WO2021056335A1 - 一种接入控制方法及装置、终端设备、网络设备 - Google Patents
一种接入控制方法及装置、终端设备、网络设备 Download PDFInfo
- Publication number
- WO2021056335A1 WO2021056335A1 PCT/CN2019/108175 CN2019108175W WO2021056335A1 WO 2021056335 A1 WO2021056335 A1 WO 2021056335A1 CN 2019108175 W CN2019108175 W CN 2019108175W WO 2021056335 A1 WO2021056335 A1 WO 2021056335A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- information
- access control
- mbms service
- access
- perform
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/02—Access restriction performed under specific conditions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/06—Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]; Services to user groups; One-way selective calling services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/08—Access restriction or access information delivery, e.g. discovery data delivery
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/08—Access restriction or access information delivery, e.g. discovery data delivery
- H04W48/12—Access restriction or access information delivery, e.g. discovery data delivery using downlink control channel
Definitions
- the embodiments of the present application relate to the field of mobile communication technology, and specifically relate to an access control method and device, terminal equipment, and network equipment.
- a unified access control (UAC) mechanism is introduced in the New Radio (NR) system.
- MBMS Multimedia Broadcast Multicast Service
- RRC Radio Resource Control
- Any terminal device in the Radio Resource Control (RRC) state can receive MBMS services, so terminal devices do not
- RRC Radio Resource Control
- the UAC mechanism designed for the reception of the MBMS service.
- the embodiments of the present application provide an access control method and device, terminal equipment, and network equipment.
- the terminal device receives first configuration information, where the first configuration information includes access control configuration parameters corresponding to the first access category;
- the terminal device executes the access control operation corresponding to the MBMS service according to the access control configuration parameter.
- the terminal device receives first configuration information, where the first configuration information includes at least one access control configuration parameter;
- the terminal determines the attribute information of the first MBMS service, and determines the first access control configuration parameter corresponding to the attribute information of the first MBMS service from the first configuration information, and according to the first access control
- the configuration parameter executes the access control operation corresponding to the first MBMS service.
- the network device sends first configuration information, where the first configuration information includes an access control configuration parameter corresponding to the first access category; the access control configuration parameter is used by the terminal device to perform an access control operation corresponding to the MBMS service.
- the network device sends first configuration information, where the first configuration information includes at least one access control configuration parameter; the at least one access control configuration parameter includes a first access control configuration parameter, and the first access control configuration parameter There is a corresponding relationship with the first attribute information of the first MBMS service, and the first access control configuration parameter is used by the terminal device to perform an access control operation corresponding to the first MBMS service.
- a receiving unit configured to receive first configuration information, where the first configuration information includes access control configuration parameters corresponding to the first access category;
- the processing unit is configured to perform an access control operation corresponding to the MBMS service according to the access control configuration parameter.
- a receiving unit configured to receive first configuration information, where the first configuration information includes at least one access control configuration parameter
- a determining unit configured to determine attribute information of the first MBMS service, and determine, from the first configuration information, a first access control configuration parameter corresponding to the attribute information of the first MBMS service;
- the processing unit is configured to execute an access control operation corresponding to the first MBMS service according to the first access control configuration parameter.
- the sending unit is configured to send first configuration information, where the first configuration information includes access control configuration parameters corresponding to the first access category; the access control configuration parameters are used for terminal equipment to perform access control corresponding to the MBMS service operating.
- the sending unit is configured to send first configuration information, where the first configuration information includes at least one access control configuration parameter; the at least one access control configuration parameter includes a first access control configuration parameter, and the first access
- the control configuration parameter has a corresponding relationship with the first attribute information of the first MBMS service, and the first access control configuration parameter is used by the terminal device to perform an access control operation corresponding to the first MBMS service.
- the terminal device provided in the embodiment of the present application includes a processor and a memory.
- the memory is used to store a computer program
- the processor is used to call and run the computer program stored in the memory to execute the aforementioned access control method.
- the network device provided by the embodiment of the present application includes a processor and a memory.
- the memory is used to store a computer program
- the processor is used to call and run the computer program stored in the memory to execute the aforementioned access control method.
- the chip provided in the embodiment of the present application is used to implement the above-mentioned access control method.
- the chip includes: a processor, configured to call and run a computer program from the memory, so that the device installed with the chip executes the above-mentioned access control method.
- the computer-readable storage medium provided by the embodiment of the present application is used to store a computer program, and the computer program enables a computer to execute the above-mentioned access control method.
- the computer program product provided by the embodiment of the present application includes computer program instructions, and the computer program instructions cause a computer to execute the above-mentioned access control method.
- the computer program provided by the embodiment of the present application when it runs on a computer, causes the computer to execute the above-mentioned access control method.
- the MBMS service is supported in the NR system.
- a solution is proposed, that is, by assigning access categories to the MBMS service, the NR system supports the access control mechanism of the MBMS service.
- FIG. 1 is a schematic diagram of a communication system architecture provided by an embodiment of the present application.
- FIG. 2 is a schematic diagram of UAC-BarringInfoSet provided by an embodiment of the present application
- FIG. 3 is a schematic diagram of a first SIB related configuration provided by an embodiment of the present application.
- FIG. 4 is a schematic diagram of a PTM configuration transmission mechanism provided by an embodiment of the present application.
- Fig. 5 is a PTM channel and its mapping diagram provided by an embodiment of the present application.
- FIG. 6 is a first schematic flowchart of an access control method provided by an embodiment of this application.
- FIG. 7 is a schematic diagram 2 of the flow of an access control method provided by an embodiment of this application.
- FIG. 8 is a schematic diagram 1 of the structural composition of an access control device provided by an embodiment of the application.
- FIG. 9 is a second schematic diagram of the structural composition of an access control apparatus provided by an embodiment of the application.
- FIG. 10 is a third schematic diagram of the structural composition of an access control apparatus provided by an embodiment of this application.
- FIG. 11 is a fourth schematic diagram of the structural composition of an access control apparatus provided by an embodiment of this application.
- FIG. 12 is a schematic structural diagram of a communication device provided by an embodiment of the present application.
- FIG. 13 is a schematic structural diagram of a chip of an embodiment of the present application.
- FIG. 14 is a schematic block diagram of a communication system provided by an embodiment of the present application.
- LTE Long Term Evolution
- FDD Frequency Division Duplex
- TDD Time Division Duplex
- 5G communication system 5G communication system or future communication system.
- the communication system 100 applied in the embodiment of the present application is shown in FIG. 1.
- the communication system 100 may include a network device 110, and the network device 110 may be a device that communicates with a terminal 120 (or called a communication terminal or terminal).
- the network device 110 can provide communication coverage for a specific geographic area, and can communicate with terminals located in the coverage area.
- the network device 110 may be an evolved base station (Evolutional Node B, eNB, or eNodeB) in an LTE system, or a wireless controller in a cloud radio access network (Cloud Radio Access Network, CRAN), or
- the network equipment can be a mobile switching center, a relay station, an access point, an in-vehicle device, a wearable device, a hub, a switch, a bridge, a router, a network side device in a 5G network, or a network device in a future communication system, etc.
- the communication system 100 also includes at least one terminal 120 located within the coverage area of the network device 110.
- the "terminal” used here includes, but is not limited to, connection via a wired line, such as via a public switched telephone network (PSTN), digital subscriber line (Digital Subscriber Line, DSL), digital cable, and direct cable connection; And/or another data connection/network; and/or via a wireless interface, such as for cellular networks, wireless local area networks (WLAN), digital TV networks such as DVB-H networks, satellite networks, AM-FM Broadcast transmitter; and/or another terminal's device configured to receive/send communication signals; and/or Internet of Things (IoT) equipment.
- PSTN public switched telephone network
- DSL Digital Subscriber Line
- DSL Digital Subscriber Line
- DSL Digital Subscriber Line
- DSL Digital Subscriber Line
- DSL Digital Subscriber Line
- DSL Digital Subscriber Line
- DSL Digital Subscriber Line
- DSL Digital Subscriber Line
- DSL Digital Subscriber Line
- DSL Digital Subscriber Line
- a terminal set to communicate through a wireless interface may be referred to as a "wireless communication terminal", a “wireless terminal” or a “mobile terminal”.
- mobile terminals include, but are not limited to, satellite or cellular phones; Personal Communications System (PCS) terminals that can combine cellular radio phones with data processing, fax, and data communication capabilities; can include radio phones, pagers, Internet/intranet PDA with internet access, web browser, memo pad, calendar, and/or Global Positioning System (GPS) receiver; and conventional laptop and/or palmtop receivers or others including radio telephone transceivers Electronic device.
- PCS Personal Communications System
- GPS Global Positioning System
- Terminal can refer to access terminal, user equipment (UE), user unit, user station, mobile station, mobile station, remote station, remote terminal, mobile device, user terminal, terminal, wireless communication equipment, user agent or user Device.
- the access terminal can be a cellular phone, a cordless phone, a Session Initiation Protocol (SIP) phone, a wireless local loop (Wireless Local Loop, WLL) station, a personal digital processing (Personal Digital Assistant, PDA), with wireless communication Functional handheld devices, computing devices or other processing devices connected to wireless modems, in-vehicle devices, wearable devices, terminals in 5G networks, or terminals in the future evolution of PLMN, etc.
- SIP Session Initiation Protocol
- WLL Wireless Local Loop
- PDA Personal Digital Assistant
- direct terminal connection (Device to Device, D2D) communication may be performed between the terminals 120.
- the 5G communication system or 5G network may also be referred to as a New Radio (NR) system or NR network.
- NR New Radio
- FIG. 1 exemplarily shows one network device and two terminals.
- the communication system 100 may include multiple network devices and the coverage of each network device may include other numbers of terminals. This embodiment of the present application There is no restriction on this.
- the communication system 100 may also include other network entities such as a network controller and a mobility management entity, which are not limited in the embodiment of the present application.
- network entities such as a network controller and a mobility management entity, which are not limited in the embodiment of the present application.
- the devices with communication functions in the network/system in the embodiments of the present application may be referred to as communication devices.
- the communication device may include a network device 110 and a terminal 120 with communication functions, and the network device 110 and the terminal 120 may be the specific devices described above, which will not be repeated here; communication
- the device may also include other devices in the communication system 100, such as other network entities such as a network controller and a mobility management entity, which are not limited in the embodiment of the present application.
- 5G Enhanced Mobile Broadband
- URLLC Ultra-Reliable Low-Latency Communications
- mMTC Massive Machine-Type Communications
- eMBB is still targeting users to obtain multimedia content, services and data, and its demand is growing very rapidly.
- eMBB may be deployed in different scenarios, such as indoors, urban areas, rural areas, etc., its capabilities and requirements are also quite different, so it cannot be generalized and must be analyzed in detail in conjunction with specific deployment scenarios.
- Typical applications of URLLC include: industrial automation, power automation, telemedicine operations (surgery), traffic safety protection, etc.
- the typical characteristics of mMTC include: high connection density, small data volume, delay-insensitive services, low cost and long service life of the module.
- 5G defines a new RRC state, that is, the RRC inactive (RRC_INACTIVE) state. This state is different from the RRC idle (RRC_IDLE) state and the RRC active (RRC_ACTIVE) state. among them,
- RRC_IDLE state (abbreviated as idle state): mobility is UE-based cell selection and reselection, paging is initiated by the Core Network (Core Network, CN), and the paging area is configured by the CN. There is no UE context on the base station side, and no RRC connection.
- RRC_CONNECTED state (referred to as connected state for short): There is an RRC connection, and UE context exists on the base station side and the UE side. The network side knows that the location of the UE is of a specific cell level. Mobility is the mobility controlled by the network side. Unicast data can be transmitted between the UE and the base station.
- Mobility is UE-based cell selection and reselection, there is a connection between CN-NR, UE context is stored on a certain base station, and paging is triggered by RAN, based on The paging area of the RAN is managed by the RAN, and the network side knows that the location of the UE is based on the paging area level of the RAN.
- MBMS was introduced in 3GPP Release 6 (Release 6, R6).
- MBMS is a technology that transmits data from one data source to multiple UEs by sharing network resources. This technology can effectively utilize network resources while providing multimedia services. Realize the broadcast and multicast of multimedia services at a higher rate (such as 256kbps).
- 3GPP Due to the low spectrum efficiency of MBMS in 3GPP R6, it is not sufficient to effectively carry and support the operation of mobile TV-type services. Therefore, in LTE, 3GPP clearly proposed to enhance the ability to support downlink high-speed MBMS services, and determined the design requirements for the physical layer and air interface.
- eMBMS evolved MBMS
- SFN Single Frequency Network
- MBSFN Multimedia Broadcast Multicast Service Single Frequency Network
- MBSFN uses a unified frequency to send service data in all cells at the same time, but To ensure synchronization between the cells. This method can greatly improve the overall signal-to-noise ratio distribution of the cell, and the spectrum efficiency will be greatly improved accordingly.
- eMBMS realizes the broadcast and multicast of services based on the IP multicast protocol.
- MBMS has only a broadcast bearer mode, and no multicast bearer mode.
- reception of MBMS services is suitable for UEs in idle state or connected state.
- 3GPP R13 introduced the single cell point to multipoint (Single Cell Point To Multiploint, SC-PTM) concept, and SC-PTM is based on the MBMS network architecture.
- SC-PTM Single Cell Point To Multiploint
- SC-MCCH Single Cell-Multicast Control Channel
- SC-MTCH Single Cell-Multicast Transport Channel
- SC-MCCH and SC-MTCH are mapped to downlink shared channel (Downlink-Shared Channel, DL-SCH), and further, DL-SCH is mapped to physical downlink shared channel (Physical Downlink Shared Channel, PDSCH), where SC -MCCH and SC-MTCH belong to logical channels, DL-SCH belongs to transport channels, and PDSCH belongs to physical channels.
- SC-MCCH and SC-MTCH do not support Hybrid Automatic Repeat reQuest (HARQ) operations.
- HARQ Hybrid Automatic Repeat reQuest
- the MBMS introduces a new system information block (System Information Block, SIB) type, namely SIB20.
- SIB System Information Block
- the configuration information of the SC-MCCH includes: the modification period of the SC-MCCH, the repetition period of the SC-MCCH, and information such as radio frames and subframes for scheduling the SC-MCCH.
- SFN represents the system frame number of the radio frame
- mcch-RepetitionPeriod represents the repetition period of SC-MCCH
- mcch-Offset represents SC-MCCH The offset.
- the subframe for scheduling SC-MCCH is indicated by sc-mcch-Subframe.
- the SC-MCCH is scheduled through the Physical Downlink Control Channel (PDCCH).
- a new radio network temporary identity Radio Network Tempory Identity, RNTI
- SC-RNTI Single Cell RNTI
- SC-N-RNTI Single Cell Notification RNTI
- the SC -N-RNTI has a fixed value of FFFB; further, one of the 8 bits of DCI 1C can be used to indicate the change notification.
- the configuration information of the SC-PTM is based on the SC-MCCH configured by the SIB20, and then the SC-MCCH is configured with the SC-MTCH, and the SC-MTCH is used to transmit service data.
- the SC-MCCH only transmits one message (that is, SCPTMConfiguration), which is used to configure the configuration information of the SC-PTM.
- the configuration information of SC-PTM includes: Temporary Mobile Group Identity (TMGI), Session Identifier (seession id), Group RNTI (Group RNTI, G-RNTI), Discontinuous Reception (DRX) configuration information And the SC-PTM business information of the neighboring cell, etc.
- TMGI Temporary Mobile Group Identity
- Session Identifier seession id
- Group RNTI Group RNTI
- G-RNTI Group RNTI
- DRX Discontinuous Reception
- the SC-PTM business information of the neighboring cell etc.
- ROHC Robust Header Compression
- the downlink discontinuous reception of SC-PTM is controlled by the following parameters: onDurationTimerSCPTM, drx-InactivityTimerSCPTM, SC-MTCH-SchedulingCycle, and SC-MTCH-SchedulingOffset.
- SC-PTM service continuity adopts the concept of MBMS service continuity based on SIB15, namely "SIB15+MBMSInterestIndication" mode.
- the service continuity of the UE in the idle state is based on the concept of frequency priority.
- the UAC mechanism For load control on the network side, the UAC mechanism is introduced in NR.
- an access category (Access Category) and an access identity (Access identity) are defined. Its meaning is shown in Table 1 and Table 2 below.
- the access network element (such as the base station) broadcasts the access control information related to the access category and access identifier, and the access stratum (Access Stratum, AS) of the UE is based on the access control information and the AS layer or non-access layer (Non Access Stratum, NAS) provides access category and access identifier to perform access control operations (ie ACB checking).
- the access control information broadcast by the access network elements includes UAC parameters.
- UAC parameters are based on the access category as the granularity (per access category) and/or the public land mobile network (Public Land Mobile Network, PLMN) as the granularity (per PLMN). ) For configuration.
- the UAC parameter is specifically UAC-BarringInfoSet.
- the network side can configure up to 8 UAC-BarringInfoSet, each access category is associated with a UAC-BarringInfoSet, a total of 64 access categories (access category 0 does not need to be configured) .
- Each PLMN can also be associated with one UAC-BarringPerCatList. Further, if the per PLMN information is not configured, the above configuration is applicable to all PLMNs.
