WO2021023185A1 - Procédé et dispositif de détection de restriction d'accès - Google Patents

Procédé et dispositif de détection de restriction d'accès Download PDF

Info

Publication number
WO2021023185A1
WO2021023185A1 PCT/CN2020/106834 CN2020106834W WO2021023185A1 WO 2021023185 A1 WO2021023185 A1 WO 2021023185A1 CN 2020106834 W CN2020106834 W CN 2020106834W WO 2021023185 A1 WO2021023185 A1 WO 2021023185A1
Authority
WO
WIPO (PCT)
Prior art keywords
access
access restriction
parameters
target
parameter
Prior art date
Application number
PCT/CN2020/106834
Other languages
English (en)
Chinese (zh)
Inventor
陈磊
李秉肇
许斌
王宏
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2021023185A1 publication Critical patent/WO2021023185A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/70Services for machine-to-machine communication [M2M] or machine type communication [MTC]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/18Selecting a network or a communication service

Definitions

  • This application relates to the field of wireless communication, and in particular to a method and device for detecting access restriction.
  • small data packets small data packets
  • the terminal device needs to frequently switch between the idle state or the inactive state and the connected state, which will cause a large amount of signaling overhead and result in low resource utilization of the wireless communication network.
  • EDT early data transmission
  • the terminal device can only establish a link with the network device and send data to the network device only through the access restriction detection.
  • the terminal device does not need to enter the connected state when using the small data packet transmission method for data transmission, which makes it necessary to enter the connected state for data transmission methods (that is, data transmission methods that occupy more network resources) corresponding to the connection
  • the access restriction parameter does not apply to the access restriction detection corresponding to the small data packet transmission mode.
  • the embodiments of the present application provide a method and device for detecting access restriction. Using the method provided in the embodiments of the present application can improve the pass rate of the terminal device's access restriction detection before data transmission based on the small data packet transmission mode, so that the terminal device does not need to repeatedly trigger the access restriction detection before the small data packet transmission , Improve the resource utilization rate of the wireless communication network.
  • an embodiment of the present application provides an access restriction detection method.
  • the network device determines at least one set of first access restriction parameters.
  • the network device sends a first message to the terminal device, where the first message includes the foregoing at least one set of first access restriction parameters.
  • the aforementioned at least one set of first access restriction parameters corresponds to a small data packet transmission mode, and the aforementioned at least one set of first access restriction parameters is used for access restriction detection.
  • the network device can provide the terminal device with at least one set of access restriction parameters suitable for the access restriction detection before the transmission of small data packets, which can solve the inability of the terminal device caused by the mismatch of the access restriction parameters.
  • the problem of access restriction detection before the fractional packet transmission is normally passed, avoiding the situation that the terminal device repeatedly initiates the access restriction detection before the small data packet transmission. Therefore, the terminal device does not need to repeatedly trigger the access restriction detection before transmitting the small data packet, which improves the resource utilization rate of the wireless communication network.
  • the first message includes a set of first access restriction parameters
  • the set of first access restriction parameters includes a first access threshold and a first access waiting parameter.
  • the network device separately configures a set of access restriction parameters for the terminal device for the access restriction detection before the small data packet transmission, so that the terminal device does not need to repeatedly trigger the access restriction detection before the small data packet transmission, which improves the wireless The resource utilization of the communication network.
  • the first message includes multiple sets of first access restriction parameters.
  • Each group of first access restriction parameters in the above-mentioned multiple sets of first access restriction parameters includes a first access threshold, a first access waiting parameter, and an access identifier.
  • the first access restriction parameters with different access identifiers have different probabilities of passing the access restriction detection.
  • the network equipment configures different sets of access restriction parameters for the access restriction detection before the transmission of small data packets for the terminal equipment of different equipment levels, which can make the terminal equipment with higher equipment level easier to access than the terminal equipment with lower equipment level
  • the restriction detection not only improves the resource utilization rate of the wireless communication network, but also ensures the rationality of the access restriction detection operation, and improves the practicability of the access restriction detection method.
  • the first message includes a set of first access restriction parameters and a set of second access restrictions corresponding to data transmission methods other than the aforementioned small data packet transmission method parameter.
  • the foregoing set of second access restriction parameters is used for access restriction detection.
  • the aforementioned first access restriction parameter includes a first coefficient and a second coefficient.
  • the foregoing second access restriction parameter includes a second access threshold and a second access waiting parameter.
  • the first coefficient is used to adjust the second access threshold, and/or the second coefficient is used to adjust the second access waiting parameter.
  • the network device adjusts the existing second access restriction parameter suitable for the access restriction detection of the second service through the first access restriction parameter generated by the network device to obtain the access restriction detection before the transmission of the small data packet.
  • the access restriction parameter avoids a large number of modifications to the existing signaling structure or communication protocol caused by generating a set of access restriction parameters applicable to the above-mentioned first service, and avoids the increase in development cost, which makes this application
  • the provided access restriction detection method is easier to implement, which improves the practicability of the access restriction detection method while improving the resource utilization rate of the wireless communication network.
  • the first message includes multiple sets of first access restriction parameters and multiple sets of second access restrictions corresponding to data transmission methods other than the aforementioned small data packet transmission method Parameters
  • a group of first access restriction parameters corresponds to a group of second access restriction parameters
  • each group of second access restriction parameters in the above-mentioned multiple sets of second access restriction parameters is used for access restriction detection.
  • Each of the foregoing second access restriction parameters includes a second access threshold, a second access waiting parameter, and an access identifier.
  • a group of first access restriction parameters corresponding to each group of second access restriction parameters includes a first coefficient, a second coefficient, and the aforementioned access identifier.
  • the first coefficient is used to adjust the second access threshold, and/or the second coefficient is used to adjust the second access waiting parameter, the first access restriction parameter and the second access parameter with different access identifiers
  • the probability of the access restriction parameter being detected by the access restriction is different.
  • the network device adjusts the existing multiple sets of second access restriction parameters applicable to the second service through the multiple sets of first access restriction parameters generated by it, so that terminal devices of different equipment levels can use different parameters for small data
  • the access restriction detection before the packet transmission can make the terminal equipment with high equipment level have a higher probability of passing the access restriction detection, and avoid the interference caused by the separate generation of multiple sets of access restriction parameters suitable for the first service.
  • There are a large number of modifications brought about by the signaling structure or communication protocol which avoids the increase in development costs, and improves the practicability of the access restriction detection method while improving the resource utilization of the wireless communication network.
  • an embodiment of the present application provides an access restriction detection method.
  • the terminal device receives the first message from the network device.
  • the foregoing first message includes at least one set of first access restriction parameters corresponding to the small data packet transmission mode. If the terminal device determines that the data transmission mode is the aforementioned small data packet transmission mode, it performs access restriction detection according to the aforementioned at least one set of first access restriction parameters.
  • the terminal device performs access restriction detection based on at least one set of access restriction parameters suitable for transmission of small data packets provided by the network device, which can solve the problem that the terminal device cannot be normal due to the mismatch of the access restriction parameters Through the problem of access restriction detection before fractional packet transmission, the situation that the terminal device repeatedly initiates access restriction detection before small data packet transmission is avoided, and the resource utilization rate of the wireless communication network is improved.
  • the first message includes a set of first access restriction parameters
  • the foregoing set of first access restriction parameters includes a first access threshold and a first access waiting parameter.
  • the terminal device performs access restriction detection according to the first access threshold and the first access waiting parameter.
  • the first message includes multiple sets of first access restriction parameters, and each of the multiple sets of first access restriction parameters includes the first access restriction parameter.
  • the foregoing terminal device determines a target access identifier.
  • the terminal device determines the target first access restriction parameter from the multiple sets of first access restriction parameters according to the target access identifier.
  • the target first access restriction parameter includes the target first access threshold, the target first access waiting parameter, and the target access identifier.
  • the terminal device performs access restriction detection according to the target first access threshold and the target first access waiting parameter.
  • the first message includes a set of first access restriction parameters and a set of second access restriction parameters corresponding to data transmission methods other than the aforementioned small data packet transmission .
  • the above-mentioned set of second access restriction parameters are used for access restriction detection.
  • the first access restriction parameter includes a first coefficient and a second coefficient
  • the second access restriction parameter includes a second access threshold and a second access waiting parameter.
  • the first coefficient is used to adjust the second access threshold
  • the second coefficient is used to adjust the second access waiting parameter.
  • the terminal device adjusts the second access threshold according to the first coefficient to obtain the target access threshold. And/or, the terminal device adjusts the second access waiting parameter according to the second coefficient to obtain the target access waiting parameter.
  • the terminal device performs access restriction detection according to the target access threshold and the target access waiting parameter.
  • the first message includes multiple sets of first access restriction parameters and multiple sets of second access restrictions corresponding to data transmission methods other than the aforementioned small data packet transmission method Parameters
  • a group of first access restriction parameters corresponds to a group of second access restriction parameters
  • each group of second access restriction parameters in the above-mentioned multiple sets of second access restriction parameters is used for access restriction detection.
  • Each set of second access restriction parameters includes a second access threshold, a second access waiting parameter, and an access identifier
  • each set of second access restriction parameters corresponds to a set of first access restriction parameters that includes the first access restriction parameter.
  • a coefficient, a second coefficient, and the access identifier wherein the first coefficient is used to adjust the second access threshold, and/or the second coefficient is used to adjust the second access waiting parameter, the access identifier
  • Different first access restriction parameters and second access restriction parameters have different probability of passing the access restriction detection.
  • the foregoing terminal device determines a target access identifier.
  • the terminal device determines the target first access restriction parameter and the target second access restriction parameter from the multiple sets of first access restriction parameters and the multiple sets of second access restriction parameters according to the target access identifier.
  • the target first access restriction parameter includes a target first coefficient, a target second coefficient, and the target access identifier
  • the target second access restriction parameter includes a target second access threshold, a target second access Wait for the parameters and the aforementioned target access identifier.
  • the terminal device adjusts the target second access threshold according to the target first coefficient to obtain the target access threshold.
  • the terminal device adjusts the target second access waiting parameter according to the target second coefficient to obtain the target access waiting parameter.
  • the terminal device performs access restriction detection according to the target access threshold and the target access waiting parameter.
  • an embodiment of the present application provides a device.
  • the device can be the network device itself, or can be a component or module such as a chip inside the network device.
  • the device includes a unit for executing the access restriction detection method provided by any one of the possible implementations of the first aspect, so it can also achieve the beneficial effects of the access restriction detection method provided by the first aspect ( Or advantages).
  • an embodiment of the present application provides a device.
  • the device can be the terminal device itself, or an internal component or module such as a chip in the terminal device.
  • the device includes a unit for executing the access restriction detection method provided by any one of the possible implementations of the second aspect, so it can also achieve the beneficial effects of the access restriction detection method provided by the second aspect ( Or advantages).
  • the embodiments of the present application provide a device, which may be the network device itself, or may be a component or module such as a chip inside the network device.
  • the device includes a memory, a processor, and a transceiver.
  • the processor is configured to call the code stored in the memory to execute the access restriction detection method provided by any feasible implementation manner in the first aspect.
