WO2022001632A1 - 接入控制方法、第一网络节点、第二网络节点及存储介质 - Google Patents

接入控制方法、第一网络节点、第二网络节点及存储介质 Download PDF

Info

Publication number
WO2022001632A1
WO2022001632A1 PCT/CN2021/099719 CN2021099719W WO2022001632A1 WO 2022001632 A1 WO2022001632 A1 WO 2022001632A1 CN 2021099719 W CN2021099719 W CN 2021099719W WO 2022001632 A1 WO2022001632 A1 WO 2022001632A1
Authority
WO
WIPO (PCT)
Prior art keywords
access control
terminal
reduced
information
capability
Prior art date
Application number
PCT/CN2021/099719
Other languages
English (en)
French (fr)
Inventor
刘旭
戴博
沙秀斌
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Priority to AU2021299783A priority Critical patent/AU2021299783B2/en
Priority to US18/014,325 priority patent/US20230247526A1/en
Priority to EP21832970.4A priority patent/EP4178268A1/en
Publication of WO2022001632A1 publication Critical patent/WO2022001632A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/22Processing or transfer of terminal data, e.g. status or physical capabilities

Definitions

  • the present application relates to a wireless communication network, for example, to an access control method, a first network node, a second network node and a storage medium.
  • a terminal with reduced capability has a lower service priority than other terminals, and requires more bandwidth resources to obtain the same data rate. If the above characteristics of REDCAP terminals are ignored, unified access control parameters are used for REDCAP terminals and other terminals for access control. For example, REDCAP terminals and other terminals with the same access control parameters are allowed to access the NR system, and REDCAP terminals are allowed to access the NR system. If more bandwidth resources are occupied, the communication efficiency and the performance of the entire system cannot be guaranteed. Due to inflexible access control and low reliability, the access of REDCAP terminals affects the communication quality of deployed terminals.
  • NR New Radio
  • the present application provides an access control method, a first network node, a second network node and a storage medium, so as to improve the flexibility and reliability of access control.
  • An embodiment of the present application provides an access control method, which is applied to a first network node, including:
  • Access control information is determined according to the target access control parameter, where the access control information includes allowing access or prohibiting access.
  • the embodiment of the present application also provides an access control method, which is applied to the second network node, including:
  • the terminal type configure a target access control parameter corresponding to the terminal type, where the target access control parameter is used to indicate access control information, and the access control information includes allowing access or prohibiting access;
  • the access control parameters are transmitted.
  • the embodiment of the present application also provides a first network node, including:
  • processors one or more processors
  • a storage device for storing one or more programs
  • the one or more processors When the one or more programs are executed by the one or more processors, the one or more processors implement the above-mentioned access control method applied to the first network node.
  • the embodiment of the present application also provides a second network node, including:
  • processors one or more processors
  • a storage device for storing one or more programs
  • the one or more processors When the one or more programs are executed by the one or more processors, the one or more processors implement the above-mentioned access control method applied to the second network node.
  • Embodiments of the present application further provide a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the program is executed by a processor, the above-mentioned access control method applied to the first network node or applied to the first network node is implemented.
  • An access control method for a network node is implemented.
  • FIG. 1 is a flowchart of an access control method provided by an embodiment
  • FIG. 3 is a schematic structural diagram of an access control apparatus according to an embodiment
  • FIG. 4 is a schematic structural diagram of an access control apparatus provided by another embodiment
  • FIG. 5 is a schematic diagram of a hardware structure of a first network node provided by an embodiment
  • FIG. 6 is a schematic diagram of a hardware structure of a second network node according to an embodiment.
  • unified access control can be performed on the terminal according to the access type (Access Category) or the access identification code (Access Identity) of the terminal.
  • access type a total of 64 categories are defined, of which Category 0-8 can be applied to the access control of NR; for the access identification code, a total of 16 categories are defined, among which, the categories 0-3, 11-15 Access control applicable to NR.
  • the REDCAP terminal Compared with other terminals in the NR system, the REDCAP terminal has a lower service priority and requires more bandwidth resources to obtain the same data rate. If the REDCAP terminal and other terminals in the NR system are controlled in a unified manner, the REDCAP terminal occupies more bandwidth resources, and the communication efficiency and the performance of the entire system cannot be guaranteed. The communication quality of the terminal is affected.
  • an access control method is provided, which can be applied to a first network node, where the first network node is, for example, a user terminal (User Equipment, UE), including a REDCAP terminal.
  • the first network node determines the target access control parameter according to the terminal type to which it belongs, and determines whether to allow access accordingly, so as to implement access control for different types of terminals respectively and improve the flexibility and reliability of access control.
  • FIG. 1 is a flowchart of an access control method provided by an embodiment. As shown in FIG. 1 , the method provided by this embodiment includes step 110 and step 120 .
  • step 110 target access control parameters are acquired according to the terminal type to which it belongs.
  • the terminals can be divided into REDCAP terminals and non-REDCAP terminals, and can also be divided into terminals that use NR access control parameters for unified access control, and terminals that use access control parameters configured for REDCAP terminals separately for access control terminal etc.
  • the first network node obtains the corresponding target access control parameter according to the terminal type to which it belongs, as the basis for access control, wherein the target access control parameter is used to indicate the access control corresponding to the terminal type to which the first network node belongs Information, ie, indicating whether the first network node of this terminal type is allowed to access.
  • the target access control parameters corresponding to each terminal type may be configured by the second network node (eg, a base station) and transmitted to the first network node.
  • step 120 access control information is determined according to the target access control parameter, where the access control information includes allowing access or prohibiting access.
  • the first network node completes the access control check according to the acquired target access control parameters, that is, determines whether the first network node allows access or prohibits access.
  • the network node initiates random access in the current target cell.
  • the access control of the first network node is enabled in the following manner: the second network node configures in a master information block (Master Information Block, MIB) information indicating whether each cell is allowed to access, for example, in the When the target cell where the first network node is located is indicated as barred, the first network node considers that access to the target cell is prohibited, and does not need to continue to read the parameters related to access control, and does not need to perform any further access. Check the access control; in the case that the target cell is indicated as allowing access, the first network node can continue to read the relevant configuration information in the System Information Block (SIB) SIB1, and complete the access according to the target access control parameters. On this basis, if the access control information corresponding to the target access control parameter is access allowed, the first network node may initiate random access in the target cell.
  • SIB System Information Block
  • the first network node is a REDCAP terminal.
  • the REDCAP terminal there are two ways to enable access control of the REDCAP terminal: The first is that the indication information configured by the second network node in the MIB is also applicable to REDCAP terminal, the REDCAP terminal needs to read the indication information first, and then according to whether the status indicated by the target cell is barred, determine whether to further read the relevant configuration and target access control parameters and determine whether to allow access; the second is, Additional indication information of whether to allow access is added to the REDCAP terminal, and the indication information only works when the target cell of the NR indicates that the access is allowed, that is, if the target cell of the NR indicates the barred state, the REDCAP terminal is in the barred state.
  • the target cell is in the barred state, and if the target cell of the NR indicates that access is allowed, then further according to whether the additional indication information is in the barred state, it is determined whether to further read the relevant configuration and target access control parameters and Determine whether to allow access.
  • the REDCAP terminal is associated with the target access control parameter related configuration of the access control classification, which can be configured in an independent SIB message.
  • the newly introduced SIB message is SIB1-REDCAP.
  • the REDCAP terminal Need to read SIB1-REDCAP to check access control, if access is allowed, continue to read other SIB messages.
  • it also includes:
  • Step 101 Determine the terminal type to which the terminal belongs according to at least one of terminal type information and terminal capability information.
  • the terminal type described by the terminal may be determined according to the bandwidth capability of the first network node. For example, terminals that support different bandwidths correspond to different types of terminals with reduced capability; or, the terminal type reported by the first network node may also be used. The category of the capability-reduced terminal is directly determined.
  • the number of target access control parameters corresponding to the first terminal with reduced capability and the number of target access control parameters corresponding to the second terminal with reduced capability may be the same or different.
  • the terminal types include reduced-capability terminal types and non-reduced-capability terminal types.
  • REDCAP terminals and non-REDCAP terminals are distinguished, and access control is performed respectively.
  • the target access control parameters and access control information corresponding to the REDCAP terminal may be the same as or different from those of the non-REDCAP terminal.
  • the access control class associated with the target access control parameter includes a reservation class in the access control class of the NR.
  • the access control category associated with the target access control parameter includes the reservation category in the Access Category of the NR.
  • the reservation classification in the Access Category of NR can be applied to the classification of REDCAP terminals, that is, according to the reservation classification in the Access Category of NR, the same parameter configuration and Defines the access control parameter configuration applied to REDCAP terminals.
  • the reserved categories in the Access Category of NR include categories 9 to 31, and categories 9 to 17 are used to configure access control parameters for REDCAP terminals.
  • the access control class associated with the target access control parameter includes a used class among the access control classes of the NR.
  • the access control category associated with the target access control parameter includes the used category in the Access Category of the NR.
  • the used category in the Access Category of the NR can be It can be used to classify the REDCAP terminal, and can also add indication information to each used classification to indicate whether the REDCAP terminal is allowed to access.
  • the method further includes: Step 102: Obtain n-bit indication information corresponding to the used classification, where the indication information is used to indicate the access control information corresponding to the used classification associated with the target access control parameter, where n is 1 or 2 or 3 or 4.
  • Category 0 to 8 of NR are used to configure target access control parameters of the REDCAP terminal, and n bits of indication information are added to Category 0 to 8 respectively, It is used to indicate whether the access control information corresponding to each terminal type is access allowed or prohibited, or whether each terminal type has a barred state consistent with the Category of the NR.
  • the n-bit indication information is only applicable to REDCAP terminals, but does not work for other terminals in NR.
  • the used class corresponds to n-bit indication information, which is used to indicate the access control information corresponding to the used class associated with the target access control parameter, where n is 1 or 2 or 3 or 4.
  • the existing classification classify a class, and use 1-bit indication information to indicate that the access control information corresponding to this class is access allowed or prohibited, or to indicate that the access control information corresponding to this class is the same as the NR
  • the existing classification it is divided into two types, and the 2-bit indication information is used to indicate that the access control information corresponding to the two types is access allowed or prohibited, or the access control information corresponding to the two types is indicated with the NR
  • the 2-bit indication information is used to indicate that the access control information corresponding to the two types is access allowed or prohibited, or the access control information corresponding to the two types is indicated with the NR
  • 3-bit indication information is used to indicate that the access control information corresponding to these three categories is access allowed or prohibited, or to indicate that the access control information corresponding to these three categories is the same as the NR
  • 3-bit indication information is used to indicate that the access control information corresponding to these three categories is access allowed or prohibited, or to indicate that the access control information corresponding to these three categories is the same as the NR
  • 4-bit indication information is used to indicate that the access control information corresponding to these four categories is access allowed or prohibited, or to indicate that the access control information corresponding to these four categories is the same as the NR
  • 4-bit indication information is used to indicate that the access control information corresponding to these four categories is access allowed or prohibited, or to indicate that the access control information corresponding to these four categories is the same as the NR
  • the access control classes associated with the target access control parameters include predefined reduced-capability terminal-specific access control classes.
  • a dedicated access control classification is defined for the REDCAP terminal.
  • a dedicated access control class is defined as one of the following:
  • the number of dedicated access control classes is 64.
  • the dedicated access control classes include access control classes for terminals with reduced capabilities, reservation classes for access control for terminals with reduced capabilities, and access control classes for terminals with reduced capabilities.
  • Operator-defined classification of access control For example, Category 0 to 8 are the types of REDCAP terminals, Categories 9 to 31 are reserved classifications of REDCAP terminals, and Categories 32 to 63 are operator-defined types for REDCAP terminals.
  • the number of dedicated access control categories is 32, and the dedicated access control categories include access control categories for terminals with reduced capabilities and reserved categories for access control for terminals with reduced capabilities.
  • Category 0-8 is the type of REDCAP terminal
  • Category 9-31 is the reserved classification of REDCAP terminal.
  • the number of dedicated access control categories is 16, and the dedicated access control categories include access control categories for terminals with reduced capabilities and reserved categories for access control for terminals with reduced capabilities.
  • a Category 0-8 is the type of REDCAP terminal
  • Category 9-15 is the reserved classification of REDCAP terminal.
  • the number of dedicated access control classes is 9, and the dedicated access control classes include access control classes of terminals with reduced capabilities.
  • Category 0 ⁇ 8 is the type of REDCAP terminal.
  • the terminal type includes at least a first terminal type with reduced capability and a second terminal type with reduced capability; wherein, the access control parameter corresponding to the first terminal type with reduced capability and the access control used by the NR terminal The parameters are the same, and the second terminal with reduced capability corresponds to the target access control parameter.
  • the first network node includes at least two types: a first REDCAP terminal and a second REDCAP terminal, wherein the first REDCAP terminal follows the Access category of NR, and performs access control according to the access control parameters and related configurations of NR
  • the second REDCAP terminal adopts the target access control parameter, and the target access control parameter is associated with the newly introduced access control classification, and the second REDCAP terminal performs the access control inspection according to the newly introduced access control classification, wherein , the newly introduced access control class may be a reserved class, a used class, or a dedicated access control class of the access control class in NR.
  • the second network node needs to provide the The access control classification configures target access control parameters, etc.
  • the terminal type includes at least a first terminal type with reduced capability and a second terminal type with reduced capability; the access control classification and the second capability associated with the target access control parameter corresponding to the terminal type with reduced capability
  • the access control classification associated with the target access control parameter corresponding to the reduced terminal type satisfies one of the following:
  • the access control classification associated with the target access control parameter corresponding to the terminal type with reduced capability and the access control classification associated with the target access control parameter corresponding to the terminal type with reduced capability are both in the access control classification of NR reserved classification;
  • the access control classification associated with the target access control parameter corresponding to the terminal type with reduced capability and the access control classification associated with the target access control parameter corresponding to the terminal type with reduced capability are both in the access control classification of NR used classification;
  • the access control classification associated with the target access control parameter corresponding to the first terminal type with reduced capability and the access control classification associated with the target access control parameter corresponding to the second terminal type with reduced capability are both predefined terminals with reduced capability Dedicated access control class.
  • the first network node includes at least two types: a first REDCAP terminal and a second REDCAP terminal. Both the first REDCAP terminal and the second REDCAP terminal use target access control parameters, and the target access control parameters are associated with the new Introduced access control classes (all are reserved classes of access control classes in NR, all are used classes, or all are dedicated access control classes), and access control is performed according to the newly introduced access control classes Check, in this case, the second network node needs to configure the corresponding target access control parameters of each access control classification for the first REDCAP terminal and the second REDCAP terminal respectively.
  • the target access control parameters corresponding to the first REDCAP terminal and the second REDCAP terminal may be configured to be the same or different.
  • the newly introduced access control classification includes:
  • the used classification of the access control classification of NR, Category classification 0 ⁇ 8, the used classification in the Access Category of NR can be used to classify REDCAP terminals, and n bits of indication information can also be added for each used classification to indicate whether the first REDCAP terminal and the second REDCAP terminal allow access.
  • the predefined terminal-specific access control classification with reduced capability is applied to the access control of the first REDCAP terminal and the second REDCAP terminal.