- auxiliary information For access category 1, configure an auxiliary information to assist in determining whether an access control operation (that is, ACB checking) is used for access category 1, and the auxiliary information is uac-AccessCategory1-SelectionAssistanceInfo.
- ⁇ UAC mechanism access control operation (ie ACB checking)
- the access control operation is performed based on UAC parameters (that is, UAC-BarringInfoSet), and the specific content of UAC-BarringInfoSet is shown in Figure 2.
- UAC-BarringInfoSet that is, UAC-BarringInfoSet
- Figure 2 the specific content of UAC-BarringInfoSet is shown in Figure 2.
- step 1) If the bit corresponding to the access identifier in uac-BarringForAccessIdentity is set to 0, it means that access is allowed. If the corresponding bit is set to 1, then the following step 2) needs to be further judged;
- the NAS layer determines the access identifier, access category, and access reason (or called cause value).
- the NAS layer provides the access identifier and access category to the AS layer, and the AS layer is responsible for performing access control operations. If access is allowed, the AS layer informs the NAS layer, and the NAS layer provides the reason for the access to the AS layer. Based on the feedback of the access control operation of the AS layer, the NAS layer is responsible for stopping or allowing service transmission.
- Events triggered by the AS layer include events triggered by paging or events triggered by RAN Notification Area Update (RNAU). Among them,
- the access category is access category 0, which is not controlled by access control operations.
- the cause value is overwritten, the NAS layer and the AS layer interact, and the NAS layer provides the cause value.
- the access category is access category 8.
- the access identifier needs to be provided by the NAS layer to the AS layer, and the information exchange between the NAS layer and the AS layer belongs to the UE's implementation behavior.
- the reason value is determined by the AS layer as rna-Update.
- MBMS services also known as broadcast services or multicast services
- Any terminal device in the RRC state can receive MBMS services. Therefore, terminal devices do not need to enter the connected state for receiving MBMS services, so there is no feedback mechanism.
- some scenarios have high requirements for the reliability of MBMS services, requiring members in multicast to receive MBMS services. Therefore, members in multicast are required to feed back the reception of MBMS services. It can be seen that for some MBMS services Although it is also the sending method of MBMS service, the terminal device may be required to enter the connected state to receive the MBMS service in order to feed back the reception status of the MBMS service. In this case, the access control mechanism for entering the connected state for MBMS service reception needs to be clarified. To this end, the following technical solutions of the embodiments of the present application are proposed.
- the first SIB includes the configuration information of the first MCCH.
- the first MCCH is the control channel of the MBMS service.
- the first SIB is used to configure configuration information of the control channel of NR MBMS.
- the control channel of NR MBMS may also be called NR MCCH (that is, the first MCCH).
- the first MCCH is used to carry the first signaling.
- the embodiment of this application does not limit the name of the first signaling.
- the first signaling is signaling A
- the first signaling includes at least one first MTCH.
- the first MTCH is a service channel of the MBMS service (also referred to as a data channel or a transmission channel), and the first MTCH is used to transmit MBMS service data (such as NR MBMS service data).
- the first MCCH is used to configure the configuration information of the NR MBMS traffic channel.
- the NR MBMS traffic channel may also be called NR MTCH (that is, the first MTCH).
- the first signaling is used to configure a NR MBMS service channel, service information corresponding to the service channel, and scheduling information corresponding to the service channel.
- the service information corresponding to the service channel for example, TMGI, session id, and other identification information identifying the service.
- the scheduling information corresponding to the traffic channel for example, the RNTI used when the MBMS service data corresponding to the traffic channel is scheduled, such as G-RNTI, DRX configuration information, etc.
- the transmission of the first MCCH and the first MTCH is scheduled based on the PDCCH.
- the RNTI used for scheduling the PDCCH of the first MCCH uses a unique identifier of the entire network, that is, a fixed value.
- the RNTI used by the PDCCH for scheduling the first MTCH is configured through the first MCCH.
- the first MCCH also carries at least one of the following: first indication information, the first indication information being used to indicate whether the MBMS service (corresponding to the TMGI and/or the session identifier) requires HARQ feedback; and the second indication information, so The second indication information is used to indicate the number of members in the multicast group corresponding to the MBMS service; and the third indication information is used to indicate whether the terminal device needs to enter the connected state to receive the MBMS service.
- the network device assigns a member index number to the terminal device registered with the MBMS service.
- the embodiment of the present application does not impose restrictions on the naming of the first SIB, the first MCCH, and the first MTCH.
- the first SIB may also be abbreviated as SIB
- the first MCCH may also be abbreviated as MCCH
- the first MTCH may also be abbreviated as MTCH.
- the PDCCH used to schedule the MCCH is configured through the SIB. (Ie MCCH PDCCH) and notification PDCCH, wherein the DCI carried by MCCH PDCCH is used to schedule the PDSCH (ie MCCH PDSCH) used to transmit the MCCH.
- M PDCCHs (that is, MTCH 1 PDCCH, MTCH 2 PDCCH, ..., MTCH M PDCCH) are configured through the MCCH, where the DCI carried by the MTCH n PDCCH schedules the PDSCH used to transmit the MTCH n (that is, the MTCH n PDSCH), n is an integer greater than or equal to 1 and less than or equal to M.
- MCCH and MTCH are mapped to DL-SCH, and further, DL-SCH is mapped to PDSCH, where MCCH and MTCH belong to logical channels, DL-SCH belongs to transport channels, and PDSCH belongs to physical channels.
- Fig. 6 is a schematic flow chart 1 of the access control method provided by an embodiment of the application. As shown in Fig. 6, the access control method includes the following steps:
- Step 601 The terminal device receives first configuration information, where the first configuration information includes access control configuration parameters corresponding to the first access category.
- the MBMS service generally refers to any kind of MBMS service. It should be noted that the description of "MBMS service” in the embodiments of this application can also be replaced with “broadcast service” or “multicast service”.
- an access category is allocated (or defined) for the MBMS service, which is referred to as the first access category.
- the first access category is for all MBMS services, that is, multiple MBMS services correspond to the first access category, for example: MBMS service 1, MBMS service 2, ..., MBMS service n
- the access categories are all the first access category.
- the network device sends the first configuration information, and the terminal device receives the first configuration information, and the first configuration information includes the access control configuration parameters corresponding to the first access category.
- the network device may be a base station, such as a gNB.
- access control configuration parameters in the embodiments of the present application can also be replaced with “access control parameter set” or "UAC-BarringInfoSet”.
- the access control configuration parameter includes at least one of the following:
- First information where the first information is used to determine an access identifier that is allowed to access and/or an access identifier that is forbidden to access;
- the second information is used to determine the barring factor (BarringFactor);
- the third information is used to determine the barring time (BarringTime).
- the first information is uac-BarringForAccessIdentity
- the second information is uac-BarringFactor
- the third information is uac-BarringTime.
- the first configuration information is configured through the first SIB or the first MCCH.
- the first SIB and the first MCCH can be understood with reference to the related description in the foregoing solution.
- the network device ie, the base station
- Step 602 The terminal device performs an access control operation corresponding to the MBMS service according to the access control configuration parameter.
- the access control configuration parameter is used for the terminal device to execute the access control operation corresponding to the MBMS service.
- the NAS layer of the terminal device sends fourth indication information to the AS layer of the terminal device, where the fourth indication information is used to indicate at least one of the following: the first access category corresponding to the MBMS service, The first access identifier corresponding to the MBMS service, the service identifier corresponding to the MBMS service, the identity information of the member corresponding to the MBMS service, the identification information of the member corresponding to the MBMS service; the AS layer of the terminal device Determine whether to perform the access control operation corresponding to the MBMS service according to the fourth instruction information; if it is determined to perform the access control operation corresponding to the MBMS service, perform the MBMS service corresponding to the access control configuration parameters Access control operations.
- the UE NAS layer (that is, the NAS layer of the terminal device) submits the first access category corresponding to the MBMS service and/or the first access corresponding to the MBMS service
- the incoming ID is given to the UE AS layer (that is, the AS layer of the terminal device), and the UE AS layer is based on the first access category and/or the first access ID submitted by the UE NAS layer, and the access control configuration corresponding to the first access category
- the parameters perform the following access decision process:
- the terminal device judges whether to perform or needs to perform an access control operation (that is, the UAC process) according to the first access identifier, and if the access control operation needs to be performed, it generates a first random number; And the second information determines that access is prohibited, then a second random number is generated; a first timer is started according to the second random number and the third information, and the first timer is used to restrict access to the MBMS service .
- an access control operation that is, the UAC process
- the terminal device determines whether to perform or needs to perform an access control operation according to the first access identifier and the first information (i.e. uac-BarringForAccessIdentity). If the access control operation needs to be performed, then: generate a first random number (denoted by As rand1), the range of rand1 is 0 ⁇ rand ⁇ 1. If rand1 is lower than the second information (i.e. uac-BarringFactor), it means that access is allowed, otherwise it means that access is forbidden.
- the first information i.e. uac-BarringForAccessIdentity
- the access control configuration parameters also include first indication information, and the first indication information is used to indicate at least one of the following: access control is performed or needs to be performed Operational MBMS service; MBMS service that does not perform or does not need to perform access control operations.
- the terminal device can determine whether a certain MBMS service is executed or needs to execute an access control operation (that is, a UAC process) according to the first indication information.
- the first indication information includes a first bitmap (bitmap), and each bit in the first bitmap corresponds to an MBMS service (or an MBMS service identifier), and the The value of the bit is used to indicate whether the MBMS service corresponding to the bit is executed or an access control operation needs to be executed.
- bitmap a bit in the first bitmap is set to 1 (or 0), which means that the MBMS service corresponding to the bit needs to perform access control operations
- a bit in the first bitmap is set to 0 (or 1).
- Indicates that the MBMS service corresponding to this bit does not need to perform an access control operation.
- the configuration information of the MBMS service carries second indication information, and the second indication information is used to indicate whether the MBMS service is executed or needs to execute an access control operation.
- the configuration information of each MBMS service is associated with an indication information (that is, the second indication information), and the value of the second indication information is used to indicate whether the MBMS service is executed Or need to perform access control operations.
- the value of the second indication information is 0 (or 1) indicating that the MBMS service needs to perform access control operations
- the value of the second indication information is 1 (or 0) indicating that the MBMS service does not need to perform access control. operating.
- the access control configuration parameters also include third indication information, and the third indication information is used to indicate at least one of the following: access control is performed or needs to be performed Operating members; members that do not perform or do not need to perform access control operations; wherein, the members refer to members that receive MBMS services.
- the third indication information includes at least one of the following: identity information and/or identification information of at least one first member, and the first member is a member that needs to perform an access control operation; at least Identity information and/or identification information of a second member, where the second member is a member that does not need to perform an access control operation.
- first member and/or second member indication refers to a member who receives the MBMS service.
- the terminal device After the terminal device receives the first configuration information, if the MBMS service needs to enter the connected state, the UE NAS layer (that is, the NAS layer of the terminal device) submits the first access category corresponding to the MBMS service and/or the first access category corresponding to the MBMS service.
- the UE NAS layer that is, the NAS layer of the terminal device
- the access identifier, and/or the service identifier corresponding to the MBMS service, and/or the identity information of the member corresponding to the MBMS service, and/or the identification information of the member corresponding to the MBMS service are provided to the UE AS layer (that is, the AS layer of the terminal device),
- And/or the identification information of the member corresponding to the MBMS service, and the access control configuration parameters corresponding to the first access category perform the following access decision process:
- the terminal device judges according to the first access identifier corresponding to the MBMS service, and/or the service identifier corresponding to the MBMS service, and/or the identity information of the member corresponding to the MBMS service, and/or the identifier information of the member corresponding to the MBMS service Whether an access control operation (ie UAC process) needs to be performed, if an access control operation needs to be performed, then: generate a first random number; if it is determined that access is prohibited according to the first random number and the second information, then generate A second random number; a first timer is started according to the second random number and the third information, and the first timer is used to restrict access to the MBMS service.
- an access control operation ie UAC process
- rand1 is lower than the second information (i.e. uac-BarringFactor)
- rand2 i.e. uac-BarringFactor
- the service identification corresponding to the above-mentioned MBMS service, and/or the identity information of the member corresponding to the MBMS service, and/or the identification information of the member corresponding to the MBMS service may also be obtained by the terminal device itself.
- the terminal device determines whether to perform the access control operation corresponding to the MBMS service based on the fourth information; if it is determined to perform the access control operation corresponding to the MBMS service, it executes the MBMS service corresponding to the access control configuration parameters. Access control operation.
- the fourth information is carried in the system broadcast message sent by the first cell, and the fourth information is used to indicate whether the terminal device receives the MBMS service sent by the first cell to execute or perform access Control operation.
- the first cell may be a cell that sends the MBMS service, and the first cell sends fourth information through a system broadcast message, and the fourth information indicates whether the terminal device receives the MBMS service or needs to perform an access control operation (that is, the UAC process) . If the fourth information indicates that the access control operation needs to be performed, the terminal device performs access according to the first access category and/or the first access identifier provided by the NAS layer, and the access control configuration parameters carried in the first configuration information Control operation; if the fourth information indicates that no access control operation needs to be performed, the terminal device does not perform the access control operation.
- the fourth information is based on a cell granularity (per cell), that is, whether an access control operation is performed or needs to be performed indicated by the fourth information is specific to the cell.
- the fourth information is predefined information, and the fourth information defines that the MBMS service corresponding to the first access category does not perform an access control operation.
- the terminal device will not perform the access control operation corresponding to the MBMS service.
- FIG. 7 is a schematic diagram 2 of the flow of an access control method provided by an embodiment of the application. As shown in FIG. 7, the access control method includes the following steps:
- Step 701 The terminal device receives first configuration information, where the first configuration information includes at least one access control configuration parameter.
- the network device sends the first configuration information, and the terminal device receives the first configuration information, and the first configuration information includes at least one access control configuration parameter.
- the network device may be a base station, such as a gNB.
- access control configuration parameters in the embodiments of the present application can also be replaced with “access control parameter set” or "UAC-BarringInfoSet”.
- the access control configuration parameter includes at least one of the following:
- First information where the first information is used to determine an access identifier that is allowed to access and/or an access identifier that is forbidden to access;
- Second information where the second information is used to determine the limiting factor
- the third information, the third information is used to determine the limited duration.
- the first information is uac-BarringForAccessIdentity
- the second information is uac-BarringFactor
- the third information is uac-BarringTime.
- the first configuration information is configured through the first SIB or the first MCCH.
- the first SIB and the first MCCH can be understood with reference to the related description in the foregoing solution.
- the network device ie, base station
- Step 702 The terminal determines the attribute information of the first MBMS service, and determines the first access control configuration parameter corresponding to the attribute information of the first MBMS service from the first configuration information, and according to the first configuration information
- the access control configuration parameter executes the access control operation corresponding to the first MBMS service.
- the at least one access control configuration parameter includes a first access control configuration parameter, and the first access control configuration parameter has a corresponding relationship with the first attribute information of the first MBMS service.
- An access control configuration parameter is used for the terminal device to execute the access control operation corresponding to the first MBMS service.
- the attribute information includes at least one of the following: the access category corresponding to the MBMS service, the service identifier corresponding to the MBMS service, the identity information of the member corresponding to the MBMS service, and the identification information of the member corresponding to the MBMS service .
- the NAS layer of the terminal device sends fifth indication information (used to indicate attribute information) to the AS layer of the terminal device, and the fifth indication information is used to indicate at least one of the following: The first access category corresponding to the first MBMS service, the first access identifier corresponding to the first MBMS service, the service identifier corresponding to the first MBMS service, the identity information of the member corresponding to the first MBMS service, The identification information of the member corresponding to the first MBMS service; the AS layer of the terminal device determines the first access control configuration parameter from the first configuration information according to the fifth indication information; according to the first MBMS The first access identifier corresponding to the service determines whether to perform the access control operation corresponding to the first MBMS service; if it is determined to perform the access control operation corresponding to the first MBMS service, execute it according to the access control configuration parameters The access control operation corresponding to the first MBMS service.
- the first access identifier corresponding to the service determines whether to perform the access control operation corresponding
- Each MBMS service is assigned an access category, that is, the service identifier of each MBMS service is associated with an access category.
- different MBMS services correspond to different access categories. For example: MBMS service 1 corresponds to access category 1, MBMS service 2 corresponds to access category 2,..., MBMS service n corresponds to access category n.
- the UE NAS layer (that is, the NAS layer of the terminal device) submits the first access category and/or the first access identifier corresponding to the first MBMS service
- the UE AS layer determines the first access control configuration parameter from the first configuration information according to the first access category submitted by the UE NAS layer; according to the first access
- the access identifier and the first access control configuration parameter corresponding to the first access category execute the following access decision process:
- the terminal device judges whether to perform or needs to perform an access control operation (that is, the UAC process) according to the first access identifier, and if the access control operation needs to be performed, it generates a first random number; And the second information determines that access is prohibited, then a second random number is generated; a first timer is started according to the second random number and the third information, and the first timer is used to restrict access to the MBMS service .
- an access control operation that is, the UAC process
- the terminal device determines whether to perform or needs to perform an access control operation according to the first access identifier and the first information (i.e. uac-BarringForAccessIdentity). If the access control operation needs to be performed, then: generate a first random number (denoted by As rand1), the range of rand1 is 0 ⁇ rand ⁇ 1. If rand1 is lower than the second information (i.e. uac-BarringFactor), it means that access is allowed, otherwise it means that access is forbidden.
