WO2021217654A1 - Procédé et appareil de commande d'accès réseau, dispositif et support de stockage - Google Patents

Procédé et appareil de commande d'accès réseau, dispositif et support de stockage Download PDF

Info

Publication number
WO2021217654A1
WO2021217654A1 PCT/CN2020/088491 CN2020088491W WO2021217654A1 WO 2021217654 A1 WO2021217654 A1 WO 2021217654A1 CN 2020088491 W CN2020088491 W CN 2020088491W WO 2021217654 A1 WO2021217654 A1 WO 2021217654A1
Authority
WO
WIPO (PCT)
Prior art keywords
serving cell
access
terminal device
information
parameter
Prior art date
Application number
PCT/CN2020/088491
Other languages
English (en)
Chinese (zh)
Inventor
付喆
李海涛
Original Assignee
Oppo广东移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Oppo广东移动通信有限公司 filed Critical Oppo广东移动通信有限公司
Priority to CN202080098257.9A priority Critical patent/CN115399035A/zh
Priority to PCT/CN2020/088491 priority patent/WO2021217654A1/fr
Publication of WO2021217654A1 publication Critical patent/WO2021217654A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/04Wireless resource allocation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/12Wireless traffic scheduling
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/50Allocation or scheduling criteria for wireless resources
    • H04W72/54Allocation or scheduling criteria for wireless resources based on quality criteria

