control restriction method may be applied to a terminal, and the setting rule is established on the basis of the method shown in Fig. 1 It includes a specified number of attempts, or second instruction information used to characterize the specified number of attempts.
  • the setting rule is specified by a communication protocol or written in a terminal in the form of firmware.
  • the setting rule is notified by the base station to the terminal through a system message or designated signaling; when step 120 is performed, as shown in FIG. 4, the following step 410 may be included:
  • a second restriction mode is determined according to a specified number of attempts, and the second restriction mode is to perform an access attempt at a specified coverage enhancement level according to the specified number of attempts.
  • step 420 when step 130 is performed, as shown in FIG. 4, the following step 420 may be included:
  • step 420 the access attempt is continued at the specified coverage enhancement level, until the number of failed attempts reaches the specified number of attempts, the MAC layer of the terminal generates error notification information, which is used to indicate that a random access process error has occurred, And send the error notification information to the RRC layer of the terminal.
  • the error notification information may include a cause indication of the occurrence of the random access process error.
  • the access control restriction method may further include step 430:
  • step 430 after receiving the error notification information, the RRC layer of the terminal terminates the RRC timer in advance according to the error notification information, and notifies the MAC layer of the terminal to stop continuing the attempt.
  • the RRC timer can be T300.
  • the access control restriction method may further include step 440:
  • step 440 after receiving the error notification information, the RRC layer of the terminal does not terminate the RRC timer in advance according to the error notification information, and provides additional conditions for the MAC layer of the terminal to continue access attempts at the specified coverage enhancement level.
  • the additional condition may be a specified number of continued attempts; after the attempt is completed to reach the specified number of continued attempts, the terminal is again notified of a random access process error in the RRC layer; the attached condition may also be an indication that the terminal continues to be in The specified coverage enhancement level is retried and the number of continuation attempts corresponding to the specified coverage enhancement level is attempted; after the attempt is completed to reach the indicated number of continuation attempts, the RRC layer of the terminal is notified again that a random access process error has occurred.
  • the MAC layer of the terminal may continue to perform access attempts at the specified coverage enhancement level according to the number of continued attempts provided by the RRC layer of the terminal; when the number of failed attempts reaches the number of continued attempts provided by the RRC layer of the terminal, The MAC layer of the terminal can generate error notification information again, and send the regenerated error notification information to the RRC layer of the terminal, and the RRC layer of the terminal decides whether to stop trying or continue to provide connection at the specified coverage enhancement level. Additional conditions for entry attempts, and so on.
  • the terminal ’s MAC can also notify the terminal of an RRC layer The random access process is wrong, and the RRC layer of the terminal finally decides whether to stop continuing the attempt or an access attempt with conditions, thereby improving the reliability of the access control restriction.
  • the present disclosure also provides an embodiment of the access control restriction device.
  • Fig. 5 is a block diagram of an access control restriction device according to an exemplary embodiment.
  • the device is used for a terminal and is used to execute the access control restriction method shown in Fig. 1.
  • the access The control limitation device may include:
  • the access attempt module 51 is configured to perform an access attempt at a designated coverage enhancement level
  • the determining module 52 is configured to determine a corresponding access attempt restriction mode according to a set rule when the access attempt fails;
  • the restriction module 53 is configured to perform corresponding access attempt restriction according to the corresponding access attempt restriction mode.
  • the corresponding access attempt restriction method when an access attempt is performed at a designated coverage enhancement level, when the access attempt is a failed attempt, the corresponding access attempt restriction method can be determined according to the set rules, and the corresponding access attempt restriction method can be used. Corresponding access attempt restrictions, which can avoid unlimited access attempts at designated coverage enhancement levels, thereby saving resource consumption and improving the reliability of access control restrictions.
  • the setting rule includes first instruction information, and the first instruction information is used to represent an early termination attempt.
  • the determination Module 52 may include:
  • the first determining sub-module 61 is configured to determine a first restriction mode according to the first instruction information, and the first restriction mode is an early termination attempt on the specified coverage enhancement level.
  • the restriction module 53 may include:
  • the first processing sub-module 71 is configured to generate error notification information of a MAC layer of the terminal, where the error notification information is used to indicate that a random access process error occurs, and send the error notification information to the terminal.
  • RRC layer RRC layer.
  • the terminal's MAC can also notify the terminal of the RRC layer that a random access process error has occurred, and the terminal's RRC layer Deciding whether to stop further attempts or conditional access attempts improves the accuracy of access control restrictions.
  • the setting rule includes a specified number of attempts or second instruction information used to characterize the specified number of attempts; as shown in FIG. 8, the The determining module 52 may include:
  • the second determining submodule 81 is configured to determine a second restriction mode according to the specified number of attempts, and the second restriction mode is to perform an access attempt at the specified coverage enhancement level according to the specified number of attempts.
  • the restriction module 53 may include:
  • the second processing sub-module 91 is configured to continue to perform an access attempt at the specified coverage enhancement level until the number of failed attempts reaches the specified number of attempts, the MAC layer of the terminal generates error notification information, and the error notification The information is used to indicate that a random access process error has occurred, and the error notification information is sent to an RRC layer of the terminal.
  • the terminal ’s MAC can also notify the terminal of an RRC layer.
  • the random access process is wrong, and the RRC layer of the terminal finally decides whether to stop continuing the attempt or an access attempt with conditions, thereby improving the reliability of the access control restriction.
  • the error notification information includes a cause indication of the occurrence of the random access process error.
  • the apparatus may further include:
  • the stop attempting module 101 is configured to, after receiving the error notification information, the RRC layer of the terminal terminates the RRC timer in advance according to the error notification information, and notifies the MAC layer of the terminal to stop the attempt.
  • the apparatus may further include:
  • the RRC layer of the terminal After receiving the error notification information, the RRC layer of the terminal does not terminate the RRC timer in advance according to the error notification information, and provides the MAC layer of the terminal to continue in the designation. Additional conditions to cover enhanced levels for access attempts.
  • the setting rule is specified by a communication protocol or written in the terminal in the form of firmware.
  • the setting rule is notified by the base station to the terminal through a system message or designated signaling; as shown in FIG. 12, the determining module 52 may include:
  • the third determining sub-module 121 is configured to, when the designated signaling includes the setting rule, the terminal determines the designated coverage enhancement level according to the setting rule included in the designated signaling. Corresponding access attempt restriction mode;
  • the fourth determining sub-module 122 is configured to determine the specified coverage enhancement level according to the setting rule included in the system message when the setting rule is not included in the specified signaling. Corresponding access attempt restriction mode.
