WO2021204230A1 - 接入控制方法、装置、设备和存储介质 - Google Patents

接入控制方法、装置、设备和存储介质 Download PDF

Info

Publication number
WO2021204230A1
WO2021204230A1 PCT/CN2021/086054 CN2021086054W WO2021204230A1 WO 2021204230 A1 WO2021204230 A1 WO 2021204230A1 CN 2021086054 W CN2021086054 W CN 2021086054W WO 2021204230 A1 WO2021204230 A1 WO 2021204230A1
Authority
WO
WIPO (PCT)
Prior art keywords
access
communication node
network
base station
information
Prior art date
Application number
PCT/CN2021/086054
Other languages
English (en)
French (fr)
Inventor
崔方宇
张楠
曹伟
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Priority to CA3175182A priority Critical patent/CA3175182A1/en
Priority to EP21784700.3A priority patent/EP4135408A4/en
Priority to US17/918,043 priority patent/US20230124820A1/en
Publication of WO2021204230A1 publication Critical patent/WO2021204230A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions
    • H04W48/04Access restriction performed under specific conditions based on user or terminal location or mobility data, e.g. moving direction, speed
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions
    • H04W48/06Access restriction performed under specific conditions based on traffic conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/04Large scale networks; Deep hierarchical networks
    • H04W84/06Airborne or Satellite Networks