  • the first network node includes at least two types: a first REDCAP terminal and a second REDCAP terminal, the first REDCAP terminal and the second REDCAP terminal respectively use target access control parameters, and the target access control parameters are associated with The newly introduced access control category, the newly introduced access control category associated with the target access control parameters adopted by the first REDCAP terminal and the second REDCAP terminal may be different.
  • the second network node needs to configure target access control parameters for the first REDCAP terminal and the second REDCAP terminal respectively, and the first REDCAP terminal and the second REDCAP terminal obtain the target access control parameters according to their respective terminal types and perform access control. inspection.
  • the newly introduced access control classification includes:
  • Category classifications 0 to 4 can be applied to the classification of the first REDCAP terminal
  • Category classifications 5 to 8 can be applied to the classification of the second REDCAP terminal.
  • the n-bit indication information is respectively added by classification to indicate whether the first REDCAP terminal and the second REDCAP terminal are allowed to access.
  • the predefined terminal-specific access control classification with reduced capability is applied to the access control of the first REDCAP terminal or the second REDCAP terminal.
  • step 120 further includes:
  • the access control information is determined according to the access control parameter of the NR.
  • the first network node if it does not acquire the target access control parameters (for example, the second network node does not configure the corresponding target access control parameters for the terminal category to which it belongs), it can The access control parameter of the NR determines the access control information, and performs access control according to the access control, so as to ensure the normal operation of the service of the first network node.
  • the target access control parameters for example, the second network node does not configure the corresponding target access control parameters for the terminal category to which it belongs
  • the access control parameter of the NR determines the access control information, and performs access control according to the access control, so as to ensure the normal operation of the service of the first network node.
  • it also includes:
  • Step 130 Determine a candidate neighbor cell or a neighbor cell to be measured according to the neighbor cell list dedicated to the terminal with reduced capability, or according to the support capability information of each neighbor cell for the terminal with reduced capability in the neighbor cell list information;
  • Step 140 Reselect a target cell in the candidate neighbor cell or the neighbor cell to be measured.
  • the first network node may determine a candidate neighbor cell or a neighbor cell to be measured that supports the REDCAP terminal, and perform cell reselection in the candidate neighbor cell or the neighbor cell to be measured, that is, to reselect a cell with better communication quality As the new target cell, the neighboring cell is switched to the reselected target cell to initiate random access.
  • the second network node may configure a dedicated neighbor list for the REDCAP terminal, and when the first network node is a REDCAP terminal, the candidate neighbor cell or the neighbor cell to be measured may be determined according to the neighbor list; alternatively, the REDCAP terminal may also The candidate neighbor cell or the neighbor cell to be measured can be determined according to the information on the support capability of each neighbor cell for the REDCAP terminal in the neighbor cell list information. In this case, the second network node can broadcast whether each neighbor cell is in the neighbor cell list information. Supports the indication information of REDCAP terminal.
  • the support capability information of each adjacent cell for the terminal with reduced capability is determined according to the first indication information in the information of the same-frequency adjacent cell in the third system information block SIB3, or according to the fourth system information block SIB4 It is determined according to the second indication information in the inter-frequency adjacent cell information, or it is determined according to the same-frequency adjacent cell information or inter-frequency adjacent cell information in the terminal-specific SIB with reduced capability.
  • the neighbor cell list information includes information on the support capability of each neighbor cell for the terminal with reduced capability.
  • the second network nodes eg, base stations
  • exchange information on the support capability of each cell for the REDCAP terminal and record the support capability information for the REDCAP terminal in each neighbor cell in the neighbor cell list.
  • the second network node adds the configuration of the information about the support capability of each neighbor cell to the REDCAP terminal in the neighbor cell list information, that is, the second network node broadcasts the information indicating whether each neighbor cell supports the REDCAP terminal in the neighbor cell list information.
  • the indication information of the support capability information of each neighboring cell to the REDCAP terminal may be configured in SIB1 by the second network node, or may be configured in the downlink control information (Downlink Control Information, DCI) of scheduling SIB1.
  • DCI Downlink Control Information
  • the second network node may indicate whether each adjacent cell supports REDCAP terminals through the SIB1 message or the DCI of the scheduling SIB1, for example, whether each adjacent cell supports REDCAP terminals through SupportREDACAP ENUMERATED ⁇ true, false ⁇ , If the area supports REDCAP terminals and is re-selected as a new target cell by the first network node, in the case that the first network node is a REDCAP terminal, the first network node can further read the target access control parameters of the new target cell . Determine the access control information, and initiate random access in the new target cell when the access control information is access allowed.
  • it also includes:
  • Step 150 Receive a paging message configuration message corresponding to the terminal type to which it belongs according to the type of the terminal to which it belongs;
  • the paging message configuration message includes partial paging related parameters shared with the NR terminal and partial paging related parameters specific to the reduced capability terminal.
  • the second network node receives a paging (Paging) message sent by the core network, if the paging message includes support capability information for the REDCAP terminal, and the support capability information indicates that the second network node supports the access of the REDCAP terminal , the second network node can page the REDCAP terminal on the configured paging area.
  • the first network node is a REDCAP terminal
  • the first network node may receive a paging message configuration message according to the terminal type to which it belongs, and the paging message configuration message includes some paging-related parameters and capability reductions shared by the NR terminals. Terminal-specific partial paging-related parameters.
  • the second network node configures a dedicated paging area or a shared paging area for the REDCAP terminal, and the paging message sent by the core network to the second network node includes the support capability information for the REDCAP terminal, that is, adding REDCAP to the message Capability cell.
  • some of the paging-related parameters shared with the NR terminal include at least one of the following: a default paging cycle, and the number of paging occasions in a paging radio frame.
  • the dedicated partial paging related parameters include at least one of the following: a partial bandwidth (Band Width Part, BWP), a Physical Downlink Control Channel (Physical Downlink Control Channel, PDCCH) paging search space.
  • BWP Band Width Part
  • PDCCH Physical Downlink Control Channel
  • some paging-related parameters shared with NR terminals may include a default paging cycle (defaultPagingCycle) and the number of paging occasions (Paging Occasion) in a paging radio frame (ns), and also It may include the timing of monitoring the PDCCH at each paging occasion location, and the like.
  • the dedicated partial paging-related parameters may include BWP and PDCCH search space (Paging Search Space).
  • the configuration methods consistent with those in the NR system may be adopted; Part of the paging-related parameters (BWP and PDCCH search space) can be configured independently; or, part of the paging-related parameters, BWP and PDCCH search space shared with NR terminals are independently configured.
  • target access control parameters are configured for different terminal types, and the target access control parameters are associated with different access control classifications, correspond to different access control information, and are used as the Based on this, the reliability and flexibility of access control are improved; access control can be performed independently for REDCAP terminals, which improves the utilization efficiency of bandwidth resources and avoids the impact of the access of REDCAP terminals on the communication quality of deployed terminals;
  • the cell reselection is implemented according to the information of the support capability of the neighboring cell for the REDCAP terminal, the paging of the REDCAP terminal by the second network node is realized, and the reliability of the access of the REDCAP terminal is further improved.
  • an access control method is also provided, which can be applied to a second network node, where the second network node is, for example, a base station.
  • the operations performed by the second network node correspond to the operations performed by the first network node in the foregoing embodiment, and for technical details not described in detail in this embodiment, reference may be made to any of the foregoing embodiments.
  • FIG. 2 is a flowchart of an access control method provided by another embodiment. As shown in FIG. 2 , the method provided by this embodiment includes step 210 and step 220 .
  • a target access control parameter corresponding to the terminal type is configured according to the terminal type, where the target access control parameter is used to indicate access control information, and the access control information includes allowing access or prohibiting access. enter.
  • step 220 the access control parameters are transmitted.
  • the second network node configures corresponding target and access control parameters for different terminal types, and transmits them to the first network node as a basis for access control of the first network node, so as to realize the control of different types of terminals. Access control is performed separately to improve the flexibility and reliability of access control.
  • the terminal type is configured according to at least one of terminal type information and terminal capability information.
  • the terminal types include reduced-capability terminal types and non-reduced-capability terminal types.
  • the access control class associated with the target access control parameter includes a reservation class in the access control class of the NR.
  • the access control class associated with the target access control parameter includes a used class among the access control classes of the NR.
  • it also includes:
  • Step 201 Configure n-bit indication information corresponding to the used classification, where the indication information is used to indicate the access control information corresponding to the used classification corresponding to the target access control parameter, where n is 1 or 2 or 3 or 4.
  • the second network node uses Category 0 to 8 of NR to configure the target access control parameters of the REDCAP terminal, and adds n bits of indication information to Category 0 to 8, respectively, to indicate the type of REDCAP terminal Whether to have a barred status consistent with NR's Category.
  • the n-bit indication information is only applicable to REDCAP terminals, but does not work for other terminals in NR.
  • the n-bit indication information can be used to indicate whether the access control information corresponding to each terminal type is to allow access or prohibit access, or to indicate whether each terminal type has a barred state consistent with the Category of NR.
  • the access control class associated with the target access control parameter includes a predefined reduced capability terminal-specific access control class.
  • the dedicated access control classification is defined as one of the following:
  • the number of the dedicated access control categories is 64, and the dedicated access control categories include access control categories for terminals with reduced capabilities, reservation categories for access control of terminals with reduced capabilities, and terminals with reduced capabilities. Operator-defined classification of access control;
  • the number of the dedicated access control categories is 32, and the dedicated access control categories include access control categories for terminals with reduced capabilities and reservation categories for access control of terminals with reduced capabilities;
  • the number of the dedicated access control categories is 16, and the dedicated access control categories include access control categories for terminals with reduced capabilities and reservation categories for access control of terminals with reduced capabilities;
  • the number of the dedicated access control classes is 9, and the dedicated access control classes include access control classes of terminals with reduced capabilities.
  • the terminal type includes at least a first terminal type with reduced capability and a second terminal type with reduced capability; wherein, the access control parameter corresponding to the first terminal type with reduced capability is the same as that of the NR terminal.
  • the access control parameters of the terminals are the same, and the second terminal with reduced capability corresponds to the target access control parameters.
  • the first network node includes at least a first REDCAP terminal and a second REDCAP terminal, and for the first REDCAP terminal, the Access category of NR is followed, and the access control is performed according to the access control parameters and related configuration of NR;
  • the second network node needs to configure target access control parameters for it, and the target access control parameters are associated with the newly introduced access control classification.
  • Access control where the newly introduced access control class may be a reserved class, a used class, or a dedicated access control class of the access control class in NR.
  • the second network node needs to be REDCAP
  • Each access control category newly introduced by the terminal configures target access control parameters and the like.
  • the terminal type includes at least a first terminal type with reduced capability and a second terminal type with reduced capability; an access control classification associated with a target access control parameter corresponding to the first terminal type with reduced capability
  • the access control classification associated with the target access control parameter corresponding to the second terminal type with reduced capability satisfies one of the following:
  • the access control classification associated with the target access control parameter corresponding to the first terminal type with reduced capability and the access control classification associated with the target access control parameter corresponding to the second terminal type with reduced capability are both NR access.
  • the access control classification associated with the target access control parameter corresponding to the first terminal type with reduced capability and the access control classification associated with the target access control parameter corresponding to the second terminal type with reduced capability are both NR access. used classification in the entry control classification;
  • the access control classification associated with the target access control parameter corresponding to the terminal type with reduced capability of the first and the access control classification associated with the target access control parameter corresponding to the terminal type with reduced capability of the second capability are both predefined A dedicated access control class for terminals with reduced capabilities.
  • the first network node includes at least a first REDCAP terminal and a second REDCAP terminal
  • the second network node configures corresponding target access control parameters for both the first REDCAP terminal and the second REDCAP terminal
  • the target access control The parameters are associated with the newly introduced access control classes (all are reserved classes of access control classes in NR, all are used classes, or all are dedicated access control classes), and are performed according to the newly introduced access control classes access control.
  • step 220 further includes:
  • the access control information is determined according to the access control parameter of the NR.
  • the access control information may be determined according to the existing access control parameters of the NR.
  • the access control is performed on the first network node to ensure that the services of the first network node are normally performed.
  • it also includes at least one of the following:
  • Step 230 configure a dedicated neighbor list for the reduced capability terminal
  • Step 240 Configure information about the support capability of each neighbor cell in the neighbor cell list information for the terminal with reduced capability.
  • the second network node may configure a dedicated neighbor list for the REDCAP terminal; alternatively, the second network node configures information on the support capability of each neighbor for the REDCAP terminal in the neighbor list information, as the first network node The basis for determining candidate neighbor cells or neighbor cells to be measured. In this case, the second network node may broadcast the information indicating whether each neighbor cell supports the REDCAP terminal in the neighbor cell list information
  • the support capability information of each adjacent cell for the terminal with reduced capability is configured by the first indication information in the information of the same-frequency adjacent cell of SIB3, or is configured by the second indication information in the information of the inter-frequency adjacent cell of SIB4. Indication information configuration, or configuration through the indication information of intra-frequency adjacent cell information or inter-frequency adjacent cell in the terminal-specific SIB with reduced capability.
  • it also includes:
  • Step 250 According to the terminal type, configure a paging message configuration message corresponding to the terminal type
  • the paging message configuration message includes partial paging related parameters shared with the NR terminal and partial paging related parameters specific to the reduced capability terminal.
  • the second network node receives the paging message sent by the core network. If the paging message includes the support capability information for the REDCAP terminal, and the support capability information indicates that the second network node supports the access of the REDCAP terminal, the first Two network nodes can page the REDCAP terminal on the configured paging area.
  • the second network node also configures a paging area dedicated to the REDCAP terminal or a shared paging area, and the paging message sent by the core network to the second network node includes the support capability information for the REDCAP terminal, that is, adding REDCAP Capability to the message cell.
  • the partial paging-related parameters shared with NR terminals include at least one of the following: a default paging cycle, the number of paging occasions in a paging radio frame, ns;
  • the dedicated partial paging related parameters include at least one of the following: partial bandwidth, PDCCH paging search space.
  • the configuration methods consistent with those in the NR system may be adopted; Part of the paging-related parameters (BWP and PDCCH search space) can be configured independently; or, part of the paging-related parameters, BWP and PDCCH search space shared with NR terminals are independently configured.
  • FIG. 3 is a schematic structural diagram of an access control apparatus according to an embodiment. As shown in FIG. 3 , the access control apparatus includes: a transmission mechanism determination module 310 and a transmission module 320 .
  • the parameter obtaining module 310 is configured to obtain target access control parameters according to the terminal type to which it belongs;
  • the information determining module 320 is configured to determine access control information according to the target access control parameter, where the access control information includes access permission or access prohibition.
  • the target access control parameters are determined according to the type of the terminal to which they belong, and the access control is determined accordingly, so as to implement access control for different types of terminals respectively, thereby improving the flexibility and efficiency of access control. reliability.
  • it also includes:
  • the type determination module is configured to determine the terminal type to which it belongs according to at least one of terminal type information and terminal capability information.