Definitions

  • the embodiments of the present application relate to the field of communication technologies, and in particular, to a network access control method, device, device, and storage medium.
  • the embodiments of the present application provide a network access control method, device, equipment and storage medium, which solve the problem of poor cell access control accuracy due to the existing cell access control method being unable to adapt to terminal equipment with different slicing capabilities .
  • an embodiment of the present application provides a network access control device, including: a receiving module and a processing module;
  • Processor memory, receiver, and interface for communication with network equipment
  • the processor executes the computer-executable instructions stored in the memory, so that the processor executes the method described in the second aspect above.
  • the terminal device is the device described in the third aspect
  • the network device is the device described in the fourth aspect.
  • FIG. 11 is a schematic structural diagram of Embodiment 2 of a network access control apparatus provided by this application.
  • FIG. 13 is a schematic diagram of the structure of the network equipment provided by this application.
  • RRC supports three states, RRC_IDLE, RRC_INACTIVE, and RRC_CONNECTED.
  • RRC_INACTIVE is a new state introduced in order to reduce air interface signaling, quickly restore the wireless connection between the network side and the terminal device, and quickly restore data services in the 5G network environment, which is different from RRC_IDLE and RRC_CONNECTED.
  • mobility is based on UE cell selection or reselection, there is a connection between CN-NR, the context of UE AS exists on a certain base station, and paging is triggered by the wireless access network (RAN)
  • the RAN-based paging area is managed by the RAN, and the UE location learned by the network side is based on the RAN paging area level.
  • This research project aims to study the enhancement of network slicing supported by RAN.
  • the detailed objectives of the research project are as follows (The study item aims to investigate enhancement on RAN support of network slicing. Detailed objectives of the study item are):
  • the overall idea of the technical solution of this application is: based on the introduction of slicing technology, terminal devices will have different slicing capabilities, or different slicing requirements, and therefore should also have different access blocking rules to treat slices differently.
  • a specific slice supports terminals with different capabilities. Therefore, the serving cell can broadcast its own allowable and/or supported and/or blocked information, so that the terminal device can determine whether to access according to its own slice information and the information broadcast by the serving cell.
  • the serving cell's access control and fast access control of the UE are improved.
  • the serving cell may further broadcast the slice priority corresponding to the slice identifier supported by the serving cell, that is, the access control parameter may also include the slice priority corresponding to the slice identifier supported by the serving cell.
  • the behavior of the UE may be one of the following:
  • the terminal device 120 and the network device 110 can perform wireless communication.
  • the terminal devices 120 may perform direct terminal connection (device to device, D2D) communication.
  • D2D device to device
  • the communication between the network device 110 and the terminal device 120 and between the terminal device and the terminal device can be through a licensed spectrum, or through an unlicensed spectrum, or through a license at the same time. Spectrum and unlicensed spectrum for communication.
  • the embodiment of the present application does not limit the manner of communication between the network device and the terminal device, or between the terminal devices.
  • D2D device to device
  • M2M machine to machine
  • MTC machine type communication
  • V2V vehicle to vehicle
  • S203 The terminal device obtains the access control parameters broadcast by the serving cell.
  • S204 can be implemented through the following steps:
  • this step A1 (according to the access control parameter To determine whether the terminal device can access the serving cell), including at least one of the following:
  • this step A1 (according to the information of the access control parameters, determine whether the terminal device can access Into the serving cell), including at least one of the following:
  • the serving cell prevents a terminal that supports slicing from accessing, and the terminal device can support slicing, it is considered that the information about the serving cell’s access prevention matches the information of the terminal device; if the serving cell blocks If a terminal that supports slicing is accessed, but the terminal device does not support slicing, it is considered that the information that the serving cell prevents access does not match the information of the terminal device.
  • the access control parameter is a newly added information element in the system information and/or an information element in the multiplexed system information.
  • the serving cell can broadcast the access control parameters by carrying the access control parameters in SIB1.
  • the access control parameter may be a new information element (information element, IE) introduced in SIB1, or may be a new IE introduced in a sub-IE of SIB1.
  • the sub-IE may be cell access related information (CellAccessRelatedInfo) or PLMN identity information (PLMN-IdentityInfo, which is located in the PLMN-IdentityInfoList).
  • the above-mentioned selection of the access blocking parameter is based on the meaning of the access blocking parameter and the selection of the access blocking parameter.
  • the value, whether the terminal device supports at least one of the slices, and determining whether the terminal device can access the serving cell includes at least one of the following:
  • the terminal device does not support slicing and the value of the access blocking parameter is not blocked, it is determined that the terminal device can access the serving cell.
  • the access blocking parameter when used to indicate that the terminal device that supports slicing is blocked from accessing, the above mentioned is based on the meaning of the access blocking parameter, the value of the access blocking parameter, and the terminal Whether the device supports at least one of the slices and determining whether the terminal device can access the serving cell includes at least one of the following:
  • the access blocking parameter in the access control parameter when configured, but the permission and/or support information of the serving cell is not configured, the following uses a specific embodiment to interact with a serving cell of the network device and the terminal device.
  • the access blocking parameter may be given by a single PLMN (per PLMN), or may be applicable to the entire cell (ie, common to all PLMN).
  • the UE determines whether it is bared according to the above-mentioned access barring parameter, that is, whether the access barring identifier is broadcast or the value of the broadcast. Specifically, the following methods can be used:
  • the access barring parameter appears and the value is notbarred, it means that for the UE that supports slicing, the cell status is notbarred, and the UE considers the cell status to be notbarred, and the UE can select the cell, and the UE considers the cell to be a cell Candidate cell selected/reselected. Therefore, if the UE supports slicing, it cannot access the serving cell.
  • the access barring parameter does not appear, it means that for the UE, specifically the UE that does not support slicing, the cell status is notbarred, and the UE considers the cell status to be notbarred, and the UE can select the cell.
  • the UE considers this cell as a candidate cell for cell selection/reselection. Therefore, if the UE is a UE that specifically does not support slicing, it can access the serving cell.
  • the UE ignores this parameter, or considers the cell status to be notbarred, and the UE can select the cell.
  • the UE considers this cell as a candidate cell for cell selection/reselection. Therefore, if the UE does not support slicing, it can access the serving cell.
  • the access barred parameter reuses the cellBarred parameter in the existing MIB
  • the parameter when the parameter is set to nonbarred, it means that the UE can access; when the parameter is set to barred, it means that the first type of terminal cannot access the service Cell.
  • this parameter when this parameter is set to barred, terminals that do not belong to the first type of terminal can access the serving cell.
