WO2022143539A1 - Procédé et appareil de déclenchement d'accès à un réseau et dispositif côté réseau - Google Patents

Procédé et appareil de déclenchement d'accès à un réseau et dispositif côté réseau Download PDF

Info

Publication number
WO2022143539A1
WO2022143539A1 PCT/CN2021/141697 CN2021141697W WO2022143539A1 WO 2022143539 A1 WO2022143539 A1 WO 2022143539A1 CN 2021141697 W CN2021141697 W CN 2021141697W WO 2022143539 A1 WO2022143539 A1 WO 2022143539A1
Authority
WO
WIPO (PCT)
Prior art keywords
network
duration
terminal
timer
target terminal
Prior art date
Application number
PCT/CN2021/141697
Other languages
English (en)
Chinese (zh)
Inventor
韩鲁峰
康艳超
王文
张鹏飞
Original Assignee
维沃移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 维沃移动通信有限公司 filed Critical 维沃移动通信有限公司
Publication of WO2022143539A1 publication Critical patent/WO2022143539A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions
    • H04W48/06Access restriction performed under specific conditions based on traffic conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/18Selecting a network or a communication service

Definitions

  • the present application belongs to the technical field of wireless communication, and in particular relates to a method, apparatus and network side device for triggering network access.
  • a terminal or user equipment (User Equipment, UE) in the first network will try to access the second network.
  • User Equipment User Equipment
  • the Disaster Inbound roamers should perform network reselection, and the terminal that is connected to the second network due to the disaster of the first network will try to access the first network. That is, when disaster conditions no longer apply, all UEs of a Public Land Mobile Network (PLMN) previously in a disaster state (currently served by another PLMN and currently in 5G Mobility Management Idle) Management Idle, 5GMM-IDLE) mode) will perform PLMN reselection and return to the PLMN where the disaster condition occurred previously.
  • PLMN Public Land Mobile Network
  • the second network may be congested.
  • the first network returns to normal, and the first network may be congested when a large number of first network UEs return to the first network.
  • Embodiments of the present application provide a network access triggering method, apparatus, and network side device, which can solve the problem of congestion in the second network caused by a large number of UEs receiving services from the first network when they change to the second network.
  • a first aspect provides a method for triggering network access, which is applied to a first network, the method comprising: determining that the target terminal needs to access a second network during the process of receiving a service from the first network by the target terminal ; start the first timer corresponding to the target terminal, wherein, for multiple different terminals, the duration of the first timer is not exactly the same; when the first timer times out, trigger the target terminal to try access the second network.
  • an apparatus for triggering network access comprising: a determining module configured to determine that the target terminal needs to access a second network during the process of receiving a service from the first network by the target terminal
  • the starting module is used to start the first timer corresponding to the target terminal, wherein the durations of the first timers corresponding to a plurality of different terminals are not exactly the same; the triggering module is used for when the first timer times out In this case, the target terminal is triggered to attempt to access the second network.
  • a network-side device in a third aspect, includes a processor, a memory, and a program or instruction stored on the memory and executable on the processor, the program or instruction being executed by the The processor implements the steps of the method as described in the first aspect when executed.
  • a readable storage medium is provided, and a program or an instruction is stored on the readable storage medium, and when the program or instruction is executed by a processor, the steps of the method according to the first aspect are implemented.
  • a chip in a fifth aspect, includes a processor and a communication interface, the communication interface is coupled to the processor, and the processor is used to run a program or instruction of a network-side device, which is implemented as in the first aspect the steps of the method.
  • a computer program product is provided, the computer program product is stored in a non-transitory storage medium, and when the computer program product is executed by a processor, the steps of the method according to the first aspect are implemented.
  • the first network device in the process of the target terminal receiving the service from the first network, if the first network determines that the target terminal needs to access the second network, the first network device starts the first timer, wherein for multiple For different target terminals, the first timers have different durations; then, when the first timer times out, trigger the target terminal to attempt to access the second network. Therefore, the problem that a large number of target terminals attempt to access the second network at the same time and cause congestion of the second network can be avoided.
  • FIG. 1 shows a schematic diagram of a wireless communication system to which an embodiment of the present application can be applied
  • FIG. 2 shows a schematic flowchart of a triggering method for a network access method provided by an embodiment of the present application
  • FIG. 3 shows another schematic flowchart of the triggering method of the network access method provided by the embodiment of the present application
  • FIG. 4 shows another schematic flowchart of a triggering method for a network access method provided by an embodiment of the present application
  • FIG. 5 shows another schematic flowchart of the triggering method of the network access method provided by the embodiment of the present application
  • FIG. 6 shows a schematic structural diagram of a triggering device for a network access method provided by an embodiment of the present application
  • FIG. 7 shows a schematic structural diagram of a communication device provided by an embodiment of the present application.