Definitions

  • This application relates to a wireless communication network, for example, to an access control method, device, device, and storage medium.
  • Non-Terrestrial Network NTN
  • NTN non-terrestrial Network
  • the base station since the base station is at a high altitude and usually has high mobility, communication is often accompanied by large delay and high Doppler.
  • the time delay and Doppler exceed the tolerable range of the base station, it will cause the communication quality to deteriorate and even the user access failure. Therefore, in a spatial three-dimensional network, the base station needs to restrict access to users who do not meet specific conditions in different scenarios and time periods to improve network performance.
  • the mechanism of the traditional terrestrial communication network cannot meet the diverse needs of different types of base stations under the spatial three-dimensional network.
  • This application provides a method, device, device, and storage medium for access control.
  • the embodiment of the present application provides an access control method, which is applied to a first communication node, and includes:
  • An embodiment of the present application also provides an access control method applied to a second communication node, including:
  • An embodiment of the present application also provides an access control device, which is configured in a first communication node, and includes:
  • the first receiving module is configured to receive the access configuration message delivered by the second communication node; the determining module is configured to determine whether to access the network based on the access configuration information.
  • An embodiment of the present application also provides an access control device, which is configured in a second communication node, and includes:
  • the first sending module is configured to send an access configuration message to the first communication node, where the access configuration message is used by the first communication node to determine whether to access the network.
  • An embodiment of the present application also provides a device, including:
  • One or more processors a memory for storing one or more programs; when the one or more programs are executed by the one or more processors, the one or more processors can realize Any access control method in the embodiment.
  • An embodiment of the present application further provides a storage medium that stores a computer program, and when the computer program is executed by a processor, any one of the access control methods in the embodiments of the present application is implemented.
  • FIG. 1 is a schematic structural diagram of a wireless network system provided by an embodiment of this application.
  • FIG. 2 is a schematic flowchart of an access control method provided by an embodiment of this application.
  • FIG. 3 is a schematic flowchart of an access control method provided by an embodiment of this application.
  • FIG. 4 is a schematic structural diagram of an access control device provided by an embodiment of this application.
  • FIG. 5 is a schematic flowchart of an access control apparatus provided by an embodiment of this application.
  • Fig. 6 is a schematic structural diagram of a device provided by an embodiment of the present application.
  • GSM Global System of Mobile Communication
  • CDMA Code Division Multiple Access
  • Wideband Code Division Multiple Access Wideband Code Division Multiple Access
  • WCDMA Wideband Code Division Multiple Access
  • GPRS General Packet Radio Service
  • LTE Long Term Evolution
  • LIE-A Advanced long term evolution
  • UMTS Universal Mobile Telecommunication System
  • 5G Fifth Generation mobile communication
  • FIG. 1 is a schematic structural diagram of a wireless network system provided by an embodiment of this application.
  • the wireless network system 100 includes a base station 101, a user equipment 110, a user equipment 120, and a user equipment 130.
  • the base station 101 performs wireless communication with the user equipment 110, the user equipment 120, and the user equipment 130, respectively.
  • the base station may be a device that can communicate with a user terminal.
  • the base station can be any device with wireless transceiver function. Including but not limited to: base station (NodeB), evolved base station (evolved NodeB, eNodeB), base station in 5G communication system, base station in future communication system, access node in wireless fidelity (Wireless Fidelity, WiFi) system, Wireless relay node, wireless backhaul node, etc.
  • the base station may also be a wireless controller in a cloud radio access network (Cloud Radio Access Network, CRAN) scenario; the base station may also be a small station, a transmission reference point (TRP), etc., which are not limited in this embodiment of the application.
  • CRAN Cloud Radio Access Network
  • TRP transmission reference point
  • the user terminal is a device with wireless transceiver function. It can be deployed on land, including indoor or outdoor, handheld, wearable, or vehicle-mounted; it can also be deployed on the water (such as a ship); it can also be deployed on In the air (for example, airplanes, balloons, satellites, etc.).
  • the user terminal may be a mobile phone (mobile phone), a tablet computer (Pad), a computer with wireless transceiver function, a virtual reality (VR) terminal, an augmented reality (AR) terminal, an industrial control (industrial control) Wireless terminals in ), wireless terminals in self-driving, wireless terminals in remote medical, wireless terminals in smart grid, and wireless terminals in transportation safety , Wireless terminals in smart cities, wireless terminals in smart homes, etc.
  • the embodiments of this application do not limit the application scenarios.
  • User terminal can sometimes be called terminal, access terminal, User Equipment (UE) unit, UE station, mobile station, mobile station, remote station, remote terminal, mobile equipment, UE terminal, wireless communication equipment, UE agent Or UE device, etc.
  • the embodiments of the application are not limited.
  • the error of the information obtained by the user is different, and the final calculated time delay and Doppler will also have a different error range. If the error range of the delay and Doppler is greater than the tolerance range of the corresponding base station, access will still fail even after pre-compensation.
  • the ability of users to perform time-frequency precompensation is also somewhat different, and the types of networks and services supported by different users are also different; therefore, in a spatial three-dimensional network, the base station needs to pass through different scenarios and time Access restrictions for users who do not meet specific conditions in the segment to improve network performance.
  • the mechanism of the traditional terrestrial communication network cannot meet the diverse needs of different types of base stations under this type of network.
  • this application provides an access control method
  • FIG. 2 is a schematic flowchart of an access control method provided in an embodiment of this application. This method can be applied to the situation of determining whether the device allows access. The method can be executed by the access control device provided in the present application, and the access control device can be implemented by software and/or hardware, and the method is applied to the first communication node.
  • the access control method provided by the embodiment of the present application mainly includes steps S11 and S12.
  • the first communication node may be any of the foregoing user equipment.
  • the second communication node may be any of the aforementioned base stations.
  • the access configuration message is configured by the base station and sent to the user equipment.
  • the configuration method of the access configuration message is not limited in this embodiment.
  • the method further includes:
  • the user can determine whether to access the network based on the access configuration information.
  • the base station can also determine whether to allow the user to access according to the user equipment information.
  • the user When the user accesses the network for the first time, the user initiates the determination of whether to access the network. In the case of a user switching access to the network, the base station initiates whether to allow the user to access the network.
  • the method further includes: stopping access to the network when the number of failed attempts to access the network reaches a preset number of times.
  • the preset number of times can be configured by the second communication node.
  • a lower preset number of times can be configured to save resources; when the second communication node restricts access based on variable parameters such as load, it can be configured to be more limited. High preset times to provide more access opportunities.
  • the access configuration message includes one or more of the following:
  • Access conditions access instructions; second communication node information.
  • the second communication node information may be base station status information, including the location, speed, and corresponding error range of the base station.
  • the first communication node may estimate parameters such as the distance between the second communication node and itself and the time-frequency offset according to the second communication node information and its own information, and assist the first communication node to determine whether the access condition is satisfied.
  • the determining whether to access the network based on the access configuration information includes: determining whether to access the network based on the access indication sent by the second communication node.
  • the access indication includes one or more of the following:
  • Access is allowed; access is not allowed; access is suspended.
  • the access indication is to allow access, it is determined that the user is accessing the network.
  • the access indication is that access is not allowed, it is determined that the user is prohibited from accessing the network.
  • the waiting time can be configured by the second communication node.
  • the determining whether to access the network based on the access configuration information includes: stopping the access to the network if the access condition is not met.
  • the stopping access to the network when the access condition is not met includes:
  • node types can be classified according to services, for example: Narrow Band (NB) terminal, LTE terminal.
  • NB Narrow Band
  • LTE terminal LTE terminal.
  • the node type can be determined according to the classification of the node, for example: different power levels, supported antenna configurations (such as whether to support circular polarization, etc.); in this embodiment, the node type can be determined according to the node's capabilities , Such as: whether to support the pre-compensation capability, etc.
  • Node types can also be classified according to site types, such as ordinary terminals, relay nodes, IAB nodes, and so on.
  • the base station only allows IAB terminals to access the network. At this time, ordinary terminals should be prohibited from accessing the network.
  • the stopping access to the network when the access condition is not met includes:
  • the stopping access to the network when the access condition is not met includes:
  • the stopping access to the network when the access condition is not met includes:
  • the service range in this embodiment can be understood as the geographic range that the second communication node can serve, that is, the geographic range.
  • the user obtains his or her position through positioning and judges whether it is within the geographic range served by the base station. If the user's location is not within the geographic range served by the base station, the user stops accessing the network.
  • the stopping access to the network when the access condition is not met includes:
  • the base stations of different operators can be separated, so the base station of one operator can restrict the access of users of another operator.
  • the stopping access to the network when the access condition is not met includes:
  • the slice type of the current node is not the slice service type supported by the second communication node, and the current node does not allow the slice type to be changed, stop accessing the network.
  • stopping access to the network includes:
  • the base station sets the tolerance range of Timing Offset (TO) and Frequency Offset (TO) to restrict access of users whose TO or FO is greater than the tolerance range.
  • TO Timing Offset
  • TO Frequency Offset
  • the base station first informs the user of its own status information and the tolerable TO range and FO range.
  • the user estimates the TO range and FO range that he can reach based on the status information of the base station and itself. If the TO range or FO range exceeds the tolerable range of the base station, the user stops accessing the network.
  • stopping access to the network includes:
  • the content of the node list may include system information block (System Information Block, SIB) types, public land mobile network (Public Land Mobile Network, PLMN) arrangement, frequency band allocation, cell identification (Identifier, ID), and so on.
  • SIB System Information Block
  • PLMN Public Land Mobile Network
  • ID Cell identification
  • the first communication node may determine whether the second communication node can be accessed according to the information of the second communication node and the content of the node list.
  • the node list at the time of initial access may be obtained through local storage information of the first communication node.
  • the node list can also be configured by the source base station.
  • stopping access to the network includes:
  • stopping access to the network includes:
  • this application provides an access control method
  • FIG. 3 is a schematic flowchart of an access control method provided in an embodiment of this application. This method can be applied to the situation of determining whether the device allows access. The method can be executed by the access control device provided in the present application, and the access control device can be implemented by software and/or hardware, and the method is applied to the second communication node.
  • the access control method provided by the embodiment of the present application mainly includes step S21.
  • S21 Send an access configuration message to the first communication node, where the access configuration message is used by the first communication node to determine whether to access the network.
  • the method further includes:
  • Acquire first communication node information determine whether to allow the first communication node to access the network based on the first communication node information.
  • an access permission instruction is generated and sent to the first communication node to allow the first communication node to access the network.
  • an access not allowed instruction is generated and sent to the first communication node to prohibit the first communication node from accessing the network.
  • the first communication node information includes one or more of the following:
  • the access configuration message includes one or more of the following:
  • Access conditions access instructions; second communication node information.
  • sending the access condition to the first communication node includes at least one of the following:
  • SIM Subscriber Identity Module
  • USB Universal Customer Identity Module
  • sending the second communication node information to the first communication node includes one or more of the following:
  • the second communication node information is broadcast to the first communication node through broadcast signaling; the second communication node information is implicitly transmitted through the SIB type; the second communication node information is implicitly transmitted through different frequency bands, PLMN arrangements and cell IDs.
  • the access conditions include one or more of the following:
  • determining whether to allow the first communication node to access the network based on the first communication node information includes:
  • the first communication node with low priority when the current node is overloaded, the first communication node with low priority is not allowed to access the network, and an access prohibition instruction is generated and sent to the first communication node with low priority to prohibit the low priority.
  • the first communication node accesses the network.
  • This application provides a method for initiating access restriction and information transmission.
  • Access restriction can be initiated either on the network side or on the user side.
  • the network side in this application can be understood as the aforementioned base station or the second communication node
  • the user side in this embodiment can be understood as the user equipment, the user terminal, or the first communication node.
  • the base station initiates access restrictions on users based on certain conditions.
  • the first type the base station obtains the user type and status information, and judges whether the user meets the access conditions. If the access conditions are not met, the base station sends an indication of not allowing access to the user to restrict its access.
  • the user does not need to know the access restriction related information, but its type and status information need to be known by the base station first, and this condition can be met during handover.
  • the user information can be transferred from the source base station to the target base station through the core network, and the base station only needs to transmit an access indication to the target user to indicate whether to allow access to the network.
  • the second type the base station does not know the user's type and status information, but it can pass the access conditions to the user so that the user can judge whether he meets the access conditions. If it is not satisfied, the user will not initiate access to the base station.
  • Method 1 Broadcast the base station access conditions to users through signaling, which can be done in the following sub-options:
  • a bit field is defined in broadcast signaling such as MIB or SIB to convey the access conditions of the base station, such as the time offset and frequency offset range that the base station can tolerate.
  • the length of the bit field is determined by the access condition. For example, if the access condition is that the time-frequency offset is less than a certain range, the number of bits required is determined by the maximum range and quantization accuracy.
  • a bit field is defined in broadcast signaling such as MIB or SIB to convey the type of base station, and the access conditions corresponding to each type of base station are stored locally in the user in advance.
  • the type of base station is implicitly conveyed through the type of SIB.
  • Each type of base station corresponds to a type of SIB, and the user determines the type of base station based on the type of SIB decoded.
  • the access conditions corresponding to each type of base station are stored locally in the user in advance.