  • the first type of terminal may include at least one of the following: a specific terminal; a terminal that does not support slicing; a terminal that supports or only supports a specific slicing.
  • the access blocking parameter reuses the information element in the system message; correspondingly, the foregoing determining whether the terminal device can access the serving cell according to the access control parameter includes at least one of the following:
  • the terminal device belongs to the first type of terminal, it is determined that the terminal device cannot access the serving cell;
  • the access blocking parameter reuses the existing information element IE in SIB1, for example, cellReservedForOtherUse
  • the parameter is not true, it means that the UE can access; when the parameter is true, it means that the first type of terminal cannot Access, UEs that do not belong to the first type of terminal can access.
  • the first type of terminal is similar to that described above, that is, the first type of terminal may include at least one of the following: a specific terminal; a terminal that does not support slicing; and a terminal that supports or only supports a specific slicing.
  • the specific terminal may be a UE that supports the 5G R16 standard and the standard before 5G R16.
  • the specific slice is, for example, the default slice.
  • the serving cell when the permission and/or support information of the serving cell is configured and appears, it can be considered that the serving cell provides the slice terminal that it allows and/or supports. In a possible design, it can allow and/or support /Or supports access of all terminals that support slicing. Therefore, when the terminal device supports slicing, it is determined that it can access the serving cell.
  • the second condition includes any of the following:
  • the slice supported by the terminal device is the same as the slice with at least one priority within the preset priority range supported by the serving cell;
  • the slice supported by the terminal device is different from at least one of the slices supported by the serving cell;
  • the service supported by the terminal device is different from the service with the preset priority supported by the serving cell at least P;
  • the slices supported by the terminal device are at least the same as the slices with the preset priority supported by the serving cell;
  • the service supported by the terminal equipment is the same as the service with the preset priority supported by the serving cell;
  • the services supported by the terminal equipment are at least the same as the services supported by the serving cell;
  • the terminal device determines whether it is bared according to the slice identifier supported or allowed by the serving cell and/or whether the slice priority is broadcast or the value of the broadcast. There are several ways:
  • the cell status is notbarred for the UE, and it considers that the UE can select the serving cell, and considers the serving cell as a candidate cell for cell selection/reselection.
  • the cell status is notbarred, it considers that the cell can be selected, and considers the serving cell as a candidate cell for cell selection/reselection.
  • Option 3 If the serving cell broadcasts the supported slice identifier and/or slice priority, on the one hand, it is determined whether the serving cell can be accessed according to the supported slice identifier of the serving cell and the slice information of the UE. Specifically:
  • the slice of the UE when the slice of the UE is the same as the slice supported by the serving cell, it is further judged whether the UE supports slices. If the UE does not support slices, it will be barred, that is, for the UE, the cell The status is barred, this type of UE is not allowed to select or reselect this cell, and the UE needs to select another cell. When the UE supports slicing, it is determined that the serving cell can be accessed.
  • the slices of the UE are Allowed S-NSSAI (NSSAI), configred S-NSSAI (NSSAI), request S-NSSAI (NSSAI); different slices means that all slice identifiers are different, or at least one of them is different; specific priority It is the highest priority supported by the serving cell, a priority within a specific priority range, a priority greater than a specific priority threshold, etc. The specific meaning of the specific priority can be determined according to the actual setting, and will not be repeated here.
  • the specific can be one or more.
  • the specific meaning needs to be determined according to the actual scenario, and will not be repeated here.
  • the terminal device Able to access the serving cell According to at least one of the presence of the access barring parameter, whether the serving cell's permission and/or support information appears, the value of the access barring parameter, the serving cell's permission and/or the value of the support information, it is determined whether the terminal device Able to access the serving cell.
  • the specific implementation scheme of this step please refer to the records in the embodiments shown in FIG. 7 to FIG. 9 below, which will not be repeated here.
  • FIG. 7 is a block diagram of Embodiment 6 of a network access control method provided by an embodiment of this application. As shown in FIG. 7, in this embodiment, the foregoing is based on whether the access blocking parameter appears, whether the permission and/or support information of the serving cell appears, the value of the access blocking parameter, and the permission and/or support information of the serving cell. At least one of the values of to determine whether the terminal device can access the serving cell, including at least one of the following:
  • the access control parameter if configured but does not appear, it can be interpreted as the terminal device preventing all terminals from accessing, and the permission and/or support information of the serving cell is configured but not appearing can be interpreted as the terminal The device does not support terminal access, therefore, the terminal device can be considered unable to access the serving cell.
  • the terminal device determines whether the terminal device can access the serving cell according to the value of the access barring parameter and/or the slice information of the terminal device.
  • the terminal device determines whether the terminal device can be based on the value of the permission and/or support information of the serving cell and/or the slice information of the terminal device. Access to the serving cell.
  • the value of the access barring parameter, the value of the serving cell's permission and/or support information, and the value of the terminal device's slice information At least one of determining whether the terminal device can access the serving cell.
  • the terminal device may need to be based on the value of the access barring parameter and the permission and/or support of the serving cell. At least one of the value of the information and the slice information of the terminal device is used to determine whether the terminal device can access the serving cell.
  • the implementation scheme of this step refer to the description in the embodiment shown in FIG. 8 or the embodiment shown in FIG. 9 below, and details are not described herein again.
  • extension scheme 1 and/or extension scheme 2 in the embodiment shown in FIG. 5 are also applicable to the embodiments of the present application. specific:
  • extension scheme 1 can be applied in step 72 and step 74 of this application, and therefore, can also be applied in the embodiments shown in FIG. 8 and/or FIG. 9 below.
  • the aforementioned extension scheme 2 can be applied to steps 71 to 74 of this application, and correspondingly, can also be applied to the embodiments shown in FIG. 8 and/or FIG. 9 below.
  • FIG. 8 is a block diagram of Embodiment 7 of a network access control method according to an embodiment of this application.
  • the above 74 is determined according to at least one of the value of the access barring parameter, the value of the service cell's permission and/or support information, and the slice information of the terminal device.
  • Whether the terminal device can access the serving cell includes at least one of the following:
  • the value of the slice information supported by the terminal device and the permission and/or support information of the serving cell meets the first condition, that is, when the slice information supported by the terminal device does not meet the permission and/or support information, it can also be determined that the terminal device cannot Access to the serving cell.