  • FIG. 8 shows a schematic diagram of a hardware structure of a network side device provided by an embodiment of the present application.
  • first, second and the like in the description and claims of the present application are used to distinguish similar objects, and are not used to describe a specific order or sequence. It is to be understood that the data so used are interchangeable under appropriate circumstances so that the embodiments of the present application can be practiced in sequences other than those illustrated or described herein, and "first”, “second” distinguishes Usually it is a class, and the number of objects is not limited.
  • the first object may be one or multiple.
  • “and/or” in the description and claims indicates at least one of the connected objects, and the character “/" generally indicates that the associated objects are in an "or” relationship.
  • LTE Long Term Evolution
  • LTE-Advanced LTE-Advanced
  • LTE-A Long Term Evolution-Advanced
  • CDMA Code Division Multiple Access
  • TDMA Time Division Multiple Access
  • FDMA Frequency Division Multiple Access
  • OFDMA Orthogonal Frequency Division Multiple Access
  • SC-FDMA Single-carrier Frequency-Division Multiple Access
  • system and “network” in the embodiments of the present application are often used interchangeably, and the described technology can be used not only for the above-mentioned systems and radio technologies, but also for other systems and radio technologies.
  • NR New Radio
  • the following description describes a New Radio (NR) system for example purposes, and uses NR terminology in most of the description below, but these techniques can also be applied to applications other than NR system applications, such as 6th Generation , 6G) communication system.
  • NR New Radio
  • FIG. 1 shows a schematic diagram of a wireless communication system to which an embodiment of the present application can be applied.
  • the wireless communication system includes a terminal 11 and a network-side device 12 .
  • the terminal 11 may also be called a terminal device or a user terminal (User Equipment, UE), and the terminal 11 may be a mobile phone, a tablet computer (TabletPersonal Computer), a laptop computer (Laptop Computer) or a notebook computer, a personal digital assistant (Personal Digital Assistant, PDA), handheld computer, netbook, ultra-mobile personal computer (ultra-mobile personal computer, UMPC), mobile Internet Device (Mobile Internet Device, MID), wearable device (Wearable Device) or vehicle-mounted device ( VUE), pedestrian terminal (PUE) and other terminal-side devices, wearable devices include: bracelets, earphones, glasses, etc.
  • the network side device 12 may be a base station or a core network, wherein the base station may be referred to as a Node B, an evolved Node B, an access point, a Base Transceiver Station (BTS), a radio base station, a radio transceiver, a basic service Set (Basic Service Set, BSS), Extended Service Set (Extended Service Set, ESS), Node B, Evolved Node B (eNB), Home Node B, Home Evolved Node B, WLAN Access Point, WiFi Node, Send Transmitting Receiving Point (TRP) or some other suitable term in the field, as long as the same technical effect is achieved, the base station is not limited to a specific technical vocabulary. It should be noted that in the embodiment of this application, only the NR system is used. The base station in the example is taken as an example, but the specific type of the base station is not limited.
  • FIG. 2 shows a schematic flowchart of a method for triggering network access in an embodiment of the present application, and the method 200 may be executed by a first network.
  • the method may be executed by software or hardware installed on a network-side device (eg, a base station) of the first network.
  • the method may include the following steps.
  • the first network determines that the target terminal needs to access the second network when it finds that the second network is available.
  • the determining by the first network that the target terminal needs to access the second network may include: finding that a disaster begins to occur on the first network, and the second network can provide services normally. For example, when the UE is in a connected state, the first network finds that a disaster begins to occur in the first network and may not be able to provide normal services, while the second network can provide services normally. For example, some network elements of a part of the first network are in disaster, but other network elements are still available, and the available network elements can send a disaster notification to the UE.
  • the first network determining that the target terminal needs to access the second network may include: determining that the second network is back to normal, wherein the target terminal is before a disaster occurs on the second network , receiving services from the second network, and accessing the first network after a disaster occurs in the second network. For example, when the UE is in the connected state of the second network, the second network suffers a disaster, the UE attempts to access the first network, and after the second network recovers to normal, the first network determines that the second network is recovered, and the All UEs of the second network should perform network reselection, ie all UEs of the second network that were previously in a disaster state need to access the second network.
  • S212 Start a first timer corresponding to the target terminal, wherein the durations of the first timers corresponding to multiple different terminals are not exactly the same.
  • each of the multiple terminals corresponds to a first timer, and among the durations of the multiple first timers, the durations of the first timers corresponding to some terminals are different, or the multiple first timers have different durations. Among the durations of the timers, the durations of the first timers corresponding to all the terminals are different from each other.
  • S214 Trigger the target terminal to attempt to access the second network when the first timer expires.