  • an embodiment of the present application provides a device, which may be the terminal device itself, or may be an element or module such as a chip inside the terminal device.
  • the device includes a memory, a processor, and a transceiver.
  • the processor is configured to call the code stored in the memory to execute the access restriction detection method provided by any feasible implementation manner in the first aspect.
  • an embodiment of the present application provides a device, which may be the network device itself, or may be a component or module such as a chip inside the network device.
  • the device includes a processor and an interface circuit.
  • the interface circuit is used to receive code instructions and transmit them to the processor.
  • the processor is configured to run the foregoing code instructions to implement the access restriction detection method provided by any one of the feasible implementation manners of the foregoing first aspect, and can also achieve the beneficial effects of the access restriction detection method provided by the foregoing first aspect (Or advantages).
  • an embodiment of the present application provides a device, which may be the terminal device itself, or may be a component or module such as a chip inside the terminal device.
  • the device includes a processor and an interface circuit.
  • the interface circuit is used to receive code instructions and transmit them to the processor.
  • the processor is configured to run the foregoing code instructions to implement the access restriction detection method provided by any one of the feasible implementation manners of the foregoing first aspect, and can also achieve the beneficial effects of the access restriction detection method provided by the foregoing first aspect (Or advantages).
  • an embodiment of the present application provides a computer-readable storage medium that stores instructions in the computer-readable storage medium, and when the instructions are run on a computer, any one of the feasible implementations in the first aspect is realized
  • the access restriction detection method provided by the method can also achieve the beneficial effects (or advantages) of the access restriction detection method provided in the first aspect.
  • an embodiment of the present application provides a computer-readable storage medium that stores instructions in the computer-readable storage medium, and when the instructions are run on a computer, any one of the possible implementations of the second aspect mentioned above is realized
  • the access restriction detection method provided by the method can also achieve the beneficial effects (or advantages) of the access restriction detection method provided in the second aspect.
  • an embodiment of the present application provides a computer program product containing instructions.
  • the computer program product runs on a computer, the computer can execute the access restriction detection method provided in the first aspect above, and the first aspect can also be implemented.
  • the provided access restriction detection method has the beneficial effects.
  • the embodiments of the present application provide a computer program product containing instructions.
  • the computer program product When the computer program product is run on a computer, the computer can execute the access restriction detection method provided in the second aspect, which can also implement the first The beneficial effects of the access restriction detection method provided by the two aspects.
  • the embodiments of the present application provide a communication system, which includes the devices described in the third and fourth aspects above, or the devices described in the fifth and sixth aspects above, or, The device described in the seventh and eighth aspects above.
  • the pass rate of the access restriction detection before the data transmission of the terminal device based on the small data packet transmission mode can be improved, and the resource utilization rate of the wireless communication network can be improved.
  • FIG. 1 is a schematic structural diagram of a communication system provided by an embodiment of the present application.
  • FIG. 2 is a schematic flowchart of an access restriction detection method provided by an embodiment of the present application.
  • FIG. 3 is a schematic structural diagram of a device provided by an embodiment of the present application.
  • FIG. 4 is another schematic structural diagram of a device provided by an embodiment of the present application.
  • FIG. 5 is another schematic structural diagram of a device provided by an embodiment of the present application.
  • FIG. 6 is a schematic diagram of another structure of an apparatus provided by an embodiment of the present application.
  • a data packet whose data volume is less than a preset data volume threshold can be called a small data packet.
  • the above-mentioned data amount threshold is generally only a few bytes.
  • Different communication networks may have different definitions of small data packets. For example, in communication network A, a data packet with a data volume less than D1 bytes can be defined as a decimal packet, while in communication network B, a data packet with a data volume less than D2 bytes can be defined as a small data packet.
  • a terminal device in an idle state or in an inactive state needs to transmit multiple control signaling with the network device and enter the connected state in response before it can exchange data or information with the network device.
  • small data packet transmission refers to that after the terminal device determines that the data packet to be transmitted is a small data packet, it integrates the small data packet into some control signaling, and then uses these control signaling to make the small data packet Transmit to network equipment. Or, it refers to using the data plane context stored by the terminal to transmit small data packets to the network device.
  • the aforementioned control signaling may include non-access stratum (NAS) signaling, radio resource control (radio resource control, RRC) signaling, and so on.
  • NAS non-access stratum
  • RRC radio resource control
  • small data packet transmission refers to the transmission method of the data transmission process that the terminal device does not need to enter the connected state.
  • the terminal device can send data to the network device without entering the connected state, which solves the problem of a large amount of signaling overhead caused by frequent switching of the terminal device between the idle state and the inactive state and the connected state.
  • the problem has improved the wasteful utilization of resources in the communication network.
  • data transmission technologies using small data packet transmission methods can include early data transmission (EDT), 2-step random access, pre-configured uplink resource configuration (PUR), etc. There are no restrictions.
  • Access restriction detection is a way for network equipment to control its load. That is, whenever a terminal device needs to establish a connection with a network device to perform a certain service, the terminal device needs to send multiple sets of parameters for access restriction detection corresponding to multiple service types from the network device based on the service type corresponding to the service. (Access restriction parameters will be substituted for the description below) The access restriction parameters corresponding to the target service are determined, and then the access restriction parameters are substituted into the preset detection rules for an access attempt, or an access restriction Detection. Only when the terminal device satisfies the detection passing condition included in the foregoing detection rule according to the access restriction parameters corresponding to the service, the terminal device can initiate random access to the network device to establish or restore the connection with the network device.
  • the above-mentioned service types may include multiple types, such as data transmission, multimedia phone services, and so on.
  • the above detection rules are mainly used to restrict the terminal equipment to perform the access restriction detection process.
  • the detection rules may be pre-configured by the terminal equipment at the factory, or configured by the network equipment in real time or periodically for the terminal equipment. There are no specific restrictions.
  • the above-mentioned detection rule may be a first detection rule, and the first detection rule relates to a formula for generating a passing condition and a waiting time, or in other words, the first detecting rule is related to a formula for generating a passing condition and a waiting time.
  • the above detection passing condition may specifically be that the random number a1 generated by the terminal device that is greater than or equal to 0 and less than 1 is less than the access threshold A configured by the network device.
  • T is the waiting time
  • r1 and r2 are constants
  • a2 is another random number greater than or equal to 0 and less than 1 generated by the terminal device
  • C is the access waiting parameter configured by the network device.
  • Both the access threshold A and the access waiting parameter C are greater than or equal to 0 and less than 1.
  • r1 can be set to a value of 0.7
  • r2 can be set to a value of 0.6.
  • the above access threshold can be used to determine whether the access restriction detection is passed, and the above waiting time formula is used to determine the waiting time for the terminal device to initiate the access restriction detection again.
  • the terminal device obtains multiple sets of access restriction parameters, and then based on the type of service that it currently needs to perform, determines a set of access restriction parameters including the access threshold A1 and the access waiting parameter C1 from the foregoing multiple access restriction parameters. Access restriction parameters. Then a random number a1 is randomly generated. If the terminal device determines that the random number a1 is less than the access threshold A1, it can be determined that it has passed the access restriction detection.
  • the embodiment of the present application provides an access restriction detection method, which is applicable to various wireless communication systems that can perform data transmission in a small data packet transmission manner.
  • MTC system code division multiple access (CDMA) system, wideband code division multiple access (WCDMA) system, general packet radio service (GPRS), long-term evolution ( long term evolution, LTE) system, LTE frequency division duplex (FDD) system, LTE time division duplex (TDD), universal mobile telecommunication system (UMTS), global interconnected microwave Access (worldwide interoperability for microwave access, WiMAX) communication systems, the future 5th generation (5G) system or new radio (NR), etc.
  • CDMA code division multiple access
  • WCDMA wideband code division multiple access
  • GPRS general packet radio service
  • LTE long-term evolution
  • FDD frequency division duplex
  • TDD LTE time division duplex
  • UMTS universal mobile telecommunication system
  • WiMAX global interconnected microwave Access (worldwide interoperability for microwave access, WiMAX) communication systems, the future 5th
  • the terminal equipment involved in the embodiments of this application may be user equipment, access terminal, user unit, user station, mobile station, mobile station, remote station, remote terminal, mobile device, user terminal, terminal, wireless communication device, user agent Or user device, it can also be a cellular phone, a cordless phone, a session initiation protocol (SIP) phone, a wireless local loop (WLL) station, a personal digital assistant (PDA), Handheld devices, computing devices, or other processing devices connected to wireless modems, in-vehicle devices, roadside units, wearable devices, terminal devices in the future 5G network, or future evolution of public land mobile communication networks (public land mobile The terminal equipment in the network, PLMN) is not limited in the embodiment of the present application. To facilitate understanding, in the embodiments of the present application, the first terminal device or the second terminal device will be collectively described.
  • the network device involved in the embodiment of this application is a device deployed in a radio access network (RAN) to provide wireless communication functions for terminal devices.
  • the network device may specifically be a base station, and the above-mentioned base station may include various forms of macro base stations, micro base stations, relay stations, access point base station controllers, transceiver nodes (transmission reception points, TRP), and so on.
  • the specific names of base stations may be different.
  • eNBs evolved NodeBs
  • gNB new radio node B
  • a network device will be used as an example for description.
  • FIG. 1 is a schematic diagram of the architecture of a communication system provided by an embodiment of the present application.
  • the communication system includes network equipment and user equipment.
  • the network device can establish a connection with the terminal device through a wired connection, a wireless connection, or other connection methods.
  • the above-mentioned terminal device may be prohibited or mobile, which may be determined according to actual application scenarios.
  • the communication system may include one or more network devices, and may include one or more terminal devices (such as terminal device 1 to terminal device 5 in FIG. 1).
  • the network device can issue at least one set of access restriction parameters for access restriction detection to the terminal device.
  • the terminal device Before a terminal device needs to establish a connection with a network device to perform a certain service, the terminal device needs to perform access restriction detection according to the aforementioned at least one set of access restriction parameters and preset detection rules.
  • the access restriction parameter used for the access restriction detection before the data transmission service is set in the scenario that the network device needs to switch to the connected state for the terminal device to perform data transmission, and is not applicable to the terminal.
  • the device uses the small data transmission method for data transmission. If the terminal device still uses the access restriction parameters corresponding to the method that needs to enter the connected state for data transmission to perform access restriction detection, the probability of the terminal device passing the access restriction detection is low, which makes it difficult for the terminal device to pass the test normally.
  • the data packet transmission method sends small data packets to the network equipment, which reduces the resource utilization rate of the wireless communication network.
  • the technical problem to be solved by the method provided in the embodiments of this application is: how to configure the access restriction parameters suitable for the small data packet transmission method for the terminal device, so as to improve the detection of the access restriction when the terminal device uses the small data packet transmission method to transmit Probability, improve the resource utilization rate of wireless communication network.
  • FIG. 2 is an access restriction detection method provided by an embodiment of the present application.
  • the proposed access restriction detection method will be described by taking the first detection rule described for the concept of access detection as an example.
  • the access detection method may include the following steps:
  • the network device determines at least one set of first access restriction parameters.
  • the network device can determine at least one set of access restriction parameters after detecting the arrival of the preset parameter determination period or the occurrence of other triggering events (in order to facilitate understanding and distinction, the following will use the first connection Enter the restriction parameter instead of description).
  • the above-mentioned at least one set of first access restriction parameters is used for the access restriction detection of the terminal device before data transmission in a small data packet transmission mode.
  • the network device after the network device detects that the preset parameter determination period arrives or other triggering event occurs, it can perform the data transmission service based on the small data packet transmission mode according to the load status parameter of the communication network (for To facilitate the distinction, the following will replace the description of the first service with the service priority information and/or the device level of each terminal device among the multiple terminal devices that can implement the first service to determine at least one group of first services corresponding to the first service.
