WO2022241794A1 - 小区接入控制方法、装置、设备及存储介质 - Google Patents
小区接入控制方法、装置、设备及存储介质 Download PDFInfo
- Publication number
- WO2022241794A1 WO2022241794A1 PCT/CN2021/095333 CN2021095333W WO2022241794A1 WO 2022241794 A1 WO2022241794 A1 WO 2022241794A1 CN 2021095333 W CN2021095333 W CN 2021095333W WO 2022241794 A1 WO2022241794 A1 WO 2022241794A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- terminal
- cell
- access
- terminal device
- terminal type
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 97
- 238000004590 computer program Methods 0.000 claims description 29
- 238000004891 communication Methods 0.000 abstract description 41
- 238000005516 engineering process Methods 0.000 abstract description 11
- 238000010586 diagram Methods 0.000 description 20
- 230000006870 function Effects 0.000 description 15
- 230000005540 biological transmission Effects 0.000 description 6
- 230000008054 signal transmission Effects 0.000 description 5
- 230000008569 process Effects 0.000 description 4
- 230000010267 cellular communication Effects 0.000 description 3
- 230000003993 interaction Effects 0.000 description 3
- 230000007246 mechanism Effects 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 3
- 238000012545 processing Methods 0.000 description 3
- 230000001413 cellular effect Effects 0.000 description 2
- 230000001934 delay Effects 0.000 description 2
- 230000010365 information processing Effects 0.000 description 2
- 230000007774 longterm Effects 0.000 description 2
- 230000001172 regenerating effect Effects 0.000 description 2
- 239000007787 solid Substances 0.000 description 2
- 230000001960 triggered effect Effects 0.000 description 2
- 230000009471 action Effects 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000001737 promoting effect Effects 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 230000011664 signaling Effects 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/02—Access restriction performed under specific conditions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/14—Relay systems
- H04B7/15—Active relay systems
- H04B7/185—Space-based or airborne stations; Stations for satellite systems
- H04B7/1851—Systems using a satellite or space-based relay
- H04B7/18513—Transmission in a satellite or space-based system
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/14—Relay systems
- H04B7/15—Active relay systems
- H04B7/185—Space-based or airborne stations; Stations for satellite systems
- H04B7/1853—Satellite systems for providing telephony service to a mobile station, i.e. mobile satellite service
- H04B7/18565—Arrangements for preventing unauthorised access or for providing user protection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/08—Access restriction or access information delivery, e.g. discovery data delivery
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W56/00—Synchronisation arrangements
- H04W56/004—Synchronisation arrangements compensating for timing error of reception due to propagation delay
- H04W56/0045—Synchronisation arrangements compensating for timing error of reception due to propagation delay compensating for timing error by altering transmission time
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/02—Access restriction performed under specific conditions
- H04W48/04—Access restriction performed under specific conditions based on user or terminal location or mobility data, e.g. moving direction, speed
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/08—Access restriction or access information delivery, e.g. discovery data delivery
- H04W48/12—Access restriction or access information delivery, e.g. discovery data delivery using downlink control channel
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/16—Discovering, processing access restriction or access information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/20—Selecting an access point
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/04—Large scale networks; Deep hierarchical networks
- H04W84/06—Airborne or Satellite Networks
Definitions
- the embodiments of the present application relate to the field of communication technologies, and in particular to a cell access control method, device, device, and storage medium.
- NTN Non-Terrestrial Network, non-terrestrial network
- 5G NR New Radio
- the signal transmission delay between the terminal equipment and the satellite in the NTN system is greatly increased.
- due to the large coverage of satellites for different terminal devices within the coverage of the same satellite, due to their different locations, there may be large differences in signal transmission delays between them and the satellite. Therefore, it is necessary to make some technical improvements to the cell access control in combination with the characteristics of the NTN system.
- Embodiments of the present application provide a cell access control method, device, equipment, and storage medium. Described technical scheme is as follows:
- a cell access control method is provided, the method is executed by a terminal device, and the method includes:
- the terminal type includes at least a first terminal type and a second terminal type
- the first information is used to determine that the terminal device corresponding to each terminal type in the first terminal type and the second terminal type is allowed or is allowed Access to the cell is prohibited.
- a cell access control method is provided, the method is executed by a network device, and the method includes:
- the terminal device is used to determine whether the cell corresponding to the network device allows or prohibits the terminal device from accessing according to the received first information and the terminal type to which the terminal device belongs;
- the terminal type includes at least a first terminal type and a second terminal type
- the first information is used to determine that the terminal device corresponding to each terminal type in the first terminal type and the second terminal type is allowed or is allowed Access to the cell is prohibited.
- a device for cell access control comprising:
- a determining module configured to determine whether the cell corresponding to the network device allows or prohibits the terminal device from accessing according to the first information from the network device and the terminal type to which the terminal device belongs;
- the terminal type includes at least a first terminal type and a second terminal type
- the first information is used to determine that the terminal device corresponding to each terminal type in the first terminal type and the second terminal type is allowed or is allowed Access to the cell is prohibited.
- a device for cell access control comprising:
- a sending module configured to send first information
- the terminal device is configured to determine whether the cell corresponding to the network device allows or prohibits the terminal device from accessing according to the received first information and the terminal type to which the terminal device belongs ;
- the terminal type includes at least a first terminal type and a second terminal type
- the first information is used to determine that the terminal device corresponding to each terminal type in the first terminal type and the second terminal type is allowed or is allowed Access to the cell is prohibited.
- a terminal device includes a processor
- the processor is configured to determine whether the cell corresponding to the network device allows or prohibits the terminal device from accessing according to the first information from the network device and the terminal type to which the terminal device belongs;
- the terminal type includes at least a first terminal type and a second terminal type
- the first information is used to determine that the terminal device corresponding to each terminal type in the first terminal type and the second terminal type is allowed or is allowed Access to the cell is prohibited.