  • the first network device in the process of the target terminal receiving the service from the first network, if the first network determines that the target terminal needs to access the second network, the first network device starts the first timer, wherein for multiple For different target terminals, the first timers have different durations; then, when the first timer times out, trigger the target terminal to attempt to access the second network. Therefore, the problem that a large number of target terminals attempt to access the second network at the same time and cause congestion of the second network can be avoided.
  • the duration of the first timer may be determined according to a random value within a predetermined range. That is, in this possible implementation manner, before starting the first timer, the method further includes: taking a random value within a predetermined range, and determining the duration of the first timer corresponding to the target terminal according to the random value .
  • the duration of the first timer may be a random value within a predetermined range, or a duration calculated according to the random value.
  • the first network may also determine the duration of the first timer according to the target parameter information. That is, in this possible implementation manner, before starting the first timer, the method further includes: determining the duration of the first timer according to target parameter information.
  • the target parameter information may include at least one of the following:
  • Identification information of the target terminal for example, the duration of the first timer corresponding to the target terminal may be calculated according to the identification information of the target terminal.
  • Identification information of the first network For example, the ID of the first network.
  • Subscription information of the target terminal For example, the subscription information of the target terminal, such as the priority, can be used as the calculation reference information.
  • the subscription information of the target terminal may include the priority of the target terminal, and when the duration of the first timer is determined, the duration of the first timer corresponding to a terminal with a higher priority is shorter. For example, when a disaster occurs in the first network, a UE with a lower priority may be given a longer timer, so that the UE accesses the second network later and provides normal services to the UE later.
  • Identification information of the second network For example, the ID of the second network.
  • the principle for determining the duration of the first timer may include: If the first network is an equivalent network, the duration of the first timer corresponding to the first terminal is less than the duration of the first timer corresponding to the second terminal, where the first network is the first timer
  • the home network of a terminal the first network is not the home network of the second terminal. For example, when a disaster occurs on the first network, it can be prioritized to ensure that the home terminal of the first network is changed to the second network. Therefore, for the target terminal belonging to the first network, the corresponding first timer duration is smaller than that of the non-belonging terminal. The target terminal of the first network.
  • the first network and the second network are equivalent networks, and whether the target terminal is the first network according to the identifier of the first network, the identifier of the second network, and the subscription information of the target terminal the home terminal.
  • the principle for determining the duration of the first timer may include: the first timer corresponding to the first terminal.
  • the duration of a timer is less than the duration of the first timer corresponding to the second terminal, wherein the second network is a forbidden network of the second terminal, and the second network is the first The terminal's non-prohibited network.
  • that the second network is the forbidden network of the second terminal means that when the second terminal attempts to access the second network, the second network will reject the access of the second terminal by reasons such as "PLMN not allowed".
  • the second network may also be rejected if it tries to access the second network earlier. Therefore, the second terminal may leave the first network later and enter later. second network.
  • the second network is a prohibited network of the target terminal according to the identifier of the second network and the subscription information of the target terminal, so that the duration of the first timer corresponding to the target terminal can be determined.
  • the principle for determining the duration of the first timer may include: If the first network is an equivalent network, the duration of the first timer corresponding to the first terminal is greater than the duration of the second timer corresponding to the second terminal, where the second network is the first timer The home network of a terminal, and the second network is not the home network of the second terminal. For example, for a UE belonging to the second network, when a disaster occurs on the second network, it changes to an equivalent network (ie, the first network) of the second network.
  • the duration of the first timer corresponding to the UE can be longer. Therefore, in this possible implementation manner, for the target terminal belonging to the second network, the duration of the corresponding first timer is longer than that of the target terminal not belonging to the second network.
  • the principle for determining the duration of the first timer may include: the first timer corresponding to the first terminal.
  • the duration of a timer is greater than the duration of the first timer corresponding to the second terminal, wherein the first network is a prohibited network of the second terminal, and the first network is a non-disabled network of the first terminal Network is prohibited.
  • this type of UE is required to leave the first network as soon as possible, and the duration of the first timer corresponding to this type of UE is relatively small. For example, the second network and the first network have not subscribed for normal services.
  • the UE In the absence of a disaster, if the UE attempts to access the first network, it will be rejected by the reason "PLMN not allowed". Leave the first network so that the first network stops serving it.