  • Access restriction parameters may specifically include network load rate, channel utilization rate, bandwidth utilization rate, etc.
  • the foregoing service priority information may specifically be determined by factors such as a service type and service resource occupation information of a certain service.
  • the priority of making emergency calls such as 110 is higher than that of ordinary calls.
  • video services take up more resources, so when the communication network is heavily loaded, the priority of voice services will be higher than that of video services.
  • the device level of the terminal device is determined based on the probability of passing the access restriction detection required by the terminal device in different application scenarios (the passing probability is used instead of the description below).
  • the above passing probability refers to the probability of passing when the terminal device performs an access restriction detection operation. In practical applications, the higher the passing probability required by the terminal device, the higher the level of equipment corresponding to the terminal device.
  • the passing probability required by terminal equipment used in military communication services is greater than that required by terminal equipment used in civilian communication services. That is, the equipment level of terminal equipment applied to military communication services is higher than that of terminal equipment applied to civilian communication services.
  • the communication request initiated by the terminal equipment on the ambulance is more urgent than the communication request initiated by the terminal equipment on the ordinary truck. Therefore, the equipment level of the terminal equipment applied to the ambulance will be more urgent than that of the terminal equipment applied to the ambulance.
  • the equipment level of terminal equipment on ordinary trucks is higher.
  • the above-mentioned other trigger events may also include the change of the network load rate of the communication network reaching a preset change threshold, the restart of the communication network, etc., which are not specifically limited here.
  • the network device can also use the same or similar method to determine at least one set of access restriction parameters corresponding to other types of services other than the first service.
  • network equipment can perform data transmission services according to the load status of the communication network and terminal equipment through other data transmission methods (that is, the method that needs to enter the connected state to perform data transmission) except for the small data packet transmission method (for ease of description)
  • the second service is used to replace the description below) corresponding priority information and/or the device level of each terminal device among the multiple terminal devices that can implement the second service determines at least one set of access restrictions corresponding to the second service Parameters (for the convenience of understanding and distinction, the second access restriction parameter will be substituted for the description below).
  • the network device can also perform the media phone service according to the load status of the communication network and the terminal device to perform the media phone service (for the convenience of description, the third service is used to replace the description below) corresponding priority information and/or the third service can be realized
  • the device level of each terminal device in the plurality of terminal devices determines at least one set of access restriction parameters corresponding to the third service (the third access parameter will be substituted for the description below).
  • the process of determining the first access restriction parameter and/or the second access restriction parameter by the network device may include the following four possible implementation manners:
  • the network device may determine a set of first access restriction parameters according to the load status parameters of the communication network and the priority information of the first service.
  • the set of access restriction parameters may specifically include a first access threshold and a first access threshold.
  • Access waiting parameters For example, the above-mentioned first access restriction parameter may specifically be an array [A1, C1], where A1 is the first access threshold, and C1 is the first access waiting parameter.
  • the foregoing first access threshold may be used for the terminal device to determine whether it can pass the access restriction detection.
  • the above-mentioned first access waiting parameter may be used to determine the waiting time for the terminal device to initiate the access restriction detection operation again in the case that the terminal device determines that it has failed the access restriction detection.
  • the network device separately configures a set of access restriction parameters for the terminal device for the access restriction detection before the small data packet transmission, so that the terminal device does not need to repeatedly trigger the access restriction detection before the small data packet transmission, which improves the wireless The resource utilization of the communication network.
  • the network device may determine multiple sets of first access restriction parameters according to the load status parameters of the communication network, the priority information of the first service, and the device level of each terminal device among the multiple terminal devices that can initiate the first service.
  • the terminal equipment corresponding to each group of first access restriction parameters has different equipment levels, and the probability of each group of first access restriction parameters passing the access restriction detection is also different.
  • the higher the corresponding device level the higher the probability that the first access restriction parameter passes the access restriction detection. For example, suppose that the foregoing multiple sets of first access restriction parameters include a set of first access restriction parameters K1 and a set of first access restriction parameters K2.
  • each group of first access restriction parameters may specifically include a first access threshold, a first access waiting parameter, and an access identifier.
  • the access identifier included in any set of first access restriction parameters is used to indicate the device level corresponding to the terminal device that can use the any set of first access restriction parameters to perform access restriction detection.
  • the access identifier of a certain group of first access restriction parameters is 1, it means that the devices that can use the first access restriction parameters of the group are civilian devices, and the access identifier of a certain group of first access restriction parameters If it is 2, it means that the terminal device that can use the first access restriction parameter of the group is a civilian device, and so on.
  • the aforementioned access identifier can be used by the terminal device to determine a group of applicable first access restriction parameters from the aforementioned multiple sets of first access restriction parameters based on its own equipment level.
  • the terminal device should be configured in advance with data entities such as a table indicating the correspondence between the device level and the access flag, so that the terminal device can determine its corresponding access identifier based on its own device level.
  • the above-mentioned first access threshold may be used for the terminal device to determine whether it can pass the access restriction detection.
  • the above-mentioned first access waiting parameter may be used for the terminal device to calculate the waiting time for it to initiate the access restriction detection operation again in the case where it is determined that it has not passed the access restriction detection.
  • the foregoing multiple sets of first access restriction parameters include at least a first access restriction parameter K1 and a first access restriction parameter K2.
  • the above-mentioned first access restriction parameter K1 may specifically be an array [A11, C11, L1].
  • A11 is the first access threshold in the first access restriction parameter K1
  • C11 is the first access waiting parameter in the first access restriction parameter K1
  • L1 is the access in the first access restriction parameter K1 Logo.
  • the aforementioned first access restriction parameter K2 may specifically be an array [A12, C12, L2], where A12 is the first access threshold in the first access restriction parameter K2, and C12 is the first access restriction parameter K2.
  • the first access waiting parameter, L2 is the access identifier in the first access restriction parameter K2.
  • the required pass probabilities of two or more terminal devices with similar equipment levels may also be the same. Therefore, in a specific implementation, the first access threshold and the first access waiting parameter contained in each first access parameter in the different two or more sets of first access parameters may also be the same.
  • the implementation of this application The examples do not make specific restrictions.
  • a set of first access restriction parameters may also include multiple different Access ID.
  • the above-mentioned first access restriction parameter K1 can also be specifically an array [A11, C11, L1, L2, L3], that is, three terminal devices with the corresponding access identifiers L1, L2, or L3 can use the first access Enter the parameter A11 and/or the first access waiting parameter C11 to perform an access restriction detection operation.
  • the network equipment configures different sets of access restriction parameters for the access restriction detection before the transmission of small data packets for the terminal equipment of different equipment levels, which can make the terminal equipment with higher equipment level easier to access than the terminal equipment with lower equipment level
  • the restriction detection not only improves the resource utilization rate of the wireless communication network, but also ensures the rationality of the access restriction detection operation, and improves the practicability of the access restriction detection method.
  • the network device may first obtain the second access restriction parameter applicable to the above-mentioned second service from the internal or external memory. Then, the network device may also determine a set of first access restriction parameters corresponding to the first service according to the load status parameter of the communication network, the priority information corresponding to the first service, and the second access restriction parameter. Wherein, the first access restriction parameter may include a first coefficient and a second coefficient. After the terminal device initiates the service request corresponding to the first service, the terminal device may determine whether it can pass the access restriction detection based on the first coefficient and the second access threshold. If the terminal device determines that it has not passed the access restriction detection, the terminal device may also determine the waiting time for the next time it initiates the access restriction detection operation corresponding to the first service according to the second coefficient and the second access waiting parameter.
  • the acquired second access restriction parameter may specifically be the array [A1, C1], where A1 is the second access threshold included in the second access restriction parameter, and C2 is the The second access waiting parameter included in the second access restriction parameter.
  • the above-mentioned first access restriction parameter may specifically be an array [R1, R2], where R1 is the first coefficient and R2 is the second coefficient.
  • the network device adjusts the existing second access restriction parameter suitable for the access restriction detection of the second service through the first access restriction parameter generated by the network device to obtain the access restriction detection before the transmission of the small data packet.
  • the access restriction parameter avoids a large number of modifications to the existing signaling structure or communication protocol caused by generating a set of access restriction parameters applicable to the above-mentioned first service, and avoids the increase in development cost, which makes this application
  • the provided access restriction detection method is easier to implement, which improves the practicability of the access restriction detection method while improving the resource utilization rate of the wireless communication network.
  • the network device may first obtain multiple sets of second access restriction parameters suitable for the foregoing second service from internal or external storage.
  • each set of second access restriction parameters is different from each other, and the equipment level of the terminal device corresponding to each set of second access restriction parameters is different, and each set of second access restriction parameters passes
  • the probability of access restriction detection is also different.
  • the second access restriction parameter corresponding to the higher device level has a higher probability of passing the access restriction detection.
  • the foregoing multiple sets of second access restriction parameters include a set of first access restriction parameters K21 and a set of second access restriction parameters K22.
  • each group of second access restriction parameters may specifically include a second access threshold, a second access waiting parameter, and an access identifier.
  • the access identifier included in any set of second access restriction parameters is used to indicate the device corresponding to the terminal device that can use the any set of second access restriction parameters to perform access restriction detection before the second service grade.
  • the access identifier of a certain set of second access restriction parameters is 1, it may indicate that the terminal devices that can use the second access restriction parameters of the set are civilian equipment. If the access identifier of a certain set of second access restriction parameters is 2, it may indicate that the terminal devices that can use the second access restriction parameters of the set are military equipment, and so on.
  • the aforementioned access identifier can be used for the terminal device to determine a group of applicable second access restriction parameters from the aforementioned multiple sets of second access restriction parameters based on its own equipment level.
  • the terminal device should be configured in advance with data entities such as a table indicating the correspondence between the device level and the access flag, so that the terminal device can determine its corresponding access identifier based on its own device level.
  • the foregoing second access threshold may be used for the terminal device to determine whether it can pass the access restriction detection before the second service.
  • the above-mentioned first access waiting parameter may be used to calculate the waiting time for the terminal device to initiate the access restriction detection operation again when it is determined that it has not passed the access restriction detection before the second service.
  • the network device may also determine multiple sets of first access restriction parameters corresponding to the first service according to the load status parameters of the communication network, the priority information corresponding to the first service, and the multiple sets of second access restriction parameters.
  • a set of second access restriction parameters corresponds to a set of first access restriction parameters.
  • Any set of first access restriction parameters includes a first coefficient, a second coefficient, and an access identifier, and this access identifier corresponds to the second access corresponding to the any set of first access restriction parameters.
  • the access identifier included in the access restriction parameter is the same. Or, in other words, there is a correspondence between the first access restriction parameter and the second access restriction parameter with the same access identifier.