  • the type of base station is implicitly conveyed by using information such as different frequency bands, PLMN arrangements, and cell IDs.
  • the user determines the type of base station based on the corresponding information.
  • the access conditions corresponding to each type of base station are stored locally in the user in advance.
  • Method 2 Pre-store the base station access conditions in the user's SIM card or USIM card. After obtaining the base station information, the user can obtain the access conditions of the base station by searching for the pre-stored information, and there is no need to spend extra signaling for transmitting the access conditions.
  • the user actively initiates access restriction based on certain conditions.
  • the first type the user tries to access the base station, and stops accessing the base station after a certain number of failures. In this case, no additional signaling interaction is required between the user and the base station.
  • the second type the user has previously stored the accessible base station types in the SIM or USIM. If the base station type does not meet the requirements, the user will not initiate access. Even if the base station is a type that the user can access, the user needs to determine whether the access conditions of the base station are met before initiating access.
  • Access restrictions can be triggered by many factors. When the triggering scenario is different, the initiation process of access restriction and the content of the message to be delivered will be different. This application will sequentially describe the access initiation procedures with different trigger scenarios and the content of the messages that need to be delivered.
  • the base station sets the tolerance range of a timing offset (TO) and a frequency offset (TO) to restrict access of users whose TO or FO is greater than the tolerance range.
  • TO timing offset
  • TO frequency offset
  • NTN because air communication nodes are usually far away from ground users and have high mobility, communication links are often affected by large delays and high Doppler.
  • the user In order to deal with long time delay and high Doppler, the user is usually provided with the location and speed information of the base station and the user, so that the user can calculate the corresponding TO and FO, and perform pre-compensation.
  • the positioning information will have certain errors, the calculated TO and FO will also have corresponding errors. If the final residual TO or FO is too large and exceeds the range that the base station can tolerate, the access of these users should be restricted.
  • access restriction can be initiated by the base station.
  • the base station first transmits the access configuration message to the user, including its own state information (position, speed, and corresponding error range) and the tolerable TO and FO thresholds.
  • the user estimates the TO and FO calculation accuracy he can achieve based on the base station and its own state information, and obtains the residual TO and FO range after pre-compensation. If the maximum value of TO is greater than the TO threshold or the maximum value of FO is greater than the FO threshold, it is considered that access is restricted and the user stops accessing the network; otherwise, it is considered that access will not be restricted due to excessive TO and FO.
  • the target base station obtains user information from the source base station through the core network, and estimates the residual TO and FO ranges after pre-compensation. If the maximum value of TO is greater than the TO threshold or the maximum value of FO is greater than the FO threshold, it is considered that access is restricted, and an indication that access is not allowed is sent to the user; otherwise, it is considered that access will not be affected due to excessive TO and FO. limit.
  • the base station allows only certain types of users to access.
  • the base station can only serve the target type of users and restrict the access of other types of users.
  • the base station only allows users with a sufficiently high power class to access, and restricts users with a low power class to access to improve network performance.
  • the UE category is divided according to the power class of the user. Users with different power classes are divided into different UE categories, and the network can restrict access to users belonging to a specific UE category.
  • the base station only allows integrated access backhaul (Integrated Access and Backhaul, IAB) terminal access, which mainly serves the wireless backhaul work, thus restricting the access of ordinary ground users.
  • IAB integrated Access and Backhaul
  • the UE category is divided according to the user's terminal type, including ordinary handheld terminals, IAB terminals, and so on. Users with different terminal types are classified into different UE categories, and the network can restrict the access of users belonging to a specific UE category.
  • the base station only serves users of the Narrow Band Internet of Things (NB-IoT) service type, and restricts the access of users of the LTE and NR service type to improve network performance.
  • NB-IoT Narrow Band Internet of Things
  • the UE category is divided according to the user's service type. Users with different service types are divided into different UE categories, and the network can restrict access to users belonging to a specific UE category.
  • access restriction can be initiated by the base station.
  • the base station first transmits a list to the user, which contains the UE categories supported by the base station. If the user's UE category is not in the list, it is considered that access is restricted and the user stops accessing the network; otherwise, it is considered that access will not be restricted due to the UE category.
  • the target base station obtains user information from the source base station through the core network, and learns the UE category of the user. If the user’s UE category is not the type that the base station can serve and the service category of the base station does not change in a short time, then the access is considered restricted, and an indication of not allowing access is sent to the user; if the user’s UE category cannot be used by the base station temporarily Service, but it is expected to be served by the base station after a period of time, it is considered that access is temporarily restricted, and an instruction to suspend access is sent to the user and the waiting time is configured; otherwise, it is considered that access will not be restricted due to the UE category.
  • the base station sets an uplink signal power threshold to restrict access of users whose uplink signal power is greater than the threshold.
  • the base station needs to restrict the access of users whose uplink signal power is too high to reduce interference to other users.
  • access restriction can be initiated by the base station.
  • the base station can inform the user whether access is restricted in the following ways:
  • Method 1 If the user's transmit power is known, the uplink signal power received by the base station is determined by the distance between the base station and the user. Therefore, the base station first transmits the access configuration message to the user, including its own location information and the distance threshold for restricting access. The user estimates the distance to the base station based on the location information of the base station and itself. If the estimated distance is less than the distance threshold, it is considered that access is restricted and the user stops accessing the network; otherwise, it is considered that access will not be restricted due to the high uplink signal power.
  • Method 2 The base station directly measures the received power of the uplink signal. If the received power is greater than the power threshold set by the base station and the power threshold will not change in a short period of time, it is considered that access is restricted and an indication that access is not allowed is sent to the user; if the received power is greater than the power threshold set by the base station, but a period of time is expected After the time the power threshold will increase, it is considered that the access is temporarily restricted, and an instruction to suspend the access is sent to the user and the waiting time is configured; otherwise, it is considered that the access will not be restricted due to the excessive power of the uplink signal.
  • Manner 3 The base station first transmits an access configuration message to the user, including its own location information and the received power threshold for restricting access.
  • the user estimates the distance to the base station based on the location information of the base station and itself, thereby calculating the path loss. If the transmission power of the user after subtracting the path loss is still greater than the received power threshold of the base station, then the access is considered restricted and the user stops accessing the network; otherwise, it is considered that the access will not be restricted due to the high uplink signal power.
  • the base station can inform the user whether access is restricted in the following ways:
  • Method 1 The target base station obtains user location information from the source base station through the core network, and calculates the distance between the user and the target base station. If the calculated distance is less than the distance threshold, it is considered that the access is restricted and an indication that the access is not allowed is sent to the user; otherwise, it is considered that the access will not be restricted due to the high uplink signal power.
  • Method 2 The target base station directly measures the received power of the uplink signal. If the received power is greater than the power threshold set by the base station and the power threshold will not change in a short period of time, it is considered that access is restricted and an indication that access is not allowed is sent to the user; if the received power is greater than the power threshold set by the base station, but a period of time is expected After the time the power threshold will increase, it is considered that the access is temporarily restricted, and an instruction to suspend the access is sent to the user and the waiting time is configured; otherwise, it is considered that the access will not be restricted due to the excessive power of the uplink signal.
  • Manner 3 The target base station obtains user location information and its transmission power from the source base station through the core network. Calculate the distance between the user and the target base station to obtain the path loss. If the user’s transmit power after subtracting the path loss is still greater than the base station’s receive power threshold, it is considered that access is restricted, and an indication that access is not allowed is sent to the user; otherwise, it is considered that the access will not be due to the high uplink signal power. The reason is limited.
  • the base station restricts the access of users of a specific operator.
  • the base stations of different operators can be separated, so the base station of one operator can restrict the access of users of another operator.
  • operators are distinguished by PLMN identification.
  • the access restriction can be initiated by the base station or the user.
  • Method 1 Initiated by the base station.
  • the base station first transmits its own information to the user, including a list of PLMNs supported by the base station. If the PLMN that the user can access is not in the list of supported PLMNs, it is considered that the access is restricted and the user stops accessing the network; otherwise, it is considered that the access will not be restricted because the PLMN is not supported.
  • Method 2 Initiated by the user. During initial access and handover, the user judges the PLMN supported by the base station through pre-stored information. If the PLMN that the user can access is not in the list of supported PLMNs, it is considered that the access is restricted and the user stops accessing the network; otherwise, it is considered that the access will not be restricted because the PLMN is not supported.
  • the base station restricts the access of users in a specific area.
  • Satellite base stations usually have a very wide coverage area and can cover transnational countries. However, due to policy and other reasons, the base station may only serve users in a specific area, while restricting access to users in other areas.
  • access restriction can be initiated by the base station.
  • the base station can inform the user whether access is restricted in the following ways:
  • Method 1 The base station first transmits the access configuration message to the user, including the geographic range of its own service.
  • the geographic scope can be determined by a series of coordinate points. Users obtain their own location information through positioning. If the user's location is outside the service area, it is considered that the access is restricted and the user stops accessing the network; otherwise, it is considered that the access will not be restricted due to not being in the service area.
  • Method 2 If the user cannot locate his or her own location or directly access the network regardless of geographic restrictions, the base station allows the user to enter first. After completing the access, the base station measures the user's location through satellite positioning or requires the user to report location information. If the user's location is not within the geographic range served by the base station, it is considered that access is restricted, and the base station disconnects and sends an indication that access is not allowed to the user; otherwise, it is considered that access will not be restricted due to being out of the service area.
  • the target base station obtains user location information from the source base station through the core network. If the user's location is not within the geographic range served by the base station, it is considered that the access is restricted and an indication of not allowing access is sent to the user; otherwise, it is considered that the access will not be restricted due to being out of the service area.
  • the base station restricts the access of users of a specific network slice service type.
  • NR's core network supports multiple network slicing, but the types of slicing services supported by the base station may be different. If the network slice type ordered by the user from the operator is different from the slice type supported by the base station, and the slice type change is not accepted, its access should be restricted.
  • access restriction can be initiated by the base station.
  • the base station first delivers a list to the user, which contains the types of network slicing services supported by the base station. If the user's network slice type is not in the list, and the user does not allow the slice type to change, it is considered that access is restricted and the user stops accessing the network; otherwise, it is considered that access will not be restricted due to the network slice type.
  • the target base station obtains the user's slice type from the source base station through the core network and whether the user is allowed to change the slice type. If the user's slice type is not supported by the base station, and the user does not allow the slice type to change, the access is considered restricted, and the base station sends the user an indication that access is not allowed; otherwise, it is considered that the access will not be due to the network slice type. restricted.
  • the user only accesses the base station of the target type.
  • users In some private networks, in order to improve efficiency, users only access the preset base station types. For example, for an IoT network deployed outdoors in a suburban area, users can be designated to only access Air To Ground (ATG) base stations specifically designed for the network to avoid inefficient access to other general base stations.
  • ATG Air To Ground
  • access restriction can be initiated by the user.
  • the user After the user receives the base station information, it judges whether the base station is of the type that can be accessed by itself according to the base station list pre-stored in the SIM or USIM card. If the base station is not in the pre-stored list of allowed access base stations, it is considered that access is restricted and the user stops accessing the network; otherwise, it is considered that access will not be restricted due to the type of base station.
  • the base station randomly restricts the access of certain users according to the load.
  • the base station When the base station is overloaded, the received access request exceeds the capacity. In order to avoid performance degradation caused by congestion, the base station can restrict the access of certain users, even if other access restriction conditions are met.
  • access restriction can be initiated by the base station.
  • the base station divides users into multiple access categories with different priorities, and informs users whether access is restricted in the following ways:
  • Method 1 The base station directly transmits the access instruction to the user.
  • the base station sets a load threshold for each access category according to the priority. Generally, a user with a higher priority sets a higher threshold. If the load of the base station is greater than the load threshold of a certain access category, the access indication of the access category is set to not allow access or to suspend access.
  • the base station sends a list to the user, which contains the access instructions for each access category, and configures the corresponding waiting time for the suspended access instructions.
  • the access category in the list indicates that access is not allowed, the access is considered restricted, and the user stops accessing the network; if the user’s access category in the list indicates that access is suspended, it is considered Access is temporarily restricted, and the user stops accessing the network within the waiting time; otherwise, it is considered that access will not be restricted due to the access type.
  • Method 2 The base station directly transmits the random number threshold to the user for soft restriction.
  • the base station sets a random number threshold for each access category according to its own load and priority. Generally, the lower the load and the higher the priority, the higher the threshold is set for the access category.
  • the base station sends a list to the user, which contains the random number threshold for each access category. The user generates a random number locally. If the random number is greater than the threshold corresponding to the user's access category in the list, the current access is considered restricted, and the user stops accessing the network for a random period of time; otherwise, it is considered that the access will not be possible. Restricted because of the access category.