- the first information i.e. uac-BarringForAccessIdentity
- different access control configuration parameters correspond to different attribute information.
- the attribute information includes at least one of the following: the access category corresponding to the MBMS service, the service identification corresponding to the MBMS service, the identity information of the member corresponding to the MBMS service, and the identification information of the member corresponding to the MBMS service.
- each access control configuration parameter is associated with an attribute information
- the attribute information includes: the access category corresponding to the MBMS service, and/or the service identifier corresponding to the MBMS service, and/or the identity information of the member corresponding to the MBMS service , And/or the identification information of the member corresponding to the MBMS service. That is to say, different attribute information corresponds to different access control configuration parameters.
- the terminal device After the terminal device receives the first configuration information, if it is an MBMS service that needs to enter the connected state, the UE NAS layer (that is, the NAS layer of the terminal device) submits the first access category and/or first access corresponding to the first MBMS service
- the identification, and/or service identification, and/or the identity information of the member, and/or the identification information of the member are sent to the UE AS layer (that is, the AS layer of the terminal device), and the UE AS layer is based on the first access category submitted by the UE NAS layer , And/or service identification, and/or member identification information, and/or member identification information to determine the first access control configuration parameter from the first configuration information; according to the first access identification and the first
- the access control configuration parameters perform the following access decision process:
- the terminal device judges whether to perform or needs to perform an access control operation (that is, the UAC process) according to the first access identifier, and if the access control operation needs to be performed, it generates a first random number; And the second information determines that access is prohibited, then a second random number is generated; a first timer is started according to the second random number and the third information, and the first timer is used to restrict access to the MBMS service .
- an access control operation that is, the UAC process
- the terminal device determines whether to perform or needs to perform an access control operation according to the first access identifier and the first information (i.e. uac-BarringForAccessIdentity). If the access control operation needs to be performed, then: generate a first random number (denoted by As rand1), the range of rand1 is 0 ⁇ rand ⁇ 1. If rand1 is lower than the second information (i.e. uac-BarringFactor), it means that access is allowed, otherwise it means that access is forbidden.
- the first information i.e. uac-BarringForAccessIdentity
- the service identification corresponding to the above-mentioned MBMS service, and/or the identity information of the member corresponding to the MBMS service, and/or the identification information of the member corresponding to the MBMS service may also be obtained by the terminal device itself.
- the above solution can be used for terminal devices in an idle state, a connected state, or an inactive state.
- FIG. 8 is a schematic diagram 1 of the structural composition of an access control apparatus provided by an embodiment of the application, which is applied to a terminal device. As shown in FIG. 8, the access control apparatus includes:
- the receiving unit 801 is configured to receive first configuration information, where the first configuration information includes access control configuration parameters corresponding to the first access category;
- the processing unit 802 is configured to perform an access control operation corresponding to the MBMS service according to the access control configuration parameter.
- the access control configuration parameter includes at least one of the following:
- First information where the first information is used to determine an access identifier that is allowed to access and/or an access identifier that is forbidden to access;
- Second information where the second information is used to determine the limiting factor
- the third information, the third information is used to determine the limited duration.
- the access control configuration parameter further includes first indication information, and the first indication information is used to indicate at least one of the following:
- MBMS services that do not perform or do not need to perform access control operations.
- the first indication information includes a first bitmap, each bit in the first bitmap corresponds to an MBMS service, and the value of the bit is used to indicate the bit Whether the corresponding MBMS service is executed or needs to execute an access control operation.
- the configuration information of the MBMS service carries second indication information, and the second indication information is used to indicate whether the MBMS service is executed or needs to execute an access control operation.
- the access control configuration parameter further includes third indication information, and the third indication information is used to indicate at least one of the following:
- the member refers to the member who receives the MBMS service.
- the third indication information includes at least one of the following:
- Identity information and/or identification information of at least one first member where the first member is a member that needs to perform an access control operation;
- Identity information and/or identification information of at least one second member where the second member is a member that does not need to perform an access control operation.
- the processing unit 802 is configured to send fourth indication information to the AS layer through the NAS layer, and the fourth indication information is used to indicate at least one of the following: the first corresponding to the MBMS service Access category, the first access identifier corresponding to the MBMS service, the service identifier corresponding to the MBMS service, the identity information of the member corresponding to the MBMS service, and the identification information of the member corresponding to the MBMS service; through the AS layer Determine whether to perform the access control operation corresponding to the MBMS service according to the fourth indication information; if it is determined to perform the access control operation corresponding to the MBMS service, perform the MBMS service corresponding to the access control configuration parameters Access control operations.
- the processing unit 802 is configured to determine whether to perform the access control operation corresponding to the MBMS service based on the fourth information; if it is determined to perform the access control operation corresponding to the MBMS service, perform the access control operation corresponding to the MBMS service according to The access control configuration parameter executes the access control operation corresponding to the MBMS service.
- the fourth information is carried in a system broadcast message sent by the first cell, and the fourth information is used to indicate whether the terminal device receives the MBMS service sent by the first cell or not. Need to perform access control operations.
- the fourth information is predefined information, and the fourth information defines that the MBMS service corresponding to the first access category does not perform an access control operation.
- the processing unit 802 is configured to generate a first random number; if it is determined that access is prohibited according to the first random number and the second information, a second random number is generated; The second random number and the third information start a first timer, and the first timer is used to restrict access to the MBMS service.
- the first configuration information is configured through the first SIB or the first MCCH.
- Fig. 9 is a schematic diagram 2 of the structural composition of the access control apparatus provided by an embodiment of the application, which is applied to terminal equipment. As shown in Fig. 9, the access control apparatus includes:
- the receiving unit 901 is configured to receive first configuration information, where the first configuration information includes at least one access control configuration parameter;
- the determining unit 902 is configured to determine the attribute information of the first MBMS service, and determine the first access control configuration parameter corresponding to the attribute information of the first MBMS service from the first configuration information;
- the processing unit 903 is configured to perform an access control operation corresponding to the first MBMS service according to the first access control configuration parameter.
- the attribute information includes at least one of the following:
- the access category corresponding to the MBMS service The access category corresponding to the MBMS service, the service identifier corresponding to the MBMS service, the identity information of the member corresponding to the MBMS service, and the identification information of the member corresponding to the MBMS service.
- different access control configuration parameters correspond to different attribute information.
- different MBMS services correspond to different access categories.
- the access control configuration parameter includes at least one of the following:
- First information where the first information is used to determine an access identifier that is allowed to access and/or an access identifier that is forbidden to access;
- Second information where the second information is used to determine the limiting factor
- the third information, the third information is used to determine the limited duration.
- the determining unit 902 is configured to send fifth indication information to the AS layer through the NAS layer, and the fifth indication information is used to indicate at least one of the following: The first access category, the first access identifier corresponding to the first MBMS service, the service identifier corresponding to the first MBMS service, the identity information of the member corresponding to the first MBMS service, the first MBMS service Identification information of the corresponding member; determining the first access control configuration parameter from the first configuration information according to the fifth indication information through the AS layer;
- the processing unit 903 is configured to determine whether to perform the access control operation corresponding to the first MBMS service according to the first access identifier corresponding to the first MBMS service through the AS layer; if it is determined to perform the first MBMS service For the corresponding access control operation, the access control operation corresponding to the first MBMS service is executed according to the access control configuration parameter.
- the processing unit 903 is configured to generate a first random number; if it is determined to be prohibited according to the first random number and the second information, generate a second random number; The second random number and the third information start a first timer, and the first timer is used to restrict access to the first MBMS service.
- the first configuration information is configured through the first SIB or the first MCCH.
- FIG. 10 is a schematic diagram of the third structural composition of the access control device provided by an embodiment of the application, which is applied to a network device (such as a base station). As shown in FIG. 10, the access control device includes:
- the sending unit 1001 is configured to send first configuration information, where the first configuration information includes access control configuration parameters corresponding to the first access category; the access control configuration parameters are used by the terminal device to perform the access corresponding to the MBMS service Control operation.
- the access control configuration parameter includes at least one of the following:
- First information where the first information is used to determine an access identifier that is allowed to access and/or an access identifier that is forbidden to access;
- Second information where the second information is used to determine the limiting factor
- the third information, the third information is used to determine the limited duration.
- the access control configuration parameter further includes first indication information, and the first indication information is used to indicate at least one of the following:
- MBMS services that do not perform or do not need to perform access control operations.
- the first indication information includes a first bitmap, each bit in the first bitmap corresponds to an MBMS service, and the value of the bit is used to indicate the bit Whether the corresponding MBMS service is executed or needs to execute an access control operation.
- the configuration information of the MBMS service carries second indication information, and the second indication information is used to indicate whether the MBMS service is executed or needs to execute an access control operation.
- the access control configuration parameter further includes third indication information, and the third indication information is used to indicate at least one of the following:
- the member refers to the member who receives the MBMS service.
- the third indication information includes at least one of the following:
- Identity information and/or identification information of at least one first member where the first member is a member that needs to perform an access control operation;
- Identity information and/or identification information of at least one second member where the second member is a member that does not need to perform an access control operation.
- the first configuration information is configured through the first SIB or the first MCCH.
- FIG. 11 is a schematic diagram 4 of the structural composition of an access control device provided by an embodiment of the application, which is applied to a network device (such as a base station). As shown in FIG. 11, the access control device includes:
- the sending unit 1101 is configured to send first configuration information, where the first configuration information includes at least one access control configuration parameter; the at least one access control configuration parameter includes a first access control configuration parameter, and the first access
- the access control configuration parameter has a corresponding relationship with the first attribute information of the first MBMS service, and the first access control configuration parameter is used for the terminal device to execute the access control operation corresponding to the first MBMS service.
- the attribute information includes at least one of the following:
- the access category corresponding to the MBMS service The access category corresponding to the MBMS service, the service identifier corresponding to the MBMS service, the identity information of the member corresponding to the MBMS service, and the identification information of the member corresponding to the MBMS service.
- different access control configuration parameters correspond to different attribute information.
- different MBMS services correspond to different access categories.
- the access control configuration parameter includes at least one of the following:
- First information where the first information is used to determine an access identifier that is allowed to access and/or an access identifier that is forbidden to access;
- Second information where the second information is used to determine the limiting factor
- the third information, the third information is used to determine the limited duration.
- the first configuration information is configured through the first SIB or the first MCCH.
- FIG. 12 is a schematic structural diagram of a communication device 1200 according to an embodiment of the present application.
- the communication device may be a terminal device or a network device.
- the communication device 1200 shown in FIG. 12 includes a processor 1210, and the processor 1210 can call and run a computer program from a memory to implement the method in the embodiment of the present application.
- the communication device 1200 may further include a memory 1220.
- the processor 1210 can call and run a computer program from the memory 1220 to implement the method in the embodiment of the present application.
- the memory 1220 may be a separate device independent of the processor 1210, or may be integrated in the processor 1210.
- the communication device 1200 may further include a transceiver 1230, and the processor 1210 may control the transceiver 1230 to communicate with other devices. Specifically, it may send information or data to other devices, or receive other devices. Information or data sent by the device.
- the transceiver 1230 may include a transmitter and a receiver.
- the transceiver 1230 may further include an antenna, and the number of antennas may be one or more.
- the communication device 1200 may specifically be a network device of an embodiment of the present application, and the communication device 1200 may implement the corresponding process implemented by the network device in each method of the embodiment of the present application. For brevity, details are not repeated here. .
- the communication device 1200 may specifically be a mobile terminal/terminal device of an embodiment of the present application, and the communication device 1200 may implement the corresponding process implemented by the mobile terminal/terminal device in each method of the embodiment of the present application.
- I won’t repeat it here.
- FIG. 13 is a schematic structural diagram of a chip of an embodiment of the present application.
- the chip 1300 shown in FIG. 13 includes a processor 1310, and the processor 1310 can call and run a computer program from the memory to implement the method in the embodiment of the present application.
- the chip 1300 may further include a memory 1320.
- the processor 1310 may call and run a computer program from the memory 1320 to implement the method in the embodiment of the present application.
- the memory 1320 may be a separate device independent of the processor 1310, or may be integrated in the processor 1310.
- the chip 1300 may further include an input interface 1330.
- the processor 1310 can control the input interface 1330 to communicate with other devices or chips, and specifically, can obtain information or data sent by other devices or chips.
- the chip 1300 may further include an output interface 1340.
- the processor 1310 can control the output interface 1340 to communicate with other devices or chips, and specifically, can output information or data to other devices or chips.
- the chip can be applied to the network device in the embodiment of the present application, and the chip can implement the corresponding process implemented by the network device in each method of the embodiment of the present application.
- the chip can implement the corresponding process implemented by the network device in each method of the embodiment of the present application.
- the chip can be applied to the mobile terminal/terminal device in the embodiment of the present application, and the chip can implement the corresponding process implemented by the mobile terminal/terminal device in each method of the embodiment of the present application.
- the chip can implement the corresponding process implemented by the mobile terminal/terminal device in each method of the embodiment of the present application.
- the chip can implement the corresponding process implemented by the mobile terminal/terminal device in each method of the embodiment of the present application.
- the chip mentioned in the embodiment of the present application may also be referred to as a system-level chip, a system-on-chip, a system-on-chip, or a system-on-chip, etc.
- FIG. 14 is a schematic block diagram of a communication system 1400 according to an embodiment of the present application. As shown in FIG. 14, the communication system 1400 includes a terminal device 1410 and a network device 1420.
- the terminal device 1410 can be used to implement the corresponding function implemented by the terminal device in the above method
- the network device 1420 can be used to implement the corresponding function implemented by the network device in the above method. For brevity, it will not be repeated here. .
- the processor of the embodiment of the present application may be an integrated circuit chip with signal processing capability.
- the steps of the foregoing method embodiments can be completed by hardware integrated logic circuits in the processor or instructions in the form of software.
- the above-mentioned processor may be a general-purpose processor, a digital signal processor (Digital Signal Processor, DSP), an application specific integrated circuit (ASIC), a ready-made programmable gate array (Field Programmable Gate Array, FPGA) or other Programming logic devices, discrete gates or transistor logic devices, discrete hardware components.
- DSP Digital Signal Processor
- ASIC application specific integrated circuit
- FPGA Field Programmable Gate Array
- the methods, steps, and logical block diagrams disclosed in the embodiments of the present application can be implemented or executed.
- the general-purpose processor may be a microprocessor or the processor may also be any conventional processor or the like.
- the steps of the method disclosed in the embodiments of the present application can be directly embodied as being executed and completed by a hardware decoding processor, or executed and completed by a combination of hardware and software modules in the decoding processor.
- the software module can be located in a mature storage medium in the field, such as random access memory, flash memory, read-only memory, programmable read-only memory, or electrically erasable programmable memory, registers.
- the storage medium is located in the memory, and the processor reads the information in the memory and completes the steps of the above method in combination with its hardware.
- the memory in the embodiments of the present application may be a volatile memory or a non-volatile memory, or may include both volatile and non-volatile memory.
- the non-volatile memory can be read-only memory (Read-Only Memory, ROM), programmable read-only memory (Programmable ROM, PROM), erasable programmable read-only memory (Erasable PROM, EPROM), and electrically available Erase programmable read-only memory (Electrically EPROM, EEPROM) or flash memory.
- the volatile memory may be random access memory (Random Access Memory, RAM), which is used as an external cache.
- RAM random access memory
- SRAM static random access memory
- DRAM dynamic random access memory
- DRAM synchronous dynamic random access memory
- DDR SDRAM Double Data Rate Synchronous Dynamic Random Access Memory
- Enhanced SDRAM, ESDRAM Enhanced Synchronous Dynamic Random Access Memory
- Synchronous Link Dynamic Random Access Memory Synchronous Link Dynamic Random Access Memory
- DR RAM Direct Rambus RAM
- the memory in the embodiment of the present application may also be static random access memory (static RAM, SRAM), dynamic random access memory (dynamic RAM, DRAM), Synchronous dynamic random access memory (synchronous DRAM, SDRAM), double data rate synchronous dynamic random access memory (double data rate SDRAM, DDR SDRAM), enhanced synchronous dynamic random access memory (enhanced SDRAM, ESDRAM), synchronous connection Dynamic random access memory (synch link DRAM, SLDRAM) and direct memory bus random access memory (Direct Rambus RAM, DR RAM) and so on. That is to say, the memory in the embodiments of the present application is intended to include, but is not limited to, these and any other suitable types of memory.
- the embodiment of the present application also provides a computer-readable storage medium for storing computer programs.
- the computer-readable storage medium can be applied to the network device in the embodiment of the present application, and the computer program causes the computer to execute the corresponding process implemented by the network device in each method of the embodiment of the present application.
- the computer program causes the computer to execute the corresponding process implemented by the network device in each method of the embodiment of the present application.
- the computer-readable storage medium can be applied to the mobile terminal/terminal device in the embodiment of the present application, and the computer program causes the computer to execute the corresponding process implemented by the mobile terminal/terminal device in each method of the embodiment of the present application , For the sake of brevity, I won’t repeat it here.
- the embodiments of the present application also provide a computer program product, including computer program instructions.
- the computer program product can be applied to the network device in the embodiment of the present application, and the computer program instructions cause the computer to execute the corresponding process implemented by the network device in each method of the embodiment of the present application.