  • the multiple sets of first access restriction parameters include a first access restriction parameter K11, which corresponds to the second access restriction parameter K21 in the multiple sets of second access restriction parameters.
  • the terminal device may first according to the first coefficient contained in the above-mentioned first access restriction parameter K11 and the second access threshold contained in the above-mentioned second access restriction parameter K21. It is determined whether it can pass the access restriction detection before the first service. If the terminal device determines that it has not passed the access restriction detection, the terminal device can determine according to the second coefficient included in the first access restriction parameter K11 and the second access waiting parameter included in the second access restriction parameter K21. The waiting time for the next initiation of access restriction detection.
  • the foregoing multiple sets of second access restriction parameters may include at least a second access restriction parameter K21 and a second access restriction parameter K22.
  • the foregoing multiple sets of second access restriction parameters may include at least a second access restriction parameter K21 and a second access restriction parameter K22.
  • the second access restriction parameter K21 corresponds to the first access restriction parameter K11 in the multiple sets of first access restriction parameters
  • the second access restriction parameter K22 corresponds to the first access in the multiple sets of first access restriction parameters.
  • the above-mentioned second access restriction parameter K21 may specifically be an array [A21, C21, L1], where A21 is the second access threshold in the second access restriction parameter K21, and C21 is the second access restriction parameter K21
  • the second access waiting parameter, L1 is the access identifier in the second access restriction parameter K21.
  • the foregoing first access restriction parameter K11 may specifically be an array [R11, R21, L1].
  • R11 is the first coefficient in the first access restriction parameter K11
  • R21 is the second coefficient in the first access restriction parameter K11
  • L1 is the access identifier.
  • the above-mentioned second access restriction parameter K22 may specifically be an array [A22, C22, L2], where A22 is the second access threshold in the second access restriction parameter K22, and C22 is the second access restriction parameter K22
  • the second access waiting parameter, L22 is the access identifier in the second access restriction parameter K22.
  • the aforementioned first access restriction parameter K12 may specifically be an array [R12, R22, L2].
  • R12 is the first coefficient in the first access restriction parameter K12
  • R22 is the second coefficient in the first access restriction parameter K12
  • L2 is the access identifier.
  • the pass probabilities required by two or more terminal devices with similar equipment levels may also be the same. Therefore, in a specific implementation, the first coefficient and the second coefficient contained in each first access parameter in different two or more sets of first access parameters may be different or may be the same.
  • the implementation of this application The examples do not make specific restrictions.
  • the second access threshold or the second access waiting parameter included in each second access parameter in the multiple sets of second access parameters may be the same or may be different.
  • a set of first access restriction parameters may also include multiple different Access ID.
  • the above-mentioned first access restriction parameter K11 can also be specifically an array [R11, R21, L1, L2, L3], and its corresponding second access restriction parameter K21 can also be specifically [A21, C21, L1, L2, L3]. That is, the three terminal devices whose corresponding access identifiers are L1, L2, or L3 can use the above-mentioned first access restriction parameter K11 and second access restriction parameter K21 to perform an access restriction detection operation.
  • the network device adjusts the existing multiple sets of second access restriction parameters applicable to the second service through the multiple sets of first access restriction parameters generated by it, so that terminal devices of different equipment levels can use different parameters for small data
  • the access restriction detection before the packet transmission can make the terminal equipment with high equipment level have a higher probability of passing the access restriction detection, and avoid the interference caused by the separate generation of multiple sets of access restriction parameters suitable for the first service.
  • the network device sends a first message including at least one set of first access restriction parameters to the terminal device.
  • the network device may package the above at least one set of first access restriction parameters in a system information block (SIB).
  • SIB system information block
  • the first message is generated, and the first message is sent to the terminal device in a manner of broadcast, multicast, or unicast.
  • the network device may send the above-mentioned first message to each terminal device with which a communication link is established.
  • the network device may send the foregoing first message to each terminal device in its pre-configured multicast group.
  • the network device may send the first message to one or more terminal devices that have initiated the unicast request.
  • the network device may pack the at least one set of first access restriction parameters in system information block type 1 (system information block type 1, SIB1) to generate the first message. Then, when the preset SIB sending period arrives, the first message is broadcast to the terminal device.
  • the network device may also package the at least one set of first access restriction parameters in system information block type 2 (SIB2) to generate the first message. Then, when the preset SIB2 sending trigger condition is satisfied, the first message is broadcast to the terminal device.
  • SIB2 system information block type 2
  • the network device determines at least one set of first access restriction parameters and at least one set of second access parameters
  • the aforementioned at least one set of access restriction parameters and at least one set of The group second access parameter is packaged in the SIB to obtain the first message, and the first message is sent to the terminal device in a manner of broadcast, unicast or multicast.
  • the first message may not only include at least one set of first access restriction parameters corresponding to the first service and/or at least one set of second access restriction parameters corresponding to the second service. It may also include at least one set of third access restriction parameters corresponding to the aforementioned third service, or access restriction parameters corresponding to more other types of services.
  • the corresponding business types may also be different according to different predetermined business type division rules. For example, in some more complicated service type division rules, the above-mentioned first service and the above-mentioned second service are two different types of services.
  • the above-mentioned first service and the above-mentioned second service will be uniformly divided into the data transmission type of service, that is, the first service and the second service are both data transmission services. Therefore, in the case where the data entity of the access restriction detection parameter included in the first message corresponds to the service type, the difference in the service type division rule may also cause the data structure of the first message to be different.
  • the aforementioned data entities may include arrays, structures, data tables, etc., which are not limited here.
  • the above-mentioned first message may contain at least three data entities. The first data entity corresponds to the above-mentioned first service, and contains at least one set of first access restriction parameters and the second data entity.
  • the entity corresponds to the aforementioned second service and contains at least one set of second access restriction parameters
  • the third data entity corresponds to the aforementioned third service, and contains at least one set of third access restriction parameters.
  • the above-mentioned first message may contain at least two data entities.
  • the first data entity corresponds to a type of service of data transmission, that is, the first data entity also contains at least one corresponding to the first service.
  • the second data entity corresponds to the foregoing third service, and contains at least one set of third access restriction parameters.
  • a data entity corresponding to a larger service category may include one or more access restriction detection parameters corresponding to a smaller service category.
  • Using relatively simple service type division rules such as assigning the above-mentioned first service and the above-mentioned second service to the service of data transmission, can avoid the high complexity of the signaling structure of the first message caused by the complicated division of service types This can simplify the signaling structure of the first message.
  • the terminal device receives the first message, and when determining that the data transmission mode is small data packet transmission, performs access restriction detection according to at least one set of first access restriction parameters.
  • the terminal device may receive the first message broadcast, unicast, or multicast from the network device, and parse the first message according to a predetermined communication protocol between the terminal device and the network device to obtain the foregoing At least one set of first access restriction parameters and/or the aforementioned at least one set of second access restriction parameters. Then, when the terminal device determines that a certain data packet needs to be transmitted (for ease of understanding and distinction, the target data packet is used in the following to replace the description), it may first obtain the preset data volume threshold. What needs to be explained here is that network devices will periodically broadcast different data volume thresholds in their different coverage areas, and terminal devices in these different coverage areas can determine whether they can use small data packets according to these different data volume thresholds.
  • the terminal device can determine whether the data volume of the target data packet is less than the preset data volume threshold. If the terminal device determines that the data volume of the target data packet is less than its corresponding data volume threshold, it is determined that it can transmit the target data in a small data packet transmission mode (that is, the terminal device determines that it can perform the first service). If the terminal device determines that the data volume of the target data packet is equal to or greater than its corresponding data volume threshold, it is determined that it can transmit the target data through other output transmission methods other than the small data packet transmission method (that is, the terminal device determines that it can execute the above Second business).
  • the terminal device may perform the first service according to the aforementioned at least one set of first access restriction parameters and/or the aforementioned at least one set of second access restriction parameters The access restriction detection operation.
  • the first scenario is that the first message only contains a set of first access restriction parameters.
  • the second scenario is that the first message contains multiple sets of first access restriction parameters.
  • the third scenario is that the first message contains a group of first access restriction parameters and a group of second access restriction parameters.
  • the fourth scenario is that the first message contains multiple sets of first access restriction parameters and multiple sets of second access restriction parameters.
  • the foregoing first message includes a set of first access restriction parameters.
  • the first access restriction parameter is [A1, C1].
  • the terminal device may obtain the first access restriction parameter from the first message.
  • the terminal device can generate a first random number x1. If the terminal device determines that the first random number x1 is less than the above-mentioned first access threshold A1, the terminal device can determine that the access detection restriction is passed, and can initiate a random access request to the network device. Establish or restore the network connection, and then achieve the target data transmission. If the terminal device determines that the first random number x1 is equal to or greater than the above-mentioned first access threshold A1, it can generate a second random number x2 again.
  • the foregoing first message includes multiple sets of first access restriction parameters. It is now assumed that the multiple sets of first access restriction parameters include a set of first access restriction parameters K1 and a set of second access restriction parameters K2.
  • the aforementioned first access restriction parameter K1 is specifically [A11, C11, L1]
  • the aforementioned first access restriction parameter K2 is specifically [A12, C12, L2].
  • the terminal device may obtain the above-mentioned at least one set of first access restriction parameters from the above-mentioned first message.
  • the terminal device can obtain its system configuration information, determine its device level based on the system configuration information, and determine the target access identifier corresponding to the terminal device according to the preset relationship table between the configuration level and the access identifier.
  • the terminal device can determine the above-mentioned first access restriction parameter K1 as the target first access restriction parameter to be used according to the target access identifier.
  • the terminal device can generate a first random number x1.
  • the terminal device determines that the first random number x1 is less than the target access threshold A11 in the target first access restriction parameter, the terminal device can determine that the access detection restriction is passed, and can initiate a random access request to the network device to establish or restore the network Connect, and then achieve the target data transmission. If the terminal device determines that the first random number x1 is equal to or greater than the aforementioned target access threshold A11, it can generate a second random number x2 again.
  • the above-mentioned first message includes a group of first access restriction parameters and a group of second access restriction parameters, and this group of first access restriction parameters is included in the service category corresponding to the first service.
  • this set of second access restriction parameters are included in the data entity corresponding to the business category of the second service (the second data entity is used to replace the description below) )in.
  • the second access restriction parameter is specifically [A1, C1].
  • the foregoing first access restriction parameter is specifically [R1, R2].
  • the terminal device may first adjust the second access threshold in the second access restriction parameter according to the first coefficient in the first access restriction parameter to obtain the target Access threshold. For example, the terminal device may adjust the second access threshold A1 according to the first coefficient R1 to obtain the target access threshold R1*A1. Then, the terminal device can first generate a first random number x1. If the terminal device determines that the first random number x1 is less than the target access threshold R1*A1, the terminal device can determine that the access detection restriction is passed, and can initiate a random access to the network device. Into the request to establish or restore the network connection, and then achieve the target data transmission.
  • the foregoing first message includes a set of first access restriction parameters and a set of second access restriction parameters, and the set of first access restriction parameters and the set of second access restriction parameters It is also included in the data entity corresponding to the category of data transmission (the third data entity is used to replace the description below).
  • the above-mentioned first access restriction parameter is specifically [R1, R2]
  • the second access restriction parameter is specifically [A1, C1].