  • the terminal types include reduced-capability terminal types and non-reduced-capability terminal types.
  • the access control class associated with the target access control parameter includes a reservation class in the access control class of the NR.
  • the access control class associated with the target access control parameter includes a used class among the access control classes of the NR.
  • the information acquisition module 310 is further configured to: acquire n-bit indication information corresponding to the used classification, where the indication information is used to indicate the access corresponding to the used classification associated with the target access control parameter. access control information, where n is 1 or 2 or 3 or 4.
  • the access control class associated with the target access control parameter includes a predefined reduced capability terminal-specific access control class.
  • the dedicated access control classification is defined as one of the following:
  • the number of the dedicated access control categories is 64, and the dedicated access control categories include access control categories for terminals with reduced capabilities, reservation categories for access control of terminals with reduced capabilities, and terminals with reduced capabilities. Operator-defined classification of access control;
  • the number of the dedicated access control categories is 32, and the dedicated access control categories include access control categories for terminals with reduced capabilities and reservation categories for access control of terminals with reduced capabilities;
  • the number of the dedicated access control categories is 16, and the dedicated access control categories include access control categories for terminals with reduced capabilities and reservation categories for access control of terminals with reduced capabilities;
  • the number of the dedicated access control classes is 9, and the dedicated access control classes include access control classes of terminals with reduced capabilities.
  • the terminal types include at least a first terminal type with reduced capability and a second terminal type with reduced capability;
  • the access control parameter corresponding to the terminal type with reduced capability of the first is the same as the access control parameter adopted by the terminal of NR, and the terminal with reduced capability of the second corresponds to the target access control parameter.
  • the terminal types include at least a first terminal type with reduced capability and a second terminal type with reduced capability;
  • the access control classification associated with the target access control parameter corresponding to the first terminal type with reduced capability and the access control classification associated with the target access control parameter corresponding to the second terminal type with reduced capability satisfy one of the following:
  • the access control classification associated with the target access control parameter corresponding to the first terminal type with reduced capability and the access control classification associated with the target access control parameter corresponding to the second terminal type with reduced capability are both NR access.
  • the access control classification associated with the target access control parameter corresponding to the first terminal type with reduced capability and the access control classification associated with the target access control parameter corresponding to the second terminal type with reduced capability are both NR access. used classification in the entry control classification;
  • the access control classification associated with the target access control parameter corresponding to the terminal type with reduced capability of the first and the access control classification associated with the target access control parameter corresponding to the terminal type with reduced capability of the second capability are both predefined A dedicated access control class for terminals with reduced capabilities.
  • the information determination module 320 is further configured to:
  • the access control information is determined according to the access control parameter of the NR.
  • it also includes:
  • the neighbor cell determination module is set to determine the candidate neighbor cell or the neighbor cell to be measured according to the neighbor cell list dedicated to the terminal with reduced capability, or according to the support capability information of each neighbor cell for the terminal with reduced capability in the neighbor cell list information ;
  • the reselection module is configured to reselect the target cell in the candidate neighboring cell or the neighboring cell to be measured.
  • the support capability information of each adjacent cell for the terminal with reduced capability is determined according to the first indication information in the information of the same-frequency adjacent cell in the third system information block SIB3, or according to the fourth system information block SIB4 It is determined according to the second indication information in the inter-frequency adjacent cell information, or it is determined according to the same-frequency adjacent cell information or inter-frequency adjacent cell information in the terminal-specific SIB with reduced capability.
  • it also includes:
  • a message receiving module configured to receive a paging message configuration message corresponding to the terminal type to which it belongs according to the terminal type to which it belongs;
  • the paging message configuration message includes partial paging related parameters shared with the NR terminal and partial paging related parameters specific to the reduced capability terminal.
  • the partial paging-related parameters shared with NR terminals include at least one of the following: a default paging cycle, and the number of paging occasions in a paging radio frame;
  • the dedicated partial paging related parameters include at least one of the following: partial bandwidth, PDCCH paging search space.
  • the access control apparatus proposed in this embodiment and the access control method applied to the first network node proposed in the above embodiments belong to the same inventive concept.
  • FIG. 4 is a schematic structural diagram of an access control apparatus according to another embodiment. As shown in FIG. 4 , the access control apparatus includes: a transmission mechanism determination module 310 and a transmission module 320 .
  • the parameter configuration module 410 is configured to configure a target access control parameter corresponding to the terminal type according to the terminal type, where the target access control parameter is used to indicate access control information, and the access control information includes allowing access or Access prohibited;
  • the transmission module 420 is configured to transmit the access control parameter.
  • the access control apparatus of this embodiment configures the corresponding target and access control parameters for different terminal types, and transmits them to the first network node as a basis for access control of the first network node, thereby realizing the control of different types of terminals.
  • the terminals perform access control respectively, which improves the flexibility and reliability of the access control.
  • the terminal type is configured according to at least one of terminal type information and terminal capability information.
  • the terminal types include reduced-capability terminal types and non-reduced-capability terminal types.
  • the access control class associated with the target access control parameter includes a reservation class in the access control class of the NR.
  • the access control class associated with the target access control parameter includes a used class among the access control classes of the NR.
  • the parameter configuration module 410 is further configured to configure n-bit indication information corresponding to the used classification, where the indication information is used to indicate the access control parameter corresponding to the used classification corresponding to the target access control parameter. access control information, where n is 1 or 2 or 3 or 4.
  • the access control class associated with the target access control parameter includes a predefined reduced capability terminal-specific access control class.
  • the dedicated access control classification is defined as one of the following:
  • the number of the dedicated access control categories is 64, and the dedicated access control categories include access control categories for terminals with reduced capabilities, reservation categories for access control of terminals with reduced capabilities, and terminals with reduced capabilities. Operator-defined classification of access control;
  • the number of the dedicated access control categories is 32, and the dedicated access control categories include access control categories for terminals with reduced capabilities and reservation categories for access control of terminals with reduced capabilities;
  • the number of the dedicated access control categories is 16, and the dedicated access control categories include access control categories for terminals with reduced capabilities and reservation categories for access control of terminals with reduced capabilities;
  • the number of the dedicated access control classes is 9, and the dedicated access control classes include access control classes of terminals with reduced capabilities.
  • the terminal types include at least a first terminal type with reduced capability and a second terminal type with reduced capability;
  • the access control parameter corresponding to the terminal type with reduced capability of the first is the same as the access control parameter adopted by the terminal of NR, and the terminal with reduced capability of the second corresponds to the target access control parameter.
  • the terminal types include at least a first terminal type with reduced capability and a second terminal type with reduced capability;
  • the access control classification associated with the target access control parameter corresponding to the first terminal type with reduced capability and the access control classification associated with the target access control parameter corresponding to the second terminal type with reduced capability satisfy one of the following:
  • the access control classification associated with the target access control parameter corresponding to the first terminal type with reduced capability and the access control classification associated with the target access control parameter corresponding to the second terminal type with reduced capability are both NR access.
  • the access control classification associated with the target access control parameter corresponding to the first terminal type with reduced capability and the access control classification associated with the target access control parameter corresponding to the second terminal type with reduced capability are both NR access.
  • the used classification in the access control classification; the access control classification associated with the target access control parameter corresponding to the first terminal type with reduced capability is associated with the target access control parameter corresponding to the second terminal type with reduced capability.
  • the access control classes are all predefined access control classes dedicated to terminals with reduced capability.
  • it also includes:
  • the access control module is configured to determine the access control information according to the access control parameters of the NR when the target access control parameters corresponding to the terminal types are not configured.
  • the parameter configuration module 410 is further set to at least one of the following:
  • the support capability information of each neighboring cell for the terminal with reduced capability is configured through the first indication information in the information of the same-frequency neighboring cell in the third system information block SIB3, or through the fourth system information block SIB4.
  • the message configuration module is configured to configure a paging message configuration message corresponding to the terminal type according to the terminal type
  • the paging message configuration message includes partial paging related parameters shared with the NR terminal and partial paging related parameters specific to the reduced capability terminal.
  • the partial paging-related parameters shared with NR terminals include at least one of the following: a default paging cycle, the number of paging occasions in a paging radio frame, ns;
  • the dedicated partial paging related parameters include at least one of the following: partial bandwidth, PDCCH paging search space.
  • the access control apparatus proposed in this embodiment and the access control method applied to the second network node proposed in the above embodiments belong to the same inventive concept, and the technical details not described in detail in this embodiment may refer to any of the above embodiments.
  • the embodiment of the present application also provides a first network node.
  • the application to the first network node may be performed by an access control apparatus, and the access control apparatus may be implemented in software and/or hardware and integrated in the first network node.
  • the first network node is, for example, a terminal.
  • FIG. 5 is a schematic diagram of a hardware structure of a first network node according to an embodiment.
  • a first network node provided in this embodiment includes: a processor 510 and a storage device 520 .
  • the number of processors in the first network node may be one or more.
  • a processor 510 is used as an example.
  • the processor 510 and the storage device 520 in the device may be connected by a bus or in other ways.
  • FIG. 5 Take connection via bus as an example.
  • the one or more programs are executed by the one or more processors 510, so that the one or more processors implement the access control method applied to the first network node described in any of the foregoing embodiments.
  • the storage device 520 in the first network node can be used to store one or more programs, and the programs can be software programs, computer-executable programs, and modules.
  • Program instructions/modules corresponding to the access control method include: a parameter acquisition module 310 and an information determination module 320).
  • the processor 510 executes various functional applications and data processing of the first network node by running the software programs, instructions and modules stored in the storage device 520, ie, implements the access control method in the above method embodiments.
  • the storage device 520 mainly includes a storage program area and a storage data area, wherein the storage program area can store the operating system, the application program required by at least one function; the storage data area can store data created according to the use of the device, etc. Example target access control parameters, access control information, etc.). Additionally, storage device 520 may include high-speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other non-volatile solid-state storage device. In some instances, the storage device 520 may further include memory located remotely from the processor 510, the remote memory may be connected to the first network node through a network. Examples of such networks include, but are not limited to, the Internet, an intranet, a local area network, a mobile communication network, and combinations thereof.
  • the following operations are implemented: acquiring target access control parameters according to the terminal type to which they belong;
  • the access control parameter determines access control information, which includes allowing access or barring access.
  • the first network node proposed in this embodiment and the access control method applied to the first network node proposed in the above embodiments belong to the same inventive concept.
  • a second network node is also provided.
  • the access control method applied to the second network node may be executed by an access control apparatus, and the access control apparatus may be implemented by means of software and/or hardware and integrated in the second network node.
  • the second network node is a network side device, such as a base station.
  • FIG. 6 is a schematic diagram of a hardware structure of a second network node according to an embodiment.
  • a second network node provided in this embodiment includes: a processor 610 and a storage device 620 .
  • the number of processors in the second network node may be one or more.
  • a processor 610 is used as an example.
  • the processor 610 and the storage device 620 in the device may be connected by a bus or in other ways.
  • FIG. 6 Take connection via bus as an example.
  • the one or more programs are executed by the one or more processors 610, so that the one or more processors implement the access control method applied to the second network node described in any of the foregoing embodiments.
  • the storage device 620 in the second network node can be used to store one or more programs, and the programs can be software programs, computer-executable programs, and modules.
  • Program instructions/modules corresponding to the access control method include: a parameter configuration module 410 and a transmission module 420).
  • the processor 610 executes various functional applications and data processing of the second network node by running the software programs, instructions and modules stored in the storage device 620, ie, implements the access control method in the above method embodiments.
  • the storage device 620 mainly includes a storage program area and a storage data area, wherein the storage program area can store an operating system, an application program required by at least one function; the storage data area can store data created according to the use of the device, etc. (as described above) Example target access control parameters, access control information, etc.).
  • storage device 620 may include high-speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other non-volatile solid-state storage device.
  • storage device 620 may further include memory located remotely from processor 610, the remote memory may be connected to the second network node through a network. Examples of such networks include, but are not limited to, the Internet, an intranet, a local area network, a mobile communication network, and combinations thereof.
  • the target access control parameter corresponding to the terminal type is configured,
  • the target access control parameter is used to indicate access control information, and the access control information includes allowing access or prohibiting access; and transmitting the access control parameter.
  • the second network node proposed in this embodiment and the access control method applied to the second network node proposed in the above embodiments belong to the same inventive concept.
  • Embodiments of the present application further provide a storage medium containing computer-executable instructions, where the computer-executable instructions are used to execute an access control method when executed by a computer processor.
  • the present application can be implemented by means of software and general hardware, and can also be implemented by hardware. Based on this understanding, the technical solution of the present application can be embodied in the form of a software product, and the computer software product can be stored in a computer-readable storage medium, such as a floppy disk of a computer, a read-only memory (Read-Only Memory, ROM), Random access memory (Random Access Memory, RAM), flash memory (FLASH), hard disk or optical disk, etc., including multiple instructions to enable a computer device (which may be a personal computer, server, or network device, etc.) to execute any methods described in the examples.
  • a computer-readable storage medium such as a floppy disk of a computer, a read-only memory (Read-Only Memory, ROM), Random access memory (Random Access Memory, RAM), flash memory (FLASH), hard disk or optical disk, etc.
  • the block diagrams of any logic flow in the figures of the present application may represent program steps, or may represent interconnected logic circuits, modules and functions, or may represent a combination of program steps and logic circuits, modules and functions.
  • Computer programs can be stored on memory.
  • the memory may be of any type suitable for the local technical environment and may be implemented using any suitable data storage technology such as, but not limited to, read only memory (ROM), random access memory (RAM), optical memory devices and systems (Digital Versatile Discs). (Digital Versatile Disc, DVD) or compact disc (Compact Disk, CD)), etc.
  • Computer-readable media may include non-transitory storage media.
  • the data processor may be of any type suitable for the local technical environment, such as, but not limited to, a general purpose computer, a special purpose computer, a microprocessor, a digital signal processor (Digital Signal Process, DSP), an application specific integrated circuit (ASIC) ), programmable logic devices (Field Programmable Gate Array, FGPA) and processors based on multi-core processor architecture.
  • a general purpose computer such as, but not limited to, a general purpose computer, a special purpose computer, a microprocessor, a digital signal processor (Digital Signal Process, DSP), an application specific integrated circuit (ASIC) ), programmable logic devices (Field Programmable Gate Array, FGPA) and processors based on multi-core processor architecture.
  • DSP Digital Signal Process
  • ASIC application specific integrated circuit
  • FGPA Field Programmable Gate Array