  • the system message or designated signaling further includes a valid time and / or valid area using the setting rule; as shown in FIG. 13, the The determining module 53 may include:
  • the fifth determining submodule 131 is configured to determine an access attempt restriction manner corresponding to the specified coverage enhancement level according to the setting rule within an effective time and / or effective area of the setting rule.
  • the relevant part may refer to the description of the method embodiment.
  • the device embodiments described above are only schematic, in which the units described as separate components may or may not be physically separated, and the components shown as units may or may not be physical units, that is, may be located in one Place, or can be distributed across multiple network elements. Some or all of the modules can be selected according to actual needs to achieve the objectives of the solution of the present disclosure. Those of ordinary skill in the art can understand and implement without creative efforts.
  • the present disclosure also provides a non-transitory computer-readable storage medium.
  • a computer program is stored on the storage medium, and the computer program is configured to execute the access control restriction method described in any one of FIG. 1 to FIG. 4.
  • the present disclosure also provides an access control restriction device.
  • the device is used for a terminal.
  • the device includes:
  • Memory for storing processor-executable instructions
  • the processor is configured to:
  • the corresponding access attempt restriction is performed according to the corresponding access attempt restriction manner.
  • Fig. 14 is a schematic structural diagram of an access control restriction device according to an exemplary embodiment.
  • an access control restriction device 1400 is shown according to an exemplary embodiment.
  • the device 1400 may be a computer, a mobile phone, a digital broadcast terminal, a messaging device, a game console, a tablet device, or a medical device , Fitness equipment, personal digital assistants and other terminals.
  • the device 1400 may include one or more of the following components: a processing component 1401, a memory 1402, a power component 1403, a multimedia component 1404, an audio component 1405, an input / output (I / O) interface 1406, a sensor component 1407, And communication component 1408.
  • a processing component 1401 a memory 1402, a power component 1403, a multimedia component 1404, an audio component 1405, an input / output (I / O) interface 1406, a sensor component 1407, And communication component 1408.
  • the processing component 1401 generally controls the overall operations of the device 1400, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations.
  • the processing component 1401 may include one or more processors 1409 to execute instructions to complete all or part of the steps of the method described above.
  • the processing component 1401 may include one or more modules to facilitate interaction between the processing component 1401 and other components.
  • the processing component 1401 may include a multimedia module to facilitate the interaction between the multimedia component 1404 and the processing component 1401.
  • the memory 1402 is configured to store various types of data to support operation at the device 1400. Examples of such data include instructions for any application or method operating on the device 1400, contact data, phone book data, messages, pictures, videos, and the like.
  • the memory 1402 may be implemented by any type of volatile or non-volatile storage devices, or a combination thereof, such as static random access memory (SRAM), electrically erasable programmable read-only memory (EEPROM), Programming read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic disk or optical disk.
  • SRAM static random access memory
  • EEPROM electrically erasable programmable read-only memory
  • EPROM Programming read-only memory
  • PROM programmable read-only memory
  • ROM read-only memory
  • magnetic memory flash memory
  • flash memory magnetic disk or optical disk.
  • the power supply component 1403 provides power to various components of the device 1400.
  • the power component 1403 may include a power management system, one or more power sources, and other components associated with generating, managing, and distributing power for the device 1400.
  • the multimedia component 1404 includes a screen that provides an output interface between the device 1400 and a user.
  • the screen may include a liquid crystal display (LCD) and a touch panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive an input signal from a user.
  • the touch panel includes one or more touch sensors to sense touch, swipe, and gestures on the touch panel. The touch sensor may not only sense a boundary of a touch or slide action, but also detect duration and pressure related to the touch or slide operation.
  • the multimedia component 1404 includes a front camera and / or a rear camera. When the device 1400 is in an operation mode, such as a shooting mode or a video mode, the front camera and / or the rear camera can receive external multimedia data. Each front camera and rear camera can be a fixed optical lens system or have focal length and optical zoom capabilities.
  • the audio component 1405 is configured to output and / or input audio signals.
  • the audio component 1405 includes a microphone (MIC) that is configured to receive an external audio signal when the device 1400 is in an operation mode, such as a call mode, a recording mode, and a voice recognition mode.
  • the received audio signal may be further stored in the memory 1402 or transmitted via the communication component 1408.
  • the audio component 1405 further includes a speaker for outputting audio signals.
  • the I / O interface 1406 provides an interface between the processing component 1401 and a peripheral interface module.
  • the peripheral interface module may be a keyboard, a click wheel, a button, or the like. These buttons may include, but are not limited to: a home button, a volume button, a start button, and a lock button.
  • the sensor component 1407 includes one or more sensors for providing status assessment of various aspects to the device 1400.
  • the sensor component 1407 can detect the on / off state of the device 1400, and the relative positioning of the components, such as the display and keypad of the device 1400.
  • the sensor component 1407 can also detect the change in the position of the device 1400 or a component of the device 1400 , The presence or absence of the user's contact with the device 1400, the orientation or acceleration / deceleration of the device 1400, and the temperature change of the device 1400.
  • the sensor component 1407 may include a proximity sensor configured to detect the presence of nearby objects without any physical contact.
  • the sensor component 1407 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications.
  • the sensor component 1407 may further include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
  • the communication component 1408 is configured to facilitate wired or wireless communication between the device 1400 and other devices.
  • the device 1400 can access a wireless network based on a communication standard, such as WiFi, 2G, or 3G, or a combination thereof.
  • the communication component 1408 receives a broadcast signal or broadcast-related information from an external broadcast management system via a broadcast channel.
  • the communication component 1408 further includes a near field communication (NFC) module to facilitate short-range communication.
  • the NFC module can be implemented based on radio frequency identification (RFID) technology, infrared data association (IrDA) technology, ultra wideband (UWB) technology, Bluetooth (BT) technology, and other technologies.
  • RFID radio frequency identification
  • IrDA infrared data association
  • UWB ultra wideband
  • Bluetooth Bluetooth
  • the apparatus 1400 may be implemented by one or more application specific integrated circuits (ASICs), digital signal processors (DSPs), digital signal processing devices (DSPDs), programmable logic devices (PLDs), field programmable A gate array (FPGA), controller, microcontroller, microprocessor, or other electronic component is implemented to perform the above method.
  • ASICs application specific integrated circuits
  • DSPs digital signal processors
  • DSPDs digital signal processing devices
  • PLDs programmable logic devices
  • FPGA field programmable A gate array
  • controller microcontroller, microprocessor, or other electronic component is implemented to perform the above method.
  • a non-transitory computer-readable storage medium including instructions may be executed by the processor 1409 of the device 1400 to complete the foregoing method.
  • the non-transitory computer-readable storage medium may be a ROM, a random access memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
  • the device 1400 can execute any one of the access control restriction methods described above.