  • the terminal device can generate a first random number x1. If the terminal device determines that the first random number x1 is less than the above-mentioned first access threshold R1, the terminal device can determine that the access detection restriction is passed, and can initiate a random access request to the network device. Establish or restore the network connection, and then achieve the target data transmission. If the terminal device determines that the first random number x1 is equal to or greater than the above-mentioned first access threshold R1, it can generate a second random number x2 again.
  • the foregoing first message includes multiple sets of first access restriction parameters and multiple sets of second access restriction parameters, and the multiple sets of first access restriction parameters are included in the service category corresponding to the first service.
  • the multiple sets of second access restriction parameters are included in the data entity corresponding to the business category of the second service (the second data entity is used below to replace Description).
  • the foregoing multiple sets of first access restriction parameters may include at least a second access restriction parameter K21 and a second access restriction parameter K22.
  • the second access restriction parameter K21 corresponds to the first access restriction parameter K11 in the multiple sets of first access restriction parameters
  • the second access restriction parameter K22 corresponds to the first access in the multiple sets of first access restriction parameters.
  • the above-mentioned second access restriction parameter K21 is specifically [A21, C21, L1].
  • the aforementioned first access restriction parameter K11 is specifically [R11, R21, L1].
  • the above-mentioned second access restriction parameter K22 is specifically [A22, C22, L2].
  • the aforementioned first access restriction parameter K12 is specifically [R12, R22, L2].
  • the terminal device can obtain its system configuration information, determine its device level based on the system configuration information, and determine the target access identifier corresponding to the terminal device according to the preset relationship table between the configuration level and the access identifier.
  • the terminal device can determine the first access restriction from the multiple sets of first access restriction parameters and multiple sets of second access restriction parameters according to the target access identifier.
  • the parameter K11 is the target first access restriction parameter that needs to be used
  • the above-mentioned second access restriction parameter K21 is the target second access restriction parameter that needs to be used.
  • the terminal device may first adjust the target second access threshold A21 in the target second access restriction parameter according to the target first coefficient R11 in the target first access restriction parameter to obtain the target access threshold R11 *A21.
  • the terminal device can generate a first random number x1. If the terminal device determines that the first random number x1 is less than the target access threshold R11*A21, the terminal device can determine that the access detection restriction is passed, and can initiate random access to the network device Request to establish or restore the network connection, and then achieve the target data transmission.
  • the foregoing first message includes multiple sets of first access restriction parameters and multiple sets of second access restriction parameters, and multiple sets of first access restriction parameters and multiple sets of second access restriction parameters are simultaneously It is included in the data entity corresponding to the business category of data transmission (for the sake of understanding, the third data entity is used to replace the description below).
  • the above-mentioned multiple sets of first access restriction parameters include the second access restriction parameter K21.
  • the second access restriction parameter K21 includes the first access restriction parameter K11 in the aforementioned multiple sets of first access restriction parameters.
  • the above-mentioned second access restriction parameter K21 is specifically [A21, C21, L1].
  • the aforementioned first access restriction parameter K11 is specifically [R11, R21, L1].
  • the terminal device may first obtain the aforementioned third data entity from the aforementioned first message, and then obtain the multiple corresponding multiple small data packet transmission methods from the aforementioned third data entity. Group first access restriction parameter. Then, the terminal device can obtain its system configuration information, determine its device level based on the system configuration information, and determine the target access identifier corresponding to the terminal device according to the preset relationship table between the configuration level and the access identifier.
  • the target access identifier determined by the terminal device is L1
  • the terminal device can determine the first access restriction from the multiple sets of first access restriction parameters and multiple sets of second access restriction parameters according to the target access identifier.
  • the parameter K11 is the target first access restriction parameter that needs to be used. That is, R11 is the target first access threshold, and R21 is the target first access waiting parameter. Then, the terminal device can generate a first random number x1. If the terminal device determines that the first random number x1 is less than the target first access threshold R11, the terminal device can determine that the access detection restriction is passed, and can initiate a random access to the network device. Into the request to establish or restore the network connection, and then achieve the target data transmission. If the terminal device determines that the first random number x1 is equal to or greater than the above-mentioned target first access threshold R11, a second random number x2 can be generated again.
  • the network device may provide one or more sets of access restriction parameters for the terminal device to perform the access restriction detection operation before data transmission through the small data packet transmission mode.
  • the terminal device uses the small data packet transmission method for data transmission, it can prevent the terminal device from entering the connected state for data transmission (that is, the data transmission method that takes up more network resources) corresponding access restriction parameters
  • the low pass rate of the access restriction detection caused by the access restriction detection eliminates the need for the terminal device to repeatedly trigger the access restriction detection before transmitting small data packets, which improves the resource utilization rate of the wireless communication network.
  • Fig. 3 is a schematic structural diagram of a device provided by an embodiment of the present application. As shown in FIG. 3, the device can be applied to the communication system shown in FIG. 1 to perform the functions of the network device in the first embodiment.
  • the device can be the network device itself, or an internal component or module of the network device.
  • the device may include one or more transceiving units 301 and one or more determining units 302.
  • the foregoing transceiver unit 301 may be referred to as a transceiver, a transceiver circuit, or a transceiver, etc., which may include at least one antenna and a radio frequency unit.
  • the above-mentioned transceiver unit 301 is mainly used for transmitting and receiving radio frequency signals and conversion between radio frequency signals and baseband signals, for example, for sending the above-mentioned first message in the above-mentioned embodiment to a terminal device.
  • the above-mentioned determining unit 302 is mainly used to perform baseband processing, control the device, and so on.
  • the foregoing transceiver unit 301 and the determining unit 302 may be physically arranged together or separately arranged physically, that is, a distributed device.
  • the above-mentioned determining unit 302 may be used to control the apparatus to execute the determination process of at least one set of first access parameters and/or at least one set of second access parameters in the above-mentioned first embodiment.
  • the above-mentioned determining unit 302 may be composed of one or more single boards, and multiple single boards may jointly support a radio access network (such as an NR network) with a single access indication, or may respectively support different access standards. Wireless access network.
  • the aforementioned determining unit 302 further includes a memory and a processor, and the aforementioned memory is used to store necessary instructions and data.
  • the foregoing processor is used to control the device to perform necessary actions, for example, to control the device to execute the operation flow of the device in the foregoing method embodiment.
  • the aforementioned memory and processor may serve one or more single boards. In other words, the memory and the processor can be set separately on each board. It can also be that multiple boards share the same memory and processor. In addition, necessary circuits can be provided on each board.
  • the above determining unit 302 is configured to perform the determination process of at least one group of first access restriction parameters in step S10 in FIG. 2.
  • the foregoing sending unit 301 is configured to execute the sending process of the first message including at least one set of first access restriction parameters in step S10 in FIG. 2.
  • the above determining unit 302 is configured to perform the process of determining a set of first access restriction parameters described in Embodiment 1 in step S10.
  • the set of access restriction parameters may specifically include a first access threshold and a first access waiting parameter.
  • the above determining unit 302 is configured to perform the process of determining multiple sets of first access restriction parameters described in the second embodiment in step S10.
  • Each group of first access restriction parameters may specifically include a first access threshold, a first access waiting parameter, and an access identifier.
  • the access identifier included in any set of first access restriction parameters is used to indicate the device level corresponding to the terminal device that can use the any set of first access restriction parameters to perform access restriction detection.
  • the determination unit 302 is configured to perform the determination according to the load status parameter of the communication network, the priority information corresponding to the first service, and the second access restriction parameter described in the third embodiment in step S10.
  • the first access restriction parameter may include a first coefficient and a second coefficient.
  • the second access restriction parameter specifically includes a second access threshold, a second access waiting parameter, and an access identifier.
  • the above determining unit 302 is configured to perform the process of determining multiple sets of first access restriction parameters and multiple sets of second access restriction parameters described in Embodiment 4 in step S10.
  • a set of first access restriction parameters corresponds to a set of second access restriction parameters.
  • Each set of second access restriction parameters includes a second access threshold, a second access waiting parameter, and an access identifier
  • each set of second access restriction parameters corresponds to a set of first access restriction parameters that includes the first access restriction parameter.
  • Different first access parameters and second access parameters have different probabilities for passing access restriction detection.
  • the foregoing transceiver unit 301 is configured to perform the process of sending at least one set of first access restriction parameters to the terminal device described in step S20.
  • FIG. 4 is a schematic structural diagram of an apparatus provided by an embodiment of the present application.
  • the device can be used to perform the functions of the terminal equipment in the first embodiment above.
  • the device can be the terminal device itself, or an internal component or module of the terminal device.
  • the device includes a processor, a memory, a radio frequency circuit, an antenna, and an input and output device.
  • the processor is mainly used to process the communication protocol and communication data, control the device, execute the software program, and process the data of the software program.
  • the memory is mainly used to store software programs and data.
  • the radio frequency circuit is mainly used for the conversion of baseband signal and radio frequency signal and the processing of radio frequency signal.
  • the antenna is mainly used to send and receive radio frequency signals in the form of electromagnetic waves.
  • Input and output devices such as touch screens, display screens, keyboards, etc., are mainly used to receive data input by a user who uses the device and output data to the user. It should be noted that in some scenarios, the communication device may not include an input and output device.
  • the processor When data needs to be sent, the processor performs baseband processing on the data to be sent, and outputs the baseband signal to the radio frequency circuit.
  • the radio frequency circuit performs radio frequency processing on the baseband signal and sends the radio frequency signal to the outside in the form of electromagnetic waves through the antenna.
  • the radio frequency circuit receives the radio frequency signal through the antenna, converts the radio frequency signal into a baseband signal, and outputs the baseband signal to the processor, and the processor converts the baseband signal into data and processes the data.
  • FIG. 4 only one memory and processor are shown in FIG. 4. In an actual device product, there may be one or more processors and one or more memories.
  • the memory may also be referred to as a storage medium or storage device.
  • the memory may be set independently of the processor, or may be integrated with the processor, which is not limited in the embodiment of the present application.
  • the processor may include a baseband processor and/or a central processing unit.
  • the baseband processor is mainly used to process communication protocols and communication data
  • the central processing unit is mainly used to control the entire device. Execute the software program and process the data of the software program.
  • the processor in FIG. 4 can integrate the functions of the baseband processor and the central processing unit.
  • the baseband processor and the central processing unit can also be independent processors and are interconnected by technologies such as buses.
  • the device may include multiple baseband processors to adapt to different network standards, the device may include multiple central processors to enhance its processing capabilities, and various components of the device may be connected through various buses.
  • the aforementioned baseband processor can also be expressed as a baseband processing circuit or a baseband processing chip.
  • the aforementioned central processing unit can also be expressed as a central processing circuit or a central processing chip.
  • the function of processing the communication protocol and communication data can be built in the processor, or can be stored in the storage unit in the form of a software program, and the processor executes the software program to realize the baseband processing function.
  • the antenna and radio frequency circuit with the transceiver function may be regarded as the transceiver unit of the device, and the processor with the processing function may be regarded as the processing unit of the device.
  • the device includes a transceiver unit 410 and a detection unit 420.
  • the device for implementing the receiving function in the transceiver unit 410 can be regarded as the receiving unit, and the device for implementing the sending function in the transceiver unit 410 as the sending unit, that is, the transceiver unit 410 includes a receiving unit and a sending unit.
  • the receiving unit may also be called a receiver, a receiver, or a receiving circuit.
  • the transmitting unit may sometimes be called a transmitter, a transmitter, or a transmitting circuit.
  • the transceiving unit 410 is configured to perform the operation of receiving the first message in the first embodiment