  • the second network is the home network of this type of UE, make the UE return to its home network as soon as possible, so that the forbidden network (ie, the first network) of this type of UE stops serving it as soon as possible.
  • FIG. 3 shows another schematic flowchart of a method for triggering network access in an embodiment of the present application.
  • the method 300 may be executed by a terminal, a target network, and an original network.
  • the method may be executed by software or hardware installed on the terminal, the network-side device of the target network, and the network-side device of the original network.
  • the method may include the following steps.
  • the UE currently receives services in the original network.
  • the original network finds that the target network is available.
  • the original network discovering the target network can be the same as that in the above method 200 when the first network determines that the target terminal needs to access the second network.
  • the relevant description in the above method 200 please refer to the relevant description in the above method 200, which will not be repeated here.
  • the original network starts a target timer corresponding to the UE.
  • the target timers corresponding to different UEs have different durations.
  • the original network can determine the duration of the target timer in the same way that the first network in the above method 200 determines the duration of the first timer corresponding to the target terminal.
  • the original network notifies the UE that the target network is available, and the notification may be notified to the terminal through signaling, such as a release message or a registration rejection message.
  • the UE After receiving the available information of the target network sent by the original network, the UE attempts to access the target network.
  • the original network device in the process of the UE receiving the service from the original network, and the original network finds that the target network is available, the original network device starts the target timer corresponding to the UE; then, when the target timer times out, triggering The UE attempts to access the target network. Therefore, the problem that a large number of UEs try to access the target network at the same time and cause the congestion of the target network can be avoided.
  • FIG. 4 shows another schematic flowchart of a method for triggering network access in an embodiment of the present application.
  • the method 400 may be executed by a terminal, a first network, and a second network.
  • the method may be executed by software or hardware installed on the terminal, the network-side device of the first network, and the network-side device of the second network.
  • the method may include the following steps.
  • the UE is serving normally on the first network.
  • the first network starts a first timer corresponding to the UE.
  • some network elements of the first network are in disaster, but some network elements are still available, and the available network elements may send a disaster notification to the UE, wherein the UE may be currently in but not limited to a connected state.
  • the durations of the first timers corresponding to different UEs are not exactly the same.
  • the first network may determine the duration of the first timer in the manner in which the first network determines the duration of the first timer corresponding to the target terminal in the foregoing method 200 .
  • the first network may take random values for different UEs.
  • the first network may use information of the UE (for example, UE ID), information of the second network (that is, the target network) (for example, the second network ID), and subscription information of the UE (for example, priority), etc. as calculation reference information.
  • the principle for the first network to determine the duration of the first timer may include at least one of the following:
  • a longer timer can be calculated to require the UE to access the second network later, and to provide normal services to the UE later.
  • the second network is a network equivalent to the first network.
  • the UE belongs to the first network
  • the second network is the equivalent home network (Equivalent Home PLMN, EHPLMNE) of the UE's home network.
  • EHPLMNE Equivalent Home PLMN
  • the UE of the network is required to leave the first network and enter the second network as soon as possible to obtain normal services as soon as possible. Therefore, the first timer corresponding to the UE belonging to the first network is shorter than the first timer corresponding to the UE not belonging to the first network. device.
  • the second network is a forbidden network of the UE, for example, the second network has not signed a normal service contract with the home network (ie, the first network), and when no disaster occurs, if the UE attempts to access the second network, it will The network rejected by the reason "PLMN not allowed", then the duration of the first timer corresponding to the UE whose second network is a prohibited network is greater than the duration of the first timer corresponding to the UE whose second network is a non-prohibited network, that is, the first timer.
  • the second network is that the UE which is a prohibited network may leave the first network later and enter the second network later.
  • the first network notifies the UE that a disaster occurs in the first network, triggering the terminal to attempt to access the second network;
  • FIG. 5 shows another schematic flowchart of a method for triggering network access in an embodiment of the present application.
  • the method 500 may be executed by a terminal, a first network, and a second network.
  • the method may be executed by software or hardware installed on the terminal, the network-side device of the first network, and the network-side device of the second network.
  • the method may include the following steps.
  • the UE receives normal services in the second network.
  • the UE before S501, when the UE receives a normal service in the first network, the first network suffers a disaster, and the UE accesses the second network.
  • the UE may use the method described in the above method 400 to access the second network.