Abstract

本申请提供一种接入控制方法、第一网络节点、第二网络节点及存储介质。该方法根据所属的终端类型,获取目标接入控制参数;根据所述目标接入控制参数确定接入控制信息,所述接入控制信息包括允许接入或禁止接入。

Description

接入控制方法、第一网络节点、第二网络节点及存储介质 技术领域
本申请涉及无线通信网络,例如涉及一种接入控制方法、第一网络节点、第二网络节点及存储介质。
背景技术
在新空口(New Radio,NR)系统中,能力降低(Reduced Capability,REDCAP)的终端相比于其他终端,服务优先级较低,获得相同的数据速率所需的带宽资源更多。如果忽略REDCAP终端的上述特点,对REDCAP终端和其他终端都采用统一的接入控制参数进行接入控制,例如,接入控制参数一致的REDCAP终端和其他终端都被允许接入NR系统,REDCAP终端占用了较多的带宽资源,则无法保证通信效率和整个系统的性能。由于接入控制不灵活、可靠性低,REDCAP终端的接入对已部署终端的通信质量造成影响。
发明内容
本申请提供一种接入控制方法、第一网络节点、第二网络节点及存储介质,以提高接入控制的灵活性和可靠性。
本申请实施例提供一种接入控制方法,应用于第一网络节点,包括:
根据所属的终端类型,获取目标接入控制参数;
根据所述目标接入控制参数确定接入控制信息,所述接入控制信息包括允许接入或禁止接入。
本申请实施例还提供了一种接入控制方法,应用于第二网络节点,包括:
根据终端类型,配置所述终端类型对应的目标接入控制参数,所述目标接入控制参数用于指示接入控制信息,所述接入控制信息包括允许接入或禁止接入;
传输所述接入控制参数。
本申请实施例还提供了一种第一网络节点,包括:
一个或多个处理器;
存储装置,用于存储一个或多个程序;
当所述一个或多个程序被所述一个或多个处理器执行,使得所述一个或多个处理器实现上述应用于第一网络节点的接入控制方法。
本申请实施例还提供了一种第二网络节点,包括:
一个或多个处理器;
存储装置,用于存储一个或多个程序;
当所述一个或多个程序被所述一个或多个处理器执行,使得所述一个或多个处理器实现上述应用于第二网络节点的接入控制方法。
本申请实施例还提供了一种计算机可读存储介质,计算机可读存储介质上存储有计算机程序,该程序被处理器执行时实现上述应用于第一网络节点的接入控制方法或应用于第二网络节点的接入控制方法。
附图说明
图1为一实施例提供的一种接入控制方法的流程图;
图2为另一实施例提供的一种接入控制方法的流程图;
图3为一实施例提供的一种接入控制装置的结构示意图;
图4为另一实施例提供的一种接入控制装置的结构示意图;
图5为一实施例提供的一种第一网络节点的硬件结构示意;
图6为一实施例提供的一种第二网络节点的硬件结构示意图。
具体实施方式
下面结合附图和实施例对本申请进行说明。可以理解的是,此处所描述的具体实施例仅仅用于解释本申请,而非对本申请的限定。需要说明的是,在不冲突的情况下,本申请中的实施例及实施例中的特征可以相互任意组合。另外 还需要说明的是,为了便于描述,附图中仅示出了与本申请相关的部分而非全部结构。
在NR系统中,可以根据终端的接入类型(Access Category)或接入识别码(Access Identity),对终端进行统一接入控制(Unified Access Control,UAC)。对于接入类型,共定义了64个分类,其中,Category 0~8可应用于NR的接入控制;对于接入识别码,共定义了16个分类,其中,0~3、11~15分类可应用于NR的接入控制。
REDCAP终端相比于NR系统中的其他终端,服务优先级较低,获得相同的数据速率所需的带宽资源更多。如果对REDCAP终端和NR系统中的其他终端,都采用统一的方式进行接入控制,则REDCAP终端占用较多的带宽资源,无法保证通信效率和整个系统的性能,REDCAP终端的接入对已部署终端的通信质量造成影响。
在本申请实施例中,提供一种接入控制方法,可应用于第一网络节点,第一网络节点例如为用户终端(User Equipment,UE),包括REDCAP终端。第一网络节点根据所属的终端类型确定目标接入控制参数,并据此确定是否允许接入,从而实现对不同类型终端分别进行接入控制,提高接入控制的灵活性和可靠性。
图1为一实施例提供的一种接入控制方法的流程图,如图1所示,本实施例提供的方法包括步骤110和步骤120。
在步骤110中,根据所属的终端类型,获取目标接入控制参数。
本实施例中,终端可以分为REDCAP终端以及非REDCAP终端,还可以分为采用NR的接入控制参数进行统一接入控制的终端以及采用为REDCAP终端单独配置的接入控制参数进行接入控制的终端等。第一网络节点根据其所属的终端类型,获取对应的目标接入控制参数,作为接入控制的依据,其中,目标接入控制参数用于指示第一网络节点所属的终端类型对应的接入控制信息,即, 指示该终端类型的第一网络节点是否被允许接入。各终端类型对应的目标接入控制参数可由第二网络节点(例如为基站)配置并传输至第一网络节点。
在步骤120中,根据所述目标接入控制参数确定接入控制信息,所述接入控制信息包括允许接入或禁止接入。
本实施例中,第一网络节点根据获取到的目标接入控制参数完成接入控制的检查,即,确定第一网络节点是允许接入还是禁止接入,如果是允许接入,则第一网络节点在当前所处的目标小区中发起随机接入。
在一实施例中,通过以下方式使能第一网络节点的接入控制:第二网络节点在主信息块(Master Information Block,MIB)中配置各小区是否允许接入的指示信息,例如,在第一网络节点所处的目标小区指示为barred状态的情况下,第一网络节点认为该目标小区的禁止接入的,不需要继续读取与接入控制相关的参数,也不需要再进行接入控制的检查;在目标小区指示为允许接入的情况下,第一网络节点可以继续读取系统信息块(System Information Block,SIB)SIB1中相关的配置信息,根据目标接入控制参数完成接入控制的检查等,在此基础上,如果目标接入控制参数对应的接入控制信息为允许接入,则第一网络节点可以在目标小区发起随机接入。
在一实施例中,第一网络节点为REDCAP终端,对于REDCAP终端,有以下两种方式使能REDCAP终端的接入控制:第一种是第二网络节点在MIB中配置的指示信息同样适用于REDCAP终端,REDCAP终端需要先读取该指示信息,然后根据目标小区指示的状态是否为barred,确定是否要进一步读取相关配置和目标接入控制参数并判断是否允许接入;第二种是,对REDCAP终端额外增加是否允许接入的指示信息,并且该指示信息只有在NR的目标小区指示为允许接入的情况下才起作用,即,如果NR的目标小区指示为barred状态,则REDCAP终端也认为该目标小区是barred状态,而如果NR的目标小区指示为允许接入,则进一步根据该额外增加的指示信息是否为barred状态,确定是否要进一步读 取相关配置和目标接入控制参数并判断是否允许接入。
在一实施例中,REDCAP终端关联于接入控制分类的目标接入控制参数相关配置,可以配置于独立的SIB消息中,例如新引入的SIB消息为SIB1-REDCAP,这种情况下,REDCAP终端需要读取SIB1-REDCAP进行接入控制的检查,如果允许接入,则继续读取其他的SIB消息。
在一实施例中,还包括:
步骤101:根据终端类别信息与终端能力信息中的至少之一确定所属的终端类型。
本实施例中,可以根据第一网络节点的带宽能力确定终端所述的终端类型,例如,支持不同带宽的终端分别对应于不同类别的能力降低终端;或者,也可以根据第一网络节点上报的能力降低终端的类别直接确定。
在一实施例中,第一能力降低终端和第二能力降低终端对应的目标接入控制参数的数量可以相同,也可以不同。
在一实施例中,终端类型包括能力降低的终端类型和非能力降低的终端类型。
本实施例中,区分REDCAP终端和非REDCAP终端,分别进行接入控制。REDCAP终端对应的目标接入控制参数和接入控制信息,可以与非REDCAP终端的相同,也可以不同。
在一实施例中,目标接入控制参数关联的接入控制分类包括NR的接入控制分类中的预留分类。
本实施例中,目标接入控制参数关联的接入控制分类包括NR的Access Category中的预留分类。在第一网络节点为REDCAP终端的情况下,可以将NR的Access Category中的预留分类应用于对REDCAP终端的分类,即,根据NR的Access Category中的预留分类,将相同的参数配置和定义应用于对REDCAP 终端的接入控制参数配置。例如,NR的Access Category中的预留分类包括Category9~31,将其中的Category9~17用于对REDCAP终端的接入控制参数配置。
在一实施例中,目标接入控制参数关联的接入控制分类包括NR的接入控制分类中的已用分类。
本实施例中,目标接入控制参数关联的接入控制分类包括NR的Access Category中的已用分类,在第一网络节点为REDCAP终端的情况下,可以将NR的Access Category中的已用分类可用于对REDCAP终端的分类,并且还可以为各已用分类增加指示信息以指示REDCAP终端是否允许接入。
在一实施例中,还包括:步骤102:获取已用分类对应的n比特指示信息,指示信息用于指示目标接入控制参数关联的已用分类对应的接入控制信息,其中,n为1或2或3或4。
本实施例中,在第一网络节点为REDCAP终端的情况下,将NR的Category 0~8用于配置REDCAP终端的目标接入控制参数,且分别为Category 0~8增加n bit的指示信息,用于指示每个终端类型对应的接入控制信息为允许接入或禁止接入,或者指示每个终端类型是否具有与NR的Category一致的barred状态。其中,n bit的指示信息仅适用于REDCAP终端,而对于NR中其他终端不起作用。
本实施例中,已用分类对应于n比特指示信息,用于指示目标接入控制参数关联的已用分类对应的接入控制信息,其中,n为1或2或3或4。
例如,对于已有分类,分出一类,用1比特的指示信息指示这一类对应的接入控制信息为允许接入或禁止接入,或者指示这一类对应的接入控制信息与NR中该类的接入控制信息是相同的或不同的。例如,n=1,REDCAP终端获取所属的已用分类对应的1bit的指示信息的值为true,表示该已用分类对应的barred状态和在NR中该已用分类的barred状态相同;如果该1bit的指示信息的 值不为true,则该已用分类对应的barred状态和在NR中该已用分类的barred状态不同。
例如,对于已有分类,分出两类,用2比特的指示信息指示这两类对应的接入控制信息为允许接入或禁止接入,或者指示这两类对应的接入控制信息与NR中这两类的接入控制信息是相同的或不同的。
例如,对于已有分类,分出三类,用3比特的指示信息指示这三类对应的接入控制信息为允许接入或禁止接入,或者指示这三类对应的接入控制信息与NR中这三类的接入控制信息是相同的或不同的。
例如,对于已有分类,分出四类,用4比特的指示信息指示这四类对应的接入控制信息为允许接入或禁止接入,或者指示这四类对应的接入控制信息与NR中这四类的接入控制信息是相同的或不同的。
在一实施例中,目标接入控制参数关联的接入控制分类包括预定义的能力降低的终端专用的接入控制分类。
本实施例中,在第一网络节点为REDCAP终端的情况下,为REDCAP终端定义专用的接入控制分类。
在一实施例中,专用的接入控制分类定义为如下之一:
1)专用的接入控制分类的个数为64,专用的接入控制分类包括能力降低的终端的接入控制分类、能力降低的终端的接入控制的预留分类和能力降低的终端的接入控制的运营商自定义分类。例如,Category 0~8为REDCAP终端的类型,Category 9~31为REDCAP终端的预留分类,Category 32~63为运营商针对REDCAP终端的自定义类型。
2)专用的接入控制分类的个数为32,专用的接入控制分类包括能力降低的终端的接入控制分类、能力降低的终端的接入控制的预留分类。例如,Category 0~8为REDCAP终端的类型,Category 9~31为REDCAP终端的预留分类。
3)专用的接入控制分类的个数为16,专用的接入控制分类包括能力降低的终端的接入控制分类、能力降低的终端的接入控制的预留分类。例如,A Category 0~8为REDCAP终端的类型,Category 9~15为REDCAP终端的预留分类。
4)专用的接入控制分类的个数为9,专用的接入控制分类包括能力降低的终端的接入控制分类。例如,Category 0~8为REDCAP终端的类型。
在一实施例中,终端类型至少包括第一能力降低的终端类型和第二能力降低的终端类型;其中,第一能力降低的终端类型对应的接入控制参数与NR的终端采用的接入控制参数相同,第二能力降低的终端对应于目标接入控制参数。
本实施例中,第一网络节点至少包括两类:第一REDCAP终端和第二REDCAP终端,其中,第一REDCAP终端遵循NR的Access category,按照NR的接入控制参数和相关配置进行接入控制的检查;第二REDCAP终端采用目标接入控制参数,且目标接入控制参数关联于新引入的接入控制分类,第二REDCAP终端按照新引入的接入控制分类进行接入控制的检查,其中,新引入的接入控制分类可以是NR中接入控制分类的预留分类、已用分类或者是专用的接入控制分类,这种情况下,第二网络节点需要为REDCAP终端新引入的各接入控制分类配置目标接入控制参数等。
在一实施例中,终端类型至少包括第一能力降低的终端类型和第二能力降低的终端类型;第一能力降低的终端类型对应的目标接入控制参数关联的接入控制分类和第二能力降低的终端类型对应的目标接入控制参数关联的接入控制分类满足以下之一:
第一能力降低的终端类型对应的目标接入控制参数关联的接入控制分类和第二能力降低的终端类型对应的目标接入控制参数关联的接入控制分类都为NR的接入控制分类中的预留分类;
第一能力降低的终端类型对应的目标接入控制参数关联的接入控制分类和第二能力降低的终端类型对应的目标接入控制参数关联的接入控制分类都为 NR的接入控制分类中的已用分类;
第一能力降低的终端类型对应的目标接入控制参数关联的接入控制分类和第二能力降低的终端类型对应的目标接入控制参数关联的接入控制分类都为预定义的能力降低的终端专用的接入控制分类。
本实施例中,第一网络节点至少包括两类:第一REDCAP终端和第二REDCAP终端,第一REDCAP终端和第二REDCAP终端都采用目标接入控制参数,且目标接入控制参数关联于新引入的接入控制分类(都为NR中接入控制分类的预留分类、都为已用分类或者都为专用的接入控制分类),并按照新引入的接入控制分类进行接入控制的检查,这种情况下,第二网络节点需要为第一REDCAP终端和第二REDCAP终端分别配置相应的各接入控制分类的目标接入控制参数等。其中,第一REDCAP终端和第二REDCAP终端对应的目标接入控制参数可以配置成相同的,也可以不同。
本实施例中,新引入的接入控制分类包括:
1)NR的接入控制分类的预留分类,Category9~17,将相同的接入控制参数配置和定义应用于对第一REDCAP终端和第二REDCAP终端的接入控制。