  • the detecting unit 420 is configured to perform the operation of detecting the access restriction according to at least one set of first access restriction parameters in the first embodiment.
  • the detection unit 420 is configured to perform the process of performing access restriction detection according to a set of first access control parameters described in scenario 1 in step S30 in FIG. 2.
  • the detection unit 420 is configured to perform the process of determining the target access identifier described in the second scenario in step S30.
  • the detection unit 420 is further configured to perform the process of determining the first access restriction parameter of the target connection described in the second scenario in step S30.
  • the detection unit 420 is further configured to perform the process of performing access restriction detection according to the target first access restriction parameter described in the second scenario in step S30.
  • the detection unit 420 is configured to perform the process of adjusting the second access threshold according to the above-mentioned first coefficient described in scenario 3 in step S30 to obtain the target access threshold.
  • the detection unit 420 is further configured to perform the process of adjusting the second access waiting parameter according to the second coefficient described in scenario 3 in step S30 to obtain the target access waiting parameter.
  • the detection unit 420 is further configured to perform the process of performing access restriction detection according to the target access threshold and the target access waiting parameter described in scenario 3 in step S30.
  • the detection unit 420 is configured to perform the process of determining the target access identifier described in scenario 4 in step S30.
  • the detection unit 420 is configured to perform the process of determining the target first access restriction parameter and the target second access restriction parameter described in scenario 4 in step S30.
  • the detection unit 420 is further configured to perform the adjustment of the target second access threshold according to the target first coefficient as described in the fourth scenario in step S30 to obtain the target access threshold, and/or, the target second coefficient according to the target second coefficient.
  • the process of adjusting the access waiting parameters to obtain the target access waiting parameters.
  • the detection unit 420 is further configured to perform the process of performing access restriction detection according to the target access threshold and the target access waiting parameter described in scenario 4 in step S30.
  • FIG. 5 is a schematic diagram of another structure of an apparatus provided by an embodiment of the present application.
  • the device may be the network device in the first embodiment, and may be used to implement the access restriction detection method described in the first embodiment.
  • the device includes a processor 51, a memory 52, a transceiver 53 and a bus system 54.
  • the memory 51 includes but is not limited to RAM, ROM, EPROM or CD-ROM, and the memory 51 is used to store related instructions and data.
  • the memory 51 stores the following elements, executable modules or data structures, or their subsets, or their extended sets:
  • Operating instructions including various operating instructions, used to implement various operations.
  • Operating system including various system programs, used to implement various basic services and process hardware-based tasks.
  • FIG. 5 Only one memory is shown in FIG. 5. Of course, the memory can also be set to multiple as required.
  • the transceiver 53 may be a communication module or a transceiver circuit. Applied in the embodiment of this application, the transceiver 53 is used to execute the sending process of the first message involved in the first embodiment.
  • the processor 51 may be a controller, a CPU, a general-purpose processor, DSP, ASIC, FPGA or other programmable logic devices, transistor logic devices, hardware components, or any combination thereof. It can implement or execute various exemplary logical blocks, modules, and circuits described in conjunction with the disclosure of the embodiments of the present application. The procedure for determining at least one set of first access restriction detection parameters as described in the first embodiment.
  • the processor 51 may also be a combination for realizing computing functions, for example, including a combination of one or more microprocessors, a combination of a DSP and a microprocessor, and so on.
  • bus system 54 In addition to the data bus, the bus system 54 may also include a power bus, a control bus, and a status signal bus. However, for the sake of clarity, various buses are marked as the bus system 54 in FIG. 5. For ease of illustration, FIG. 5 is only schematically drawn.
  • the processor in the embodiment of the present application may be an integrated circuit chip with signal processing capability.
  • the steps of the foregoing method embodiments can be completed by hardware integrated logic circuits in the processor or instructions in the form of software.
  • the above-mentioned processor can be a general-purpose processor, a digital signal processor (digital signal processor, DSP), an application specific integrated circuit (ASIC), a ready-made programmable gate array (field programmable gate array, FPGA) or other Programming logic devices, discrete gates or transistor logic devices, discrete hardware components.
  • DSP digital signal processor
  • ASIC application specific integrated circuit
  • FPGA field programmable gate array
  • Programming logic devices discrete gates or transistor logic devices, discrete hardware components.
  • the memory in the embodiment of the present application may be a volatile memory or a non-volatile memory, or may include both volatile and non-volatile memory.
  • the non-volatile memory can be read-only memory (ROM), programmable read-only memory (programmable ROM, PROM), erasable programmable read-only memory (erasable PROM, EPROM), and electronic Erase programmable read-only memory (electrically EPROM, EEPROM) or flash memory.
  • the volatile memory may be random access memory (RAM), which is used as an external cache.
  • RAM random access memory
  • static random access memory static random access memory
  • dynamic RAM dynamic random access memory
  • synchronous dynamic random access memory synchronous DRAM, SDRAM
  • double data rate synchronous dynamic random access memory double data rate SDRAM, DDR SDRAM
  • enhanced synchronous dynamic random access memory enhanced SDRAM, ESDRAM
  • synchronous connection dynamic random access memory direct rambus RAM, DR RAM
  • direct rambus RAM direct rambus RAM
  • the embodiment of the present application also provides a computer-readable medium on which a computer program is stored, and when the computer program is executed by a computer, the method or step executed by the network device in the first embodiment is implemented.
  • the embodiment of the present application also provides a computer program product, which, when executed by a computer, implements the method or step executed by the network device in the first embodiment.
  • the embodiment of the present application also provides a device, which may be the network device in the first embodiment.
  • the device includes a processor and an interface.
  • the processor is used to execute the method or step executed by the network device in the first embodiment.
  • the foregoing network device may be a chip, and the foregoing processor may be implemented by hardware or software.
  • the processor When implemented by hardware, the processor may be a logic circuit, an integrated circuit, or the like.
  • the processor When implemented by software, the processor may be a general-purpose processor, which is implemented by reading software codes stored in the memory, and the memory may be integrated in the processor, may be located outside the foregoing processor, and exist independently.
  • FIG. 6 is a schematic diagram of another structure of a device provided by an embodiment of the present application.
  • the device may be the terminal device in the first embodiment, and may be used to implement the access restriction detection method described in the first embodiment.
  • the device includes a processor 61, a memory 62, a transceiver 63 and a bus system 64.
  • the memory 61 includes but is not limited to RAM, ROM, EPROM or CD-ROM, and the memory 61 is used to store related instructions and data.
  • the memory 61 stores the following elements, executable modules or data structures, or their subsets, or their extended sets:
  • Operating instructions including various operating instructions, used to implement various operations.
  • Operating system including various system programs, used to implement various basic services and process hardware-based tasks.
  • the transceiver 63 may be a communication module or a transceiver circuit. In the embodiment of the present application, the transceiver 63 is used to execute the first message receiving process involved in the first embodiment.
  • the processor 61 may be a controller, a CPU, a general-purpose processor, a DSP, an ASIC, an FPGA or other programmable logic devices, transistor logic devices, hardware components, or any combination thereof. It can implement or execute various exemplary logical blocks, modules, and circuits described in conjunction with the disclosure of the embodiments of the present application. As the access restriction detection process involved in the first embodiment.
  • the processor 61 may also be a combination that implements computing functions, for example, includes a combination of one or more microprocessors, a combination of a DSP and a microprocessor, and so on.
  • bus system 64 the various components of the device are coupled together through a bus system 64, where the bus system 64 may include a power bus, a control bus, and a status signal bus in addition to a data bus.
  • bus system 64 may include a power bus, a control bus, and a status signal bus in addition to a data bus.
  • various buses are marked as the bus system 64 in FIG. 6.
  • FIG. 6 is only schematically drawn.
  • the processor in the embodiment of the present application may be an integrated circuit chip with signal processing capability.
  • the steps of the foregoing method embodiments can be completed by hardware integrated logic circuits in the processor or instructions in the form of software.
  • the above-mentioned processor can be a general-purpose processor, a digital signal processor (digital signal processor, DSP), an application specific integrated circuit (ASIC), a ready-made programmable gate array (field programmable gate array, FPGA) or other Programming logic devices, discrete gates or transistor logic devices, discrete hardware components.
  • DSP digital signal processor
  • ASIC application specific integrated circuit
  • FPGA field programmable gate array
  • Programming logic devices discrete gates or transistor logic devices, discrete hardware components.
  • the memory in the embodiment of the present application may be a volatile memory or a non-volatile memory, or may include both volatile and non-volatile memory.
  • the non-volatile memory can be read-only memory (ROM), programmable read-only memory (programmable ROM, PROM), erasable programmable read-only memory (erasable PROM, EPROM), and electronic Erase programmable read-only memory (electrically EPROM, EEPROM) or flash memory.
  • the volatile memory may be random access memory (RAM), which is used as an external cache.
  • RAM random access memory
  • static random access memory static random access memory
  • dynamic RAM dynamic random access memory
  • synchronous dynamic random access memory synchronous DRAM, SDRAM
  • double data rate synchronous dynamic random access memory double data rate SDRAM, DDR SDRAM
  • enhanced synchronous dynamic random access memory enhanced SDRAM, ESDRAM
  • synchronous connection dynamic random access memory direct rambus RAM, DR RAM
  • direct rambus RAM direct rambus RAM
  • the embodiment of the present application also provides a computer-readable medium on which a computer program is stored, and when the computer program is executed by a computer, the method or step executed by the network device in the first embodiment is implemented.
  • the embodiment of the present application also provides a computer program product, which, when executed by a computer, implements the method or step executed by the terminal device in the first embodiment.
  • An embodiment of the present application also provides a device, which may be the terminal device in the first embodiment.
  • the device includes a processor and an interface.
  • the processor is used to execute the method or step executed by the terminal device in the first embodiment.
  • the foregoing terminal device may be a chip, and the foregoing processor may be implemented by hardware or software.
  • the processor When implemented by hardware, the processor may be a logic circuit, an integrated circuit, or the like.
  • the processor When implemented by software, the processor may be a general-purpose processor, which is implemented by reading software codes stored in the memory, and the memory may be integrated in the processor, may be located outside the foregoing processor, and exist independently.
  • the above method embodiments it may be implemented in whole or in part by software, hardware, firmware, or any combination thereof.
  • software it can be implemented in the form of a computer program product in whole or in part.
  • the above-mentioned computer program product includes one or more computer instructions.
  • the foregoing computer instructions are loaded and executed on a computer, the foregoing processes or functions according to the embodiments of the present application are generated in whole or in part.
  • the above-mentioned computer may be a general-purpose computer, a special-purpose computer, a computer network, or other programmable devices.
  • the aforementioned computer instructions can be stored in a computer-readable storage medium, or transmitted from one computer-readable storage medium to another computer-readable storage medium.
  • the aforementioned computer instructions can be transmitted from a website, computer, server, or data center through a wired (Such as coaxial cable, optical fiber, digital subscriber line (digital subscriber Line, DSL) or wireless (such as infrared, wireless, microwave, etc.) transmission to another website site, computer, server or data center.
  • a wired such as coaxial cable, optical fiber, digital subscriber line (digital subscriber Line, DSL) or wireless (such as infrared, wireless, microwave, etc.) transmission to another website site, computer, server or data center.
  • the medium can be any usable medium that can be accessed by a computer or a data storage device such as a server or data center integrated with one or more usable media.
  • the above usable media can be magnetic media (for example, floppy disks, hard disks, tapes), optical media (For example, a high-density digital video disc (digital video disc, DVD), or a semiconductor medium (for example, a solid state disk (SSD), etc.).
  • magnetic media for example, floppy disks, hard disks, tapes
  • optical media for example, a high-density digital video disc (digital video disc, DVD), or a semiconductor medium (for example, a solid state disk (SSD), etc.
  • SSD solid state disk
  • system and “network” in the embodiments of the present application can often be used interchangeably.
  • the term “and/or” in this embodiment is only an association relationship describing the associated objects, indicating that there can be three types of relationships, for example, A and/or B, which can mean that A exists alone, and A and B exist at the same time. There are three cases of B alone.
  • the character "/" in this text generally indicates that the associated objects before and after are in an "or” relationship.
  • the disclosed system, device, and method may be implemented in other ways.
  • the device described above is only illustrative.
  • the division of units is only a logical function division. In actual implementation, there may be other divisions.
  • multiple units or components can be combined or integrated into another. A system or some features can be ignored or not implemented.
  • the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may also be electrical, mechanical or other forms of connection.
  • the functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit.
  • the above-mentioned integrated unit can be implemented in the form of hardware or software functional unit.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