  • Another possible design is: when the terminal device determines not to block according to the access blocking parameter, it can determine whether it can be accessed by judging the permission and/or support information of the serving cell; when determining the blocking according to the access blocking parameter, determine Can't access. Specifically, when the value of the access blocking parameter is blocked, it is determined that the terminal device cannot access the serving cell, and when the value of the access blocking parameter is not blocked, according to the slice information supported by the terminal device and/or the serving cell The value of the permission and/or support information determines whether the terminal device can access the serving cell.
  • the specific implementation scheme of this possible design is similar to that shown in FIG. 8, and will not be repeated here.
  • FIG. 9 is a block diagram of Embodiment 8 of a network access control method provided by an embodiment of this application.
  • the above 74 is determined according to at least one of the value of the access barring parameter, the value of the permission and/or support information of the serving cell, and the slice information of the terminal device. Whether the terminal device can access the serving cell includes at least one of the following:
  • the terminal device determines whether the terminal device can be determined according to the slicing information of the terminal device and/or the value of the access blocking parameter Access to the serving cell.
  • Another possible design is: the permission and/or support information in the serving cell and the slice information supported by the terminal device meet the first condition, and then determine whether access is possible according to the value of the access blocking parameter, and the terminal device supports When the value of the slice information and the permission and/or support information of the serving cell meets the second condition, it is determined that access is possible.
  • the terminal device can first determine the access barring parameters, and then determine the permission and/or support information of the serving cell; it can also determine the permission and/or support information of the serving cell first, and then determine the access barring parameters.
  • the service supported by the terminal device is different from the service with the preset priority supported by the serving cell.
  • the service supported by the terminal device is the same as at least one service supported by the serving cell;
  • the first condition includes any one of the following:
  • the slice supported by the terminal device is different from at least one of the slices with preset priority supported by the serving cell;
  • the services supported by the terminal equipment are at least M different from the services supported by the serving cell;
  • the service supported by the terminal device is different from the service with the preset priority supported by the serving cell at least P;
  • the service supported by the terminal equipment is the same as the service with the preset priority supported by the serving cell;
  • the services supported by the terminal equipment are at least the same as the services supported by the serving cell;
  • the serving cell broadcasts slicing-based access control parameters; that is, the serving cell broadcasts slice-based access blocking parameters and/or permission and/or support information of the serving cell.
  • the permission and/or support information of the serving cell may include: a slice identifier supported and/or permitted by the serving cell.
  • the slice identifier can be S-NSSAI or network number NSID.
  • the UE receives the slice related information broadcast by the serving cell, such as the access barring parameter and/or the permission and/or support information of the serving cell broadcast in steps 1-2.
  • the terminal device can determine whether the cell status is indicated as barred for itself, or whether the cell status can be regarded as barred, and then determine whether it can access the network (or serving cell).
  • Option 2 If only the access barring parameter is broadcast, and the permission and/or support information of the serving cell is not broadcast, the solution in the embodiment shown in Embodiment 5 can be processed.
  • Option 3 If the access barring parameter is not broadcast, but the permission and/or support information of the serving cell is broadcast, it can be processed according to the solution of the embodiment shown in Embodiment 6.
  • the terminal device can first determine the access barring parameter, and then judge the permission and/or support information of the serving cell to determine whether To access the serving cell, it is also possible to first determine the permission and/or support information of the serving cell, then determine the access blocking parameters, and finally determine whether or not to access the serving cell.
  • the terminal device first judges the access blocking parameter, and then judges the permission and/or support information of the serving cell, and then determines whether it can access the serving cell.
  • the specific implementation process is as follows:
  • the value of the access barring parameter (access barred identifier) is notbarred, it means that all UEs can access, and therefore, the UE can access the serving cell.
  • the UE is barred and it cannot access the serving cell. If the UE does not support slicing, the UE is barred. That is, for the UE, the cell status is barred, and this type of UE is not allowed to select or reselect the cell. The UE needs to select another cell, and it cannot access the serving cell.
  • the slices of the UE are Allowed S-NSSAI (NSSAI), configred S-NSSAI (NSSAI), request S-NSSAI (NSSAI); different slices mean that all slice identifiers are different, or at least one of the slice IDs are different.
  • NSSAI Allowed S-NSSAI
  • NSSAI configred S-NSSAI
  • NSSAI request S-NSSAI
  • different slices mean that all slice identifiers are different, or at least one of the slice IDs are different.
  • the slices of the UE are Allowed S-NSSAI (NSSAI), configred S-NSSAI (NSSAI), request S-NSSAI (NSSAI); different slices means that all slice identifiers are different, or at least one of them is different; specific priority It is the highest priority supported by the serving cell, a priority within a specific priority range, a priority greater than a specific priority threshold, etc.
  • NSSAI Allowed S-NSSAI
  • NSSAI configred S-NSSAI
  • NSSAI request S-NSSAI
  • different slices means that all slice identifiers are different, or at least one of them is different; specific priority It is the highest priority supported by the serving cell, a priority within a specific priority range, a priority greater than a specific priority threshold, etc.
  • the cell status is considered notbarred, and the UE can select this Community.
  • the UE considers this cell as a candidate cell for cell selection/reselection.
  • the slices of the UE are Allowed S-NSSAI (NSSAI), configred S-NSSAI (NSSAI), request S-NSSAI (NSSAI); different slices mean that all slice identifiers are different, or at least one of the slice IDs are different.
  • NSSAI Allowed S-NSSAI
  • NSSAI configred S-NSSAI
  • NSSAI request S-NSSAI
  • different slices mean that all slice identifiers are different, or at least one of the slice IDs are different.
  • the access barred flag is barred, which means that the UE that does not support the slice is not allowed to access. If the UE does not support the slice, it is determined that the UE cannot Access the serving cell. For the UE, the access barred flag is notbarred, which means that the UE that does not support slicing is allowed to access. If the UE does not support slicing, the cell status is considered notbarred, and the UE can select the serving cell. The UE considers the serving cell as a candidate cell for cell selection/reselection, and determines that the UE can access the serving cell.
  • the UE is barred. That is, the cell status is barred for the UE, and this type of UE is not allowed to select or reselect the cell, and the UE needs to select other cells.
  • the slice of the UE is the same as the slice with a specific priority supported by the serving cell, the slice of the UE is different from the slice supported by the serving cell, and the slice of the UE has a specific priority supported by the serving cell.
  • the specific meanings of the different levels of slices are the same as those in the embodiment shown in FIG. 6, and will not be repeated here.
  • the UE can use option1 to option4 in step (2) here.
  • the serving cell by providing a network access control method based on access blocking parameters and/or based on information supported and/or permitted by the serving cell such as slice identification/slice priority, the serving cell can In the access control process, based on the different slicing capabilities or/or specific slicing capabilities of the UE, the network access process of the UE is controlled differently, and the network access control and fast access control of UEs with different slicing support capabilities are realized. Improve the accuracy of network access.