2)NR的接入控制分类的已用分类,Category分类0~8,将NR的Access Category中的已用分类可用于对REDCAP终端的分类,还可以为各已用分类增加n比特的指示信息以指示第一REDCAP终端和第二REDCAP终端是否允许接入。
3)预定义的能力降低的终端专用的接入控制分类,应用于对第一REDCAP终端和第二REDCAP终端的接入控制。
在一实施例中,第一网络节点至少包括两类:第一REDCAP终端和第二REDCAP终端,第一REDCAP终端和第二REDCAP终端分别采用目标接入控制参数,且目标接入控制参数关联于新引入的接入控制分类,第一REDCAP终端和第二REDCAP终端采用的目标接入控制参数关联的新引入的接入控制分 类可以不同。第二网络节点需要分别对第一REDCAP终端和第二REDCAP终端配置目标接入控制参数,第一REDCAP终端和第二REDCAP终端分别按照各自所属的终端类型获取目标接入控制参数并进行接入控制的检查。
本实施例中,新引入的接入控制分类包括:
1)NR的接入控制分类的预留分类,其中,将与Category9~17相同的接入控制参数配置和定义应用于对第一REDCAP终端或第二REDCAP终端的接入控制。
2)NR的接入控制分类的已用分类,Category分类0~4可应用于对第一REDCAP终端的分类,Category分类5~8可应用于对第二REDCAP终端的分类,还可以为各已用分类分别增加n比特的指示信息以指示第一REDCAP终端和第二REDCAP终端是否允许接入。
3)预定义的能力降低的终端专用的接入控制分类,应用于对第一REDCAP终端或第二REDCAP终端的接入控制。
在一实施例中,步骤120还包括:
在未获取到目标接入控制参数的情况下,根据NR的接入控制参数确定接入控制信息。
本实施例中,在第一网络节点在未获取到目标接入控制参数的情况下(例如,第二网络节点没有为所属的终端分类配置对应的目标接入控制参数),则可以根据已有的NR的接入控制参数确定接入控制信息,据此进行接入控制,保证第一网络节点的业务正常进行。
在一实施例中,还包括:
步骤130:根据能力降低的终端专有的邻区列表,或者根据邻区列表信息中每个邻区对能力降低的终端的支持能力信息,确定候选邻区或者待测量的邻区;
步骤140:在所述候选邻区或者所述待测量的邻区中重选目标小区。
本实施例中,第一网络节点可以确定支持REDCAP终端的候选邻区或者待测量的邻区,并在候选邻区或者待测量的邻区中进行小区重选,即,重新选择通信质量较佳的邻区作为新的目标小区,切换至重选的目标小区中以发起随机接入。
第二网络节点可以为REDCAP终端配置专有的邻区列表,在第一网络节点为REDCAP终端的情况下,可以根据该邻区列表确定候选邻区或者待测量的邻区;或者,REDCAP终端也可以根据邻区列表信息中各个邻区对REDCAP终端的支持能力信息,确定候选邻区或者待测量的邻区,这种情况下,第二网络节点可以在邻区列表信息中广播各个邻区是否支持REDCAP终端的指示信息。
在一实施例中,每个邻区对能力降低的终端的支持能力信息,根据第三系统信息块SIB3的同频邻区信息中的第一指示信息确定,或者,根据第四系统信息块SIB4的异频邻区信息中的第二指示信息确定,或者,根据能力降低的终端专有SIB中同频邻区信息或异频邻区信息确定。
本实施例中,邻区列表信息中包含每个邻区对能力降低的终端的支持能力信息。第二网络节点(例如基站)之间交互各个小区对REDCAP终端的支持能力信息,并记录邻区列表中各个邻区对REDCAP终端的支持能力信息。第二网络节点在邻区列表信息中增加各个邻区对REDCAP终端的支持能力信息的配置,即,第二网络节点在邻区列表信息中广播各个邻区是否支持REDCAP终端的指示信息,例如在SIB3中的同频邻区信息(IntraFreqNeighCellInfo)中添加第一指示信息:SupportREDACAP ENUMERATED{true,faulse};或者,在SIB4的异频邻区信息(InterFreqNeighCellInfo)中添加第二指示信息:SupportREDACAP ENUMERATED{true,faulse}。
在一实施例中,各个邻区对REDCAP终端的支持能力信息的指示信息可以由第二网络节点配置于SIB1中,也可以配置于调度SIB1的下行控制信息(Downlink Control Information,DCI)中。
本实施例中,第二网络节点可以通过SIB1消息或者调度SIB1的DCI,指示各邻区是否支持REDCAP终端,例如,通过SupportREDACAP ENUMERATED{true,faulse}指示各邻区是否支持REDCAP终端,如果一个邻区支持REDCAP终端且被第一网络节点重选为新的目标小区,则在第一网络节点为REDCAP终端的情况下,第一网络节点可以进一步读取该新的目标小区的目标接入控制参数、确定接入控制信息,在接入控制信息为允许接入的情况下,在该新的目标小区中发起随机接入。
在一实施例中,还包括:
步骤150:根据所属的终端类型,接收所属的终端类型对应的寻呼消息配置消息;
其中,所述寻呼消息配置消息包括与NR的终端共用的部分寻呼相关参数和能力降低终端专有的部分寻呼相关参数。
本实施例中,第二网络节点接收核心网发送的寻呼(Paging)消息,如果寻呼消息中包含对REDCAP终端的支持能力信息,且支持能力信息表明第二网络节点支持REDCAP终端的接入,则第二网络节点可以在配置的寻呼区域上寻呼REDCAP终端。在第一网络节点为REDCAP终端的情况下,第一网络节点可以根据所属的终端类型,接收寻呼消息配置消息,寻呼消息配置消息包括与NR的终端共用的部分寻呼相关参数和能力降低终端专有的部分寻呼相关参数。其中,第二网络节点配置REDCAP终端专用的寻呼区域或共用的寻呼区域,核心网发送至第二网络节点的寻呼消息中包括对REDCAP终端的支持能力信息,即,在消息里添加REDCAP Capability信元。
在一实施例中,与NR的终端共用的部分寻呼相关参数包括以下至少之一:默认的寻呼周期,寻呼无线帧内的寻呼时机个数。
在一实施例中,专有的部分寻呼相关参数包括以下至少之一:部分带宽(Band Width Part,BWP),物理下行控制信道(Physical Downlink Control Channel, PDCCH)寻呼搜索空间。
本实施例中,与NR的终端共用的部分寻呼相关参数可以包括默认的寻呼周期(defaultPagingCycle)以及在一个寻呼无线帧内的寻呼时机(Paging Occasion)的个数(ns),还可以包括在每个寻呼时机位置监听PDCCH的时机等。专有的部分寻呼相关参数可以包括BWP以及PDCCH搜索空间(Paging Search Space)等。
在一实施例中,对于上述的与NR的终端共用的部分寻呼相关参数和专有的部分寻呼相关参数,可以都采取与NR系统中一致的配置方式;或者,对其中的专有的部分寻呼相关参数(BWP和PDCCH搜索空间)可以独立配置;或者,对与NR的终端共用的部分寻呼相关参数、BWP和PDCCH搜索空间均独立配置。
本实施例的接入控制方法,通过为不同的终端类型配置目标接入控制参数,目标接入控制参数关联于不同的接入控制分类、对应于不同的接入控制信息,作为接入控制的依据,提高了接入控制的可靠性和灵活性;对于REDCAP终端可以独立进行接入控制,提高带宽资源的利用效率,避免REDCAP终端的接入对已部署终端的通信质量造成影响;此外,还根据邻区对REDCAP终端的支持能力信息实现小区重选,实现第二网络节点对REDCAP终端的寻呼,进一步提高REDCAP终端接入的可靠性。
在本申请实施例中,还提供一种接入控制方法,可应用于第二网络节点,第二网络节点例如为基站。需要说明的是,本实施例中,第二网络节点执行的操作与上述实施例中第一网络节点执行的操作相对应,未在本实施例中详尽描述的技术细节可参见上述任意实施例。
图2为另一实施例提供的一种接入控制方法的流程图,如图2所示,本实施例提供的方法包括步骤210和步骤220。
在步骤210中,根据终端类型,配置所述终端类型对应的目标接入控制参数,所述目标接入控制参数用于指示接入控制信息,所述接入控制信息包括允许接入或禁止接入。
在步骤220中,传输所述接入控制参数。
本实施例中,第二网络节点为不同的终端类型配置对应的目标哦接入控制参数,并传输至第一网络节点,作为对第一网络节点接入控制的依据,从而实现对不同类型终端分别进行接入控制,提高接入控制的灵活性和可靠性。
在一实施例中,所述终端类型根据终端类别信息和终端能力信息中的至少之一配置。
在一实施例中,所述终端类型包括能力降低的终端类型和非能力降低的终端类型。
在一实施例中,所述目标接入控制参数关联的接入控制分类包括NR的接入控制分类中的预留分类。
在一实施例中,所述目标接入控制参数关联的接入控制分类包括NR的接入控制分类中的已用分类。
在一实施例中,还包括:
步骤201:配置所述已用分类对应的n比特指示信息,所述指示信息用于指示所述目标接入控制参数对应的已用分类对应的接入控制信息,其中,n为1或2或3或4。
本实施例中,第二网络节点将NR的Category 0~8用于配置REDCAP终端的目标接入控制参数,且分别为Category 0~8增加n bit的指示信息,用于指示该类型的REDCAP终端是否具有与NR的Category一致的barred状态。其中,n bit的指示信息仅适用于REDCAP终端,而对于NR中其他终端不起作用。n bit的指示信息可用于指示每个终端类型对应的接入控制信息为允许接入或禁止接 入,或者指示每个终端类型是否具有与NR的Category一致的barred状态
在一实施例中,所述目标接入控制参数关联的接入控制分类包括预定义的能力降低的终端专用的接入控制分类。
在一实施例中,所述专用的接入控制分类定义为如下之一:
所述专用的接入控制分类的个数为64,所述专用的接入控制分类包括能力降低的终端的接入控制分类、能力降低的终端的接入控制的预留分类和能力降低的终端的接入控制的运营商自定义分类;
所述专用的接入控制分类的个数为32,所述专用的接入控制分类包括能力降低的终端的接入控制分类、能力降低的终端的接入控制的预留分类;
所述专用的接入控制分类的个数为16,所述专用的接入控制分类包括能力降低的终端的接入控制分类、能力降低的终端的接入控制的预留分类;
所述专用的接入控制分类的个数为9,所述专用的接入控制分类包括能力降低的终端的接入控制分类。
在一实施例中,所述终端类型至少包括第一能力降低的终端类型和第二能力降低的终端类型;其中,所述第一能力降低的终端类型对应的接入控制参数与NR的终端采用的接入控制参数相同,所述第二能力降低的终端对应于所述目标接入控制参数。
本实施例中,第一网络节点至少包括第一REDCAP终端和第二REDCAP终端,对于第一REDCAP终端,遵循NR的Access category,按照NR的接入控制参数和相关配置进行接入控制即可;对于第二REDCAP终端,第二网络节点需要为其配置目标接入控制参数,且目标接入控制参数关联于新引入的接入控制分类,按照新引入的接入控制分类对第二REDCAP终端进行接入控制,其中,新引入的接入控制分类可以是NR中接入控制分类的预留分类、已用分类或者是专用的接入控制分类,这种情况下,第二网络节点需要为REDCAP终端新引入的各接入控制分类配置目标接入控制参数等。
在一实施例中,所述终端类型至少包括第一能力降低的终端类型和第二能力降低的终端类型;所述第一能力降低的终端类型对应的目标接入控制参数关联的接入控制分类和所述第二能力降低的终端类型对应的目标接入控制参数关联的接入控制分类满足以下之一:
所述第一能力降低的终端类型对应的目标接入控制参数关联的接入控制分类和所述第二能力降低的终端类型对应的目标接入控制参数关联的接入控制分类都为NR的接入控制分类中的预留分类;
所述第一能力降低的终端类型对应的目标接入控制参数关联的接入控制分类和所述第二能力降低的终端类型对应的目标接入控制参数关联的接入控制分类都为NR的接入控制分类中的已用分类;
所述第一能力降低的终端类型对应的目标接入控制参数关联的接入控制分类和所述第二能力降低的终端类型对应的目标接入控制参数关联的接入控制分类都为预定义的能力降低的终端专用的接入控制分类。
本实施例中,第一网络节点至少包括第一REDCAP终端和第二REDCAP终端,第二网络节点为第一REDCAP终端和第二REDCAP终端都配置相应的目标接入控制参数,且目标接入控制参数关联于新引入的接入控制分类(都为NR中接入控制分类的预留分类、都为已用分类或者都为专用的接入控制分类),并按照新引入的接入控制分类进行接入控制。
在一实施例中,步骤220还包括:
在未配置所述终端类型对应的目标接入控制参数的情况下,根据NR的接入控制参数确定所述接入控制信息。
本实施例中,在第二网络节点没有为第一网络节点所属的终端分类配置对应的目标接入控制参数的情况下,可以根据已有的NR的接入控制参数确定接入控制信息,据此对第一网络节点进行接入控制,保证第一网络节点的业务正常进行。
在一实施例中,还包括以下至少之一:
步骤230:为能力降低终端配置专有的邻区列表;
步骤240:配置邻区列表信息中每个邻区对能力降低的终端的支持能力信息。
本实施例中,第二网络节点可以为REDCAP终端配置专有的邻区列表;或者,第二网络节点在邻区列表信息中配置各个邻区对REDCAP终端的支持能力信息,作为第一网络节点确定候选邻区或者待测量的邻区的依据。这种情况下,第二网络节点可以在邻区列表信息中广播各个邻区是否支持REDCAP终端的指示信息
在一实施例中,每个邻区对能力降低的终端的支持能力信息,通过SIB3的同频邻区信息中的第一指示信息配置,或者,通过SIB4的异频邻区信息中的第二指示信息配置,或者,通过能力降低的终端专有SIB中同频邻区信息或异频邻区的指示信息配置。
在一实施例中,还包括:
步骤250:根据终端类型,配置所述终端类型对应的寻呼消息配置消息;
其中,所述寻呼消息配置消息包括与NR的终端共用的部分寻呼相关参数和能力降低终端专有的部分寻呼相关参数。
本实施例中,第二网络节点接收核心网发送的寻呼消息,如果寻呼消息中包含对REDCAP终端的支持能力信息,且支持能力信息表明第二网络节点支持REDCAP终端的接入,则第二网络节点可以在配置的寻呼区域上寻呼REDCAP终端。第二网络节点还配置REDCAP终端专用的寻呼区域或共用的寻呼区域,核心网发送至第二网络节点的寻呼消息中包括对REDCAP终端的支持能力信息,即,在消息里添加REDCAP Capability信元。
在一实施例中,所述与NR的终端共用的部分寻呼相关参数包括以下至少之一:默认的寻呼周期,寻呼无线帧内的寻呼时机个数ns;
所述专有的部分寻呼相关参数包括以下至少之一:部分带宽,PDCCH寻呼搜索空间。
在一实施例中,对于上述的与NR的终端共用的部分寻呼相关参数和专有的部分寻呼相关参数,可以都采取与NR系统中一致的配置方式;或者,对其中的专有的部分寻呼相关参数(BWP和PDCCH搜索空间)可以独立配置;或者,对与NR的终端共用的部分寻呼相关参数、BWP和PDCCH搜索空间均独立配置。
本申请实施例还提供一种接入控制装置。图3为一实施例提供的一种接入控制装置的结构示意图。如图3所示,所述接入控制装置包括:传输机制确定模块310和传输模块320。
参数获取模块310,设置为根据所属的终端类型,获取目标接入控制参数;
信息确定模块320,设置为根据所述目标接入控制参数确定接入控制信息,所述接入控制信息包括允许接入或禁止接入。
