WO2022048344A1 - 一种通信方法及设备 - Google Patents

一种通信方法及设备 Download PDF

Info

Publication number
WO2022048344A1
WO2022048344A1 PCT/CN2021/108492 CN2021108492W WO2022048344A1 WO 2022048344 A1 WO2022048344 A1 WO 2022048344A1 CN 2021108492 W CN2021108492 W CN 2021108492W WO 2022048344 A1 WO2022048344 A1 WO 2022048344A1
Authority
WO
WIPO (PCT)
Prior art keywords
access
parameter set
terminal device
identity
auxiliary parameter
Prior art date
Application number
PCT/CN2021/108492
Other languages
English (en)
French (fr)
Inventor
张健
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to JP2023514945A priority Critical patent/JP2023539912A/ja
Priority to EP21863412.9A priority patent/EP4199597A4/en
Publication of WO2022048344A1 publication Critical patent/WO2022048344A1/zh
Priority to US18/178,071 priority patent/US20230209442A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • H04W48/12Access restriction or access information delivery, e.g. discovery data delivery using downlink control channel

Definitions

  • the present application relates to the field of communication technologies, and in particular, to a communication method and device.
  • the network side controls the access of user equipment (UE) through a unified access control (unifiied access control, UAC) technology.
  • UE user equipment
  • UAC unified access control
  • Concepts related to UAC are access class, access identity, and access category.
  • Each UE is assigned a corresponding access level, and the access level is generally written into a subscriber identity module (subscriber identity module, SIM) card, and the UE with the SIM card installed can determine the access level of the UE.
  • the access level and the access identity have a corresponding relationship, and the corresponding relationship can be specified by standards.
  • a cell can broadcast access control parameters through system information block 1 (SIB1).
  • SIB1 system information block 1
  • the access control parameters correspond to the access type, and the access type can be determined according to the service.
  • each set of access control parameters has Applicable access identity, so that the UE can determine the applicable access control parameter according to the access identity of the UE and the service performed by the UE, so as to determine whether the UE is allowed to access the cell according to the access control parameter.
  • the assigned access level is one of access level 0 to access level 9.
  • the corresponding access identity is access identity 0. .
  • Embodiments of the present application provide a communication method and device, which are used to respectively perform access control on different terminal devices.
  • a first communication method is provided, and the method can be executed by a terminal device or executed by a chip system. According to the access identity of the terminal device, it is determined that the terminal device applies the first access control parameter set; wherein, the access identity of the terminal device is determined based on the access level of the terminal device, and the access level of the terminal device is determined.
  • the level is one of access level 0 to access level 9, and access level 0 to access level 9 correspond to one or more of the following access identities: access identity 3 to access identity 10, or, access H access identities with identity numbers greater than or equal to 16, where H is a positive integer; determine whether the terminal device is allowed to access the first cell according to the first access control parameter set, and the first cell is the terminal The device receives the cell of the first access control parameter set.
  • the access level allocated to the terminal device is one of access level 0 to access level 9, but these access levels will correspond to new access identities, so correspondingly, different access levels
  • the level (or different access identities) will be applicable to different access control parameters, so that when performing access control on these terminal devices, different access control parameters can be applied, so as to achieve different access control parameters for different terminal devices.
  • Access control is performed to achieve finer-grained differentiated control.
  • the terminal equipment required by the network, or the terminal equipment that needs to access the network more can implement preferential access to the network to meet the requirements of the terminal equipment and the network.
  • determining that the terminal device is applicable to the first access control parameter set according to the access type and access identity of the terminal device includes: The access type and access identity of the terminal device are used to determine that the terminal device is applicable to the first access control parameter set.
  • the terminal device can determine that the terminal device is applicable to the first access control parameter set according to the access identity and access type of the terminal device, or can also determine that the terminal device is applicable to the first access control parameter set according to the access identity, without resorting to access. input type.
  • the first terminal device belongs to the first type, and the terminal devices of the same type have The access levels are the same; among them, different types of terminal equipment meet one or more of the following:
  • terminal devices may be divided into various types, and there may be various division factors. For example, they may be divided according to the bandwidth supported by the terminal device, or according to the number of antennas supported by the terminal device, or according to the bandwidth supported by the terminal device. As well as application scenario division, and so on.
  • the terminal devices participating in the classification in the embodiment of the present application are, for example, all redcap terminal devices, or may also include other terminal devices, for example, may also include legacy terminal devices.
  • the method further Including: receiving a first message, where the first message includes first indication information and at least one auxiliary parameter set, where the first indication information is used to indicate that an auxiliary parameter set is configured for one or more access classes, or indicates that the auxiliary parameter set is configured for one or more access classes.
  • One or more access identities are configured with auxiliary parameter sets, and the at least one auxiliary parameter set includes all auxiliary parameter sets indicated by the first indication information; it is determined according to the first indication information that the terminal device corresponds to the the first auxiliary parameter set of the at least one auxiliary parameter set.
  • an auxiliary parameter set may also be configured for different types of terminal devices, so that the access control.
  • an auxiliary parameter set is separately configured for one or more access classes, or an auxiliary parameter set is separately configured for one or more access identities.
  • the network device needs to inform the terminal device about which access level or access levels the network device is configured with the auxiliary parameter set for, or for which access identity or access identities the auxiliary parameter set is configured.
  • the network device can send the first indication information, and use the first indication information to indicate which access identity or access identities are configured with the auxiliary parameter set, or for which access class or access levels are configured with the auxiliary parameter set, so that a terminal device can Whether the terminal device is configured with an auxiliary parameter set can be determined according to the first indication.
  • the network device may send the first indication information and at least one auxiliary parameter set in one message, such as SIB1, or other messages. Therefore, the terminal device can obtain the auxiliary parameter set and the first indication information through one message, and there is no need to exchange too many messages between the network device and the terminal device, which simplifies the implementation process.
  • the method further comprising: receiving first indication information, where the first indication information is used to indicate that auxiliary parameter sets are configured for one or more access classes, or indicate that auxiliary parameter sets are configured for one or more access identities; according to the The first indication information determines that the terminal device corresponds to the first auxiliary parameter set.
  • the first indication information is used for indicating that an auxiliary parameter set is configured for each of the one or more access classes; or, the first indication information is used to indicate that an auxiliary parameter set is configured for each of the one or more access identities
  • Access ID is configured with an auxiliary parameter set; or, the first indication information is used to indicate that an auxiliary parameter set is configured for one or more access classes; or, the first indication information is used to indicate that one or more access classes are configured with an auxiliary parameter set
  • the access identity is configured with an auxiliary parameter set.
  • an auxiliary parameter set may be configured for one access identity or access level, so that different auxiliary parameter sets may be configured for different access identities or access levels, so as to realize the Differentiated control of terminal equipment at different levels makes the control granularity finer.
  • one auxiliary parameter set may also be configured for multiple access identities or access classes, which simplifies the configuration process and reduces the signaling overhead caused by sending the auxiliary parameter set.
  • the sixth optional embodiment of the first aspect In the embodiment of Whether the terminal device can access the first cell.
  • the terminal device can determine whether the terminal device can access the first cell according to the first access control parameter set and the first auxiliary parameter set, which is achieved through the auxiliary parameter set. Differentiated control of different types of terminal equipment.
  • the first auxiliary parameter set includes one or more of the following parameters: a probability factor, the probability factor is used to adjust the prohibition factor, the The barring factor is included in the first access control parameter set; the time factor is used to adjust the barring time, and the barring time is included in the first access control parameter set; dedicated or, a first threshold, where the first threshold is a threshold of a first parameter, and the first parameter is used to indicate the signal quality of the terminal device.
  • An auxiliary parameter set may include one or more parameters as above, or may also include other parameters.
  • the method further includes: determining that the measured value of the first parameter is smaller than the first parameter a threshold, the first auxiliary parameter set is used.
  • the first parameter is RSRP, RSRQ, SINR, or the like. If the value of the first parameter measured by the terminal device is less than the first threshold, the terminal device can use the first auxiliary parameter set, and if the value of the first parameter measured by the terminal device is greater than or equal to the first threshold, then the terminal device can use the first auxiliary parameter set. Then the first auxiliary parameter set may not be used.
  • the auxiliary parameter set can be used by users with poor signal quality, such as restricting the access of these users through the auxiliary parameter set (for example, setting the probability factor to be small, or setting the signal quality of the random access resource) poor, or less random access resources, etc.), so that users with better signal quality can access the cell more, so that while implementing access control for different types of terminal equipment, it can also realize the The terminal equipment of signal quality performs access control respectively.
  • the method further includes:
  • At least one auxiliary parameter set is received, the at least one auxiliary parameter set includes all the auxiliary parameter sets indicated by the first indication information, and the at least one auxiliary parameter set includes the first auxiliary parameter set.
  • the network device may also send the first indication information and at least one auxiliary parameter set in different messages, so as to reduce the amount of information in one message and improve the success rate of message sending.
  • the first access control parameter set includes second indication information, where the second indication information is used to indicate an access identity to which the first access control parameter is applicable.
  • an access control parameter set is not applicable to access identity 0 by default, but includes second indication information, which access identity or access identity the access control parameter set is applicable to can be indicated by the second indication information,
  • a terminal device can determine whether the terminal device applies an access control parameter set according to the access identity of the terminal device and the second indication information.
  • the access identities applicable to an access control parameter set are expanded, so that the application of the access control parameter set is more reasonable.
  • the first access control parameter set belongs to a first set, the first set further includes a second access control parameter set, and the first set further includes the first access control parameter set.
  • third indication information corresponding to the access control parameter set and fourth indication information corresponding to the second access control parameter set where the third indication information is used to indicate the access to which the first access control parameter set is applicable identity, and the fourth indication information is used to indicate the access identity to which the second access control parameter set is applicable.
  • This method is equivalent to expanding the content of the existing access control parameter set.
  • one access control parameter set (or, a set) corresponds to one access type, under one access type, it can also provide Access control parameter sets applicable to different access identities are more conducive to realizing refined access control.
  • the access class of the terminal device belongs to a first type of access class, and the first type of access class is used to configure the redcap terminal device.
  • the terminal device described in this embodiment of the present application is, for example, a redcap terminal device, or may also include other types of terminal devices, such as legacy terminal devices and the like.
  • a second communication method is provided, and the method can be executed by a network device or executed by a chip system.
  • the network device is, for example, an access network device, such as a base station.
  • different access levels correspond to different types of terminal equipment, and the same type of terminal equipment has the same access level;
  • the device satisfies one or more of the following: different types of terminal equipment support different bandwidths; different types of terminal equipment support different numbers of antennas; different types of terminal equipment have different application scenarios; different types of terminal equipment support
  • the maximum data transfer rate is different; or, the maximum transport block size supported by different types of end devices is different.
  • the method further includes: sending a first message, where the first message includes first indication information and at least one auxiliary parameter set, where the first indication information is used to indicate that auxiliary parameter sets are configured for one or more access classes, or indicate that auxiliary parameter sets are configured for one or more access identities,
  • the at least one auxiliary parameter set includes all auxiliary parameter sets indicated by the first indication information.
  • the method further includes: sending first indication information, the first indication The information is used to indicate that auxiliary parameter sets are configured for one or more access classes, or to indicate that auxiliary parameter sets are configured for one or more access identities.
  • the first indication information is used for indicating that an auxiliary parameter set is configured for each of the one or more access classes; or, the first indication information is used to indicate that an auxiliary parameter set is configured for each of the one or more access identities
  • Access ID is configured with an auxiliary parameter set; or, the first indication information is used to indicate that an auxiliary parameter set is configured for one or more access classes; or, the first indication information is used to indicate that one or more access classes are configured with an auxiliary parameter set
  • the access identity is configured with an auxiliary parameter set.
  • one auxiliary parameter set in the at least one auxiliary parameter set includes one or more of the following parameters: a probability factor, the probability factor is used to adjust a prohibition factor, and the prohibition factor is included in the first In the access control parameter set; a time factor, the time factor is used to adjust the access barring time, and the access barring time is included in the first access control parameter set; dedicated random access resource information; or , a first threshold, where the first threshold is a threshold of a first parameter, and the first parameter is used to indicate the signal quality of the terminal device.
  • the sixth optional embodiment of the second aspect In an embodiment of Describe the first auxiliary parameter set.
  • the first access control parameter set in the at least one access control parameter set includes second indication information, and the second indication information is used to indicate an access control parameter to which the first access control parameter is applicable. into the identity.
  • the at least one access control parameter set includes a first access control parameter set and a second access control parameter set, the first access control parameter set and the second access control parameter set The set belongs to the first set, and the first set further includes third indication information corresponding to the first access control parameter set and fourth indication information corresponding to the second access control parameter set, the third indication The information is used to indicate the access identities applicable to the first access control parameter set, and the fourth indication information is used to indicate the access identities applicable to the second access control parameter set.
  • the access class of the terminal device belongs to the first type of access class, and the first type of access class is used to configure the redcap terminal device.
  • a third communication method is provided, and the method can be executed by a terminal device or executed by a chip system.
  • receiving at least one access control parameter set and an auxiliary parameter set determining that the terminal device corresponds to the first access control parameter set in the at least one access control parameter set according to the access identity of the terminal device; according to the The first access control parameter set and the auxiliary parameter set determine whether the terminal device is allowed to access the first cell.
  • an auxiliary parameter set can be configured for some terminal devices, for example, an auxiliary parameter set can be configured for a redcap terminal device, so that the redcap terminal device can apply the auxiliary parameter set to determine whether it can access a cell, which realizes that the redcap terminal device can access the cell or not. Access control is performed separately from legacy terminal devices, making the control granularity more fine-grained.
  • determining that the terminal device is applicable to the first access control parameter set according to the access type and access identity of the terminal device includes: The access type and access identity of the terminal device are used to determine that the terminal device is applicable to the first access control parameter set.
  • the auxiliary parameter set includes one or more of the following parameters: probability factor , the probability factor is used to adjust the prohibition factor, and the prohibition factor is included in the first access control parameter set; the time factor is used to adjust the access prohibition time, and the access prohibition time includes In the first access control parameter set; dedicated random access resource information; or, a first threshold, where the first threshold is a threshold of a first parameter, and the first parameter is used to indicate the terminal device signal quality.
  • the method further includes: determining that the measured value of the first parameter is smaller than the value of the first parameter. a threshold, the auxiliary parameter set is used.
  • the fourth optional implementation manner of the third aspect includes: adjusting the prohibition factor using the probability factor; generating a random number, if the random number is smaller than the adjusted Forbidden factor, determine that the terminal device can access the first cell, otherwise, determine that the terminal device is prohibited from accessing the first cell; if the terminal device is prohibited from accessing the first cell, enable A timer, where the timing duration of the timer is the duration obtained after adjusting the access prohibition time according to the time factor, wherein, before the timer expires, the terminal device is prohibited from accessing the first community.
  • the parameters included in the auxiliary parameter set can be used to adjust the corresponding parameters included in the access control parameter set, so as to implement access control for different types of UEs.
  • the access level of the terminal device is one of access level 0 to access level 9.
  • the access level may not be newly configured for the terminal device, and the terminal device only needs to apply the original access level.
  • an access class may also be newly configured for the terminal device, for example, one of access class 0 to access class 9 may be configured.
  • the access identity of the terminal device is one of the access identity 3 to the access identity 10, or one of the H access identities with the access identity number greater than or equal to 16, where H is positive integer.
  • the method further includes: determining that the terminal device is applicable to the auxiliary parameter set according to the capability information of the terminal device; or, determining the terminal device according to the access level of the terminal device Applying the auxiliary parameter set, the access level of the terminal device is the first type of access level, wherein, in the first type of access level, different access levels correspond to the The same auxiliary parameter set or a different auxiliary parameter set; or, according to the access identity of the terminal device, it is determined that the terminal device applies the auxiliary parameter set, and the access identity of the terminal device is the first type of access access identities, wherein in the first type of access identities, different access identities correspond to the same auxiliary parameter set or different auxiliary parameter sets in the auxiliary parameter set, and the first type of access identities It includes one or more of the following: access identity 3 to access identity 10, or H access identities whose access identity numbers
  • the terminal device can determine whether the terminal device is suitable for the auxiliary parameter set in different ways. For example, the terminal device can determine the auxiliary parameter set applicable to the terminal device according to the capability of the terminal device. For example, it is stipulated that the terminal device with the first capability is suitable for the auxiliary parameter set, but the terminal device with other capabilities does not apply the auxiliary parameter set, and then has the first capability.
  • the terminal equipment with the same capability can use the auxiliary parameter set, while the terminal equipment with other capabilities does not use the auxiliary parameter set.
  • the first capability includes, for example, antenna capability or bandwidth capability, and possibly other capabilities.
  • a terminal device may be assigned a new access level.
  • a terminal device applies the auxiliary parameter set; otherwise, the terminal device does not apply the auxiliary parameter set. .
  • a new access identity may be allocated to a terminal device. If a terminal device is configured with a new access identity, the terminal device applies the auxiliary parameter set, otherwise the terminal device does not apply the auxiliary parameter set . It can be seen that, in the embodiment of the present application, the terminal device can determine whether the terminal device is suitable for the auxiliary parameter set in various ways, which is relatively flexible.
  • a fourth communication method is provided, and the method can be executed by a network device or executed by a chip system.
  • the network device is, for example, an access network device, such as a base station.
  • determining at least one access control parameter set, and determining an auxiliary parameter set, the at least one access control parameter set and the auxiliary parameter set are used by the terminal device to determine whether to allow access to the first cell; sending the at least one access control parameter set A control parameter set and the auxiliary parameter set.
  • the auxiliary parameter set includes one or more of the following parameters: a probability factor, the probability factor is used to adjust the prohibition factor, the The barring factor is included in the first access control parameter set; the time factor is used to adjust the barring time, and the barring time is included in the first access control parameter set; dedicated or, a first threshold, where the first threshold is a threshold of a first parameter, and the first parameter is used to indicate the signal quality of the terminal device.
  • the method further includes: determining that the measured value of the first parameter is smaller than the first parameter a threshold, the auxiliary parameter set is used.
  • the terminal device The access class is one of access class 0 to access class 9.
  • the terminal device The access identity is one of access identities 3 to 10, or one of H access identities greater than or equal to 16, where H is a positive integer.
  • the auxiliary parameter set corresponds to the first capability of the terminal device; or, the auxiliary parameter set corresponds to the access level of the first type, wherein in the first type of access In the access level, different access levels correspond to the same auxiliary parameter set or different auxiliary parameter sets in the auxiliary parameter set; or, the auxiliary parameter set corresponds to the first type of access identity, wherein in the said auxiliary parameter set In the first type of access identities, different access identities correspond to the same auxiliary parameter set or different auxiliary parameter sets in the auxiliary parameter set, and the first type of access identities include one or more of the following: access Access identity 3 to access identity 10, or H access identities whose access identity numbers are greater than or equal to 16, where H is a positive integer.
  • a communication device may comprise means for performing the method in the first aspect or any optional embodiment of the first aspect, eg comprising a processing unit.
  • a transceiver unit may also be included.
  • a storage unit may also be included.
  • a communication device in a sixth aspect, may comprise a module for performing the method in the second aspect or any optional implementation manner of the second aspect, for example comprising a transceiving unit and a processing unit.
  • a storage unit may also be included.
  • a communication device may include a module for performing the method in the third aspect or any optional implementation manner of the third aspect, for example including a transceiver unit and a processing unit.
  • a storage unit may also be included.
  • a communication device may include a module for performing the method in the fourth aspect or any optional implementation manner of the fourth aspect, for example including a transceiver unit and a processing unit.
  • a storage unit may also be included.
  • a chip system in a ninth aspect, includes one or more processors, and includes a communication interface, the processor is coupled to the communication interface, and is used for implementing the above first aspect or the first aspect.
  • the chip system may further include a memory, for example, the processor may read and execute a software program stored in the memory, so as to implement the first aspect or any one of the options of the first aspect. The method provided by the embodiment.
  • a tenth aspect provides a chip system, the chip system includes one or more processors, and includes a communication interface, the processor is coupled to the communication interface, and is used for implementing the second aspect or the second aspect.
  • the chip system may further include a memory, for example, the processor may read and execute a software program stored in the memory, so as to implement the second aspect or any one of the optional aspects of the second aspect. The method provided by the embodiment.
  • a chip system in an eleventh aspect, includes one or more processors, and includes a communication interface, the processor is coupled to the communication interface, and is used for implementing the above third aspect or the third aspect The method provided by any optional embodiment of .
  • the chip system may further include a memory, for example, the processor may read and execute a software program stored in the memory, so as to implement the third aspect or any one of the options of the third aspect. The method provided by the embodiment.
  • a twelfth aspect provides a chip system, the chip system includes one or more processors, and includes a communication interface, the processor is coupled with the communication interface, and is used for implementing the above-mentioned fourth aspect or the fourth aspect
  • the chip system may further include a memory, for example, the processor may read and execute a software program stored in the memory, so as to implement the fourth aspect or any one of the optional aspects of the fourth aspect. The method provided by the embodiment.
  • a thirteenth aspect provides a first communication system.
  • the first communication system includes the communication device of the fifth aspect or the chip system of the ninth aspect, and the communication device of the sixth aspect or the chip system of the tenth aspect.
  • a fourteenth aspect provides a second communication system.
  • the first communication system includes the communication device of the seventh aspect or the chip system of the eleventh aspect, and the communication device of the eighth aspect or the chip system of the twelfth aspect.
  • a fifteenth aspect provides a computer-readable storage medium, where the computer-readable storage medium is used to store a computer program, and when the computer program is executed on a computer, the computer is made to execute any one of the above-mentioned aspects. method.
  • a sixteenth aspect provides a computer program product comprising instructions, the computer program product is used to store a computer program, and when the computer program runs on a computer, the computer is made to execute the method provided in any one of the above aspects .
  • the access levels allocated to the terminal equipment correspond to at least two access identities, and correspondingly, different access levels (or, in other words, different access identities) are applicable to different access identities.
  • Input control parameters so as to achieve differentiated control for different types of terminal equipment.
  • FIG. 1 is a schematic diagram of an application scenario of an embodiment of the present application
  • FIG. 2 is a flowchart of a first communication method provided by an embodiment of the present application.
  • FIG. 3 is a flowchart of a second communication method provided by an embodiment of the present application.
  • FIG. 4 is a schematic block diagram of a communication device provided by an embodiment of the present application.
  • FIG. 5 is a schematic block diagram of still another communication apparatus provided by an embodiment of the present application.
  • a terminal device is a device with a wireless transceiver function, which may be a fixed device, a mobile device, a handheld device, a wearable device, a vehicle-mounted device, or a wireless device (for example, a communication module or a wireless device) built into the above-mentioned device. system-on-chip, etc.).
  • the terminal equipment may sometimes be referred to as user equipment (user equipment, UE), a terminal, an access station, a UE station, a remote station, a wireless communication device, or a user equipment, etc.
  • UE user equipment
  • the device is described by taking the UE as an example.
  • redcap UE a type of UE concerned by the embodiments of this application is a reduced capability UE (Reduced Capability UE, redcap UE).
  • redcap UE The reason why it is called redcap UE is that compared with the existing ordinary NR UE, redcap UE equipment usually only supports lower bandwidth, such as 20MHz, and supports fewer transceiver antennas, such as only 1T1R or 1T2R.
  • redcap UE includes three types of low-capability UEs: wearable products, video surveillance equipment and industrial sensor equipment.
  • the network devices in the embodiments of the present application include, for example, access network devices and/or core network devices.
  • the access network device is a device with a wireless transceiver function, and is used to communicate with the terminal device.
  • the access network equipment includes but is not limited to the base station (BTS, Node B, eNodeB/eNB, or gNodeB/gNB), the transmission reception point (TRP) in the above-mentioned communication system, the base station of the subsequent evolution of 3GPP, and the WiFi system. access nodes, wireless relay nodes, wireless backhaul nodes, etc.
  • the base station may be: a macro base station, a micro base station, a pico base station, a small base station, a relay station, and the like.
  • Multiple base stations may support the aforementioned networks of the same access technology, or may support the aforementioned networks of different access technologies.
  • a base station may contain one or more co-sited or non-co-sited transmission reception points.
  • the network device may also be a wireless controller, a centralized unit (centralized unit, CU), and/or a distributed unit (distributed unit, DU) in a cloud radio access network (cloud radio access network, CRAN) scenario.
  • the network device can also be a server, a wearable device, or a vehicle-mounted device.
  • a network device in the V2X technology may be a road side unit (RSU).
  • RSU road side unit
  • the multiple network devices in the communication system may be base stations of the same type, or may be base stations of different types.
  • the base station can communicate with the terminal equipment, and can also communicate with the terminal equipment through the relay station.
  • a terminal device can communicate with multiple base stations in different access technologies.
  • the core network equipment is used to implement functions such as mobility management, data processing, session management, policy and charging.
  • the names of devices implementing core network functions in systems with different access technologies may be different, which are not limited in this application.
  • the core network equipment includes: an access and mobility management function (AMF), a session management function (SMF), or a user plane function (UPF) Wait.
  • AMF access and mobility management function
  • SMF session management function
  • UPF user plane function
  • the apparatus for implementing the function of the network device may be the network device, or may be an apparatus capable of supporting the network device to implement the function, such as a chip system, and the apparatus may be installed in the network device.
  • the technical solutions provided by the embodiments of the present application are described by taking the device for realizing the function of the network device being a network device as an example.
  • the number of nouns means “singular nouns or plural nouns", that is, “one or more”. "At least one” means one or more, and “plurality” means two or more. "And/or”, which describes the relationship of the associated objects, indicates that there can be three kinds of relationships, for example, A and/or B, it can indicate that A exists alone, A and B exist at the same time, and B exists alone, where A, B can be singular or plural.
  • the character “/" generally indicates that the associated objects are an "or” relationship. For example, A/B, means: A or B.
  • At least one item(s) below or similar expressions thereof refer to any combination of these items, including any combination of single item(s) or plural items(s).
  • at least one of a, b, or c means: a, b, c, a and b, a and c, b and c, or a and b and c, where a, b, c Can be single or multiple.
  • ordinal numbers such as “first” and “second” mentioned in the embodiments of the present application are used to distinguish multiple objects, and are not used to limit the size, content, order, and timing of multiple objects , priority or importance, etc.
  • the first indication information and the second indication information may be the same indication information or different indication information, and this name does not indicate the amount of information, content and priority of the two indication information. , the order of sending, or the level of importance.
  • the function that the network prohibits the UE from camping is implemented by including two bits (bits) in the master information block (master information block, MIB). These two bits represent cell barred (cellBarred) and internal frequency selection (intraFreqReselection), respectively.
  • cellBarred indicates whether the network allows the UE to camp
  • intraFreqReselection indicates whether the network allows the UE to reselection to the same-frequency neighbor cell.
  • the access control of the UE is currently implemented through the UAC technology.
  • Concepts related to UAC include access class, access identity and access type.
  • Each UE is assigned a corresponding access level, and the access level is generally written into the SIM card, and the UE with the SIM card installed can determine the access level of the UE.
  • the assigned access level is generally one of access level 0 to access level 9, and access level 11 to access level 15 are assigned to high-priority users.
  • the standard defines the correspondence (or mapping relationship) between access levels and access identities, in which access level 0 to access level 9 are all mapped to access identity 0, and access level 11 to access level Level 15 is mapped to Access Identity 11 to Access Identity 15, respectively. That is, in most cases, ordinary UEs are mapped to access identity 0. It can be seen that the access class or access identity can be used to distinguish the type of UE. Please refer to Table 1 for currently defined access identities and corresponding UE configurations.
  • An access type is also defined in the standard, which is used to distinguish the service type of the access. Therefore, the access type is related to the service of the UE. For example, when the UE initiates access due to an emergency call, the access type is access type 2. Please refer to Table 2 for the currently defined access types and corresponding services, where the access type number is the first column of Table 2, and the UE services can refer to the third column of Table 2. It can be seen that different services can correspond to Different access type numbers correspond to different access types.
  • the access level of a UE is 2, then according to the foregoing description, it can be known that the access identity of the UE is access identity 0.
  • the UE initiates random access due to an emergency then according to Table 2, it can be known that the access type of the UE is access type 2.
  • the access control parameter corresponds to the access type, and the UE can determine the access control parameter corresponding to the access type 2.
  • the access control parameter can indicate whether the access control parameter is applicable to the corresponding access identity, so that the UE can determine whether the access identity 0 can apply the access control parameter. If the access identity 0 can apply the access control parameter, the UE uses the access control parameter.
  • Access control parameters determine whether access to the cell is allowed.
  • the assigned access level is one of access level 0 to access level 9, and in most cases, for ordinary users, the corresponding access identities are Access identity 0. Then, when performing access control on common UEs, it is likely to be controlled by the same set of access control parameters. This method cannot distinguish different UEs, or in other words, it is impossible to perform access control on different UEs respectively.
  • the access level allocated to the terminal device is one of access level 0 to access level 9, but the access identities corresponding to these access levels may be access identities 3 to 10 or H
  • the terminal equipment required by the network, or the terminal equipment that needs to access the network more can implement preferential access to the network to meet the requirements of the terminal equipment and the network.
  • the technical solutions provided in the embodiments of this application can be applied to 4G systems, such as LTE systems, or can be applied to 5G systems, such as NR systems, or can also be applied to next-generation mobile communication systems or other similar communication systems. No restrictions.
  • FIG. 1 is an application scenario of the embodiment of the present application.
  • FIG. 1 includes access network equipment, core network equipment and UE.
  • the UE may determine whether to allow access to the cell provided by the access network device through the access control parameter.
  • the access network device for example, works in the Evolved UMTS terrestrial radio access (E-UTRA) system, or works in the NR system, or works in the next generation communication system or other communication systems middle.
  • the access network device is, for example, a base station.
  • the access network equipment corresponds to different equipment in different systems, for example, in a 4G system, it may correspond to an eNB, and in a 5G system, it corresponds to an access network equipment in 5G, such as a gNB.
  • the technical solutions provided in the embodiments of the present application can also be applied to future mobile communication systems, so the access network equipment in FIG. 1 can also correspond to network equipment in future mobile communication systems.
  • FIG. 1 takes the access network device being a base station as an example.
  • the access network device may also be a device such as an RSU.
  • the UE in FIG. 1 is taken as an example of a mobile phone.
  • the UE in the embodiment of the present application is not limited to the mobile phone.
  • FIG. 2 is a flowchart of the method.
  • the method is applied to the network architecture shown in FIG. 1 as an example.
  • the method is performed by the network device and the UE as an example. This is because the embodiment of the present application is applied to the network architecture shown in FIG. 1 as an example. Therefore, the network device described below is, for example, the access network device in the network architecture shown in FIG. 1 , and the UE described below may be the UE in the network architecture shown in FIG. 1 .
  • the UE may receive at least one access control parameter set.
  • the network device may send at least one access control parameter set in the first cell through a system message, such as SIB1, or other system messages, that is, the network device places the at least one access control parameter set in the
  • the network device may also send at least one access control parameter set in different messages, for example, each message sends one access control parameter set.
  • the UE receives the system message in the first cell, thereby obtaining at least one access control parameter set.
  • An access control parameter set corresponds to an access type, for example, each access control parameter set in at least one access control parameter set corresponds to an access type.
  • the UE can determine the access type corresponding to the UE according to the service initiated by the UE to access, so that the UE can determine the access control parameter set corresponding to the UE.
  • an access control parameter set will have an applicable access identity, and a UE will also have the access identity of the UE.
  • a UE can determine the access control parameters corresponding to the UE according to the access type of the UE. Then, according to the access identity of the UE, it can be determined whether the UE is suitable for the access control parameter set. If the UE is suitable for the access control parameter set, the UE can determine whether the UE is suitable for the access control parameter set. Access to the network device is allowed, or in other words, it is determined whether the UE is allowed to access the first cell.