  • the receiving module 1001 is configured to receive access control parameters broadcast by a serving cell, where the access control parameters are used to indicate information that the serving cell allows and/or supports and/or prevents access;
  • the processing module 1002 is configured to determine whether the terminal device can access the serving cell according to the access control parameter.
  • the processing module 1002 is configured to determine whether the terminal device can access the serving cell according to the information of the access control parameter, specifically at least one of the following:
  • the processing module 1002 is specifically configured to determine that the terminal device can access the serving cell when the information that the serving cell allows and/or supports access matches the information of the terminal device;
  • the processing module 1002 is configured to determine whether the terminal device can access the serving cell according to the information of the access control parameter, specifically at least one of the following:
  • the processing module 1002 is specifically configured to, when the access barring parameter is not configured but the permission and/or support information of the serving cell is configured, according to the permission and/or support information and/or all information of the serving cell.
  • the slice information of the terminal device to determine whether the terminal device can access the serving cell;
  • the processing module 1002 is specifically configured to use at least one of whether the access barring parameter appears, the meaning of the access barring parameter, the value of the access barring parameter, and the slice information of the terminal device To determine whether the terminal device can access the serving cell.
  • the processing module 1002 is specifically configured to, when the access barring parameter appears, according to at least one of the meaning of the access barring parameter, the value of the access barring parameter, and the slice information of the terminal device, Determining whether the terminal device can access the serving cell;
  • the processing module 1002 is configured to use the meaning of the access barring parameter and the selection of the access barring parameter. Value, whether the terminal device supports at least one of the slices, and determining whether the terminal device can access the serving cell, specifically at least one of the following:
  • the processing module 1002 is specifically configured to determine that the terminal device can access the serving cell when the terminal device supports non-slicing;
  • the processing module 1002 is specifically configured to determine that the terminal device cannot access the serving cell when the terminal device supports slicing and the value of the access blocking parameter is blocked;
  • the processing module 1002 is configured to determine whether the terminal device can access the serving cell according to the access control parameter, specifically at least one of the following:
  • the access blocking parameter multiplexes the message element in the system message
  • the processing module 1002 is configured to determine whether the terminal device can access the serving cell according to the access control parameter, specifically at least one of the following:
  • the processing module 1002 is specifically configured to determine that the terminal device cannot access the serving cell when the value of the information element is correct and the terminal device belongs to the first type of terminal;
  • the processing module 1002 is specifically configured to determine that the terminal device can access the serving cell when the value of the information element is correct and the terminal device does not belong to the first type of terminal.
  • the information element also needs to meet at least one of the following:
  • the cell status is indicated as not blocked or not blocked, the value for the operator is not reserved, and the cell reservation element for future use is not indicated or is incorrect.
  • the first type terminal includes any one of the following:
  • the processing module 1002 is configured to determine whether the terminal device is The ability to access the serving cell is specifically:
  • the processing module 1002 is specifically configured to check whether the permission and/or support information of the serving cell appears, the content of the permission and/or support information of the serving cell, whether the terminal device supports slicing, and whether the terminal device supports slicing. At least one of the slice information determines whether the terminal device can access the serving cell.
  • the processing module 1002 is configured to, according to whether the permission and/or support information of the serving cell appears, the content of the permission and/or support information of the serving cell, and whether the terminal device supports slicing, the At least one of the slice information supported by the terminal device to determine whether the terminal device can access the serving cell is specifically at least one of the following:
  • the processing module 1002 is specifically configured to determine that the terminal device cannot access the serving cell when the permission and/or support information of the serving cell does not appear and the terminal device supports slicing;
  • the processing module 1002 is specifically configured to determine that the terminal device can access the serving cell when the permission and/or support information of the serving cell does not appear and the terminal device does not support slicing;
  • the processing module 1002 is specifically configured to, when the permission and/or support information of the serving cell appears, and the terminal device supports slicing, according to the slicing information supported by the terminal device and/or the permission and/or the serving cell Or supporting information to determine whether the terminal device can access the serving cell.
  • the processing module 1002 is specifically configured to determine that the terminal device cannot access the serving cell when the first condition is met;
  • the processing module 1002 is specifically configured to determine that the terminal device can access the serving cell when the second condition is met;
  • the first condition includes any one of the following:
  • the slices supported by the terminal device are different from the slices supported by the serving cell;
  • the slice supported by the terminal device is the same as at least one slice supported by the serving cell;
  • the slice supported by the terminal device is the same as the slice with at least one priority within the preset priority range supported by the serving cell.
  • the processing module 1002 is configured to determine whether the terminal device can access according to the access blocking parameter and the permission and/or support information of the serving cell
  • the serving cell is specifically:
  • the processing module 1002 is specifically configured to check whether the access blocking parameter appears, whether the permission and/or support information of the serving cell appears, the value of the access blocking parameter, the permission of the serving cell, and/or At least one of the values of the supporting information determines whether the terminal device can access the serving cell.
  • the processing module 1002 is configured to check whether the access barring parameter appears, whether the serving cell's permission and/or support information appears, the value of the access barring parameter, and the serving cell's permission And/or at least one of the values of the support information, determining whether the terminal device can access the serving cell, specifically at least one of the following:
  • the processing module 1002 is specifically configured to determine that the terminal device cannot access the serving cell when the access blocking parameter and the permission and/or support information of the serving cell do not appear, or determine that the terminal The device can access the serving cell;
  • the processing module 1002 is specifically configured to, when the access barring parameter appears, but the permission and/or support information of the serving cell does not appear, according to the value of the access barring parameter and/or the terminal device Slice information to determine whether the terminal device can access the serving cell;
  • the processing module 1002 is specifically configured to, when the access barring parameter does not appear, but the permission and/or support information of the serving cell appears, according to the value and/or value of the permission and/or support information of the serving cell
  • the slice information of the terminal device to determine whether the terminal device can access the serving cell