  • the base station can divide wireless resources (frequency, time, beam, etc.) to serve different users. Therefore, it can be considered to further implement wireless resource-based access restriction, that is, a base station sets different access restriction conditions for different resource blocks, so that the network configuration is more flexible and efficient.
  • the base station restricts users from accessing overloaded resource blocks.
  • Each resource block (for example, a frequency band) can be regarded as a channel.
  • new user access requests should be restricted to reduce the load.
  • access restriction can be initiated by the base station.
  • Method 1 When a user tries to access through a channel corresponding to a certain resource block, the base station estimates the load of the channel, such as the number of users that have been connected. If the load is greater than the threshold set by the base station, it is considered that access is restricted, and the base station sends a postponement indication to users who try to access the network through this channel, and configures the waiting time; otherwise, it is considered that access will not be due to resource block overload. The reason is limited.
  • the base station transmits to the user the load status of the channel corresponding to each resource block, for example, the quality of service (QoS) that the base station can provide through the channel. If the QoS available to the user is lower than the threshold due to channel overload, it is considered that the access is temporarily restricted, and the user waits for a period of time before trying to access through this channel, or try to access the channel corresponding to other resource blocks; otherwise , It is believed that access will not be restricted due to resource block overload.
  • QoS quality of service
  • different resource blocks of the base station have different attributions, and users of different attributions are restricted from accessing.
  • a satellite base station can generate dozens of beams, and the diameter of each beam can reach tens to hundreds of kilometers. Therefore, a satellite base station can cover a large area, so that different beams are located in different countries. If operators in different countries are different, the beam corresponding to each country needs to restrict access to users in other countries, so beam-based access restriction is necessary.
  • the access restriction can be initiated by the base station or the user.
  • Method 1 Initiated by the base station.
  • the base station first transmits the information of the beam to the user, including the list of PLMNs supported by the beam. If the PLMN that the user can access is not in the list of supported PLMNs, it is considered that the access is restricted and the user stops accessing the network from this beam; otherwise, it is considered that the access will not be restricted because the PLMN is not supported.
  • Method 2 Initiated by the user. During the initial access and handover, the user judges the PLMN supported by the beam through the pre-stored information. If the PLMN that the user can access is not in the list of supported PLMNs, it is considered that the access is restricted and the user stops accessing the network from this beam; otherwise, it is considered that the access will not be restricted because the PLMN is not supported.
  • this application provides an access control device
  • FIG. 4 is a schematic structural diagram of an access control device provided in an embodiment of this application.
  • the device can be used to determine whether the device allows access.
  • the access control device may be implemented by software and/or hardware, and the device is configured in the first communication node.
  • the access control apparatus mainly includes a first receiving module 31 and a determining module 32.
  • the first receiving module 31 is configured to receive an access configuration message transmitted by a second communication node.
  • the determination module 32 is configured to determine whether to access the network based on the access configuration information.
  • the device further includes: a second sending module, wherein:
  • the second sending module is configured to send the first communication node information to the second communication node, wherein the first communication node information is used by the second communication node to determine whether to allow the first communication node to access the network.
  • the determining module 32 is configured to stop accessing the network when the number of failed attempts to access the network reaches a preset number of times.
  • the access configuration message includes one or more of the following:
  • Access conditions access instructions; second communication node information.
  • the determining module 32 is configured to determine whether to access the network based on the access indication sent by the second communication node.
  • the access indication includes one or more of the following:
  • Access is allowed; access is not allowed; access is suspended.
  • the determining module 32 is configured to stop accessing the network if the access condition is not met.
  • the determining module 32 is configured to determine the node type of the current node; if the node type of the current node is not the service type of the second communication node, stop accessing the network.
  • the determining module 32 is configured to stop accessing the network when the signal power of the uplink transmission is greater than the uplink signal power threshold.
  • the determining module 32 is configured to determine the distance between the second communication node and the first communication node based on the location information of the current node; in the case that the distance is within the range of not allowing access Next, stop accessing the network.
  • the determining module 32 is configured to stop accessing the network when the location information of the current node is not within the service range of the second communication node.
  • the determining module 32 is configured to stop accessing the network when the operator required by the present node is different from the operator served by the second communication node.
  • the determining module 32 is configured to stop accessing the network when the slice type of the current node is not a slice service type supported by the second communication node, and the current node does not allow the slice type to be changed. .
  • the determining module 32 is configured to determine the time offset range and/or frequency offset range of the current node; when the time offset range exceeds the time offset range and/or the tolerable time offset range of the second communication node Or when the frequency offset range exceeds the frequency offset range that the second communication node can tolerate, stop accessing the network.
  • the determining module 32 is configured to determine a list of nodes that the current node can access; if the second communication node is not in the list of nodes that the current node can access, stop accessing the network.
  • the determining module 32 is configured to stop accessing the overloaded resource block when it is determined that the multi-access resource block is overloaded.
  • the determining module 32 is configured to stop accessing the beam of the current node when it is determined that the operator served by the beam of the current node is inconsistent with the operator of the current node.
  • the access control apparatus provided in this embodiment can execute the access control method provided in any embodiment of the present application, and has the corresponding functional modules and effects for executing the method.
  • the access control method provided in any embodiment of this application can execute the access control method provided in any embodiment of the present application, and has the corresponding functional modules and effects for executing the method.
  • the units and modules included are only divided according to the functional logic, but are not limited to the above division, as long as the corresponding function can be realized; in addition, the name of each functional unit It is only for the convenience of distinguishing each other, and is not used to limit the scope of protection of this application.
  • this application provides an access control device
  • FIG. 5 is a schematic flowchart of an access control device provided in an embodiment of this application.
  • the device can be used to determine whether the device allows access.
  • the access control device may be implemented by software and/or hardware, and the device is configured in the second communication node.
  • the access control apparatus mainly includes a first sending module 41.
  • the first sending module 41 is configured to send an access configuration message to the first communication node, where the access configuration message is used by the first communication node to determine whether to access the network.
  • the device further includes:
  • the obtaining module is configured to obtain the first communication node information; the second determining module is configured to determine whether to allow the first communication node to access the network based on the first communication node information.
  • the first communication node information includes one or more of the following:
  • the time offset range and frequency offset range of the first communication node; the uplink signal power of the first communication node; the type of the first communication node; the corresponding service operator of the first communication node; the required service range of the first communication node; the first communication The type of slicing service supported by the node; the priority category of the first communication node and the load corresponding to the priority category; the location information of the first communication node.
  • the access configuration message includes one or more of the following:
  • Access conditions access instructions; second communication node information.
  • the first sending module 41 is configured to perform one of the following operations:
  • the first sending module 41 is configured to perform one of the following operations:
  • the second communication node information is broadcast to the first communication node through broadcast signaling; the second communication node information is implicitly transmitted through the SIB type; the second communication node information is implicitly transmitted through different frequency bands, PLMN arrangements and cell IDs.
  • the access conditions include one or more of the following:
  • the second determining module is configured to determine the priority category of the first communication node; when the current node is overloaded, the first communication node with low priority is not allowed to access the network.
  • the access control apparatus provided in this embodiment can execute the access control method provided in any embodiment of the present application, and has the corresponding functional modules and effects for executing the method.
  • the access control method provided in any embodiment of this application can execute the access control method provided in any embodiment of this application.
  • the various units and modules included are only divided according to the functional logic, but are not limited to the above division, as long as the corresponding function can be realized; in addition, the name of each functional unit It is only for the convenience of distinguishing each other, and is not used to limit the scope of protection of this application.
  • FIG. 6 is a schematic structural diagram of a device provided in an embodiment of the present application.
  • the device includes a processor 610, a memory 620, an input device 630, an output device 640, and Communication device 650; the number of processors 610 in the device can be one or more.
  • one processor 610 is taken as an example; the processor 610, memory 620, input device 630, and output device 640 in the device can be connected via a bus or Other ways to connect, Figure 6 takes the bus connection as an example.
  • the memory 620 can be used to store software programs, computer-executable programs, and modules, such as program instructions/modules corresponding to the access control method in the embodiment of the present application (for example, the The first receiving module 31 and the determining module 32) are also program instructions/modules corresponding to the access control method in the embodiment of the present application (for example, the first sending module 41 in the access control device).
  • the processor 610 executes various functional applications and data processing of the device by running software programs, instructions, and modules stored in the memory 620, that is, implements any method provided in the embodiments of the present application.
  • the memory 620 may mainly include a program storage area and a data storage area.
  • the program storage area may store an operating system and an application program required by at least one function; the data storage area may store data created according to the use of the device, and the like.
  • the memory 620 may include a high-speed random access memory, and may also include a non-volatile memory, such as at least one magnetic disk storage device, a flash memory device, or other non-volatile solid-state storage devices.
  • the memory 620 may include a memory remotely provided with respect to the processor 610, and these remote memories may be connected to the device through a network. Examples of the aforementioned networks include, but are not limited to, the Internet, corporate intranets, local area networks, mobile communication networks, and combinations thereof.
  • the input device 630 may be used to receive inputted numeric or character information, and generate key signal input related to user settings and function control of the device.
  • the output device 640 may include a display device such as a display screen.
  • the communication device 650 may include a receiver and a transmitter.
  • the communication device 650 is configured to perform information transceiving and communication according to the control of the processor 610.
  • the processor 610 executes various functional applications and data processing by running programs stored in the system memory 620, such as implementing the access control method provided by the embodiment of the present application.
  • the method includes:
  • the processor 610 may also implement the technical solution of the access control method provided by any embodiment of the present application.
  • the hardware structure and function of the device please refer to the content explanation of this embodiment.
  • the processor 610 executes various functional applications and data processing by running programs stored in the system memory 620, for example, to implement the access control method provided in the embodiments of the present application,
  • the method includes:
  • the processor 610 may also implement the technical solution of the access control method provided by any embodiment of the present application.
  • the hardware structure and function of the device please refer to the content explanation of this embodiment.
  • the embodiment of the present application also provides a storage medium containing computer-executable instructions, which are used to execute an access control method when executed by a computer processor, and the method is applied to a first communication node, include:
  • An embodiment of the application provides a storage medium containing computer-executable instructions.
  • the computer-executable instructions are not limited to the method operations described above, and can also execute related access control methods provided in any embodiment of the application. operate.
  • the embodiment of the present application also provides a storage medium containing computer-executable instructions, which are used to execute an access control method when executed by a computer processor, and the method is applied to a second communication node, include:
  • An embodiment of the present application provides a storage medium containing computer-executable instructions.
  • the computer-executable instructions are not limited to the operation of the access control method described above, and can also execute the receiving method provided in any embodiment of the present application. Related operations.
  • this application can be implemented by software and necessary general-purpose hardware, or can be implemented by hardware.
  • the technical solution of this application can essentially be embodied in the form of a software product.
  • the computer software product can be stored in a computer-readable storage medium, such as a computer floppy disk, a read-only memory (Read-Only Memory, ROM), and random access Memory (Random Access Memory, RAM), flash memory (FLASH), hard disk or optical disk, etc., including several instructions to make a computer device (which can be a personal computer, server, or network device, etc.) execute the various embodiments of this application Methods.
  • the term user terminal encompasses any suitable type of wireless user equipment, such as mobile phones, portable data processing devices, portable web browsers, or vehicular mobile stations.
  • the various embodiments of the present application can be implemented in hardware or dedicated circuits, software, logic or any combination thereof.
  • some aspects may be implemented in hardware, while other aspects may be implemented in firmware or software that may be executed by a controller, microprocessor, or other computing device, although the present application is not limited thereto.
  • Computer program instructions can be assembly instructions, Instruction Set Architecture (ISA) instructions, machine instructions, machine-related instructions, microcode, firmware instructions, state setting data, or written in any combination of one or more programming languages Source code or object code.
  • ISA Instruction Set Architecture
  • the block diagram of any logic flow in the drawings of the present application may represent program steps, or may represent interconnected logic circuits, modules, and functions, or may represent a combination of program steps and logic circuits, modules, and functions.
  • the computer program can be stored on the memory.
  • the memory can be of any type suitable for the local technical environment and can be implemented using any suitable data storage technology, such as but not limited to read only memory (ROM), random access memory (RAM), optical storage devices and systems (digital multi-function optical discs) (Digital Video Disc, DVD) or Compact Disk (CD)), etc.
  • Computer-readable media may include non-transitory storage media.
  • the data processor can be any type suitable for the local technical environment, such as but not limited to general-purpose computers, special-purpose computers, microprocessors, digital signal processors (Digital Signal Processing, DSP), application specific integrated circuits (ASICs) ), programmable logic devices (Field-Programmable Gate Array, FPGA), and processors based on multi-core processor architecture.
  • DSP Digital Signal Processing
  • ASICs application specific integrated circuits
  • FPGA Field-Programmable Gate Array
  • FPGA Field-Programmable Gate Array