  • the network device sends at least one access control parameter set through a message, and the format of the message is, for example:
  • accessCategory represents the access type number
  • uac-barringInfoSetIndex represents the index of the access control parameter set corresponding to the access type number indicated by accessCategory.
  • the message may next include one or more sets of access control parameters.
  • the format of an access control parameter set is as follows:
  • the UAC-BarringInfoSet will correspond to an index, and the index will be written after the UAC-BarringInfoSet, for example, the index is 1 or 2, etc.
  • the message may include at least one access control parameter set, and each access control parameter set corresponds to (or includes) an index. Therefore, a UE can determine the access type number of the UE according to the service of the UE and in combination with Table 2, and can determine the index of the access control parameter set corresponding to the access type number according to the access type number, and then according to the access control parameter By setting the index of the set, the access control parameter set corresponding to the UE can be determined from at least one access control parameter set included in the message.
  • an access control parameter set may include the parameters uac-BarringFactor, uac-BarringTime and uac-BarringForAccessIdentity.
  • the uac-BarringFactor can be called a prohibition factor, and the value of the prohibition factor is a probability value, such as 40% or 50%, or is expressed as 0.4 or 0.5.
  • the UE After determining the access control parameter set corresponding to the UE, the UE generates a random number (rand) before initiating access. If the random number is less than the value of the prohibition factor, the UE allows access to the cell, and If the random number is greater than or equal to the value of the barring factor, the UE is barred from accessing the cell.
  • the network can control the number of access UEs by setting the prohibition factor. For example, the network can set the value of the prohibition factor to be smaller, then the possibility that the random number generated by the UE is smaller than the value is very small, and the UE is not easy to access. into the cell, so that the number of UEs accessing the cell is less, so as to reduce the load of the network.
  • uac-BarringTime can be called access barring time, and the value of uac-BarringTime is a duration. If the UE determines that the UE is barred from accessing the cell according to the barring factor, the UE may start a timer T390, and the duration of T390 may be obtained according to the value of the barring time. Within this time period, the UE is not allowed to access the cell (or is prohibited from accessing the cell), and after this time period, the UE may generate a random number again to determine whether to allow access to the cell again according to the prohibition factor.
  • the UE to which the embodiments of this application are applicable is, for example, a redcap UE.
  • Both the redcap UE and the legacy (legacy) UE need to receive SIB1.
  • the legacy UE is a UE with ordinary capabilities, or is not a UE with limited capabilities, or is a UE other than a redcap UE. of other UEs.
  • An implementation of SIB1 is that the SIB1 corresponding to the redcap UE and the legacy UE are the same. In this case, the access control parameter set may not be changed, and the at least one access control parameter set is applicable to both the redcap UE and the legacy UE. .
  • an access control parameter set may also include a parameter, which is uac-BarringForAccessIdentity, and uac-BarringForAccessIdentity may indicate an access identity to which the access control parameter set applies.
  • a UE can Determine if the access control parameter set is applicable.
  • the uac-BarringForAccessIdentity included in an access control parameter set may indicate whether the access control parameter set is applicable to access identities 1, 2, 11, 12, 13, 14, and 15.
  • the uac-BarringForAccessIdentity can be implemented in the form of a bitmap. For example, the number of bits included in the uac-BarringForAccessIdentity is 7, and the 7 bits correspond to the access identities 1, 2, 11, 12, 13, 14, and 15, respectively.
  • a first type of access level is allocated to the UE, and the first type of access level corresponds to the first type of access identity.
  • the first type of access class includes, for example, one or more of access class 0 to access class 9, or includes other access classes, such as: 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, etc.
  • the first type of access level refers to an access level other than the access level corresponding to the high-priority user, and the access levels corresponding to the high-priority user include: 11-15, for example.
  • access level 0 to access level 9 are the access levels of the first priority
  • access level 11 to access level 15 are the access levels of the second priority
  • the second priority is higher than the first priority. class.
  • the first type of access identity includes, for example, one or more of the following access identities: access identity 3 to access identity 10, or H access identities with access identity numbers greater than or equal to 16, where H is positive Integer.
  • the H access identities include access identity 16, access identity 17, and so on.
  • the access level of the first type and the access identity of the first type will be introduced later. If the access control parameter set is not changed, then uac-BarringForAccessIdentity still indicates whether the access control parameter set is applicable to access identities 1, 2, 11, 12, 13, 14, and 15. For the first type of access Identity, uac-BarringForAccessIdentity may not be indicated.
  • the embodiment of the present application may not change the access control parameter set, or in other words, the access control parameter set may not be extended, but the SIB1 may be changed, or the SIB1 may be extended.
  • two types of access control parameter sets may be included, which are respectively referred to as the first type of access control parameter set and the second type of access control parameter set.
  • the first type of access control parameter set is applicable to legacy UEs, and the first type of access control parameter set may include one or more access control parameter sets.
  • the access control parameter set included in the first type of access control parameter set is the same as the access control parameter set introduced above, and details are not repeated here.
  • this embodiment of the present application will allocate a first type of access level to the UE, where the first type of access level corresponds to the first type of access identity, for the first type of access level and the first type of access identity, etc. will be introduced later.
  • the access control parameter set of the second type may be applicable to the UE assigned the access level of the first type, and the at least one access control parameter set described in the embodiments of this application belongs to the access control of the second type parameter set.
  • indication information may be included, for example, the indication information is called fifth indication information, and the fifth indication information may indicate that the access control parameter set Describe the application of the first type of access identities.
  • the fifth indication information can be implemented through a bitmap, and the bitmap can include N bits, where N is a positive integer, the N bits correspond to the first type of access identities, and the number of N is equal to the number of the first type of access identities , and the N bits are in one-to-one correspondence with the access identities of the first type.
  • the embodiment of the present application can also change the access control parameter set, or in other words, extend the access control parameter set. For example, the number of bits included in uac-BarringForAccessIdentity is extended.
  • uac-BarringForAccessIdentity includes 7 bits.
  • uac-BarringForAccessIdentity includes 7+N bits, where N is a positive integer, and N bits correspond to the first type of access. identity.
  • the number of access identities of the first type may be equal to N, the N bits are in one-to-one correspondence with the access identities of the first type, and one of the N bits indicates one of the access identities of the first type. into the identity. Then, for any one of the access identities of the first type, if the value of the bit corresponding to the access identity in the N bits is "1", it indicates that the access control parameter set is applicable to the access identity. access identity, and if the value of the bit corresponding to the access identity among the N bits is "0", it indicates that the access control parameter set is not applicable to the access identity.
  • the SIB1 corresponding to the redcap UE and the legacy UE are different, that is, the network device will send different SIB1s to the redcap UE and the legacy UE respectively.
  • the redcap UE may not be able to identify the SIB1 corresponding to the legacy UE, and the legacy UE may not be able to identify the SIB1 corresponding to the redcap UE.
  • the SIB1 that the UE can recognize is sufficient. If the SIB1 corresponding to the redcap UE and the legacy UE are different, the embodiment of the present application may continue to make no changes to the access control parameter set, or alternatively, the embodiment of the present application may change (or expand) in this case. Access control parameter set. There are many ways to change, the following examples are introduced.
  • an access control parameter set may include second indication information, which access identity or which access identity the access control parameter set is applicable to, may be indicated by the second indication information, a UE according to the UE's access identity and The second indication information can determine whether the UE applies an access control parameter set.
  • the second indication information is, for example, represented as uac-BarringForAccessIdentitybitmap, or can also be represented in other forms. It can be understood that this method extends the uac-BarringForAccessIdentity originally included in the access control parameter set to obtain the second indication information, or it can be understood that this method removes the uac originally included in the access control parameter set. -BarringForAccessIdentity, and the second indication information is added to the access control parameter set.
  • the second indication information may indicate the applicability of an access control parameter set to the first type of access identity.
  • the second indication information may also indicate the applicability of an access control parameter set to other access identities, and the other access identities are other access identities except the first type of access identities, such as access identities 11 to 15 (that is, access identities corresponding to users with high priority), etc.
  • the second indication information can also be implemented in the form of a bitmap.
  • the number of bits included in the bitmap can be equal to the number of access identities to be indicated.
  • the first type of access identities to be indicated includes access identity 3 to access identity. 10
  • the bitmap includes 8 bits.
  • the value of one of the 8 bits is "1" it indicates that the access control parameter set is applicable to the access identity corresponding to this bit, and if the value of one of the 8 bits is "0" indicates that the access control parameter set does not apply to the access identity corresponding to this bit. For example, if the bitmap included in an access control parameter set is "00100110", it indicates that the access control parameter set is applicable to access identity 5, access identity 8 and access identity 9, but not applicable to access identity 3 , Access Identity 4, Access Identity 6, Access Identity 7, and Access Identity 10.
  • the second indication information may also be implemented in other manners.
  • the second indication information may include an access identity number, the access identity corresponding to the access identity number included in the second indication information is applicable to the access control parameter set, and the access identity number not included in the second indication information corresponds to The access identity does not apply to this access control parameter set.
  • the second indication information of an access control parameter set includes access identity number 3 and access identity number 5, but does not include other access identity numbers, wherein access identity number 3 corresponds to access identity 3, Access identity number 5 corresponds to access identity 5, indicating that the access control parameter set is applicable to access identity 3 and access identity 5, but not applicable to other access identities.
  • an access control parameter set may also include two parameters, a barring factor and a barring time.
  • these two parameters are not changed.
  • This modification method is equivalent to only changing the uac-BarringForAccessIdentity included in the access control parameter set, and the modification to the access control parameter set is small and easy to implement.
  • one access control parameter set may include multiple sub-access control parameter sets, and each sub-access control parameter set may have its own corresponding access identity. It can be understood that this method actually increases the access control parameter set.
  • an access control parameter set may include a first sub-access control parameter set and a second sub-access control parameter set, as well as third indication information corresponding to the first sub-access control parameter set and a second sub-access The fourth indication information corresponding to the control parameter set.
  • the third indication information indicates the access identity to which the first sub-access control parameter set is applicable, and a UE can determine whether the UE is applicable to the first sub-access control parameter set according to the access identity of the UE and the third indication information;
  • the fourth indication information indicates the access identity to which the second sub-access control parameter set is applicable, and a UE can determine whether the UE is applicable to the second sub-access control parameter set according to the access identity of the UE and the fourth indication information.
  • the access control parameter set may be referred to as a set
  • the sub-access control parameter set may be referred to as an access control parameter set.
  • what the network device sends is at least one set, and one set in the at least one set may include one or more access control parameter sets.
  • at least one set includes a first set, the first set includes a first access control parameter set and a second access control parameter set, and includes third indication information corresponding to the first access control parameter set and the second access control parameter set Fourth indication information corresponding to the parameter set.
  • the third indication information indicates the access identity to which the first access control parameter set is applicable, and a UE can determine whether the UE is applicable to the first access control parameter set according to the access identity of the UE and the third indication information; the fourth The indication information indicates the access identity to which the second access control parameter set is applicable.
  • the third indication information or the fourth indication information is, for example, represented as uac-BarringForAccessIdentitybitmap, or can also be represented in other forms.
  • the third indication information may indicate the applicability of the first access control parameter set to M access identities, where the M access identities belong to the first type of access identities, for example, M is a positive integer, and M is less than or equal to The number of access identities of the first type.
  • the third indication information is also implemented in the form of a bitmap, and the number of bits included in the bitmap may be equal to the number of access identities to be indicated.
  • the indicated first type of access identities includes access identities 3 to 10. Then the bitmap includes 8 bits.
  • the third indication information may also be implemented in other ways, for example, the third indication information may include an access identity number, the access identity corresponding to the access identity number included in the third indication information is applicable to the first access control parameter set, and The access identity corresponding to the access identity number not included in the third indication information is not applicable to the first access control parameter set.
  • the second indication information includes the access identity number.
  • the implementation manner of the fourth indication information is also similar to that of the third indication information, and details are not repeated here.
  • the first set is configured as follows:
  • the first set includes two sets of parameters, each set of parameters includes uac-BarringFactor, uac-BarringTime and uac-BarringForAccessIdentity, and each set of parameters represents an access control parameter set.
  • both the third indication information and the fourth indication information indicate the application to the access identity 3 to the access identity 10 as an example.
  • the third indication information included in the first access control parameter set is "11000000”
  • the fourth indication information included in the second sub-access control parameter set is "00100000”
  • the first access control parameter set is suitable for Access ID 3 and Access ID 4, but not for Access ID 5, Access ID 6, Access ID 7, Access ID 8, Access ID 9, and Access ID 10
  • the second access control parameter The set applies to Access Identity 5, but not Access Identity 3, Access Identity 4, Access Identity 5, Access Identity 6, Access Identity 7, Access Identity 8, Access Identity 9, and Access Identity 10.
  • one set may include one or more access control parameter sets, and one access control parameter set may include, in addition to indication information (eg, third indication information or fourth indication information), a barring factor and The two parameters of access time are prohibited.
  • indication information eg, third indication information or fourth indication information
  • a barring factor e.g., barring factor
  • Different access control parameter sets may include these two parameters, and the values of the two parameters included in different access control parameter sets may be the same or different.
  • This modification method is equivalent to expanding the content of the access control parameter set.
  • one access control parameter set (or a set) corresponds to one access type, under one access type, it can also provide Access control parameter sets of different access identities are more conducive to realizing refined access control.
  • UEs may be assigned access classes of the first type. For example, different types of UEs may be assigned different access classes, and the access class assigned to one UE may be the first type. access level, or the access level of ordinary users.
  • the first type of access class includes, for example, one or more of access class 0 to access class 9, for example, the first type of access class includes all access classes in access class 0 to access class 9, Or, among the 10 access levels from access level 0 to access level 9, only a part of the access levels may be used at present, and the remaining part of the access levels are not used, then the first type of access level in the embodiment of the present application
  • Access classes may include unused access classes in access class 0 to access class 9, for example, access class 0 to access class 5 are currently used, and access class 6 to access class 9 are not used
  • the first type of access levels in this embodiment of the present application may include access levels 6 to 9, that is, when an access level is allocated to a UE in this embodiment of the present application, access levels 6 to 9 may be allocated.
  • the first type of access class may also include other access classes except access class 0 to access class 9, or the first type of access class may not include access class 0 to access class 9.
  • Level 9 instead includes other access levels, for example, one or more access levels with numbers greater than or equal to 16 are newly defined as the first type of access levels.
  • the first type of access level includes access level 0 to access level 9 as an example.
  • the access level may also be written into a subscriber identity module (subscriber identity module, SIM) card.
  • SIM subscriber identity module
  • a new file may be added to the SIM, for example, called a first file, or an extended file, and the access level allocated by the embodiment of the present application is written in the first file. If a UE is assigned the access class described in the embodiments of this application, the access class of the UE is written in the first file of the SIM card set in the UE; and if a UE is assigned the original If there is some access level, the access level of the UE is written in the original file (or referred to as the traditional file) of the SIM card set in the UE.
  • the UE can determine to use the new correspondence provided by the embodiments of the present application (that is, the access level and the access level). If the UE determines that the access level of the UE is written in the original file of the SIM card, the UE can determine to use the original correspondence (that is, , the corresponding relationship between the access level and the access identity) to determine the access identity of the UE.
  • a UE may also be used to make a UE clear whether the UE corresponds to the new access level provided by the embodiment of the present application or the original access level. For example, if a UE is assigned the one provided by the embodiment of the present application new access level, the access level of the UE can still be written into the original file of the SIM card, but indication information can be added to the access level, such as the first information, the first information indicates the access level
  • the incoming class is a newly defined access class, and if a UE is assigned an original access class, it will not correspond to the first information.
  • the UE determines that the access level of the UE corresponds to the first information, it can determine to use the new correspondence provided by the embodiment of the present application to determine the access identity of the UE; and if the UE determines the access level of the UE If the level does not correspond to the first information, the UE may determine to use the original corresponding relationship to determine the access identity of the UE.
  • the UE to which the embodiments of this application are applicable, or the UE assigned the first type of access class is, for example, a redcap UE, and if it is a legacy UE, it may not be assigned the first type of access class, then the legacy UE is assigned The original access level is sufficient, and there is no need to assign the first type of access level provided in the embodiment of the present application. From this perspective, it can be considered that the first type of access class is used for allocation to redcap UEs. In this embodiment of the present application, redcap UEs can be further divided into multiple different types, so that different access levels can be allocated to these different types of UEs.
  • the UEs assigned the first type of access level in the embodiments of the present application may also include other UEs, for example, other UEs with limited capabilities other than redcap UEs, or may also include ordinary UEs, or referred to as legacy UEs, That is, a UE with unlimited capabilities.
  • the division factor may include one or more of the following: the bandwidth supported by the UE, the number of antennas supported by the UE, the application scenario of the UE, the maximum data transmission rate (max data rate) supported by the UE, or the maximum transmission block supported by the UE size (max rransport block size).
  • the UE is divided into different types according to the bandwidth supported by the UE; or the UE is divided into different types according to the number of antennas supported by the UE; or the UE is divided into different types according to the application scenario of the UE; or, according to the UE
  • the UE is divided into different types according to the maximum data transmission rate supported; or, the UE is divided into different types according to the maximum transport block size supported by the UE; or the UE is divided into different types according to the bandwidth supported by the UE and the number of antennas supported. or, according to the application scenario of the UE, the maximum data transmission rate supported by the UE, and the maximum transport block size supported by the UE, the UE is divided into different types, and so on.
  • the number of antennas supported by the UE is, for example, 1T1R, or 1T2R, etc.
  • the UEs supporting 1T1R can be classified into one type of UE, and the UEs supporting 1T2R can be classified into another type of UE.
  • the application scenario of the UE can also be understood as the realization form of the UE. For example, if the UE is a bracelet, it is considered to be an application scenario, or if the UE is a sensor, it is considered to be another application scenario, or if the UE is a camera, it is considered to be another application scenario. an application scenario.
  • the first type of access level described in this embodiment of the present application can be considered to be different from the existing access levels 0 to 9, because the first type of access level in this embodiment of the present application corresponds to the first type of access level.
  • access identity Specifically, which access level corresponds to which access identity is not limited in this embodiment of the present application.
  • access level 0 and access level 1 correspond to access identity 3
  • access level 2 corresponds to access identity 4
  • access level 3 corresponds to access identity 5
  • access level 4 corresponds to access identity 6
  • access level 5 corresponds to access identity 7
  • access level 6 corresponds to access identity 8
  • access level 9 corresponds to in access identity 10.
  • the UE is divided into different types according to the bandwidth supported by the UE.
  • the first type of UE is a redcap UE supporting 5M bandwidth or 10M bandwidth
  • the second type of UE is a redcap UE supporting 20M bandwidth.
  • the first type of redcap UE is assigned access class 1 and the second type of redcap UE is assigned access class 2.
  • access level 1 correspond to access identity 3
  • access level 2 correspond to access identity 4.
  • the first type of access level in this embodiment of the present application corresponds to the first type of access identities, and the first type of access identities can be applied to their respective access control parameters, so that different UEs can be applied to different Access control parameters.
  • different access control parameters can be used to implement access control for different terminal devices respectively, for example, the terminal devices required by the network, or more required to access
  • the terminal equipment of the network can implement preferential access to the network to meet the needs of the terminal equipment and the network.
  • the UE determines, according to the access identity of the UE, that the UE applies to the first access control parameter set in at least one access control parameter set.
  • the first access control parameter set may belong to the first set, or may not belong to any set, but a whole.
  • the UE determines that the UE applies the first access control parameter set in at least one access control parameter set according to the access identity of the UE.
  • the UE applies the first access control parameter set in at least one access control parameter set.
  • the UE may determine the first access control parameter set in at least one access control parameter set corresponding to the UE according to the access type of the UE, and then determine whether the UE applies the first access control according to the access identity of the UE parameter set.
  • a UE can determine the access type number corresponding to the UE in Table 2 according to the service initiated by the UE to access, that is, determine the access type of the UE.
  • the access control parameter set corresponds to an access type, for example, one access control parameter set in at least one access control parameter set corresponds to one access type, and the corresponding relationship is known by the UE. Therefore, the UE can determine the access control parameter set corresponding to the access type of the UE, for example, the first access control parameter set.
  • the access level of the UE belongs to the first type of access level
  • the first type of access level corresponds to the first type of access identity
  • the UE can determine the UE's access level according to the access level of the UE. access identity.
  • the UE may determine the access level of the UE by reading the SIM card information each time it is powered on, and determine the access identity of the UE according to the access level of the UE. In the running process after power on, the UE does not need to perform the operation of determining the access identity of the UE according to the access level of the UE.
  • An access control parameter set can indicate the access identity to which the access control parameter set is applicable through corresponding indication information (for example, the second indication information, the third indication information, or the fourth indication information, etc.), so that the UE can The access identity of the UE determines whether the UE is suitable for the first access control parameter set.
  • the UE may determine P access control parameter sets applicable to the UE from at least one access control parameter set according to the access identity of the UE, and then select P access control parameter sets from the P access control parameter sets according to the access type of the UE. Determine the first access control parameter set corresponding to the UE, where P is a positive integer.
  • the embodiments of the present application do not limit how the UE determines the first access control parameter set.
  • the network device sends at least one auxiliary parameter set, and correspondingly, the UE receives at least one auxiliary parameter set from the network device. For example, the network device sends at least one auxiliary parameter set in the first cell, and the UE receives the at least one auxiliary parameter set in the first cell.
  • the network device may send at least one auxiliary parameter set through a system message.
  • the system message is SIB1. If the SIB1 corresponding to this embodiment of the present application and the existing SIB1 are the same SIB1, in this case, it is considered that the network device sends at least one SIB1.
  • Both the auxiliary parameter set and at least one access control parameter set (or at least one set) are sent in SIB1; alternatively, at least one auxiliary parameter set can also be sent separately through other messages, such as system messages or other broadcasts message, or it can be a unicast message.
  • an auxiliary parameter set may also be configured for different types of UEs, so as to further perform access control for different types of UEs through the auxiliary parameter set.
  • an auxiliary parameter set is separately configured for one or more access classes, or an auxiliary parameter set is separately configured for one or more access identities.
  • an auxiliary parameter set is configured for each of the one or more access classes, that is, the access class and the auxiliary parameter set may be in a one-to-one correspondence; or, for one or more access classes
  • One auxiliary parameter set is configured uniformly, that is, only one auxiliary parameter set is configured regardless of the number of one or more access classes.
  • an auxiliary parameter set is configured for each access identity in one or more access classes, that is, the access identity and the auxiliary parameter set may be in a one-to-one correspondence; or, for one or more access identities
  • the identity is uniformly configured with one auxiliary parameter set, that is, only one auxiliary parameter set is configured regardless of the number of one or more access identities.
  • One auxiliary parameter set in the at least one auxiliary parameter set may include one or more of the following parameters: a probability factor, a time factor, random access resource information, or a first threshold.
  • one assisting parameter set may include a probability factor; alternatively, one assisting parameter set may include a time factor; alternatively, one assisting parameter set may include random access resource information; alternatively, one assisting parameter set may include a probability factor and a time factor; Alternatively, one assisting parameter set may include probability factor, time factor and random access resource information; alternatively, one assisting parameter set may include probability factor, time factor, random access resource information and first threshold, and so on.
  • the random access resource information may also be referred to as dedicated random access resource information, indicating that the random access resource information is exclusively used by the UE that applies the auxiliary parameter set, and cannot be used by other UEs.
  • the auxiliary parameter set is, for example, any auxiliary parameter set in at least one auxiliary parameter set.
  • the probability factor is, for example, expressed as UAC bar scale factor, or expressed as uac-BarringFactor-new, or can be expressed in other ways.
  • the probability factor can be used to adjust the barring factor included in the access control parameter set.
  • the value of the probability factor may be greater than 0, and in addition, the value of the probability factor may be less than 1, or may be greater than 1. For example, if a UE's access class or access identity is configured with an auxiliary parameter set, the UE can use the auxiliary parameter set.
  • the UE uses the probability factor to obtain a value according to the probability factor and the barring factor included in the access control parameter set corresponding to the UE, for example, the value is called barring Access probability, the access barring probability is used for the UE to determine whether to allow access to the current cell.
  • One way for the UE to obtain the access prohibition probability according to the probability factor and the prohibition factor is to multiply the probability factor and the prohibition factor to obtain the access prohibition probability.
  • the probability factor is represented as X
  • the UE can determine The access barring probability is 0.15, so the UE can determine whether to allow access to the current cell according to 0.15. For example, the UE may generate a random number, compare the random number with 0.15, if the random number is less than 0.15, the UE is allowed to access the current cell, and if the random number is greater than or equal to 0.15, the UE is prohibited from accessing the current cell 's district. If the value of the probability factor included in an auxiliary parameter set is set to 0, it is equivalent to prohibiting the access of the UE of the access level or access identity corresponding to the auxiliary parameter set.
  • a way for the UE to obtain the access barring probability according to the probability factor and the barring factor is to add or subtract the probability factor and the barring factor to obtain the access barring probability.
  • uac-BarringFactor-new uac-BarringFactor+X
  • uac-BarringFactor-new
  • the reason for adding the absolute value sign is to consider the possibility of negative numbers after subtraction.
  • the UE may also obtain the access barring probability according to the probability factor and the barring factor in other ways, which is not limited.
  • the time factor can be expressed as UAC bar time factor, or expressed as uac-BarringTime-new, or can also be expressed in other ways.
  • the value of the time factor may be greater than 0, and in addition, the value of the time factor may be less than 1, or may be greater than 1.
  • the UE can use the auxiliary parameter set.
  • the UE uses the time factor by obtaining a value according to the time factor and the access barring time included in the access control parameter set corresponding to the UE, and the value is, for example, called The prohibition time, the prohibition time is used to prohibit the UE from accessing the current cell, or in other words, during the prohibition time, the UE is prohibited from accessing the current cell.
  • One way for the UE to obtain the forbidden time according to the time factor and the access forbidden time is to multiply the time factor and the value of the forbidden access time to obtain the forbidden time.
  • the time factor is represented as Y
  • the barring time is represented as uac-BarringTime-new
  • (uac-BarringTime-new) (uac-BarringTime) ⁇ Y.
  • the content in parentheses represents a parameter, and the "-" in it belongs to the representation of the parameter, but does not represent a minus sign, and the following is similar.
  • the value of the access prohibition time included in the access control parameter set corresponding to the UE is 30 seconds (s)
  • the value of the time factor included in the auxiliary parameter set corresponding to the access level or access identity of the UE is the value of 30 seconds (s). If the value is 2, the UE can determine that the prohibition time is 60s.
  • the UE determines that the UE is barred from accessing the current cell according to the access barring probability, then the UE can start the timer T390, and the UE generates a random number.
  • the UE prohibits access to the cell before the timer T390 times out, and when the timer T390 times out or after the timer expires, the UE can generate a random number again to determine whether the UE is allowed to access the cell again according to the access prohibition probability.
  • a way for the UE to obtain the forbidden time according to the time factor and the forbidden time is to add or subtract the time factor and the forbidden time to obtain the forbidden time.
  • (uac-BarringTime-new) (uac-BarringTime)+Y
  • (uac-BarringTime-new)
  • the reason for adding the absolute value sign is to consider the subtraction Negative numbers may occur later.
  • the UE may also obtain the forbidden time according to the time factor and the forbidden time in other ways, which is not limited.
  • the random access resource information included in the auxiliary parameter set can be used for the UE to perform random access in the current cell.
  • the random access resource information can indicate a random access channel (random access channel, RACH) occasion (occasion), or a random access preamble (preamble) index (index) set, or a RACH occasion and preamble index set, or also Other random access resources may be indicated.
  • the network device configures random access resource information for an auxiliary parameter set
  • the network device receives a random access request (such as a random access preamble) from the UE on the random access resource information
  • the network The device can then determine that the UE is a UE suitable for the auxiliary parameter set. In this way, the network device can determine the identity of the UE through the first message (Msg1) in the random access process.
  • the network device may determine the identity of the UE only through the fifth message (Msg5) in the random access process. Therefore, for the network device, different types of UEs can be distinguished according to different random access resource information.
  • the network device can schedule different resources for different types of UEs in the subsequent random access process, or when the random access is successful Afterwards, the network device can schedule different resources for different types of UEs, thereby further implementing differentiated control for different types of UEs.
  • the first threshold is the threshold of the first parameter, and the first parameter may indicate the signal quality of the UE.
  • the first parameter is reference signal receiving power (RSRP), reference signal receiving quality (RSRQ), or signal to interference plus noise ratio (SINR), etc.
  • RSRP reference signal receiving power
  • RSRQ reference signal receiving quality
  • SINR signal to interference plus noise ratio
  • the UE can be made to determine whether to use the auxiliary parameter set corresponding to the access identity or the access level of the UE.
  • an auxiliary parameter set is configured for the access identity or access level of a UE, and the auxiliary parameter set includes a first threshold. The UE can determine the value of the first parameter through measurement.
  • the UE can use the auxiliary parameter set, and the usage method can refer to the introduction above. However, if the value of the first parameter measured by the UE is greater than or equal to the first threshold, the UE may not use the auxiliary parameter set, for example, the UE uses the access control parameter set corresponding to the UE to determine whether the UE is allowed to access the current The cell is sufficient. If the UE is allowed to access the current cell, the UE does not have to use the random access resource indicated by the random access resource information included in the auxiliary parameter set, but can use other random access resources.
  • the network For UEs with poor signals, if a large number of UEs access the network, since the signal quality of these UEs is poor, the network needs to allocate more resources to these UEs so that these UEs can communicate. For UEs with better signals, the network device may allocate fewer resources to enable these UEs to achieve a higher transmission rate, while for UEs with poor signals, the network device needs to allocate more resources to enable these UEs to achieve a certain transmission rate. The transmission rate will increase the resource overhead of the network device and reduce the efficiency of the network device.
  • the auxiliary parameter set can be used by users with poor signal quality, for example, the access of these users can be restricted by the auxiliary parameter set (for example, the probability factor is set to a small value, or a random setting is used.
  • the signal quality of the access resources is poor, or the random access resources are few, etc.
  • the network equipment since it is difficult for users with poor signals to access network equipment, the network equipment does not need to allocate resources for users with poor signals, so the network equipment can
  • the resources can be used as much as possible by users with better signals, which improves the efficiency of network equipment. It can be seen that, in this way, while implementing access control for UEs of different types, it can also implement access control for UEs with different signal qualities.
  • At least one auxiliary parameter set may also be predefined, or specified by a protocol, so that it does not need to be sent by the network device.
  • the auxiliary parameter set may not be configured. Therefore, S23 is an optional step and is not required to be performed.
  • the network device sends the first indication information, and correspondingly, the UE receives the first indication information from the network device.
  • the at least one auxiliary parameter set sent by the network device in S23 may include all auxiliary parameter sets indicated by the first indication information.
  • the network device may send the first indication information through a system message.
  • the system message is SIB1. If the SIB1 corresponding to the embodiment of the present application and the existing SIB1 are the same SIB1, then this situation is regarded as the network device sending the first indication.
  • Information and at least one access control parameter set (or at least one set) are sent in SIB1, and at least one auxiliary parameter set may be sent in other messages; or, if at least one auxiliary parameter set is also sent through SIB1 , the network device just puts the first indication information, at least one auxiliary parameter set and at least one access control parameter set in SIB1 for sending.
  • the network device may also send the first indication information and at least one auxiliary parameter set in one message, for example, other system messages except SIB1, or other broadcast messages, or unicast messages, while the At least one set of access control parameters is sent in another message.
  • the first indication information may also be sent independently through other messages other than SIB1, and the message may be, for example, a system message or other broadcast message, or may also be a unicast message.
  • the network device needs to inform the UE about which access class or access classes the network device is configured with the auxiliary parameter set for, or for which access identity or access identities the auxiliary parameter set is configured. Then the network device can send the first indication information, and the first indication information can indicate that the auxiliary parameter set is configured for one or more access classes.