  • the UE may also use other methods to access the second network, which is not specifically implemented in this embodiment of the present application. limited.
  • the second network starts a second timer corresponding to the UE after the second network finds that the first network in which the disaster occurred has returned to normal.
  • the durations of the second timers corresponding to different UEs are not exactly the same.
  • the first network may determine the duration of the second timer in the manner in which the first network determines the duration of the first timer corresponding to the target terminal in the foregoing method 200 .
  • the second network may take random values for different UEs.
  • the second network may use UE information (eg, UE ID), information of the second network (ie, target network) (eg, second network ID), and UE subscription information (eg, priority) as calculation reference information.
  • UE information eg, UE ID
  • information of the second network ie, target network
  • UE subscription information eg, priority
  • the principle for the second network to determine the duration of the second timer may include at least one of the following:
  • a longer timer can be calculated to require the UE to access the first network later.
  • the first network is a network equivalent to the second network, for example, the second network is the home network of the UE, the first network is the EHPLMN network of the home network of the UE, and the UE belonging to the first network (for example, the EHPLMN network of the home network of the UE)
  • the first network is the HPLMN of the UE, and can leave the second network later. Therefore, the duration of the second timer corresponding to the UE belonging to the first network is longer than the second timer corresponding to the UE not belonging to the first network. The duration of the timer.
  • the second network is the forbidden network of the UE.
  • the second network and the first network do not subscribe to normal services, that is, when the disaster does not occur, if the UE attempts to access the second network, it will be called with the reason "PLMN not allowed", then for this type of UE, for example, the first network is the HPLMN of the UE, it is required to leave the second network as soon as possible, so that the UE returns to its home network as soon as possible, so that the second network stops serving it. Therefore, the duration of the second timer corresponding to the UE in which the second network is a prohibited network is smaller than the duration of the second timer corresponding to the UE in which the second network is a non-prohibited network.
  • the second network notifies the UE that the first network is back to normal through signaling, for example, triggering the terminal to attempt to access the first network through connection release signaling, registration rejection signaling, etc.;
  • the UE attempts to access the first network after receiving the information from the second network that the first network has returned to normal.
  • the execution subject may be a device for triggering network access, or, in the device for triggering network access, the method for triggering network access is executed. control module.
  • the triggering device for network access provided by the embodiments of the present application is described by taking the triggering method for network access performed by the device for triggering network access as an example.
  • FIG. 6 is a schematic structural diagram of an apparatus for triggering network access provided by an embodiment of the present application. As shown in FIG.
  • the determining module 601 is configured to determine that the target terminal needs to access the second network during the process of receiving the service from the first network by the target terminal; the starting module 602 is configured to start the target terminal a corresponding first timer, wherein the durations of the first timers corresponding to multiple different terminals are not exactly the same; the triggering module 603 is configured to trigger the target terminal to attempt an attempt when the first timer times out access the second network.
  • the determining by the determining module 601 that the target terminal needs to access the second network includes: discovering that a disaster starts to occur in the first network, and the second network can provide services normally.
  • the determining module 601 that determines that the target terminal needs to access the second network includes: determining that the second network is back to normal, wherein the target terminal, before a disaster occurs on the second network, Receive services from the second network, and access the first network after a disaster occurs in the second network.
  • the determining module 601 is further configured to take a random value within a predetermined range, and determine the duration of the first timer corresponding to the target terminal according to the random value.
  • the determining module 601 is further configured to determine the duration of the first timer according to target parameter information.
  • the target parameter information includes at least one of the following:
  • the subscription information of the target terminal includes: the priority of the target terminal, wherein the duration of the first timer corresponding to the target terminal with a higher priority is shorter.
  • the principle for determining the duration of the first timer by the determining module 601 includes: if the second network and the first network are equivalent networks, the first target terminal corresponds to The duration of the first timer is less than the duration of the first timer corresponding to the second target terminal, where the first network is the home network of the first target terminal, and the first network is not the The home network of the second target terminal.
  • the principle for determining the duration of the first timer by the determining module 601 includes: the duration of the first timer corresponding to the first target terminal is smaller than the duration of the first timer corresponding to the second target terminal The duration of the timer, wherein the second network is a prohibited network of the second target terminal, and the second network is a non-prohibited network of the first target terminal.