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本文公开一种接入控制方法、装置、设备和存储介质,所述接入控制方法包括:接收第二通信节点传递的接入配置消息;基于所述接入配置消息,确定是否接入网络。

Description

接入控制方法、装置、设备和存储介质 技术领域
本申请涉及无线通信网络,例如涉及一种接入控制方法、装置、设备和存储介质。
背景技术
在非地面网络(Non-Terrestrial Network,NTN)中,由于基站处于高空且通常具有高移动性,通信往往伴随着大时延与高多普勒。当时延与多普勒的大小超过基站容忍范围时,会导致通信质量下降甚至于用户接入失败。因此,在空间立体网络中,基站需要通过在不同场景下和时间段内对不满足特定条件的用户进行接入限制,以提高网络性能。而传统地面通信网络的机制无法满足空间立体网络下不同类型基站的多样需求。
发明内容
本申请提供一种接入控制的方法、装置、设备和存储介质。
本申请实施例提供一种接入控制方法,应用于第一通信节点,包括:
接收第二通信节点传递的接入配置消息;基于所述接入配置消息,确定是否接入网络。
本申请实施例还提供一种接入控制方法,应用于第二通信节点,包括:
向所述第一通信节点发送接入配置消息,其中,所述接入配置消息用于第一通信节点确定是否接入网络。
本申请实施例还提供一种接入控制装置,配置于第一通信节点,包括:
第一接收模块,被配置为接收第二通信节点传递的接入配置消息;确定模块,被配置为基于所述接入配置信息,确定是否接入网络。
本申请实施例还提供一种接入控制装置,配置于第二通信节点,包括:
第一发送模块,被配置为向所述第一通信节点发送接入配置消息,其中,所述接入配置消息用于第一通信节点确定是否接入网络。
本申请实施例还提供一种设备,包括:
一个或多个处理器;存储器,用于存储一个或多个程序;当所述一个或多个程序被所述一个或多个处理器执行,使得所述一个或多个处理器实现如本申 请实施例中的任意一种接入控制方法。
本申请实施例还提供一种存储介质,所述存储介质存储有计算机程序,所述计算机程序被处理器执行时实现本申请实施例中的任意一种接入控制方法。
附图说明
图1为本申请实施例提供的一种无线网络系统的结构示意图;
图2为本申请实施例提供的一种接入控制方法的流程示意图;
图3为本申请实施例提供的一种接入控制方法的流程示意图;
图4为本申请实施例提供的一种接入控制装置的结构示意图;
图5为本申请实施例提供的一种接入控制装置的流程示意图;
图6是本申请实施例提供的一种设备的结构示意图。
具体实施方式
下文中将结合附图对本申请的实施例进行说明。
在附图的流程图示出的步骤可以在诸如一组计算机可执行指令的计算机系统中执行。并且,虽然在流程图中示出了逻辑顺序,但是在某些情况下,可以以不同于此处的顺序执行所示出或描述的步骤。
本申请的技术方案可以应用于各种通信系统,例如:全球移动通讯(Global System of Mobile communication,GSM)系统、码分多址(Code Division Multiple Access,CDMA)系统、宽带码分多址(Wideband Code Division Multiple Access,WCDMA)系统、通用分组无线业务(General Packet Radio Service,GPRS)、长期演进(Long Term Evolution,LTE)系统、LIE-A(Advanced long term evolution,先进的长期演进)系统、通用移动通信系统(Universal Mobile Telecommunication System,UMTS)、以及第五代移动通信(the 5th Generation mobile communication,5G)系统等,本申请实施例并不限定。在本申请中以5G系统为例进行说明。
本申请实施例可以用于不同的制式的无线网络。无线接入网络在不同的系统中可包括不同的通信节点。图1为本申请实施例提供的一种无线网络系统的结构示意图。如图1所示,该无线网络系统100包括基站101、用户设备110、用户设备120和用户设备130。基站101分别与用户设备110、用户设备120和用户设备130之间进行无线通信。
本申请实施例中,基站可以是能和用户终端进行通信的设备。基站可以是任意一种具有无线收发功能的设备。包括但不限于:基站(NodeB)、演进型基 站(evolved NodeB,eNodeB)、5G通信系统中的基站、未来通信系统中的基站、无线保真(Wireless Fidelity,WiFi)系统中的接入节点、无线中继节点、无线回传节点等。基站还可以是云无线接入网络(Cloud Radio Access Network,CRAN)场景下的无线控制器;基站还可以是小站,传输节点(Transmission Reference Point,TRP)等,本申请实施例并不限定。
本申请实施例中,用户终端是一种具有无线收发功能的设备可以部署在陆地上,包括室内或室外、手持、穿戴或车载;也可以部署在水面上(如轮船等);还可以部署在空中(例如飞机、气球和卫星上等)。所述用户终端可以是手机(mobile phone)、平板电脑(Pad)、带无线收发功能的电脑、虚拟现实(Virtual Reality,VR)终端、增强现实(Augmented Reality,AR)终端、工业控制(industrial control)中的无线终端、无人驾驶(self driving)中的无线终端、远程医疗(remote medical)中的无线终端、智能电网(smart grid)中的无线终端、运输安全(transportation safety)中的无线终端、智慧城市(smart city)中的无线终端、智慧家庭(smart home)中的无线终端等等。本申请的实施例对应用场景不做限定。用户终端有时也可以称为终端、接入终端、用户设备(User Equipment,UE)单元、UE站、移动站、移动台、远方站、远程终端、移动设备、UE终端、无线通信设备、UE代理或UE装置等。本申请实施例并不限定。
在NTN中,由于基站处于高空且通常具有高移动性,通信往往伴随着大时延与高多普勒。当时延与多普勒的大小超过基站容忍范围时,会导致通信质量下降甚至于用户接入失败。
为了应对NTN通信中的大时延与高多普勒,可以为用户提供基站和用户的位置与速度信息,使用户能够计算出相应的时延与多普勒,并进行预补偿。如此,则不需要通过增强物理随机接入信道(Physical Random Access Channel,PRACH)来容忍接入过程中的大时延与大频偏,沿用新空口(New Radio,NR)中的PRACH格式即可完成用户接入。
然而,在不同场景下,用户获得的信息的误差不同,最终计算出的时延与多普勒也会存在不同的误差范围。如果时延与多普勒的误差范围大于对应基站的容忍范围,则即使经过预补偿,接入仍然会失败。
与此同时,用户进行时频预补偿的能力也有一定差异性,且不同用户所支持的网络类型,业务类型等也有所不同;因此,在空间立体网络中,基站需要通过在不同场景下和时间段内对不满足特定条件的用户进行接入限制,以提高网络性能。而传统地面通信网络的机制无法满足该类网络下不同类型基站的多样需求。
在一个实施例中,本申请提供一种接入控制方法,图2为本申请实施例提供的一种接入控制方法的流程示意图。该方法可以适用于确定设备是否允许接入的情况。该方法可以由本申请提供的接入控制装置执行,该接入控制装置可以由软件和/或硬件实现,所述方法应用于第一通信节点中。
如图2所示,本申请实施例提供的接入控制方法主要包括步骤S11和S12。
S11、接收第二通信节点传递的接入配置消息。
S12、基于所述接入配置消息,确定是否接入网络。
在本实施例中,所述第一通信节点可以是上述任意一种用户设备。第二通信节点可以是上述任意一种基站。
在本实施例中,接入配置消息由基站进行配置,并发送至用户设备。接入配置消息的配置方式在本实施例中不进行限定。
在一个示例性的实施方式中,所述方法还包括:
发送第一通信节点信息给第二通信节点,其中,所述第一通信节点信息用于第二通信节点判断是否允许第一通信节点接入网络。
用户可以基于接入配置信息,确定是否接入网络。相应的,基站也可以根据用户设备信息,确定是否允许用户接入。
用户首次接入网络的情况下,由用户进行发起是否接入网络的判定。在用户切换接入网络的情况下,由基站进行发起是否允许用户接入网络。
在一个示例性的实施方式中,所述方法还包括:在尝试接入网络的失败次数达到预设次数的情况下,停止接入网络。
预设次数可以由第二通信节点配置。当第二通信节点根据时频偏门限等不可变参数限制接入时,可以配置较低的预设次数以节约资源;当第二通信节点根据负载等可变参数限制接入时,可以配置较高的预设次数以提供更多接入机会。
在一个示例性的实施方式中,所述接入配置消息包括如下一个或多个:
接入条件;接入指示;第二通信节点信息。
在一个示例性的实施方式中,所述第二通信节点信息可以是基站状态信息,包括基站的位置、速度和相应的误差范围等。
第一通信节点可以根据第二通信节点信息和自身信息估计第二通信节点与自身的距离、时频偏等参数,辅助第一通信节点判断接入条件是否满足。
在一个示例性的实施方式中,所述基于所述接入配置信息,确定是否接入 网络,包括:基于第二通信节点发送的接入指示,确定是否接入网络。
在一个示例性的实施方式中,所述接入指示包括如下一个或多个:
允许接入;不允许接入;暂缓接入。
在本实施例中,如果接入指示是允许接入,则确定用户接入网络。
如果接入指示是不允许接入,则确定用户禁止接入网络。
如果接入指示是暂缓接入,则确定用户在一段时间内禁止接入网络。等待时间可由第二通信节点配置。
在一个示例性的实施方式中,所述基于所述接入配置信息,确定是否接入网络,包括:在未满足所述接入条件的情况下,停止接入网络。
在一个示例性的实施方式中,所述在未满足所述接入条件的情况下,停止接入网络,包括:
确定本节点的节点类型;在所述本节点的节点类型非第二通信节点的服务类型的情况下,停止接入网络。
在本实施例中,节点类型可以按照业务分类,例如:窄带(Narrow Band,NB)终端,LTE终端。
在本实施例中,节点类型可以按照节点所处分级确定,例如:不同的功率等级,支持的天线配置(如是否支持圆极化等);在本实施例中,节点类型可以按照节点能力确定,例如:是否支持预补偿能力等。
节点类型也可以按照站点类型进行分类,例如:普通终端,relay节点,IAB节点等。
如果本节点是普通终端,基站仅允许IAB终端接入网络,此时,普通终端应该禁止接入网络。
在一个示例性的实施方式中,所述在未满足所述接入条件的情况下,停止接入网络,包括:
在上行传输的信号功率大于上行信号功率门限的情况下,停止接入网络。
在一个示例性的实施方式中,所述在未满足所述接入条件的情况下,停止接入网络,包括:
基于本节点的位置信息确定第二通信节点和第一通信节点之间的距离;在所述距离在不允许接入范围内的情况下,停止接入网络。
在一个示例性的实施方式中,所述在未满足所述接入条件的情况下,停止接入网络,包括:
在本节点的位置信息未在所述第二通信节点的服务范围内的情况下,停止接入网络。
在本实施中的服务范围可以理解为第二通信节点可以服务的地理位置范围,即地域范围。
用户通过定位获取自身位置,并判断是否在基站服务的地域范围内。如果用户位置不在基站服务的地域范围内,则用户停止接入网络。
在一个示例性的实施方式中,所述在未满足所述接入条件的情况下,停止接入网络,包括:
在本节点所需的运营商与第二通信节点所服务的运营商不同的情况下,停止接入网络。
不同运营商的基站可以是分开的,因此一个运营商的基站可以限制另一个运营商的用户的接入。
在一个示例性的实施方式中,所述在未满足所述接入条件的情况下,停止接入网络,包括:
在本节点的切片类型非第二通信节点所支持的切片业务类型,且本节点不允许切片类型改变的情况下,停止接入网络。
在一个示例性的实施方式中,在未满足所述接入条件的情况下,停止接入网络,包括:
确定本节点的时偏范围和/或频偏范围;在所述时偏范围超过第二通信节点所能容忍的时偏范围和/或所述频偏范围超过第二通信节点所能容忍的频偏范围的情况下,停止接入网络。
在本实施例中,基站设置时偏(Timing Offset,TO)和频偏(Frequency Offset,TO)的容忍范围,限制TO或FO大于容忍范围的用户接入。
基站首先将自身状态信息与所能容忍的TO范围与FO范围告知用户。用户根据基站和自身的状态信息估计自己所能达到的TO范围与FO范围。如果TO范围或FO范围超出了基站容忍范围,则用户停止接入网络。
在一个示例性的实施方式中,在未满足所述接入条件的情况下,停止接入网络,包括:
确定本节点可接入的节点列表;在第二通信节点未在本节点可接入的节点列表的情况下,停止接入网络。
在本实施例中,节点列表内容可以是系统信息块(System information Block,SIB)种类、公共陆地移动网(Public Land Mobile Network,PLMN)安排、频 段分配、小区标识(Identifier,ID)等。第一通信节点可以根据第二通信节点信息和节点列表内容判断是否可以接入第二通信节点。
在本实施例中,初始接入时的节点列表可以通过第一通信节点本地存储信息获取。切换中接入时,节点列表还可以由源基站进行配置。
在一个示例性的实施方式中,在未满足所述接入条件的情况下,停止接入网络,包括:
在确定多接入的资源块过载的情况下,停止接入该过载的资源块。
在一个示例性的实施方式中,在未满足所述接入条件的情况下,停止接入网络,包括:
在确定本节点所处波束所服务的运营商与本节点的运营商不一致的情况下,停止接入本节点所处波束。
在一个实施例中,本申请提供一种接入控制方法,图3为本申请实施例提供的一种接入控制方法的流程示意图。该方法可以适用于确定设备是否允许接入的情况。该方法可以由本申请提供的接入控制装置执行,该接入控制装置可以由软件和/或硬件实现,所述方法应用于第二通信节点中。
如图3所示,本申请实施例提供的接入控制方法主要包括步骤S21。
S21、向所述第一通信节点发送接入配置消息,其中,所述接入配置消息用于第一通信节点确定是否接入网络。
在一个示例性的实施方式中,所述方法还包括:
获取第一通信节点信息;基于所述第一通信节点信息确定是否允许第一通信节点接入网络。
在本实施例中,在确定允许第一通信节点接入网络的情况下,生成允许接入指令,并发送至第一通信节点,以允许第一通信节点接入网络。
在确定不允许第一通信节点接入网络的情况下,生成不允许接入指令,并发送至第一通信节点,以禁止第一通信节点接入网络。
第二通信节点如何判断是否允许第一通信节点接入网络可以参考后续应用性实施例,本实施例中不再进行描述。
在一个示例性的实施方式中,所述第一通信节点信息包括如下一个或多个:
第一通信节点的时偏范围;第一通信节点的频偏范围;第一通信节点的上行信号功率;第一通信节点的类型;第一通信节点对应服务运营商;第一通信 节点所需服务范围;第一通信节点所支持的切片业务类型;第一通信节点的优先级类别和优先级类别对应的负载;第一通信节点的位置信息。