- a network device includes a transceiver
- the transceiver is configured to send first information
- the terminal device is configured to determine whether the cell corresponding to the network device allows or prohibits the terminal device according to the received first information and the terminal type to which the terminal device belongs access;
- the terminal type includes at least a first terminal type and a second terminal type
- the first information is used to determine that the terminal device corresponding to each terminal type in the first terminal type and the second terminal type is allowed or is allowed Access to the cell is prohibited.
- a computer-readable storage medium where a computer program is stored in the storage medium, and the computer program is used to be executed by a processor, so as to implement the above cell access control method.
- a chip is provided, the chip includes a programmable logic circuit and/or program instructions, and when the chip is running, is used to implement the above cell access control method.
- a computer program product or computer program includes computer instructions, the computer instructions are stored in a computer-readable storage medium, and a processor reads from the The computer-readable storage medium reads and executes the computer instructions, so as to implement the above cell access control method.
- the terminal device Through the terminal device according to the first information from the network device (the first information is used to determine whether the terminal device corresponding to each terminal type in the first terminal type and the second terminal type is allowed or prohibited from accessing the cell corresponding to the network device) and the terminal type to which the terminal device belongs, determine whether the cell corresponding to the network device allows or prohibits the terminal device from accessing, so as to implement cell access control for different terminal types, and can more flexibly control the access of various terminals, and more Make good use of network resources.
- the first information is used to determine whether the terminal device corresponding to each terminal type in the first terminal type and the second terminal type is allowed or prohibited from accessing the cell corresponding to the network device
- the terminal type to which the terminal device belongs determine whether the cell corresponding to the network device allows or prohibits the terminal device from accessing, so as to implement cell access control for different terminal types, and can more flexibly control the access of various terminals, and more Make good use of network resources.
- FIG. 1 is a schematic diagram of a transparent forwarding satellite network architecture provided by an embodiment of the present application
- FIG. 2 is a schematic diagram of a regenerative and forwarding satellite network architecture provided by an embodiment of the present application
- Fig. 3 exemplarily shows a schematic diagram of a preamble receiving window in an NTN system
- Fig. 4 exemplarily shows a schematic diagram of overlapping receiving windows of preambles in an NTN system
- FIG. 5 is a flowchart of a cell access control method provided by an embodiment of the present application.
- FIG. 6 is a schematic diagram of allowing or prohibiting judgment based on cell access prohibition indication information provided by an embodiment of the present application
- FIG. 7 is a schematic diagram of permission or prohibition determination based on cell access prohibition indication information provided by another embodiment of the present application.
- FIG. 8 is a schematic diagram of allowing or prohibiting judgment based on random access resource configuration information provided by an embodiment of the present application.
- FIG. 9 is a schematic diagram of permission or prohibition decision based on random access resource configuration information provided by another embodiment of the present application.
- FIG. 10 is a schematic diagram of allowing or prohibiting judgment based on UAC configuration information provided by an embodiment of the present application.
- FIG. 11 is a schematic diagram of allowing or prohibiting judgment based on UAC configuration information provided by another embodiment of the present application.
- FIG. 12 is a block diagram of a cell access control device provided by an embodiment of the present application.
- FIG. 13 is a block diagram of a cell access control device provided in another embodiment of the present application.
- FIG. 14 is a schematic structural diagram of a terminal device provided by an embodiment of the present application.
- Fig. 15 is a schematic structural diagram of a network device provided by an embodiment of the present application.
- the network architecture and business scenarios described in the embodiments of the present application are for more clearly illustrating the technical solutions of the embodiments of the present application, and do not constitute limitations on the technical solutions provided by the embodiments of the present application.
- the evolution of the technology and the emergence of new business scenarios, the technical solutions provided in the embodiments of this application are also applicable to similar technical problems.
- Satellite communication is not restricted by the user's region. For example, general land communication cannot cover areas such as oceans, mountains, deserts, etc. that cannot be equipped with communication equipment or are not covered by communication due to sparse population. For satellite communication, due to a Satellites can cover a large area of the ground, and satellites can orbit the earth, so theoretically every corner of the earth can be covered by satellite communications. Secondly, satellite communication has great social value.
- Satellite communication can be covered at a lower cost in remote mountainous areas, poor and backward countries or regions, so that people in these regions can enjoy advanced voice communication and mobile Internet technology, which is conducive to narrowing the digital gap with developed regions and promoting development of these areas.
- the distance of satellite communication is long, and the cost of communication does not increase significantly with the increase of communication distance; finally, the stability of satellite communication is high, and it is not limited by natural disasters.
- LEO Low-Earth Orbit, Low Earth Orbit
- MEO Medium-Earth Orbit, Medium Earth Orbit
- GEO Global-Earth Orbit, Geosynchronous Orbit
- HEO High Elliptical Orbit, high elliptical orbit
- the altitude range of low-orbit satellites is 500km to 1500km, and the corresponding orbital period is about 1.5 hours to 2 hours.
- the signal propagation delay of single-hop communication between users is generally less than 20ms.
- the maximum satellite visible time is 20 minutes.
- the signal propagation distance is short, the link loss is small, and the requirements for the transmission power of the user terminal equipment are not high.
- Satellites in geosynchronous orbit have an orbital altitude of 35786km and a period of 24 hours around the earth.
- the signal propagation delay of single-hop communication between users is generally 250ms.
- satellites use multi-beams to cover the ground.
- a satellite can form dozens or even hundreds of beams to cover the ground; a satellite beam can cover tens to hundreds of kilometers in diameter. ground area.