L'invention concerne un procédé et un dispositif de détection de restriction d'accès, capable de résoudre le problème d'un dispositif de terminal incapable de transmettre normalement une détection de restriction d'accès antérieure par l'intermédiaire de petits paquets de données en raison de paramètres de restriction d'accès désadaptés, ce qui permet d'éviter un cas dans lequel le dispositif de terminal doit lancer de manière répétée une détection de restriction d'accès avant la transmission de petits paquets de données. Un dispositif de réseau détermine d'abord au moins un groupe de premiers paramètres de restriction d'accès correspondant à un schéma de transmission de petits paquets de données. Le dispositif de réseau transmet au dispositif de terminal un premier message comprenant le ou les groupes de premiers paramètres de restriction d'accès. L'utilisation du procédé décrit dans les modes de réalisation de la présente invention augmente le taux de réussite d'une détection de restriction d'accès avant la transmission de données effectuée par le dispositif de terminal sur la base d'un schéma de transmission de petits paquets de données, et augmente le taux d'utilisation des ressources pour un réseau de communication radio.
PCT/CN2020/106834 2019-08-07 2020-08-04 Procédé et dispositif de détection de restriction d'accès WO2021023185A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910733373.2 2019-08-07
CN201910733373.2A CN112351470B (zh) 2019-08-07 2019-08-07 一种接入限制检测方法和装置