在一个示例性的实施方式中,所述接入配置消息包括如下一个或多个:
接入条件;接入指示;第二通信节点信息。
在一个示例性的实施方式中,向所述第一通信节点发送接入条件,包括以下至少之一:
将所述接入条件通过广播信令广播至第一通信节点;将所述接入条件预存在所述第一通信节点的客户识别模块(Subscriber Identity Module,SIM)卡或全球客户识别模块(Universal Subscriber Identity Module,USIM)卡中。
在一个示例性的实施方式中,向所述第一通信节点发送第二通信节点信息,包括如下一种或多种:
将所述第二通信节点信息通过广播信令广播至第一通信节点;通过SIB类型隐式传递第二通信节点信息;通过不同频段、PLMN安排和小区ID隐式传递第二通信节点信息。
在一个示例性的实施方式中,所述接入条件包括如下一个或多个:
第二通信节点所能容忍的时偏范围;第二通信节点所能容忍的频偏范围;第二通信节点设置的上行信号功率门限;第二通信节点允许接入的节点类型;第二通信节点所服务的运营商;第二通信节点的服务范围;第二通信节点所支持的切片业务类型;第一通信节点的优先级类别和优先级类别对应的负载。
在一个示例性的实施方式中,基于所述第一通信节点信息确定是否允许第一通信节点接入网络,包括:
确定第一通信节点的优先级类别;在本节点过载的情况下,不允许低优先级的第一通信节点接入网络。
在本实施例中,在本节点过载的情况下,不允许低优先级的第一通信节点接入网络,生成不允许接入指令发送至低优先级的第一通信节点,以禁止低优先级的第一通信节点接入网络。
本申请提供一种接入限制的发起与信息传递方法。
接入限制既可以在网络侧发起,也可以在用户侧发起。本申请中的网络侧可以理解为上述基站或者第二通信节点,本实施例中的用户侧可以理解为用户设备,用户终端,或者第一通信节点。
在一个应用性实例中,基站根据一定条件对用户发起接入限制。
第一种:基站获得用户的种类与状态信息,判断用户是否满足接入条件。如果不满足接入条件,则基站向用户发送不允许接入的指示来限制其接入。用户不需要知道接入限制相关信息,但其种类与状态信息需要首先被基站知道,在切换时这个条件可以得到满足。对于这种情况,用户的信息可以通过核心网从源基站传递给目标基站,基站仅需要向目标用户传递接入指示来表示是否允许接入网络即可。
第二种:基站不知道用户的种类与状态信息,但可以将接入条件传递给用户,让用户判断自己是否满足接入条件。如果不满足,则用户不会向基站发起接入。
对于第二种情况,可以考虑以下信息传递方法:
方式一:将基站接入条件通过信令广播给用户,可以通过以下子选项中的方式:
(1)在MIB或SIB等广播信令中定义一块比特域,用来传递基站的接入条件,例如基站所能容忍的时偏与频偏范围。比特域长度由接入条件决定,例如若接入条件为时频偏小于一定范围,则所需比特数由最大范围和量化精度所决定。
(2)在MIB或SIB等广播信令中定义一块比特域,用来传递基站的类型,而每种类型基站对应的接入条件事先存在用户本地。比特域长度为X=ceil(log2(NumOfBSType)),其中NumOfBSType为基站的种类数。
(3)通过SIB种类暗示性地传递基站类型。每种基站分别对应一种SIB,用户根据译码出来的SIB种类来判断基站类型。每种类型基站对应的接入条件事先存在用户本地。
(4)通过采用不同的频段、PLMN安排以及小区ID等信息来暗示性地传递基站类型。用户根据对应的信息来判断基站的种类。每种类型基站对应的接入条件事先存在用户本地。
方式二:将基站接入条件预存在用户的SIM卡或USIM卡中。用户在获得基站信息后,可以通过查找预存信息获得该基站的接入条件,不需要为传递接入条件耗费额外的信令。
若接入限制仅在部分场景或时间段下发起,则还需要在MIB或SIB中使用额外1比特使能信息来标识接入限制条件的有效性。
在一个应用性实例中,用户根据一定条件主动发起接入限制。
第一种:用户尝试接入基站,失败一定次数后停止接入该基站。这种情况 下,用户与基站间不需要额外的信令交互。
第二种:用户事先在SIM或USIM中存储了可以接入的基站类型,如果基站类型不符合要求,则用户不会发起接入。即使基站是用户可以接入的类型,用户在发起接入前也需要判断基站的接入条件是否得到满足。
接入限制可以由多种因素触发。在触发场景不同时,接入限制的发起流程与所需传递的消息内容会有所不同。本申请对于触发场景不同的接入发起流程与所需传递的消息内容依次进行说明。
在一个应用性的实施方式中,基站设置时偏(Timing Offset,TO)和频偏(Frequency Offset,TO)的容忍范围,限制TO或FO大于容忍范围的用户接入。
在NTN中,由于空中通信节点通常距离地面用户很远且具有较高的移动性,通信链路往往会受到大时延与高多普勒的影响。为了处理大时延与高多普勒,通常会为用户提供基站和用户的位置与速度信息,使用户能够计算出相应的TO与FO,并进行预补偿。然而,由于定位信息会存在一定误差,计算得到的TO与FO也会相应出现误差。如果最终残余的TO或FO过大,超过基站能够容忍的范围,则这些用户的接入应该受到限制。
在这种情况下,接入限制可以由基站发起。
在初始接入时,基站首先向用户传递接入配置消息,包括自身状态信息(位置、速度和相应的误差范围)与所能容忍的TO与FO门限。用户根据基站和自身的状态信息估计自己所能达到的TO与FO计算精度,获得预补偿后残余的TO与FO范围。如果TO的最大值大于TO门限或FO的最大值大于FO门限,则认为接入受到限制,用户停止接入网络;否则,认为接入不会因为TO与FO过大的原因受到限制。
在切换时,目标基站通过核心网从源基站中获得用户信息,估计其预补偿后残余的TO与FO范围。如果TO的最大值大于TO门限或FO的最大值大于FO门限,则认为接入受到限制,向用户发送不允许接入的指示;否则,认为接入不会因为TO与FO过大的原因受到限制。
在一个应用性的实施方式中,基站仅允许特定类型的用户接入。
不同用户硬件配置不同,具有不同的通信能力和功能,因而会划分多个用户类别(UE category)。基站可以仅服务目标类型用户,限制其他类型用户的 接入。
例如:基站仅允许功率等级(power class)足够高的用户接入,限制power class低的用户接入,以提高网络性能。此时,UE category根据用户的power class进行划分。具有不同power class的用户会被分为不同的UE category,网络可以对归属于特定UE category的用户接入进行限制。
例如:基站仅允许集成接入回程(Integrated Access and Backhaul,IAB)终端接入,主要服务于无线回程工作,因而限制普通地面用户的接入。此时,UE category根据用户的终端类型进行划分,包括普通手持终端、IAB终端等。终端类型不同的用户会被分为不同的UE category,网络可以对归属于特定UE category的用户接入进行限制。
例如:基站仅服务窄带物联网(Narrow Band Internet of Things,NB-IoT)业务类型的用户,限制LTE、NR业务类型的用户接入,以提高网络性能。此时,UE category根据用户的业务类型进行划分。具有不同业务类型的用户会被分为不同的UE category,网络可以对归属于特定UE category的用户接入进行限制。
在这些情况下,接入限制可以由基站发起。
在初始接入时,基站首先向用户传递一个列表,其中包含基站所支持的UE category。如果用户的UE category不在该列表中,则认为接入受到限制,用户停止接入网络;否则,认为接入不会因为UE category的原因受到限制。
在切换时,目标基站通过核心网从源基站中获得用户信息,得知用户的UE category。如果用户的UE category不是基站可服务的种类且基站可服务种类在短时间内不会变化,则认为接入受到限制,向用户发送不允许接入的指示;如果用户的UE category暂时不能被基站服务,但预计一段时间后可以被基站服务,则认为接入暂时受到限制,向用户发送暂缓接入的指示并配置等待时间;否则,认为接入不会因为UE category的原因受到限制。
在一个应用性的实施方式中,基站设置上行信号功率门限,限制上行信号功率大于门限的用户接入。
在多用户接入时,信号功率强的用户会对信号功率弱的用户造成严重干扰,从而降低信号功率弱的用户的接入成功率。因此,基站需要限制上行信号功率过高的用户的接入,以降低对其他用户的干扰。
在这种情况下,接入限制可以由基站发起。
在初始接入时,基站可以通过以下方式告知用户接入是否受到限制:
方式一:若用户发送功率已知,基站接收的上行信号功率由基站与用户的距离决定。因此,基站首先向用户传递接入配置消息,包括自身位置信息与限制接入的距离门限。用户根据基站和自身的位置信息估计与基站的距离。如果估计的距离小于距离门限,则认为接入受到限制,用户停止接入网络;否则,认为接入不会因为上行信号功率过高的原因受到限制。
方式二:基站直接测量上行信号的接收功率。如果接收功率大于基站设置的功率门限且功率门限在短时间内不会变化,则认为接入受到限制,向用户发送不允许接入的指示;如果接收功率大于基站设置的功率门限,但预计一段时间后功率门限会提升,则认为接入暂时受到限制,向用户发送暂缓接入的指示并配置等待时间;否则,认为接入不会因为上行信号功率过高的原因受到限制。
方式三:基站首先向用户传递接入配置消息,包括自身位置信息与限制接入的接收功率门限。用户根据基站和自身的位置信息估计与基站的距离,从而计算出路径损耗。如果用户的发送功率减去路径损耗后,仍然大于基站的接收功率门限,则认为接入受到限制,用户停止接入网络;否则,认为接入不会因为上行信号功率过高的原因受到限制。
在切换时,基站可以通过以下方式告知用户接入是否受到限制:
方式一:目标基站通过核心网从源基站中获得用户位置信息,计算用户与目标基站的距离。如果计算的距离小于距离门限,则认为接入受到限制,向用户发送不允许接入的指示;否则,认为接入不会因为上行信号功率过高的原因受到限制。
方式二:目标基站直接测量上行信号的接收功率。如果接收功率大于基站设置的功率门限且功率门限在短时间内不会变化,则认为接入受到限制,向用户发送不允许接入的指示;如果接收功率大于基站设置的功率门限,但预计一段时间后功率门限会提升,则认为接入暂时受到限制,向用户发送暂缓接入的指示并配置等待时间;否则,认为接入不会因为上行信号功率过高的原因受到限制。
方式三:目标基站通过核心网从源基站中获得用户位置信息以及其发送功率。计算用户与目标基站的距离,从而得到路径损耗。如果用户的发送功率减去路径损耗后,仍然大于基站的接收功率门限,则认为接入受到限制,向用户发送不允许接入的指示;否则,认为接入不会因为上行信号功率过高的原因受到限制。
在一个应用性的实施方式中,基站限制特定运营商的用户的接入。
不同运营商的基站可以是分开的,因此一个运营商的基站可以限制另一个运营商的用户的接入。通常,运营商通过PLMN标识进行区分。
在这种情况下,接入限制可以由基站或用户发起。
方式一:由基站发起。在初始接入及切换时,基站首先向用户传递自身信息,包括基站所支持的PLMN列表。如果用户可以接入的PLMN不在支持的PLMN列表中,则认为接入受到限制,用户停止接入网络;否则,认为接入不会因为PLMN不支持的原因受到限制。
方式二:由用户发起。在初始接入及切换时,用户通过预存信息判断基站所支持的PLMN。如果用户可以接入的PLMN不在支持的PLMN列表中,则认为接入受到限制,用户停止接入网络;否则,认为接入不会因为PLMN不支持的原因受到限制。
在一个应用性的实施方式中,基站限制特定地域的用户的接入。
卫星基站通常具有非常广的覆盖范围,可以跨国覆盖。然而,由于政策等原因,该基站可能只服务特定区域的用户,而限制其他地域用户的接入。
在这种情况下,接入限制可以由基站发起。
在初始接入时,基站可以通过以下方式告知用户接入是否受到限制:
方式一:基站首先向用户传递接入配置消息,包括自身服务的地域范围。该地域范围可以通过一系列坐标点来确定。用户通过定位获取自身位置信息。如果用户的位置在服务的地域范围以外,则认为接入受到限制,用户停止接入网络;否则,认为接入不会因为不在服务地域的原因受到限制。
方式二:用户无法定位自身位置或无视地域限制直接接入网络,则基站允许用户先进行进入。在完成接入后,基站通过卫星定位测量用户的位置或者要求用户上报位置信息。如果用户位置不在基站服务的地域范围内,则认为接入受到限制,基站断开连接并向用户发送不允许接入的指示;否则,认为接入不会因为不在服务地域的原因受到限制。
在切换时,目标基站通过核心网从源基站中获得用户位置信息。如果用户位置不在基站服务的地域范围内,则认为接入受到限制,向用户发送不允许接入的指示;否则,认为接入不会因为不在服务地域的原因受到限制。
在一个应用性的实施方式中,基站限制特定网络切片业务类型的用户的接入。
NR的核心网支持多种网络切片,但基站支持的切片业务类型可能不同。如果用户从运营商处订购的网络切片类型与基站支持的切片类型不同,且不接受切片类型的变化,则其接入应该受到限制。
在这种情况下,接入限制可以由基站发起。
在初始接入时,基站首先向用户传递一个列表,其中包含基站所支持的网络切片业务类型。如果用户的网络切片类型不在该列表中,且用户不容许切片类型的变化,则认为接入受到限制,用户停止接入网络;否则,认为接入不会因为网络切片类型的原因受到限制。
在切换时,目标基站通过核心网从源基站中获得用户的切片类型以及用户是否容许切片类型改变。如果用户的切片类型不是基站支持的种类,且用户不容许切片类型改变,则认为接入受到限制,基站向用户发送不允许接入的指示;否则,认为接入不会因为网络切片类型的原因受到限制。
在一个应用性的实施方式中,用户仅接入目标类型的基站。
在某些专用网络中,为了提高效率,用户仅接入预先设置好的基站类型。例如对于郊区室外布置的物联网网络,可以指定其用户只接入专门为该网络设计的空对地(Air To Ground,ATG)基站,以避免低效地接入其他通用基站。
在这种情况下,接入限制可以由用户发起。
在初始接入及切换时,用户接收到基站信息后,根据预存在SIM或USIM卡中的基站列表判断该基站是否为自身可接入的类型。如果该基站不在预存的允许接入基站列表中,则认为接入受到限制,用户停止接入网络;否则,认为接入不会因为基站类型的原因受到限制。
在一个应用性的实施方式中,基站根据负载随机限制某些用户的接入。
当基站过载时,接收的接入请求超出容量。为了避免拥塞造成的性能下降,基站可以限制某些用户的接入,即使其他接入限制条件都得到满足。
在这种情况下,接入限制可以由基站发起。
在初始接入及切换时,基站将用户分为多个具有不同优先级的接入类别,并通过以下方式告知用户接入是否受到限制:
方式一:基站直接向用户传递接入指示。基站根据优先级为每个接入类别设置一个负载门限,通常优先级越高的用户设置越高的门限。如果基站的负载大于某个接入类别的负载门限,则将该接入类别的接入指示设置为不允许接入 或暂缓接入。接入时,基站向用户发送一个列表,其中包含每个接入类别的接入指示,并为暂缓接入指示配置相应的等待时间。如果用户所属的接入类别在列表中的指示是不允许接入,则认为接入受到限制,用户停止接入网络;如果用户所属的接入类别在列表中的指示是暂缓接入,则认为接入暂时受到限制,用户在等待时间内停止接入网络;否则,认为接入不会因为接入类别的原因受到限制。