  • the UE After receiving the first indication information, the UE can determine which access class or access classes are configured for The auxiliary parameter set is configured, so that the UE can determine whether the access class is configured with the auxiliary parameter set according to the access class of the UE; or, the first indication information may indicate that the auxiliary parameter set is configured for one or more access identities, After the UE receives the first indication information, it can determine which access identity or identities are configured with the auxiliary parameter set, so that the UE can determine whether the access identity is configured with the auxiliary parameter set according to the access identity of the UE.
  • the first indication information may be implemented by a bitmap. If the first indication information indicates that auxiliary parameter sets are configured for one or more access classes, the number of bits included in the bitmap may be equal to the access classes to be indicated.
  • the total number of , for example, the first indication information in this case can be represented as uac-accessclassbitmap.
  • the new access levels involved in the embodiments of the present application include access level 0 to access level 9, with a total of 10 access levels, and the bitmap may include 10 bits, which are equal to the 10 access levels. A correspondence.
  • the network device sends the first indication information and at least one auxiliary parameter set in one message, which is called the first message, and the first message is, for example, SIB1, or can also be other messages.
  • the SIB1 may include the bitmap and the auxiliary parameter set indicated by the bitmap. For example, if the bitmap included in the SIB is "0101000000", the SIB1 also includes an auxiliary parameter set corresponding to access level 1 and an auxiliary parameter set corresponding to access level 3.
  • the network device is configured with auxiliary parameter sets for access level 1 and access level 3 respectively.
  • auxiliary parameter set 1 is configured for access level 1
  • auxiliary parameter set 2 is configured for access level 2.
  • the parameter set is sent in a message, and the way of configuring the two auxiliary parameter sets in the message is, for example:
  • UAC Bar Scale Factor X1 represents the probability factor included in auxiliary parameter set 1
  • UAC Bar Time Factor Y1 represents the time factor included in auxiliary parameter set 1
  • the RACH resources included in auxiliary parameter set 1 include dedicated RACH occasion and dedicated preamble index gather.
  • UAC Bar Scale Factor X2 represents the probability factor included in auxiliary parameter set 2
  • UAC Bar Time Factor Y2 represents the time factor included in auxiliary parameter set 2
  • the RACH resources included in auxiliary parameter set 2 include dedicated RACH occasion and dedicated preamble index set.
  • the number of bits included in the bitmap may be equal to the total number of access identities to be indicated, for example, the first indication information in this case Can be represented as uac-accessidentitybitmap.
  • the first type of access identities involved in this embodiment of the present application includes access identities 3 to 10, with a total of 8 access levels, the bitmap may include 8 bits, and these 8 bits are associated with the 8 access levels.
  • the network device sends the first indication information and at least one auxiliary parameter set in one message, which is called the first message, and the first message is, for example, SIB1, or other messages.
  • the SIB1 may include the bitmap and the auxiliary parameter set indicated by the bitmap. For example, if the bitmap included in the SIB is "01010000", the SIB1 also includes the auxiliary parameter set corresponding to the access identity 3 and the auxiliary parameter set corresponding to the access identity 5.
  • the first indication information can also be implemented in other ways.
  • the first indication information indicates that auxiliary parameter sets are configured for one or more access classes
  • the first indication information may include the access class number (ie, the access class number, or the ID of the access class)
  • the access level corresponding to the access level number included in the first indication information is the access level for which the auxiliary parameter set is configured
  • the access level corresponding to the access level number not included in the first indication information The access level is the access level for which the auxiliary parameter set is not configured.
  • the first indication information indicates that the auxiliary parameter set is configured for one or more access identities
  • the first indication information may include the access identity number (that is, the number of the access identity, or the ID of the access identity). )
  • the access identity corresponding to the access identity number included in the first indication information is the access identity configured with the auxiliary parameter set
  • the access identity number not included in the first indication information corresponds to An access identity is an access identity without an auxiliary parameter set configured.
  • auxiliary parameter sets for which access classes or access identities are configured can also be pre-defined, or specified by a protocol, so there is no need to notify the network device.
  • the auxiliary parameter set may not be configured for access class or access identity. Therefore, S24 is an optional step and is not required to be performed.
  • the UE determines that the UE corresponds to the first auxiliary parameter set. For example, the UE determines that the UE corresponds to the first auxiliary parameter set according to the first indication information and according to the access identity or the access level of the UE.
  • the UE may determine the access level indicated by the first indication information. If the access level of the UE is one of the access levels indicated by the first indication information, the UE may determine that the UE corresponds to A first auxiliary parameter set of at least one auxiliary parameter set. Alternatively, after receiving the first indication information, the UE may determine the access identity indicated by the first indication information, and if the access identity of the UE is one of the access identities indicated by the first indication information, the UE may determine the access identity indicated by the first indication information. The UE corresponds to the first auxiliary parameter set in at least one auxiliary parameter set.
  • the UE will use the UE's access identity or access class according to the UE's access identity or access class.
  • the auxiliary parameter set corresponding to the UE can be determined, for example, the first auxiliary parameter set.
  • auxiliary parameter set is not configured for the access class or the access identity, the UE does not need to determine the auxiliary parameter set corresponding to the UE, so S25 is an optional step.
  • the UE determines whether the UE is allowed to access the first cell according to the first access control parameter set, or the UE determines whether the UE is allowed to access the first cell according to the first access control parameter set and the first auxiliary parameter set community.
  • the UE determines whether the UE is allowed to access the first cell according to the first access control parameter set. For the manner in which the UE determines whether the UE is allowed to access the first cell according to the first access control parameter set, reference may be made to the above related introduction when introducing the parameters included in the access control parameter set.
  • the UE determines whether the UE is allowed to access the first cell.
  • the UE may determine whether the UE is allowed to access the first cell according to the first auxiliary parameter set and the first access control parameter set. For the manner in which the UE determines whether the UE is allowed to access the first cell according to the first auxiliary parameter set and the first access control parameter set, reference may be made to the relevant introduction when introducing the parameters included in the auxiliary parameter set above.
  • the UE may perform random access in the first cell. If the UE determines that the UE is allowed to access the first cell according to the first access control parameter set, the UE may select a corresponding random access resource to perform random access in the first cell. Alternatively, if the UE determines that the UE is allowed to access the first cell according to the first auxiliary parameter set and the first access control parameter set, and the first auxiliary parameter set includes random access resource information, the UE may use the random access The random access resource indicated by the incoming resource information performs random access in the first cell.
  • the access level allocated to the terminal device is the first type of access level, but the first type of access level corresponds to the first type of access identity, that is, the first type of access
  • the level can correspond to a new access identity, then correspondingly, different access levels (or different access identities) will be applicable to different access control parameters, so that when performing access control on these terminal devices, Different access control parameters can be applied to implement access control for different terminal devices respectively, so as to implement differentiated control with finer granularity.
  • the terminal equipment required by the network, or the terminal equipment that needs to access the network more can implement preferential access to the network to meet the requirements of the terminal equipment and the network.
  • FIG. 3 is a flowchart of the method.
  • the method is applied to the network architecture shown in FIG. 1 as an example.
  • the method is performed by the network device and the UE as an example. This is because the embodiment of the present application is applied to the network architecture shown in FIG. 1 as an example. Therefore, the network device described below is, for example, the access network device in the network architecture shown in FIG. 1 , and the UE described below may be the UE in the network architecture shown in FIG. 1 .
  • the network device sends at least one access control parameter set, and correspondingly, the UE receives at least one access control parameter set from the network device. For example, the network device sends at least one access control parameter set in the first cell, and then the UE may receive the at least one access control parameter set in the first cell.
  • the first cell is a cell where the UE is about to initiate random access, or in other words, the UE wishes to initiate random access in the first cell.
  • the UE may receive at least one access control parameter set.
  • the network device can send at least one access control parameter set through a system message in the first cell, and the system message is, for example, SIB1, or can also be other system messages, then the UE receives the system message in the first cell, so as to obtain at least one set of access control parameters.
  • An access control parameter set corresponds to an access type, for example, each access control parameter set in at least one access control parameter set corresponds to an access type.
  • the UE can determine the access type of the UE according to the service initiated by the UE and in combination with Table 2, so that the UE can determine the access control parameter set corresponding to the UE.
  • an access control parameter set has applicable access identities.
  • a new access level may not be allocated to the UE, and the UE continues to apply the original access level.
  • the access level determines the access identity of the UE.
  • a UE can determine the access control parameter set corresponding to the UE according to the access type of the UE, and then can determine whether the UE is suitable for the UE according to the access identity of the UE. Access control parameter set. If the UE is applicable to the access control parameter set, the UE may determine whether the UE is allowed to access the network device according to the access control parameter set, or in other words, determine whether the UE is allowed to access the first cell.
  • a new access class may be allocated to the UE, for example, different access classes may be allocated to different types of UEs, and the access class allocated to one UE may be the first type of access class, or is the access level of ordinary users.
  • the access level of the first type reference may be made to the relevant description of the embodiment shown in FIG. 2 .
  • the corresponding access identities may not be configured for these access classes, that is, the access identities allocated to the UE in the embodiment of the present application
  • the new access level does not correspond to any access identity.
  • the UE determines an access control parameter set according to the access type of the UE, since the access level of the UE does not correspond to any access identity, the UE will consider that the UE can apply the access control parameter set. That is to say, if a new access class is allocated to the UE in this embodiment of the present application, the UE can be applicable to the at least one access control parameter set.
  • the UE to which the embodiments of the present application are applicable is, for example, a redcap UE.
  • the UEs participating in the classification in this embodiment of the present application may also include other UEs, for example, other UEs with limited capabilities other than redcap UEs, or may also include ordinary UEs, or legacy UEs, that is, the capabilities are not limited the UE.
  • an access control parameter set may include a barring factor and a barring time.
  • a barring factor and a barring time.
  • S32 The UE determines, according to the access identity of the UE, that the UE applies to the first access control parameter set in at least one access control parameter set.
  • the network device sends the auxiliary parameter set, and correspondingly, the UE receives the auxiliary parameter set from the network device.
  • the number of the auxiliary parameter sets may be one or more.
  • the network device can send the auxiliary parameter set through a system message, for example, the system message is SIB1, that is, the network device sends both the auxiliary parameter set and at least one access control parameter set in SIB1; or, the auxiliary parameter set can also be sent. Sent via other system messages.
  • the network device may also send the auxiliary parameter set through other broadcast messages, or the network device may also use a unicast message to send the auxiliary parameter set, so as to be separately sent to the corresponding UE.
  • the network device may send one or more auxiliary parameter sets, and the one or more auxiliary parameter sets may be applicable to the redcap UE.
  • an auxiliary parameter set can be configured for the redcap UE, so as to perform access control on the redcap UE through the auxiliary parameter set.
  • the redcap UE can be made easier to access, or it can also be made difficult to access the redcap UE.
  • An auxiliary parameter set may include one or more of the following parameters: a probability factor, a time factor, random access resource information, or a first threshold.
  • a probability factor a probability factor
  • a time factor a time factor
  • random access resource information a parameter that specifies the duration of a resource for a resource.
  • one or more auxiliary parameter sets can also be predefined, or specified by a protocol, and then need not be sent by the network device.
  • the auxiliary parameter set may not be configured, and the network device naturally does not need to send the auxiliary parameter set. Therefore, S33 is an optional step and is not required to be performed.
  • the UE may determine whether the UE is allowed to access the first cell according to the existing rules.
  • the UE determines whether the UE is allowed to access the first cell according to the first access control parameter set, or the UE determines whether the UE is allowed to access the first cell according to the first access control parameter set and the first auxiliary parameter set community. If in S33 multiple auxiliary parameter sets are sent by the network device, and the UE has received multiple auxiliary parameter sets, the first auxiliary parameter set may be one of the multiple auxiliary parameter sets; or, if in S33 the network device has sent multiple auxiliary parameter sets An auxiliary parameter set, if the UE receives an auxiliary parameter set, the first auxiliary parameter set is the auxiliary parameter set.
  • a new access level or access identity may be configured for the UE, and the UE may determine whether the UE applies the auxiliary parameter set according to the new access level or access identity.
  • neither a new access class nor a new access identity may be configured for the UE, and the UE may continue to use the original access class and access identity. In this case, the UE may determine in other ways. Whether the UE applies the auxiliary parameter set. The following example introduces several ways for the UE to determine whether the auxiliary parameter set is applicable.
  • Neither a new access class nor a new access identity is configured for the UE.
  • the UE can use one of the following ways to determine whether the UE is suitable for the auxiliary parameter set.
  • first information is pre-configured in some UEs, and the first information indicates that the UE applies the auxiliary parameter set. Then, the UE configured with the first information applies the auxiliary parameter set, while the UE not configured with the first information does not apply the auxiliary parameter set.
  • the first information is preconfigured for the redcap UE, or the first information may also be preconfigured for other types of UEs.
  • the UE may determine whether to apply the auxiliary parameter set according to the capability of the UE. For example, if the capability of the UE is lower than the first capability, the UE applies the auxiliary parameter set, otherwise the UE does not apply the auxiliary parameter set.
  • the first capability is the bandwidth capability, and the bandwidth capability is 40M, then if the UE only supports a bandwidth of 20M, the capability of the UE is lower than the first capability; for another example, the first capability is the antenna capability, and the antenna capability is 2T4R, Then, if the antenna supported by the UE is 1T1R or 1T2R, the capability of the UE is lower than the first capability.
  • the UE may determine whether the auxiliary parameter set is applicable by means of protocol pre-definition (or pre-configured in the UE).
  • the protocol stipulates that the auxiliary parameter set is applicable to the smart bracelet and the smart watch, and the auxiliary parameter set is not applicable to the UE in other application scenarios.
  • the protocol stipulates that the auxiliary parameter set is applicable to both 1T1R or 1T2R, and the auxiliary parameter set is not applicable to UEs supporting other antenna numbers.
  • the protocol stipulates that the auxiliary parameter set is applicable to both 20M bandwidth or 40M, and the auxiliary parameter set is not applicable to UEs supporting other bandwidths, and so on. In this way, the UE can determine whether the UE applies the auxiliary parameter set according to the protocol or pre-configured information.
  • the UE may determine whether the UE applies the auxiliary parameter set according to the application scenario of the UE. For example, the UE may predefine a set of auxiliary parameters applicable to certain scenarios, such as sensors, smart bracelets, or smart watches. Then if the UE determines that the UE is a sensor, the UE can apply the auxiliary parameter set, and if the UE is a mobile terminal, the UE does not apply the auxiliary parameter set.
  • the UE may determine the auxiliary parameter set applicable to the UE according to the access level or access identity of the UE (for example, the original access level or the original access identity); or, the UE first determines whether it belongs to redcap In the case of the UE, the UE determines the applicable auxiliary parameter set through the access class or the access identity.
  • the access level or access identity of the UE for example, the original access level or the original access identity
  • the network device may send multiple auxiliary parameter sets, the auxiliary parameter sets correspond to the access levels of the UE, and different access levels correspond to different auxiliary parameter sets. Therefore, the UE can select the corresponding auxiliary parameter set according to the access level of the UE. For example, a UE determines that the first auxiliary parameter set is the auxiliary parameter set corresponding to the access level of the UE. Alternatively, the network device may send an auxiliary parameter set.
  • the auxiliary parameter set has nothing to do with information such as the access level of the UE, and the same auxiliary parameter set applies as long as the UE is configured with the first information.
  • the network device may send multiple auxiliary parameter sets, the auxiliary parameter sets correspond to the access identities of the UE, and different access identities correspond to different auxiliary parameter sets. Therefore, the UE can select the corresponding auxiliary parameter set according to the access identity of the UE. For example, a UE determines that the first auxiliary parameter set is the auxiliary parameter set corresponding to the access identity of the UE. Alternatively, the network device may send an auxiliary parameter set.
  • the auxiliary parameter set has nothing to do with information such as the access identity of the UE. As long as the UE can apply the auxiliary parameter set, the same auxiliary parameter set is applicable.
  • the same access level may correspond to different access types, then different access types corresponding to the same access level may apply the same auxiliary parameter set, or also Different sets of auxiliary parameters can be applied.
  • it may correspond to different access types, then different access types corresponding to the same access identity can apply the same auxiliary parameter set, or can also apply different auxiliary parameter sets. .
  • the UE can use one of the following ways to determine whether the UE is suitable for the auxiliary parameter set.
  • a new access class may be configured for the UE, and then the UE may determine whether the UE applies the auxiliary parameter set according to the access class.
  • a first type of access class is configured for the UE, and the first type of access class does not explicitly indicate an access identity.
  • the new access level information of the UE can be configured in the SIM card of the UE, and the UE can determine whether the UE applies the auxiliary parameter set according to the access level information included in the SIM card configuration information of the UE.
  • a UE determines that the access level of the UE is the first type of access level according to the access level information included in the SIM card configuration information of the UE, the UE determines that the UE is applicable to the auxiliary parameter set; The UE does not apply the auxiliary parameter set.
  • the new access level information of the UE may not be configured in the SIM card, and the UE may determine the access level of the UE in other ways.
  • the correspondence between the access level of the first type and the application scenario can be specified by means of protocol pre-definition (or pre-configured in the UE), for example, it is specified that the smart bracelet and the smart watch correspond to access level 0, Smartphones correspond to access level 1, and so on.
  • the correspondence between the access identity of the first type and the number of antennas supported by the UE may be specified by means of protocol pre-definition (or pre-configured in the UE), for example, 1T1R corresponds to access level 0, and 1T2R corresponds to Access level 1, etc.
  • the correspondence between the access level of the first type and the bandwidth of the UE may be specified by means of protocol pre-definition (or pre-configured in the UE), for example, 20M corresponds to access level 0, and 40M corresponds to access level 0. Level 1, etc.
  • the UE can determine the new access level corresponding to the UE according to the protocol or pre-configured information.
  • the network device may send multiple auxiliary parameter sets, the auxiliary parameter sets correspond to the first type of access levels, and in the first type of access levels, different access levels correspond to different auxiliary parameter sets . Therefore, if a UE is configured with the first type of access class, the UE can select the corresponding auxiliary parameter set according to the access class of the UE. For example, a UE determines that the first auxiliary parameter set is the access class of the UE. The corresponding auxiliary parameter set. Alternatively, the network device may send an auxiliary parameter set.
  • the auxiliary parameter set has nothing to do with information such as the specific access level of the UE. As long as the UE is configured with the first type of access level, the same auxiliary parameter set applies.
  • the same access level may correspond to different access types, then the same auxiliary parameter set may be applied to different access types corresponding to the same access level, or it may be Different sets of auxiliary parameters are applicable, and this feature is also applicable to the embodiment shown in FIG. 2 .
  • a new access identity may be configured for the UE, and then the UE may determine whether the UE applies the auxiliary parameter set according to the access identity.
  • the embodiment of the present application configures a first type of access identity for the UE, and the first type of access identity may not correspond to any access level, of course, may also correspond to an access level, which is not limited in this embodiment of the present invention.
  • access identities are included in the first type of access identities, reference may be made to the related introduction of the embodiment shown in FIG. 2 .
  • the new access identity information of the UE can be configured in the SIM card of the UE, and the UE can determine whether the UE applies the auxiliary parameter set according to the access identity information included in the SIM card configuration information of the UE. For example, if a UE determines that the access identity of the UE is the first type of access identity according to the access identity information included in the SIM card configuration information of the UE, the UE determines that the UE applies the auxiliary parameter set; otherwise, the UE It is determined that the UE does not apply the auxiliary parameter set.
  • the new access identity information of the UE may not be configured in the SIM card, and the UE may determine the access identity of the UE in other ways.
  • the correspondence between the first type of access identities and application scenarios can be specified by means of protocol pre-definition (or pre-configured in the UE), for example, it is specified that the smart bracelet and the smart watch correspond to the access identities 3, The smartphone corresponds to access identity 4, and so on.
  • the correspondence between the access identity of the first type and the number of antennas supported by the UE may be specified by means of protocol pre-definition (or pre-configured in the UE), for example, 1T1R corresponds to access identity 3, and 1T2R corresponds to Access identity 4, etc.
  • the correspondence between the access identity of the first type and the bandwidth of the UE can be specified by means of protocol pre-definition (or pre-configured in the UE), for example, 20M corresponds to access identity 3, and 40M corresponds to access identity 3. Identity 4, etc.
  • the UE can determine the new access identity corresponding to the UE according to the protocol or preconfigured information.
  • the network device may send multiple auxiliary parameter sets, the auxiliary parameter sets correspond to the first type of access identities, and in the first type of access identities, different access identities correspond to different auxiliary parameter sets . Therefore, if a UE is configured with the first type of access identity, the UE can select the corresponding auxiliary parameter set according to the access identity of the UE. For example, a UE determines that the first auxiliary parameter set is the access identity of the UE. The corresponding auxiliary parameter set. Alternatively, the network device may send an auxiliary parameter set.
  • the auxiliary parameter set may be independent of information such as the specific access identity of the UE. As long as the UE configured with the first type of access identity, the same auxiliary parameter set applies.
  • the same access identity may correspond to different access types
  • the same auxiliary parameter set may be applied to different access types corresponding to the same access identity, or Different sets of auxiliary parameters are applicable, and this feature is also applicable to the embodiment shown in FIG. 2 .
  • the UE may also determine whether the UE is suitable for the auxiliary parameter set in other manners, and the specific manner is not limited.
  • the UE may determine whether the UE is allowed to access the first cell according to the first auxiliary parameter set and the first access control parameter set. If the UE does not apply the first auxiliary parameter set, for example, the UE is a legacy UE, the UE may determine whether the UE is allowed to access the first cell according to the first access control parameter set without using the auxiliary parameter set.
  • the auxiliary parameter set For the content included in the auxiliary parameter set, reference may be made to the description of the embodiment shown in FIG. 2 , and for the manner in which the UE combines the auxiliary parameter set and the access control parameter set to determine whether the UE is allowed to access a cell, reference may also be made to the description in FIG. 2 .
  • an auxiliary parameter set may be configured for some UEs, for example, an auxiliary parameter set may be configured for a redcap UE, so that the redcap UE can apply the auxiliary parameter set to determine whether to allow access to a cell, which realizes that the redcap UE and legacy UE are respectively Perform access control to make the control granularity finer.
  • FIG. 4 is a schematic block diagram of a communication apparatus 400 according to an embodiment of the present application.
  • the communication apparatus 400 is, for example, a terminal device or a network device.
  • the communication apparatus 400 can implement the functions of the terminal device described in the embodiment shown in FIG. 2 or the embodiment shown in FIG. 3 .
  • the communication apparatus 400 can implement the function of the network device described in the embodiment shown in FIG. 2 or the embodiment shown in FIG. 3 .
  • the communication device 400 includes a transceiving unit 420 and a processing unit 410 .
  • the communication apparatus 400 may further include a storage unit, and the storage unit can communicate with the processing unit 410, which is not shown in FIG. 4 .
  • the communication apparatus 400 may not include the storage unit, and the storage unit may also be located outside the communication apparatus 400 .
  • the communication device 400 may be a terminal device, a chip applied in the terminal device, or other combined devices, components, etc., having the functions of the above-mentioned terminal device, or the communication device 400 may be a network device or an application. Chips in the network equipment or other combined devices, components, etc. with the above-mentioned network equipment functions.
  • the processing unit 410 may include a processor, such as a baseband processor, and the baseband processor may include one or more central processing units (CPUs); the transceiver unit 420 may include It is a transceiver, which can include antennas and radio frequency circuits, etc.
  • the transceiver may include a transmitter and a receiver, and the transceiver may implement the functions of the transmitter and the receiver, or the transmitter and the receiver may also be two function modules deployed separately, but the embodiment of the present application uses these two functions. These functional modules are collectively referred to as transceivers.
  • the transceiver unit 420 may be a radio frequency unit, and the processing unit 410 may be a processor, such as a baseband processor.
  • the transceiver unit 420 may be an input/output interface of a chip (eg, a baseband chip), and the processing unit 410 may be a processor of the chip system, which may include one or more central processing units.
  • processing unit 410 in this embodiment of the present application may be implemented by a processor or a circuit component related to the processor, and the transceiver unit 420 may be implemented by a transceiver or a circuit component related to the transceiver.
  • the processing unit 410 may be used to execute the execution performed by the terminal device in the embodiment shown in FIG. 2 . , except for transceiving operations, such as S22, S25, and S26, and/or other processes used to support the techniques described herein.
  • Transceiver unit 420 may be configured to perform all receive and transmit operations performed by the terminal device in the embodiment shown in FIG. 2 , such as S21 , S23 and S24 , and/or other processes for supporting the techniques described herein.
  • the processing unit 410 may be used to execute the execution performed by the terminal device in the embodiment shown in FIG. 3 . All operations other than transceiving operations, such as S32 and S34, and/or other processes used to support the techniques described herein.
  • Transceiver unit 420 may be used to perform all receive and transmit operations performed by the terminal device in the embodiment shown in FIG. 3 , such as S31 and S33 , and/or other processes for supporting the techniques described herein.
  • the processing unit 410 may be used to execute the network device in the embodiment shown in FIG. 2 . All operations other than transceiving operations, such as determining at least one auxiliary parameter set, and/or other processes for supporting the techniques described herein.
  • Transceiver unit 420 may be configured to perform all receive and transmit operations performed by network devices in the embodiment shown in FIG. 2 , such as S21 , S23 and S24 , and/or other processes for supporting the techniques described herein.
  • the processing unit 410 may be used to execute the network device in the embodiment shown in FIG. 3 . All operations other than transceiving operations, such as operations to determine sets of assistance parameters, and/or other processes used to support the techniques described herein.
  • Transceiver unit 420 may be configured to perform all receive and transmit operations performed by the network device in the embodiment shown in FIG. 3, such as S31 and S33, and/or other processes for supporting the techniques described herein.
  • the transceiver unit 420 may be a functional module, and the function module can perform both the sending operation and the receiving operation.
  • the transceiver unit 420 may be used to execute the embodiment shown in FIG. 2 or the All send and receive operations performed by terminal equipment or network equipment.
  • the transceiving unit 420 when performing a receiving operation, can be considered as a receiving unit, and when performing a transmitting operation, the transceiving unit 420 can be considered as a transmitting unit.
  • the transceiver unit 420 may also be two functional modules, and the transceiver unit 420 may be regarded as a general term for the two functional modules.
  • the two functional modules include a receiving unit and a sending unit.
  • the sending unit is used to complete the sending operation.
  • the sending and receiving unit 420 can be used to perform all the sending operations performed by the terminal device or the network device in the embodiment shown in FIG. 2 or the embodiment shown in FIG. 3; the receiving unit is used to complete the receiving operation, for example, the receiving unit can be used to perform the All receiving operations performed by the terminal device or the network device in the embodiment shown in FIG. 2 or the embodiment shown in FIG. 3 .
  • processing unit 410 and the transceiver unit 420 For specific functions that can be implemented by the processing unit 410 and the transceiver unit 420, reference may be made to the embodiment shown in FIG. 2 or the description of operations performed by the terminal device in the embodiment shown in FIG. The description of the operations performed by the network device in the embodiment or the embodiment shown in FIG. 3 will not be repeated here.
  • An embodiment of the present application further provides a communication apparatus, where the communication apparatus may be a terminal device or a circuit.
  • the communication apparatus may be configured to perform the actions performed by the terminal device in each of the foregoing method embodiments.
  • FIG. 5 shows a schematic structural diagram of a simplified terminal device.
  • the terminal device takes a mobile phone as an example.
  • the terminal device includes a processor, a memory, a radio frequency circuit, an antenna, and an input and output device.
  • the processor is mainly used to process communication protocols and communication data, control terminal equipment, execute software programs, and process data of software programs.
  • the memory is mainly used to store software programs and data.
  • the radio frequency circuit is mainly used for the conversion of the baseband signal and the radio frequency signal and the processing of the radio frequency signal.
  • Antennas are mainly used to send and receive radio frequency signals in the form of electromagnetic waves.
  • Input and output devices such as touch screens, display screens, and keyboards, are mainly used to receive data input by users and output data to users. It should be noted that some types of terminal equipment may not have input and output devices.
  • the processor When data needs to be sent, the processor performs baseband processing on the data to be sent, and outputs the baseband signal to the radio frequency circuit.
  • the radio frequency circuit performs radio frequency processing on the baseband signal and sends the radio frequency signal through the antenna in the form of electromagnetic waves.
  • the radio frequency circuit receives the radio frequency signal through the antenna, converts the radio frequency signal into a baseband signal, and outputs the baseband signal to the processor, which converts the baseband signal into data and processes the data.
  • FIG. 5 only one memory and processor are shown in FIG. 5 . In an actual end device product, there may be one or more processors and one or more memories.
  • the memory may also be referred to as a storage medium or a storage device or the like.
  • the memory may be set independently of the processor, or may be integrated with the processor, which is not limited in this embodiment of the present application.
  • the antenna and the radio frequency circuit with the transceiver function may be regarded as the transceiver unit of the terminal device (the transceiver unit may be a functional unit, and the function unit can realize the sending function and the receiving function; alternatively, the transceiver unit may also be It includes two functional units, namely a receiving unit capable of realizing a receiving function and a transmitting unit capable of realizing a transmitting function), and a processor with a processing function is regarded as a processing unit of the terminal device. As shown in FIG. 5 , the terminal device includes a transceiver unit 510 and a processing unit 520 .
  • the transceiver unit may also be referred to as a transceiver, a transceiver, a transceiver, and the like.
  • the processing unit may also be referred to as a processor, a processing board, a processing module, a processing device, and the like.
  • the device for implementing the receiving function in the transceiver unit 510 may be regarded as a receiving unit, and the device for implementing the transmitting function in the transceiver unit 510 may be regarded as a transmitting unit, that is, the transceiver unit 510 includes a receiving unit and a transmitting unit.
  • the transceiver unit may also sometimes be referred to as a transceiver, a transceiver, or a transceiver circuit.
  • the receiving unit may also sometimes be referred to as a receiver, receiver, or receiving circuit, or the like.
  • the transmitting unit may also sometimes be referred to as a transmitter, a transmitter, or a transmitting circuit, or the like.
  • the transceiver unit 510 is configured to perform the sending and receiving operations on the terminal device side in the embodiment shown in FIG. 2 or the embodiment shown in FIG. 3
  • the processing unit 520 is configured to perform the embodiment shown in FIG. 2 above. Or in the embodiment shown in FIG. 3 , other operations on the side of the terminal device except the transceiving operation.
  • the device may include a transceiver unit and a processing unit.
  • the transceiver unit may be an input/output circuit and/or a communication interface;
  • the processing unit may be an integrated processor, microprocessor or integrated circuit.
  • Embodiments of the present application provide a second communication system.
  • the communication system may include the terminal device involved in the above-mentioned embodiment shown in FIG. 3 , and the network device involved in the above-mentioned embodiment shown in FIG. 3 .
  • the terminal device or the network device is implemented, for example, by the communication apparatus 400 in FIG. 4 .
  • the processor is a general-purpose processor, DSP, ASIC, FPGA or other programmable logic devices, discrete gate or transistor logic devices, or discrete hardware components
  • the memory storage module
  • memory described herein is intended to include, but not be limited to, these and any other suitable types of memory.
  • the disclosed system, apparatus and method may be implemented in other manners.
  • the apparatus embodiments described above are only illustrative.
  • the division of the units is only a logical function division. In actual implementation, there may be other division methods.
  • multiple units or components may be combined or Can be integrated into another system, or some features can be ignored, or not implemented.
  • the shown or discussed mutual coupling or direct coupling or communication connection may be through some interfaces, indirect coupling or communication connection of devices or units, and may be in electrical, mechanical or other forms.
  • the units described as separate components may or may not be physically separated, and components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution in this embodiment.
  • each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically alone, or two or more units may be integrated into one unit.
  • the functions, if implemented in the form of software functional units and sold or used as independent products, may be stored in a computer-readable storage medium.
  • the technical solution of the present application can be embodied in the form of a software product in essence, or the part that contributes to the prior art or the part of the technical solution, and the computer software product is stored in a storage medium, including Several instructions are used to cause a computer device (which may be a personal computer, a server, or a network device, etc.) to execute all or part of the steps of the methods described in the various embodiments of the present application.
  • the aforementioned computer-readable storage medium can be any available medium that can be accessed by a computer.
  • the computer-readable medium may include random access memory (RAM), read-only memory (ROM), programmable read-only memory (PROM), Erasable programmable read only memory (erasable PROM, EPROM), electrically erasable programmable read only memory (electrically erasable programmable read only memory, EEPROM), compact disc read-only memory (compact disc read-only memory, CD- ROM), universal serial bus flash disk, removable hard disk, or other optical disk storage, magnetic disk storage medium, or other magnetic storage device, or capable of carrying or storing desired data in the form of instructions or data structures program code and any other medium that can be accessed by a computer.
  • RAM random access memory
  • ROM read-only memory
  • PROM programmable read-only memory
  • EPROM Erasable programmable read only memory
  • EEPROM electrically erasable programmable read only memory
  • compact disc read-only memory compact disc read-only memory
  • CD- ROM compact disc read-only memory
  • universal serial bus flash disk removable hard disk,
  • RAM static random access memory
  • DRAM dynamic random access memory
  • SDRAM synchronous dynamic random access memory
  • double data rate SDRAM double data rate SDRAM
  • DDR SDRAM double data rate SDRAM
  • ESDRAM enhanced synchronous dynamic random access memory
  • SLDRAM synchronous link dynamic random access memory
  • direct rambus RAM direct rambus RAM