Abstract

本公开提供一种接入控制限制方法及装置,所述方法包括:在指定覆盖增强等级进行接入尝试;当所述接入尝试为尝试失败时,则按照设定规则确定对应的接入尝试限制方式;根据所述对应的接入尝试限制方式进行对应的接入尝试限制。因此,本公开可以避免无限制地在指定覆盖增强等级进行接入尝试,从而节省了资源消耗,还提高了接入控制限制的可靠性。

Description

接入控制限制方法及装置 技术领域
本公开涉及通信技术领域,尤其涉及一种接入控制限制方法及装置。
背景技术
在LTE(Long Term Evolution,长期演进)通信系统中,AC(Access Control,接入控制)限制的工作机制是:根据终端的接入等级(Access Class)以及终端发起的呼叫类型(Call Type)来获取相应的接入控制限制参数,进行接入控制限制判决(AC barring check)。
在新一代通信系统中,对于NB-IOT(窄带物联网Narrow Band Internet of Things,NB-IoT)和eMTC(enhanced machine type of communication,增强的机器类型通信)的增强覆盖场景中,也引入了AC限制机制,其目的是限制小区边缘处于覆盖增强的用户。并且,增强覆盖场景下的AC限制机制都是从覆盖增强等级(Coverage Enhancement Level,CE level)进行限制(bar)。
因此,在随机接入过程中,若终端在某个CE level接入尝试失败,而在下一个CE level也接入尝试失败,该终端将会一直继续在当前CE level进行尝试,从而造成了大量的资源消耗。
发明内容
为克服相关技术中存在的问题,本公开实施例提供一种接入控制限制方法及装置。
根据本公开实施例的第一方面,提供一种接入控制限制方法,所述方法用于终端,所述方法包括:
在指定覆盖增强等级进行接入尝试;
当所述接入尝试为尝试失败时,则按照设定规则确定对应的接入尝试限制方式;
根据所述对应的接入尝试限制方式进行对应的接入尝试限制。
可选地,所述设定规则中包括第一指示信息,所述第一指示信息用于表征提前 终止尝试;
所述按照设定规则确定对应的接入尝试限制方式,包括:
根据所述第一指示信息确定第一限制方式,所述第一限制方式是对所述指定覆盖增强等级进行提前终止尝试。
可选地,所述根据所述对应的接入尝试限制方式进行对应的接入尝试限制,包括:
所述终端的媒体访问控制MAC层生成错误通知信息,所述错误通知信息用于指示发生了随机接入过程错误,并将所述错误通知信息发送至所述终端的无线资源控制RRC层。
可选地,所述设定规则中包括指定尝试次数、或用于表征所述指定尝试次数的第二指示信息;
所述按照设定规则确定对应的接入尝试限制方式,包括:
根据所述指定尝试次数确定第二限制方式,所述第二限制方式是根据所述指定尝试次数在所述指定覆盖增强等级进行接入尝试。
可选地,所述根据所述对应的接入尝试限制方式进行对应的接入尝试限制,包括:
继续在所述指定覆盖增强等级进行接入尝试,直到尝试失败次数到达所述指定尝试次数时,所述终端的MAC层生成错误通知信息,所述错误通知信息用于指示发生了随机接入过程错误,并将所述错误通知信息发送至所述终端的RRC层。
可选地,所述错误通知信息中包括发生所述随机接入过程错误的原因指示。
可选地,所述方法还包括:
所述终端的RRC层接收到所述错误通知信息后,根据所述错误通知信息提前终止RRC定时器,并通知所述终端的MAC层停止继续尝试。
可选地,所述方法还包括:
所述终端的RRC层接收到所述错误通知信息后,根据所述错误通知信息不提前终止RRC定时器,并为所述终端的MAC层提供继续在所述指定覆盖增强等级进行接入尝试的附加条件。
可选地,所述设定规则是通信协议规定的、或以固件形式写在所述终端中的。
可选地,所述设定规则是基站通过系统消息或指定信令通知所述终端的;
所述按照设定规则确定对应的接入尝试限制方式,包括:
当所述指定信令中包括所述设定规则时,则所述终端根据所述指定信令中包括的所述设定规则确定所述指定覆盖增强等级对应的接入尝试限制方式;
当所述指定信令中不包括所述设定规则时,则所述终端根据所述系统消息中包括的所述设定规则确定所述指定覆盖增强等级对应的接入尝试限制方式。
可选地,所述系统消息或指定信令中还包括使用所述设定规则的有效时间和/或有效地区;
所述按照设定规则确定对应的接入尝试限制方式,包括:
在所述设定规则的有效时间和/或有效地区内,按照所述设定规则确定所述指定覆盖增强等级对应的接入尝试限制方式。
根据本公开实施例的第二方面,提供一种接入控制限制装置,所述装置用于终端,所述装置包括:
接入尝试模块,被配置为在指定覆盖增强等级进行接入尝试;
确定模块,被配置为当所述接入尝试为失败时,则按照设定规则确定对应的接入尝试限制方式;
限制模块,被配置为根据所述对应的接入尝试限制方式进行对应的接入尝试限制。
可选地,所述设定规则中包括第一指示信息,所述第一指示信息用于表征提前终止尝试;所述确定模块包括:
第一确定子模块,被配置为根据所述第一指示信息确定第一限制方式,所述第一限制方式是对所述指定覆盖增强等级进行提前终止尝试。
可选地,所述限制模块包括:
第一处理子模块,被配置为所述终端的媒体访问控制MAC层生成错误通知信息,所述错误通知信息用于指示发生了随机接入过程错误,并将所述错误通知信息发送至所述终端的无线资源控制RRC层。
可选地,所述设定规则中包括指定尝试次数、或用于表征所述指定尝试次数的第二指示信息;所述确定模块包括:
第二确定子模块,被配置为根据所述指定尝试次数确定第二限制方式,所述第二限制方式是根据所述指定尝试次数在所述指定覆盖增强等级进行接入尝试。
可选地,所述限制模块包括:
第二处理子模块,被配置为继续在所述指定覆盖增强等级进行接入尝试,直到尝试失败次数到达所述指定尝试次数时,所述终端的MAC层生成错误通知信息,所述错误通知信息用于指示发生了随机接入过程错误,并将所述错误通知信息发送至所述终端的RRC层。
可选地,所述错误通知信息中包括发生所述随机接入过程错误的原因指示。
可选地,所述装置还包括:
停止继续尝试模块,被配置为所述终端的RRC层接收到所述错误通知信息后,根据所述错误通知信息提前终止RRC定时器,并通知所述终端的MAC层停止继续尝试。
可选地,所述装置还包括:
继续尝试模块,被配置为所述终端的RRC层接收到所述错误通知信息后,根据所述错误通知信息不提前终止RRC定时器,并为所述终端的MAC层提供继续在所述指定覆盖增强等级进行接入尝试的附加条件。
可选地,所述设定规则是通信协议规定的、或以固件形式写在所述终端中的。
可选地,所述设定规则是基站通过系统消息或指定信令通知所述终端的;所述确定模块包括:
第三确定子模块,被配置为当所述指定信令中包括所述设定规则时,则所述终端根据所述指定信令中包括的所述设定规则确定所述指定覆盖增强等级对应的接入尝试限制方式;
第四确定子模块,被配置为当所述指定信令中不包括所述设定规则时,则所述终端根据所述系统消息中包括的所述设定规则确定所述指定覆盖增强等级对应的接入尝试限制方式。
可选地,所述系统消息或指定信令中还包括使用所述设定规则的有效时间和/ 或有效地区;所述确定模块包括:
第五确定子模块,被配置为在所述设定规则的有效时间和/或有效地区内,按照所述设定规则确定所述指定覆盖增强等级对应的接入尝试限制方式。
根据本公开实施例的第三方面,提供一种非临时计算机可读存储介质,所述存储介质上存储有计算机程序,所述计算机程序用于执行上述第一方面所述的接入控制限制方法。
根据本公开实施例的第四方面,提供一种接入控制限装置,所述装置用于终端,所述装置包括:
处理器;
用于存储处理器可执行指令的存储器;