- the computer program instructions cause the computer to execute the corresponding process implemented by the network device in each method of the embodiment of the present application.
- the computer program product can be applied to the mobile terminal/terminal device in the embodiment of the present application, and the computer program instructions cause the computer to execute the corresponding process implemented by the mobile terminal/terminal device in each method of the embodiment of the present application, For the sake of brevity, it will not be repeated here.
- the embodiment of the present application also provides a computer program.
- the computer program can be applied to the network device in the embodiment of the present application.
- the computer program runs on the computer, it causes the computer to execute the corresponding process implemented by the network device in each method of the embodiment of the present application.
- I won’t repeat it here.
- the computer program can be applied to the mobile terminal/terminal device in the embodiment of the present application.
- the computer program runs on the computer, the computer executes each method in the embodiment of the present application. For the sake of brevity, the corresponding process will not be repeated here.
- the disclosed system, device, and method may be implemented in other ways.
- the device embodiments described above are merely illustrative, for example, the division of the units is only a logical function division, and there may be other divisions in actual implementation, for example, multiple units or components may be combined or It can be integrated into another system, or some features can be ignored or not implemented.
- the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may be in electrical, mechanical or other forms.
- the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, they may be located in one place, or they may be distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the objectives of the solutions of the embodiments.
- the functional units in the various embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit.
- the function is implemented in the form of a software functional unit and sold or used as an independent product, it can be stored in a computer readable storage medium.
- the technical solution of the present application essentially or the part that contributes to the existing technology or the part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium, including Several instructions are used to make a computer device (which may be a personal computer, a server, or a network device, etc.) execute all or part of the steps of the method described in each embodiment of the present application.
- the aforementioned storage media include: U disk, mobile hard disk, read-only memory (Read-Only Memory,) ROM, random access memory (Random Access Memory, RAM), magnetic disks or optical disks and other media that can store program codes. .
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Multimedia (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
本申请实施例提供一种接入控制方法及装置、终端设备、网络设备,该方法包括:终端设备接收第一配置信息,所述第一配置信息包括第一接入类别对应的接入控制配置参数;所述终端设备根据所述接入控制配置参数执行MBMS业务对应的接入控制操作。
Description
本申请实施例涉及移动通信技术领域,具体涉及一种接入控制方法及装置、终端设备、网络设备。
为了实现网络侧的负荷控制,新无线(New Radio,NR)系统中引入了统一接入控制(Unified Access Control,UAC)机制。目前,针对多媒体广播多播服务(Multimedia Broadcast Multicast Service,MBMS)业务的接收没有任何的反馈机制,任何无线资源控制(Radio Resource Control,RRC)状态的终端设备都可以接收MBMS业务,所以终端设备不用为了接收MBMS业务进入RRC连接态,所以也没有针对MBMS业务的接收设计接入控制机制(即UAC机制)。
发明内容
本申请实施例提供一种接入控制方法及装置、终端设备、网络设备。
本申请实施例提供的接入控制方法,包括:
终端设备接收第一配置信息,所述第一配置信息包括第一接入类别对应的接入控制配置参数;
所述终端设备根据所述接入控制配置参数执行MBMS业务对应的接入控制操作。
本申请实施例提供的接入控制方法,包括:
终端设备接收第一配置信息,所述第一配置信息包括至少一个接入控制配置参数;
所述终端确定第一MBMS业务的属性信息,并从所述第一配置信息中确定与所述第一MBMS业务的属性信息对应的第一接入控制配置参数,根据所述第一接入控制配置参数执行所述第一MBMS业务对应的接入控制操作。
本申请实施例提供的接入控制方法,包括:
网络设备发送第一配置信息,所述第一配置信息包括第一接入类别对应的接入控制配置参数;所述接入控制配置参数用于终端设备执行MBMS业务对应的接入控制操作。
本申请实施例提供的接入控制方法,包括:
网络设备发送第一配置信息,所述第一配置信息包括至少一个接入控制配置参数;所述至少一个接入控制配置参数包括第一接入控制配置参数,所述第一接入控制配置参数与第一MBMS业务的第一属性信息具有对应关系,所述第一接入控制配置参数用于终端设备执行所述第一MBMS业务对应的接入控制操作。
本申请实施例提供的接入控制装置,包括:
接收单元,用于接收第一配置信息,所述第一配置信息包括第一接入类别对应的接入控制配置参数;
处理单元,用于根据所述接入控制配置参数执行MBMS业务对应的接入控制操作。
本申请实施例提供的接入控制装置,包括:
接收单元,用于接收第一配置信息,所述第一配置信息包括至少一个接入控制配置参数;
确定单元,用于确定第一MBMS业务的属性信息,并从所述第一配置信息中确定与所述第一MBMS业务的属性信息对应的第一接入控制配置参数;
处理单元,用于根据所述第一接入控制配置参数执行所述第一MBMS业务对应的接入控制操作。
本申请实施例提供的接入控制装置,包括:
发送单元,用于发送第一配置信息,所述第一配置信息包括第一接入类别对应的接入控制配 置参数;所述接入控制配置参数用于终端设备执行MBMS业务对应的接入控制操作。
本申请实施例提供的接入控制装置,包括:
发送单元,用于发送第一配置信息,所述第一配置信息包括至少一个接入控制配置参数;所述至少一个接入控制配置参数包括第一接入控制配置参数,所述第一接入控制配置参数与第一MBMS业务的第一属性信息具有对应关系,所述第一接入控制配置参数用于终端设备执行所述第一MBMS业务对应的接入控制操作。
本申请实施例提供的终端设备,包括处理器和存储器。该存储器用于存储计算机程序,该处理器用于调用并运行该存储器中存储的计算机程序,执行上述的接入控制方法。
本申请实施例提供的网络设备,包括处理器和存储器。该存储器用于存储计算机程序,该处理器用于调用并运行该存储器中存储的计算机程序,执行上述的接入控制方法。
本申请实施例提供的芯片,用于实现上述的接入控制方法。
具体地,该芯片包括:处理器,用于从存储器中调用并运行计算机程序,使得安装有该芯片的设备执行上述的接入控制方法。
本申请实施例提供的计算机可读存储介质,用于存储计算机程序,该计算机程序使得计算机执行上述的接入控制方法。
本申请实施例提供的计算机程序产品,包括计算机程序指令,该计算机程序指令使得计算机执行上述的接入控制方法。
本申请实施例提供的计算机程序,当其在计算机上运行时,使得计算机执行上述的接入控制方法。
通过上述技术方案,使得NR系统中支持MBMS业务,与此同时,提出一种方案,即通过为MBMS业务分配接入类别,使得NR系统中支持MBMS业务的接入控制机制。
此处所说明的附图用来提供对本申请的进一步理解,构成本申请的一部分,本申请的示意性实施例及其说明用于解释本申请,并不构成对本申请的不当限定。在附图中:
图1是本申请实施例提供的一种通信系统架构的示意性图;
图2是本申请实施例提供的UAC-BarringInfoSet的示意图;
图3是本申请实施例提供的第一SIB相关配置的示意图;
图4是本申请实施例提供的PTM配置传输机制的示意图;
图5是本申请实施例提供的PTM信道及其映射图;
图6为本申请实施例提供的接入控制方法的流程示意图一;
图7为本申请实施例提供的接入控制方法的流程示意图二;
图8为本申请实施例提供的接入控制装置的结构组成示意图一;
图9为本申请实施例提供的接入控制装置的结构组成示意图二;
图10为本申请实施例提供的接入控制装置的结构组成示意图三;
图11为本申请实施例提供的接入控制装置的结构组成示意图四;
图12是本申请实施例提供的一种通信设备示意性结构图;
图13是本申请实施例的芯片的示意性结构图;
图14是本申请实施例提供的一种通信系统的示意性框图。
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行描述,显然,所描述的实施例是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。
本申请实施例的技术方案可以应用于各种通信系统,例如:长期演进(Long Term Evolution,LTE)系统、LTE频分双工(Frequency Division Duplex,FDD)系统、LTE时分双工(Time Division Duplex,TDD)、系统、5G通信系统或未来的通信系统等。
示例性的,本申请实施例应用的通信系统100如图1所示。该通信系统100可以包括网络设备110,网络设备110可以是与终端120(或称为通信终端、终端)通信的设备。网络设备110可以为 特定的地理区域提供通信覆盖,并且可以与位于该覆盖区域内的终端进行通信。可选地,该网络设备110可以是LTE系统中的演进型基站(Evolutional Node B,eNB或eNodeB),或者是云无线接入网络(Cloud Radio Access Network,CRAN)中的无线控制器,或者该网络设备可以为移动交换中心、中继站、接入点、车载设备、可穿戴设备、集线器、交换机、网桥、路由器、5G网络中的网络侧设备或者未来通信系统中的网络设备等。
该通信系统100还包括位于网络设备110覆盖范围内的至少一个终端120。作为在此使用的“终端”包括但不限于经由有线线路连接,如经由公共交换电话网络(Public Switched Telephone Networks,PSTN)、数字用户线路(Digital Subscriber Line,DSL)、数字电缆、直接电缆连接;和/或另一数据连接/网络;和/或经由无线接口,如,针对蜂窝网络、无线局域网(Wireless Local Area Network,WLAN)、诸如DVB-H网络的数字电视网络、卫星网络、AM-FM广播发送器;和/或另一终端的被设置成接收/发送通信信号的装置;和/或物联网(Internet of Things,IoT)设备。被设置成通过无线接口通信的终端可以被称为“无线通信终端”、“无线终端”或“移动终端”。移动终端的示例包括但不限于卫星或蜂窝电话;可以组合蜂窝无线电电话与数据处理、传真以及数据通信能力的个人通信系统(Personal Communications System,PCS)终端;可以包括无线电电话、寻呼机、因特网/内联网接入、Web浏览器、记事簿、日历以及/或全球定位系统(Global Positioning System,GPS)接收器的PDA;以及常规膝上型和/或掌上型接收器或包括无线电电话收发器的其它电子装置。终端可以指接入终端、用户设备(User Equipment,UE)、用户单元、用户站、移动站、移动台、远方站、远程终端、移动设备、用户终端、终端、无线通信设备、用户代理或用户装置。接入终端可以是蜂窝电话、无绳电话、会话启动协议(Session Initiation Protocol,SIP)电话、无线本地环路(Wireless Local Loop,WLL)站、个人数字处理(Personal Digital Assistant,PDA)、具有无线通信功能的手持设备、计算设备或连接到无线调制解调器的其它处理设备、车载设备、可穿戴设备、5G网络中的终端或者未来演进的PLMN中的终端等。
可选地,终端120之间可以进行终端直连(Device to Device,D2D)通信。
可选地,5G通信系统或5G网络还可以称为新无线(New Radio,NR)系统或NR网络。
图1示例性地示出了一个网络设备和两个终端,可选地,该通信系统100可以包括多个网络设备并且每个网络设备的覆盖范围内可以包括其它数量的终端,本申请实施例对此不做限定。
可选地,该通信系统100还可以包括网络控制器、移动管理实体等其他网络实体,本申请实施例对此不作限定。
应理解,本申请实施例中网络/系统中具有通信功能的设备可称为通信设备。以图1示出的通信系统100为例,通信设备可包括具有通信功能的网络设备110和终端120,网络设备110和终端120可以为上文所述的具体设备,此处不再赘述;通信设备还可包括通信系统100中的其他设备,例如网络控制器、移动管理实体等其他网络实体,本申请实施例中对此不做限定。
应理解,本文中术语“系统”和“网络”在本文中常被可互换使用。本文中术语“和/或”,仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。另外,本文中字符“/”,一般表示前后关联对象是一种“或”的关系。
为便于理解本申请实施例的技术方案,以下对本申请实施例相关的技术方案进行说明。
为便于理解本申请实施例的技术方案,以下对本申请实施例相关的技术方案进行说明。
随着人们对速率、延迟、高速移动性、能效的追求以及未来生活中业务的多样性、复杂性,为此第三代合作伙伴计划(3
rd Generation Partnership Project,3GPP)国际标准组织开始研发5G。5G的主要应用场景为:增强移动超宽带(enhanced Mobile Broadband,eMBB)、低时延高可靠通信(Ultra-Reliable Low-Latency Communications,URLLC)、大规模机器类通信(massive Machine-Type Communications,mMTC)。
一方面,eMBB仍然以用户获得多媒体内容、服务和数据为目标,其需求增长十分迅速。另一方面,由于eMBB可能部署在不同的场景中,例如室内,市区,农村等,其能力和需求的差别也比较大,所以不能一概而论,必须结合具体的部署场景详细分析。URLLC的典型应用包括:工业自动化,电力自动化,远程医疗操作(手术),交通安全保障等。mMTC的典型特点包括:高连接密度,小数据量,时延不敏感业务,模块的低成本和长使用寿命等。
5G为了降低空口信令和快速恢复无线连接,快速恢复数据业务的目的,定义了一个新的RRC状态,即RRC非激活(RRC_INACTIVE)状态。这种状态有别于RRC空闲(RRC_IDLE)状态和 RRC激活(RRC_ACTIVE)状态。其中,
1)RRC_IDLE状态(简称为空闲(idle)态):移动性为基于UE的小区选择重选,寻呼由核心网(Core Network,CN)发起,寻呼区域由CN配置。基站侧不存在UE上下文,不存在RRC连接。
2)RRC_CONNECTED状态(简称为连接(connected)态):存在RRC连接,基站侧和UE侧存在UE上下文。网络侧知道UE的位置是具体小区级别的。移动性是网络侧控制的移动性。UE和基站之间可以传输单播数据。
3)RRC_INACTIVE状态(简称为非激活(inactive)态):移动性为基于UE的小区选择重选,存在CN-NR之间的连接,UE上下文存在某个基站上,寻呼由RAN触发,基于RAN的寻呼区域由RAN管理,网络侧知道UE的位置是基于RAN的寻呼区域级别的。