- FIG. 1 shows a schematic diagram of a satellite network architecture
- the communication satellites in the satellite network architecture are transparent payload satellites.
- the satellite network architecture includes: terminal equipment 10 , satellite 20 , NTN gateway 30 , access network equipment 40 and core network equipment 50 .
- Communication between the terminal device 10 and the access network device 40 can be performed through an air interface (such as a Uu interface).
- the access network device 40 can be deployed on the ground, and the uplink and downlink communication between the terminal device 10 and the access network device 40 can be relayed and transmitted through the satellite 20 and the NTN gateway 30 (usually located on the ground).
- the terminal device 10 sends the uplink signal to the satellite 20, and the satellite 20 forwards the above uplink signal to the NTN gateway 30, and then the NTN gateway 30 forwards the above uplink signal to the access network device 40, followed by the access
- the network device 40 sends the above-mentioned uplink signal to the core network device 50 .
- the downlink signal from the core network equipment 50 is sent to the access network equipment 40, and the access network equipment 40 sends the downlink signal to the NTN gateway 30, and the NTN gateway 30 forwards the above downlink signal to the satellite 20, and then the The satellite 20 forwards the above-mentioned downlink signal to the terminal device 10 .
- FIG. 2 shows a schematic diagram of another satellite network architecture.
- the communication satellites in the satellite network architecture are regenerative payload satellites.
- the satellite network architecture includes: a terminal device 10 , a satellite 20 , an NTN gateway 30 and a core network device 50 .
- the functions of the access network device 40 are integrated on the satellite 20 , that is, the satellite 20 has the functions of the access network device 40 .
- Communication between the terminal device 10 and the satellite 20 can be performed through an air interface (such as a Uu interface).
- the satellite 20 and the NTN gateway 30 (usually located on the ground) can communicate through SRI (Satellite Radio Interface, satellite wireless interface).
- the terminal device 10 sends the uplink signal to the satellite 20, and the satellite 20 forwards the above uplink signal to the NTN gateway 30, and then the NTN gateway 30 sends the above uplink signal to the core network device 50.
- the downlink signal from the core network device 50 is sent to the NTN gateway 30 , the NTN gateway 30 forwards the downlink signal to the satellite 20 , and then the satellite 20 forwards the downlink signal to the terminal device 10 .
- the access network device 40 is a device for providing wireless communication services for the terminal device 10 .
- a connection may be established between the access network device 40 and the terminal device 10, so as to perform communication through the connection, including signaling and data interaction.
- the number of access network devices 40 may be multiple, and two adjacent access network devices 40 may also communicate in a wired or wireless manner.
- the terminal device 10 can switch between different access network devices 40 , that is, establish connections with different access network devices 40 .
- the access network device 40 in the cellular communication network may be a base station.
- a base station is a device deployed in an access network to provide wireless communication functions for terminal equipment 10 .
- the base station may include various forms of macro base stations, micro base stations, relay stations, access points and so on.
- the names of devices with base station functions may be different. For example, in 5G NR systems, they are called gNodeB or gNB.
- the name "base station" may change as communication technology evolves.
- the above-mentioned devices that provide the wireless communication function for the terminal device 10 are collectively referred to as base stations or access network devices.
- the terminal device 10 involved in the embodiment of the present application may include various handheld devices with wireless communication functions, vehicle-mounted devices, wearable devices, computing devices or other processing devices connected to wireless modems, as well as various forms of user Equipment (User Equipment, UE), mobile station (Mobile Station, MS), terminal device (terminal device) and so on.
- UE User Equipment
- MS Mobile Station
- terminal device terminal device
- the above-mentioned devices are collectively referred to as terminal devices.
- UE is used in some places to represent “terminal equipment”.
- the "network device” may be an access network device (such as a base station) or a satellite.
- the NTN network may include multiple satellites 20 .
- One satellite 20 may cover a certain ground area, and provide wireless communication services for the terminal devices 10 on the ground area.
- the satellite 20 can orbit the earth, and by arranging a plurality of satellites 20, communication coverage of different areas on the earth's surface can be achieved.
- the terms "network” and “system” are often used interchangeably, but those skilled in the art can understand their meanings.
- the technical solutions described in the embodiments of this application can be applied to LTE (Long Term Evolution, long-term evolution) systems, and can also be applied to 5G NR systems, and can also be applied to subsequent evolution systems of 5G NR systems or other communication systems. Not limited.
- the first action is to read the MIB (Master Information Block, Master Information Block).
- the MIB contains the following two parameters related to cell selection and reselection:
- cellBarred used to indicate whether the current cell is barred for all UEs. If the indication of cellBarred is barred (access prohibited), UEs in RRC (Radio Resource Control, radio resource control) idle state and RRC inactive state cannot camp on the cell.
- RRC Radio Resource Control, radio resource control
- intraFreqReselection used to indicate whether the UE is allowed to select or reselect to the second best cell on the current frequency if the current cell is the best cell on the current frequency and the UE is not allowed to camp.
- the UAC Unified Access Control
- access identity and access category are defined.
- the access identity represents the identity feature of the UE itself.
- standardized access identifiers in NR are 0-15, of which 3-10 are undefined parts.
- the access category represents the service attribute of the call initiated by the UE, where 0 to 7 are standardized access categories, 32 to 63 are operator-defined access categories, and others are undefined access categories.
- RAN Radio Access Network, wireless access network
- UE AS Access Stratum, access layer
- AS/NAS Access Class Barring, access level restriction
- UAC parameters are configured for each access category and for each PLMN (Public Land Mobile Network, public land mobile network).
- PLMN Public Land Mobile Network, public land mobile network.
- each UAC-BarringInfoSet contains the following parameters:
- uac-BarringFactor Indicates the probability that an access attempt is allowed to pass.