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请涉及一种通信方法及设备。根据终端设备的接入等级确定终端设备的接入身份,终端设备的接入身份基于终端设备的接入等级确定,终端设备的接入等级为接入等级0至接入等级9中的一个,接入等级0至接入等级9对应如下接入身份中的一个或多个:接入身份3~接入身份10,或,接入身份号大于或等于16的H个接入身份,H为正整数。根据终端设备的接入身份,确定终端设备适用第一接入控制参数集。根据第一接入控制参数集确定终端设备是否允许接入第一小区。为终端设备分配的接入等级会对应新的接入身份,那么相应的,不同的接入等级(或者说,不同的接入身份)就会适用于不同的接入控制参数,从而实现对于不同类型的终端设备的差异化控制。

Description

一种通信方法及设备
相关申请的交叉引用
本申请要求在2020年09月04日提交中国国家知识产权局、申请号为202010921252.3、申请名称为“一种接入控制方法、终端及网络设备”的中国专利申请的优先权,其全部内容通过引用结合在本申请中;本申请要求在2020年09月30日提交中国国家知识产权局、申请号为202011066491.1、申请名称为“一种通信方法及设备”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及通信技术领域,尤其涉及一种通信方法及设备。
背景技术
当前NR标准中,网络侧通过统一接入控制(unifiied access control,UAC)技术控制用户设备(user equipment,UE)的接入。与UAC相关的概念有接入等级(access class)、接入身份(access identity)和接入类型(access category)。
每个UE都被分配了对应的接入等级,接入等级一般会写入用户身份模块(subscriber identity module,SIM)卡,则安装了SIM卡的UE就能确定该UE的接入等级。接入等级与接入身份具有对应关系,这种对应关系可以通过标准规定。一个小区可以通过系统信息块1(system information block,SIB1)来广播接入控制参数,接入控制参数与接入类型相对应,接入类型可以根据业务确定,另外每套接入控制参数都有适用的接入身份,从而UE根据该UE的接入身份和该UE执行的业务就可以确定适用的接入控制参数,以根据该接入控制参数确定该UE是否允许接入该小区。
目前,对于普通用户来说,被分配的接入等级都是接入等级0~接入等级9中的一个,在多数情况下对于普通用户来说,对应的接入身份都是接入身份0。那么在对普通UE进行接入控制时,很可能是通过同一套接入控制参数进行控制,这种方式无法区分不同的UE,或者说,无法对不同的UE分别进行接入控制。
发明内容
本申请实施例提供一种通信方法及设备,用于对不同的终端设备分别进行接入控制。
第一方面,提供第一种通信方法,该方法可由终端设备执行,或由芯片系统执行。根据终端设备的接入身份,确定所述终端设备适用第一接入控制参数集;其中,所述终端设备的接入身份基于所述终端设备的接入等级确定,所述终端设备的接入等级为接入等级0至接入等级9中的一个,接入等级0至接入等级9对应如下接入身份中的一个或多个:接入身份3~接入身份10,或,接入身份号大于或等于16的H个接入身份,H为正整数;根据所述第一接入控制参数集确定所述终端设备是否允许接入第一小区,所述第一小区是所述终端设备接收所述第一接入控制参数集的小区。
在本申请实施例中,为终端设备分配的接入等级为接入等级0~接入等级9中的一个, 但是这些接入等级会对应新的接入身份,那么相应的,不同的接入等级(或者说,不同的接入身份)就会适用于不同的接入控制参数,从而对这些终端设备进行接入控制时,可以适用不同的接入控制参数,以实现对于不同的终端设备分别进行接入控制,从而实现粒度更细的差异化控制。例如使得网络需要的终端设备,或者更需要接入网络的终端设备,能够实现优先接入网络,满足终端设备和网络的需求。
结合第一方面,在第一方面的第一种可选的实施方式中,根据终端设备的接入类型和接入身份,确定所述终端设备适用第一接入控制参数集,包括:根据所述终端设备的接入类型和接入身份,确定所述终端设备适用第一接入控制参数集。
终端设备可以根据终端设备的接入身份和接入类型确定终端设备适用第一接入控制参数集,或者也可以根据接入身份确定终端设备适用第一接入控制参数集,而不借助于接入类型。
结合第一方面或第一方面的第一种可选的实施方式,在第一方面的第二种可选的实施方式中,所述第一终端设备属于第一类型,同一类型的终端设备的接入等级相同;其中,不同类型的终端设备满足如下一项或多项:
不同类型的终端设备所支持的带宽不同;
不同类型的终端设备所支持的天线数量不同;
不同类型的终端设备的应用场景不同;
不同类型的终端设备所支持的最大数据传输速率不同;或,
不同类型的终端设备所支持的最大传输块大小不同。
本申请实施例可以将终端设备划分为多种不同的类型,划分因素可以有多种,例如可以根据终端设备支持的带宽划分,或者根据终端设备支持的天线数量划分,或者根据终端设备支持的带宽以及应用场景划分,等等。其中,本申请实施例中参与划分类型的终端设备,例如都是redcap终端设备,或者也可以包括其他的终端设备,例如也可以包括legacy终端设备。
结合第一方面或第一方面的第一种可选的实施方式或第一方面的第二种可选的实施方式,在第一方面的第三种可选的实施方式中,所述方法还包括:接收第一消息,所述第一消息包括第一指示信息和至少一个辅助参数集,所述第一指示信息用于指示为一个或多个接入等级配置了辅助参数集,或指示为一个或多个接入身份配置了辅助参数集,所述至少一个辅助参数集包括所述第一指示信息所指示的全部辅助参数集;根据所述第一指示信息确定所述终端设备对应于所述至少一个辅助参数集中的第一辅助参数集。
在本申请实施例中,为了更好地对不同类型的终端设备分别进行接入控制,还可以为不同类型的终端设备配置辅助参数集,从而通过辅助参数集进一步对不同类型的终端设备分别进行接入控制。例如,本申请实施例为一个或多个接入等级分别配置辅助参数集,或者,为一个或多个接入身份分别配置辅助参数集。网络设备究竟为哪个或哪些接入等级配置了辅助参数集,或者究竟为哪个或哪些接入身份配置了辅助参数集,网络设备需要告知终端设备。则网络设备可以发送第一指示信息,通过第一指示信息来指示为哪个或哪些接入身份配置了辅助参数集,或指示为哪个或哪些接入等级配置了辅助参数集,从而一个终端设备就能根据第一指示确定该终端设备是否被配置了辅助参数集。在这种实施方式中,网络设备可将第一指示信息和至少一个辅助参数集放在一条消息中发送,该消息例如为SIB1,或者也可以是其他消息。从而终端设备通过一条消息就能获得辅助参数集和第一指 示信息,无需网络设备和终端设备之间交互过多的消息,简化实现过程。
结合第一方面或第一方面的第一种可选的实施方式或第一方面的第二种可选的实施方式,在第一方面的第四种可选的实施方式中,所述方法还包括:接收第一指示信息,所述第一指示信息用于指示为一个或多个接入等级配置了辅助参数集,或指示为一个或多个接入身份配置了辅助参数集;根据所述第一指示信息确定所述终端设备对应第一辅助参数集。
结合第一方面的第三种可选的实施方式或第一方面的第四种可选的实施方式,在第一方面的第五种可选的实施方式中,所述第一指示信息用于指示为所述一个或多个接入等级中的每个接入等级配置了辅助参数集;或,所述第一指示信息用于指示为所述一个或多个接入身份中的每个接入身份配置了辅助参数集;或,所述第一指示信息用于指示为一个或多个接入等级配置了一个辅助参数集;或,所述第一指示信息用于指示为一个或多个接入身份配置了一个辅助参数集。
本申请实施例可以为一个接入身份或接入等级配置一个辅助参数集,从而为不同的接入身份或接入等级可以配置不同的辅助参数集,以实现对于不同的接入身份或接入等级的终端设备的差异化控制,使得控制粒度更细。或者,也可以为多个接入身份或接入等级配置一个辅助参数集,这样可以简化配置过程,也减小由于发送辅助参数集所带来的信令开销。
结合第一方面的第三种可选的实施方式或第一方面的第四种可选的实施方式或第一方面的第五种可选的实施方式,在第一方面的第六种可选的实施方式中,根据所述第一接入控制参数集确定所述终端设备是否能够接入第一小区,包括:根据所述第一接入控制参数集合和所述第一辅助参数集,确定所述终端设备是否能够接入第一小区。
如果终端设备适用第一辅助参数集,那么终端设备就可以根据第一接入控制参数集和第一辅助参数集来确定该终端设备是否能接入第一小区,这样就通过辅助参数集实现了对不同类型的终端设备的差异化控制。
结合第一方面的第三种可选的实施方式或第一方面的第四种可选的实施方式或第一方面的第五种可选的实施方式或第一方面的第六种可选的实施方式,在第一方面的第七种可选的实施方式中,所述第一辅助参数集包括如下参数中的一个或多个:概率因子,所述概率因子用于调整禁止因子,所述禁止因子包括在所述第一接入控制参数集内;时间因子,所述时间因子用于调整禁止接入时间,所述禁止接入时间包括在所述第一接入控制参数集内;专用的随机接入资源信息;或,第一阈值,所述第一阈值为第一参数的阈值,所述第一参数用于指示所述终端设备的信号质量。
一个辅助参数集可以包括如上的一个或多个参数,或者还可以包括其他参数。
结合第一方面的第七种可选的实施方式,在第一方面的第八种可选的实施方式中,所述方法还包括:确定测量的所述第一参数的取值小于所述第一阈值,则使用所述第一辅助参数集。
例如第一参数为RSRP、RSRQ或SINR等。如果终端设备测量的第一参数的取值小于第一阈值,那么终端设备可以使用第一辅助参数集,而如果终端设备测量得到的第一参数的取值大于或等于第一阈值,那么终端设备就可以不使用第一辅助参数集。通过这种方式,可以使得辅助参数集供信号质量较差的用户使用,例如通过辅助参数集限制这些用户的接入(例如将概率因子设置的较小,或者设置的随机接入资源的信号质量较差,或随机接入 资源较少等),使得信号质量较好的用户能够更多地接入小区,从而在实现对不同类型的终端设备分别进行接入控制的同时,还能实现对于不同信号质量的终端设备分别进行接入控制。
结合第一方面的第四种可选的实施方式或第一方面的第五种可选的实施方式或第一方面的第六种可选的实施方式或第一方面的第七种可选的实施方式或第一方面的第八种可选的实施方式,在第一方面的第九种可选的实施方式中,所述方法还包括:
接收至少一个辅助参数集,所述至少一个辅助参数集包括所述第一指示信息所指示的全部辅助参数集,且所述至少一个辅助参数集包括所述第一辅助参数集。
网络设备也可将第一指示信息和至少一个辅助参数集放在不同的消息中发送,以减小一条消息的信息量,提高消息的发送成功率。
结合第一方面或第一方面的第一种可选的实施方式至第一方面的第九种可选的实施方式中的任一种可选的实施方式,在第一方面的第十种可选的实施方式中,所述第一接入控制参数集包括第二指示信息,所述第二指示信息用于指示所述第一接入控制参数所适用的接入身份。
例如,一个接入控制参数集不默认适用于接入身份0,而是包括第二指示信息,该接入控制参数集究竟适用于哪个或哪些接入身份,可以通过第二指示信息来指示,一个终端设备根据该终端设备的接入身份和第二指示信息就能确定该终端设备是否适用一个接入控制参数集。提高第二指示信息,扩展了一个接入控制参数集能够适用的接入身份,使得接入控制参数集的应用更为合理。
结合第一方面或第一方面的第一种可选的实施方式至第一方面的第十种可选的实施方式中的任一种可选的实施方式,在第一方面的第十一种可选的实施方式中,所述第一接入控制参数集属于第一集合,所述第一集合还包括第二接入控制参数集,以及,所述第一集合还包括所述第一接入控制参数集对应的第三指示信息和所述第二接入控制参数集对应的第四指示信息,所述第三指示信息用于指示所述第一接入控制参数集所适用的接入身份,所述第四指示信息用于指示所述第二接入控制参数集所适用的接入身份。
这种方式相当于扩展了现有的接入控制参数集的内容,虽然一个接入控制参数集(或者说,一个集合)对应于一个接入类型,但是在一个接入类型下,也可以提供适用于不同的接入身份的接入控制参数集,更有利于实现精细化的接入控制。
结合第一方面或第一方面的第一种可选的实施方式至第一方面的第十一种可选的实施方式中的任一种可选的实施方式,在第一方面的第十二种可选的实施方式中,所述终端设备的接入等级属于第一类型的接入等级,所述第一类型的接入等级用于配置给redcap终端设备。
本申请实施例所述的终端设备例如为redcap终端设备,或者也可以包括其他类型的终端设备,例如包括legacy终端设备等。
第二方面,提供第二种通信方法,该方法可由网络设备执行,或由芯片系统执行。网络设备例如为接入网设备,例如基站。确定至少一个接入控制参数集,所述至少一个接入控制参数集用于终端设备确定是否允许接入第一小区,其中,所述终端设备的接入身份基于所述终端设备的接入等级确定,所述终端设备的接入等级为接入等级0至接入等级9中的一个,接入等级0至接入等级9对应如下接入身份中的一个或多个:接入身份3~接入身份10,或,接入身份号大于或等于16的H个接入身份,H为正整数;发送所述至少一个 接入控制参数集。
结合第二方面,在第二方面的第一种可选的实施方式中,不同的接入等级对应于不同类型的终端设备,同一类型的终端设备的接入等级相同;其中,不同类型的终端设备满足如下一项或多项:不同类型的终端设备所支持的带宽不同;不同类型的终端设备所支持的天线数量不同;不同类型的终端设备的应用场景不同;不同类型的终端设备所支持的最大数据传输速率不同;或,不同类型的终端设备所支持的最大传输块大小不同。
结合第二方面或第二方面的第一种可选的实施方式,在第二方面的第二种可选的实施方式中,所述方法还包括:发送第一消息,所述第一消息包括第一指示信息和至少一个辅助参数集,所述第一指示信息用于指示为一个或多个接入等级配置了辅助参数集,或指示为一个或多个接入身份配置了辅助参数集,所述至少一个辅助参数集包括所述第一指示信息所指示的全部辅助参数集。
结合第二方面或第二方面的第一种可选的实施方式,在第二方面的第三种可选的实施方式中,所述方法还包括:发送第一指示信息,所述第一指示信息用于指示为一个或多个接入等级配置了辅助参数集,或指示为一个或多个接入身份配置了辅助参数集。
结合第二方面的第二种可选的实施方式或第二方面的第三种可选的实施方式,在第二方面的第四种可选的实施方式中,所述第一指示信息用于指示为所述一个或多个接入等级中的每个接入等级配置了辅助参数集;或,所述第一指示信息用于指示为所述一个或多个接入身份中的每个接入身份配置了辅助参数集;或,所述第一指示信息用于指示为一个或多个接入等级配置了一个辅助参数集;或,所述第一指示信息用于指示为一个或多个接入身份配置了一个辅助参数集。
结合第二方面的第二种可选的实施方式或第二方面的第三种可选的实施方式或第二方面的第四种可选的实施方式,在第二方面的第五种可选的实施方式中,所述至少一个辅助参数集中的一个辅助参数集包括如下参数中的一个或多个:概率因子,所述概率因子用于调整禁止因子,所述禁止因子包括在所述第一接入控制参数集内;时间因子,所述时间因子用于调整禁止接入时间,所述禁止接入时间包括在所述第一接入控制参数集内;专用的随机接入资源信息;或,第一阈值,所述第一阈值为第一参数的阈值,所述第一参数用于指示所述终端设备的信号质量。
结合第二方面的第三种可选的实施方式或第二方面的第四种可选的实施方式或第二方面的第五种可选的实施方式,在第二方面的第六种可选的实施方式中,所述方法还包括:发送至少一个辅助参数集,所述至少一个辅助参数集包括所述第一指示信息所指示的全部辅助参数集,且所述至少一个辅助参数集包括所述第一辅助参数集。
结合第二方面或第二方面的第一种可选的实施方式至第二方面的第六种可选的实施方式中的任一种可选的实施方式,在第二方面的第七种可选的实施方式中,所述至少一个接入控制参数集中的第一接入控制参数集包括第二指示信息,所述第二指示信息用于指示所述第一接入控制参数所适用的接入身份。
结合第二方面或第二方面的第一种可选的实施方式至第二方面的第六种可选的实施方式中的任一种可选的实施方式,在第二方面的第八种可选的实施方式中,所述至少一个接入控制参数集包括第一接入控制参数集和第二接入控制参数集,所述第一接入控制参数集和所述第二接入控制参数集属于第一集合,所述第一集合还包括所述第一接入控制参数集对应的第三指示信息和所述第二接入控制参数集对应的第四指示信息,所述第三指示信息 用于指示所述第一接入控制参数集所适用的接入身份,所述第四指示信息用于指示所述第二接入控制参数集所适用的接入身份。
结合第二方面或第二方面的第一种可选的实施方式至第二方面的第八种可选的实施方式中的任一种可选的实施方式,在第二方面的第九种可选的实施方式中,所述终端设备的接入等级属于第一类型的接入等级,所述第一类型的接入等级用于配置给redcap终端设备。
关于第二方面或第二方面的各种可选的实施方式所带来的技术效果,可参考对于第一方面或相应的实施方式的技术效果的介绍。
第三方面,提供第三种通信方法,该方法可由终端设备执行,或由芯片系统执行。接收至少一个接入控制参数集以及辅助参数集;根据终端设备的接入身份确定所述终端设备对应于所述至少一个接入控制参数集中的所述第一接入控制参数集;根据所述第一接入控制参数集和所述辅助参数集,确定所述终端设备是否允许接入第一小区。
在本申请实施例中,可以为某些终端设备配置辅助参数集,例如为redcap终端设备配置辅助参数集,使得redcap终端设备可以应用辅助参数集确定是否能接入小区,实现了对于redcap终端设备和legacy终端设备分别进行接入控制,使得控制粒度更细。
结合第三方面,在第三方面的第一种可选的实施方式中,根据终端设备的接入类型和接入身份,确定所述终端设备适用第一接入控制参数集,包括:根据所述终端设备的接入类型和接入身份,确定所述终端设备适用第一接入控制参数集。
结合第三方面或第三方面的第一种可选的实施方式,在第三方面的第二种可选的实施方式中,所述辅助参数集包括如下参数中的一个或多个:概率因子,所述概率因子用于调整禁止因子,所述禁止因子包括在所述第一接入控制参数集内;时间因子,所述时间因子用于调整禁止接入时间,所述禁止接入时间包括在所述第一接入控制参数集内;专用的随机接入资源信息;或,第一阈值,所述第一阈值为第一参数的阈值,所述第一参数用于指示所述终端设备的信号质量。
结合第三方面的第二种可选的实施方式,在第三方面的第三种可选的实施方式中,所述方法还包括:确定测量的所述第一参数的取值小于所述第一阈值,则使用所述辅助参数集。
结合第三方面的第二种可选的实施方式或第三方面的第三种可选的实施方式,在第三方面的第四种可选的实施方式中,根据所述第一接入控制参数集和所述辅助参数集,确定所述终端设备是否能够接入第一小区,包括:使用所述概率因子调整所述禁止因子;生成随机数,如果所述随机数小于所述调整后的禁止因子,确定所述终端设备能够接入所述第一小区,否则,确定所述终端设备被禁止接入所述第一小区;如果所述终端设备被禁止接入所述第一小区,开启定时器,所述定时器的定时时长为根据所述时间因子调整所述禁止接入时间后得到的时长,其中,在所述定时器超时前,所述终端设备被禁止接入所述第一小区。
辅助参数集所包括的参数可以用于调整接入控制参数集所包括的相应参数,从而实现对于不同类型的UE的接入控制。
结合第三方面或第三方面的第一种可选的实施方式至第三方面的第四种可选的实施方式中的任一种可选的实施方式,在第三方面的第五种可选的实施方式中,所述终端设备的接入等级为接入等级0至接入等级9中的一个。
本申请实施例可以不为终端设备新配置接入等级,终端设备适用原有接入等级即可。这使得本申请实施例的方案更有利于与已有技术兼容。或者,也可以为终端设备新配置接入等级,例如配置接入等级0至接入等级9中的一个。
结合第三方面或第三方面的第一种可选的实施方式至第三方面的第五种可选的实施方式中的任一种可选的实施方式,在第三方面的第六种可选的实施方式中,所述终端设备的接入身份为接入身份3~接入身份10中的一个,或为接入身份号大于或等于16的H个接入身份中的一个,H为正整数。
结合第三方面或第三方面的第一种可选的实施方式至第三方面的第六种可选的实施方式中的任一种可选的实施方式,在第三方面的第七种可选的实施方式中,所述方法还包括:根据所述终端设备的能力信息,确定所述终端设备适用所述辅助参数集;或,根据所述终端设备的接入等级,确定所述终端设备适用所述辅助参数集,所述终端设备的接入等级为第一类型的接入等级,其中,在所述第一类型的接入等级中,不同的接入等级对应所述辅助参数集中的相同的辅助参数集或不同的辅助参数集;或,根据所述终端设备的接入身份,确定所述终端设备适用所述辅助参数集,所述终端设备的接入身份为第一类型的接入身份,其中,在所述第一类型的接入身份中,不同的接入身份对应所述辅助参数集中的相同的辅助参数集或不同的辅助参数集,所述第一类型的接入身份包括如下一个或多个:接入身份3~接入身份10,或,接入身份号大于或等于16的H个接入身份,H为正整数。
终端设备可以通过不同的方式确定该终端设备是否适用辅助参数集。例如终端设备可以根据该终端设备的能力确定该终端设备适用辅助参数集,例如规定,第一能力的终端设备适用辅助参数集,而其他能力的终端设备不适用辅助参数集,则具有第一能力的终端设备就能够使用辅助参数集,而其他能力的终端设备就不使用辅助参数集。第一能力例如包括天线能力或带宽能力,还可能包括其他能力。或者,本申请实施例可以为终端设备分配新的接入等级,如果一个终端设备被配置了新的接入等级,则该终端设备就适用辅助参数集,否则该终端设备就不适用辅助参数集。或者,本申请实施例可以为终端设备分配新的接入身份,如果一个终端设备被配置了新的接入身份,则该终端设备就适用辅助参数集,否则该终端设备就不适用辅助参数集。可见,本申请实施例中终端设备可以通过多种方式确定该终端设备是否适用辅助参数集,较为灵活。
关于第三方面的一些实施方式所带来的技术效果,可参考对于第一方面的相应的实施方式的技术效果的介绍。
第四方面,提供第四种通信方法,该方法可由网络设备执行,或由芯片系统执行。网络设备例如为接入网设备,例如基站。确定至少一个接入控制参数集,以及确定辅助参数集,所述至少一个接入控制参数集和所述辅助参数集用于终端设备确定是否允许接入第一小区;发送所述至少一个接入控制参数集和所述辅助参数集。
结合第四方面,在第四方面的第一种可选的实施方式中,所述辅助参数集包括如下参数中的一个或多个:概率因子,所述概率因子用于调整禁止因子,所述禁止因子包括在所述第一接入控制参数集内;时间因子,所述时间因子用于调整禁止接入时间,所述禁止接入时间包括在所述第一接入控制参数集内;专用的随机接入资源信息;或,第一阈值,所述第一阈值为第一参数的阈值,所述第一参数用于指示所述终端设备的信号质量。
结合第四方面的第一种可选的实施方式,在第四方面的第二种可选的实施方式中,所述方法还包括:确定测量的所述第一参数的取值小于所述第一阈值,则使用所述辅助参数 集。
结合第四方面或第四方面的第一种可选的实施方式或第四方面的第二种可选的实施方式,在第四方面的第三种可选的实施方式中,所述终端设备的接入等级为接入等级0至接入等级9中的一个。
结合第四方面或第四方面的第一种可选的实施方式或第四方面的第三种可选的实施方式,在第四方面的第四种可选的实施方式中,所述终端设备的接入身份为接入身份3~10中的一个,或为大于或等于16的H个接入身份中的一个,H为正整数。
结合第四方面或第四方面的第一种可选的实施方式或第四方面的第四种可选的实施方式或第四方面的第三种可选的实施方式,在第四方面的第五种可选的实施方式中,所述辅助参数集对应于终端设备的第一能力;或,所述辅助参数集对应于第一类型的接入等级,其中,在所述第一类型的接入等级中,不同的接入等级对应所述辅助参数集中的相同的辅助参数集或不同的辅助参数集;或,所述辅助参数集对应于第一类型的接入身份,其中,在所述第一类型的接入身份中,不同的接入身份对应所述辅助参数集中的相同的辅助参数集或不同的辅助参数集,所述第一类型的接入身份包括如下一个或多个:接入身份3~接入身份10,或,接入身份号大于或等于16的H个接入身份,H为正整数。
关于第四方面的一些实施方式所带来的技术效果,可参考对于第三方面的相应的实施方式的技术效果的介绍。
第五方面,提供一种通信装置。所述通信装置可以包括用于执行第一方面或第一方面的任一可选的实施方式中的方法的模块,例如包括处理单元。可选的,还可以包括收发单元。可选的,还可以包括存储单元。
第六方面,提供一种通信装置。所述通信装置可以包括用于执行第二方面或第二方面的任一可选的实施方式中的方法的模块,例如包括收发单元和处理单元。可选的,还可以包括存储单元。
第七方面,提供一种通信装置。所述通信装置可以包括用于执行第三方面或第三方面的任一可选的实施方式中的方法的模块,例如包括收发单元和处理单元。可选的,还可以包括存储单元。
第八方面,提供一种通信装置。所述通信装置可以包括用于执行第四方面或第四方面的任一可选的实施方式中的方法的模块,例如包括收发单元和处理单元。可选的,还可以包括存储单元。
第九方面,提供一种芯片系统,所述芯片系统包括一个或多个处理器,以及包括通信接口,所述处理器与所述通信接口耦合,用于实现上述第一方面或第一方面的任一种可选的实施方式所提供的方法。可选的,所述芯片系统还可以包括存储器,例如,所述处理器可以读取并执行所述存储器所存储的软件程序,以实现上述第一方面或第一方面的任一种可选的实施方式所提供的方法。
第十方面,提供一种芯片系统,所述芯片系统包括一个或多个处理器,以及包括通信接口,所述处理器与所述通信接口耦合,用于实现上述第二方面或第二方面的任一种可选的实施方式所提供的方法。可选的,所述芯片系统还可以包括存储器,例如,所述处理器可以读取并执行所述存储器所存储的软件程序,以实现上述第二方面或第二方面的任一种可选的实施方式所提供的方法。
第十一方面,提供一种芯片系统,所述芯片系统包括一个或多个处理器,以及包括通 信接口,所述处理器与所述通信接口耦合,用于实现上述第三方面或第三方面的任一种可选的实施方式所提供的方法。可选的,所述芯片系统还可以包括存储器,例如,所述处理器可以读取并执行所述存储器所存储的软件程序,以实现上述第三方面或第三方面的任一种可选的实施方式所提供的方法。
第十二方面,提供一种芯片系统,所述芯片系统包括一个或多个处理器,以及包括通信接口,所述处理器与所述通信接口耦合,用于实现上述第四方面或第四方面的任一种可选的实施方式所提供的方法。可选的,所述芯片系统还可以包括存储器,例如,所述处理器可以读取并执行所述存储器所存储的软件程序,以实现上述第四方面或第四方面的任一种可选的实施方式所提供的方法。
第十三方面,提供第一通信系统。所述第一通信系统包括第五方面所述的通信装置或第九方面所述的芯片系统,以及包括第六方面的通信装置或第十方面所述的芯片系统。
第十四方面,提供第二通信系统。所述第一通信系统包括第七方面所述的通信装置或第十一方面所述的芯片系统,以及包括第八方面的通信装置或第十二方面所述的芯片系统。
第十五方面,提供一种计算机可读存储介质,所述计算机可读存储介质用于存储计算机程序,当所述计算机程序在计算机上运行时,使得所述计算机执行上述任意一个方面所提供的方法。
第十六方面,提供一种包含指令的计算机程序产品,所述计算机程序产品用于存储计算机程序,当所述计算机程序在计算机上运行时,使得所述计算机执行上述任意一个方面所提供的方法。
在本申请实施例中,为终端设备分配的接入等级会对应至少两种接入身份,那么相应的,不同的接入等级(或者说,不同的接入身份)就会适用于不同的接入控制参数,从而实现对于不同类型的终端设备的差异化控制。
附图说明
图1为本申请实施例的一种应用场景示意图;
图2为本申请实施例提供的第一种通信方法的流程图;
图3为本申请实施例提供的第二种通信方法的流程图;
图4为本申请实施例提供的一种通信装置的一种示意性框图;
图5为本申请实施例提供的又一种通信装置的一种示意性框图。
具体实施方式