其中,所述处理器被配置为:
在指定覆盖增强等级进行接入尝试;
当所述接入尝试为失败时,则按照设定规则确定对应的接入尝试限制方式;
根据所述对应的接入尝试限制方式进行对应的接入尝试限制。
本公开的实施例提供的技术方案可以包括以下有益效果:
本公开中的终端在指定覆盖增强等级进行接入尝试时,当接入尝试为尝试失败时,可以按照设定规则确对应的接入尝试限制方式,并根据对应的接入尝试限制方式进行对应的接入尝试限制,这样可以避免无限制地在指定覆盖增强等级进行接入尝试,从而节省了资源消耗,还提高了接入控制限制的可靠性
应当理解的是,以上的一般描述和后文的细节描述仅是示例性和解释性的,并不能限制本公开。
附图说明
此处的附图被并入说明书中并构成本说明书的一部分,示出了符合本发明的实施例,并与说明书一起用于解释本发明的原理。
图1是根据一示例性实施例示出的一种接入控制限制方法的流程图;
图2是根据一示例性实施例示出的一种接入控制限制方法的应用场景图;
图3是根据一示例性实施例示出的另一种接入控制限制方法的流程图;
图4是根据一示例性实施例示出的另一种接入控制限制方法的流程图;
图5是根据一示例性实施例示出的另一种接入控制限制方法的流程图;
图6是根据一示例性实施例示出的一种接入控制限制装置的框图;
图7是根据一示例性实施例示出的另一种接入控制限制装置的框图;
图8是根据一示例性实施例示出的另一种接入控制限制装置的框图;
图9是根据一示例性实施例示出的另一种接入控制限制装置的框图;
图10是根据一示例性实施例示出的另一种接入控制限制装置的框图;
图11是根据一示例性实施例示出的另一种接入控制限制装置的框图;
图12是根据一示例性实施例示出的另一种接入控制限制装置的框图;
图13是根据一示例性实施例示出的另一种接入控制限制装置的框图;
图14是根据一示例性实施例示出的一种接入控制限制装置的结构示意图。
具体实施方式
这里将详细地对示例性实施例进行说明,其示例表示在附图中。下面的描述涉及附图时,除非另有表示,不同附图中的相同数字表示相同或相似的要素。以下示例性实施例中所描述的实施方式并不代表与本发明相一致的所有实施方式。相反,它们仅是与如所附权利要求书中所详述的、本发明的一些方面相一致的装置和方法。
在本公开使用的术语是仅仅出于描述特定实施例的目的,而非旨在限制本公开。在本公开和所附权利要求书中所使用的单数形式的“一种”、“所述”和“该”也旨在包括多数形式,除非上下文清楚地表示其他含义。还应当理解,本文中使用的术语“和/或”是指并包含一个或多个相关联的列出项目的任何或所有可能组合。
应当理解,尽管在本公开可能采用术语第一、第二、第三等来描述各种信息,但这些信息不应限于这些术语。这些术语仅用来将同一类型的信息彼此区分开。例如,在不脱离本公开范围的情况下,指示信息也可以被称为第二信息,类似地,第二信息也可以被称为指示信息。取决于语境,如在此所使用的词语“如果”可以被解释成为“在……时”或“当……时”或“响应于确定”。
图1是根据一示例性实施例示出的一种接入控制限制方法的流程图,图2是根据一示例性实施例示出的一种接入控制限制方法的应用场景图;该接入控制限制方法可以用于终端,该终端可以为UE(User Equipment,用户设备);如图1所示,该接入控制限制方法可以包括以下步骤110-130:
在步骤110中,在指定覆盖增强等级进行接入尝试。
本公开实施例中,指定覆盖增强等级可以是终端在某个覆盖增强等级接入失败后,其迁移到的下一个覆盖增强等级。
比如:划分了三个覆盖增强等级,分别是CE Level0、CE Level1和CE Level2。若终端开始可以正常接入CE Level0,但后来由于信道条件变差,终端在CE Level0接入失败,则终端可以迁移到CE level1进行接入尝试,若尝试通过,就可以在CE level1进行接入,并发起随机接入过程。
在步骤120中,当接入尝试为尝试失败时,则按照设定规则确对应的接入尝试限制方式。
本公开实施例中,当在指定覆盖增强等级进行接入尝试时,为了避免造成大量的资源消耗,终端会按照设定规则确定对应的接入尝试限制方式,并根据接入尝试限制方式进行对应的接入尝试限制。
比如:接入尝试限制方式为第一限制方式,所述第一限制方式用于表征对所述指定覆盖增强等级进行提前终止尝试。其具体实现过程可参见图3所示实施例。
又比如:接入尝试限制方式为第二限制方式,所述第二限制方式用于表征根据所述指定尝试次数在所述指定覆盖增强等级进行接入尝试。其具体实现过程可参见图4所示实施例。
另外,获取设定规则的方式很多,包括但不限于以下三种方式:
方式一:所述设定规则是通信协议规定的、或以固件形式写在终端中的。
方式二:所述设定规则是基站通过系统消息或指定信令通知所述终端的。比如:所述指定信令是基站用于通知终端进入空闲态或挂起状态的专用信令。
此种方式下,在执行步骤120时,可以包括:
(1-1)当所述指定信令中包括所述设定规则时,则终端根据所述指定信令中包括的所述设定规则确定所述指定覆盖增强等级对应的接入尝试限制方式;
(1-2)当所述指定信令中不包括所述设定规则时,则终端根据所述系统消息中包括的所述设定规则确定所述指定覆盖增强等级对应的接入尝试限制方式。
方式三:除了包括方式二中的内容之外,所述系统消息或指定信令中还包括使用所述设定规则的有效时间和/或有效地区。
此种方式下,在执行步骤120时,可以包括:
(2-1)在所述设定规则的有效时间和/或有效地区内,按照所述设定规则确定所述指定覆盖增强等级对应的接入尝试限制方式。
本公开实施例中,有效时间可以是系统约定的或网络配置的,比如:300秒内。有效地区也可以是系统约定的或网络配置的,若是系统约定的,可以仅限定于连接释放时的小区和/或基于RAN的通知区域(RAN-based Notification Area,RNA)和/或跟踪区域(Tracking Area,TA);若是网络配置的,可以配置小区列表和/或基于RAN的通知区域列表和/或跟踪区域列表。其中,RAN为无线接入网(Radio Access Network)的简称。
在步骤130中,根据对应的接入尝试限制方式进行对应的接入尝试限制。
在一实例性场景中,如图2所示,包括基站和终端。在增强覆盖场景下,比如:NB-IOT或eMTC,终端在向基站发起的随机接入过程中,若终端在某个覆盖增强等级接入失败后,可以迁移到的下一个覆盖增强等级进行接入尝试,若在下一个覆盖增强等级尝试失败时,此时可以按照设定规则确定该覆盖增强等级对应的接入尝试限制方式,并根据该接入尝试限制方式进行接入尝试限制。
由上述实施例可见,在指定覆盖增强等级进行接入尝试时,当接入尝试为尝试失败时,可以按照设定规则确对应的接入尝试限制方式,并根据对应的接入尝试限制方式进行对应的接入尝试限制,这样可以避免无限制地在指定覆盖增强等级进行接入尝试,从而节省了资源消耗,还提高了接入控制限制的可靠性。
图3是根据一示例性实施例示出的另一种接入控制限制方法的流程图,该接入控制限制方法可以用于终端,并建立图1所示方法的基础上,所述设定规则中包括第一指示信息,所述第一指示信息用于表征提前终止尝试;在一实施例中,所述设定规则是通信协议规定的、或以固件形式写在终端中的;在一实施例中,所述设定规则是基站通过系统消息或指定信令通知所述终端的;在执行步骤120时,如图3所示,可以包括以下步骤310:
在步骤310中,根据第一指示信息确定第一限制方式,该第一限制方式是对指定覆盖增强等级进行提前终止尝试。
在一实施例中,在执行步骤130时,如图3所示,可以包括以下步骤320:
在步骤320中,终端的MAC(Media Access Control,媒体访问控制)层生成错误通知信息,该错误通知信息用于指示发生了随机接入过程错误,并将该错误通知信息发送至终端的RRC(Radio Resource Control,无线资源控制)层。其中,错误通知信息中可以包括发生所述随机接入过程错误的原因指示。
在一实施例中,如图3所示,该接入控制限制方法还可以包括步骤330:
在步骤330中,终端的RRC层接收到错误通知信息后,根据该错误通知信息提前终止RRC定时器,并通知终端的MAC层停止继续尝试。其中,RRC定时器可以为T300。
在一实施例中,如图3所示,该接入控制限制方法还可以包括步骤340:
在步骤340中,终端的RRC层接收到错误通知信息后,根据该错误通知信息不提前终止RRC定时器,并为终端的MAC层提供继续在指定覆盖增强等级进行接入尝试的附加条件。
其中,附加条件可以是一个指明的继续尝试次数;尝试完成达到该指明的继续尝试次数之后,再次通知终端的RRC层发生了随机接入过程错误;附件条件还可以是一个指示,指示终端继续在指定覆盖增强等级尝试该指定覆盖增强等级对应的继续尝试次数;尝试完成达到该指示的继续尝试次数之后,再次通知终端的RRC层发生了随机接入过程错误。
也就是说,终端的MAC层可以按照终端的RRC层提供的继续尝试次数,继续在所述指定覆盖增强等级进行接入尝试;当尝试失败次数到达终端的RRC层提供的继续尝试次数时,终端的MAC层可以再次生成错误通知信息,并将再次生成的错误通知信息发送至终端的RRC层,并由终端的RRC层来决定是停止继续尝试,还是继续提供继续在指定覆盖增强等级进行接入尝试的附加条件,依次类推。
由上述实施例可见,在按照设定规则确定对指定覆盖增强等级进行提前终止尝试后,还可以由终端的MAC通知终端的RRC层发生了随机接入过程错误,并由终端的RRC层来最终决定是停止继续尝试还是有附加条件的接入尝试,从而提高了接入控制限制的准确性。
图4是根据一示例性实施例示出的另一种接入控制限制方法的流程图,该接入控制限制方法可以用于终端,并建立图1所示方法的基础上,所述设定规则中包括指定尝试次数、或用于表征所述指定尝试次数的第二指示信息;在一实施例中,所述设定规则是通信协议规定的、或以固件形式写在终端中的;在一实施例中,所述设定规则是基站通过系统消息或指定信令通知所述终端的;在执行步骤120时,如图4所示,可以包括以下步骤410:
在步骤410中,根据指定尝试次数确定第二限制方式,该第二限制方式是根据该指定尝试次数在指定覆盖增强等级进行接入尝试。
在一实施例中,在执行步骤130时,如图4所示,可以包括以下步骤420:
在步骤420中,继续在指定覆盖增强等级进行接入尝试,直到尝试失败次数到达指定尝试次数时,终端的MAC层生成错误通知信息,该错误通知信息用于指示发生了随机接入过程错误,并将该错误通知信息发送至终端的RRC层。其中,错误通知信息中可以包括发生所述随机接入过程错误的原因指示。
在一实施例中,如图4所示,该接入控制限制方法还可以包括步骤430:
在步骤430中,终端的RRC层接收到错误通知信息后,根据该错误通知信息提前终止RRC定时器,并通知终端的MAC层停止继续尝试。其中,RRC定时器可以为T300。
在一实施例中,如图4所示,该接入控制限制方法还可以包括步骤440:
在步骤440中,终端的RRC层接收到错误通知信息后,根据该错误通知信息不提前终止RRC定时器,并为终端的MAC层提供继续在指定覆盖增强等级进行接入尝试的附加条件。
其中,附加条件可以是一个指明的继续尝试次数;尝试完成达到该指明的继续尝试次数之后,再次通知终端的RRC层发生了随机接入过程错误;附件条件还可以是一个指示,指示终端继续在指定覆盖增强等级尝试该指定覆盖增强等级对应的继续尝试次数;尝试完成达到该指示的继续尝试次数之后,再次通知终端的RRC层发生了随机接入过程错误。
也就是说,终端的MAC层可以按照终端的RRC层提供的继续尝试次数,再次继续在所述指定覆盖增强等级进行接入尝试;当尝试失败次数到达终端的RRC层提供的继续尝试次数时,终端的MAC层可以再次生成错误通知信息,并将再次生成的错 误通知信息发送至终端的RRC层,并由终端的RRC层来决定是停止继续尝试,还是继续提供继续在指定覆盖增强等级进行接入尝试的附加条件,依次类推。
由上述实施例可见,在按照设定规则确定根据该指定尝试次数在指定覆盖增强等级进行接入尝试,且尝试失败次数到达指定尝试次数后,还可以由终端的MAC通知终端的RRC层发生了随机接入过程错误,并由终端的RRC层来最终决定是停止继续尝试还是有附加条件的接入尝试,从而提高了接入控制限制的可靠性。
与前述接入控制限制方法的实施例相对应,本公开还提供了接入控制限制装置的实施例。
图5是根据一示例性实施例示出的一种接入控制限制装置的框图,该装置用于终端,并用于执行图1所示的接入控制限制方法,如图5所示,该接入控制限制装置可以包括:
接入尝试模块51,被配置为在指定覆盖增强等级进行接入尝试;
确定模块52,被配置为当所述接入尝试为失败时,则按照设定规则确定对应的接入尝试限制方式;
限制模块53,被配置为根据所述对应的接入尝试限制方式进行对应的接入尝试限制。
由上述实施例可见,在指定覆盖增强等级进行接入尝试时,当接入尝试为尝试失败时,可以按照设定规则确对应的接入尝试限制方式,并根据对应的接入尝试限制方式进行对应的接入尝试限制,这样可以避免无限制地在指定覆盖增强等级进行接入尝试,从而节省了资源消耗,还提高了接入控制限制的可靠性。
在一实施例中,建立图5所示装置的基础上,所述设定规则中包括第一指示信息,所述第一指示信息用于表征提前终止尝试;如图6所示,所述确定模块52可以包括:
第一确定子模块61,被配置为根据所述第一指示信息确定第一限制方式,所述第一限制方式是对所述指定覆盖增强等级进行提前终止尝试。
在一实施例中,建立图6所示装置的基础上,如图7所示,所述限制模块53可以包括:
第一处理子模块71,被配置为所述终端的MAC层生成错误通知信息,所述错 误通知信息用于指示发生了随机接入过程错误,并将所述错误通知信息发送至所述终端的RRC层。
由上述实施例可见,在按照设定规则确定对指定覆盖增强等级进行提前终止尝试后,还可以由终端的MAC通知终端的RRC层发生了随机接入过程错误,并由终端的RRC层来最终决定是停止继续尝试还是有附加条件的接入尝试,从而提高了接入控制限制的准确性。
在一实施例中,建立图5所示装置的基础上,所述设定规则中包括指定尝试次数、或用于表征所述指定尝试次数的第二指示信息;如图8所示,所述确定模块52可以包括:
第二确定子模块81,被配置为根据所述指定尝试次数确定第二限制方式,所述第二限制方式是根据所述指定尝试次数在所述指定覆盖增强等级进行接入尝试。
在一实施例中,建立图8所示装置的基础上,如图9所示,所述限制模块53可以包括:
第二处理子模块91,被配置为继续在所述指定覆盖增强等级进行接入尝试,直到尝试失败次数到达所述指定尝试次数时,所述终端的MAC层生成错误通知信息,所述错误通知信息用于指示发生了随机接入过程错误,并将所述错误通知信息发送至所述终端的RRC层。
由上述实施例可见,在按照设定规则确定根据该指定尝试次数在指定覆盖增强等级进行接入尝试,且尝试失败次数到达指定尝试次数后,还可以由终端的MAC通知终端的RRC层发生了随机接入过程错误,并由终端的RRC层来最终决定是停止继续尝试还是有附加条件的接入尝试,从而提高了接入控制限制的可靠性。
在一实施例中,建立图7或图9所示装置的基础上,所述错误通知信息中包括发生所述随机接入过程错误的原因指示。
在一实施例中,建立图7或图9所示装置的基础上,如图10所示,所述装置还可以包括:
停止继续尝试模块101,被配置为所述终端的RRC层接收到所述错误通知信息后,根据所述错误通知信息提前终止RRC定时器,并通知所述终端的MAC层停止继续尝试。