本实施例的接入控制装置,通过根据所属的终端类型确定目标接入控制参数,并据此确定是否允许接入,实现对不同类型终端分别进行接入控制,提高接入控制的灵活性和可靠性。
在一实施例中,还包括:
类型确定模块,设置为根据终端类别信息与终端能力信息中的至少之一确定所属的终端类型。
在一实施例中,所述终端类型包括能力降低的终端类型和非能力降低的终端类型。
在一实施例中,所述目标接入控制参数关联的接入控制分类包括NR的接入控制分类中的预留分类。
在一实施例中,所述目标接入控制参数关联的接入控制分类包括NR的接入控制分类中的已用分类。
在一实施例中,信息获取模块310,还设置为:获取所述已用分类对应的n比特指示信息,所述指示信息用于指示所述目标接入控制参数关联的已用分类对应的接入控制信息,其中,n为1或2或3或4。
在一实施例中,所述目标接入控制参数关联的接入控制分类包括预定义的能力降低的终端专用的接入控制分类。
在一实施例中,所述专用的接入控制分类定义为如下之一:
所述专用的接入控制分类的个数为64,所述专用的接入控制分类包括能力降低的终端的接入控制分类、能力降低的终端的接入控制的预留分类和能力降低的终端的接入控制的运营商自定义分类;
所述专用的接入控制分类的个数为32,所述专用的接入控制分类包括能力降低的终端的接入控制分类、能力降低的终端的接入控制的预留分类;
所述专用的接入控制分类的个数为16,所述专用的接入控制分类包括能力降低的终端的接入控制分类、能力降低的终端的接入控制的预留分类;
所述专用的接入控制分类的个数为9,所述专用的接入控制分类包括能力降低的终端的接入控制分类。
在一实施例中,所述终端类型至少包括第一能力降低的终端类型和第二能力降低的终端类型;
其中,所述第一能力降低的终端类型对应的接入控制参数与NR的终端采用的接入控制参数相同,所述第二能力降低的终端对应于所述目标接入控制参数。
在一实施例中,所述终端类型至少包括第一能力降低的终端类型和第二能力降低的终端类型;
所述第一能力降低的终端类型对应的目标接入控制参数关联的接入控制分 类和所述第二能力降低的终端类型对应的目标接入控制参数关联的接入控制分类满足以下之一:
所述第一能力降低的终端类型对应的目标接入控制参数关联的接入控制分类和所述第二能力降低的终端类型对应的目标接入控制参数关联的接入控制分类都为NR的接入控制分类中的预留分类;
所述第一能力降低的终端类型对应的目标接入控制参数关联的接入控制分类和所述第二能力降低的终端类型对应的目标接入控制参数关联的接入控制分类都为NR的接入控制分类中的已用分类;
所述第一能力降低的终端类型对应的目标接入控制参数关联的接入控制分类和所述第二能力降低的终端类型对应的目标接入控制参数关联的接入控制分类都为预定义的能力降低的终端专用的接入控制分类。
在一实施例中,信息确定模块320还设置为:
在未获取到所述目标接入控制参数的情况下,根据NR的接入控制参数确定所述接入控制信息。
在一实施例中,还包括:
邻区确定模块,设置为根据能力降低的终端专有的邻区列表,或者根据邻区列表信息中每个邻区对能力降低的终端的支持能力信息,确定候选邻区或者待测量的邻区;
重选模块,设置为在所述候选邻区或者所述待测量的邻区中重选目标小区。
在一实施例中,每个邻区对能力降低的终端的支持能力信息,根据第三系统信息块SIB3的同频邻区信息中的第一指示信息确定,或者,根据第四系统信息块SIB4的异频邻区信息中的第二指示信息确定,或者,根据能力降低的终端专有SIB中同频邻区信息或异频邻区信息确定。
在一实施例中,还包括:
消息接收模块,设置为根据所属的终端类型,接收所属的终端类型对应的寻呼消息配置消息;
其中,所述寻呼消息配置消息包括与NR的终端共用的部分寻呼相关参数和能力降低终端专有的部分寻呼相关参数。
在一实施例中,所述与NR的终端共用的部分寻呼相关参数包括以下至少之一:默认的寻呼周期,寻呼无线帧内的寻呼时机个数;
所述专有的部分寻呼相关参数包括以下至少之一:部分带宽,PDCCH寻呼搜索空间。
本实施例提出的接入控制装置与上述实施例提出的应用于第一网络节点的接入控制方法属于同一发明构思,未在本实施例中详尽描述的技术细节可参见上述任意实施例。
本申请实施例还提供一种接入控制装置。图4为另一实施例提供的一种接入控制装置的结构示意图。如图4所示,所述接入控制装置包括:传输机制确定模块310和传输模块320。
参数配置模块410,设置为根据终端类型,配置所述终端类型对应的目标接入控制参数,所述目标接入控制参数用于指示接入控制信息,所述接入控制信息包括允许接入或禁止接入;
传输模块420,设置为传输所述接入控制参数。
本实施例的接入控制装置,通过为不同的终端类型配置对应的目标哦接入控制参数,并传输至第一网络节点,作为对第一网络节点接入控制的依据,从而实现对不同类型终端分别进行接入控制,提高接入控制的灵活性和可靠性。
在一实施例中,所述终端类型根据终端类别信息和终端能力信息中的至少之一配置。
在一实施例中,所述终端类型包括能力降低的终端类型和非能力降低的终端类型。
在一实施例中,所述目标接入控制参数关联的接入控制分类包括NR的接入控制分类中的预留分类。
在一实施例中,所述目标接入控制参数关联的接入控制分类包括NR的接入控制分类中的已用分类。
在一实施例中,参数配置模块410,还设置为:配置所述已用分类对应的n比特指示信息,所述指示信息用于指示所述目标接入控制参数对应的已用分类对应的接入控制信息,其中,n为1或2或3或4。
在一实施例中,所述目标接入控制参数关联的接入控制分类包括预定义的能力降低的终端专用的接入控制分类。
在一实施例中,所述专用的接入控制分类定义为如下之一:
所述专用的接入控制分类的个数为64,所述专用的接入控制分类包括能力降低的终端的接入控制分类、能力降低的终端的接入控制的预留分类和能力降低的终端的接入控制的运营商自定义分类;
所述专用的接入控制分类的个数为32,所述专用的接入控制分类包括能力降低的终端的接入控制分类、能力降低的终端的接入控制的预留分类;
所述专用的接入控制分类的个数为16,所述专用的接入控制分类包括能力降低的终端的接入控制分类、能力降低的终端的接入控制的预留分类;
所述专用的接入控制分类的个数为9,所述专用的接入控制分类包括能力降低的终端的接入控制分类。
在一实施例中,所述终端类型至少包括第一能力降低的终端类型和第二能力降低的终端类型;
其中,所述第一能力降低的终端类型对应的接入控制参数与NR的终端采用 的接入控制参数相同,所述第二能力降低的终端对应于所述目标接入控制参数。
在一实施例中,所述终端类型至少包括第一能力降低的终端类型和第二能力降低的终端类型;
所述第一能力降低的终端类型对应的目标接入控制参数关联的接入控制分类和所述第二能力降低的终端类型对应的目标接入控制参数关联的接入控制分类满足以下之一:
所述第一能力降低的终端类型对应的目标接入控制参数关联的接入控制分类和所述第二能力降低的终端类型对应的目标接入控制参数关联的接入控制分类都为NR的接入控制分类中的预留分类;
所述第一能力降低的终端类型对应的目标接入控制参数关联的接入控制分类和所述第二能力降低的终端类型对应的目标接入控制参数关联的接入控制分类都为NR的接入控制分类中的已用分类;所述第一能力降低的终端类型对应的目标接入控制参数关联的接入控制分类和所述第二能力降低的终端类型对应的目标接入控制参数关联的接入控制分类都为预定义的能力降低的终端专用的接入控制分类。
在一实施例中,还包括:
接入控制模块,设置为在未配置所述终端类型对应的目标接入控制参数的情况下,根据NR的接入控制参数确定所述接入控制信息。
在一实施例中,参数配置模块410还设置为以下至少之一:
为能力降低终端配置专有的邻区列表;
配置邻区列表信息中每个邻区对能力降低的终端的支持能力信息。
在一实施例中,每个邻区对能力降低的终端的支持能力信息,通过第三系统信息块SIB3的同频邻区信息中的第一指示信息配置,或者,通过第四系统信息块SIB4的异频邻区信息中的第二指示信息配置,或者,通过能力降低的终端 专有SIB中同频邻区信息或异频邻区的指示信息配置。
在一实施例中,消息配置模块,设置为根据终端类型,配置所述终端类型对应的寻呼消息配置消息;
其中,所述寻呼消息配置消息包括与NR的终端共用的部分寻呼相关参数和能力降低终端专有的部分寻呼相关参数。
在一实施例中,所述与NR的终端共用的部分寻呼相关参数包括以下至少之一:默认的寻呼周期,寻呼无线帧内的寻呼时机个数ns;
所述专有的部分寻呼相关参数包括以下至少之一:部分带宽,PDCCH寻呼搜索空间。
本实施例提出的接入控制装置与上述实施例提出的应用于第二网络节点的接入控制方法属于同一发明构思,未在本实施例中详尽描述的技术细节可参见上述任意实施例。
本申请实施例还提供一种第一网络节点。应用于第一网络节点的可以由接入控制装置执行,该接入控制装置可以通过软件和/或硬件的方式实现,并集成在所述第一网络节点中。所述第一网络节点例如为终端。
图5为一实施例提供的一种第一网络节点的硬件结构示意。如图5所示,本实施例提供的一种第一网络节点,包括:处理器510和存储装置520。该第一网络节点中的处理器可以是一个或多个,图5中以一个处理器510为例,所述设备中的处理器510和存储装置520可以通过总线或其他方式连接,图5中以通过总线连接为例。
所述一个或多个程序被所述一个或多个处理器510执行,使得所述一个或多个处理器实现上述任一实施例所述的应用于第一网络节点的接入控制方法。
该第一网络节点中的存储装置520作为一种计算机可读存储介质,可用于 存储一个或多个程序,所述程序可以是软件程序、计算机可执行程序以及模块,如本申请实施例中接入控制方法对应的程序指令/模块(例如,附图3所示的接入控制装置中的模块,包括:参数获取模块310和信息确定模块320)。处理器510通过运行存储在存储装置520中的软件程序、指令以及模块,从而执行第一网络节点的各种功能应用以及数据处理,即实现上述方法实施例中的接入控制方法。
存储装置520主要包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、至少一个功能所需的应用程序;存储数据区可存储根据设备的使用所创建的数据等(如上述实施例中的目标接入控制参数、接入控制信息等)。此外,存储装置520可以包括高速随机存取存储器,还可以包括非易失性存储器,例如至少一个磁盘存储器件、闪存器件、或其他非易失性固态存储器件。在一些实例中,存储装置520可进一步包括相对于处理器510远程设置的存储器,这些远程存储器可以通过网络连接至第一网络节点。上述网络的实例包括但不限于互联网、企业内部网、局域网、移动通信网及其组合。
并且,当上述第一网络节点中所包括一个或者多个程序被所述一个或者多个处理器510执行时,实现如下操作:根据所属的终端类型,获取目标接入控制参数;根据所述目标接入控制参数确定接入控制信息,所述接入控制信息包括允许接入或禁止接入。
本实施例提出的第一网络节点与上述实施例提出的应用于第一网络节点的接入控制方法属于同一发明构思,未在本实施例中详尽描述的技术细节可参见上述任意实施例。
还提供一种第二网络节点。应用于第二网络节点的接入控制方法可以由接入控制装置执行,该接入控制装置可以通过软件和/或硬件的方式实现,并集成在所述第二网络节点中。所述第二网络节点为网络侧设备,例如为基站。
图6为一实施例提供的一种第二网络节点的硬件结构示意图。如图6所示,本实施例提供的一种第二网络节点,包括:处理器610和存储装置620。该第二网络节点中的处理器可以是一个或多个,图6中以一个处理器610为例,所述设备中的处理器610和存储装置620可以通过总线或其他方式连接,图6中以通过总线连接为例。
所述一个或多个程序被所述一个或多个处理器610执行,使得所述一个或多个处理器实现上述任一实施例所述的应用于第二网络节点的接入控制方法。
该第二网络节点中的存储装置620作为一种计算机可读存储介质,可用于存储一个或多个程序,所述程序可以是软件程序、计算机可执行程序以及模块,如本申请实施例中接入控制方法对应的程序指令/模块(例如,附图4所示的接入控制装置中的模块,包括:参数配置模块410和传输模块420)。处理器610通过运行存储在存储装置620中的软件程序、指令以及模块,从而执行第二网络节点的各种功能应用以及数据处理,即实现上述方法实施例中的接入控制方法。
存储装置620主要包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、至少一个功能所需的应用程序;存储数据区可存储根据设备的使用所创建的数据等(如上述实施例中的目标接入控制参数、接入控制信息等)。此外,存储装置620可以包括高速随机存取存储器,还可以包括非易失性存储器,例如至少一个磁盘存储器件、闪存器件、或其他非易失性固态存储器件。在一些实例中,存储装置620可进一步包括相对于处理器610远程设置的存储器,这些远程存储器可以通过网络连接至第二网络节点。上述网络的实例包括但不限于互联网、企业内部网、局域网、移动通信网及其组合。
并且,当上述第二网络节点中所包括一个或者多个程序被所述一个或者多个处理器610执行时,实现如下操作:根据终端类型,配置所述终端类型对应的目标接入控制参数,所述目标接入控制参数用于指示接入控制信息,所述接 入控制信息包括允许接入或禁止接入;传输所述接入控制参数。
本实施例提出的第二网络节点与上述实施例提出的应用于第二网络节点的接入控制方法属于同一发明构思,未在本实施例中详尽描述的技术细节可参见上述任意实施例。
本申请实施例还提供一种包含计算机可执行指令的存储介质,计算机可执行指令在由计算机处理器执行时用于执行一种接入控制方法。
通过以上关于实施方式的描述,所属领域的技术人员可以了解到,本申请可借助软件及通用硬件来实现,也可以通过硬件实现。基于这样的理解,本申请的技术方案可以以软件产品的形式体现出来,该计算机软件产品可以存储在计算机可读存储介质中,如计算机的软盘、只读存储器(Read-Only Memory,ROM)、随机存取存储器(Random Access Memory,RAM)、闪存(FLASH)、硬盘或光盘等,包括多个指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请任意实施例所述的方法。
以上所述,仅为本申请的示例性实施例而已,并非用于限定本申请的保护范围。
本申请附图中的任何逻辑流程的框图可以表示程序步骤,或者可以表示相互连接的逻辑电路、模块和功能,或者可以表示程序步骤与逻辑电路、模块和功能的组合。计算机程序可以存储在存储器上。存储器可以具有任何适合于本地技术环境的类型并且可以使用任何适合的数据存储技术实现,例如但不限于只读存储器(ROM)、随机访问存储器(RAM)、光存储器装置和系统(数码多功能光碟(Digital Versatile Disc,DVD)或光盘(Compact Disk,CD))等。计算机可读介质可以包括非瞬时性存储介质。数据处理器可以是任何适合于本地技术环境的类型,例如但不限于通用计算机、专用计算机、微处理器、数字信号处理器(Digital Signal Process,DSP)、专用集成电路(Application Specific  Integrated Circuit,ASIC)、可编程逻辑器件(Field Programmable Gate Array,FGPA)以及基于多核处理器架构的处理器。