为了使本申请实施例的目的、技术方案和优点更加清楚,下面将结合附图对本申请实施例作进一步地详细描述。
以下,对本申请实施例中的部分用语进行解释说明,以便于本领域技术人员理解。
本申请实施例中,终端设备是一种具有无线收发功能的设备,可以是固定设备,移动设备、手持设备、穿戴设备、车载设备,或内置于上述设备中的无线装置(例如,通信模块或芯片系统等)。所述终端设备用于连接人,物,机器等,可广泛用于各种场景,例如包括但不限于以下场景:蜂窝通信、设备到设备通信(device-to-device,D2D)、车到一切(vehicle to everything,V2X)、机器到机器/机器类通信(machine-to-machine/machine-type  communications,M2M/MTC)、物联网(internet of things,IoT)、虚拟现实(virtual reality,VR)、增强现实(augmented reality,AR)、工业控制(industrial control)、无人驾驶(self driving)、远程医疗(remote medical)、智能电网(smart grid)、智能家具、智能办公、智能穿戴、智能交通,智慧城市(smart city)、无人机、机器人等场景的终端设备。所述终端设备有时可称为用户设备(user equipment,UE)、终端、接入站、UE站、远方站、无线通信设备、或用户装置等等,为描述方便,本申请实施例中将终端设备以UE为例进行说明。
例如,本申请实施例关注的一类UE为能力缩减UE(Reduced Capability UE,redcap UE)。之所以称为redcap UE,是因为与现有的普通NR UE相比,redcapUE设备通常只支持更低的带宽,例如20MHz,且支持更少的收发天线数,例如只支持1T1R或者1T2R。按照现有课题的研究内容,redcap UE包括三类低能力的UE:可穿戴产品、视频监控设备和工业传感器设备。
本申请实施例中的网络设备,例如包括接入网设备,和/或核心网设备。所述接入网设备为具有无线收发功能的设备,用于与所述终端设备进行通信。所述接入网设备包括但不限于上述通信系统中的基站(BTS,Node B,eNodeB/eNB,或gNodeB/gNB)、收发点(transmission reception point,TRP),3GPP后续演进的基站,WiFi系统中的接入节点,无线中继节点,无线回传节点等。所述基站可以是:宏基站,微基站,微微基站,小站,中继站等。多个基站可以支持上述提及的同一种接入技术的网络,也可以支持上述提及的不同接入技术的网络。基站可以包含一个或多个共站或非共站的传输接收点。网络设备还可以是云无线接入网络(cloud radio access network,CRAN)场景下的无线控制器、集中单元(centralized unit,CU),和/或分布单元(distributed unit,DU)。网络设备还可以是服务器,可穿戴设备,或车载设备等。例如,V2X技术中的网络设备可以为路侧单元(road side unit,RSU)。以下对接入网设备以为基站为例进行说明。所述通信系统中的多个网络设备可以为同一类型的基站,也可以为不同类型的基站。基站可以与终端设备进行通信,也可以通过中继站与终端设备进行通信。终端设备可以与不同接入技术中的多个基站进行通信。所述核心网设备用于实现移动管理,数据处理,会话管理,策略和计费等功能。不同接入技术的系统中实现核心网功能的设备名称可以不同,本申请并不对此进行限定。以5G系统为例,所述核心网设备包括:访问和移动管理功能(access and mobility management function,AMF)、会话管理功能(session management function,SMF)、或用户面功能(user plane function,UPF)等。
本申请实施例中,用于实现网络设备的功能的装置可以是网络设备,也可以是能够支持网络设备实现该功能的装置,例如芯片系统,该装置可以被安装在网络设备中。在本申请实施例提供的技术方案中,以用于实现网络设备的功能的装置是网络设备为例,描述本申请实施例提供的技术方案。
本申请实施例中,对于名词的数目,除非特别说明,表示“单数名词或复数名词”,即"一个或多个”。“至少一个”是指一个或者多个,“多个”是指两个或两个以上。“和/或”,描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B的情况,其中A,B可以是单数或者复数。字符“/”一般表示前后关联对象是一种“或”的关系。例如,A/B,表示:A或B。“以下至少一项(个)”或其类似表达,是指的这些项中的任意组合,包括单项(个)或复数项(个)的任意组合。例如,a,b,或c中的至少一项(个),表示:a,b,c,a和b,a和c,b和c,或a和b和c,其中a,b,c 可以是单个,也可以是多个。
以及,除非有相反的说明,本申请实施例提及“第一”、“第二”等序数词是用于对多个对象进行区分,不用于限定多个对象的大小、内容、顺序、时序、优先级或者重要程度等。例如,第一指示信息和第二指示信息,可以是同一个指示信息,也可以是不同的指示信息,且,这种名称也并不是表示这两个指示信息的信息量大小、内容、优先级、发送顺序或者重要程度等的不同。
前文介绍了本申请实施例所涉及到的一些名词概念,下面介绍本申请实施例涉及的技术特征。
当前的NR标准中,网络禁止UE驻留的功能是通过在主信息块(master information block,MIB)内包括两个比特(bit)的方式来实现。这两个比特分别表示小区禁止(cellBarred)和内部频率选择(intraFreqReselection)。其中,cellBarred表示网络是否允许UE驻留,intraFreqReselection表示网络是否允许UE重选到同频邻区。
而UE的接入控制,目前是通过UAC技术来实现。与UAC相关的概念包括接入等级、接入身份和接入类型。
每个UE都被分配了对应的接入等级,接入等级一般会写入SIM卡,则安装了SIM卡的UE就能确定该UE的接入等级。目前,对于普通用户来说,被分配的接入等级一般是接入等级0~接入等级9中的一个,接入等级11~接入等级15会被分配给高优先级用户。
目前,标准中定义了接入等级和接入身份之间的对应关系(或者说映射关系),其中接入等级0~接入等级9均映射到接入身份0,接入等级11~接入等级15分别映射到接入身份11~接入身份15。也就是说,在多数情况下,普通UE都映射到接入身份0。可见,接入等级或接入身份可用来区分UE的类型。请参考表1,为目前定义的接入身份及对应的UE配置。
表1
Figure PCTCN2021108492-appb-000001
Figure PCTCN2021108492-appb-000002
标准中还定义了接入类型,用来区分接入的业务类型,因此,接入类型与UE的业务有关。举例来说,当UE因为紧急呼叫而发起接入时,接入类型为接入类型2。请参考表2,为目前定义的接入类型及对应的业务,其中,接入类型号为表2的第一列,UE的业务可参考表2的第三列,可见,不同的业务可对应不同的接入类型号,也就是对应不同的接入类型。
表2
Figure PCTCN2021108492-appb-000003
Figure PCTCN2021108492-appb-000004
一个小区可以通过SIB1来广播接入控制参数,接入控制参数以接入类型为基础组织,并会声明对于相应的接入等级是否适用,UE需要根据接入控制参数来确定该UE是否允许接入该小区。其中,SIB1是周期性广播的,寻呼消息(paging message)会通知系统消息的改变,如果UE接收的寻呼消息指示系统消息发生改变,则UE才需要再次读取SIB1,否则UE无需读取SIB1。接入控制参数与接入类型相对应,这种对应关系例如通过协议规定,或者预配置在UE和网络设备中,即,对于UE和网络设备来说,都能获知接入控制参数与接入类型之间的对应关系。接入类型可以根据业务确定,UE根据该UE发起接入的业务能够确定该UE对应的接入类型。另外每套接入控制参数都有适用的接入身份,从而UE根据该UE的接入身份和该UE的接入类型就可以确定该UE适用的接入控制参数,以根据该接入控制参数确定该UE是否允许接入该小区。
举例来说,例如一个UE的接入等级为2,那么根据前文介绍可知,该UE的接入身份为接入身份0。另外,例如该UE是因为紧急情况而发起随机接入,那么根据表2可知,该UE的接入类型为接入类型2。接入控制参数与接入类型是对应的,UE可以确定接入类型2对应的接入控制参数。该接入控制参数可以指示是否适用于相应的接入身份,从而UE可以确定接入身份0是否能够适用该接入控制参数,如果接入身份0能够适用该接入控制参数,则UE使用该接入控制参数确定是否允许接入小区。
根据前文介绍可知,目前对于普通用户来说,被分配的接入等级都是接入等级0~接入等级9中的一个,而多数情况下对于普通用户来说,对应的接入身份都是接入身份0。那么在对普通UE进行接入控制时,很可能是通过同一套接入控制参数进行控制,这种方式 无法区分不同的UE,或者说,无法对不同的UE分别进行接入控制。
鉴于此,提供本申请实施例的技术方案。在本申请实施例中,为终端设备分配的接入等级为接入等级0~接入等级9中的一个,但是这些接入等级对应的接入身份可以是接入身份3~10或H个接入身份中的一个或多个,即,接入等级0~接入等级9可以对应于新的接入身份,那么相应的,不同的接入等级(或者说,不同的接入身份)就会适用于不同的接入控制参数,从而对这些终端设备进行接入控制时,可以适用不同的接入控制参数,以实现对于不同的终端设备分别进行接入控制,从而实现粒度更细的差异化控制。例如使得网络需要的终端设备,或者更需要接入网络的终端设备,能够实现优先接入网络,满足终端设备和网络的需求。
本申请实施例提供的技术方案可以应用于4G系统中,例如LTE系统,或可以应用于5G系统中,例如NR系统,或者还可以应用于下一代移动通信系统或其他类似的通信系统,具体的不做限制。
请参见图1,为本申请实施例的一种应用场景。图1包括接入网设备、核心网设备和UE。UE可以通过接入控制参数来确定是否允许接入该接入网设备所提供的小区。
该接入网设备例如工作在演进的通用移动通信系统陆地无线接入(evolved UMTS terrestrial radio access,E-UTRA)系统中,或者工作在NR系统中,或者工作在下一代通信系统或其他通信系统中。该接入网设备例如为基站。其中,接入网设备在不同的系统对应不同的设备,例如在4G系统中可以对应eNB,在5G系统中对应5G中的接入网设备,例如gNB。当然本申请实施例所提供的技术方案也可以应用于未来的移动通信系统中,因此图1中的接入网设备也可以对应未来的移动通信系统中的网络设备。图1以接入网设备是基站为例,实际上参考前文的介绍,接入网设备还可以是RSU等设备。另外,图1中的UE以手机为例,实际上根据前文对于UE的介绍可知,本申请实施例的UE不限于手机。
下面结合附图介绍本申请实施例所提供的方法。在本申请的各个实施例对应的附图中,凡是用虚线表示的步骤均为可选的步骤。
本申请实施例提供第一种通信方法,请参见图2,为该方法的流程图。在下文的介绍过程中,以该方法应用于图1所示的网络架构为例。
为了便于介绍,在下文中,以该方法由网络设备和UE执行为例。因为本申请实施例是以应用在图1所示的网络架构为例。因此,下文所述的网络设备例如为图1所示的网络架构中的接入网设备,下文所述的UE可以是图1所示的网络架构中的UE。
S21、网络设备发送至少一个接入控制参数集,相应的,UE接收来自网络设备的至少一个接入控制参数集。例如,网络设备在第一小区发送至少一个接入控制参数集,那么UE可以在第一小区接收该至少一个接入控制参数集。第一小区是该UE即将发起随机接入的小区,或者说,UE希望在第一小区发起随机接入。
UE在接入该网络设备之前,可以接收至少一个接入控制参数集。例如网络设备可在第一小区通过系统消息发送至少一个接入控制参数集,该系统消息例如为SIB1,或者也可以是其他系统消息,即,网络设备是将至少一个接入控制参数集放在一条消息中发送,当然,网络设备也可以将至少一个接入控制参数集放到不同的消息中发送,例如:每条消息发送一条接入控制参数集。那么UE就在第一小区接收该系统消息,从而获得至少一个接入控制参数集。接入控制参数集与接入类型对应,例如至少一个接入控制参数集中的每个接入控制参数集对应一种接入类型。而UE根据该UE发起接入的业务可以确定该UE对 应的接入类型,从而UE可以确定该UE对应的接入控制参数集。另外,一个接入控制参数集会有所适用的接入身份,而UE也会有该UE的接入身份,综上,一个UE根据该UE的接入类型能确定该UE对应的接入控制参数集,再根据该UE的接入身份能够确定该UE是否适用于该接入控制参数集,如果该UE适用于该接入控制参数集,则UE可以根据该接入控制参数集确定该UE是否允许接入该网络设备,或者说,确定该UE是否允许接入第一小区。
例如,网络设备通过一条消息来发送至少一个接入控制参数集,该消息的格式例如为:
Figure PCTCN2021108492-appb-000005
其中,accessCategory表示接入类型号,uac-barringInfoSetIndex就表示accessCategory所指示的接入类型号对应的接入控制参数集的索引。该消息接下来可以包括一个或多个接入控制参数集。例如一个接入控制参数集的格式如下:
Figure PCTCN2021108492-appb-000006
其中,UAC-BarringInfoSet会对应一个索引,该索引会写在UAC-BarringInfoSet之后,例如该索引为1或2等。即,该消息可以包括至少一个接入控制参数集,每个接入控制参数集都对应(或者说,包括)一个索引。从而一个UE根据该UE的业务,结合表2可以确定该UE的接入类型号,根据接入类型号可以确定该接入类型号对应的接入控制参数集的索引,再根据接入控制参数集的索引,就能从该消息所包括的至少一个接入控制参数集中确定该UE对应的接入控制参数集。
可以看到,一个接入控制参数集可以包括uac-BarringFactor、uac-BarringTime和uac-BarringForAccessIdentity这几个参数。uac-BarringFactor可以称为禁止因子,禁止因子的取值为一个概率值,例如40%或50%等,或表示为0.4或0.5。例如,UE在确定该UE对应的接入控制参数集后,在发起接入前生成一个随机数(rand),如果该随机数小于该禁止因子的取值,UE就允许接入该小区,而如果该随机数大于或等于该禁止因子的取值,UE就被禁止接入该小区。网络通过设置禁止因子就能控制接入的UE数量,例如网络可以将禁止因子的取值设置的较小,则UE生成的随机数小于该取值的可能性就很小,UE就不容易接入该小区,从而使得接入小区的UE的数量较少,以减轻网络的负载。uac-BarringTime可以称为禁止接入时间,uac-BarringTime的取值是一个时长。如果UE根据禁止因子确定UE被禁止接入该小区,UE可以启动定时器T390,T390的时长可以根据禁止接入时间的取值得到。在该时长内,UE不允许接入该小区(或者说,被禁止接入该小区),在该时长后,UE可以再次生成随机数,以再次根据禁止因子判断是否允许接入该小区。
本申请实施例所适用的UE例如为redcap UE,redcap UE和传统(legacy)UE都需要接收SIB1,legacy UE就是普通能力的UE,或者说不是能力受限的UE,或者说是除了redcap UE外的其他UE。SIB1的一种实现方式为,redcap UE和legacyUE对应的SIB1相同,在这种情况下,接入控制参数集可以不做改动,所述至少一个接入控制参数集对于redcap UE和legacy UE都适用。另外,一个接入控制参数集还可以包括一个参数,该参数为uac-BarringForAccessIdentity,uac-BarringForAccessIdentity可以指示该接入控制参数集所适用的接入身份,一个UE根据该UE的接入身份就能确定是否适用于该接入控制参数集。一个接入控制参数集所包括的uac-BarringForAccessIdentity可指示该接入控制参数集是否适用于接入身份1、2、11、12、13、14、15。uac-BarringForAccessIdentity可以通过比特地图(bitmap)的形式实现,例如uac-BarringForAccessIdentity包括的比特数为7,这7个比特分别对应接入身份1、2、11、12、13、14、15。如果这7个比特中的一个比特的取值为“1”,表明该接入控制参数集适用于该比特对应的接入身份,而如果这7个比特中的一个比特的取值为“0”,表明该接入控制参数集不适用该比特对应的接入身份。可以看到,uac-BarringForAccessIdentity不包括对应于接入身份0的比特。那么对于接入身份0的UE,如果确定uac-BarringForAccessIdentity不包括对应于接入身份0的比特,则该UE可以确定该UE能够适用于该接入控制参数集。通过这种方式可知,至少一个接入控制参数集对于接入身份0的UE均适用。
而本申请实施例中,会为UE分配第一类型的接入等级,第一类型的接入等级对应第一类型的接入身份。第一类型的接入等级例如包括接入等级0~接入等级9中的一个或多个,或者包括其他接入等级,例如:16、17、18、19、20、21、22、23、24、25,等等。第一类型的接入等级指的是高优先级用户所对应的接入等级之外的接入等级,高优先级用户对应的接入等级例如包括:11~15。例如认为,接入等级0~接入等级9为第一优先级的接入等级,接入等级11~接入等级15为第二优先级的接入等级,第二优先级高于第一优先级。第一类型的接入身份例如包括如下接入身份中的一个或多个:接入身份3~接入身份10,或,接入身份号大于或等于16的H个接入身份,H为正整数。例如H个接入身份包括接入身份16、接入身份17等。对于第一类型的接入等级以及第一类型的接入身份等将在后文介绍。如果不改动接入控制参数集,那么uac-BarringForAccessIdentity还是指示该接入控制参数集是否适用于接入身份1、2、11、12、13、14、15,对于所述第一类型的接入身份,uac-BarringForAccessIdentity可能是不指示的。那么,对于本申请实施例的UE来说,如果确定一个接入控制参数集的uac-BarringForAccessIdentity不包括对应于该UE的接入身份的比特,那么该UE可以确定该UE能够适用于该接入控制参数集。如果是这种情况,则至少一个接入控制参数集对于所述第一类型的接入身份的UE均适用。
或者,如果redcap UE和legacy UE对应的SIB1相同,则本申请实施例可以不改动接入控制参数集,或者说,不扩展接入控制参数集,但是可以改动SIB1,或者说扩展SIB1。例如,在同一个SIB1中,可以包括两类接入控制参数集,分别称为第一类接入控制参数集和第二类接入控制参数集。其中,第一类接入控制参数集适用于legacy UE,第一类接入控制参数集可以包括一个或多个接入控制参数集。则第一类接入控制参数集所包括的接入控制参数集与前文介绍的接入控制参数集是相同的,不多赘述。另外,本申请实施例会为UE分配第一类型的接入等级,第一类型的接入等级对应第一类型的接入身份,对于第一类型的接入等级以及第一类型的接入身份等将在后文介绍。那么,第二类接入控制参数集 可以适用于被分配了第一类型的接入等级的UE,则本申请实施例所述的至少一个接入控制参数集,是属于第二类接入控制参数集。在第二类接入控制参数集所包括的任一个接入控制参数集中,可以包括指示信息,该指示信息例如称为第五指示信息,第五指示信息可以指示该接入控制参数集对于所述第一类型的接入身份的适用情况。例如第五指示信息可以通过bitmap实现,则该bitmap可以包括N个比特,N为正整数,N个比特对应第一类型的接入身份,N的数量就等于第一类型的接入身份的数量,N个比特与第一类型的接入身份一一对应。那么对于第一类型的接入身份中的一个接入身份来说,如果第二类接入控制参数集中的一个接入控制参数集所包括的这N个比特中对应于该接入身份的比特的取值为“1”,表明该接入控制参数集适用于该接入身份,而如果N个比特中对应于该接入身份的比特的取值为“0”,表明该接入控制参数集不适用该接入身份。
或者,即使redcap UE和legacyUE对应的SIB1相同,本申请实施例也可以改动接入控制参数集,或者说,扩展接入控制参数集。例如,扩展uac-BarringForAccessIdentity包括的比特数,原本uac-BarringForAccessIdentity包括7个比特,本申请实施例使得uac-BarringForAccessIdentity包括7+N个比特,N为正整数,N个比特对应第一类型的接入身份。所述第一类型的接入身份的数量可以等于N,N个比特与第一类型的接入身份一一对应,N个比特里的一个比特就指示第一类型的接入身份中的一个接入身份。那么对于第一类型的接入身份中的任一个接入身份来说,如果N个比特中对应于该接入身份的比特的取值为“1”,表明该接入控制参数集适用于该接入身份,而如果N个比特中对应于该接入身份的比特的取值为“0”,表明该接入控制参数集不适用该接入身份。
或者,SIB1的另一种实现方式为,redcap UE和legacy UE对应的SIB1不同,即,网络设备对于redcap UE和legacy UE会分别发送不同的SIB1。在这种情况下,redcap UE可能无法识别legacy UE对应的SIB1,而legacy UE可能也无法识别redcap UE对应的SIB1,相当于,一个UE只能识别该UE对应的SIB1,则一个UE只需处理该UE能够识别的SIB1即可。如果redcap UE和legacy UE对应的SIB1不同,则本申请实施例可以继续对接入控制参数集不做改动,或者可选的,本申请实施例在这种情况下可以改动(或者说,扩展)接入控制参数集。改动方式有多种,下面举例介绍。
1、接入控制参数集的第一种改动方式。
例如,一个接入控制参数集可以包括第二指示信息,该接入控制参数集究竟适用于哪个或哪些接入身份,可以通过第二指示信息来指示,一个UE根据该UE的接入身份和第二指示信息就能确定该UE是否适用一个接入控制参数集。第二指示信息例如表示为uac-BarringForAccessIdentitybitmap,或者也可以表示为其他形式。可以理解为,这种方式是将接入控制参数集中原本包括的uac-BarringForAccessIdentity进行了扩展,得到了第二指示信息,或者理解为,这种方式是去掉了接入控制参数集中原本包括的uac-BarringForAccessIdentity,而在接入控制参数集中添加了第二指示信息。
第二指示信息可以指示一个接入控制参数集对于第一类型的接入身份的适用情况。可选的,第二指示信息还可以指示一个接入控制参数集对于其他接入身份的适用情况,其他接入身份是除了第一类型的接入身份外的其他的接入身份,例如接入身份11~15(也即:高优先级的用户所对应的接入身份)等。例如第二指示信息也可以通过bitmap的形式实现,该bitmap包括的比特数可以等于所要指示的接入身份的数量,例如要指示的第一类型的接入身份包括接入身份3~接入身份10,则该bitmap包括8比特。例如,如果这8个比特中 的一个比特的取值为“1”,表明该接入控制参数集适用于该比特对应的接入身份,而如果这8个比特中的一个比特的取值为“0”,表明该接入控制参数集不适用该比特对应的接入身份。例如,一个接入控制参数集包括的该bitmap为“00100110”,则表明该接入控制参数集适用于接入身份5、接入身份8和接入身份9,而不适用于接入身份3、接入身份4、接入身份6、接入身份7和接入身份10。
或者第二指示信息也可以通过其他方式实现。例如第二指示信息可以包括接入身份号,第二指示信息包括的接入身份号对应的接入身份适用于该接入控制参数集,而第二指示信息未包括的接入身份号对应的接入身份不适用该接入控制参数集。例如,一个接入控制参数集的第二指示信息包括接入身份号3和接入身份号5,而不包括其他的接入身份号,其中,接入身份号3对应于接入身份3,接入身份号5对应于接入身份5,那么表明该接入控制参数集适用于接入身份3和接入身份5,而不适用于其他的接入身份。
在接入控制参数集的第一种改动方式下,一个接入控制参数集除了包括第二指示信息外,还可以包括禁止因子和禁止接入时间这两个参数。关于这两个参数的介绍可参考前文,在接入控制参数集的第一种改动方式下,并未改动这两个参数。
这种改动方式相当于只是改变了接入控制参数集所包括的uac-BarringForAccessIdentity,对于接入控制参数集的改动较小,易于实现。
2、接入控制参数集的第二种改动方式。
在这种改动方式下,可以在一个接入控制参数集内包括多个子接入控制参数集,其中的每个子接入控制参数集可以分别有各自对应的接入身份。可以理解为,这种方式实际上是增加了接入控制参数集。例如,一个接入控制参数集可以包括第一子接入控制参数集和第二子接入控制参数集,以及包括第一子接入控制参数集对应的第三指示信息和第二子接入控制参数集对应的第四指示信息。第三指示信息指示第一子接入控制参数集所适用的接入身份,一个UE根据该UE的接入身份和第三指示信息就能确定该UE是否适用第一子接入控制参数集;第四指示信息指示第二子接入控制参数集所适用的接入身份,一个UE根据该UE的接入身份和第四指示信息就能确定该UE是否适用第二子接入控制参数集。
或者,在这种改动方式下,可以将接入控制参数集称为集合,而将子接入控制参数集称为接入控制参数集。例如,网络设备发送的是至少一个集合,至少一个集合中的一个集合可包括一个或多个接入控制参数集。例如至少一个集合包括第一集合,第一集合包括第一接入控制参数集和第二接入控制参数集,以及包括第一接入控制参数集对应的第三指示信息和第二接入控制参数集对应的第四指示信息。第三指示信息指示第一接入控制参数集所适用的接入身份,一个UE根据该UE的接入身份和第三指示信息就能确定该UE是否适用第一接入控制参数集;第四指示信息指示第二接入控制参数集所适用的接入身份。
第三指示信息或第四指示信息例如表示为uac-BarringForAccessIdentitybitmap,或者也可以表示为其他形式。
第三指示信息可以指示第一接入控制参数集对于M个接入身份的适用情况,M个接入身份属于所述第一类型的接入身份,例如M为正整数,且M小于或等于第一类型的接入身份的数量。例如第三指示信息也通过bitmap的形式实现,该bitmap包括的比特数可以等于所要指示的接入身份的数量,例如指示的第一类型的接入身份包括接入身份3~接入身份10,则该bitmap包括8比特。例如,如果这8个比特中的一个比特的取值为“1”,表明第一接入控制参数集适用于该比特对应的接入身份,而如果这8个比特中的一个比特的 取值为“0”,表明第一接入控制参数集不适用该比特对应的接入身份。
或者第三指示信息也可以通过其他方式实现,例如第三指示信息可以包括接入身份号,第三指示信息包括的接入身份号对应的接入身份适用于第一接入控制参数集,而第三指示信息未包括的接入身份号对应的接入身份不适用第一接入控制参数集。对此的示例可参考前文中对于第二指示信息包括接入身份号的示例。
第四指示信息的实现方式也与第三指示信息类似,不多赘述。
例如,第一集合的配置方式如下:
Figure PCTCN2021108492-appb-000007
可以看到,第一集合包括了两套参数,每套参数都包括uac-BarringFactor、uac-BarringTime和uac-BarringForAccessIdentity,其中的每套参数就表示一个接入控制参数集。