3GPP版本6(Release 6,R6)中引入了MBMS,MBMS是一种通过共享网络资源从一个数据源向多个UE传送数据的技术,该技术在提供多媒体业务的同时能有效地利用网络资源,实现较高速率(如256kbps)的多媒体业务的广播和组播。
由于3GPP R6中的MBMS频谱效率较低,不足以有效地承载和支撑手机电视类型业务的运营。因此在LTE中,3GPP明确提出增强对下行高速MBMS业务的支持能力,并确定了对物理层和空中接口的设计要求。
3GPP R9将演进的MBMS(evolved MBMS,eMBMS)引入到LTE中。eMBMS提出了单频率网络(Single Frequency Network,SFN)的概念,即多媒体广播多播服务单频率网络(Multimedia Broadcast multicast service Single Frequency Network,MBSFN),MBSFN采用统一频率在所有小区同时发送业务数据,但是要保证小区间的同步。这种方式可以极大的提高小区整体信噪比分布,频谱效率也会相应的大幅提高。eMBMS基于IP多播协议实现业务的广播和多播。
在LTE或增强的LTE(LTE-Advanced,LTE-A)中,MBMS只有广播承载模式,没有多播承载模式。此外,MBMS业务的接收适用于空闲态或者连接态的UE。
3GPP R13中引入了单小区点对多点(Single Cell Point To Multiploint,SC-PTM)概念,SC-PTM基于MBMS网络架构。
MBMS引入了新的逻辑信道,包括单小区多播控制信道(Single Cell-Multicast Control Channel,SC-MCCH)和单小区多播传输信道(Single Cell-Multicast Transport Channel,SC-MTCH)。SC-MCCH和SC-MTCH被映射到下行共享信道(Downlink-Shared Channel,DL-SCH)上,进一步,DL-SCH被映射到物理下行共享信道(Physical Downlink Shared Channel,PDSCH)上,其中,SC-MCCH和SC-MTCH属于逻辑信道,DL-SCH属于传输信道,PDSCH属于物理信道。SC-MCCH和SC-MTCH不支持混合自动重传请求(Hybrid Automatic Repeat reQuest,HARQ)操作。
MBMS引入了新的系统信息块(System Information Block,SIB)类型,即SIB20。具体地,通过SIB20来传输SC-MCCH的配置信息,一个小区只有一个SC-MCCH。SC-MCCH的配置信息包括:SC-MCCH的修改周期、SC-MCCH的重复周期、以及调度SC-MCCH的无线帧和子帧等信息。进一步,1)SC-MCCH的修改周期的边界满足SFN mod m=0,其中,SFN代表边界的系统帧号,m是SIB20中配置的SC-MCCH的修改周期(即sc-mcch-ModificationPeriod)。2)调度SC-MCCH的无线帧满足:SFN mod mcch-RepetitionPeriod=mcch-Offset,其中,SFN代表无线帧的系统帧号,mcch-RepetitionPeriod代表SC-MCCH的重复周期,mcch-Offset代表SC-MCCH的偏移量。3)调度SC-MCCH的子帧通过sc-mcch-Subframe指示。
SC-MCCH通过物理下行控制信道(Physical Downlink Control Channel,PDCCH)调度。一方面,引入新的无线网络临时标识(Radio Network Tempory Identity,RNTI),即单小区RNTI(Single Cell RNTI,SC-RNTI)来识别用于调度SC-MCCH的PDCCH(如SC-MCCH PDCCH),可选地,SC-RNTI固定取值为FFFC。另一方面,引入新的RNTI,即单小区通知RNTI(Single Cell Notification RNTI,SC-N-RNTI)来识别用于指示SC-MCCH的变更通知的PDCCH(如通知PDCCH),可选地,SC-N-RNTI固定取值为FFFB;进一步,可以用DCI 1C的8个比特(bit)中的一个bit来指示变更通知。在LTE中,SC-PTM的配置信息基于SIB20配置的SC-MCCH,然后SC-MCCH配置SC-MTCH,SC-MTCH用于传输业务数据。
具体地,SC-MCCH只传输一个消息(即SCPTMConfiguration),该消息用于配置SC-PTM的配置信息。SC-PTM的配置信息包括:临时移动组标识(Temporary Mobile Group Identity,TMGI)、会话标识(seession id)、组RNTI(Group RNTI,G-RNTI)、非连续接收(Discontinuous Reception,DRX)配置信息以及邻区的SC-PTM业务信息等。需要说明的是,R13中的SC-PTM不支持健壮性 包头压缩(Robust Header Compression,ROHC)功能。
SC-PTM的下行非连续的接收是通过以下参数控制的:onDurationTimerSCPTM、drx-InactivityTimerSCPTM、SC-MTCH-SchedulingCycle、以及SC-MTCH-SchedulingOffset。
当满足[(SFN*10)+subframe number]modulo(SC-MTCH-SchedulingCycle)=SC-MTCH-SchedulingOffset时,启动定时器onDurationTimerSCPTM;
当接收到下行PDCCH调度时,启动定时器drx-InactivityTimerSCPTM;
只有当定时器onDurationTimerSCPTM或drx-InactivityTimerSCPTM运行时才接收下行SC-PTM业务。
SC-PTM业务连续性采用基于SIB15的MBMS业务连续性概念,即“SIB15+MBMSInterestIndication”方式。空闲态的UE的业务连续性基于频率优先级的概念。
在NR中,很多场景需要支持组播和广播的业务需求,例如车联网中,工业互联网中等。所以在NR中引入MBMS是有必要的。
为了网络侧的负荷控制,NR中引入了UAC机制。在UAC机制中,定义了接入类别(Access Category)和接入标识(Access identity)。其含义如下表1和表2所示。
表1
表2
●UAC参数配置
接入网网元(如基站)广播与接入类别和接入标识相关的接入控制信息,UE的接入层(Access Stratum,AS)则根据接入控制信息和AS层或非接入层(Non Access Stratum,NAS)提供的接入类 别和接入标识执行接入控制操作(即ACB checking)。
接入网网元广播的接入控制信息包括UAC参数,UAC参数是以接入类别为粒度(per access category)和/或以公共陆地移动网络(Public Land Mobile Network,PLMN)为粒度(per PLMN)进行配置的。UAC参数具体为UAC限制信息集(UAC-BarringInfoSet),网络侧最多配置8个UAC-BarringInfoSet,每个接入类别关联一个UAC-BarringInfoSet,总共64个接入类别(其中access category 0不需要配置)。也可以每个PLMN关联一个UAC-BarringPerCatList,进一步如果per PLMN信息不配置,则上述配置是对所有PLMN适用。
针对access category 1,配置一个辅助信息来辅助判断是否接入控制操作(即ACB checking)用于针对access category 1,该辅助信息为uac-AccessCategory1-SelectionAssistanceInfo。
●UAC机制:接入控制操作(即ACB checking)
接入控制操作基于UAC参数(即UAC-BarringInfoSet)执行,UAC-BarringInfoSet具体包含的内容如图2所示。在T390和T302都没有运行且接入类别不是access category 0的前提下,接入控制操作的执行包括如下步骤:
1)如果接入标识在uac-BarringForAccessIdentity中对应的比特(bit)设为0,表示允许接入,如果对应的bit设为1,则需要通过如下步骤2)进一步判决;
2)产生随机数(rand),rand的范围为0≤rand<1,如果随机数低于uac-BarringFactor,则表示允许接入,否则表示禁止接入。如果禁止接入,则产生随机数(rand),rand的范围为0≤rand<1,启动T390且T390=(0.7+0.6×rand)×uac-BarringTime。
对于NAS层触发的事件,NAS层决定接入标识、接入类别以及接入原因(或称为原因值)。NAS层提供接入标识和接入类别给AS层,AS层负责执行接入控制操作。如果允许接入,则AS层通知NAS层,NAS层提供接入原因给AS层。基于AS层的接入控制操作的反馈,NAS层负责执行停止或允许业务传输。
对于AS层触发的事件,包括寻呼(paging)触发的事件、或者RAN通知区域更新(RAN Notification Area Update,RNAU)触发的事件,其中,
对于Paging触发的事件:接入类别为access category 0,不受接入控制操作的控制。此外,原因值被覆盖,NAS层和AS层之间交互,NAS层提供原因值。
对于RNAU触发的事件:接入类别为access category 8,接入标识需要NAS层给AS层提供,NAS层和AS层之间交互信息属于UE实现行为。原因值AS层决定为rna-Update。
针对MBMS业务(也称为广播业务或者组播业务)的接收没有任何的反馈机制,任何RRC状态的终端设备都可以接收MBMS业务,所以终端设备不用为了接收MBMS业务进入连接态,所以也没有针对MBMS业务接收的接入控制机制。在NR中,有些场景对于MBMS业务的可靠性要求会很高,要求组播内的成员都要接收到MBMS业务,所以需要组播内的成员反馈MBMS业务的接收情况,可见,对于有些MBMS业务的接收,虽然也是MBMS业务的发送方式,但是可能要求终端设备进入连接态来接收MBMS业务,以便于反馈MBMS业务的接收情况。这种情况下,为了MBMS业务的接收而进入连接态的接入控制机制需要明确。为此,提出了本申请实施例的以下技术方案。
本申请实施例的技术方案中,定义一个新的SIB(称为第一SIB),参照图3第一SIB包括第一MCCH的配置信息,这里,第一MCCH为MBMS业务的控制信道,换句话说,第一SIB用于配置NR MBMS的控制信道的配置信息,可选地,NR MBMS的控制信道也可以叫做NR MCCH(即所述第一MCCH)。
进一步,第一MCCH用于承载第一信令,本申请实施例对第一信令的名称不做限定,如第一信令为信令A,所述第一信令包括至少一个第一MTCH的配置信息,这里,第一MTCH为MBMS业务的业务信道(也称为数据信道或传输信道),第一MTCH用于传输MBMS业务数据(如NR MBMS的业务数据)。换句话说,第一MCCH用于配置NR MBMS的业务信道的配置信息,可选地,NR MBMS的业务信道也可以叫做NR MTCH(即所述第一MTCH)。
具体地,所述第一信令用于配置NR MBMS的业务信道、该业务信道对应的业务信息以及该业务信道对应的调度信息。进一步,可选地,所述业务信道对应的业务信息,例如TMGI、session id等标识业务的标识信息。所述业务信道对应的调度信息,例如业务信道对应的MBMS业务数据被调度时使用的RNTI,例如G-RNTI、DRX配置信息等。
需要说明的是,第一MCCH和第一MTCH的传输都是基于PDCCH调度的。其中,用于调度第一MCCH的PDCCH使用的RNTI使用全网唯一标识,即是一个固定值。用于调度第一MTCH的PDCCH使用的RNTI通过第一MCCH进行配置。
进一步,第一MCCH中还携带以下至少之一:第一指示信息,所述第一指示信息用于指示(TMGI和/或会话标识对应的)MBMS业务是否需要HARQ反馈;第二指示信息,所述第二指示信息用于指示MBMS业务对应的多播组内的成员个数;第三指示信息,所述第三指示信息用于指示终端设备是否需要进入连接态后接收MBMS业务。这里,终端设备在注册到MBMS业务时,网络设备为注册到MBMS业务的终端设备分配一个成员索引号。
需要说明的是,本申请实施例对所述第一SIB、所述第一MCCH和所述第一MTCH的命名不做限制。为便于描述,所述第一SIB也可以简称为SIB,所述第一MCCH也可以简称为MCCH,所述第一MTCH也可以简称为MTCH,参照图4,通过SIB配置用于调度MCCH的PDCCH(即MCCH PDCCH)以及通知PDCCH,其中,通过MCCH PDCCH携带的DCI调度用于传输MCCH的PDSCH(即MCCH PDSCH)。进一步,通过MCCH配置M个用于调度MTCH的PDCCH(即MTCH 1 PDCCH、MTCH 2 PDCCH、…、MTCH M PDCCH),其中,MTCH n PDCCH携带的DCI调度用于传输MTCH n的PDSCH(即MTCH n PDSCH),n为大于等于1且小于等于M的整数。参照图5,MCCH和MTCH被映射到DL-SCH上,进一步,DL-SCH被映射到PDSCH上,其中,MCCH和MTCH属于逻辑信道,DL-SCH属于传输信道,PDSCH属于物理信道。
图6为本申请实施例提供的接入控制方法的流程示意图一,如图6所示,所述接入控制方法包括以下步骤:
步骤601:终端设备接收第一配置信息,所述第一配置信息包括第一接入类别对应的接入控制配置参数。
本申请实施例中,MBMS业务泛指任意一种MBMS业务,需要说明的是,本申请实施例中关于“MBMS业务”的描述也可以替换成“广播业务”或者“组播业务”。
本申请实施例中,为MBMS业务分配(或者说定义)一个接入类别,称为第一接入类别。可选地,所述第一接入类别是针对所有MBMS业务的,即多种MBMS业务都对应所述第一接入类别,举个例子:MBMS业务1、MBMS业务2、…、MBMS业务n的接入类别都是第一接入类别。
本申请实施例中,网络设备发送第一配置信息,终端设备接收第一配置信息,所述第一配置信息包括第一接入类别对应的接入控制配置参数。可选地,所述网络设备可以是基站,如gNB。
需要说明的是,本申请实施例中关于“接入控制配置参数”的描述也可以替换成“接入控制参数集”或者“UAC-BarringInfoSet”。
本申请实施例中,所述接入控制配置参数包括以下至少之一:
第一信息,所述第一信息用于确定允许接入的接入标识和/或禁止接入的接入标识;
第二信息,所述第二信息用于确定限制因素(BarringFactor);
第三信息,所述第三信息用于确定限制时长(BarringTime)。
其中,所述第一信息即是uac-BarringForAccessIdentity,所述第二信息即是uac-BarringFactor,所述第三信息即是uac-BarringTime。
在本申请一可选实施方式中,所述第一配置信息通过第一SIB或第一MCCH配置。这里,第一SIB和第一MCCH可以参照前述方案中的相关描述进行理解。
具体实现时,网络设备(即基站)在第一SIB或第一MCCH中配置MBMS业务的第一接入类别对应的接入控制配置参数,如下表3所示。
表3
步骤602:所述终端设备根据所述接入控制配置参数执行MBMS业务对应的接入控制操作。
本申请实施例中,所述接入控制配置参数用于终端设备执行MBMS业务对应的接入控制操作。具体地,所述终端设备的NAS层向所述终端设备的AS层发送第四指示信息,所述第四指示信息用于指示以下至少之一:所述MBMS业务对应的第一接入类别、所述MBMS业务对应的第一接入标识、所述MBMS业务对应的业务标识、所述MBMS业务对应的成员的身份信息、所述MBMS业务对应的成员的标识信息;所述终端设备的AS层根据所述第四指示信息确定是否执行所述MBMS业务对应的接入控制操作;若确定执行所述MBMS业务对应的接入控制操作,则根据所述接入控制配 置参数执行所述MBMS业务对应的接入控制操作。
以下结合具体示例对本申请实施例的技术方案进行举例说明。
终端设备接收到第一配置信息后,如果是MBMS业务需要进入连接态,UE NAS层(即终端设备的NAS层)递交MBMS业务对应的第一接入类别和/或MBMS业务对应的第一接入标识给UE AS层(即终端设备的AS层),UE AS层根据UE NAS层递交的第一接入类别和/或第一接入标识,以及第一接入类别对应的接入控制配置参数执行如下接入判决过程:
首先,终端设备根据第一接入标识判断是否执行或需要执行接入控制操作(即UAC过程),如果需要执行接入控制操作,则:生成第一随机数;若根据所述第一随机数和所述第二信息确定禁止接入,则生成第二随机数;根据所述第二随机数和所述第三信息启动第一定时器,所述第一定时器用于限制MBMS业务的接入。
具体实现时,终端设备根据第一接入标识和第一信息(即uac-BarringForAccessIdentity)确定是否执行或需要执行接入控制操作,如果需要执行接入控制操作,则:产生第一随机数(记作rand1),rand1的范围为0≤rand<1,如果rand1低于第二信息(即uac-BarringFactor),则表示允许接入,否则表示禁止接入。如果禁止接入,则产生第二随机数(记作rand2),rand2的范围为0≤rand2<1,启动T390且T390=(0.7+0.6×rand2)×第三信息(即uac-BarringTime)。
方案(A)所述接入控制配置参数除了包括前述方案中的各种信息以外,还包括第一指示信息,所述第一指示信息用于指示以下至少之一:执行或需要执行接入控制操作的MBMS业务;不执行或不需要执行接入控制操作的MBMS业务。终端设备根据所述第一指示信息能够确定某个MBMS业务是否执行或需要执行接入控制操作(即UAC过程)。
在一可选实施方式中,所述第一指示信息包括第一比特图(bitmap),所述第一比特图中的每个比特位与一个MBMS业务(或者MBMS业务的标识)对应,所述比特位的取值用于表示该比特位对应的MBMS业务是否执行或需要执行接入控制操作。例如:第一比特图中的某个比特位设置为1(或者0)表示该比特位对应的MBMS业务需要执行接入控制操作,第一比特图中的某个比特位设置为0(或者1)表示该比特位对应的MBMS业务不需要执行接入控制操作。
方案(B)所述MBMS业务的配置信息中携带第二指示信息,所述第二指示信息用于指示所述MBMS业务是否执行或需要执行接入控制操作。
具体实现时,在配置MBMS业务的时候,每个MBMS业务的配置信息关联一个指示信息(即所述第二指示信息),所述第二指示信息的取值用于指示所述MBMS业务是否执行或需要执行接入控制操作。例如所述第二指示信息的取值为0(或者1)表示MBMS业务需要执行接入控制操作,所述第二指示信息的取值为1(或者0)表示MBMS业务不需要执行接入控制操作。
方案(C)所述接入控制配置参数除了包括前述方案中的各种信息以外,还包括第三指示信息,所述第三指示信息用于指示以下至少之一:执行或需要执行接入控制操作的成员;不执行或不需要执行接入控制操作的成员;其中,所述成员指接收MBMS业务的成员。
在一可选实施方式中,所述第三指示信息包括以下至少之一:至少一个第一成员的身份信息和/或标识信息,所述第一成员为需要执行接入控制操作的成员;至少一个第二成员的身份信息和/或标识信息,所述第二成员为不需要执行接入控制操作的成员。
需要说明的是,上述第一成员和/或第二成员指示是指接收所述MBMS业务的成员。
需要说明的是,上述方案(A)、方案(B)以及方案(C)可以单独来实施,也可以将上述方案(A)和方案(C)结合在一起来实施,或者将上述方案(B)和方案(C)结合在一起来实施。