Claims (33)

  1. 一种接入控制方法,应用于第一网络节点,包括:
    根据所属的终端类型,获取目标接入控制参数;
    根据所述目标接入控制参数确定接入控制信息,所述接入控制信息包括允许接入或禁止接入。
  2. 根据权利要求1所述的方法,还包括:
    根据终端类别信息与终端能力信息中的至少之一确定所属的终端类型。
  3. 根据权利要求1所述的方法,其中,所述终端类型包括能力降低的终端类型和非能力降低的终端类型。
  4. 根据权利要求1所述的方法,其中,所述目标接入控制参数关联的接入控制分类包括新空口NR的接入控制分类中的预留分类。
  5. 根据权利要求1所述的方法,其中,所述目标接入控制参数关联的接入控制分类包括NR的接入控制分类中的已用分类。
  6. 根据权利要求5所述的方法,还包括:
    获取所述已用分类对应的n比特指示信息,所述指示信息用于指示所述目标接入控制参数关联的已用分类对应的接入控制信息,其中,n为1或2或3或4。
  7. 根据权利要求1所述的方法,其中,所述目标接入控制参数关联的接入控制分类包括预定义的能力降低的终端专用的接入控制分类。
  8. 根据权利要求7所述的方法,其中,所述专用的接入控制分类定义为如下之一:
    所述专用的接入控制分类的个数为64,所述专用的接入控制分类包括能力降低的终端的接入控制分类、能力降低的终端的接入控制的预留分类和能力降低的终端的接入控制的运营商自定义分类;
    所述专用的接入控制分类的个数为32,所述专用的接入控制分类包括能力降低的终端的接入控制分类、能力降低的终端的接入控制的预留分类;
    所述专用的接入控制分类的个数为16,所述专用的接入控制分类包括能力 降低的终端的接入控制分类、能力降低的终端的接入控制的预留分类;
    所述专用的接入控制分类的个数为9,所述专用的接入控制分类包括能力降低的终端的接入控制分类。
  9. 根据权利要求1所述的方法,其中,所述终端类型至少包括第一能力降低的终端类型和第二能力降低的终端类型;
    其中,所述第一能力降低的终端类型对应的接入控制参数与NR的终端采用的接入控制参数相同,所述第二能力降低的终端对应于所述目标接入控制参数。
  10. 根据权利要求1所述的方法,其中,所述终端类型至少包括第一能力降低的终端类型和第二能力降低的终端类型;
    所述第一能力降低的终端类型对应的目标接入控制参数关联的接入控制分类和所述第二能力降低的终端类型对应的目标接入控制参数关联的接入控制分类满足以下之一:
    所述第一能力降低的终端类型对应的目标接入控制参数关联的接入控制分类和所述第二能力降低的终端类型对应的目标接入控制参数关联的接入控制分类都为NR的接入控制分类中的预留分类;
    所述第一能力降低的终端类型对应的目标接入控制参数关联的接入控制分类和所述第二能力降低的终端类型对应的目标接入控制参数关联的接入控制分类都为NR的接入控制分类中的已用分类;
    所述第一能力降低的终端类型对应的目标接入控制参数关联的接入控制分类和所述第二能力降低的终端类型对应的目标接入控制参数关联的接入控制分类都为预定义的能力降低的终端专用的接入控制分类。
  11. 根据权利要求1-10任一项所述的方法,还包括:
    在未获取到所述目标接入控制参数的情况下,根据NR的接入控制参数确定所述接入控制信息。
  12. 根据权利要求1-10任一项所述的方法,还包括:
    根据能力降低的终端专有的邻区列表,或者根据邻区列表信息中每个邻区 对能力降低的终端的支持能力信息,确定候选邻区或者待测量的邻区;
    在所述候选邻区或者所述待测量的邻区中重选目标小区。
  13. 根据权利要求12所述的方法,其中,每个邻区对能力降低的终端的支持能力信息,根据第三系统信息块SIB3的同频邻区信息中的第一指示信息确定,或者,根据第四系统信息块SIB4的异频邻区信息中的第二指示信息确定,或者,根据能力降低的终端专有SIB中同频邻区信息或异频邻区信息确定。
  14. 根据权利要求1-10任一项所述的方法,还包括:
    根据所属的终端类型,接收所属的终端类型对应的寻呼消息配置消息;
    其中,所述寻呼消息配置消息包括与NR的终端共用的寻呼相关参数和能力降低终端专有的寻呼相关参数。
  15. 根据权利要求14所述的方法,其中,
    所述与NR的终端共用的部分寻呼相关参数包括以下至少之一:默认的寻呼周期,寻呼无线帧内的寻呼时机个数;
    所述专有的部分寻呼相关参数包括以下至少之一:部分带宽,物理下行控制信道PDCCH寻呼搜索空间。
  16. 一种接入控制方法,应用于第二网络节点,包括:
    根据终端类型,配置所述终端类型对应的目标接入控制参数,所述目标接入控制参数用于指示接入控制信息,所述接入控制信息包括允许接入或禁止接入;
    传输所述目标接入控制参数。
  17. 根据权利要求16所述的方法,其中,所述终端类型根据终端类别信息和终端能力信息中的至少之一配置。
  18. 根据权利要求16所述的方法,其中,所述终端类型包括能力降低的终端类型和非能力降低的终端类型。
  19. 根据权利要求16所述的方法,其中,所述目标接入控制参数关联的接入控制分类包括NR的接入控制分类中的预留分类。
  20. 根据权利要求16所述的方法,其中,所述目标接入控制参数关联的接入控制分类包括NR的接入控制分类中的已用分类。
  21. 根据权利要求20所述的方法,还包括:
    配置所述已用分类对应的n比特指示信息,所述指示信息用于指示所述目标接入控制参数对应的已用分类对应的接入控制信息,其中,n为1或2或3或4。
  22. 根据权利要求16所述的方法,其中,所述目标接入控制参数关联的接入控制分类包括预定义的能力降低的终端专用的接入控制分类。
  23. 根据权利要求22所述的方法,其中,所述专用的接入控制分类定义为如下之一:
    所述专用的接入控制分类的个数为64,所述专用的接入控制分类包括能力降低的终端的接入控制分类、能力降低的终端的接入控制的预留分类和能力降低的终端的接入控制的运营商自定义分类;
    所述专用的接入控制分类的个数为32,所述专用的接入控制分类包括能力降低的终端的接入控制分类、能力降低的终端的接入控制的预留分类;
    所述专用的接入控制分类的个数为16,所述专用的接入控制分类包括能力降低的终端的接入控制分类、能力降低的终端的接入控制的预留分类;
    所述专用的接入控制分类的个数为9,所述专用的接入控制分类包括能力降低的终端的接入控制分类。
  24. 根据权利要求16所述的方法,其中,所述终端类型至少包括第一能力降低的终端类型和第二能力降低的终端类型;
    其中,所述第一能力降低的终端类型对应的接入控制参数与NR的终端采用的接入控制参数相同,所述第二能力降低的终端对应于所述目标接入控制参数。
  25. 根据权利要求16所述的方法,其中,所述终端类型至少包括第一能力降低的终端类型和第二能力降低的终端类型;
    所述第一能力降低的终端类型对应的目标接入控制参数关联的接入控制分 类和所述第二能力降低的终端类型对应的目标接入控制参数关联的接入控制分类满足以下之一:
    所述第一能力降低的终端类型对应的目标接入控制参数关联的接入控制分类和所述第二能力降低的终端类型对应的目标接入控制参数关联的接入控制分类都为NR的接入控制分类中的预留分类;
    所述第一能力降低的终端类型对应的目标接入控制参数关联的接入控制分类和所述第二能力降低的终端类型对应的目标接入控制参数关联的接入控制分类都为NR的接入控制分类中的已用分类;所述第一能力降低的终端类型对应的目标接入控制参数关联的接入控制分类和所述第二能力降低的终端类型对应的目标接入控制参数关联的接入控制分类都为预定义的能力降低的终端专用的接入控制分类。
  26. 根据权利要求16-25任一项所述的方法,还包括:
    在未配置所述终端类型对应的目标接入控制参数的情况下,根据NR的接入控制参数确定所述接入控制信息。
  27. 根据权利要求16-25任一项所述的方法,还包括以下至少之一:
    为能力降低终端配置专有的邻区列表;
    配置邻区列表信息中每个邻区对能力降低的终端的支持能力信息。
  28. 根据权利要求27所述的方法,其中,每个邻区对能力降低的终端的支持能力信息,通过第三系统信息块SIB3的同频邻区信息中的第一指示信息配置,或者,通过第四系统信息块SIB4的异频邻区信息中的第二指示信息配置,或者,通过能力降低的终端专有SIB中同频邻区信息或异频邻区的指示信息配置。
  29. 根据权利要求16-25任一项所述的方法,还包括:
    根据终端类型,配置所述终端类型对应的寻呼消息配置消息;
    其中,所述寻呼消息配置消息包括与NR的终端共用的部分寻呼相关参数和能力降低终端专有的部分寻呼相关参数。
  30. 根据权利要求29所述的方法,其中,
    所述与NR的终端共用的部分寻呼相关参数包括以下至少之一:默认的寻呼周期,寻呼无线帧内的寻呼时机个数;
    所述专有的部分寻呼相关参数包括以下至少之一:部分带宽,PDCCH寻呼搜索空间。
  31. 一种第一网络节点,包括:
    至少一个处理器;
    存储装置,设置为存储至少一个程序;
    当所述至少一个程序被所述至少一个处理器执行,使得所述至少一个处理器实现如权利要求1-15中任一所述的接入控制方法。
  32. 一种第二网络节点,包括:
    至少一个处理器;
    存储装置,设置为存储至少一个程序;
    当所述至少一个程序被所述至少一个处理器执行,使得所述至少一个处理器实现如权利要求16-30中任一所述的接入控制方法。
  33. 一种计算机可读存储介质,所述计算机可读存储介质上存储有计算机程序,所述计算机程序被处理器执行时实现如权利要求1-15中任一所述的接入控制方法或如权利要求16-30中任一所述的接入控制方法。
PCT/CN2021/099719 2020-07-03 2021-06-11 接入控制方法、第一网络节点、第二网络节点及存储介质 WO2022001632A1 (zh)