以第三指示信息和第四指示信息都指示对接入身份3~接入身份10的适用情况为例。例如,第一接入控制参数集包括的第三指示信息为“11000000”,第二子接入控制参数集包括的第四指示信息为“00100000”,则表明第一接入控制参数集适用于接入身份3和接入身份4,而不适用于接入身份5、接入身份6、接入身份7、接入身份8、接入身份9和接入身份10,第二接入控制参数集适用于接入身份5,而不适用于接入身份3、接入身份4、接入身份5、接入身份6、接入身份7、接入身份8、接入身份9和接入身份10。
在这种情况下,一个集合可包括一个或多个接入控制参数集,一个接入控制参数集除了包括指示信息(例如第三指示信息或第四指示信息)外,还可以包括禁止因子和禁止接入时间这两个参数。关于这两个参数的介绍可参考前文。不同的接入控制参数集都可以包括这两个参数,且不同的接入控制参数集所包括的这两个参数的取值可以相同,也可以不同。
这种改动方式相当于扩展了接入控制参数集的内容,虽然一个接入控制参数集(或者说,一个集合)对应于一个接入类型,但是在一个接入类型下,也可以提供适用于不同的接入身份的接入控制参数集,更有利于实现精细化的接入控制。
在前文已经有简单介绍,本申请实施例可以为UE分配第一类型的接入等级,例如可以为不同类型的UE分配不同的接入等级,为一个UE分配的接入等级可以是第一类型的接入等级,或者说是普通用户的接入等级。第一类型的接入等级例如包括接入等级0~接入等级9中的一个或多个,例如第一类型的接入等级包括接入等级0~接入等级9中的全部接 入等级,或者,接入等级0~接入等级9这10个接入等级中,可能目前只使用了一部分接入等级,而剩余的一部分接入等级未使用,那么本申请实施例中的第一类型的接入等级可以包括接入等级0~接入等级9中未被使用的接入等级,例如,目前使用了接入等级0~接入等级5,而接入等级6~接入等级9未使用,那么本申请实施例中的第一类型的接入等级可以包括接入等级6~接入等级9,即,本申请实施例中为一个UE分配接入等级时,可以分配接入等级6~接入等级9中的一个。或者,第一类型的接入等级还可以包括除了接入等级0~接入等级9之外的其他接入等级,或者,第一类型的接入等级也可以不包括接入等级0~接入等级9,而是包括其他接入等级,例如新定义一个或多个编号大于或等于16的接入等级作为第一类型的接入等级。在本申请实施例中,以第一类型的接入等级包括接入等级0~接入等级9为例。
在本申请实施例中,也可以将接入等级写入用户识别模块(subscriber identity module,SIM)卡中。由于本申请实施例中UE的接入等级不同于现有的UE的接入等级,或者说,本申请实施例中的接入等级与接入身份之间的对应关系与现有的对应关系不同,而目前UE的接入等级也是写入SIM卡中,因此如果将本申请实施例的接入等级写入SIM卡中,则需要与现有的SIM卡中写入的接入等级相区分。例如本申请实施例可以在SIM中新增文件,例如称为第一文件,或者称为扩展文件,在第一文件里写入本申请实施例所分配的接入等级。如果一个UE被分配的是本申请实施例所述的接入等级,那么该UE的接入等级就写在该UE内设置的SIM卡的第一文件内;而如果一个UE被分配的是原有的接入等级,那么该UE的接入等级就写在该UE内设置的SIM卡的原有文件(或者称为传统文件)内。对于一个UE来说,如果确定该UE的接入等级写在SIM卡的第一文件内,则该UE可以确定要使用本申请实施例提供的新的对应关系(即,接入等级与接入身份之间的对应关系)来确定该UE的接入身份;而如果UE确定该UE的接入等级写在SIM卡的原有文件内,则该UE可以确定要使用原有的对应关系(即,接入等级与接入身份之间的对应关系)来确定该UE的接入身份。
或者,也可以通过其他方式来使得一个UE明确该UE对应的是本申请实施例提供的新的接入等级还是原有的接入等级,例如,如果一个UE被分配的是本申请实施例提供的新的接入等级,则该UE的接入等级还是可以写入SIM卡的原有文件内,但是可以为该接入等级添加指示信息,例如称为第一信息,第一信息指示该接入等级为新定义的接入等级,而如果一个UE被分配的是原有的接入等级,就不会对应第一信息。那么UE如果确定该UE的接入等级对应有第一信息,就可以确定要使用本申请实施例提供的新的对应关系来确定该UE的接入身份;而如果UE如果确定该UE的接入等级未对应第一信息,则该UE可以确定要使用原有的对应关系来确定该UE的接入身份。
本申请实施例所适用的UE,或者说被分配第一类型的接入等级的UE,例如为redcap UE,而如果是legacy UE,可不被分配第一类型的接入等级,那么为legacy UE分配原有的接入等级即可,无需分配本申请实施例提供的第一类型的接入等级。从这种角度可以认为,第一类型的接入等级是用于分配给redcap UE的。在本申请实施例中,redcap UE又可以划分为多种不同的类型,从而可以为这些不同类型的UE分配不同的接入等级。或者,本申请实施例中被分配第一类型的接入等级UE还可以包括其他UE,例如还包括除了redcap UE外的其他能力受限的UE,或者还可以包括普通UE,或者称为legacyUE,即,能力不受限的UE。
在将UE划分为不同的类型时,可以按照不同的因素来划分。例如,划分因素可以包括如下一种或多种:UE支持的带宽,UE支持的天线数量,UE的应用场景,UE支持的最大数据传输速率(max data rate),或,UE支持的最大传输块大小(max rransport block size)。例如,按照UE支持的带宽将UE划分为不同的类型;或者,按照UE支持的天线数量将UE划分为不同的类型;或者,按照UE的应用场景将UE划分为不同的类型;或者,按照UE支持的最大数据传输速率将UE划分为不同的类型;或者,按照UE支持的最大传输块大小将UE划分为不同的类型;或者,按照UE支持的带宽以及支持的天线数量将UE划分为不同的类型;或者,按照UE的应用场景、UE支持的最大数据传输速率以及UE支持的最大传输块大小将UE划分为不同的类型,等等。其中,UE支持的天线数量例如为1T1R,或者为1T2R等,则支持1T1R的UE可以被划分为一种类型的UE,支持1T2R的UE被划分为另一种类型的UE。UE的应用场景也可以理解为UE的实现形式,例如UE为手环,则认为是一种应用场景,或者UE为传感器,则认为是另一种应用场景,或者UE为摄像头,则认为是又一种应用场景。
本申请实施例所述的第一类型的接入等级可以认为不同于现有的接入等级0~接入等级9,因为本申请实施例的第一类型的接入等级会对应第一类型的接入身份。具体的,究竟哪个接入等级与哪个接入身份对应,本申请实施例不做限制。例如在本申请实施例中,接入等级0和接入等级1对应于接入身份3,接入等级2对应于接入身份4,接入等级3对应于接入身份5,接入等级4对应于接入身份6,接入等级5对应于接入身份7,接入等级6对应于接入身份8,接入等级7和接入等级8对应于接入身份9,接入等级9对应于接入身份10。但这只是一种示例,具体的对应关系不限于此。
例如,按照UE所支持的带宽将UE划分为不同的类型,例如第一种类型的UE为支持5M带宽或10M带宽的redcap UE,第二种类型的UE为支持20M带宽的redcap UE。为第一种类型的redcap UE分配接入等级1,为第二种类型的redcap UE分配接入等级2。例如令接入等级1对应于接入身份3,接入等级2对应于接入身份4。
本申请实施例的第一类型的接入等级会对应第一类型的接入身份,而第一类型的接入身份可以分别适用于各自的接入控制参数,从而不同的UE能够适用于不同的接入控制参数,对这些终端设备进行接入控制时,可以使用不同的接入控制参数,以实现对于不同的终端设备分别进行接入控制,例如使得网络需要的终端设备,或者更需要接入网络的终端设备,能够实现优先接入网络,满足终端设备和网络的需求。
S22、UE根据该UE的接入身份,确定该UE适用至少一个接入控制参数集中的第一接入控制参数集。第一接入控制参数集可以属于第一集合,或者也可以不属于任意集合,而是一个整体。
UE根据该UE的接入身份,确定该UE适用至少一个接入控制参数集中的第一接入控制参数集,一种实现方式为,UE根据该UE的接入身份和接入类型,确定该UE适用至少一个接入控制参数集中的第一接入控制参数集。
例如,UE可以根据该UE的接入类型确定该UE对应至少一个接入控制参数集中的第一接入控制参数集,再根据该UE的接入身份,确定该UE是否适用第一接入控制参数集。
一个UE根据该UE发起接入的业务,可以在表2中确定该UE对应的接入类型号,也就是确定该UE的接入类型。而接入控制参数集与接入类型对应,例如至少一个接入控制参数集中的一个接入控制参数集对应一种接入类型,该对应关系是UE已知的。从而UE 可以确定该UE的接入类型所对应的接入控制参数集,例如为第一接入控制参数集。
本申请实施例中,UE的接入等级属于第一类型的接入等级,第一类型的接入等级对应第一类型的接入身份,UE根据该UE的接入等级就能确定该UE的接入身份。其中,UE可以在每次开机时通过读取SIM卡信息确定该UE的接入等级,并根据该UE的接入等级确定该UE的接入身份。而在开机后的运行过程中,UE无需再执行根据该UE的接入等级确定该UE的接入身份的操作。一个接入控制参数集可以通过相应的指示信息(例如第二指示信息、第三指示信息或第四指示信息等)指示该接入控制参数集所适用的接入身份,从而UE可以根据该UE的接入身份确定该UE是否适用于第一接入控制参数集。
或者,UE可以根据该UE的接入身份从至少一个接入控制参数集中确定该UE能够适用的P个接入控制参数集,再根据该UE的接入类型,从P个接入控制参数集中确定该UE对应的第一接入控制参数集,P为正整数。
或者,UE根据该UE的接入身份就可以确定该UE适用至少一个接入控制参数集中的第一接入控制参数集,而无需借助于接入类型。例如,UE根据该UE的接入身份从至少一个接入控制参数集中确定该UE能够适用的P个接入控制参数集,从而P个接入控制参数集就是所述第一接入控制参数集,即,在这种情况下,第一接入控制参数集包括P个接入控制参数集。
总之,本申请实施例对于UE究竟如何确定第一接入控制参数集不做限制。
S23、网络设备发送至少一个辅助参数集,相应的,UE接收来自网络设备的至少一个辅助参数集。例如,网络设备在第一小区发送至少一个辅助参数集,则UE在第一小区接收该至少一个辅助参数集。
网络设备可以通过系统消息发送至少一个辅助参数集,例如该系统消息为SIB1,如果本申请实施例对应的SIB1和现有的SIB1为同一个SIB1,则这种情况就视为网络设备将至少一个辅助参数集和至少一个接入控制参数集(或者说,至少一个集合)都放在SIB1中发送;或者,至少一个辅助参数集也可以通过其他消息单独发送,该消息例如为系统消息或其他广播消息,或者也可以是单播消息。
在本申请实施例中,为了更好地对不同类型的UE分别进行接入控制,还可以为不同类型的UE配置辅助参数集,从而通过辅助参数集进一步对不同类型的UE分别进行接入控制。例如,本申请实施例为一个或多个接入等级分别配置辅助参数集,或者,为一个或多个接入身份分别配置辅助参数集。例如,为一个或多个接入等级中的每个接入等级均配置辅助参数集,即,接入等级和辅助参数集可以是一一对应的关系;或者,为一个或多个接入等级统一配置一个辅助参数集,即,无论一个或多个接入等级的数量是多少,都只配置一个辅助参数集。又例如,为一个或多个接入等级中的每个接入身份均配置辅助参数集,即,接入身份和辅助参数集可以是一一对应的关系;或者,为一个或多个接入身份统一配置一个辅助参数集,即,无论一个或多个接入身份的数量是多少,都只配置一个辅助参数集。
至少一个辅助参数集中的一个辅助参数集,可以包括如下参数中的一种或多种:概率因子,时间因子,随机接入资源信息,或,第一阈值。例如,一个辅助参数集可以包括概率因子;或者,一个辅助参数集可以包括时间因子;或者,一个辅助参数集可以包括随机接入资源信息;或者,一个辅助参数集可以包括概率因子和时间因子;或者,一个辅助参数集可以包括概率因子、时间因子和随机接入资源信息;或者,一个辅助参数集可以包括 概率因子、时间因子、随机接入资源信息和第一阈值,等等。其中,所述随机接入资源信息也可以称为专用的随机接入资源信息,表明该随机接入资源信息专用于适用该辅助参数集的UE使用,其他UE不能使用。该辅助参数集例如为至少一个辅助参数集中的任意一个辅助参数集。
概率因子例如表示为UAC bar scale factor,或者表示为uac-BarringFactor-new,或者也可以有其他表示方式。概率因子可以用于调整接入控制参数集所包括的禁止因子。概率因子的取值可以大于0,另外,概率因子的取值可以小于1,或者也可以大于1。例如,一个UE的接入等级或接入身份被配置了辅助参数集,则该UE可使用该辅助参数集。如果该辅助参数集包括概率因子,那么UE使用该概率因子的方式是,根据该概率因子以及该UE对应的接入控制参数集包括的禁止因子得到一个取值,例如将该取值称为禁止接入概率,该禁止接入概率用于该UE确定是否允许接入当前的小区。UE根据该概率因子以及禁止因子得到禁止接入概率的一种方式为,将该概率因子与禁止因子相乘,得到禁止接入概率。例如将概率因子表示为X,将禁止接入概率表示为uac-BarringFactor-new,则,uac-BarringFactor-new=uac-BarringFactor×X。例如,该UE对应的接入控制参数集所包括的禁止因子为0.3,该UE的接入等级或接入身份对应的辅助参数集所包括的概率因子的取值为0.5,则该UE可以确定禁止接入概率为0.15,从而该UE可根据0.15来确定是否允许接入当前的小区。例如,UE可生成一个随机数,将该随机数与0.15比较,如果该随机数小于0.15,UE就允许接入当前的小区,而如果该随机数大于或等于0.15,UE就被禁止接入当前的小区。如果将一个辅助参数集包括的概率因子的取值设置为0,就相当于令该辅助参数集对应的接入等级或接入身份的UE禁止接入。
或者,UE根据概率因子以及禁止因子得到禁止接入概率的一种方式为,将该概率因子与禁止因子相加或相减,得到禁止接入概率。例如,uac-BarringFactor-new=uac-BarringFactor+X,或,uac-BarringFactor-new=|uac-BarringFactor-X|,之所以添加绝对值符号,是考虑到相减后可能出现负数的情况。UE在得到禁止接入概率后,对于禁止接入概率的使用方式与前文类似,不多赘述。
或者,UE还可以通过其他方式根据概率因子以及禁止因子得到禁止接入概率,对此不做限制。
时间因子例如可表示为UAC bar time factor,或者表示为uac-BarringTime-new,或者也可以有其他表示方式。时间因子的取值可以大于0,另外,时间因子的取值可以小于1,或者也可以大于1。例如,一个UE的接入等级或接入身份被配置了辅助参数集,则该UE可使用该辅助参数集。如果该辅助参数集包括时间因子,那么UE使用该时间因子的方式是,根据该时间因子以及该UE对应的接入控制参数集包括的禁止接入时间得到一个取值,该取值例如称为禁止时间,该禁止时间用于禁止UE接入当前的小区,或者说,在该禁止时间内,禁止UE接入当前的小区。UE根据该时间因子以及禁止接入时间得到禁止时间的一种方式为,将该时间因子与禁止接入时间的取值相乘,得到禁止时间。例如将时间因子表示为Y,将禁止时间表示为uac-BarringTime-new,则,(uac-BarringTime-new)=(uac-BarringTime)×Y。其中,括号里的内容表示的是一个参数,其中的“-”属于该参数的表示形式,而并不表示减号,后文也类似。例如,该UE对应的接入控制参数集所包括的禁止接入时间的取值为30秒(s),该UE的接入等级或接入身份对应的辅助参数集所包括的时间因子的取值为2,则该UE可以确定禁止时间为60s。例如该UE根据禁止接入概率确 定该UE被禁止接入当前的小区,那么UE可以启动定时器T390,且UE生成随机数,此时定时器T390的定时时长可以根据禁止时间和该随机数得到,例如定时器T390的定时时长=(0.7+0.6×rand)×禁止时间,rand表示该随机数。该UE在定时器T390超时前,禁止接入该小区,而在定时器T390超时时或超时后,UE可再次生成随机数,以再次根据禁止接入概率确定该UE是否允许接入该小区。
或者,UE根据时间因子以及禁止接入时间得到禁止时间的一种方式为,将该时间因子与禁止接入时间相加或相减,得到禁止时间。例如,(uac-BarringTime-new)=(uac-BarringTime)+Y,或,(uac-BarringTime-new)=|(uac-BarringTime)-Y|,之所以添加绝对值符号,是考虑到相减后可能出现负数的情况。UE在得到禁止时间后,对于禁止时间的使用方式与前文类似,不多赘述。
或者,UE还可以通过其他方式根据时间因子以及禁止接入时间得到禁止时间,对此不做限制。
如果一个UE的接入身份或接入等级被配置了辅助参数集,则该辅助参数集包括的随机接入资源信息就可用于该UE在当前的小区进行随机接入。例如随机接入资源信息可以指示随机接入信道(random access channel,RACH)时机(occasion),或指示随机接入前导(preamble)索引(index)集,或指示RACH occasion和preamble index集,或者还可以指示其他的随机接入资源。例如网络设备为一个辅助参数集配置了随机接入资源信息,那么如果网络设备在该随机接入资源信息上接收来自UE的随机接入请求(例如随机接入前导码(preamble)),则网络设备就可以确定该UE为适用于该辅助参数集的UE,在这种方式下,网络设备通过随机接入过程中的第一消息(Msg1)就能够确定该UE的身份。而如果没有为UE额外分配随机接入资源,那么网络设备可能通过随机接入过程中的第五消息(Msg5)才能确定UE的身份。因此对于网络设备来说,根据不同的随机接入资源信息可以区分不同类型的UE,例如网络设备在后续的随机接入过程中可以为不同类型的UE调度不同的资源,或者在随机接入成功后,网络设备可以为不同类型的UE调度不同的资源,从而进一步实现对不同类型的UE的差异化控制。
第一阈值是第一参数的阈值,第一参数可以指示UE的信号质量。例如第一参数为参考信号接收功率(reference signal receiving power,RSRP)、参考信号接收质量(reference signal receiving quality,RSRQ)或信号与干扰加噪声比(signal to interference plus noise ratio,SINR)等。通过设置第一阈值,可以使得UE确定是否要使用该UE的接入身份或接入等级对应的辅助参数集。例如,一个UE的接入身份或接入等级被配置了辅助参数集,且该辅助参数集包括第一阈值,该UE可以通过测量确定第一参数的取值,如果UE测量的第一参数的取值小于第一阈值,那么UE可以使用该辅助参数集,使用方式可参考前文的介绍。而如果UE测量得到的第一参数的取值大于或等于第一阈值,那么UE就可以不使用辅助参数集,例如UE使用该UE对应的接入控制参数集确定该UE是否允许接入当前的小区即可,如果该UE允许接入当前的小区,该UE也不必使用该辅助参数集所包括的随机接入资源信息指示的随机接入资源,而是可以使用其他的随机接入资源。对于信号较差的UE来说,如果大量接入网络,那么由于这些UE的信号质量较差,因此网络需要向这些UE分配较多的资源,才能使得这些UE能够实现通信。对于信号较好的UE,网络设备可能分配较少的资源就能使得这些UE达到较高的传输速率,而对于信号较差的UE,网络设备需要分配较多的资源才能使得这些UE达到一定的传输速率,这样会使得网络设备的 资源开销较大,降低网络设备的效率。因此本申请实施例通过设置第一阈值,可以使得辅助参数集供信号质量较差的用户使用,例如通过辅助参数集限制这些用户的接入(例如将概率因子设置的较小,或者设置的随机接入资源的信号质量较差,或随机接入资源较少等),由于信号较差的用户很难接入网络设备,则网络设备也无需为信号较差的用户分配资源,从而网络设备的资源可以尽量供信号较好的用户使用,提高了网络设备的效率。可见,通过这种方式,在实现对不同类型的UE分别进行接入控制的同时,还能实现对于不同信号质量的UE分别进行接入控制。
或者,至少一个辅助参数集也可以预定义,或者通过协议规定,那么无需网络设备发送。或者,也可以不配置辅助参数集。因此S23是可选的步骤,不是必须执行的。
S24、网络设备发送第一指示信息,相应的,UE接收来自网络设备的第一指示信息。其中,网络设备在S23中所发送的至少一个辅助参数集可包括第一指示信息所指示的全部辅助参数集。
网络设备可以通过系统消息发送第一指示信息,例如该系统消息为SIB1,如果本申请实施例对应的SIB1和现有的SIB1为同一个SIB1,则这种情况就视为网络设备将第一指示信息和至少一个接入控制参数集(或者说,至少一个集合)都放在SIB1中发送,而至少一个辅助参数集可能放在其他消息中发送;或者,如果至少一个辅助参数集也通过SIB1发送,则网络设备就是将第一指示信息、至少一个辅助参数集和至少一个接入控制参数集都放在SIB1中发送。或者,网络设备也可以将第一指示信息和至少一个辅助参数集放在一条消息中发送,该消息例如为除SIB1外的其他系统消息,或者为其他广播消息,或者为单播消息,而将至少一个接入控制参数集放在另一条消息中发送。或者,第一指示信息也可以通过除SIB1外的其他消息单独发送,该消息例如为系统消息或其他广播消息,或者也可以是单播消息。
网络设备究竟为哪个或哪些接入等级配置了辅助参数集,或者究竟为哪个或哪些接入身份配置了辅助参数集,网络设备需要告知UE。则网络设备可以发送第一指示信息,第一指示信息可以指示为一个或多个接入等级配置了辅助参数集,UE接收第一指示信息后,就能明确究竟为哪个或哪些接入等级配置了辅助参数集,从而UE根据该UE的接入等级能够确定该接入等级是否被配置了辅助参数集;或者,第一指示信息可以指示为一个或多个接入身份配置了辅助参数集,UE接收第一指示信息后,就能明确究竟为哪个或哪些接入身份配置了辅助参数集,从而UE根据该UE的接入身份能够确定该接入身份是否被配置了辅助参数集。
例如,第一指示信息可以通过比特地图(bitmap)实现,如果第一指示信息指示为一个或多个接入等级配置了辅助参数集,那么该bitmap包括的比特数可以等于需指示的接入等级的总数,例如这种情况下的第一指示信息可以表示为uac-accessclassbitmap。例如本申请实施例涉及的新的接入等级包括接入等级0~接入等级9,共10个接入等级,则该bitmap可以包括10个比特,这10个比特与10个接入等级一一对应。例如,如果该bitmap中的一个比特的取值为“1”,表明该比特对应的接入等级被配置了辅助参数集,如果该bitmap中的一个比特的取值为“0”,表明该比特对应的接入等级未被配置辅助参数集。例如该bitmap为“0101000000”,则表明,网络为接入等级1和接入等级3分别配置了辅助参数集,而没有为其他接入等级配置辅助参数集。例如网络设备将第一指示信息和至少一个辅助参数集放在一条消息中发送,该消息称为第一消息,第一消息例如为SIB1,或者也可以是其 他消息。则SIB1中可以包括bitmap和该bitmap所指示的辅助参数集。例如SIB中包括的bitmap为“0101000000”,则SIB1还包括接入等级1对应的辅助参数集,以及接入等级3对应的辅助参数集。
例如,网络设备为接入等级1和接入等级3分别配置了辅助参数集,例如为接入等级1配置了辅助参数集1,为接入等级2配置了辅助参数集2,这两个辅助参数集例如放在一条消息中发送,该消息配置这两个辅助参数集的方式例如为:
Figure PCTCN2021108492-appb-000008
其中,UAC Bar Scale Factor X1表示辅助参数集1包括的概率因子,UAC Bar Time Factor Y1表示辅助参数集1包括的时间因子,辅助参数集1包括的RACH资源包括专用的RACH occasion和专用的preamble index集合。UAC Bar Scale Factor X2表示辅助参数集2包括的概率因子,UAC Bar Time Factor Y2表示辅助参数集2包括的时间因子,辅助参数集2包括的RACH资源包括专用的RACH occasion和专用的preamble index集合。
或者,如果第一指示信息指示为一个或多个接入身份配置了辅助参数集,那么该bitmap包括的比特数可以等于需指示的接入身份的总数,例如这种情况下的第一指示信息可以表示为uac-accessidentitybitmap。例如本申请实施例涉及的第一类型的接入身份包括接入身份3~接入身份10,共8个接入等级,则该bitmap可以包括8个比特,这8个比特与8个接入身份一一对应。例如,如果该bitmap中的一个比特的取值为“1”,表明该比特对应的接入身份被配置了辅助参数集,如果该bitmap中的一个比特的取值为“0”,表明该比特对应的接入身份未被配置辅助参数集。例如该bitmap为“01010000”,则表明,网络为接入身份3和接入身份5分别配置了辅助参数集,而没有为其他接入身份配置辅助参数集。例如网络设备将第一指示信息和至少一个辅助参数集放在一条消息中发送,该消息称为第一消息,第一消息例如为SIB1,或者也可以是其他消息。则SIB1中可以包括bitmap和该bitmap所指示的辅助参数集。例如SIB中包括的bitmap为“01010000”,则SIB1还包括接入身份3对应的辅助参数集,以及接入身份5对应的辅助参数集。
当然,除了bitmap外,第一指示信息还可以通过其他方式实现。例如,第一指示信息 指示为一个或多个接入等级配置了辅助参数集,那么第一指示信息可以包括接入等级号(即,接入等级的编号,或者说是接入等级的ID),则包括在第一指示信息内的接入等级号所对应的接入等级就是被配置了辅助参数集的接入等级,而未包括在第一指示信息内的接入等级号所对应的接入等级就是未被配置辅助参数集的接入等级。又例如,第一指示信息指示为一个或多个接入身份配置了辅助参数集,那么第一指示信息可以包括接入身份号(即,接入身份的编号,或者说是接入身份的ID),则包括在第一指示信息内的接入身份号所对应的接入身份就是被配置了辅助参数集的接入身份,而未包括在第一指示信息内的接入身份号所对应的接入身份就是未被配置辅助参数集的接入身份。
或者,究竟为哪些接入等级或接入身份配置辅助参数集,也可以预定义,或者通过协议规定,那么无需网络设备通知。或者,也可以不为接入等级或接入身份配置辅助参数集。因此S24是可选的步骤,不是必须执行的。
S25、UE确定该UE对应第一辅助参数集。例如,UE根据第一指示信息,以及根据该UE的接入身份或接入等级,确定该UE对应第一辅助参数集。
UE接收第一指示信息后,可以确定第一指示信息指示的接入等级,如果该UE的接入等级是第一指示信息所指示的接入等级中的一个,则该UE可以确定该UE对应至少一个辅助参数集中的第一辅助参数集。或者,UE接收第一指示信息后,可以确定第一指示信息指示的接入身份,如果该UE的接入身份是第一指示信息所指示的接入身份中的一个,则该UE可以确定该UE对应至少一个辅助参数集中的第一辅助参数集。
而如果网络设备并未发送第一指示信息,例如究竟为哪些接入等级或接入身份配置辅助参数集是预定义的,或协议规定的,则UE根据该UE的接入身份或接入等级就可以确定该UE对应的辅助参数集,例如为第一辅助参数集。
如果没有为接入等级或接入身份配置辅助参数集,则UE也就无需确定该UE对应的辅助参数集,因此S25是可选的步骤。
S26、UE根据第一接入控制参数集,确定该UE是否允许接入第一小区,或者,UE根据第一接入控制参数集和第一辅助参数集,确定该UE是否允许接入第一小区。
如果UE未确定辅助参数集,例如该UE的接入身份或接入等级未被配置辅助参数集,或者网络设备没有为接入等级或接入身份额外配置辅助参数集(未执行S23、S24和S25),则UE根据第一接入控制参数集确定该UE是否允许接入第一小区。关于UE根据第一接入控制参数集确定该UE是否允许接入第一小区的方式,可参考前文在介绍接入控制参数集包括的参数时的相关介绍。