终端设备接收到第一配置信息后,如果是MBMS业务需要进入连接态,UE NAS层(即终端设备的NAS层)递交MBMS业务对应的第一接入类别、和/或MBMS业务对应的第一接入标识、和/或MBMS业务对应的业务标识、和/或MBMS业务对应的成员的身份信息、和/或MBMS业务对应的成员的标识信息给UE AS层(即终端设备的AS层),UE AS层根据UE NAS层递交的MBMS业务对应的第一接入类别、和/或MBMS业务对应的第一接入标识、和/或MBMS业务对应的业务标识、和/或MBMS业务对应的成员的身份信息、和/或MBMS业务对应的成员的标识信息,以及第一接入类别对应的接入控制配置参数执行如下接入判决过程:
首先,终端设备根据MBMS业务对应的第一接入标识、和/或MBMS业务对应的业务标识、和/或MBMS业务对应的成员的身份信息、和/或MBMS业务对应的成员的标识信息,判断是否需要执 行接入控制操作(即UAC过程),如果需要执行接入控制操作,则:生成第一随机数;若根据所述第一随机数和所述第二信息确定禁止接入,则生成第二随机数;根据所述第二随机数和所述第三信息启动第一定时器,所述第一定时器用于限制MBMS业务的接入。
具体实现时,终端设备产生第一随机数(记作rand1),rand1的范围为0≤rand<1,如果rand1低于第二信息(即uac-BarringFactor),则表示允许接入,否则表示禁止接入。如果禁止接入,则产生第二随机数(记作rand2),rand2的范围为0≤rand2<1,启动T390且T390=(0.7+0.6×rand2)×第三信息(即uac-BarringTime)。
需要说明的是,上述MBMS业务对应的业务标识、和/或MBMS业务对应的成员的身份信息、和/或MBMS业务对应的成员的标识信息也可以是终端设备通过自身实现获取。
终端设备基于第四信息确定是否执行所述MBMS业务对应的接入控制操作;若确定执行所述MBMS业务对应的接入控制操作,则根据所述接入控制配置参数执行所述MBMS业务对应的接入控制操作。
方案(I)所述第四信息携带在第一小区发送的系统广播消息中,所述第四信息用于指示所述终端设备接收所述第一小区发送的MBMS业务是否执行或需要执行接入控制操作。
这里,第一小区可以是发送MBMS业务的小区,第一小区通过系统广播消息发送第四信息,通过该第四信息指示终端设备接收MBMS业务是否执行或需要执行接入控制操作(即UAC过程)。如果第四信息指示需要执行接入控制操作,则终端设备按照NAS层提供的第一接入类别和/或第一接入标识,以及第一配置信息中携带的接入控制配置参数执行接入控制操作;如果第四信息指示不需要执行接入控制操作,则终端设备不执行接入控制操作。
需要说明的是,这里的第四信息是以小区为粒度(per cell)的,即第四信息所指示的是否执行或需要执行接入控制操作是针对该小区的。
方案(II)所述第四信息为预定义的信息,所述第四信息定义所述第一接入类别对应的MBMS业务不执行接入控制操作。
这里,可以通过协议约定第一接入类别对应的MBMS业务不执行接入控制操作。终端设备不会执行MBMS业务对应的接入控制操作。
需要说明的是,上述方案(I)以及方案(II)可以单独来实施。
图7为本申请实施例提供的接入控制方法的流程示意图二,如图7所示,所述接入控制方法包括以下步骤:
步骤701:终端设备接收第一配置信息,所述第一配置信息包括至少一个接入控制配置参数。
本申请实施例中,网络设备发送第一配置信息,终端设备接收第一配置信息,所述第一配置信息包括至少一个接入控制配置参数。可选地,所述网络设备可以是基站,如gNB。
需要说明的是,本申请实施例中关于“接入控制配置参数”的描述也可以替换成“接入控制参数集”或者“UAC-BarringInfoSet”。
本申请实施例中,所述接入控制配置参数包括以下至少之一:
第一信息,所述第一信息用于确定允许接入的接入标识和/或禁止接入的接入标识;
第二信息,所述第二信息用于确定限制因素;
第三信息,所述第三信息用于确定限制时长。
其中,所述第一信息即是uac-BarringForAccessIdentity,所述第二信息即是uac-BarringFactor,所述第三信息即是uac-BarringTime。
在本申请一可选实施方式中,所述第一配置信息通过第一SIB或第一MCCH配置。这里,第一SIB和第一MCCH可以参照前述方案中的相关描述进行理解。
具体实现时,网络设备(即基站)在第一SIB或第一MCCH中配置至少一个接入控制配置参数,每个接入控制配置参数的内容可以参照如上表3所示。
步骤702:所述终端确定第一MBMS业务的属性信息,并从所述第一配置信息中确定与所述第一MBMS业务的属性信息对应的第一接入控制配置参数,根据所述第一接入控制配置参数执行所述第一MBMS业务对应的接入控制操作。
本申请实施例中,所述至少一个接入控制配置参数包括第一接入控制配置参数,所述第一接入控制配置参数与第一MBMS业务的第一属性信息具有对应关系,所述第一接入控制配置参数用于终端设备执行所述第一MBMS业务对应的接入控制操作。
在一可选实施方式中,所述属性信息包括以下至少之一:MBMS业务对应的接入类别、MBMS 业务对应的业务标识、MBMS业务对应的成员的身份信息、MBMS业务对应的成员的标识信息。
本申请实施例中,所述终端设备的NAS层向所述终端设备的AS层发送第五指示信息(用于指示属性信息),所述第五指示信息用于指示以下至少之一:所述第一MBMS业务对应的第一接入类别、所述第一MBMS业务对应的第一接入标识、所述第一MBMS业务对应的业务标识、所述第一MBMS业务对应的成员的身份信息、所述第一MBMS业务对应的成员的标识信息;所述终端设备的AS层根据所述第五指示信息从所述第一配置信息中确定第一接入控制配置参数;根据所述第一MBMS业务对应的第一接入标识确定是否执行所述第一MBMS业务对应的接入控制操作;若确定执行所述第一MBMS业务对应的接入控制操作,则根据所述接入控制配置参数执行所述第一MBMS业务对应的接入控制操作。
以下结合具体示例对本申请实施例的技术方案进行举例说明。
为每个MBMS业务分配一个接入类别,即每个MBMS业务的业务标识关联一个接入类别。可选地,不同的MBMS业务对应不同的接入类别。举个例子:MBMS业务1对应接入类别1、MBMS业务2对应接入类别2、…、MBMS业务n对应接入类别n。
终端设备接收到第一配置信息后,如果是MBMS业务需要进入连接态,UE NAS层(即终端设备的NAS层)递交第一MBMS业务对应的第一接入类别和/或第一接入标识给UE AS层(即终端设备的AS层),UE AS层根据UE NAS层递交的第一接入类别从所述第一配置信息中确定第一接入控制配置参数;根据所述第一接入标识,以及第一接入类别对应的第一接入控制配置参数执行如下接入判决过程:
首先,终端设备根据第一接入标识判断是否执行或需要执行接入控制操作(即UAC过程),如果需要执行接入控制操作,则:生成第一随机数;若根据所述第一随机数和所述第二信息确定禁止接入,则生成第二随机数;根据所述第二随机数和所述第三信息启动第一定时器,所述第一定时器用于限制MBMS业务的接入。
具体实现时,终端设备根据第一接入标识和第一信息(即uac-BarringForAccessIdentity)确定是否执行或需要执行接入控制操作,如果需要执行接入控制操作,则:产生第一随机数(记作rand1),rand1的范围为0≤rand<1,如果rand1低于第二信息(即uac-BarringFactor),则表示允许接入,否则表示禁止接入。如果禁止接入,则产生第二随机数(记作rand2),rand2的范围为0≤rand2<1,启动T390且T390=(0.7+0.6×rand2)×第三信息(即uac-BarringTime)。
在所述第一配置信息中,不同的接入控制配置参数对应不同的属性信息。所述属性信息包括以下至少之一:MBMS业务对应的接入类别、MBMS业务对应的业务标识、MBMS业务对应的成员的身份信息、MBMS业务对应的成员的标识信息。
可以看出,每个接入控制配置参数关联一个属性信息,该属信息包括:MBMS业务对应的接入类别、和/或MBMS业务对应的业务标识、和/或MBMS业务对应的成员的身份信息、和/或MBMS业务对应的成员的标识信息。也就是说不同的属性信息分别对应不同的接入控制配置参数。
终端设备接收到第一配置信息后,如果是MBMS业务需要进入连接态,UE NAS层(即终端设备的NAS层)递交第一MBMS业务对应的第一接入类别、和/或第一接入标识、和/或业务标识、和/或成员的身份信息、和/或成员的标识信息给UE AS层(即终端设备的AS层),UE AS层根据UE NAS层递交的第一接入类别、和/或业务标识、和/或成员的身份信息、和/或成员的标识信息从所述第一配置信息中确定第一接入控制配置参数;根据所述第一接入标识以及第一接入控制配置参数执行如下接入判决过程:
首先,终端设备根据第一接入标识判断是否执行或需要执行接入控制操作(即UAC过程),如果需要执行接入控制操作,则:生成第一随机数;若根据所述第一随机数和所述第二信息确定禁止接入,则生成第二随机数;根据所述第二随机数和所述第三信息启动第一定时器,所述第一定时器用于限制MBMS业务的接入。
具体实现时,终端设备根据第一接入标识和第一信息(即uac-BarringForAccessIdentity)确定是否执行或需要执行接入控制操作,如果需要执行接入控制操作,则:产生第一随机数(记作rand1),rand1的范围为0≤rand<1,如果rand1低于第二信息(即uac-BarringFactor),则表示允许接入,否则表示禁止接入。如果禁止接入,则产生第二随机数(记作rand2),rand2的范围为0≤rand2<1,启动T390且T390=(0.7+0.6×rand2)×第三信息(即uac-BarringTime)。
需要说明的是,上述MBMS业务对应的业务标识、和/或MBMS业务对应的成员的身份信息、和/或MBMS业务对应的成员的标识信息也可以是终端设备通过自身实现获取。
需要说明的是,上述方案可以用于空闲态、或连接态、或非激活态的终端设备。
图8为本申请实施例提供的接入控制装置的结构组成示意图一,应用于终端设备,如图8所示,所述接入控制装置包括:
接收单元801,用于接收第一配置信息,所述第一配置信息包括第一接入类别对应的接入控制配置参数;
处理单元802,用于根据所述接入控制配置参数执行MBMS业务对应的接入控制操作。
在一可选实施方式中,所述接入控制配置参数包括以下至少之一:
第一信息,所述第一信息用于确定允许接入的接入标识和/或禁止接入的接入标识;
第二信息,所述第二信息用于确定限制因素;
第三信息,所述第三信息用于确定限制时长。
在一可选实施方式中,所述接入控制配置参数还包括第一指示信息,所述第一指示信息用于指示以下至少之一:
执行或需要执行接入控制操作的MBMS业务;
不执行或不需要执行接入控制操作的MBMS业务。
在一可选实施方式中,所述第一指示信息包括第一比特图,所述第一比特图中的每个比特位与一个MBMS业务对应,所述比特位的取值用于表示该比特位对应的MBMS业务是否执行或需要执行接入控制操作。
在一可选实施方式中,所述MBMS业务的配置信息中携带第二指示信息,所述第二指示信息用于指示所述MBMS业务是否执行或需要执行接入控制操作。
在一可选实施方式中,所述接入控制配置参数还包括第三指示信息,所述第三指示信息用于指示以下至少之一:
执行或需要执行接入控制操作的成员;
不执行或不需要执行接入控制操作的成员;
其中,所述成员指接收MBMS业务的成员。
在一可选实施方式中,所述第三指示信息包括以下至少之一:
至少一个第一成员的身份信息和/或标识信息,所述第一成员为需要执行接入控制操作的成员;
至少一个第二成员的身份信息和/或标识信息,所述第二成员为不需要执行接入控制操作的成员。
在一可选实施方式中,所述处理单元802,用于通过NAS层向AS层发送第四指示信息,所述第四指示信息用于指示以下至少之一:所述MBMS业务对应的第一接入类别、所述MBMS业务对应的第一接入标识、所述MBMS业务对应的业务标识、所述MBMS业务对应的成员的身份信息、所述MBMS业务对应的成员的标识信息;通过AS层根据所述第四指示信息确定是否执行所述MBMS业务对应的接入控制操作;若确定执行所述MBMS业务对应的接入控制操作,则根据所述接入控制配置参数执行所述MBMS业务对应的接入控制操作。
在一可选实施方式中,所述处理单元802,用于基于第四信息确定是否执行所述MBMS业务对应的接入控制操作;若确定执行所述MBMS业务对应的接入控制操作,则根据所述接入控制配置参数执行所述MBMS业务对应的接入控制操作。
在一可选实施方式中,所述第四信息携带在第一小区发送的系统广播消息中,所述第四信息用于指示所述终端设备接收所述第一小区发送的MBMS业务是否执行或需要执行接入控制操作。
在一可选实施方式中,所述第四信息为预定义的信息,所述第四信息定义所述第一接入类别对应的MBMS业务不执行接入控制操作。
在一可选实施方式中,所述处理单元802,用于生成第一随机数;若根据所述第一随机数和所述第二信息确定禁止接入,则生成第二随机数;根据所述第二随机数和所述第三信息启动第一定时器,所述第一定时器用于限制MBMS业务的接入。
在一可选实施方式中,所述第一配置信息通过第一SIB或第一MCCH配置。
本领域技术人员应当理解,本申请实施例的上述接入控制装置的相关描述可以参照本申请实施例的接入控制方法的相关描述进行理解。
图9为本申请实施例提供的接入控制装置的结构组成示意图二,应用于终端设备,如图9所 示,所述接入控制装置包括:
接收单元901,用于接收第一配置信息,所述第一配置信息包括至少一个接入控制配置参数;
确定单元902,用于确定第一MBMS业务的属性信息,并从所述第一配置信息中确定与所述第一MBMS业务的属性信息对应的第一接入控制配置参数;
处理单元903,用于根据所述第一接入控制配置参数执行所述第一MBMS业务对应的接入控制操作。
在一可选实施方式中,所述属性信息包括以下至少之一:
MBMS业务对应的接入类别、MBMS业务对应的业务标识、MBMS业务对应的成员的身份信息、MBMS业务对应的成员的标识信息。
在一可选实施方式中,在所述第一配置信息中,不同的接入控制配置参数对应不同的属性信息。
在一可选实施方式中,不同的MBMS业务对应不同的接入类别。
在一可选实施方式中,所述接入控制配置参数包括以下至少之一:
第一信息,所述第一信息用于确定允许接入的接入标识和/或禁止接入的接入标识;
第二信息,所述第二信息用于确定限制因素;
第三信息,所述第三信息用于确定限制时长。
在一可选实施方式中,所述确定单元902,用于通过NAS层向AS层发送第五指示信息,所述第五指示信息用于指示以下至少之一:所述第一MBMS业务对应的第一接入类别、所述第一MBMS业务对应的第一接入标识、所述第一MBMS业务对应的业务标识、所述第一MBMS业务对应的成员的身份信息、所述第一MBMS业务对应的成员的标识信息;通过AS层根据所述第五指示信息从所述第一配置信息中确定第一接入控制配置参数;
所述处理单元903,用于通过AS层根据所述第一MBMS业务对应的第一接入标识确定是否执行所述第一MBMS业务对应的接入控制操作;若确定执行所述第一MBMS业务对应的接入控制操作,则根据所述接入控制配置参数执行所述第一MBMS业务对应的接入控制操作。
在一可选实施方式中,所述处理单元903,用于生成第一随机数;若根据所述第一随机数和所述第二信息确定禁止,则生成第二随机数;根据所述第二随机数和所述第三信息启动第一定时器,所述第一定时器用于限制所述第一MBMS业务的接入。
在一可选实施方式中,所述第一配置信息通过第一SIB或第一MCCH配置。
本领域技术人员应当理解,本申请实施例的上述接入控制装置的相关描述可以参照本申请实施例的接入控制方法的相关描述进行理解。
图10为本申请实施例提供的接入控制装置的结构组成示意图三,应用于网络设备(如基站),如图10所示,所述接入控制装置包括:
发送单元1001,用于发送第一配置信息,所述第一配置信息包括第一接入类别对应的接入控制配置参数;所述接入控制配置参数用于终端设备执行MBMS业务对应的接入控制操作。
在一可选实施方式中,所述接入控制配置参数包括以下至少之一:
第一信息,所述第一信息用于确定允许接入的接入标识和/或禁止接入的接入标识;
第二信息,所述第二信息用于确定限制因素;
第三信息,所述第三信息用于确定限制时长。
在一可选实施方式中,所述接入控制配置参数还包括第一指示信息,所述第一指示信息用于指示以下至少之一:
执行或需要执行接入控制操作的MBMS业务;
不执行或不需要执行接入控制操作的MBMS业务。
在一可选实施方式中,所述第一指示信息包括第一比特图,所述第一比特图中的每个比特位与一个MBMS业务对应,所述比特位的取值用于表示该比特位对应的MBMS业务是否执行或需要执行接入控制操作。
在一可选实施方式中,所述MBMS业务的配置信息中携带第二指示信息,所述第二指示信息用于指示所述MBMS业务是否执行或需要执行接入控制操作。
在一可选实施方式中,所述接入控制配置参数还包括第三指示信息,所述第三指示信息用于指示以下至少之一:
执行或需要执行接入控制操作的成员;
不执行或不需要执行接入控制操作的成员;
其中,所述成员指接收MBMS业务的成员。
在一可选实施方式中,所述第三指示信息包括以下至少之一:
至少一个第一成员的身份信息和/或标识信息,所述第一成员为需要执行接入控制操作的成员;
至少一个第二成员的身份信息和/或标识信息,所述第二成员为不需要执行接入控制操作的成员。
在一可选实施方式中,所述第一配置信息通过第一SIB或第一MCCH配置。
本领域技术人员应当理解,本申请实施例的上述接入控制装置的相关描述可以参照本申请实施例的接入控制方法的相关描述进行理解。
图11为本申请实施例提供的接入控制装置的结构组成示意图四,应用于网络设备(如基站),如图11所示,所述接入控制装置包括:
发送单元1101,用于发送第一配置信息,所述第一配置信息包括至少一个接入控制配置参数;所述至少一个接入控制配置参数包括第一接入控制配置参数,所述第一接入控制配置参数与第一MBMS业务的第一属性信息具有对应关系,所述第一接入控制配置参数用于终端设备执行所述第一MBMS业务对应的接入控制操作。
在一可选实施方式中,所述属性信息包括以下至少之一:
MBMS业务对应的接入类别、MBMS业务对应的业务标识、MBMS业务对应的成员的身份信息、MBMS业务对应的成员的标识信息。
在一可选实施方式中,在所述第一配置信息中,不同的接入控制配置参数对应不同的属性信息。
在一可选实施方式中,不同的MBMS业务对应不同的接入类别。
在一可选实施方式中,所述接入控制配置参数包括以下至少之一:
第一信息,所述第一信息用于确定允许接入的接入标识和/或禁止接入的接入标识;
第二信息,所述第二信息用于确定限制因素;
第三信息,所述第三信息用于确定限制时长。
在一可选实施方式中,所述第一配置信息通过第一SIB或第一MCCH配置。
本领域技术人员应当理解,本申请实施例的上述接入控制装置的相关描述可以参照本申请实施例的接入控制方法的相关描述进行理解。
图12是本申请实施例提供的一种通信设备1200示意性结构图。该通信设备可以是终端设备,也可以是网络设备,图12所示的通信设备1200包括处理器1210,处理器1210可以从存储器中调用并运行计算机程序,以实现本申请实施例中的方法。
可选地,如图12所示,通信设备1200还可以包括存储器1220。其中,处理器1210可以从存储器1220中调用并运行计算机程序,以实现本申请实施例中的方法。
其中,存储器1220可以是独立于处理器1210的一个单独的器件,也可以集成在处理器1210中。
可选地,如图12所示,通信设备1200还可以包括收发器1230,处理器1210可以控制该收发器1230与其他设备进行通信,具体地,可以向其他设备发送信息或数据,或接收其他设备发送的信息或数据。
其中,收发器1230可以包括发射机和接收机。收发器1230还可以进一步包括天线,天线的数量可以为一个或多个。
可选地,该通信设备1200具体可为本申请实施例的网络设备,并且该通信设备1200可以实现本申请实施例的各个方法中由网络设备实现的相应流程,为了简洁,在此不再赘述。
可选地,该通信设备1200具体可为本申请实施例的移动终端/终端设备,并且该通信设备1200可以实现本申请实施例的各个方法中由移动终端/终端设备实现的相应流程,为了简洁,在此不再赘述。