Publications (1)

Publication Number Publication Date
WO2021023185A1 true WO2021023185A1 (fr) 2021-02-11

Family

ID=74367600

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/106834 WO2021023185A1 (fr) 2019-08-07 2020-08-04 Procédé et dispositif de détection de restriction d'accès

Country Status (2)

Country Link
CN (1) CN112351470B (fr)
WO (1) WO2021023185A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20220039194A1 (en) * 2020-07-31 2022-02-03 Mediatek Singapore Pte. Ltd. Methods and apparatus for data transmission in connectionless way

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2011134329A1 (fr) * 2010-04-26 2011-11-03 中兴通讯股份有限公司 Procédé et système pour transmettre des paquets de données de petite taille
CN106572516A (zh) * 2016-09-28 2017-04-19 华为技术有限公司 一种网络切片选择方法、终端设备及网络设备
CN109151950A (zh) * 2017-06-16 2019-01-04 华为技术有限公司 一种接入控制的方法、网络设备以及终端设备

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102271382B (zh) * 2010-06-07 2014-08-20 电信科学技术研究院 一种mtc设备的接入控制方法和设备
JP2018533324A (ja) * 2015-11-06 2018-11-08 華為技術有限公司Huawei Technologies Co.,Ltd. 情報伝送方法、装置、およびシステム
CN110012557A (zh) * 2018-01-05 2019-07-12 夏普株式会社 无线通信设备和方法
WO2020258191A1 (fr) * 2019-06-27 2020-12-30 Oppo广东移动通信有限公司 Procédé et appareil de contrôle d'accès et terminal

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2011134329A1 (fr) * 2010-04-26 2011-11-03 中兴通讯股份有限公司 Procédé et système pour transmettre des paquets de données de petite taille
CN106572516A (zh) * 2016-09-28 2017-04-19 华为技术有限公司 一种网络切片选择方法、终端设备及网络设备
CN109151950A (zh) * 2017-06-16 2019-01-04 华为技术有限公司 一种接入控制的方法、网络设备以及终端设备

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
ZTE ET AL.: "3GPP TSG RAN Meeting #84 RP-191074", NEW WID ON SMALL DATA TRANSMISSION FOR NR, 6 June 2019 (2019-06-06), XP051739358 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20220039194A1 (en) * 2020-07-31 2022-02-03 Mediatek Singapore Pte. Ltd. Methods and apparatus for data transmission in connectionless way

Also Published As

Publication number Publication date
CN112351470A (zh) 2021-02-09
CN112351470B (zh) 2022-04-05

Similar Documents

Publication Publication Date Title
CN110149732B (zh) 一种通信方法及无线通信装置
US11950245B2 (en) Method and device for cross carrier scheduling physical downlink shared channel
WO2017166221A1 (fr) Procédé, dispositif et système de contrôle d'accès radio
WO2021012996A1 (fr) Procédé et dispositif de transmission d'informations
US11259362B2 (en) Method for repeatedly transmitting data and device
WO2020155076A1 (fr) Procédé de traitement de service, dispositif, puce et programme d'ordinateur
US11432370B2 (en) D2D communication method and terminal device
WO2021087828A1 (fr) Procédé d'activation ou de mise à jour de rs de perte de voie de srs et dispositif
EP4192082A1 (fr) Procédé, appareil et système de communication
US20230032142A1 (en) Information transmission method and device
WO2021016777A1 (fr) Procédé de communication sans fil, dispositif terminal et dispositif de réseau
US11375474B2 (en) Method of sending downlink information, access and mobility management function entity and network function entity
WO2022206315A1 (fr) Procédé et appareil de contrôle d'accès pour tranche de réseau
WO2021092865A1 (fr) Procédé et appareil de contrôle d'accès, et dispositif terminal
WO2020258191A1 (fr) Procédé et appareil de contrôle d'accès et terminal
WO2021023185A1 (fr) Procédé et dispositif de détection de restriction d'accès
CN110545579B (zh) 一种处理方法、网络侧设备及用户设备
WO2023115354A1 (fr) Procédé et appareil de communication
US20220124790A1 (en) Method for data transmission, method for data reception, and device
WO2019076226A1 (fr) Procédé et appareil de transmission de données dans de multiples porteuses
WO2022236835A1 (fr) Procédé et appareil de détermination d'un comportement d'un dispositif terminal, dispositif terminal et dispositif de réseau
CN112217618B (zh) 信息传输方法及装置
CN112217617B (zh) 信息传输方法及装置
WO2020087546A1 (fr) Procédé de transmission et procédé d'obtention d'informations de réseau, dispositif de réseau et dispositif terminal
WO2020103050A1 (fr) Procédé et appareil d'établissement de canal de données et dispositif de réseau

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20850871

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20850871

Country of ref document: EP

Kind code of ref document: A1