在一实施例中,建立图7或图9所示装置的基础上,如图11所示,所述装置还可以包括:
继续尝试模块111,被配置为所述终端的RRC层接收到所述错误通知信息后,根据所述错误通知信息不提前终止RRC定时器,并为所述终端的MAC层提供继续在所述指定覆盖增强等级进行接入尝试的附加条件。
在一实施例中,建立图5所示装置的基础上,所述设定规则是通信协议规定的、或以固件形式写在所述终端中的。
在一实施例中,建立图5所示装置的基础上,所述设定规则是基站通过系统消息或指定信令通知所述终端的;如图12所示,所述确定模块52可以包括:
第三确定子模块121,被配置为当所述指定信令中包括所述设定规则时,则所述终端根据所述指定信令中包括的所述设定规则确定所述指定覆盖增强等级对应的接入尝试限制方式;
第四确定子模块122,被配置为当所述指定信令中不包括所述设定规则时,则所述终端根据所述系统消息中包括的所述设定规则确定所述指定覆盖增强等级对应的接入尝试限制方式。
在一实施例中,建立图5所示装置的基础上,所述系统消息或指定信令中还包括使用所述设定规则的有效时间和/或有效地区;如图13所示,所述确定模块53可以包括:
第五确定子模块131,被配置为在所述设定规则的有效时间和/或有效地区内,按照所述设定规则确定所述指定覆盖增强等级对应的接入尝试限制方式。
对于装置实施例而言,由于其基本对应于方法实施例,所以相关之处参见方法实施例的部分说明即可。以上所描述的装置实施例仅仅是示意性的,其中上述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部模块来实现本公开方案的目的。本领域普通技术人员在不付出创造性劳动的情况下,即可以理解并实施。
本公开还提供了一种非临时计算机可读存储介质,所述存储介质上存储有计算机程序,所述计算机程序用于执行上述图1至图4任一所述的接入控制限制方法。
本公开还提供了一种接入控制限制装置,所述装置用于终端,所述装置包括:
处理器;
用于存储处理器可执行指令的存储器;
其中,所述处理器被配置为:
在指定覆盖增强等级进行接入尝试;
当所述接入尝试为失败时,则按照设定规则确定对应的接入尝试限制方式;
根据所述对应的接入尝试限制方式进行对应的接入尝试限制。
图14是根据一示例性实施例示出的一种接入控制限制装置的结构示意图。如图14所示,根据一示例性实施例示出的一种接入控制限制装置1400,该装置1400可以是计算机,移动电话,数字广播终端,消息收发设备,游戏控制台,平板设备,医疗设备,健身设备,个人数字助理等终端。
参照图14,装置1400可以包括以下一个或多个组件:处理组件1401,存储器1402,电源组件1403,多媒体组件1404,音频组件1405,输入/输出(I/O)的接口1406,传感器组件1407,以及通信组件1408。
处理组件1401通常控制装置1400的整体操作,诸如与显示,电话呼叫,数据通信,相机操作和记录操作相关联的操作。处理组件1401可以包括一个或多个处理器1409来执行指令,以完成上述的方法的全部或部分步骤。此外,处理组件1401可以包括一个或多个模块,便于处理组件1401和其它组件之间的交互。例如,处理组件1401可以包括多媒体模块,以方便多媒体组件1404和处理组件1401之间的交互。
存储器1402被配置为存储各种类型的数据以支持在装置1400的操作。这些数据的示例包括用于在装置1400上操作的任何应用程序或方法的指令,联系人数据,电话簿数据,消息,图片,视频等。存储器1402可以由任何类型的易失性或非易失性存储设备或者它们的组合实现,如静态随机存取存储器(SRAM),电可擦除可编程只读存储器(EEPROM),可擦除可编程只读存储器(EPROM),可编程只读存储器(PROM),只读存储器(ROM),磁存储器,快闪存储器,磁盘或光盘。
电源组件1403为装置1400的各种组件提供电力。电源组件1403可以包括电源管理系统,一个或多个电源,及其它与为装置1400生成、管理和分配电力相关联的组件。
多媒体组件1404包括在所述装置1400和用户之间的提供一个输出接口的屏幕。在一些实施例中,屏幕可以包括液晶显示器(LCD)和触摸面板(TP)。如果屏幕包括触摸面板,屏幕可以被实现为触摸屏,以接收来自用户的输入信号。触摸面板包括一个或多个触摸传感器以感测触摸、滑动和触摸面板上的手势。所述触摸传感器可以不仅感测触摸或滑动动作的边界,而且还检测与所述触摸或滑动操作相关的持续时间和压力。在一些实施例中,多媒体组件1404包括一个前置摄像头和/或后置摄像头。当装置1400处于操作模式,如拍摄模式或视频模式时,前置摄像头和/或后置摄像头可以接收外部的多媒体数据。每个前置摄像头和后置摄像头可以是一个固定的光学透镜系统或具有焦距和光学变焦能力。
音频组件1405被配置为输出和/或输入音频信号。例如,音频组件1405包括一个麦克风(MIC),当装置1400处于操作模式,如呼叫模式、记录模式和语音识别模式时,麦克风被配置为接收外部音频信号。所接收的音频信号可以被进一步存储在存储器1402或经由通信组件1408发送。在一些实施例中,音频组件1405还包括一个扬声器,用于输出音频信号。
I/O接口1406为处理组件1401和外围接口模块之间提供接口,上述外围接口模块可以是键盘,点击轮,按钮等。这些按钮可包括但不限于:主页按钮、音量按钮、启动按钮和锁定按钮。
传感器组件1407包括一个或多个传感器,用于为装置1400提供各个方面的状态评估。例如,传感器组件1407可以检测到装置1400的打开/关闭状态,组件的相对定位,例如所述组件为装置1400的显示器和小键盘,传感器组件1407还可以检测装置1400或装置1400一个组件的位置改变,用户与装置1400接触的存在或不存在,装置1400方位或加速/减速和装置1400的温度变化。传感器组件1407可以包括接近传感器,被配置用来在没有任何的物理接触时检测附近物体的存在。传感器组件1407还可以包括光传感器,如CMOS或CCD图像传感器,用于在成像应用中使用。在一些实施例中,该传感器组件1407还可以包括加速度传感器,陀螺仪传感器,磁传感器,压力传感器或温度传感器。
通信组件1408被配置为便于装置1400和其它设备之间有线或无线方式的通信。装置1400可以接入基于通信标准的无线网络,如WiFi,2G或3G,或它们的组合。在一个示例性实施例中,通信组件1408经由广播信道接收来自外部广播管理系统的广播信号或广播相关信息。在一个示例性实施例中,所述通信组件1408还包括近场 通信(NFC)模块,以促进短程通信。例如,在NFC模块可基于射频识别(RFID)技术,红外数据协会(IrDA)技术,超宽带(UWB)技术,蓝牙(BT)技术和其它技术来实现。
在示例性实施例中,装置1400可以被一个或多个应用专用集成电路(ASIC)、数字信号处理器(DSP)、数字信号处理设备(DSPD)、可编程逻辑器件(PLD)、现场可编程门阵列(FPGA)、控制器、微控制器、微处理器或其它电子元件实现,用于执行上述方法。
在示例性实施例中,还提供了一种包括指令的非临时性计算机可读存储介质,例如包括指令的存储器1402,上述指令可由装置1400的处理器1409执行以完成上述方法。例如,所述非临时性计算机可读存储介质可以是ROM、随机存取存储器(RAM)、CD-ROM、磁带、软盘和光数据存储设备等。
其中,当所述存储介质中的指令由所述处理器执行时,使得装置1400能够执行上述任一所述的接入控制限制方法。
应当理解的是,本公开并不局限于上面已经描述并在附图中示出的精确结构,并且可以在不脱离其范围进行各种修改和改变。本公开的范围仅由所附的权利要求来限制。