- uac-BarringTime used to determine the minimum time interval between the failure of an access attempt initiated by a certain access category and the initiation of the next access attempt by the same access category.
- Each access category is associated with a UAC-BarringInfoSet, a total of 64 access categories (access category 0 does not need to be configured). It can be configured for each PLMN, and each PLMN is associated with a UAC-BarringPerCatList. If not configured for each PLMN information, the above configuration is applicable to all PLMNs.
- the UE Based on the above UAC configuration parameters, the UE performs the UAC check process as follows:
- step S2 If the corresponding bit of the access identity in uac-BarringForAccessIdentity is set to 0, it means access is allowed; if the corresponding bit is set to 1, further judgment is required, and step S3 is executed;
- the NAS determines the access identifier, access category, and cause value.
- the NAS provides the access identifier and access category to the AS, and the AS is responsible for the ACB check. If it passes, the AS notifies the NAS, and the NAS provides the reason value to the AS. Based on the ACB check feedback of the AS, the NAS is responsible for stopping or allowing service transmission.
- RNAU RAN-based Notification Area Update, notification area update based on radio access network
- AS-triggered events including paging (paging) trigger, RNAU (RAN-based Notification Area Update, notification area update based on radio access network) trigger (interactive information between NAS and AS belongs to UE implementation behavior), where:
- Paging The access category is 0, not controlled by ABC.
- the reason value will be rewritten, NAS and AS interact, and NAS provides reason value information.
- RNAU The access category is 8, determined by the AS, the access identifier needs to be provided by the NAS to the AS, and how and when the interaction belongs to the implementation.
- the cause value AS is determined to be rna-Update.
- the signal propagation delay between UE and satellite in NTN is greatly increased.
- the maximum difference in signal transmission delay between different UEs and base stations in an NTN cell is 10.3 ms.
- RACH Random Access Channel, Random Access Channel
- the length of the preamble reception window on the base station side should be extended to 2*(maximum one-way delay - minimum one-way delay), as shown in Figure 3.
- the base station After receiving the preamble, the base station needs to know in which RO (RACH Occasion, random access channel opportunity) the UE sent the preamble, so as to determine the initial TA (Timing Advance, timing advance) of the UE.
- RO Random Access Channel opportunity
- TA Timing Advance, timing advance
- the base station receives the preamble in the overlapping area of multiple preamble reception windows, and cannot know which RO the UE sent the preamble in, and cannot determine the preamble.
- UE's TA In NTN, due to the need to introduce a longer preamble receiving window, as shown in Figure 4, if the time interval between adjacent ROs in the time domain is smaller than the window length of the preamble receiving window, there will be ROs located at different times The preamble reception windows corresponding to the ROs overlap in the time domain. In this way, the base station receives the preamble in the overlapping area of multiple preamble reception windows, and cannot know which RO the UE sent the preamble in, and
- the UE can estimate the TA by itself and use the estimated TA to send the preamble, because the UE has adjusted its own TA before sending the preamble.
- Uplink timing so for a UE with TA pre-compensation capability, the network does not actually need to use the above-mentioned extended RACH receiving window for preamble reception. Therefore, for terminal equipment with TA pre-compensation capability, since there is no need to use the extended RACH receiving window for preamble reception, there is no restriction on the time interval between adjacent ROs, thereby improving the RACH capacity to a certain extent .
- the terminal device (the first information is used to determine whether the terminal device corresponding to each terminal type in the first terminal type and the second terminal type is allowed or prohibited from accessing the network device corresponding to cell) and the terminal type to which the terminal device belongs, and determine whether the cell corresponding to the network device allows or prohibits the terminal device from accessing, so as to implement cell access control for different terminal types and control the access of various terminals more flexibly , make better use of network resources.
- the terminal device when the terminal device belongs to the first terminal type (for example, the terminal device has the TA pre-compensation capability, or the terminal device has the positioning capability, or the terminal device has the TA pre-compensation capability and the positioning capability), the terminal The device first determines whether the cell corresponding to the network device allows the terminal device corresponding to the first terminal type to access, and further, if it is determined that the cell corresponding to the network device prohibits the terminal device corresponding to the first terminal type from accessing, the terminal device further determines whether the network device corresponds to Whether the cell allows the terminal equipment corresponding to the second terminal type to access, through two-step judgment, to ensure that the terminal equipment uses the TA pre-compensation capability to access the network to the greatest extent, so as to ensure the RACH capacity, and when the network is congested, it can not Using the TA pre-compensation capability for access increases the chance of successful access, thereby increasing the success rate of access.
- the terminal device belongs to the first terminal type (for example, the terminal device has the
- FIG. 5 shows a flowchart of a cell access control method provided by an embodiment of the present application. This method can be applied to the network architecture shown in FIG. 1 or FIG. 2 . The method may include the following steps (510-520):
- Step 510 the network device sends first information, and the first information is used to determine whether a terminal device corresponding to each terminal type in the first terminal type and the second terminal type is allowed or prohibited from accessing a cell corresponding to the network device.
- the terminal device receives the first information from the network device.
- the terminal type includes at least a first terminal type and a second terminal type, where the first terminal type and the second terminal type are two different terminal types, and the first information is used to determine whether the cell corresponding to the network device is allowed or prohibited The access of the terminal device corresponding to the first terminal type is further used to determine whether the cell corresponding to the network device allows or prohibits the access of the terminal device corresponding to the second terminal type.
- the terminal type is determined based on the capabilities of the terminal devices, that is, the types of terminal devices can be classified according to the different capabilities of different terminal devices.
- the terminal type is determined based on at least one of the following capabilities: TA pre-compensation capability and positioning capability.