方式二:基站直接向用户传递随机数门限,进行软限制。基站根据自身负载和优先级为每个接入类别设置一个随机数门限,通常负载越低、优先级越高的接入类别设置越高的门限。接入时,基站向用户发送一个列表,其中包含每个接入类别的随机数门限。用户在本地生成随机数,如果随机数大于用户所属接入类别在列表中对应的门限,则认为当前接入受到限制,用户在随机的一段时间内停止接入网络;否则,认为接入不会因为接入类别的原因受到限制。
基站可以将无线资源(频率、时间、波束等)进行划分,以服务不同用户。因此,可以考虑更进一步实行基于无线资源的接入限制,即一个基站对不同的资源块设置不同的接入限制条件,使得网络配置更加灵活高效。
在一个应用性的实施方式中,基站限制用户接入过载的资源块。
每一个资源块(例如一个频段)可以视为一个信道。当该信道过载时,新的用户接入请求应该被限制,以降低负载。
在这种情况下,接入限制可以由基站发起。
方式一:当用户尝试通过某个资源块对应的信道接入时,基站估计该信道的负载,例如已接入用户数等。如果负载大于基站设置的门限值,则认为接入受到限制,基站向尝试通过该信道接入网络的用户发送暂缓的指示,并配置等待时间;否则,认为接入不会因为资源块过载的原因受到限制。
方式二:基站向用户传递各资源块对应信道的负载情况,例如基站通过该信道可提供的服务质量(Quality of Service,QoS)。如果因为信道过载,用户可获得的QoS低于门限值,则认为接入暂时受到限制,用户等待一段时间后再尝试通过该信道接入,或者尝试选择其他资源块对应的信道接入;否则,认为接入不会因为资源块过载的原因受到限制。
在一个应用性的实施方式中,基站的不同资源块归属不同,限制不同归属的用户接入。
一个卫星基站可以生成几十个波束,且每个波束的直径可达几十到几百公里。因此,一个卫星基站可以覆盖很大的面积,从而出现不同波束位于不同国家的情况。若不同国家的运营商不同,则每个国家对应的波束需要限制其他国家用户的接入,故基于波束的接入限制是必须的。
在这种情况下,接入限制可以由基站或用户发起。
方式一:由基站发起。在初始接入及切换时,基站首先向用户传递其所处波束的信息,包括该波束所支持的PLMN列表。如果用户可以接入的PLMN不在支持的PLMN列表中,则认为接入受到限制,用户停止从该波束接入网络;否则,认为接入不会因为PLMN不支持的原因受到限制。
方式二:由用户发起。在初始接入及切换时,用户通过预存信息判断所处波束所支持的PLMN。如果用户可以接入的PLMN不在支持的PLMN列表中,则认为接入受到限制,用户停止从该波束接入网络;否则,认为接入不会因为PLMN不支持的原因受到限制。
在一个实施例中,本申请提供一种接入控制装置,图4为本申请实施例提供的一种接入控制装置的结构示意图。该装置可以适用于确定设备是否允许接入的情况。该接入控制装置可以由软件和/或硬件实现,所述装置配置于第一通信节点中。
如图4所示,本申请实施例提供的接入控制装置主要包括第一接收模块31和确定模块32,其中,第一接收模块31,被配置为接收第二通信节点传递的接入配置消息;确定模块32,被配置为基于所述接入配置信息,确定是否接入网络。
在一个示例性的实施方式中,所述装置还包括:第二发送模块,其中,
所述第二发送模块,被配置为发送第一通信节点信息给第二通信节点,其中,所述第一通信节点信息用于第二通信节点判断是否允许第一通信节点接入网络。
在一个示例性的实施方式中,确定模块32,被配置为在尝试接入网络的失败次数达到预设次数的情况下,停止接入网络。
在一个示例性的实施方式中,所述接入配置消息包括如下一个或多个:
接入条件;接入指示;第二通信节点信息。
在一个示例性的实施方式中,确定模块32,被配置为基于第二通信节点发送的接入指示,确定是否接入网络。
在一个示例性的实施方式中,所述接入指示包括如下一个或多个:
允许接入;不允许接入;暂缓接入。
在一个示例性的实施方式中,确定模块32,被配置为在未满足所述接入条件的情况下,停止接入网络。
在一个示例性的实施方式中,确定模块32,被配置为确定本节点的节点类型;在所述本节点的节点类型非第二通信节点的服务类型的情况下,停止接入网络。
在一个示例性的实施方式中,确定模块32,被配置为在所述上行传输的信号功率大于上行信号功率门限的情况下,停止接入网络。
在一个示例性的实施方式中,确定模块32,被配置为基于本节点的位置信息确定第二通信节点和第一通信节点之间的距离;在所述距离在不允许接入范围内的情况下,停止接入网络。
在一个示例性的实施方式中,确定模块32,被配置为在本节点的位置信息未在所述第二通信节点的服务范围内的情况下,停止接入网络。
在一个示例性的实施方式中,确定模块32,被配置为在本节点所需的运营商与第二通信节点所服务的运营商不同的情况下,停止接入网络。
在一个示例性的实施方式中,确定模块32,被配置为在本节点的切片类型非第二通信节点所支持的切片业务类型,且本节点不允许切片类型改变的情况下,停止接入网络。
在一个示例性的实施方式中,确定模块32,被配置为确定本节点的时偏范围和/或频偏范围;在所述时偏范围超过第二通信节点所能容忍的时偏范围和/或所述频偏范围超过第二通信节点所能容忍的频偏范围的情况下,停止接入网络。
在一个示例性的实施方式中,确定模块32,被配置为确定本节点可接入的节点列表;在第二通信节点未在本节点可接入的节点列表的情况下,停止接入网络。
在一个示例性的实施方式中,确定模块32,被配置为在确定多接入的资源块过载的情况下,停止接入该过载的资源块。
在一个示例性的实施方式中,确定模块32,被配置为在确定本节点所处波束所服务的运营商与本节点的运营商不一致的情况下,停止接入本节点所处波束。
本实施例中提供的接入控制装置可执行本申请任意实施例所提供的接入控制方法,具备执行该方法相应的功能模块和效果。未在本实施例中详尽描述的 技术细节,可参见本申请任意实施例所提供的接入控制方法。
上述接入控制装置的实施例中,所包括的各个单元和模块只是按照功能逻辑进行划分的,但并不局限于上述的划分,只要能够实现相应的功能即可;另外,各功能单元的名称也只是为了便于相互区分,并不用于限制本申请的保护范围。
在一个实施例中,本申请提供一种接入控制装置,图5为本申请实施例提供的一种接入控制装置的流程示意图。该装置可以适用于确定设备是否允许接入的情况。该接入控制装置可以由软件和/或硬件实现,所述装置配置于第二通信节点中。
如图5所示,本申请实施例提供的接入控制装置主要包括第一发送模块41。其中,第一发送模块41,被配置为向所述第一通信节点发送接入配置消息,其中,所述接入配置消息用于第一通信节点确定是否接入网络。
在一个示例性的实施方式中,所述装置还包括:
获取模块,被配置为获取第一通信节点信息;第二确定模块,被配置为基于所述第一通信节点信息确定是否允许第一通信节点接入网络。
在一个示例性的实施方式中,所述第一通信节点信息包括如下一个或多个:
第一通信节点的时偏范围和频偏范围;第一通信节点的上行信号功率;第一通信节点的类型;第一通信节点对应服务运营商;第一通信节点所需服务范围;第一通信节点所支持的切片业务类型;第一通信节点的优先级类别和优先级类别对应的负载;第一通信节点的位置信息。
在一个示例性的实施方式中,所述接入配置消息包括如下一个或多个:
接入条件;接入指示;第二通信节点信息。
在一个示例性的实施方式中,第一发送模块41,被配置为执行如下操作之一:
将所述接入条件通过广播信令广播至第一通信节点;将所述接入条件预存在所述第一通信节点的SIM卡或USIM卡中。
在一个示例性的实施方式中,第一发送模块41,被配置为执行如下操作之一:
将所述第二通信节点信息通过广播信令广播至第一通信节点;通过SIB类型隐式传递第二通信节点信息;通过不同频段、PLMN安排和小区ID隐式传递第二通信节点信息。
在一个示例性的实施方式中,所述接入条件包括如下一个或多个:
第二通信节点所能容忍的时偏范围和频偏范围;第二通信节点设置的上行信号功率门限;第二通信节点允许接入的节点类型;第二通信节点所服务的运营商;第二通信节点的服务范围;第二通信节点所支持的切片业务类型;第一通信节点的优先级类别和优先级类别对应的负载。
在一个示例性的实施方式中,第二确定模块,被配置为确定第一通信节点的优先级类别;在本节点过载的情况下,不允许低优先级的第一通信节点接入网络。
本实施例中提供的接入控制装置可执行本申请任意实施例所提供的接入控制方法,具备执行该方法相应的功能模块和效果。未在本实施例中详尽描述的技术细节,可参见本申请任意实施例所提供的接入控制方法。
上述接入控制装置的实施例中,所包括的各个单元和模块只是按照功能逻辑进行划分的,但并不局限于上述的划分,只要能够实现相应的功能即可;另外,各功能单元的名称也只是为了便于相互区分,并不用于限制本申请的保护范围。
本申请实施例还提供一种设备,图6是本申请实施例提供的一种设备的结构示意图,如图6所示,该设备包括处理器610、存储器620、输入装置630、输出装置640和通信装置650;设备中处理器610的数量可以是一个或多个,图6中以一个处理器610为例;设备中的处理器610、存储器620、输入装置630和输出装置640可以通过总线或其他方式连接,图6中以通过总线连接为例。
存储器620作为一种计算机可读存储介质,可用于存储软件程序、计算机可执行程序以及模块,如本申请实施例中的接入控制方法对应的程序指令/模块(例如,接入控制装置中的第一接收模块31和确定模块32),又如本申请实施例中的接入控制方法对应的程序指令/模块(例如,接入控制装置中的第一发送模块41)。处理器610通过运行存储在存储器620中的软件程序、指令以及模块,从而执行设备的各种功能应用以及数据处理,即实现本申请实施例提供的任一方法。
存储器620可主要包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、至少一个功能所需的应用程序;存储数据区可存储根据设备的使用所创建的数据等。此外,存储器620可以包括高速随机存取存储器,还可以包括非易失性存储器,例如至少一个磁盘存储器件、闪存器件、或其 他非易失性固态存储器件。在一些实例中,存储器620可包括相对于处理器610远程设置的存储器,这些远程存储器可以通过网络连接至设备。上述网络的实例包括但不限于互联网、企业内部网、局域网、移动通信网及其组合。
输入装置630可用于接收输入的数字或字符信息,以及产生与设备的用户设置以及功能控制有关的键信号输入。输出装置640可包括显示屏等显示设备。
通信装置650可以包括接收器和发送器。通信装置650设置为根据处理器610的控制进行信息收发通信。
在上述设备是第一通信节点的情况下,处理器610通过运行存储在系统存储器620中的程序,从而执行各种功能应用以及数据处理,例如实现本申请实施例所提供的、接入控制方法,该方法包括:
接收第二通信节点传递的接入配置消息;基于所述接入配置消息,确定是否接入网络。
处理器610还可以实现本申请任意实施例所提供的接入控制方法的技术方案。该设备的硬件结构以及功能可参见本实施例的内容解释。
在上述设备是第二通信节点的情况下,处理器610通过运行存储在系统存储器620中的程序,从而执行各种功能应用以及数据处理,例如实现本申请实施例所提供的接入控制方法,该方法包括:
向所述第一通信节点发送接入配置消息,其中,所述接入配置消息用于第一通信节点确定是否接入网络。
处理器610还可以实现本申请任意实施例所提供的接入控制方法的技术方案。该设备的硬件结构以及功能可参见本实施例的内容解释。
本申请实施例还提供一种包含计算机可执行指令的存储介质,所述计算机可执行指令在由计算机处理器执行时用于执行一种接入控制方法,所述方法应用于第一通信节点,包括:
接收第二通信节点传递的接入配置消息;基于所述接入配置消息,确定是否接入网络。
本申请实施例所提供的一种包含计算机可执行指令的存储介质,其计算机可执行指令不限于如上所述的方法操作,还可以执行本申请任意实施例所提供的接入控制方法中的相关操作。
本申请实施例还提供一种包含计算机可执行指令的存储介质,所述计算 机可执行指令在由计算机处理器执行时用于执行一种接入控制方法,所述方法应用于第二通信节点,包括:
向所述第一通信节点发送接入配置消息,其中,所述接入配置消息用于第一通信节点确定是否接入网络。
本申请实施例所提供的一种包含计算机可执行指令的存储介质,其计算机可执行指令不限于如上所述的接入控制方法操作,还可以执行本申请任意实施例所提供的接收方法中的相关操作。
通过以上关于实施方式的描述,本申请可借助软件及必需的通用硬件来实现,也可以通过硬件实现。本申请的技术方案本质上可以以软件产品的形式体现出来,该计算机软件产品可以存储在计算机可读存储介质中,如计算机的软盘、只读存储器(Read-Only Memory,ROM)、随机存取存储器(Random Access Memory,RAM)、闪存(FLASH)、硬盘或光盘等,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述的方法。
术语用户终端涵盖任何适合类型的无线用户设备,例如移动电话、便携数据处理装置、便携网络浏览器或车载移动台。
一般来说,本申请的多种实施例可以在硬件或专用电路、软件、逻辑或其任何组合中实现。例如,一些方面可以被实现在硬件中,而其它方面可以被实现在可以被控制器、微处理器或其它计算装置执行的固件或软件中,尽管本申请不限于此。
本申请的实施例可以通过移动装置的数据处理器执行计算机程序指令来实现,例如在处理器实体中,或者通过硬件,或者通过软件和硬件的组合。计算机程序指令可以是汇编指令、指令集架构(Instruction Set Architecture,ISA)指令、机器指令、机器相关指令、微代码、固件指令、状态设置数据、或者以一种或多种编程语言的任意组合编写的源代码或目标代码。
本申请附图中的任何逻辑流程的框图可以表示程序步骤,或者可以表示相互连接的逻辑电路、模块和功能,或者可以表示程序步骤与逻辑电路、模块和功能的组合。计算机程序可以存储在存储器上。存储器可以具有任何适合于本地技术环境的类型并且可以使用任何适合的数据存储技术实现,例如但不限于只读存储器(ROM)、随机访问存储器(RAM)、光存储器装置和系统(数码多功能光碟(Digital Video Disc,DVD)或光盘(Compact Disk,CD))等。计算机可读介质可以包括非瞬时性存储介质。数据处理器可以是任何适合于本地技术环境的类型,例如但不限于通用计算机、专用计算机、微处理器、数字信 号处理器(Digital Signal Processing,DSP)、专用集成电路(Application Specific Integrated Circuit,ASIC)、可编程逻辑器件(Field-Programmable Gate Array,FPGA)以及基于多核处理器架构的处理器。