  • the processing module 1002 is specifically configured to, when both the access barring parameter and the permission and/or support information of the serving cell appear, according to the value of the access barring parameter, the permission and/or support information of the serving cell At least one of the value of the supporting information and the slice information of the terminal device determines whether the terminal device can access the serving cell.
  • the processing module 1002 is configured to, according to at least one of the value of the access barring parameter, the value of the permission and/or support information of the serving cell, and the slice information of the terminal device, Determining whether the terminal device can access the serving cell is specifically at least one of the following:
  • the processing module 1002 is specifically configured to determine that the terminal device can access the serving cell when the value of the access blocking parameter is not blocked;
  • the processing module 1002 is configured to determine whether the terminal device can access the serving cell according to the slice information supported by the terminal device and/or the value of the permission and/or support information of the serving cell , Specifically at least one of the following:
  • the processing module 1002 is specifically configured to determine that when the terminal device does not support slicing and/or the slicing information supported by the terminal device and the value of the permission and/or support information of the serving cell satisfy the first condition, determine the The terminal device cannot access the serving cell;
  • the processing module 1002 is specifically configured to determine that the terminal device supports slicing when the slicing information supported by the terminal device and the value of the permission and/or support information of the serving cell satisfy a second condition Able to access the serving cell.
  • the processing module 1002 is configured to perform according to at least one of the value of the access barring parameter, the value of the permission and/or support information of the serving cell, and the slice information of the terminal device , Determining whether the terminal device can access the serving cell is specifically at least one of the following:
  • the processing module 1002 is specifically configured to determine that the terminal device cannot access the serving cell when the slice information supported by the terminal device and the value of the permission and/or support information of the serving cell satisfy the first condition;
  • the processing module 1002 is specifically configured to: when the slice information supported by the terminal device and the value of the permission and/or support information of the serving cell satisfy the second condition, according to the slice information of the terminal device and/or the The value of the access blocking parameter determines whether the terminal device can access the serving cell.
  • the processing module 1002 is configured to determine whether the terminal device can access the serving cell according to the slice information of the terminal device and/or the value of the access blocking parameter, specifically at least one of the following one:
  • the processing module 1002 is specifically configured to determine that the terminal device can access the serving cell when the value of the access blocking parameter is not blocked;
  • the processing module 1002 is specifically configured to determine that the terminal device cannot access the serving cell when the value of the access barring parameter is barred.
  • the first condition includes any one of the following:
  • the slices supported by the terminal device are different from the slices supported by the serving cell;
  • the slices supported by the terminal device are different from the slices with the preset priority supported by the serving cell;
  • the second condition includes any one of the following:
  • the slice supported by the terminal device is the same as at least one slice supported by the serving cell;
  • the slice supported by the terminal device is the same as the slice with at least one priority within the preset priority range supported by the serving cell.
  • Terminal devices that do not support slicing
  • a terminal device that does not support the slice supported by the serving cell
  • the terminal device that does not support preset priority slices supported by the serving cell.
  • the access control parameter is a parameter for a network or a cell, or the access control parameter is a parameter for a single public land mobile network.
  • the access control parameter is carried in system information sent by the serving cell.
  • the access control parameter is a newly added information element in the system information and/or an information element in the multiplexed system information.
  • the system message may be MIB or SIB1.
  • the permission and/or support information of the serving cell represents any one of the following:
  • Prevent terminal devices that support slicing from accessing prevent terminal devices that do not support slicing, allow terminal devices that meet preset slicing information to access, and allow terminal devices that meet preset slicing information to access.
  • the service information allowed and/or supported by the serving cell includes at least one of the following: an indication of the service allowed and/or supported by the serving cell, an identifier of the service allowed and/or supported by the serving cell, and the service allowed by the serving cell And/or priority information of supported services.
  • the device provided in this embodiment is used to implement the technical solution on the terminal device side in the foregoing method embodiment, and its implementation principles and technical effects are similar, and will not be repeated here.
  • FIG. 11 is a schematic structural diagram of Embodiment 2 of a network access control apparatus provided by this application.
  • the device can be integrated in the network equipment, and can also be realized through the network equipment.
  • the apparatus may include: a determining module 1101 and a broadcasting module 1102.
  • the determining module 1101 is used to determine access control parameters of a serving cell, where the serving cell is a cell of a network device, and the access control parameters are used to indicate that the serving cell allows and/or supports and/or prevents Access information;
  • the broadcasting module 1102 is used to broadcast the access control parameters.
  • the access control parameter includes at least one of the following: an access barring parameter, and permission and/or support information of the serving cell.
  • the access control parameter information includes at least one of the following: whether the access control parameter is configured and/or appears, and the value of the access control parameter.
  • the permission and/or support information of the serving cell represents any one of the following:
  • Prevent terminal devices that support slicing from accessing prevent terminal devices that do not support slicing, allow terminal devices that meet preset slicing information to access, and allow terminal devices that meet preset slicing information to access.
  • the permission and/or support information of the serving cell includes at least one of the following:
  • the slice information allowed and/or supported by the serving cell and the service information allowed and/or supported by the serving cell.
  • the service information allowed and/or supported by the serving cell includes at least one of the following: an indication of the service allowed and/or supported by the serving cell, an identifier of the service allowed and/or supported by the serving cell, and the service allowed by the serving cell And/or priority information of supported services.
  • the terminal whose access is blocked by the serving cell includes any one of the following:
  • Terminal devices that do not support slicing
  • a terminal device that does not support the slice supported by the serving cell
  • the access control parameter is a parameter for a network or a cell, or the access control parameter is a parameter for a single public land mobile network.
  • the access control parameter is carried in the system information sent by the serving cell.
  • the access control parameter is a newly added information element in the system information and/or an information element in the multiplexed system information.
  • system message may be MIB or SIB1.
  • the device provided in this embodiment is used to implement the technical solutions on the network device side in the foregoing method embodiments, and its implementation principles and technical effects are similar, and will not be repeated here.