Claims (24)

  1. 一种接入控制限制方法,其特征在于,所述方法用于终端,所述方法包括:
    在指定覆盖增强等级进行接入尝试;
    当所述接入尝试为尝试失败时,则按照设定规则确定对应的接入尝试限制方式;
    根据所述对应的接入尝试限制方式进行对应的接入尝试限制。
  2. 根据权利要求1所述的方法,其特征在于,所述设定规则中包括第一指示信息,所述第一指示信息用于表征提前终止尝试;
    所述按照设定规则确定对应的接入尝试限制方式,包括:
    根据所述第一指示信息确定第一限制方式,所述第一限制方式是对所述指定覆盖增强等级进行提前终止尝试。
  3. 根据权利要求2所述的方法,其特征在于,所述根据所述对应的接入尝试限制方式进行对应的接入尝试限制,包括:
    所述终端的媒体访问控制MAC层生成错误通知信息,所述错误通知信息用于指示发生了随机接入过程错误,并将所述错误通知信息发送至所述终端的无线资源控制RRC层。
  4. 根据权利要求1所述的方法,其特征在于,所述设定规则中包括指定尝试次数、或用于表征所述指定尝试次数的第二指示信息;
    所述按照设定规则确定对应的接入尝试限制方式,包括:
    根据所述指定尝试次数确定第二限制方式,所述第二限制方式是根据所述指定尝试次数在所述指定覆盖增强等级进行接入尝试。
  5. 根据权利要求4所述的方法,其特征在于,所述根据所述对应的接入尝试限制方式进行对应的接入尝试限制,包括:
    继续在所述指定覆盖增强等级进行接入尝试,直到尝试失败次数到达所述指定尝试次数时,所述终端的MAC层生成错误通知信息,所述错误通知信息用于指示发生了随机接入过程错误,并将所述错误通知信息发送至所述终端的RRC层。
  6. 根据权利要求3或5所述的方法,其特征在于,所述错误通知信息中包括发生所述随机接入过程错误的原因指示。
  7. 根据权利要求3或5所述的方法,其特征在于,所述方法还包括:
    所述终端的RRC层接收到所述错误通知信息后,根据所述错误通知信息提前终止RRC定时器,并通知所述终端的MAC层停止继续尝试。
  8. 根据权利要求3或5所述的方法,其特征在于,所述方法还包括:
    所述终端的RRC层接收到所述错误通知信息后,根据所述错误通知信息不提前终止RRC定时器,并为所述终端的MAC层提供继续在所述指定覆盖增强等级进行接入尝试的附加条件。
  9. 根据权利要求1所述的方法,其特征在于,所述设定规则是通信协议规定的、或以固件形式写在所述终端中的。
  10. 根据权利要求1所述的方法,其特征在于,所述设定规则是基站通过系统消息或指定信令通知所述终端的;
    所述按照设定规则确定对应的接入尝试限制方式,包括:
    当所述指定信令中包括所述设定规则时,则所述终端根据所述指定信令中包括的所述设定规则确定所述指定覆盖增强等级对应的接入尝试限制方式;
    当所述指定信令中不包括所述设定规则时,则所述终端根据所述系统消息中包括的所述设定规则确定所述指定覆盖增强等级对应的接入尝试限制方式。
  11. 根据权利要求10所述的方法,其特征在于,所述系统消息或指定信令中还包括使用所述设定规则的有效时间和/或有效地区;
    所述按照设定规则确定对应的接入尝试限制方式,包括:
    在所述设定规则的有效时间和/或有效地区内,按照所述设定规则确定所述指定覆盖增强等级对应的接入尝试限制方式。
  12. 一种接入控制限制装置,其特征在于,所述装置用于终端,所述装置包括:
    接入尝试模块,被配置为在指定覆盖增强等级进行接入尝试;
    确定模块,被配置为当所述接入尝试为失败时,则按照设定规则确定对应的接入尝试限制方式;
    限制模块,被配置为根据所述对应的接入尝试限制方式进行对应的接入尝试限制。
  13. 根据权利要求12所述的装置,其特征在于,所述设定规则中包括第一指示信息,所述第一指示信息用于表征提前终止尝试;所述确定模块包括:
    第一确定子模块,被配置为根据所述第一指示信息确定第一限制方式,所述第一限制方式是对所述指定覆盖增强等级进行提前终止尝试。
  14. 根据权利要求13所述的装置,其特征在于,所述限制模块包括:
    第一处理子模块,被配置为所述终端的媒体访问控制MAC层生成错误通知信息,所述错误通知信息用于指示发生了随机接入过程错误,并将所述错误通知信息发送至所述终端的无线资源控制RRC层。
  15. 根据权利要求12所述的装置,其特征在于,所述设定规则中包括指定尝试次 数、或用于表征所述指定尝试次数的第二指示信息;所述确定模块包括:
    第二确定子模块,被配置为根据所述指定尝试次数确定第二限制方式,所述第二限制方式是根据所述指定尝试次数在所述指定覆盖增强等级进行接入尝试。
  16. 根据权利要求15所述的装置,其特征在于,所述限制模块包括:
    第二处理子模块,被配置为继续在所述指定覆盖增强等级进行接入尝试,直到尝试失败次数到达所述指定尝试次数时,所述终端的MAC层生成错误通知信息,所述错误通知信息用于指示发生了随机接入过程错误,并将所述错误通知信息发送至所述终端的RRC层。
  17. 根据权利要求14或16所述的装置,其特征在于,所述错误通知信息中包括发生所述随机接入过程错误的原因指示。
  18. 根据权利要求14或16所述的装置,其特征在于,所述装置还包括:
    停止继续尝试模块,被配置为所述终端的RRC层接收到所述错误通知信息后,根据所述错误通知信息提前终止RRC定时器,并通知所述终端的MAC层停止继续尝试。
  19. 根据权利要求14或16所述的装置,其特征在于,所述装置还包括:
    继续尝试模块,被配置为所述终端的RRC层接收到所述错误通知信息后,根据所述错误通知信息不提前终止RRC定时器,并为所述终端的MAC层提供继续在所述指定覆盖增强等级进行接入尝试的附加条件。
  20. 根据权利要求12所述的装置,其特征在于,所述设定规则是通信协议规定的、或以固件形式写在所述终端中的。
  21. 根据权利要求12所述的装置,其特征在于,所述设定规则是基站通过系统消息或指定信令通知所述终端的;所述确定模块包括:
    第三确定子模块,被配置为当所述指定信令中包括所述设定规则时,则所述终端根据所述指定信令中包括的所述设定规则确定所述指定覆盖增强等级对应的接入尝试限制方式;
    第四确定子模块,被配置为当所述指定信令中不包括所述设定规则时,则所述终端根据所述系统消息中包括的所述设定规则确定所述指定覆盖增强等级对应的接入尝试限制方式。
  22. 根据权利要求21所述的装置,其特征在于,所述系统消息或指定信令中还包括使用所述设定规则的有效时间和/或有效地区;所述确定模块包括:
    第五确定子模块,被配置为在所述设定规则的有效时间和/或有效地区内,按照所述设定规则确定所述指定覆盖增强等级对应的接入尝试限制方式。
  23. 一种非临时计算机可读存储介质,所述存储介质上存储有计算机程序,其特征在于,所述计算机程序用于执行上述权利要求1-11所述的接入控制限制方法。
  24. 一种接入控制限制装置,其特征在于,所述装置用于终端,所述装置包括:
    处理器;
    用于存储处理器可执行指令的存储器;
    其中,所述处理器被配置为:
    在指定覆盖增强等级进行接入尝试;
    当所述接入尝试为失败时,则按照设定规则确定对应的接入尝试限制方式;
    根据所述对应的接入尝试限制方式进行对应的接入尝试限制。
PCT/CN2018/102942 2018-08-29 2018-08-29 接入控制限制方法及装置 WO2020042010A1 (zh)