- the TA pre-compensation capability refers to the capability of the terminal device to perform TA pre-compensation using the positioning capability combined with satellite ephemeris information and/or time information broadcast by system information.
- the terminal device can estimate the TA corresponding to the service link (service link) between itself and the satellite, and combine the information such as the common TA (common TA) broadcast by the network to obtain the first One TA, and use the first TA to perform TA compensation and send msg1, where msg1 is a message for sending a preamble during the random access process.
- the positioning capability refers to the capability of the terminal device to obtain its own location information, such as the GNSS (Global Navigation Satellite System, Global Navigation Satellite System) positioning capability.
- GNSS Global Navigation Satellite System, Global Navigation Satellite System
- the terminal types include at least a first terminal type and a second terminal type
- the first terminal type has the TA pre-compensation capability
- the second terminal type does not have the TA pre-compensation capability.
- the first terminal type has the positioning capability
- the second terminal type does not have the positioning capability.
- the first terminal type has the TA pre-compensation capability and the positioning capability
- the second terminal type does not have the TA pre-compensation capability and/or the positioning capability.
- the first information is used to explicitly or implicitly indicate that the terminal device corresponding to each terminal type in the first terminal type and the second terminal type is allowed or prohibited from accessing the cell corresponding to the network device.
- the first information includes one of the following: cell access prohibition indication information, random access resource configuration information, and UAC configuration information.
- cell access prohibition indication information for an introduction to the above information, please refer to the following examples.
- the network device sends the first information through system information.
- the network device sends system information, where the system information includes the first information; correspondingly, the terminal device receives system information from the network device, where the system information includes the first information.
- the network device broadcasts system information, where the system information includes the first information.
- the first information is entirely in one MIB.
- the cell access barring indication information in the MIB can be reused for a certain type of terminal (specifically reuse Which terminal type can be specified by the protocol or newly added configuration), and the newly added cell access barring indication information in the MIB is applicable to other terminal types.
- the original cell access barring indication information in the MIB can be reused for the first terminal type, that is, to determine the network device based on the original cell access barring indication information in the MIB
- the corresponding cell allows or prohibits the terminal equipment corresponding to the first terminal type to access, and adds a cell access prohibition indication information in the MIB (for example, the remaining 1 bit reserved field in the MIB is used for the newly added cell access prohibition indication Information) is used for the second terminal type, that is, based on the newly added cell access barring indication information in the MIB, it is determined that the cell corresponding to the network device allows or prohibits the terminal device corresponding to the second terminal type from accessing.
- a cell access prohibition indication information in the MIB for example, the remaining 1 bit reserved field in the MIB is used for the newly added cell access prohibition indication Information
- the original cell access barring indication information in the MIB can be reused for the second terminal type, that is, based on the cell access barring indication information in the MIB, it is determined that the cell corresponding to the network device allows or prohibits the terminal device corresponding to the second terminal type from accessing.
- add a cell access barring indication information in the MIB for example, the remaining 1 bit reserved field in the MIB is used for the newly added cell access barring indication information
- the cell access prohibition indication information determines whether the cell corresponding to the network device allows or prohibits the terminal device corresponding to the first terminal type from accessing.
- the first information is entirely in a SIB (System Information Block, system information block).
- SIB System Information Block, system information block
- the SIB may be SIB 1, SIB 2, or other SIBs, which is not limited in this application.
- use unused bits in the SIB to indicate cell access barring indication information corresponding to at least two terminal types (for example, including the first terminal type and the second terminal type).
- the first information is dispersed in one MIB and at least one SIB, or the first information is dispersed in multiple SIBs.
- the SIB may be SIB 1, SIB 2, or other SIBs, which is not limited in this application.
- the cell access barring indication information in the MIB can be reused for a certain type of terminal (specifically reuse Which terminal type can be specified by the protocol or newly added configuration), and in addition, the newly added cell access barring indication information in the SIB is applicable to other terminal types.
- the cell access barring indication information in the MIB can be reused for the first terminal type, that is, the cell access barring indication information in the MIB is used to determine the corresponding The cell allows or prohibits the terminal equipment corresponding to the first terminal type to access, and the newly added cell access prohibition indication information in the SIB (such as SIB 1, SIB 2 or other SIBs) is used by the second terminal type, that is, based on the SIB in the The cell access barring indication information determines whether the cell corresponding to the network device allows or prohibits the terminal device corresponding to the second terminal type from accessing.
- SIB such as SIB 1, SIB 2 or other SIBs
- the cell access barring indication information in the MIB can be reused for the second terminal type, that is, based on the cell access barring indication information in the MIB, it is determined that the cell corresponding to the network device allows or prohibits the terminal device corresponding to the second terminal type from accessing , the newly added cell access barring indication information in SIB (such as SIB 1, SIB 2 or other SIBs) is used for the first terminal type, that is, based on the cell access barring indication information in the SIB, it is determined whether the cell corresponding to the network device is allowed or not Terminal devices corresponding to the first terminal type are prohibited from accessing.
- SIB such as SIB 1, SIB 2 or other SIBs
- Step 520 the terminal device determines that the cell corresponding to the network device allows or prohibits the terminal device from accessing according to the first information from the network device and the terminal type to which the terminal device belongs.
- the "cell corresponding to the network device” is referred to as a "cell”.
- the terminal device accesses or does not access the cell according to the determined result that the cell allows or prohibits the terminal device from accessing. For example, if the terminal device determines that the cell allows it to access, it will access the cell; if the terminal device determines that the cell prohibits its access, it will not access the cell.
- the priority of accessing the cell of the first terminal type is higher than that of the second terminal type. That is, in the case that the terminal device belongs to the first terminal type, it is preferentially determined whether the cell allows the terminal device corresponding to the first terminal type to access.