或者,如果UE还确定了第一辅助参数集,且第一辅助参数集包括第一阈值,且该UE测量的第一参数的取值大于或等于第一阈值,则UE依然根据第一接入控制参数集确定该UE是否允许接入第一小区。
或者,如果UE还确定了第一辅助参数集,且第一辅助参数集不包括第一阈值,或者第一辅助参数集包括第一阈值,且该UE测量的第一参数的取值小于第一阈值,则该UE可以根据第一辅助参数集和第一接入控制参数集来确定该UE是否允许接入第一小区。关于UE根据第一辅助参数集和第一接入控制参数集确定该UE是否允许接入第一小区的方式,可参考前文在介绍辅助参数集包括的参数时的相关介绍。
如果该UE允许接入第一小区,则UE可以在第一小区进行随机接入。如果UE是根据第一接入控制参数集确定该UE允许接入第一小区,则UE可以选择相应的随机接入资 源在第一小区进行随机接入。或者,如果UE是根据第一辅助参数集和第一接入控制参数集确定该UE允许接入第一小区,且第一辅助参数集包括随机接入资源信息,则该UE可以使用该随机接入资源信息所指示的随机接入资源在第一小区进行随机接入。
在本申请实施例中,为终端设备分配的接入等级为第一类型的接入等级,但是第一类型的接入等级会对应第一类型的接入身份,即,第一类型的接入等级可以对应新的接入身份,那么相应的,不同的接入等级(或者说,不同的接入身份)就会适用于不同的接入控制参数,从而对这些终端设备进行接入控制时,可以适用不同的接入控制参数,以实现对于不同的终端设备分别进行接入控制,从而实现粒度更细的差异化控制。例如使得网络需要的终端设备,或者更需要接入网络的终端设备,能够实现优先接入网络,满足终端设备和网络的需求。
接下来,本申请实施例提供第二种通信方法,请参见图3,为该方法的流程图。在下文的介绍过程中,以该方法应用于图1所示的网络架构为例。
为了便于介绍,在下文中,以该方法由网络设备和UE执行为例。因为本申请实施例是以应用在图1所示的网络架构为例。因此,下文所述的网络设备例如为图1所示的网络架构中的接入网设备,下文所述的UE可以是图1所示的网络架构中的UE。
S31、网络设备发送至少一个接入控制参数集,相应的,UE接收来自网络设备的至少一个接入控制参数集。例如,网络设备在第一小区发送至少一个接入控制参数集,那么UE可以在第一小区接收该至少一个接入控制参数集。第一小区是该UE即将发起随机接入的小区,或者说,UE希望在第一小区发起随机接入。
UE在接入该网络设备之前,可以接收至少一个接入控制参数集。例如网络设备可在第一小区通过系统消息发送至少一个接入控制参数集,该系统消息例如为SIB1,或者也可以是其他系统消息,那么UE就在第一小区接收该系统消息,从而获得至少一个接入控制参数集。接入控制参数集与接入类型对应,例如至少一个接入控制参数集中的每个接入控制参数集对应一种接入类型。而UE根据该UE发起接入的业务,结合表2,可以确定该UE的接入类型,从而UE可以确定该UE对应的接入控制参数集。另外,一个接入控制参数集会有所适用的接入身份,本申请实施例可以不为UE分配新的接入等级,则UE继续适用原有的接入等级,那么UE可以根据该UE的接入等级确定该UE的接入身份,综上,一个UE根据该UE的接入类型能确定该UE对应的接入控制参数集,再根据该UE的接入身份能够确定该UE是否适用于该接入控制参数集。如果该UE适用于该接入控制参数集,则UE可以根据该接入控制参数集确定该UE是否允许接入该网络设备,或者说,确定该UE是否允许接入第一小区。
或者,本申请实施例可以为UE分配新的接入等级,例如可以为不同类型的UE分配不同的接入等级,为一个UE分配的接入等级可以是第一类型的接入等级,或者说是普通用户的接入等级。关于第一类型的接入等级,可参考图2所示的实施例的相关描述。与图2所示的实施例不同的是,本申请实施例如果为UE分配了接入等级,可以不为这些接入等级配置对应的接入身份,即,本申请实施例中为UE分配的新的接入等级,不对应任何接入身份。则UE在根据该UE的接入类型确定一个接入控制参数集后,由于该UE的接入等级不对应任何接入身份,则UE会认为该UE能够适用该接入控制参数集。也就是说,如果本申请实施例为UE分配了新的接入等级,那么该UE能够适用于所述至少一个接入控制参数集。
本申请实施例所适用的UE,例如为redcap UE。或者,本申请实施例中参与分类的UE还可以包括其他UE,例如还包括除了redcap UE外的其他能力受限的UE,或者还可以包括普通UE,或者称为legacyUE,即,能力不受限的UE。
本申请实施例中,一个接入控制参数集可以包括禁止因子和禁止接入时间。关于这两个参数的介绍可参考图2所示的实施例的介绍。
S32、UE根据该UE的接入身份,确定该UE适用至少一个接入控制参数集中的第一接入控制参数集。
关于S32的更多内容,可参考图2所示的实施例中对于S22的介绍。
S33、网络设备发送辅助参数集,相应的,UE接收来自网络设备的辅助参数集。所述辅助参数集的数量可以是一个或多个。
网络设备可以通过系统消息发送辅助参数集,例如该系统消息为SIB1,也就是说,网络设备将辅助参数集和至少一个接入控制参数集都放在SIB1中发送;或者,辅助参数集也可以通过其他系统消息发送。或者网络设备也可以通过其他广播消息发送辅助参数集,或者网络设备还可以采用单播消息发送辅助参数集,以单独发送给相应的UE。
在本申请实施例中,网络设备可以发送一个或多个辅助参数集,这一个或多个辅助参数集可以适用于redcap UE。可以认为,为了更好地对redcap UE和legacy UE分别进行接入控制,可以为redcap UE配置辅助参数集,从而通过辅助参数集对redcap UE进行接入控制。通过辅助参数集,可以使得redcap UE更易于接入,或者也可以使得redcap UE不易接入。
一个辅助参数集可以包括如下参数中的一种或多种:概率因子,时间因子,随机接入资源信息,或,第一阈值。关于这些参数的介绍等内容,可参考图2所示的实施例。
或者,一个或多个辅助参数集也可以预定义,或者通过协议规定,那么无需网络设备发送。或者,本申请实施例也可以不配置辅助参数集,那么网络设备自然也无需发送辅助参数集。因此S33是可选的步骤,不是必须执行的。其中,如果不配置辅助参数集,那么UE根据已有的规则确定该UE是否允许接入第一小区即可。
S34、UE根据第一接入控制参数集,确定该UE是否允许接入第一小区,或者,UE根据第一接入控制参数集和第一辅助参数集,确定该UE是否允许接入第一小区。如果在S33中网络设备发送了多个辅助参数集,UE接收了多个辅助参数集,则第一辅助参数集可以是这多个辅助参数集中的一个;或者,如果在S33中网络设备发送了一个辅助参数集,UE接收了一个辅助参数集,则第一辅助参数集就是该辅助参数集。
本申请实施例可以为UE配置新的接入等级或接入身份,UE可根据新的接入等级或接入身份来确定该UE是否适用辅助参数集。或者,也可以不为UE配置新的接入等级,也不配置新的接入身份,UE可继续使用原有的接入等级和接入身份,在这种情况下,UE可以通过其他方式确定该UE是否适用辅助参数集。下面举例介绍UE确定是否适用辅助参数集的几种方式。
1、不为UE配置新的接入等级,也不配置新的接入身份。在这种情况下,UE可以采用下面几种方式中的一种来确定该UE是否适用辅助参数集。
例如,在一些UE中预配置第一信息,第一信息指示该UE适用辅助参数集。那么配置了第一信息的UE就适用辅助参数集,而未被配置第一信息的UE就不适用辅助参数集。例如本申请实施例为redcap UE预配置第一信息,或者也可以为其他类型的UE预配置第 一信息。
又例如,UE可以根据该UE的能力确定是否适用辅助参数集。例如,如果UE的能力低于第一能力,则该UE适用辅助参数集,否则该UE不适用辅助参数集。例如第一能力为带宽能力,该带宽能力为40M,那么如果UE只支持20M的带宽,该UE的能力就低于第一能力;又例如,第一能力为天线能力,该天线能力为2T4R,那么,如果UE支持的天线为1T1R或1T2R,则该UE的能力低于第一能力。
又例如,UE可以通过协议预定义(或者,在UE中预配置)等方式确定是否适用辅助参数集。例如协议规定,智能手环和智能手表适用辅助参数集,其他应用场景下的UE不适用辅助参数集。或者,协议规定,1T1R或1T2R均适用辅助参数集,支持其他天线数的UE不适用辅助参数集。或者,协议规定,20M带宽或40M均适用辅助参数集,支持其他带宽的UE不适用辅助参数集,等等。在这种方式中,UE根据协议或预配置的信息就能确定该UE是否适用辅助参数集。
再例如,UE可以根据该UE的应用场景,确定该UE是否适用辅助参数集。例如可以预定义适用于某些场景的UE能够适用辅助参数集,这些场景例如包括传感器、智能手环或智能手表等。那么如果UE确定该UE为传感器,则该UE能够适用辅助参数集,而如果该UE为移动终端,则该UE不适用辅助参数集。
又例如,UE可以根据UE的接入等级或接入身份(例如:原有的接入等级或原有的接入身份)确定UE适用的辅助参数集;又或者,UE先判断自身是否属于redcap UE的情况下,UE通过接入等级或接入身份确定其适用的辅助参数集。
在如上几种确定方式下,网络设备可以发送多个辅助参数集,辅助参数集与UE的接入等级对应,不同的接入等级对应不同的辅助参数集。从而UE根据该UE的接入等级就能选择对应的辅助参数集,例如一个UE确定第一辅助参数集是该UE的接入等级对应的辅助参数集。或者,网络设备可以发送一个辅助参数集,辅助参数集与UE的接入等级等信息无关,只要被配置了第一信息的UE,都适用同一个辅助参数集。或者,网络设备可以发送多个辅助参数集,辅助参数集与UE的接入身份对应,不同的接入身份对应不同的辅助参数集。从而UE根据该UE的接入身份就能选择对应的辅助参数集,例如一个UE确定第一辅助参数集是该UE的接入身份对应的辅助参数集。或者,网络设备可以发送一个辅助参数集,辅助参数集与UE的接入身份等信息无关,只要是能够适用辅助参数集的UE,都是适用同一个辅助参数集。另外,在如上几种情况下,对于同一个接入等级来说,可能又对应不同的接入类型,那么同一个接入等级对应的不同的接入类型可以适用同一个辅助参数集,或者也可以适用不同的辅助参数集。或者,对于同一个接入身份来说,可能又对应不同的接入类型,那么同一个接入身份对应的不同的接入类型可以适用同一个辅助参数集,或者也可以适用不同的辅助参数集。
2、为UE配置新的接入等级,或配置新的接入身份。在这种情况下,UE可以采用下面几种方式中的一种来确定该UE是否适用辅助参数集。
例如,本申请实施例可以为UE配置新的接入等级,那么UE可以根据接入等级确定该UE是否适用辅助参数集。例如本申请实施例为UE配置第一类型的接入等级,第一类型的接入等级不显式指示接入身份。关于第一类型的接入等级的介绍,可参考图2所示的实施例的相关内容。例如,UE的新的接入等级信息可以配置在该UE的SIM卡中,则UE根据该UE的SIM卡配置信息所包括的接入等级信息就能确定该UE是否适用辅助参数集。 例如,一个UE根据该UE的SIM卡配置信息所包括的接入等级信息确定该UE的接入等级是第一类型的接入等级,则该UE确定该UE适用辅助参数集,否则,确定该UE不适用辅助参数集。或者,UE的新的接入等级信息也可以不配置在SIM卡中,则UE可以通过其他方式确定该UE的接入等级。例如,可以通过协议预定义(或者,在UE中预配置)等方式规定第一类型的接入等级与应用场景之间的对应关系,例如规定,智能手环和智能手表对应接入等级0,智能手机对应接入等级1,等等。或者,可以通过协议预定义(或者,在UE中预配置)等方式规定第一类型的接入身份与UE支持的天线数之间的对应关系,例如规定,1T1R对应接入等级0,1T2R对应接入等级1,等等。或者,可以通过协议预定义(或者,在UE中预配置)等方式规定第一类型的接入等级与UE的带宽之间的对应关系,例如规定,20M对应接入等级0,40M对应接入等级1,等等。在如上几种方式中,UE根据协议或预配置的信息就能确定该UE对应的新的接入等级。
在这种情况下,网络设备可以发送多个辅助参数集,辅助参数集与第一类型的接入等级对应,在第一类型的接入等级中,不同的接入等级对应不同的辅助参数集。从而,如果一个UE被配置了第一类型的接入等级,则UE根据该UE的接入等级就能选择对应的辅助参数集,例如一个UE确定第一辅助参数集是该UE的接入等级对应的辅助参数集。或者,网络设备可以发送一个辅助参数集,辅助参数集与UE的具体接入等级等信息无关,只要被配置了第一类型的接入等级的UE,都适用同一个辅助参数集。另外,在这种情况下,对于同一个接入等级来说,可能又对应不同的接入类型,那么同一个接入等级对应的不同的接入类型可以适用同一个辅助参数集,或者也可以适用不同的辅助参数集,此特征对于图2所示的实施例也同样适用。
又例如,本申请实施例可以为UE配置新的接入身份,那么UE可以根据接入身份确定该UE是否适用辅助参数集。例如本申请实施例为UE配置第一类型的接入身份,第一类型的接入身份可以不对应任何接入等级,当然也可以对应接入等级,本发明实施例不作限制。关于第一类型的接入身份究竟包括哪些接入身份,可参考图2所示的实施例的相关介绍。例如,UE的新的接入身份信息可以配置在该UE的SIM卡中,则UE根据该UE的SIM卡配置信息所包括的接入身份信息就能确定该UE是否适用辅助参数集。例如,一个UE根据该UE的SIM卡配置信息所包括的接入身份信息确定该UE的接入身份为第一类型的接入身份,则该UE确定该UE适用辅助参数集,否则,该UE确定该UE不适用辅助参数集。或者,UE的新的接入身份信息也可以不配置在SIM卡中,则UE可以通过其他方式确定该UE的接入身份。例如,可以通过协议预定义(或者,在UE中预配置)等方式规定第一类型的接入身份与应用场景之间的对应关系,例如规定,智能手环和智能手表对应接入身份3,智能手机对应接入身份4,等等。或者,可以通过协议预定义(或者,在UE中预配置)等方式规定第一类型的接入身份与UE支持的天线数之间的对应关系,例如规定,1T1R对应接入身份3,1T2R对应接入身份4,等等。或者,可以通过协议预定义(或者,在UE中预配置)等方式规定第一类型的接入身份与UE的带宽之间的对应关系,例如规定,20M对应接入身份3,40M对应接入身份4,等等。在如上几种方式中,UE根据协议或预配置的信息就能确定该UE对应的新的接入身份。
在这种情况下,网络设备可以发送多个辅助参数集,辅助参数集与第一类型的接入身份对应,在第一类型的接入身份中,不同的接入身份对应不同的辅助参数集。从而,如果一个UE被配置了第一类型的接入身份,则UE根据该UE的接入身份就能选择对应的辅 助参数集,例如一个UE确定第一辅助参数集是该UE的接入身份对应的辅助参数集。或者,网络设备可以发送一个辅助参数集,辅助参数集可以与UE的具体接入身份等信息无关,只要被配置了第一类型的接入身份的UE,都适用同一个辅助参数集。另外,在这种情况下,对于同一个接入身份来说,可能又对应不同的接入类型,那么同一个接入身份对应的不同的接入类型可以适用同一个辅助参数集,或者也可以适用不同的辅助参数集,此特征对于图2所示的实施例也同样适用。
或者,UE还可以通过其他方式确定该UE是否适用辅助参数集,对于具体的方式不做限制。
那么,例如该UE适用第一辅助参数集,则该UE可以根据第一辅助参数集和第一接入控制参数集来确定该UE是否允许接入第一小区。而如果该UE不适用第一辅助参数集,例如该UE是legacy UE,则该UE可以根据第一接入控制参数集来确定该UE是否允许接入第一小区,而无需使用辅助参数集。辅助参数集包括的内容可参考图2所示的实施例的介绍,而对于UE结合辅助参数集和接入控制参数集来确定该UE是否允许接入一个小区的方式,也可以参考图2所示的实施例的介绍。
在本申请实施例中,可以为某些UE配置辅助参数集,例如为redcap UE配置辅助参数集,使得redcap UE可以应用辅助参数集确定是否允许接入小区,实现了对于redcap UE和legacy UE分别进行接入控制,使得控制粒度更细。
下面结合附图介绍本申请实施例中用来实现上述方法的装置。因此,上文中的内容均可以用于后续实施例中,重复的内容不再赘述。
图4为本申请实施例提供的通信装置400的示意性框图。示例性地,通信装置400例如为终端设备,或者为网络设备。示例性地,通信装置400能够实现图2所示的实施例或图3所示的实施例所述的终端设备的功能。或者,通信装置400能够实现图2所示的实施例或图3所示的实施例所述的网络设备的功能。
通信装置400包括收发单元420和处理单元410。可选地,通信装置400还可以包括存储单元,存储单元能够与处理单元410通信,在图4中并未表示出来。或者,通信装置400也可以不包括存储单元,存储单元也可以位于通信装置400外部。示例性地,通信装置400可以是终端设备,也可以是应用于终端设备中的芯片或者其他具有上述终端设备功能的组合器件、部件等,或者,通信装置400可以是网络设备,也可以是应用于网络设备中的芯片或者其他具有上述网络设备功能的组合器件、部件等。当通信装置400是终端设备或网络设备时,处理单元410可以包括处理器,例如基带处理器,基带处理器中可以包括一个或多个中央处理单元(central processing unit,CPU);收发单元420可以是收发器,收发器可以包括天线和射频电路等。其中,收发器可包括发射器和接收器,收发器可实现发射器和接收器的功能,或者,发射器和接收器也可以是单独部署的两个功能模块,只是本申请实施例将这两个功能模块统称为收发器。当通信装置400是具有上述终端设备或网络设备功能的部件时,收发单元420可以是射频单元,处理单元410可以是处理器,例如基带处理器。当通信装置400是芯片系统时,收发单元420可以是芯片(例如基带芯片)的输入输出接口、处理单元410可以是芯片系统的处理器,可以包括一个或多个中央处理单元。应理解,本申请实施例中的处理单元410可以由处理器或处理器相关电路组件实现,收发单元420可以由收发器或收发器相关电路组件实现。
在一种实施方式中,当通信装置400用于实现图2所示的实施例所述的终端设备的功 能时,处理单元410可以用于执行图2所示的实施例中由终端设备所执行的除了收发操作之外的全部操作,例如S22、S25和S26,和/或用于支持本文所描述的技术的其它过程。收发单元420可以用于执行图2所示的实施例中由终端设备所执行的全部接收操作和发送操作,例如S21、S23和S24,和/或用于支持本文所描述的技术的其它过程。
在一种实施方式中,当通信装置400用于实现图3所示的实施例所述的终端设备的功能时,处理单元410可以用于执行图3所示的实施例中由终端设备所执行的除了收发操作之外的全部操作,例如S32和S34,和/或用于支持本文所描述的技术的其它过程。收发单元420可以用于执行图3所示的实施例中由终端设备所执行的全部接收操作和发送操作,例如S31和S33,和/或用于支持本文所描述的技术的其它过程。
在一种实施方式中,当通信装置400用于实现图2所示的实施例所述的网络设备的功能时,处理单元410可以用于执行图2所示的实施例中由网络设备所执行的除了收发操作之外的全部操作,例如确定至少一个辅助参数集的操作,和/或用于支持本文所描述的技术的其它过程。收发单元420可以用于执行图2所示的实施例中由网络设备所执行的全部接收操作和发送操作,例如S21、S23和S24,和/或用于支持本文所描述的技术的其它过程。
在一种实施方式中,当通信装置400用于实现图3所示的实施例所述的网络设备的功能时,处理单元410可以用于执行图3所示的实施例中由网络设备所执行的除了收发操作之外的全部操作,例如确定辅助参数集的操作,和/或用于支持本文所描述的技术的其它过程。收发单元420可以用于执行图3所示的实施例中由网络设备所执行的全部接收操作和发送操作,例如S31和S33,和/或用于支持本文所描述的技术的其它过程。
另外,收发单元420可以是一个功能模块,该功能模块既能完成发送操作也能完成接收操作,例如收发单元420可以用于执行图2所示的实施例或图3所示的实施例中由终端设备或网络设备所执行的全部发送操作和接收操作。例如,在执行接收操作时,可以认为收发单元420是接收单元,而在执行发送操作时,可以认为收发单元420是发送单元。或者,收发单元420也可以是两个功能模块,收发单元420可以视为这两个功能模块的统称,这两个功能模块包括接收单元和发送单元,发送单元用于完成发送操作,例如收发单元420可以用于执行图2所示的实施例或图3所示的实施例中由终端设备或网络设备所执行的全部发送操作;接收单元用于完成接收操作,例如接收单元可以用于执行图2所示的实施例或图3所示的实施例中由终端设备或网络设备所执行的全部接收操作。
关于处理单元410和收发单元420所具体能够实现的功能,可参考图2所示的实施例或图3所示的实施例中对于终端设备所执行的操作的介绍,或者参考图2所示的实施例或图3所示的实施例中对于网络设备所执行的操作的介绍,不多赘述。
本申请实施例还提供一种通信装置,该通信装置可以是终端设备也可以是电路。该通信装置可以用于执行上述各个方法实施例中由终端设备所执行的动作。
当该通信装置为终端设备时,图5示出了一种简化的终端设备的结构示意图。便于理解和图示方便,图5中,终端设备以手机作为例子。如图5所示,终端设备包括处理器、存储器、射频电路、天线以及输入输出装置。处理器主要用于对通信协议以及通信数据进行处理,以及对终端设备进行控制,执行软件程序,处理软件程序的数据等。存储器主要用于存储软件程序和数据。射频电路主要用于基带信号与射频信号的转换以及对射频信号的处理。天线主要用于收发电磁波形式的射频信号。输入输出装置,例如触摸屏、显示屏,键盘等主要用于接收用户输入的数据以及对用户输出数据。需要说明的是,有些种类的终 端设备可以不具有输入输出装置。
当需要发送数据时,处理器对待发送的数据进行基带处理后,输出基带信号至射频电路,射频电路将基带信号进行射频处理后将射频信号通过天线以电磁波的形式向外发送。当有数据发送到终端设备时,射频电路通过天线接收到射频信号,将射频信号转换为基带信号,并将基带信号输出至处理器,处理器将基带信号转换为数据并对该数据进行处理。为便于说明,图5中仅示出了一个存储器和处理器。在实际的终端设备产品中,可以存在一个或多个处理器和一个或多个存储器。存储器也可以称为存储介质或者存储设备等。存储器可以是独立于处理器设置,也可以是与处理器集成在一起,本申请实施例对此不做限制。
在本申请实施例中,可以将具有收发功能的天线和射频电路视为终端设备的收发单元(收发单元可以是一个功能单元,该功能单元能够实现发送功能和接收功能;或者,收发单元也可以包括两个功能单元,分别为能够实现接收功能的接收单元和能够实现发送功能的发送单元),将具有处理功能的处理器视为终端设备的处理单元。如图5所示,终端设备包括收发单元510和处理单元520。收发单元也可以称为收发器、收发机、收发装置等。处理单元也可以称为处理器,处理单板,处理模块、处理装置等。可选的,可以将收发单元510中用于实现接收功能的器件视为接收单元,将收发单元510中用于实现发送功能的器件视为发送单元,即收发单元510包括接收单元和发送单元。收发单元有时也可以称为收发机、收发器、或收发电路等。接收单元有时也可以称为接收机、接收器、或接收电路等。发送单元有时也可以称为发射机、发射器或者发射电路等。
应理解,收发单元510用于执行上述图2所示的实施例或图3所示的实施例中终端设备侧的发送操作和接收操作,处理单元520用于执行上述图2所示的实施例或图3所示的实施例中终端设备侧除了收发操作之外的其他操作。
当该通信装置为芯片类的装置或者电路时,该装置可以包括收发单元和处理单元。其中,所述收发单元可以是输入输出电路和/或通信接口;处理单元为集成的处理器或者微处理器或者集成电路。
本申请实施例提供第一通信系统。该通信系统可以包括上述的图2所示的实施例所涉及的终端设备,以及包括上述的图2所示的实施例所涉及的网络设备。终端设备或网络设备例如通过图4中的通信装置400实现。
本申请实施例提供第二通信系统。该通信系统可以包括上述的图3所示的实施例所涉及的终端设备,以及包括上述的图3所示的实施例所涉及的网络设备。终端设备或网络设备例如通过图4中的通信装置400实现。
应理解,本申请实施例中提及的处理器可以是CPU,还可以是其他通用处理器、数字信号处理器(digital signal processor,DSP)、专用集成电路(application specific integrated circuit,ASIC)、现成可编程门阵列(field programmable gate array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件等。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。
需要说明的是,当处理器为通用处理器、DSP、ASIC、FPGA或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件时,存储器(存储模块)集成在处理器中。
应注意,本文描述的存储器旨在包括但不限于这些和任意其它适合类型的存储器。
应理解,在本申请的各种实施例中,上述各过程的序号的大小并不意味着执行顺序的 先后,各过程的执行顺序应以其功能和内在逻辑确定,而不应对本申请实施例的实施过程构成任何限定。
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
在本申请所提供的几个实施例中,应该理解到,所揭露的系统、装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。
所述功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的计算机可读存储介质,可以是计算机能够存取的任何可用介质。以此为例但不限于:计算机可读介质可以包括随机存取存储器(random access memory,RAM)、只读存储器(read-only memory,ROM)、可编程只读存储器(programmable ROM,PROM)、可擦除可编程只读存储器(erasable PROM,EPROM)、电可擦可编程只读存储器(electrically erasable programmable read only memory,EEPROM)、紧凑型光盘只读存储器(compact disc read-only memory,CD-ROM)、通用串行总线闪存盘(universal serial bus flash disk)、移动硬盘、或其他光盘存储、磁盘存储介质或者其他磁存储设备、或者能够用于携带或存储具有指令或数据结构形式的期望的程序代码并能够由计算机存取的任何其他介质。另外,通过示例性但不是限制性说明,许多形式的RAM可用,例如静态随机存取存储器(static RAM,SRAM)、动态随机存取存储器(dynamic RAM,DRAM)、同步动态随机存取存储器(synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(double data rate SDRAM,DDR SDRAM)、增强型同步动态随机存取存储器(enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(synchlink DRAM,SLDRAM)或直接内存总线随机存取存储器(direct rambus RAM,DR RAM)。
以上所述,仅为本申请的具体实施方式,但本申请实施例的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请实施例揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请实施例的保护范围之内。因此,本申请实施例的保护范围应所述以 权利要求的保护范围为准。