图13是本申请实施例的芯片的示意性结构图。图13所示的芯片1300包括处理器1310,处理器1310可以从存储器中调用并运行计算机程序,以实现本申请实施例中的方法。
可选地,如图13所示,芯片1300还可以包括存储器1320。其中,处理器1310可以从存储器1320中调用并运行计算机程序,以实现本申请实施例中的方法。
其中,存储器1320可以是独立于处理器1310的一个单独的器件,也可以集成在处理器1310中。
可选地,该芯片1300还可以包括输入接口1330。其中,处理器1310可以控制该输入接口1330与其他设备或芯片进行通信,具体地,可以获取其他设备或芯片发送的信息或数据。
可选地,该芯片1300还可以包括输出接口1340。其中,处理器1310可以控制该输出接口1340与其他设备或芯片进行通信,具体地,可以向其他设备或芯片输出信息或数据。
可选地,该芯片可应用于本申请实施例中的网络设备,并且该芯片可以实现本申请实施例的各个方法中由网络设备实现的相应流程,为了简洁,在此不再赘述。
可选地,该芯片可应用于本申请实施例中的移动终端/终端设备,并且该芯片可以实现本申请实施例的各个方法中由移动终端/终端设备实现的相应流程,为了简洁,在此不再赘述。
应理解,本申请实施例提到的芯片还可以称为系统级芯片,系统芯片,芯片系统或片上系统芯片等。
图14是本申请实施例提供的一种通信系统1400的示意性框图。如图14所示,该通信系统1400包括终端设备1410和网络设备1420。
其中,该终端设备1410可以用于实现上述方法中由终端设备实现的相应的功能,以及该网络设备1420可以用于实现上述方法中由网络设备实现的相应的功能为了简洁,在此不再赘述。
应理解,本申请实施例的处理器可能是一种集成电路芯片,具有信号的处理能力。在实现过程中,上述方法实施例的各步骤可以通过处理器中的硬件的集成逻辑电路或者软件形式的指令完成。上述的处理器可以是通用处理器、数字信号处理器(Digital Signal Processor,DSP)、专用集成电路(Application Specific Integrated Circuit,ASIC)、现成可编程门阵列(Field Programmable Gate Array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件。可以实现或者执行本申请实施例中的公开的各方法、步骤及逻辑框图。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。结合本申请实施例所公开的方法的步骤可以直接体现为硬件译码处理器执行完成,或者用译码处理器中的硬件及软件模块组合执行完成。软件模块可以位于随机存储器,闪存、只读存储器,可编程只读存储器或者电可擦写可编程存储器、寄存器等本领域成熟的存储介质中。该存储介质位于存储器,处理器读取存储器中的信息,结合其硬件完成上述方法的步骤。
可以理解,本申请实施例中的存储器可以是易失性存储器或非易失性存储器,或可包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(Read-Only Memory,ROM)、可编程只读存储器(Programmable ROM,PROM)、可擦除可编程只读存储器(Erasable PROM,EPROM)、电可擦除可编程只读存储器(Electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(Random Access Memory,RAM),其用作外部高速缓存。通过示例性但不是限制性说明,许多形式的RAM可用,例如静态随机存取存储器(Static RAM,SRAM)、动态随机存取存储器(Dynamic RAM,DRAM)、同步动态随机存取存储器(Synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(Double Data Rate SDRAM,DDR SDRAM)、增强型同步动态随机存取存储器(Enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(Synchlink DRAM,SLDRAM)和直接内存总线随机存取存储器(Direct Rambus RAM,DR RAM)。应注意,本文描述的系统和方法的存储器旨在包括但不限于这些和任意其它适合类型的存储器。
应理解,上述存储器为示例性但不是限制性说明,例如,本申请实施例中的存储器还可以是静态随机存取存储器(static RAM,SRAM)、动态随机存取存储器(dynamic RAM,DRAM)、同步动态随机存取存储器(synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(double data rate SDRAM,DDR SDRAM)、增强型同步动态随机存取存储器(enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(synch link DRAM,SLDRAM)以及直接内存总线随机存取存储器(Direct Rambus RAM,DR RAM)等等。也就是说,本申请实施例中的存储器旨在包括但不限于这些和任意其它适合类型的存储器。
本申请实施例还提供了一种计算机可读存储介质,用于存储计算机程序。
可选的,该计算机可读存储介质可应用于本申请实施例中的网络设备,并且该计算机程序使得计算机执行本申请实施例的各个方法中由网络设备实现的相应流程,为了简洁,在此不再赘述。
可选地,该计算机可读存储介质可应用于本申请实施例中的移动终端/终端设备,并且该计算机程序使得计算机执行本申请实施例的各个方法中由移动终端/终端设备实现的相应流程,为了简洁,在此不再赘述。
本申请实施例还提供了一种计算机程序产品,包括计算机程序指令。
可选的,该计算机程序产品可应用于本申请实施例中的网络设备,并且该计算机程序指令使得计算机执行本申请实施例的各个方法中由网络设备实现的相应流程,为了简洁,在此不再赘述。
可选地,该计算机程序产品可应用于本申请实施例中的移动终端/终端设备,并且该计算机程序指令使得计算机执行本申请实施例的各个方法中由移动终端/终端设备实现的相应流程,为了简洁, 在此不再赘述。
本申请实施例还提供了一种计算机程序。
可选的,该计算机程序可应用于本申请实施例中的网络设备,当该计算机程序在计算机上运行时,使得计算机执行本申请实施例的各个方法中由网络设备实现的相应流程,为了简洁,在此不再赘述。
可选地,该计算机程序可应用于本申请实施例中的移动终端/终端设备,当该计算机程序在计算机上运行时,使得计算机执行本申请实施例的各个方法中由移动终端/终端设备实现的相应流程,为了简洁,在此不再赘述。
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
在本申请所提供的几个实施例中,应该理解到,所揭露的系统、装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。
所述功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(Read-Only Memory,)ROM、随机存取存储器(Random Access Memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应所述以权利要求的保护范围为准。
Claims (80)
- 一种接入控制方法,所述方法包括:终端设备接收第一配置信息,所述第一配置信息包括第一接入类别对应的接入控制配置参数;所述终端设备根据所述接入控制配置参数执行多媒体广播多播服务MBMS业务对应的接入控制操作。
- 根据权利要求1所述的方法,其中,所述接入控制配置参数包括以下至少之一:第一信息,所述第一信息用于确定允许接入的接入标识和/或禁止接入的接入标识;第二信息,所述第二信息用于确定限制因素BarringFactor;第三信息,所述第三信息用于确定限制时长BarringTime。
- 根据权利要求1或2所述的方法,其中,所述接入控制配置参数包括第一指示信息,所述第一指示信息用于指示以下至少之一:执行或需要执行接入控制操作的MBMS业务;不执行或不需要执行接入控制操作的MBMS业务。
- 根据权利要求3所述的方法,其中,所述第一指示信息包括第一比特图bitmap,所述第一比特图中的每个比特位与一个MBMS业务对应,所述比特位的取值用于表示该比特位对应的MBMS业务是否执行或需要执行接入控制操作。
- 根据权利要求2所述的方法,其中,所述MBMS业务的配置信息中携带第二指示信息,所述第二指示信息用于指示所述MBMS业务是否执行或需要执行接入控制操作。
- 根据权利要求2至5中任一项所述的方法,其中,所述接入控制配置参数还包括第三指示信息,所述第三指示信息用于指示以下至少之一:执行或需要执行接入控制操作的成员;不执行或不需要执行接入控制操作的成员;其中,所述成员指接收MBMS业务的成员。
- 根据权利要求6所述的方法,其中,所述第三指示信息包括以下至少之一:至少一个第一成员的身份信息和/或标识信息,所述第一成员为需要执行接入控制操作的成员;至少一个第二成员的身份信息和/或标识信息,所述第二成员为不需要执行接入控制操作的成员。
- 根据权利要求2至7中任一项所述的方法,其中,所述终端设备根据所述接入控制配置参数执行MBMS业务对应的接入控制操作,包括:所述终端设备的非接入NAS层向所述终端设备的接入AS层发送第四指示信息,所述第四指示信息用于指示以下至少之一:所述MBMS业务对应的第一接入类别、所述MBMS业务对应的第一接入标识、所述MBMS业务对应的业务标识、所述MBMS业务对应的成员的身份信息、所述MBMS业务对应的成员的标识信息;所述终端设备的AS层根据所述第四指示信息确定是否执行所述MBMS业务对应的接入控制操作;若确定执行所述MBMS业务对应的接入控制操作,则根据所述接入控制配置参数执行所述MBMS业务对应的接入控制操作。
- 根据权利要求2所述的方法,其中,所述终端设备根据所述接入控制配置参数执行MBMS业务对应的接入控制操作,包括:终端设备基于第四信息确定是否执行所述MBMS业务对应的接入控制操作;若确定执行所述MBMS业务对应的接入控制操作,则根据所述接入控制配置参数执行所述MBMS业务对应的接入控制操作。
- 根据权利要求9所述的方法,其中,所述第四信息携带在第一小区发送的系统广播消息中,所述第四信息用于指示所述终端设备接收所述第一小区发送的MBMS业务是否执行或需要执行接入控制操作。
- 根据权利要求9所述的方法,其中,所述第四信息为预定义的信息,所述第四信息定义所述第一接入类别对应的MBMS业务不执行接入控制操作。
- 根据权利要求8或9所述的方法,其中,所述根据所述接入控制配置参数执行所述MBMS业务对应的接入控制操作,包括:生成第一随机数;若根据所述第一随机数和所述第二信息确定禁止接入,则生成第二随机数;根据所述第二随机数和所述第三信息启动第一定时器,所述第一定时器用于限制MBMS业务的接入。
- 根据权利要求1至12中任一项所述的方法,其中,所述第一配置信息通过第一系统信息块SIB或第一组播信道MCCH配置。
- 一种接入控制方法,所述方法包括:终端设备接收第一配置信息,所述第一配置信息包括至少一个接入控制配置参数;所述终端确定第一MBMS业务的属性信息,并从所述第一配置信息中确定与所述第一MBMS业务的属性信息对应的第一接入控制配置参数,根据所述第一接入控制配置参数执行所述第一MBMS业务对应的接入控制操作。
- 根据权利要求14所述的方法,其中,所述属性信息包括以下至少之一:MBMS业务对应的接入类别、MBMS业务对应的业务标识、MBMS业务对应的成员的身份信息、MBMS业务对应的成员的标识信息。
- 根据权利要求14或15所述的方法,其中,在所述第一配置信息中,不同的接入控制配置参数对应不同的属性信息。
- 根据权利要求14至16中任一项所述的方法,其中,不同的MBMS业务对应不同的接入类别。
- 根据权利要求14至17中任一项所述的方法,其中,所述接入控制配置参数包括以下至少之一:第一信息,所述第一信息用于确定允许接入的接入标识和/或禁止接入的接入标识;第二信息,所述第二信息用于确定限制因素BarringFactor;第三信息,所述第三信息用于确定限制时长BarringTime。
- 根据权利要求18所述的方法,其中,所述终端确定第一MBMS业务的属性信息,并从所述第一配置信息中确定与所述第一MBMS业务的属性信息对应的第一接入控制配置参数,根据所述第一接入控制配置参数执行所述第一MBMS业务对应的接入控制操作,包括:所述终端设备的NAS层向所述终端设备的AS层发送第五指示信息,所述第五指示信息用于指示以下至少之一:所述第一MBMS业务对应的第一接入类别、所述第一MBMS业务对应的第一接入标识、所述第一MBMS业务对应的业务标识、所述第一MBMS业务对应的成员的身份信息、所述第一MBMS业务对应的成员的标识信息;所述终端设备的AS层根据所述第五指示信息从所述第一配置信息中确定第一接入控制配置参数;根据所述第一MBMS业务对应的第一接入标识确定是否执行所述第一MBMS业务对应的接入控制操作;若确定执行所述第一MBMS业务对应的接入控制操作,则根据所述接入控制配置参数执行所述第一MBMS业务对应的接入控制操作。
- 根据权利要求19所述的方法,其中,所述根据所述接入控制配置参数执行所述第一MBMS业务对应的接入控制操作,包括:生成第一随机数;若根据所述第一随机数和所述第二信息确定禁止,则生成第二随机数;根据所述第二随机数和所述第三信息启动第一定时器,所述第一定时器用于限制所述第一MBMS业务的接入。
- 根据权利要求14至20中任一项所述的方法,其中,所述第一配置信息通过第一SIB或第一MCCH配置。
- 一种接入控制方法,所述方法包括:网络设备发送第一配置信息,所述第一配置信息包括第一接入类别对应的接入控制配置参数;所述接入控制配置参数用于终端设备执行MBMS业务对应的接入控制操作。
- 根据权利要求22所述的方法,其中,所述接入控制配置参数包括以下至少之一:第一信息,所述第一信息用于确定允许接入的接入标识和/或禁止接入的接入标识;第二信息,所述第二信息用于确定限制因素BarringFactor;第三信息,所述第三信息用于确定限制时长BarringTime。
- 根据权利要求22或23所述的方法,其中,所述接入控制配置参数包括第一指示信息,所述第一指示信息用于指示以下至少之一:执行或需要执行接入控制操作的MBMS业务;不执行或不需要执行接入控制操作的MBMS业务。
- 根据权利要求24所述的方法,其中,所述第一指示信息包括第一比特图bitmap,所述第一比特图中的每个比特位与一个MBMS业务对应,所述比特位的取值用于表示该比特位对应的MBMS业务是否执行或需要执行接入控制操作。
- 根据权利要求23所述的方法,其中,所述MBMS业务的配置信息中携带第二指示信息,所述第二指示信息用于指示所述MBMS业务是否执行或需要执行接入控制操作。
- 根据权利要求23至26中任一项所述的方法,其中,所述接入控制配置参数还包括第三指示信息,所述第三指示信息用于指示以下至少之一:执行或需要执行接入控制操作的成员;不执行或不需要执行接入控制操作的成员;其中,所述成员指接收MBMS业务的成员。
- 根据权利要求27所述的方法,其中,所述第三指示信息包括以下至少之一:至少一个第一成员的身份信息和/或标识信息,所述第一成员为需要执行接入控制操作的成员;至少一个第二成员的身份信息和/或标识信息,所述第二成员为不需要执行接入控制操作的成员。
- 根据权利要求22至28中任一项所述的方法,其中,所述第一配置信息通过第一SIB或第一MCCH配置。
- 一种接入控制方法,所述方法包括:网络设备发送第一配置信息,所述第一配置信息包括至少一个接入控制配置参数;所述至少一个接入控制配置参数包括第一接入控制配置参数,所述第一接入控制配置参数与第一MBMS业务的第一属性信息具有对应关系,所述第一接入控制配置参数用于终端设备执行所述第一MBMS业务对应的接入控制操作。
- 根据权利要求30所述的方法,其中,所述属性信息包括以下至少之一:MBMS业务对应的接入类别、MBMS业务对应的业务标识、MBMS业务对应的成员的身份信息、MBMS业务对应的成员的标识信息。
- 根据权利要求30或31所述的方法,其中,在所述第一配置信息中,不同的接入控制配置参数对应不同的属性信息。
- 根据权利要求30至32中任一项所述的方法,其中,不同的MBMS业务对应不同的接入类别。
- 根据权利要求30至33中任一项所述的方法,其中,所述接入控制配置参数包括以下至少之一:第一信息,所述第一信息用于确定允许接入的接入标识和/或禁止接入的接入标识;第二信息,所述第二信息用于确定限制因素BarringFactor;第三信息,所述第三信息用于确定限制时长BarringTime。
- 根据权利要求30至34中任一项所述的方法,其中,所述第一配置信息通过第一SIB或第一MCCH配置。
- 一种接入控制装置,所述装置包括:接收单元,用于接收第一配置信息,所述第一配置信息包括第一接入类别对应的接入控制配置参数;处理单元,用于根据所述接入控制配置参数执行MBMS业务对应的接入控制操作。
- 根据权利要求36所述的装置,其中,所述接入控制配置参数包括以下至少之一:第一信息,所述第一信息用于确定允许接入的接入标识和/或禁止接入的接入标识;第二信息,所述第二信息用于确定限制因素BarringFactor;第三信息,所述第三信息用于确定限制时长BarringTime。
- 根据权利要求36或37所述的装置,其中,所述接入控制配置参数包括第一指示信息,所述第一指示信息用于指示以下至少之一:执行或需要执行接入控制操作的MBMS业务;不执行或不需要执行接入控制操作的MBMS业务。
- 根据权利要求38所述的装置,其中,所述第一指示信息包括第一比特图bitmap,所述第一比特图中的每个比特位与一个MBMS业务对应,所述比特位的取值用于表示该比特位对应的MBMS业务是否执行或需要执行接入控制操作。
- 根据权利要求37所述的装置,其中,所述MBMS业务的配置信息中携带第二指示信息,所述第二指示信息用于指示所述MBMS业务是否执行或需要执行接入控制操作。
- 根据权利要求37至40中任一项所述的装置,其中,所述接入控制配置参数还包括第三指示信息,所述第三指示信息用于指示以下至少之一:执行或需要执行接入控制操作的成员;不执行或不需要执行接入控制操作的成员;其中,所述成员指接收MBMS业务的成员。
- 根据权利要求41所述的装置,其中,所述第三指示信息包括以下至少之一:至少一个第一成员的身份信息和/或标识信息,所述第一成员为需要执行接入控制操作的成员;至少一个第二成员的身份信息和/或标识信息,所述第二成员为不需要执行接入控制操作的成员。
- 根据权利要求37至42中任一项所述的装置,其中,所述处理单元,用于通过NAS层向AS层发送第四指示信息,所述第四指示信息用于指示以下至少之一:所述MBMS业务对应的第一接入类别、所述MBMS业务对应的第一接入标识、所述MBMS业务对应的业务标识、所述MBMS业务对应的成员的身份信息、所述MBMS业务对应的成员的标识信息;通过AS层根据所述第四指示信息确定是否执行所述MBMS业务对应的接入控制操作;若确定执行所述MBMS业务对应的接入控制操作,则根据所述接入控制配置参数执行所述MBMS业务对应的接入控制操作。
- 根据权利要求37所述的装置,其中,所述处理单元,用于基于第四信息确定是否执行所述MBMS业务对应的接入控制操作;若确定执行所述MBMS业务对应的接入控制操作,则根据所述接入控制配置参数执行所述MBMS业务对应的接入控制操作。
- 根据权利要求44所述的装置,其中,所述第四信息携带在第一小区发送的系统广播消息中,所述第四信息用于指示所述终端设备接收所述第一小区发送的MBMS业务是否执行或需要执行接入控制操作。