Claims (28)

  1. 一种接入控制方法,应用于第一通信节点,包括:
    接收第二通信节点传递的接入配置消息;
    基于所述接入配置消息,确定是否接入网络。
  2. 根据权利要求1所述的方法,还包括:
    发送第一通信节点信息给所述第二通信节点,其中,所述第一通信节点信息用于所述第二通信节点判断是否允许所述第一通信节点接入网络。
  3. 根据权利要求1所述的方法,还包括:
    在尝试接入网络的失败次数达到预设次数的情况下,停止接入网络。
  4. 根据权利要求1所述的方法,其中,所述接入配置消息包括如下至少之一:
    接入条件;
    接入指示;
    第二通信节点信息。
  5. 根据权利要求4所述的方法,其中,所述基于所述接入配置信息,确定是否接入网络,包括:
    基于所述第二通信节点发送的所述接入指示,确定是否接入网络。
  6. 根据权利要求4所述的方法,其中,所述接入指示包括如下至少之一:
    允许接入;
    不允许接入;
    暂缓接入。
  7. 根据权利要求4所述的方法,其中,所述基于所述接入配置信息,确定是否接入网络,包括:
    在未满足所述接入条件的情况下,停止接入网络。
  8. 根据权利要求7所述的方法,其中,所述在未满足所述接入条件的情况下,停止接入网络,包括:
    确定所述第一通信节点的节点类型;
    在所述第一通信节点的节点类型非所述第二通信节点的服务类型的情况下,停止接入网络。
  9. 根据权利要求7所述的方法,其中,所述在未满足所述接入条件的情况下,停止接入网络,包括:
    在上行传输的信号功率大于上行信号功率门限的情况下,停止接入网络。
  10. 根据权利要求7所述的方法,其中,所述在未满足所述接入条件的情况下,停止接入网络,包括:
    基于所述第一通信节点的位置信息确定所述第二通信节点和所述第一通信节点之间的距离;
    在所述距离在不允许接入范围内的情况下,停止接入网络。
  11. 根据权利要求7所述的方法,其中,所述在未满足所述接入条件的情况下,停止接入网络,包括:
    在本节点的位置信息未在所述第二通信节点的服务范围内的情况下,停止接入网络。
  12. 根据权利要求7所述的方法,其中,所述在未满足所述接入条件的情况下,停止接入网络,包括:
    在所述第一通信节点所需的运营商与所述第二通信节点所服务的运营商不同的情况下,停止接入网络。
  13. 根据权利要求7所述的方法,其中,所述在未满足所述接入条件的情况下,停止接入网络,包括:
    在所述第一通信节点的切片类型非所述第二通信节点所支持的切片业务类型,且所述第一通信节点不允许切片类型改变的情况下,停止接入网络。
  14. 根据权利要求7所述的方法,其中,在未满足所述接入条件的情况下,停止接入网络,包括:
    确定所述第一通信节点的时偏范围和频偏范围中的至少之一;
    在以下至少之一的情况下,停止接入网络:所述时偏范围超过所述第二通信节点所能容忍的时偏范围;所述频偏范围超过所述第二通信节点所能容忍的频偏范围。
  15. 根据权利要求7所述的方法,其中,在未满足所述接入条件的情况下,停止接入网络,包括:
    确定所述第一通信节点可接入的节点列表;
    在所述第二通信节点未在所述第一通信节点可接入的节点列表的情况下,停止接入网络。
  16. 根据权利要求7所述的方法,其中,在未满足所述接入条件的情况下,停止接入网络,包括:
    在确定多接入的资源块过载的情况下,停止接入过载的资源块。
  17. 一种接入控制方法,应用于第二通信节点,包括:
    向所述第一通信节点发送接入配置消息,其中,所述接入配置消息用于所述第一通信节点确定是否接入网络。
  18. 根据权利要求17所述的方法,还包括:
    获取第一通信节点信息;
    基于所述第一通信节点信息确定是否允许所述第一通信节点接入网络。
  19. 根据权利要求18所述的方法,其中,所述第一通信节点信息包括如下至少之一:
    所述第一通信节点的时偏范围;
    所述第一通信节点的频偏范围;
    所述第一通信节点的上行信号功率;
    所述第一通信节点的类型;
    所述第一通信节点对应服务运营商;
    所述第一通信节点所需服务范围;
    所述第一通信节点所支持的切片业务类型;
    所述第一通信节点的优先级类别和所述优先级类别对应的负载;
    所述第一通信节点的位置信息。
  20. 根据权利要求17所述的方法,其中,所述接入配置消息包括如下至少之一:
    接入条件;
    接入指示;
    第二通信节点信息。
  21. 根据权利要求20所述的方法,其中,向所述第一通信节点发送所述接入条件,包括以下至少之一:
    将所述接入条件通过广播信令广播至所述第一通信节点;
    将所述接入条件预存在所述第一通信节点的客户识别模块SIM卡或全球客户识别模块USIM卡中。
  22. 根据权利要求20所述的方法,其中,向所述第一通信节点发送所述第二 通信节点信息,包括如下至少之一:
    将所述第二通信节点信息通过广播信令广播至所述第一通信节点;
    通过系统信息块SIB类型隐式传递所述第二通信节点信息;
    通过不同频段、公共陆地移动网PLMN安排和小区标识ID隐式传递所述第二通信节点信息。
  23. 根据权利要求20所述的方法,其中,所述接入条件包括如下至少之一:
    所述第二通信节点所能容忍的时偏范围;
    所述第二通信节点所能容忍的频偏范围;
    所述第二通信节点设置的上行信号功率门限;
    所述第二通信节点允许接入的节点类型;
    所述第二通信节点所服务的运营商;
    所述第二通信节点的服务范围;
    所述第二通信节点所支持的切片业务类型;
    所述第一通信节点的优先级类别和所述优先级类别对应的负载。
  24. 根据权利要求18所述的方法,其中,所述基于所述第一通信节点信息确定是否允许所述第一通信节点接入网络,包括:
    确定所述第一通信节点的优先级类别;
    在所述第二通信节点过载,且所述第一通信节点的优先级类别为低优先级的情况下,不允许所述第一通信节点接入网络。
  25. 一种接入控制装置,配置于第一通信节点,包括:
    第一接收模块,被配置为接收第二通信节点传递的接入配置消息;
    确定模块,被配置为基于所述接入配置信息,确定是否接入网络。
  26. 一种接入控制装置,配置于第二通信节点,包括:
    第一发送模块,被配置为向所述第一通信节点发送接入配置消息,其中,所述接入配置消息用于所述第一通信节点确定是否接入网络。
  27. 一种设备,包括:
    至少一个处理器;
    存储器,被配置为存储至少一个程序;
    当所述至少一个程序被所述至少一个处理器执行,使得所至少一个处理器 实现如权利要求1-24任一项所述的接入控制方法。
  28. 一种存储介质,存储有计算机程序,所述计算机程序被处理器执行时实现权利要求1-24任一项所述的接入控制方法。
PCT/CN2021/086054 2020-04-10 2021-04-09 接入控制方法、装置、设备和存储介质 WO2021204230A1 (zh)

Priority Applications (3)

Application Number Priority Date Filing Date Title
CA3175182A CA3175182A1 (en) 2020-04-10 2021-04-09 Access control method and apparatus, and device and storage medium
EP21784700.3A EP4135408A4 (en) 2020-04-10 2021-04-09 ACCESS CONTROL METHOD AND APPARATUS, DEVICE, AND STORAGE MEDIUM
US17/918,043 US20230124820A1 (en) 2020-04-10 2021-04-09 Access control method and apparatus, and device and storage medium

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202010281177.9 2020-04-10
CN202010281177.9A CN112512095A (zh) 2020-04-10 2020-04-10 接入控制方法、装置、设备和存储介质

Publications (1)

Publication Number Publication Date
WO2021204230A1 true WO2021204230A1 (zh) 2021-10-14

Family

ID=74953246

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/086054 WO2021204230A1 (zh) 2020-04-10 2021-04-09 接入控制方法、装置、设备和存储介质

Country Status (5)

Country Link
US (1) US20230124820A1 (zh)
EP (1) EP4135408A4 (zh)
CN (1) CN112512095A (zh)
CA (1) CA3175182A1 (zh)
WO (1) WO2021204230A1 (zh)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112512095A (zh) * 2020-04-10 2021-03-16 中兴通讯股份有限公司 接入控制方法、装置、设备和存储介质
WO2023004613A1 (en) * 2021-07-28 2023-02-02 Qualcomm Incorporated Techniques for access control for user equipment
CN115915152A (zh) * 2021-08-11 2023-04-04 华为技术有限公司 集成接入和回传节点的管理方法及装置
CN116318318A (zh) * 2021-12-21 2023-06-23 华为技术有限公司 一种通信方法及装置
CN117998471A (zh) * 2022-10-28 2024-05-07 中国电信股份有限公司 基站的信息处理方法、系统以及相关设备

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104507139A (zh) * 2014-11-20 2015-04-08 大唐移动通信设备有限公司 用户设备接入的控制方法、无线网络控制器和用户设备
CN107734708A (zh) * 2016-08-12 2018-02-23 华为技术有限公司 无线网络的接入控制方法及装置
WO2018045511A1 (zh) * 2016-09-07 2018-03-15 华为技术有限公司 接入控制方法和装置
CN110972217A (zh) * 2018-09-30 2020-04-07 电信科学技术研究院有限公司 一种卫星基站接入控制方法、设备及可读存储介质
CN112512095A (zh) * 2020-04-10 2021-03-16 中兴通讯股份有限公司 接入控制方法、装置、设备和存储介质

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2014011539A (ja) * 2012-06-28 2014-01-20 Sharp Corp 移動局装置、基地局装置、通信システム、セル選択方法および集積回路
CN107852667B (zh) * 2015-07-16 2021-09-10 英特尔公司 基于设备简档配置的网络接入
US10924978B2 (en) * 2017-11-16 2021-02-16 Sharp Kabushiki Kaisha Access control methods and apparatus for radio systems

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104507139A (zh) * 2014-11-20 2015-04-08 大唐移动通信设备有限公司 用户设备接入的控制方法、无线网络控制器和用户设备
CN107734708A (zh) * 2016-08-12 2018-02-23 华为技术有限公司 无线网络的接入控制方法及装置
WO2018045511A1 (zh) * 2016-09-07 2018-03-15 华为技术有限公司 接入控制方法和装置
CN110972217A (zh) * 2018-09-30 2020-04-07 电信科学技术研究院有限公司 一种卫星基站接入控制方法、设备及可读存储介质
CN112512095A (zh) * 2020-04-10 2021-03-16 中兴通讯股份有限公司 接入控制方法、装置、设备和存储介质

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
MEDIATEK INC.: "Summary Delay-tolerant re-transmission mechanisms in NR-NTN", 3GPP DRAFT; R1-1905733-MEDIATEK-SUMMARY DELAY-TOLERANT TRANSMISSION MECHANISMS IN NR-NTN-V02, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. RAN WG1, no. Xi’an, China; 20190408 - 20190412, 10 April 2019 (2019-04-10), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France , XP051707790 *
See also references of EP4135408A4 *

Also Published As

Publication number Publication date
CA3175182A1 (en) 2021-10-14
EP4135408A1 (en) 2023-02-15
CN112512095A (zh) 2021-03-16
EP4135408A4 (en) 2024-05-15
US20230124820A1 (en) 2023-04-20

Similar Documents

Publication Publication Date Title
WO2021204230A1 (zh) 接入控制方法、装置、设备和存储介质
US11284241B2 (en) Method and apparatus for performing cell specification procedure for network slice-based NR in wireless communication system
CN113630849B (zh) 网络切片的选择方法、无线接入设备和终端
US11140654B2 (en) Method for sending paging message and related device
CN113691943B (zh) 一种定位方法及相关设备
US20210014152A1 (en) Multicast Group Creation Method, Multicast Group Joining Method, and Apparatus
CA3117004C (en) Method for obtaining capability information of terminal, apparatus, and system
WO2021136211A1 (zh) 授权结果的确定方法及装置
US20230046157A1 (en) Communication method and apparatus
US11259362B2 (en) Method for repeatedly transmitting data and device
WO2018170858A1 (zh) 寻呼方法和寻呼装置
US11310658B2 (en) Method and apparatus for determining status of terminal device, and device
US11432370B2 (en) D2D communication method and terminal device
US20220279389A1 (en) Communication Method and Apparatus
US20200162854A1 (en) Service Data Transmission Method And Apparatus
US20220330084A1 (en) Sidelink communication method and apparatus
US20220272577A1 (en) Communication method and communication apparatus
US20220210648A1 (en) Air interface information security protection method and apparatus
US11265922B2 (en) Method for accessing wireless local area network, terminal device, and network device
CN114600472B (zh) 通信方法及装置
WO2021088007A1 (zh) 无线通信的方法、终端设备和网络设备
WO2020087546A1 (zh) 一种网络信息传输方法、获取方法、网络设备及终端设备
US11191010B2 (en) System information transmission method and apparatus
US20240237033A1 (en) Communication method and apparatus, and device
CN118139100A (zh) 一种信息处理方法、装置及设备

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21784700

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 3175182

Country of ref document: CA

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 2021784700

Country of ref document: EP

Effective date: 20221110