  • the principle for determining the duration of the first timer by the determining module 601 includes: if the second network and the first network are equivalent networks, all The duration of the first timer is greater than the duration of the second timer corresponding to the second terminal, wherein the second network is the home network of the first terminal, and the first network is not the second terminal home network.
  • the principle for determining the duration of the first timer by the determining module 601 includes: the duration of the first timer corresponding to the first terminal is greater than the duration of the first timer corresponding to the second terminal , wherein the first network is a prohibited network of the second terminal, and the first network is a non-prohibited network of the first terminal.
  • the device for triggering network access in this embodiment of the present application may be a device, or may be a component, an integrated circuit, or a chip in a network-side device.
  • the apparatus may be a network side device.
  • the network side device may include, but is not limited to, the types of the network side device 12 listed above, which are not specifically limited in this embodiment of the present application.
  • the triggering device in this embodiment of the present application may be a device having an operating system.
  • the operating system may be an Android (Android) operating system, an ios operating system, or other possible operating systems, which are not specifically limited in the embodiments of the present application.
  • the triggering device provided in this embodiment of the present application may be a device capable of implementing each process implemented by the first network or the second network in the method embodiments shown in FIGS. 2 to 5 , and achieve the same technical effect. To avoid repetition, details are not described here.
  • an embodiment of the present application further provides a communication device 700 , including a processor 701 , a memory 702 , and programs or instructions stored in the memory 702 and executable on the processor 701
  • a communication device 700 including a processor 701 , a memory 702 , and programs or instructions stored in the memory 702 and executable on the processor 701
  • the communication device 700 is a network-side device
  • the program or instruction is executed by the processor 701
  • each process of the above-mentioned embodiment of the triggering method for network access can be realized, and the same technical effect can be achieved. To avoid repetition, here No longer.
  • the network device 800 includes: an antenna 801 , a radio frequency device 802 , and a baseband device 803 .
  • the antenna 801 is connected to the radio frequency device 802 .
  • the radio frequency device 802 receives information through the antenna 801, and sends the received information to the baseband device 803 for processing.
  • the baseband device 803 processes the information to be sent and sends it to the radio frequency device 802
  • the radio frequency device 802 processes the received information and sends it out through the antenna 801 .
  • the above-mentioned frequency band processing apparatus may be located in the baseband apparatus 803 , and the method performed by the first network or the second network in the above embodiments may be implemented in the baseband apparatus 803 .
  • the baseband apparatus 803 includes a processor 804 and a memory 805 .
  • the baseband device 803 may include, for example, at least one baseband board on which a plurality of chips are arranged. As shown in FIG. 8 , one of the chips is, for example, the processor 804 and is connected to the memory 805 to call the program in the memory 805 to execute The network devices shown in the above method embodiments operate.
  • the baseband device 803 may further include a network interface 806 for exchanging information with the radio frequency device 802, and the interface is, for example, a common public radio interface (CPRI for short).
  • CPRI common public radio interface
  • the network-side device in the embodiment of the present invention further includes: instructions or programs stored in the memory 805 and executable on the processor 804, and the processor 804 invokes the instructions or programs in the memory 805 to execute the modules shown in FIG. 6 .
  • An embodiment of the present application further provides a readable storage medium, where a program or an instruction is stored on the readable storage medium, and when the program or instruction is executed by a processor, each process of the foregoing network access triggering method embodiment is implemented, and The same technical effect can be achieved, and in order to avoid repetition, details are not repeated here.
  • the processor is the processor in the network-side device described in the foregoing embodiment.
  • the readable storage medium includes a computer-readable storage medium, such as a computer read-only memory (Read-Only Memory, ROM), a random access memory (Random Access Memory, RAM), a magnetic disk or an optical disk, and the like.
  • An embodiment of the present application further provides a chip, where the chip includes a processor and a communication interface, the communication interface is coupled to the processor, and the processor is used for running network-side device programs or instructions to implement the above-mentioned network access
  • the chip includes a processor and a communication interface
  • the communication interface is coupled to the processor
  • the processor is used for running network-side device programs or instructions to implement the above-mentioned network access
  • a computer program product is provided, the computer program product is stored in a non-transitory storage medium, and when the computer program product is executed by a processor, each process of the above-mentioned embodiment of the triggering method for network access can be achieved, and the same can be achieved.
  • the technical effect, in order to avoid repetition, will not be repeated here.
  • the chip mentioned in the embodiments of the present application may also be referred to as a system-on-chip, a system-on-chip, a system-on-chip, or a system-on-a-chip, or the like.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