Priority Applications (3)

Application Number Priority Date Filing Date Title
PCT/CN2018/102942 WO2020042010A1 (zh) 2018-08-29 2018-08-29 接入控制限制方法及装置
US17/271,513 US11805475B2 (en) 2018-08-29 2018-08-29 Access control barring method and apparatus
CN201880001854.8A CN109196912A (zh) 2018-08-29 2018-08-29 接入控制限制方法及装置

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2018/102942 WO2020042010A1 (zh) 2018-08-29 2018-08-29 接入控制限制方法及装置

Publications (1)

Publication Number Publication Date
WO2020042010A1 true WO2020042010A1 (zh) 2020-03-05

Family

ID=64938223

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/102942 WO2020042010A1 (zh) 2018-08-29 2018-08-29 接入控制限制方法及装置

Country Status (3)

Country Link
US (1) US11805475B2 (zh)
CN (1) CN109196912A (zh)
WO (1) WO2020042010A1 (zh)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111866962A (zh) * 2019-04-28 2020-10-30 华为技术有限公司 一种信道接入方法及装置
WO2023060601A1 (en) * 2021-10-15 2023-04-20 Nec Corporation Method, device and computer readable medium for communication

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104137615A (zh) * 2012-01-04 2014-11-05 瑞典爱立信有限公司 自适应接入信道过载控制
CN107432042A (zh) * 2015-04-03 2017-12-01 高通股份有限公司 覆盖限制下的随机接入过程
CN108462978A (zh) * 2017-02-22 2018-08-28 电信科学技术研究院 接入控制方法及装置

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101674613B (zh) * 2009-09-25 2012-07-04 中兴通讯股份有限公司 一种接入等级控制方法及系统
CN102196496B (zh) 2010-03-19 2016-05-11 中兴通讯股份有限公司 一种处理回程链路错误的方法和中继节点
RU2015116905A (ru) * 2012-10-05 2016-11-27 Интердиджитал Пэйтент Холдингз, Инк. Способ и устройство для улучшения покрытия устройств связи машинного типа (мтс)
CN103052141A (zh) 2012-12-28 2013-04-17 上海寰创通信科技股份有限公司 一种ap接入控制方法
EP3091794B1 (en) 2014-01-28 2018-03-21 Huawei Technologies Co., Ltd. Method and apparatus for determining transmit power in coverage enhancement scenario
US9918344B2 (en) 2015-04-09 2018-03-13 Intel IP Corporation Random access procedure for enhanced coverage support
US10383036B2 (en) 2015-11-06 2019-08-13 Nokia Solutions And Networks Oy Method and apparatus for implementing access control
WO2017196056A2 (ko) 2016-05-10 2017-11-16 엘지전자 주식회사 무선 통신 시스템에서 sib을 요청하는 방법 및 장치
US10292184B2 (en) 2016-05-11 2019-05-14 Futurewei Technologies, Inc. System and method for relay device discovery
EP3469846B1 (en) * 2016-07-13 2021-05-26 Samsung Electronics Co., Ltd. Access control method and apparatus for use in mobile communication
US11240840B2 (en) 2017-02-08 2022-02-01 Sony Group Corporation Media access control
CN108093451B (zh) 2018-01-30 2021-02-26 Oppo广东移动通信有限公司 随机接入的控制方法、装置及存储介质和移动终端

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104137615A (zh) * 2012-01-04 2014-11-05 瑞典爱立信有限公司 自适应接入信道过载控制
CN107432042A (zh) * 2015-04-03 2017-12-01 高通股份有限公司 覆盖限制下的随机接入过程
CN108462978A (zh) * 2017-02-22 2018-08-28 电信科学技术研究院 接入控制方法及装置

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
SIERRA WIRELESS: "Report of Email Discussion [101bis#78][NB-IoT/eMTC] Access/Load Control of Idle Mode UEs", 3GPP TSG-RAN WG2 MEETING#1O2, R2-1808188, 25 May 2018 (2018-05-25), XP051444481 *
ZTE ET AL.: "Further Consideration on Supporting CEL-based Access Barring for eFeMTC", 3GPP TSG-RAN WG2 MEETING#101, R2-1802159, 2 March 2018 (2018-03-02), XP051399408 *

Also Published As

Publication number Publication date
US11805475B2 (en) 2023-10-31
CN109196912A (zh) 2019-01-11
US20210176700A1 (en) 2021-06-10

Similar Documents

Publication Publication Date Title
WO2020014960A1 (zh) 波束故障恢复请求发送方法、响应方法、装置及存储介质
WO2020034074A1 (zh) 唤醒方法、唤醒装置、电子设备和计算机可读存储介质
WO2020056741A1 (zh) 接入控制限制方法及装置
CN109565753B (zh) 控制波束失败恢复流程的方法及装置
US11700578B2 (en) Downlink control signaling detection method and apparatus, and storage medium
CN108702763B (zh) 前导码和调度请求的发送方法及装置
CN109451838B (zh) 获取接入控制参数的方法、装置及存储介质
US20220007394A1 (en) Method and apparatus for sending scheduling request
WO2018195910A1 (zh) 一种分配调度请求sr资源的方法和装置
WO2021035561A1 (zh) 过热处理方法及装置
CN108781377B (zh) 定时器控制方法和装置、电子设备、计算机可读存储介质
JP7288040B2 (ja) タイマ制御方法及びタイマ制御装置
US11445412B2 (en) Access control method, apparatus and storage medium
WO2020042010A1 (zh) 接入控制限制方法及装置
CN109076595B (zh) 随机接入控制方法和随机接入控制装置
WO2019227428A1 (zh) 下行控制信令检测方法、装置及存储介质
CN106201738B (zh) 系统广播调用方法及装置
WO2019227446A1 (zh) Ac限制方法及装置
WO2020042009A1 (zh) 接入控制限制方法及装置
JP7421502B2 (ja) Ac規制方法及び装置
EP3876651B1 (en) Contention random access method and device
CN109328471B (zh) 接入控制限制方法及装置
WO2022213394A1 (zh) 指示方法和装置、寻呼控制方法和装置
WO2023168596A1 (zh) 一种确定唤醒信号周期的方法、装置、设备及存储介质
WO2020000190A1 (zh) 接入控制ac限制方法及装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18931626

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18931626

Country of ref document: EP

Kind code of ref document: A1