  • the division of the various modules of the above device is only a division of logical functions, and may be fully or partially integrated into a physical entity during actual implementation, or may be physically separated.
  • these modules can all be implemented in the form of software called by processing elements; they can also be implemented in the form of hardware; some modules can be implemented in the form of calling software by processing elements, and some of the modules can be implemented in the form of hardware.
  • the processing module may be a separate processing element, or it may be integrated in a chip of the above-mentioned device for implementation.
  • each step of the above method or each of the above modules can be completed by an integrated logic circuit of hardware in the processor element or instructions in the form of software.
  • the above modules may be one or more integrated circuits configured to implement the above methods, such as: one or more application specific integrated circuits (ASIC), or one or more microprocessors (digital signal processor, DSP), or, one or more field programmable gate arrays (FPGA), etc.
  • ASIC application specific integrated circuit
  • DSP digital signal processor
  • FPGA field programmable gate arrays
  • the processing element may be a general-purpose processor, such as a central processing unit (CPU) or other processors that can call program codes.
  • CPU central processing unit
  • these modules can be integrated together and implemented in the form of a system-on-a-chip (SOC).
  • SOC system-on-a-chip
  • the computer program product includes one or more computer instructions.
  • the computer may be a general-purpose computer, a special-purpose computer, a computer network, or other programmable devices.
  • the computer instructions may be stored in a computer-readable storage medium or transmitted from one computer-readable storage medium to another computer-readable storage medium. For example, the computer instructions may be transmitted from a website, computer, server, or data center.
  • the computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server or a data center integrated with one or more available media.
  • the usable medium may be a magnetic medium (for example, a floppy disk, a hard disk, and a magnetic tape), an optical medium (for example, a DVD), or a semiconductor medium (for example, a solid state disk (SSD)).
  • FIG. 12 is a schematic diagram of the structure of the terminal device provided by this application.
  • the terminal device may include: a processor 1201, a memory 1202, a receiver 1203, and an interface 1204 for communicating with a network device.
  • the memory 1202 stores computer execution instructions
  • the processor 1201 executes the computer-executable instructions stored in the memory 1202, so that the processor 1201 executes the technical solutions on the terminal device side in the foregoing method embodiments.
  • FIG. 13 is a schematic diagram of the structure of the network device provided by this application.
  • the network device may include: a processor 1301, a memory 1302, a transmitter 1303, and an interface 1304 for communicating with a terminal device.
  • the memory 1302 stores computer execution instructions
  • processor of the embodiment of the present application may be an integrated circuit chip with signal processing capability.
  • steps of the foregoing method embodiments may be completed by hardware integrated logic circuits in the processor or instructions in the form of software.
  • the above-mentioned processor may be a general-purpose processor, a digital signal processor (digital signal processor, DSP), an application specific integrated circuit (ASIC), a ready-made programmable gate array (field programmable gate array, FPGA) or other Programming logic devices, discrete gates or transistor logic devices, discrete hardware components.
  • the memory in the embodiments of the present application may be a volatile memory or a non-volatile memory, or may include both volatile and non-volatile memory.
  • the non-volatile memory can be read-only memory (ROM), programmable read-only memory (programmable ROM, PROM), erasable programmable read-only memory (erasable PROM, EPROM), and electrically available Erase programmable read-only memory (electrically EPROM, EEPROM) or flash memory.
  • the volatile memory may be random access memory (RAM), which is used as an external cache.
  • FIG. 14 is a schematic block diagram of a communication system provided by an embodiment of the present application. As shown in FIG. 14, the communication system 1400 includes a terminal device 1401 and a network device 1402.
  • the terminal device 1401 can be used to implement the corresponding function implemented by the terminal device in the above method
  • the network device 1402 can be used to implement the corresponding function implemented by the network device in the above method.
  • the terminal equipment and the network equipment please refer to the records in the above-mentioned embodiments, which will not be repeated here.
  • the present application also provides a computer-readable storage medium in which computer-executable instructions are stored.
  • the computer-executable instructions are executed by a processor, they are used to implement the terminal device side in the foregoing method embodiments.
  • the embodiment of the present application also provides a program, which is used to execute the technical solution of the terminal device in the foregoing method embodiment when the program is executed by the processor.
  • the embodiment of the present application also provides a program, when the program is executed by the processor, it is used to execute the technical solution on the network device side (base station) in the foregoing method embodiment.
  • An embodiment of the present application also provides a chip, which includes a processing module and a communication interface, and the processing module can execute the technical solution on the network device side in the foregoing method embodiment.
  • the disclosed system, device, and method can be implemented in other ways.
  • the device embodiments described above are merely illustrative.
  • the division of the units is only a logical function division, and there may be other divisions in actual implementation, for example, multiple units or components may be combined or It can be integrated into another system, or some features can be ignored or not implemented.
  • the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may be in electrical, mechanical or other forms.
  • All or part of the steps in the foregoing method embodiments may be implemented by a program instructing relevant hardware.
  • the aforementioned program can be stored in a readable memory.
  • the program executes the steps of the above-mentioned method embodiments; and the aforementioned memory (storage medium) includes: read-only memory (English: read-only memory, abbreviated as: ROM), RAM, flash memory, hard disk, Solid state hard disk, magnetic tape (English: magnetic tape), floppy disk (English: floppy disk), optical disc (English: optical disc) and any combination thereof.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Quality & Reliability (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Les modes de réalisation de l'invention concernent un procédé et un appareil de commande d'accès réseau, ainsi qu'un dispositif et un support de stockage. Le procédé comprend les étapes suivantes : une cellule de desserte détermine les paramètres de commande d'accès à diffuser pour indiquer que la cellule de desserte autorise et/ou prend en charge et/ou bloque l'accès aux informations; puis les paramètres de commande d'accès sont diffusés au moyen d'un dispositif réseau auquel ceux-ci appartiennent; par conséquent, un dispositif terminal situé dans la cellule de desserte reçoit les paramètres de commande d'accès diffusés par la cellule de desserte; et en fonction des paramètres de contrôle d'accès, il est déterminé si le dispositif terminal est en mesure d'accéder à la cellule de desserte. Selon l'invention, la cellule de desserte met en œuvre la commande d'accès du dispositif terminal au moyen d'informations de diffusion prises en charge et/ou autorisées et/ou interdites, puis le dispositif terminal détermine s'il est capable d'accéder à la cellule de desserte d'après les paramètres de commande d'accès reçus en combinaison avec les informations de tranche associées, ce qui permet d'améliorer la précision avec laquelle l'accès aux cellules est contrôlé.
PCT/CN2020/088491 2020-04-30 2020-04-30 Procédé et appareil de commande d'accès réseau, dispositif et support de stockage WO2021217654A1 (fr)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202080098257.9A CN115399035A (zh) 2020-04-30 2020-04-30 网络接入控制方法、装置、设备及存储介质
PCT/CN2020/088491 WO2021217654A1 (fr) 2020-04-30 2020-04-30 Procédé et appareil de commande d'accès réseau, dispositif et support de stockage