Priority Applications (3)

Application Number Priority Date Filing Date Title
AU2021299783A AU2021299783B2 (en) 2020-07-03 2021-06-11 Access control method, first network node, second network node, and storage medium
US18/014,325 US20230247526A1 (en) 2020-07-03 2021-06-11 Access control method, first network node, second network node, and storage medium
EP21832970.4A EP4178268A1 (en) 2020-07-03 2021-06-11 Access control method, first network node, second network node, and storage medium

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202010635122.3A CN111918359A (zh) 2020-07-03 2020-07-03 接入控制方法、第一网络节点、第二网络节点及存储介质
CN202010635122.3 2020-07-03

Publications (1)

Publication Number Publication Date
WO2022001632A1 true WO2022001632A1 (zh) 2022-01-06

Family

ID=73227368

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/099719 WO2022001632A1 (zh) 2020-07-03 2021-06-11 接入控制方法、第一网络节点、第二网络节点及存储介质

Country Status (5)

Country Link
US (1) US20230247526A1 (zh)
EP (1) EP4178268A1 (zh)
CN (1) CN111918359A (zh)
AU (1) AU2021299783B2 (zh)
WO (1) WO2022001632A1 (zh)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023064654A1 (en) * 2021-10-14 2023-04-20 Qualcomm Incorporated Reduced capability user equipment operations
WO2024073889A1 (zh) * 2022-10-08 2024-04-11 Oppo广东移动通信有限公司 通信处理方法及装置、终端设备、网络设备

Families Citing this family (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113630878A (zh) * 2020-05-09 2021-11-09 华为技术有限公司 一种信息传输的方法、装置及系统
CN111918359A (zh) * 2020-07-03 2020-11-10 中兴通讯股份有限公司 接入控制方法、第一网络节点、第二网络节点及存储介质
CN114071644B (zh) * 2020-07-31 2023-06-16 维沃移动通信有限公司 接入控制方法、装置及通信设备
CN114071654A (zh) * 2020-07-31 2022-02-18 维沃移动通信有限公司 接入控制方法、终端及网络侧设备
CN116097763A (zh) * 2020-10-19 2023-05-09 Oppo广东移动通信有限公司 接入网络的方法、终端设备和网络设备
EP4258744A4 (en) * 2020-12-07 2024-03-27 Beijing Xiaomi Mobile Software Co Ltd COMMUNICATION METHOD AND DEVICE, AND WIRELESS ACCESS NETWORK, TERMINAL AND STORAGE MEDIUM
WO2022120751A1 (zh) * 2020-12-10 2022-06-16 北京小米移动软件有限公司 通信方法及装置、接入设备、终端及存储介质
WO2022126556A1 (zh) * 2020-12-17 2022-06-23 北京小米移动软件有限公司 一种接入控制方法、接入控制装置及存储介质
CN115413422A (zh) * 2021-03-26 2022-11-29 上海诺基亚贝尔股份有限公司 选择性rach过载控制
CN115134760A (zh) * 2021-03-29 2022-09-30 华为技术有限公司 寻呼方法及其装置
WO2022236626A1 (zh) * 2021-05-10 2022-11-17 北京小米移动软件有限公司 系统消息的传输方法、装置及通信设备
CN115379439A (zh) * 2021-05-18 2022-11-22 维沃移动通信有限公司 信息处理、获取方法、装置、终端及网络侧设备
EP4290932A4 (en) * 2021-05-21 2024-04-17 Guangdong Oppo Mobile Telecommunications Corp Ltd CELL ACCESS CONTROL METHOD AND APPARATUS, DEVICE AND STORAGE MEDIUM
CN117280762A (zh) * 2021-05-21 2023-12-22 Oppo广东移动通信有限公司 小区接入控制方法、装置、设备及存储介质
CN115643639A (zh) * 2021-07-20 2023-01-24 维沃移动通信有限公司 寻呼方法、装置、设备及计算机存储介质
CN113795019B (zh) * 2021-08-09 2022-12-30 华为技术有限公司 一种通信控制方法和通信设备
WO2023065255A1 (zh) * 2021-10-21 2023-04-27 北京小米移动软件有限公司 小区重选方法、装置、通信设备及存储介质
WO2023240606A1 (en) * 2022-06-17 2023-12-21 Lenovo (Beijing) Limited Access restriction in an energy saving network
WO2024000124A1 (zh) * 2022-06-27 2024-01-04 北京小米移动软件有限公司 寻呼协商方法、装置、通信设备及存储介质
WO2024007274A1 (zh) * 2022-07-07 2024-01-11 北京小米移动软件有限公司 接纳控制方法、装置、通信设备及存储介质
WO2024065704A1 (zh) * 2022-09-30 2024-04-04 Oppo广东移动通信有限公司 通信方法及通信装置

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111345072A (zh) * 2020-02-14 2020-06-26 北京小米移动软件有限公司 接入控制方法、装置、通信设备及存储介质
CN111918359A (zh) * 2020-07-03 2020-11-10 中兴通讯股份有限公司 接入控制方法、第一网络节点、第二网络节点及存储介质
CN112020879A (zh) * 2020-07-23 2020-12-01 北京小米移动软件有限公司 接入控制方法及装置、存储介质
CN112385270A (zh) * 2020-10-15 2021-02-19 北京小米移动软件有限公司 接入控制信息处理方法及装置、通信设备及存储介质

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111345072A (zh) * 2020-02-14 2020-06-26 北京小米移动软件有限公司 接入控制方法、装置、通信设备及存储介质
CN111918359A (zh) * 2020-07-03 2020-11-10 中兴通讯股份有限公司 接入控制方法、第一网络节点、第二网络节点及存储介质
CN112020879A (zh) * 2020-07-23 2020-12-01 北京小米移动软件有限公司 接入控制方法及装置、存储介质
CN112385270A (zh) * 2020-10-15 2021-02-19 北京小米移动软件有限公司 接入控制信息处理方法及装置、通信设备及存储介质

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
ERICSSON: "Higher-layer aspects for Redcap", 3GPP TSG-RAN WG1 MEETING #101-E R1-2003292, 5 June 2020 (2020-06-05), XP051885086 *
SAMSUNG: "Considerations on access barring and UE capability", 3GPP TSG RAN WG1 #101 E-MEETING, R1-2003913, 5 June 2020 (2020-06-05), XP051885679 *
ZTE CORPORATION ET AL.: "Redcap UE identification and access control", 3GPP TSG-RAN WG2 MEETING #111 ELECTRONIC R2-2006904, 7 August 2020 (2020-08-07), XP051911779 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023064654A1 (en) * 2021-10-14 2023-04-20 Qualcomm Incorporated Reduced capability user equipment operations
WO2024073889A1 (zh) * 2022-10-08 2024-04-11 Oppo广东移动通信有限公司 通信处理方法及装置、终端设备、网络设备

Also Published As

Publication number Publication date
AU2021299783A1 (en) 2023-03-02
US20230247526A1 (en) 2023-08-03
CN111918359A (zh) 2020-11-10
AU2021299783B2 (en) 2024-05-02
EP4178268A1 (en) 2023-05-10

Similar Documents

Publication Publication Date Title
WO2022001632A1 (zh) 接入控制方法、第一网络节点、第二网络节点及存储介质
JP6530111B2 (ja) 免許不要無線周波数スペクトル帯域を通じて信号送信または参照信号のパターンを送信するための技法
US10880936B2 (en) Cluster head selection in a communications network
WO2019140636A1 (zh) 小区重选方法、装置及系统
US9907081B2 (en) Managing resources for device-to-device D2D discovery in an ad-hoc radio communication network
TW201919430A (zh) D2d通訊中資源選取的方法和終端設備
JP2018529274A (ja) サービスベースのセル選択および再選択
JP2018512811A (ja) 近接サービスリレーの選択
US20120269095A1 (en) Method and apparatus for providing a network search function
WO2019144399A1 (zh) 一种小区重选方法及装置、计算机存储介质
US11071048B2 (en) Indicator-controlled utilization of outdated configuration defined in access information table for access network
KR20140039149A (ko) 이웃 셀들과 통신하기 위한 방법 및 장치
WO2022095819A1 (zh) 小区重选方法、相关设备及存储介质
WO2022028191A1 (zh) 一种监测控制信道、确定传输配置指示的方法及终端
WO2021031666A1 (zh) 一种通信方法、装置和存储介质
EP4158989A1 (en) Tunnel reuse for multicast and broadcast service
WO2021196979A1 (zh) 一种rrm测量方法及设备
US20210204312A1 (en) Downlink control information transmission method and apparatus
CN102210176B (zh) 在无线通信系统中确定小区的接入模式的方法
WO2020140288A1 (zh) 无线通信方法及设备
JP2021503214A (ja) 基地局およびユーザ機器
WO2022147724A1 (zh) 一种小区的选择方法及装置
WO2021156984A1 (ja) 端末装置及び無線通信方法
WO2021088093A1 (zh) 通信方法及装置
WO2020140290A1 (zh) 无线通信方法及设备

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21832970

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 2021832970

Country of ref document: EP

Effective date: 20230203

ENP Entry into the national phase

Ref document number: 2021299783

Country of ref document: AU

Date of ref document: 20210611

Kind code of ref document: A