Claims (26)

  1. 一种通信方法,其特征在于,包括:
    根据终端设备的接入身份,确定所述终端设备适用第一接入控制参数集;其中,所述终端设备的接入身份基于所述终端设备的接入等级确定,所述终端设备的接入等级为接入等级0至接入等级9中的一个,接入等级0至接入等级9对应如下接入身份中的一个或多个:接入身份3~接入身份10,或,接入身份号大于或等于16的H个接入身份,H为正整数;
    根据所述第一接入控制参数集确定所述终端设备是否允许接入第一小区,所述第一小区是所述终端设备接收所述第一接入控制参数集的小区。
  2. 根据权利要求1所述的方法,其特征在于,根据终端设备的接入类型和接入身份,确定所述终端设备适用第一接入控制参数集,包括:
    根据所述终端设备的接入类型和接入身份,确定所述终端设备适用第一接入控制参数集。
  3. 根据权利要求1或2所述的方法,其特征在于,所述第一终端设备属于第一类型,同一类型的终端设备的接入等级相同;其中,不同类型的终端设备满足如下一项或多项:
    不同类型的终端设备所支持的带宽不同;
    不同类型的终端设备所支持的天线数量不同;
    不同类型的终端设备的应用场景不同;
    不同类型的终端设备所支持的最大数据传输速率不同;或,
    不同类型的终端设备所支持的最大传输块大小不同。
  4. 根据权利要求1~3任一项所述的方法,其特征在于,所述方法还包括:
    接收第一消息,所述第一消息包括第一指示信息和至少一个辅助参数集,所述第一指示信息用于指示为一个或多个接入等级配置了辅助参数集,或指示为一个或多个接入身份配置了辅助参数集,所述至少一个辅助参数集包括所述第一指示信息所指示的全部辅助参数集;
    根据所述第一指示信息确定所述终端设备对应于所述至少一个辅助参数集中的第一辅助参数集。
  5. 根据权利要求1~3任一项所述的方法,其特征在于,所述方法还包括:
    接收第一指示信息,所述第一指示信息用于指示为一个或多个接入等级配置了辅助参数集,或指示为一个或多个接入身份配置了辅助参数集;
    根据所述第一指示信息确定所述终端设备对应第一辅助参数集。
  6. 根据权利要求4或5所述的方法,其特征在于,
    所述第一指示信息用于指示为所述一个或多个接入等级中的每个接入等级配置了辅助参数集;或,
    所述第一指示信息用于指示为所述一个或多个接入身份中的每个接入身份配置了辅助参数集;或,
    所述第一指示信息用于指示为一个或多个接入等级配置了一个辅助参数集;或,
    所述第一指示信息用于指示为一个或多个接入身份配置了一个辅助参数集。
  7. 根据权利要求4~6任一项所述的方法,其特征在于,根据所述第一接入控制参数集 确定所述终端设备是否允许接入第一小区,包括:
    根据所述第一接入控制参数集合和所述第一辅助参数集,确定所述终端设备是否允许接入第一小区。
  8. 根据权利要求4~7任一项所述的方法,其特征在于,所述第一辅助参数集包括如下参数中的一个或多个:
    概率因子,所述概率因子用于调整禁止因子,所述禁止因子包括在所述第一接入控制参数集内;
    时间因子,所述时间因子用于调整禁止接入时间,所述禁止接入时间包括在所述第一接入控制参数集内;
    专用的随机接入资源信息;
    第一阈值,所述第一阈值为第一参数的阈值,所述第一参数用于指示所述终端设备的信号质量。
  9. 根据权利要求8所述的方法,其特征在于,所述方法还包括:
    确定测量的所述第一参数的取值小于所述第一阈值,则使用所述第一辅助参数集。
  10. 根据权利要求5~9任一项所述的方法,其特征在于,所述方法还包括:
    接收至少一个辅助参数集,所述至少一个辅助参数集包括所述第一指示信息所指示的全部辅助参数集,且所述至少一个辅助参数集包括所述第一辅助参数集。
  11. 根据权利要求1~10任一项所述的方法,其特征在于,所述第一接入控制参数集包括第二指示信息,所述第二指示信息用于指示所述第一接入控制参数所适用的接入身份。
  12. 根据权利要求1~10任一项所述的方法,其特征在于,所述第一接入控制参数集属于第一集合,所述第一集合还包括第二接入控制参数集,以及,所述第一集合还包括所述第一接入控制参数集对应的第三指示信息和所述第二接入控制参数集对应的第四指示信息,所述第三指示信息用于指示所述第一接入控制参数集所适用的接入身份,所述第四指示信息用于指示所述第二接入控制参数集所适用的接入身份。
  13. 根据权利要求1~12任一项所述的方法,其特征在于,所述终端设备的接入等级属于第一类型的接入等级,所述第一类型的接入等级用于配置给能力降低redcap终端设备。
  14. 一种通信方法,其特征在于,包括:
    确定至少一个接入控制参数集,所述至少一个接入控制参数集用于终端设备确定是否允许接入第一小区,其中,所述终端设备的接入身份基于所述终端设备的接入等级确定,所述终端设备的接入等级为接入等级0至接入等级9中的一个,接入等级0至接入等级9对应如下接入身份中的一个或多个:接入身份3~接入身份10,或,接入身份号大于或等于16的H个接入身份,H为正整数;
    发送所述至少一个接入控制参数集。
  15. 根据权利要求14所述的方法,其特征在于,所述方法还包括:
    发送第一消息,所述第一消息包括第一指示信息和至少一个辅助参数集,所述第一指示信息用于指示为一个或多个接入等级配置了辅助参数集,或指示为一个或多个接入身份配置了辅助参数集,所述至少一个辅助参数集包括所述第一指示信息所指示的全部辅助参数集。
  16. 根据权利要求14所述的方法,其特征在于,所述方法还包括:
    发送第一指示信息,所述第一指示信息用于指示为一个或多个接入等级配置了辅助参 数集,或指示为一个或多个接入身份配置了辅助参数集。
  17. 一种通信方法,其特征在于,包括:
    接收至少一个接入控制参数集以及辅助参数集;
    根据终端设备的接入身份确定所述终端设备对应于所述至少一个接入控制参数集中的所述第一接入控制参数集;
    根据所述第一接入控制参数集和所述辅助参数集,确定所述终端设备是否允许接入第一小区。
  18. 根据权利要求17所述的方法,其特征在于,所述辅助参数集包括如下参数中的一个或多个:
    概率因子,所述概率因子用于调整禁止因子,所述禁止因子包括在所述第一接入控制参数集内;
    时间因子,所述时间因子用于调整禁止接入时间,所述禁止接入时间包括在所述第一接入控制参数集内;
    专用的随机接入资源信息;
    第一阈值,所述第一阈值为第一参数的阈值,所述第一参数用于指示所述终端设备的信号质量。
  19. 根据权利要求18所述的方法,其特征在于,所述方法还包括:
    确定测量的所述第一参数的取值小于所述第一阈值,则使用所述辅助参数集。
  20. 根据权利要求17~19任一项所述的方法,其特征在于,所述终端设备的接入身份为接入身份3~接入身份10中的一个,或为接入身份号大于或等于16的H个接入身份中的一个,H为正整数。
  21. 根据权利要求17~20任一项所述的方法,其特征在于,所述方法还包括:
    根据所述终端设备的能力信息,确定所述终端设备适用所述辅助参数集;或,
    根据所述终端设备的接入等级,确定所述终端设备适用所述辅助参数集,所述终端设备的接入等级为第一类型的接入等级,其中,在所述第一类型的接入等级中,不同的接入等级对应所述辅助参数集中的相同的辅助参数集或不同的辅助参数集;或,
    根据所述终端设备的接入身份,确定所述终端设备适用所述辅助参数集,所述终端设备的接入身份为第一类型的接入身份,其中,在所述第一类型的接入身份中,不同的接入身份对应所述辅助参数集中的相同的辅助参数集或不同的辅助参数集,所述第一类型的接入身份包括如下一个或多个:接入身份3~接入身份10,或,接入身份号大于或等于16的H个接入身份,H为正整数。
  22. 一种通信方法,其特征在于,包括:
    确定至少一个接入控制参数集和辅助参数集,所述至少一个接入控制参数集和所述辅助参数集用于终端设备确定是否允许接入第一小区;
    发送所述至少一个接入控制参数集和所述辅助参数集。
  23. 一种终端设备,其特征在于,包括:
    一个或多个处理器;
    一个或多个存储器;
    以及一个或多个计算机程序,其中所述一个或多个计算机程序被存储在所述一个或多个存储器中,所述一个或多个计算机程序包括指令,当所述指令被所述终端设备的一个或 多个处理器执行时,使得所述终端设备执行如权利要求1~13中任一项任一所述的方法,或使得所述终端设备执行如权利要求17~21中任一项任一所述的方法。
  24. 一种网络设备,其特征在于,包括:
    一个或多个处理器;
    一个或多个存储器;
    以及一个或多个计算机程序,其中所述一个或多个计算机程序被存储在所述一个或多个存储器中,所述一个或多个计算机程序包括指令,当所述指令被所述网络设备的一个或多个处理器执行时,使得所述网络设备执行如权利要求14~16中任一所述的方法,或使得所述网络设备执行如权利要求22所述的方法。
  25. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质用于存储计算机程序,当所述计算机程序在计算机上运行时,使得所述计算机执行如权利要求1~13中任意一项所述的方法,或者使得所述计算机执行如权利要求14~16中任意一项所述的方法,或者使得所述计算机执行如权利要求17~21中任意一项所述的方法,或者使得所述计算机执行如权利要求22所述的方法。
  26. 一种芯片,其特征在于,包括一个或多个处理器和通信接口,所述一个或多个处理器用于读取指令,以执行权利要求1~13中任意一项所述的方法,或者执行权利要求14~16中任意一项所述的方法,或者执行权利要求17~21中任意一项所述的方法,或者执行权利要求22所述的方法。
PCT/CN2021/108492 2020-09-04 2021-07-26 一种通信方法及设备 WO2022048344A1 (zh)

Priority Applications (3)

Application Number Priority Date Filing Date Title
JP2023514945A JP2023539912A (ja) 2020-09-04 2021-07-26 通信方法及びデバイス
EP21863412.9A EP4199597A4 (en) 2020-09-04 2021-07-26 COMMUNICATION EQUIPMENT AND METHOD
US18/178,071 US20230209442A1 (en) 2020-09-04 2023-03-03 Communication Method and Device

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
CN202010921252.3 2020-09-04
CN202010921252 2020-09-04
CN202011066491.1 2020-09-30
CN202011066491.1A CN114143854B (zh) 2020-09-04 2020-09-30 一种通信方法及设备

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US18/178,071 Continuation US20230209442A1 (en) 2020-09-04 2023-03-03 Communication Method and Device

Publications (1)

Publication Number Publication Date
WO2022048344A1 true WO2022048344A1 (zh) 2022-03-10

Family

ID=80438832

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/108492 WO2022048344A1 (zh) 2020-09-04 2021-07-26 一种通信方法及设备

Country Status (5)

Country Link
US (1) US20230209442A1 (zh)
EP (1) EP4199597A4 (zh)
JP (1) JP2023539912A (zh)
CN (1) CN114143854B (zh)
WO (1) WO2022048344A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022251080A1 (en) * 2021-05-27 2022-12-01 Qualcomm Incorporated Mitigating access congestion on a wireless network

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101227713A (zh) * 2007-01-19 2008-07-23 华为技术有限公司 一种用户接入控制的方法及其装置
CN101977446A (zh) * 2009-11-02 2011-02-16 南京中兴软件有限责任公司 在无线网络中提供服务质量保证的方法及系统
CN107018555A (zh) * 2016-01-28 2017-08-04 展讯通信(上海)有限公司 网络接入方法、网络接入控制方法、用户终端及基站
WO2018053869A1 (zh) * 2016-09-26 2018-03-29 华为技术有限公司 一种确定、发送小区参数集合的方法、设备及系统
CN108462978A (zh) * 2017-02-22 2018-08-28 电信科学技术研究院 接入控制方法及装置
CN108702766A (zh) * 2016-05-13 2018-10-23 Oppo广东移动通信有限公司 通信方法、网络设备和终端设备

Family Cites Families (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101730104A (zh) * 2009-06-23 2010-06-09 中兴通讯股份有限公司 用户设备接入认证方法、装置及无线局域网接入网络
CN102045810B (zh) * 2009-10-09 2014-01-08 华为技术有限公司 机器类型通讯终端设备接入网络的方法、装置和系统
CN102130975A (zh) * 2010-01-20 2011-07-20 中兴通讯股份有限公司 一种用身份标识在公共设备上接入网络的方法及系统
CN101951607A (zh) * 2010-10-14 2011-01-19 中国电子科技集团公司第三十研究所 一种基于可信度的无线局域网可信接入方法及系统
CN102761974A (zh) * 2011-04-27 2012-10-31 中兴通讯股份有限公司 一种接入控制方法、系统及ue
CN103428815B (zh) * 2012-05-17 2016-03-30 华为技术有限公司 无线局域网的接入方法、装置及系统
CN105103620B (zh) * 2013-03-20 2019-10-25 瑞典爱立信有限公司 基于逻辑承载的特性过滤上行链路数据的方法
CN104322108A (zh) * 2013-05-03 2015-01-28 华为技术有限公司 接入控制方法及装置
CN105873042A (zh) * 2016-05-31 2016-08-17 西安大唐电信有限公司 一种轻量级的5g接入认证方法
CN107770809B (zh) * 2016-08-22 2022-01-07 中兴通讯股份有限公司 一种控制数据包发送的方法、基站、终端及系统
CN115022941B (zh) * 2017-03-08 2024-04-30 中兴通讯股份有限公司 一种接入控制的方法、装置及系统
CN107360557B (zh) * 2017-06-15 2020-03-24 电信科学技术研究院 一种系统消息通知、发送方法及装置
CN109803317B (zh) * 2017-11-17 2022-06-24 华为技术有限公司 一种通信方法和装置
CN110505672B (zh) * 2018-05-17 2020-12-15 华为技术有限公司 接入控制方法、通信设备以及基站
CN110677851B (zh) * 2019-08-29 2022-12-27 努比亚技术有限公司 一种终端网络接入方法及网络接入设备的接入方法

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101227713A (zh) * 2007-01-19 2008-07-23 华为技术有限公司 一种用户接入控制的方法及其装置
CN101977446A (zh) * 2009-11-02 2011-02-16 南京中兴软件有限责任公司 在无线网络中提供服务质量保证的方法及系统
CN107018555A (zh) * 2016-01-28 2017-08-04 展讯通信(上海)有限公司 网络接入方法、网络接入控制方法、用户终端及基站
CN108702766A (zh) * 2016-05-13 2018-10-23 Oppo广东移动通信有限公司 通信方法、网络设备和终端设备
WO2018053869A1 (zh) * 2016-09-26 2018-03-29 华为技术有限公司 一种确定、发送小区参数集合的方法、设备及系统
CN108462978A (zh) * 2017-02-22 2018-08-28 电信科学技术研究院 接入控制方法及装置

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
HUAWEI, HISILICON: "Unified access control for NB-IoT and eMTC connected to 5GC", 3GPP DRAFT; R2-1912618 SUPPORT FOR UAC IN NB-IOT, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. RAN WG2, no. Chongqing, China; 20191014 - 20191018, 4 October 2019 (2019-10-04), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France , XP051790657 *
QUALCOMM INCORPORATED: "Introducing Universal Access Control test case 5.4.11 for Operator-defined Access categories", 3GPP DRAFT; C6-200633, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. CT WG6, no. Online; 20200825 - 20200828, 27 August 2020 (2020-08-27), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France , XP051922554 *
See also references of EP4199597A4 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022251080A1 (en) * 2021-05-27 2022-12-01 Qualcomm Incorporated Mitigating access congestion on a wireless network
US11889560B2 (en) 2021-05-27 2024-01-30 Qualcomm Incorporated Mitigating access congestion on a wireless network

Also Published As

Publication number Publication date
EP4199597A1 (en) 2023-06-21
US20230209442A1 (en) 2023-06-29
JP2023539912A (ja) 2023-09-20
CN114143854B (zh) 2023-10-20
CN114143854A (zh) 2022-03-04
EP4199597A4 (en) 2024-02-28

Similar Documents

Publication Publication Date Title
WO2018137284A1 (zh) 一种传输寻呼消息的方法及装置
JP2022506884A (ja) サイドリンクデータ伝送方法及び端末機器
WO2021179895A1 (zh) 一种通信方法及装置
WO2022183934A1 (zh) 一种小区重选方法及设备
CN110972159B (zh) 用于广播/多播通信的说后再听
WO2021238692A1 (zh) 通信方法和通信装置
WO2022048344A1 (zh) 一种通信方法及设备
CN114916037A (zh) 通信方法及装置
WO2020258051A1 (zh) 小区接入的方法和设备
WO2016002332A1 (ja) 装置、方法及びプログラム
EP4240086A1 (en) Communication method and device
WO2022116966A1 (zh) 一种通信方法及装置
WO2022126641A1 (zh) 无线通信方法、终端设备、第一接入网设备以及网元
WO2023216696A1 (zh) 信息处理的方法和装置
WO2023131156A1 (zh) 随机接入的方法和通信装置
EP4387357A1 (en) Communication method and device
WO2022206745A1 (zh) 寻呼指示方法及装置
WO2024087627A1 (zh) 一种协作传输方法及相关装置
WO2024120176A1 (zh) 一种通信方法、装置及系统
WO2022104711A1 (zh) 一种通信方法及装置
US20240032069A1 (en) Method for configuring a sidelink resource and communication apparatus
WO2023070684A1 (zh) 无线通信的方法和设备
WO2023015573A1 (zh) 通信方法、设备及存储介质
WO2024140323A1 (zh) 通信方法和通信装置
WO2022082538A1 (zh) 无线通信的方法和装置以及通信设备

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21863412

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2023514945

Country of ref document: JP

Kind code of ref document: A

ENP Entry into the national phase

Ref document number: 2021863412

Country of ref document: EP

Effective date: 20230317

NENP Non-entry into the national phase

Ref country code: DE