- the terminal device belongs to the first terminal type (for example, the terminal device has the TA pre-compensation capability, or the terminal device has the positioning capability, or the terminal device has the TA pre-compensation capability and the positioning capability)
- the terminal device determines that the cell allows the terminal device to access.
- the terminal device determines that the cell allows the terminal device to access.
- the terminal device determines that the cell prohibits the terminal device from accessing. access.
- the terminal device when the terminal device belongs to the first terminal type, the terminal device first determines based on the first information that the cell allows or prohibits the access of the terminal device corresponding to the first terminal type; if the cell allows the terminal device corresponding to the first terminal type access, the terminal device determines that the cell allows the terminal device to access.
- the terminal device determines based on the first information that the cell allows or prohibits the terminal device corresponding to the second terminal type from accessing; if the cell allows the terminal device corresponding to the second terminal type to access If the terminal device accesses, the terminal device determines that the cell allows the terminal device to access.
- the terminal device determines that the cell prohibits the terminal device from accessing.
- the terminal device belongs to the first terminal type (for example, the terminal device has the TA pre-compensation capability, or the terminal device has the positioning capability, or the terminal device has the TA pre-compensation capability and the positioning capability)
- the terminal device determines that the cell allows the terminal device to access.
- the terminal device determines that the cell prohibits terminal devices from accessing.
- the terminal device determines based on the first information that the cell allows or prohibits the access of the terminal device corresponding to the first terminal type, and determines that the cell prohibits or allows the access of the terminal device corresponding to the second terminal type.
- the terminal device accesses; if the cell allows the terminal device corresponding to the first terminal type to access, the terminal device determines that the cell allows the terminal device to access.
- the terminal device determines that the cell allows the terminal device to access.
- the terminal device determines that the cell prohibits the terminal device from accessing.
- the terminal device determines that the cell prohibits the terminal device from accessing.
- the terminal device when the terminal device belongs to the first terminal type, if the cell allows the terminal device corresponding to the first terminal type to access, the terminal device uses the random access resources configured for the first terminal type to perform random access; if The cell prohibits terminal equipment corresponding to the first terminal type from accessing, and allows terminal equipment corresponding to the second terminal type to access, and the terminal equipment uses random access resources configured for the second terminal type to perform random access.
- the terminal device when the terminal device belongs to the second terminal type (for example, the terminal device does not have the TA pre-compensation capability, or the terminal device does not have the positioning capability, or the terminal device does not have the TA pre-compensation capability and/or positioning capability)
- the terminal device determines that the cell allows the terminal device to access.
- the terminal device determines that the cell prohibits the terminal device from accessing.
- the terminal device determines based on the first information that the cell prohibits or allows the terminal device corresponding to the second terminal type to access; if the cell allows the terminal device corresponding to the second terminal type to access If the cell enters, the terminal device determines that the cell allows the terminal device to access; if the cell prohibits the terminal device corresponding to the second terminal type from accessing, the terminal device determines that the cell corresponding to the network device prohibits the terminal device from accessing.
- the terminal device when the terminal device belongs to the second terminal type, if the cell allows the terminal device corresponding to the second terminal type to access, the terminal device performs random access using random access resources configured for the second terminal type.
- the multiple random access resources may occupy different positions in the time-frequency domain.
- select one random access resource from the multiple random access resources for example, select one RO from multiple ROs to send the preamble
- different terminal devices can select different random access resources to initiate random access , such as selecting a different RO to send the preamble. Therefore, even according to the exemplary solution introduced above, for a terminal device belonging to the first terminal type, which uses the random access resources corresponding to the second terminal type to perform random access, usually the first terminal type and the second terminal device can be implemented. All terminal devices corresponding to the terminal type can initiate random access.
- the terminal device corresponding to the first terminal type and the terminal device corresponding to the second terminal type send preambles in different ROs.
- the terminal device corresponding to the first terminal type may be given priority to access.
- the terminal device corresponding to the first terminal type can be given priority to use this RO to send the preamble , to ensure that terminal devices corresponding to the first terminal type are preferentially accessed.
- the terminal device corresponding to the second terminal type may be given priority to access, which is not limited in this application.
- the terminal device (the first information is used to determine whether the terminal device corresponding to each terminal type in the first terminal type and the second terminal type is allowed or prohibited from accessing the network device corresponding to cell) and the terminal type to which the terminal device belongs, and determine whether the cell corresponding to the network device allows or prohibits the terminal device from accessing, so as to implement cell access control for different terminal types and control the access of various terminals more flexibly , make better use of network resources.
- the terminal device when the terminal device belongs to the first terminal type (for example, the terminal device has the TA pre-compensation capability, or the terminal device has the positioning capability, or the terminal device has the TA pre-compensation capability and the positioning capability), the terminal The device first determines whether the cell corresponding to the network device allows the terminal device corresponding to the first terminal type to access, and further, if it is determined that the cell corresponding to the network device prohibits the terminal device corresponding to the first terminal type from accessing, the terminal device further determines whether the network device corresponds to Whether the cell allows the terminal equipment corresponding to the second terminal type to access, through two-step judgment, to ensure that the terminal equipment uses the TA pre-compensation capability to access the network to the greatest extent, so as to ensure the RACH capacity, and when the network is congested, it can not Using the TA pre-compensation capability for access increases the chance of successful access, thereby increasing the success rate of access.
- the terminal device belongs to the first terminal type (for example, the terminal device has the
- the first information includes cell access prohibition indication information, and the cell access prohibition indication information is used to indicate that access is allowed or prohibited.
- the cell access barring indication information may be cell barred cellBarred information, where the cellBarred information is used to explicitly indicate that the network device is allowed or barred from camping in a cell corresponding to the network device. For example, the cellBarred information indicates that Barred indicates that access is prohibited, and the cellBarred information indicates that NotBarred indicates that access is allowed.