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2020/088491 WO2021217654A1 (fr) 2020-04-30 2020-04-30 Procédé et appareil de commande d'accès réseau, dispositif et support de stockage

Publications (1)

Publication Number Publication Date
WO2021217654A1 true WO2021217654A1 (fr) 2021-11-04

Family

ID=78373137

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/088491 WO2021217654A1 (fr) 2020-04-30 2020-04-30 Procédé et appareil de commande d'accès réseau, dispositif et support de stockage

Country Status (2)

Country Link
CN (1) CN115399035A (fr)
WO (1) WO2021217654A1 (fr)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120170503A1 (en) * 2010-12-30 2012-07-05 Motorola, Inc. Method and apparatus for controlling network access in a multi-technology wireless communication system
CN107734708A (zh) * 2016-08-12 2018-02-23 华为技术有限公司 无线网络的接入控制方法及装置
CN109548077A (zh) * 2017-08-11 2019-03-29 华为技术有限公司 通信方法、终端设备和网络设备
WO2019136634A1 (fr) * 2018-01-10 2019-07-18 Zte Corporation Changement de paramètres de commande d'accès dans un réseau sans fil
CN110380887A (zh) * 2018-04-13 2019-10-25 华为技术有限公司 通信方法与装置

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120170503A1 (en) * 2010-12-30 2012-07-05 Motorola, Inc. Method and apparatus for controlling network access in a multi-technology wireless communication system
CN107734708A (zh) * 2016-08-12 2018-02-23 华为技术有限公司 无线网络的接入控制方法及装置
CN109548077A (zh) * 2017-08-11 2019-03-29 华为技术有限公司 通信方法、终端设备和网络设备
WO2019136634A1 (fr) * 2018-01-10 2019-07-18 Zte Corporation Changement de paramètres de commande d'accès dans un réseau sans fil
CN110380887A (zh) * 2018-04-13 2019-10-25 华为技术有限公司 通信方法与装置

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
HUAWEI; HISILICON: "Slice-based Unified Access Control", 3GPP DRAFT; R2-1804617 SLICE-BASED UNIFIED ACCESS CONTROL, vol. RAN WG2, 6 April 2018 (2018-04-06), Sanya, China, pages 1 - 5, XP051415604 *

Also Published As

Publication number Publication date
CN115399035A (zh) 2022-11-25

Similar Documents

Publication Publication Date Title
KR102165454B1 (ko) 시스템 정보 전송 방법 및 기지국과 시스템 정보 수신 방법 및 사용자기기
US20200314720A1 (en) Cell reselection method, apparatus, and system
JP6824178B2 (ja) 特定セル確率負荷分散の装置、システム及び方法
RU2479152C1 (ru) Способ и устройство, предназначенные для поддержки услуги csg в беспроводной системе связи
AU2021200924B2 (en) Access category handling for wireless communication systems
CN110622565A (zh) 接入类别和建立原因
JP7147830B2 (ja) 無線端末及びその方法
WO2013009129A2 (fr) Procédé pour produire un rapport d'informations système dans un système de communication sans fil et dispositif pour mettre en œuvre ce procédé
TW201448626A (zh) 異質網路行動性管理
KR20150035760A (ko) 무선 통신 시스템에서 csi-rs 측정 및 보고 방법 및 이를 지원하는 장치
JPWO2008023609A1 (ja) 基地局および移動局並びにセル選択方法
JP6473458B2 (ja) 無線通信システムにおけるmo−smsに対する適応的遮断制御方法及び装置
WO2023130471A1 (fr) Procédé et appareil d'accès à une cellule, et dispositif et support de stockage lisible
WO2013112033A1 (fr) Procédé pour resélectionner une cellule dans un système de communication sans fil et appareil pour mettre en œuvre ce procédé
WO2014171887A1 (fr) Déploiement co-canal de types de porteuse nouveaux et hérités
US11844047B2 (en) System information transmission method, terminal and network-side equipment
KR20150087838A (ko) 무선 통신 시스템에서 접근 제어 방법 및 이를 지원하는 장치
CN105580438A (zh) 用于小区选择的方法和装置
US20240089957A1 (en) System information to support service based cell reselection
KR102411643B1 (ko) RRC INACTIVE 상태 Data 전송을 위한 QoS 결정과 지원 방법 및 장치
EP3949537B1 (fr) Mesures précoces quantifiées
WO2021217654A1 (fr) Procédé et appareil de commande d'accès réseau, dispositif et support de stockage
JP2023500111A (ja) 必要なシステム情報の取得に失敗した際の処理方法及び装置
WO2022236452A1 (fr) Procédé et appareil de resélection de cellule sur la base d'une tranche, dispositif, et support de stockage
US20230292349A1 (en) Method and apparatus for resource restriction

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20933134

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20933134

Country of ref document: EP

Kind code of ref document: A1