L'invention concerne un procédé et un appareil d'accès à un réseau et un dispositif côté réseau, appartenant au domaine technique des communications sans fil. Le procédé de déclenchement d'accès au réseau est appliqué à un premier réseau. Le procédé comprend les étapes suivantes consistant à : déterminer, pendant le processus d'un terminal cible recevant un service provenant d'un premier réseau, que le terminal cible a besoin d'accéder à un second réseau ; démarrer un premier temporisateur correspondant au terminal cible, la durée du premier temporisateur n'étant pas complètement identique pour une pluralité de terminaux différents ; et lorsque le premier temporisateur expire, déclencher le terminal cible pour tenter d'accéder au second réseau.
PCT/CN2021/141697 2020-12-29 2021-12-27 Procédé et appareil de déclenchement d'accès à un réseau et dispositif côté réseau WO2022143539A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202011602990.8A CN114698051B (zh) 2020-12-29 2020-12-29 网络接入的触发方法、装置及网络侧设备
CN202011602990.8 2020-12-29

Publications (1)

Publication Number Publication Date
WO2022143539A1 true WO2022143539A1 (fr) 2022-07-07

Family

ID=82132112

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/141697 WO2022143539A1 (fr) 2020-12-29 2021-12-27 Procédé et appareil de déclenchement d'accès à un réseau et dispositif côté réseau

Country Status (2)