- the cell access prohibition indication information corresponding to the terminal type is the first indication information
- instruct the cell to allow the terminal type corresponding to the terminal type Device access such as instructing the cell to allow the terminal device corresponding to the terminal type to reside
- the cell access prohibition information corresponding to the terminal type is the second indication information
- instructing the cell to prohibit the terminal device corresponding to the terminal type Access such as instructing the cell to prohibit the terminal equipment corresponding to the terminal type from camping.
- the first indication information is different from the second indication information, for example, the first indication information is 0 and the second indication information is 1, or the first indication information is 1 and the second indication information is 0.
- the cellBarred information can be realized by bits.
- the cellBarred information is represented by 1 bit, for example, 1 bit is 0 or 1.
- 0 indicates Barred means access is allowed
- 1 indicates NotBarred means access is prohibited
- 1 indicates Barred means access is allowed
- 0 indicates NotBarred means access is prohibited.
- the terminal device determines that the cell corresponding to the network device allows or prohibits the terminal device according to the cell access prohibition indication information corresponding to the terminal type to which it belongs. access. For example, as shown in FIG. 6, if the cell access prohibition indication information corresponding to the terminal type to which the terminal device belongs included in the first information indicates that access is allowed, the terminal device determines that the cell corresponding to the network device allows the terminal device to access (such as camping); or, if the cell access prohibition indication information corresponding to the terminal type of the terminal device included in the first information indicates that access is prohibited, the terminal device determines that the cell corresponding to the network device prohibits the terminal device from accessing (if resident).
- the terminal device determines that the cell corresponding to the network device allows the terminal device to access (such as camping on), and if the terminal device belongs to the second terminal type, the terminal device determines that the cell corresponding to the network device prohibits the terminal device from accessing (such as camping on).
- the terminal device when the terminal device belongs to the first terminal type (for example, the terminal device has TA pre-compensation capability, or the terminal device has positioning capability, or the terminal device has TA pre-compensation capability and positioning capability), if the cell access prohibition information corresponding to the first terminal type contained in the first information indicates that access is allowed, the terminal device determines that the cell corresponding to the network device allows the terminal device to access (such as camping); or, If the cell access prohibition information corresponding to the first terminal type contained in the first information indicates that access is prohibited, and the cell access prohibition information corresponding to the second terminal type contained in the first information indicates that access is allowed, then the terminal The device determines that the cell corresponding to the network device allows the terminal device to access (such as camping); or, if the cell access prohibition information corresponding to the first terminal type included in the first information indicates that access is prohibited, and the first information contains The included cell access prohibition indication information corresponding to the second terminal type indicates that access is prohibited, and the terminal device determines that the cell corresponding to the network
- the terminal device when the terminal device belongs to the first terminal type (for example, the terminal device has the TA pre-compensation capability, or the terminal device has the positioning capability, or the terminal device has the TA pre-compensation capability and the positioning capability), if the first The cell access prohibition information corresponding to the first terminal type contained in the information indicates that access is allowed, or the cell access prohibition information corresponding to the second terminal type contained in the first information indicates that access is permitted, then the terminal device determines that the network The cell corresponding to the device allows the terminal device to access (such as camping); or, if the cell access prohibition indication information corresponding to the first terminal type contained in the first information indicates that access is prohibited, and the first terminal type contained in the first information If the cell access prohibition indication information corresponding to the terminal type indicates that access is prohibited, the terminal device determines that the cell corresponding to the network device prohibits the terminal device from accessing (for example, camping on).
- the terminal device determines that the cell corresponding to the network device prohibits the terminal device from accessing (for example, camping on).
- the terminal device when the terminal device belongs to the first terminal type, if the cell corresponding to the network device allows the first terminal type to access, the terminal device uses random access resources configured for the first terminal type to perform random access; Alternatively, if the cell corresponding to the network device prohibits the access of the first terminal type and allows the access of the second terminal type, the terminal device uses the random access resources configured for the second terminal type to perform random access.
- the terminal device when the terminal device belongs to the second terminal type (for example, the terminal device does not have the TA pre-compensation capability, or the terminal device does not have the positioning capability, or the terminal device does not have the TA pre-compensation capability and/or the positioning capability ), if the cell access prohibition information corresponding to the second terminal type contained in the first information indicates that access is allowed, then the terminal device determines that the cell corresponding to the network device allows the terminal device to access (such as camping); or, if The cell access prohibition indication information corresponding to the second terminal type contained in the first information indicates that access is prohibited, and the terminal device determines that the cell corresponding to the network device prohibits the terminal device from accessing (for example, camping on).
- the terminal device determines that the cell corresponding to the network device allows the terminal device to access (such as camping); or, if The cell access prohibition indication information corresponding to the second terminal type contained in the first information indicates that access is prohibited, and the terminal device determines that the cell corresponding to the network device prohibits the terminal device from access
- the terminal device when the terminal device belongs to the second terminal type, if the cell corresponding to the network device allows the second terminal type to access, the terminal device performs random access using random access resources configured for the second terminal type.
- the terminal device determines whether to allow selection or reselection of the network device according to the same-frequency reselection indication information corresponding to the terminal type to which it belongs. Another intra-frequency cell of the corresponding cell performs access.
- the cells with the same frequency refer to cells with the same frequency.
- the intra-frequency reselection instruction information may be intraFreqReselection, which is used to indicate whether the terminal device is allowed to select or reselect if the current cell is the best cell of the current frequency and the terminal device is not allowed to camp. Go to the next best cell on the current frequency.
- the first information further includes intra-frequency reselection indication information corresponding to at least two types of terminals.
- intra-frequency reselection indication information corresponding to at least two types of terminals.