- 根据权利要求44所述的装置,其中,所述第四信息为预定义的信息,所述第四信息定义所述第一接入类别对应的MBMS业务不执行接入控制操作。
- 根据权利要求43或44所述的装置,其中,所述处理单元,用于生成第一随机数;若根据所述第一随机数和所述第二信息确定禁止接入,则生成第二随机数;根据所述第二随机数和所述第三信息启动第一定时器,所述第一定时器用于限制MBMS业务的接入。
- 根据权利要求36至47中任一项所述的装置,其中,所述第一配置信息通过第一SIB或第一MCCH配置。
- 一种接入控制装置,所述装置包括:接收单元,用于接收第一配置信息,所述第一配置信息包括至少一个接入控制配置参数;确定单元,用于确定第一MBMS业务的属性信息,并从所述第一配置信息中确定与所述第一MBMS业务的属性信息对应的第一接入控制配置参数;处理单元,用于根据所述第一接入控制配置参数执行所述第一MBMS业务对应的接入控制操作。
- 根据权利要求49所述的装置,其中,所述属性信息包括以下至少之一:MBMS业务对应的接入类别、MBMS业务对应的业务标识、MBMS业务对应的成员的身份信息、MBMS业务对应的成员的标识信息。
- 根据权利要求49或50所述的装置,其中,在所述第一配置信息中,不同的接入控制配置参数对应不同的属性信息。
- 根据权利要求49至51中任一项所述的装置,其中,不同的MBMS业务对应不同的接入类别。
- 根据权利要求49至52中任一项所述的装置,其中,所述接入控制配置参数包括以下至少之一:第一信息,所述第一信息用于确定允许接入的接入标识和/或禁止接入的接入标识;第二信息,所述第二信息用于确定限制因素BarringFactor;第三信息,所述第三信息用于确定限制时长BarringTime。
- 根据权利要求53所述的装置,其中,所述确定单元,用于通过NAS层向AS层发送第五指示信息,所述第五指示信息用于指示以下至少之一:所述第一MBMS业务对应的第一接入类别、所述第一MBMS业务对应的第一接入标识、所述第一MBMS业务对应的业务标识、所述第一MBMS业务对应的成员的身份信息、所述第一MBMS业务对应的成员的标识信息;通过AS层根据所述第五指示信息从所述第一配置信息中确定第一接入控制配置参数;所述处理单元,用于通过AS层根据所述第一MBMS业务对应的第一接入标识确定是否执行所述第一MBMS业务对应的接入控制操作;若确定执行所述第一MBMS业务对应的接入控制操作,则根据所述接入控制配置参数执行所述第一MBMS业务对应的接入控制操作。
- 根据权利要求54所述的装置,其中,所述处理单元,用于生成第一随机数;若根据所述第一随机数和所述第二信息确定禁止,则生成第二随机数;根据所述第二随机数和所述第三信息启动第一定时器,所述第一定时器用于限制所述第一MBMS业务的接入。
- 根据权利要求49至55中任一项所述的装置,其中,所述第一配置信息通过第一SIB或第一MCCH配置。
- 一种接入控制装置,所述装置包括:发送单元,用于发送第一配置信息,所述第一配置信息包括第一接入类别对应的接入控制配置参数;所述接入控制配置参数用于终端设备执行MBMS业务对应的接入控制操作。
- 根据权利要求57所述的装置,其中,所述接入控制配置参数包括以下至少之一:第一信息,所述第一信息用于确定允许接入的接入标识和/或禁止接入的接入标识;第二信息,所述第二信息用于确定限制因素BarringFactor;第三信息,所述第三信息用于确定限制时长BarringTime。
- 根据权利要求57或58所述的装置,其中,所述接入控制配置参数包括第一指示信息,所述第一指示信息用于指示以下至少之一:执行或需要执行接入控制操作的MBMS业务;不执行或不需要执行接入控制操作的MBMS业务。
- 根据权利要求59所述的装置,其中,所述第一指示信息包括第一比特图bitmap,所述第一比特图中的每个比特位与一个MBMS业务对应,所述比特位的取值用于表示该比特位对应的MBMS业务是否执行或需要执行接入控制操作。
- 根据权利要求58所述的装置,其中,所述MBMS业务的配置信息中携带第二指示信息,所述第二指示信息用于指示所述MBMS业务是否执行或需要执行接入控制操作。
- 根据权利要求58至61中任一项所述的装置,其中,所述接入控制配置参数还包括第三指示信息,所述第三指示信息用于指示以下至少之一:执行或需要执行接入控制操作的成员;不执行或不需要执行接入控制操作的成员;其中,所述成员指接收MBMS业务的成员。
- 根据权利要求62所述的装置,其中,所述第三指示信息包括以下至少之一:至少一个第一成员的身份信息和/或标识信息,所述第一成员为需要执行接入控制操作的成员;至少一个第二成员的身份信息和/或标识信息,所述第二成员为不需要执行接入控制操作的成员。
- 根据权利要求57至63中任一项所述的装置,其中,所述第一配置信息通过第一SIB或第一MCCH配置。
- 一种接入控制装置,所述装置包括:发送单元,用于发送第一配置信息,所述第一配置信息包括至少一个接入控制配置参数;所述至少一个接入控制配置参数包括第一接入控制配置参数,所述第一接入控制配置参数与第一MBMS业务的第一属性信息具有对应关系,所述第一接入控制配置参数用于终端设备执行所述第一MBMS业务对应的接入控制操作。
- 根据权利要求65所述的装置,其中,所述属性信息包括以下至少之一:MBMS业务对应的接入类别、MBMS业务对应的业务标识、MBMS业务对应的成员的身份信息、MBMS业务对应的成员的标识信息。
- 根据权利要求65或66所述的装置,其中,在所述第一配置信息中,不同的接入控制配置参数对应不同的属性信息。
- 根据权利要求65至67中任一项所述的装置,其中,不同的MBMS业务对应不同的接入类别。
- 根据权利要求65至68中任一项所述的装置,其中,所述接入控制配置参数包括以下至少之一:第一信息,所述第一信息用于确定允许接入的接入标识和/或禁止接入的接入标识;第二信息,所述第二信息用于确定限制因素BarringFactor;第三信息,所述第三信息用于确定限制时长BarringTime。
- 根据权利要求65至69中任一项所述的装置,其中,所述第一配置信息通过第一SIB或第一MCCH配置。
- 一种终端设备,包括:处理器和存储器,该存储器用于存储计算机程序,所述处理器用于调用并运行所述存储器中存储的计算机程序,执行如权利要求1至21中任一项所述的方法。
- 一种网络设备,包括:处理器和存储器,该存储器用于存储计算机程序,所述处理器用于调用并运行所述存储器中存储的计算机程序,执行如权利要求22至35中任一项所述的方法。
- 一种芯片,包括:处理器,用于从存储器中调用并运行计算机程序,使得安装有所述芯片的设备执行如权利要求1至21中任一项所述的方法。
- 一种芯片,包括:处理器,用于从存储器中调用并运行计算机程序,使得安装有所述芯片的设备执行如权利要求22至35中任一项所述的方法。
- 一种计算机可读存储介质,用于存储计算机程序,所述计算机程序使得计算机执行如权利要求1至21中任一项所述的方法。
- 一种计算机可读存储介质,用于存储计算机程序,所述计算机程序使得计算机执行如权利要求22至35中任一项所述的方法。
- 一种计算机程序产品,包括计算机程序指令,该计算机程序指令使得计算机执行如权利要求1至21中任一项所述的方法。
- 一种计算机程序产品,包括计算机程序指令,该计算机程序指令使得计算机执行如权利要求22至35中任一项所述的方法。
- 一种计算机程序,所述计算机程序使得计算机执行如权利要求1至21中任一项所述的方法。
- 一种计算机程序,所述计算机程序使得计算机执行如权利要求22至35中任一项所述的方法。
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201980100472.5A CN114402634A (zh) | 2019-09-26 | 2019-09-26 | 一种接入控制方法及装置、终端设备、网络设备 |
PCT/CN2019/108175 WO2021056335A1 (zh) | 2019-09-26 | 2019-09-26 | 一种接入控制方法及装置、终端设备、网络设备 |
US17/704,547 US20220217507A1 (en) | 2019-09-26 | 2022-03-25 | Access control method and apparatus, terminal device, and network device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2019/108175 WO2021056335A1 (zh) | 2019-09-26 | 2019-09-26 | 一种接入控制方法及装置、终端设备、网络设备 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US17/704,547 Continuation US20220217507A1 (en) | 2019-09-26 | 2022-03-25 | Access control method and apparatus, terminal device, and network device |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2021056335A1 true WO2021056335A1 (zh) | 2021-04-01 |
Family
ID=75165029
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2019/108175 WO2021056335A1 (zh) | 2019-09-26 | 2019-09-26 | 一种接入控制方法及装置、终端设备、网络设备 |
Country Status (3)
Country | Link |
---|---|
US (1) | US20220217507A1 (zh) |
CN (1) | CN114402634A (zh) |
WO (1) | WO2021056335A1 (zh) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115175270A (zh) * | 2021-04-02 | 2022-10-11 | 北京紫光展锐通信技术有限公司 | 通信方法、装置、可读取存储介质和计算机设备 |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US12075330B2 (en) * | 2021-05-10 | 2024-08-27 | Apple Inc. | Access control |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102291780A (zh) * | 2010-06-21 | 2011-12-21 | 中兴通讯股份有限公司 | 小区公共信息的配置方法及系统 |
CN106358158A (zh) * | 2016-11-10 | 2017-01-25 | 河海大学 | 基于lte‑a系统的多媒体广播多播服务网络配置方法 |
WO2018203709A1 (en) * | 2017-05-05 | 2018-11-08 | Lg Electronics Inc. | Method and apparatus for performing access to cell |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110141908A1 (en) * | 2008-08-12 | 2011-06-16 | Panasonic Corporation | Wireless transmitting device and wireless receiving device |
EP3422797B1 (en) * | 2016-02-26 | 2020-09-09 | LG Electronics Inc. -1- | Method and user equipment for requesting connection to network |
KR20190116810A (ko) * | 2018-04-05 | 2019-10-15 | 삼성전자주식회사 | 차세대 이동통신 시스템에서 엑세스 제어 설정 정보를 효율적으로 제공하는 방법 및 장치 |
-
2019
- 2019-09-26 WO PCT/CN2019/108175 patent/WO2021056335A1/zh active Application Filing
- 2019-09-26 CN CN201980100472.5A patent/CN114402634A/zh active Pending
-
2022
- 2022-03-25 US US17/704,547 patent/US20220217507A1/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102291780A (zh) * | 2010-06-21 | 2011-12-21 | 中兴通讯股份有限公司 | 小区公共信息的配置方法及系统 |
CN106358158A (zh) * | 2016-11-10 | 2017-01-25 | 河海大学 | 基于lte‑a系统的多媒体广播多播服务网络配置方法 |
WO2018203709A1 (en) * | 2017-05-05 | 2018-11-08 | Lg Electronics Inc. | Method and apparatus for performing access to cell |
Non-Patent Citations (2)
Title |
---|
HUAWEI, HISILICON, QUALCOMM INCORPORATED: "Unified access control for NB-IoT and eMTC connected to 5GC", 3GPP DRAFT; R2-1906169 SUPPORT OF UAC, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. RAN WG2, no. Reno, Nevada, USA; 20190513 - 20190517, 13 May 2019 (2019-05-13), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France, XP051729645 * |
LG ELECTRONICS INC.: "Consideration on MBMS Service for V2X", 3GPP DRAFT; R3-186600 CONSIDERATION ON MBMS SERVICE FOR V2X, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. RAN WG3, no. Spokane, USA; 20181112 - 20181116, 11 November 2018 (2018-11-11), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France, XP051558374 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115175270A (zh) * | 2021-04-02 | 2022-10-11 | 北京紫光展锐通信技术有限公司 | 通信方法、装置、可读取存储介质和计算机设备 |
Also Published As
Publication number | Publication date |
---|---|
US20220217507A1 (en) | 2022-07-07 |
CN114402634A (zh) | 2022-04-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2021142647A1 (zh) | 一种业务传输方法及装置、终端设备、网络设备 | |
WO2021051312A1 (zh) | 一种信息配置方法及装置、终端设备、网络设备 | |
WO2021134316A1 (zh) | 一种业务调度方法及装置、终端设备、网络设备 | |
WO2021051321A1 (zh) | 一种业务数据传输方法及装置、终端设备 | |
WO2021051320A1 (zh) | 一种业务数据传输方法及装置、网络设备、终端设备 | |
CN113678500B (zh) | 一种反馈资源配置方法及通信方法、装置、通信设备 | |
WO2021056152A1 (zh) | 一种信息配置方法及装置、终端设备、网络设备 | |
WO2021134298A1 (zh) | 一种资源指示方法及装置、通信设备 | |
US20220329984A1 (en) | Resource configuration method, terminal device, and non-transitory computer readable storage medium | |
WO2022006875A1 (zh) | 建立mbs业务的方法及装置、终端设备、网络设备 | |
WO2022056806A1 (zh) | 一种mbs业务的管理方法及装置、终端设备、网络设备 | |
US20230361923A1 (en) | Mbs service configuration method and terminal device | |
US20220217507A1 (en) | Access control method and apparatus, terminal device, and network device | |
WO2022141088A1 (zh) | 一种mbs业务的传输方法及装置、终端设备 | |
WO2022006849A1 (zh) | Mbs业务的tci状态管理方法及装置、终端设备 | |
US20230276433A1 (en) | Mcch scheduling transmission method and apparatus, and terminal device | |
WO2021051319A1 (zh) | 一种drx配置方法及装置、终端设备、网络设备 | |
US20220278804A1 (en) | Information indication method and apparatus, terminal device, and network device | |
WO2022205454A1 (zh) | 一种指示寻呼的方法及装置、终端设备、网络设备 | |
WO2021142646A1 (zh) | 一种业务传输方法及装置、通信设备 | |
WO2022120837A1 (zh) | Mbs业务的半静态调度方法及装置、终端设备、网络设备 | |
WO2021051322A1 (zh) | 一种bwp配置方法及装置、终端设备、网络设备 | |
WO2021138801A1 (zh) | 一种业务安全传输方法及装置、终端设备、网络设备 | |
WO2021134761A1 (zh) | 一种小区重选方法及装置、终端设备、网络设备 | |
WO2021051316A1 (zh) | 一种业务数据传输方法及装置、网络设备、终端设备 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 19946753 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 19946753 Country of ref document: EP Kind code of ref document: A1 |