Country Link
CN (1) CN114698051B (fr)
WO (1) WO2022143539A1 (fr)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117641492A (zh) * 2022-08-12 2024-03-01 维沃移动通信有限公司 灾难漫游方法、装置、终端、第一通信设备及第二网络

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1761220A (zh) * 2004-10-11 2006-04-19 华为技术有限公司 一种重选网络的实现方法
EP2840862A1 (fr) * 2013-08-19 2015-02-25 Koninklijke KPN N.V. Procédé de sélection de réseau et dispositif utilisateur configuré pour exécuter un tel procédé
CN107466080A (zh) * 2017-08-22 2017-12-12 深圳市万普拉斯科技有限公司 网络重选方法、装置、计算机可读存储介质和移动终端

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1761220A (zh) * 2004-10-11 2006-04-19 华为技术有限公司 一种重选网络的实现方法
EP2840862A1 (fr) * 2013-08-19 2015-02-25 Koninklijke KPN N.V. Procédé de sélection de réseau et dispositif utilisateur configuré pour exécuter un tel procédé
CN107466080A (zh) * 2017-08-22 2017-12-12 深圳市万普拉斯科技有限公司 网络重选方法、装置、计算机可读存储介质和移动终端

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
QUALCOMM INCORPORATED: "Addition of Key Issue on prevention of signalling overload in PLMNs without Disaster Condition for MINT", 3GPP DRAFT; C1-207684, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. CT WG1, no. Electronic meeting; 20201113 - 20201120, 19 November 2020 (2020-11-19), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France , XP051955825 *

Also Published As

Publication number Publication date
CN114698051B (zh) 2024-01-26
CN114698051A (zh) 2022-07-01

Similar Documents

Publication Publication Date Title
US11570750B2 (en) Method for paging, access network device, and terminal device
JP6910445B2 (ja) 通信方法、アクセスネットワークデバイス、及び端末
US11477722B2 (en) Changing access control parameters in a wireless network
RU2746891C1 (ru) Способ перехода, сетевое устройство и терминальное устройство
US10484963B2 (en) Method and apparatus for transmitting and receiving paging message in mobile communication system
CN108293259B (zh) 一种nas消息处理、小区列表更新方法及设备
WO2023130471A1 (fr) Procédé et appareil d'accès à une cellule, et dispositif et support de stockage lisible
JP2020507967A (ja) 通信方法、端末及びアクセスネットワークデバイス
EP3834467B1 (fr) Procédé pour manipuler une surcharge de tranche de réseau
US20200229134A1 (en) Method for Paging, and Access Network Device, Terminal Device and Core Network Device
RU2742948C1 (ru) Способ переключения состояния, сетевое устройство и терминальное устройство
WO2018133128A1 (fr) Procédé d'accès aléatoire, dispositif terminal, et dispositif de réseau
WO2022143539A1 (fr) Procédé et appareil de déclenchement d'accès à un réseau et dispositif côté réseau
CN115150973A (zh) 中继通信方法及装置、存储介质、中继设备
JP2021510029A (ja) ビーム障害回復の構成方法、装置及び通信システム
US20230199468A1 (en) Device discovery and registration method and network-side device
US20230083832A1 (en) Information indication method and apparatus and communication device
CN112470501B (zh) 一种寻呼消息处理方法及装置
EP4221352A1 (fr) Procédé et appareil de changement de réseau, et terminal
WO2022027639A1 (fr) Procédé de réception de signal, procédé d'envoi de signal, dispositif terminal et support de stockage
WO2022143680A1 (fr) Procédé et appareil de rapport d'informations et dispositif côté réseau
EP4228373A1 (fr) Procédé et appareil d'indication de communication et dispositif côté réseau
JP2023538692A (ja) サイドリンクにおけるビーム障害検出および回復のための方法および装置
CN118118960A (zh) 小区选择、接入方法及通信装置、存储介质、终端设备
CN116438867A (zh) 用于非允许服务区域的周期性注册更新过程

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21914275

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 21914275

Country of ref document: EP

Kind code of ref document: A1

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 08/02/2024)