- the first terminal type and the second terminal type in addition to including the cell access barring indication information corresponding to the first terminal type and the cell access barring indication information corresponding to the second terminal type in the first information , further including intra-frequency reselection indication information corresponding to the first terminal type and intra-frequency reselection indication information corresponding to the second terminal type.
- This application configures corresponding cell access barring indication information for different terminal types respectively, and explicitly indicates that access is allowed or barred through the cell access barring indication information, and realizes cell access barring for different terminal types respectively. into control.
- the terminal device when the terminal device belongs to the first terminal type (for example, the terminal device has the TA pre-compensation capability, or the terminal device has the positioning capability, or the terminal device has the TA pre-compensation capability and the positioning capability), the terminal The device first determines whether the cell corresponding to the network device allows the terminal device to access based on the cell access prohibition information corresponding to the first terminal type.
- the terminal device belongs to the first terminal type (for example, the terminal device has the TA pre-compensation capability, or the terminal device has the positioning capability, or the terminal device has the TA pre-compensation capability and the positioning capability).
- the terminal device Further, if it is determined that the cell corresponding to the network device prohibits the first terminal type from accessing, the terminal device Further, based on the cell access prohibition information corresponding to the second terminal type, it is determined whether the cell corresponding to the network device allows the terminal device to access, and through two-step judgment, it is ensured that the terminal device uses the TA pre-compensation capability to access the network to the greatest extent. In order to ensure the RACH capacity, and when the network is congested, it can also be accessed without using the TA pre-compensation capability, which increases the chance of successful access, thereby improving the access success rate.
- the first information includes random access resource configuration information, and the random access resource configuration information is used to indicate that access is permitted or prohibited.
- the random access resource configuration information is used to implicitly indicate that access is allowed or prohibited.
- the random access resource configuration information is information used to configure random access resources (such as RO).
- the random access resource configuration information can be used to implicitly indicate whether access is allowed or prohibited.
- the first information contains random access resource configuration information corresponding to the terminal type, instruct the cell to allow the random access resource configuration information corresponding to the terminal type Terminal device access; or, in the case that the first information does not include the random access resource configuration information corresponding to the terminal type, instruct the cell to prohibit the terminal device corresponding to the terminal type from accessing.
- the random access resource configuration information is associated with the first terminal type, indicating that the cell allows terminal devices corresponding to the first terminal type to access; and/or, the random access resource configuration information is associated with the second terminal type, Indicates that the cell allows terminal devices corresponding to the first terminal type to access.
- the first information includes random access resource configuration information corresponding to the first terminal type, and/or, the first information includes random access resource configuration information corresponding to the second terminal type, indicating that the cell allows the first terminal Type corresponding terminal equipment access.
- the first information does not include random access resource configuration information corresponding to the first terminal type, and the first information does not include random access resource configuration information corresponding to the second terminal type, indicating that the cell prohibits terminals corresponding to the first terminal type Device access also means that the cell prohibits the terminal device corresponding to the second terminal type from accessing.
- the first information includes random access resource configuration information corresponding to the first terminal type, but the first information does not include random access resource configuration information corresponding to the second terminal type, indicating that the cell prohibits the terminal device corresponding to the second terminal type access.
- the terminal device determines the cell corresponding to the network device according to whether the first information contains random access resource configuration information corresponding to the terminal type to which it belongs. Allow or prohibit the terminal device from accessing. For example, as shown in FIG. 8, if the first information includes random access resource configuration information corresponding to the terminal type to which the terminal device belongs, the terminal device determines that the cell corresponding to the network device allows the terminal device to access; or, if the first information If the information does not include random access resource configuration information corresponding to the terminal type to which the terminal device belongs, the terminal device determines that the cell corresponding to the network device prohibits the terminal device from accessing.
- the terminal device determines that the cell corresponding to the network device allows the terminal device to access, and if the terminal device belongs to the second terminal type, the terminal device determines that the cell corresponding to the network device prohibits the terminal device from accessing.
- the terminal device when the terminal device belongs to the first terminal type (for example, the terminal device has the TA pre-compensation capability, or the terminal device has the positioning capability, or the terminal device has the TA pre-compensation capability and the positioning capability), if the first information includes random access resource configuration information corresponding to the first terminal type, the terminal device determines that the cell corresponding to the network device allows the terminal device to access; or, if the first information does not include the first terminal type of random access resource configuration information, and the first information includes random access resource configuration information corresponding to the second terminal type, the terminal device determines that the cell corresponding to the network device allows the terminal device to access; or, if the first The random access resource configuration information corresponding to the first terminal type not included in the information, and the random access resource configuration information corresponding to the second terminal type not included in the first information, the terminal device determines that the cell corresponding to the network device prohibits the terminal Device access.
- the terminal device determines that the cell corresponding to the network device prohibits the terminal Device access.
- the terminal device when the terminal device belongs to the first terminal type (for example, the terminal device has the TA pre-compensation capability, or the terminal device has the positioning capability, or the terminal device has the TA pre-compensation capability and the positioning capability), if the first The information includes random access resource configuration information corresponding to the first terminal type, or the first information includes random access resource configuration information corresponding to the second terminal type, then the terminal device determines that the cell corresponding to the network device allows the terminal device to access ; or, if the first information does not include random access resource configuration information corresponding to the first terminal type, and the first information does not include random access resource configuration information corresponding to the second terminal type, then the terminal device determines that the network device corresponds to The terminal device is prohibited from accessing the cell.
- the terminal device belongs to the first terminal type (for example, the terminal device has the TA pre-compensation capability, or the terminal device has the positioning capability, or the terminal device has the TA pre-compensation capability and the positioning capability)
- the terminal device determines that the cell
- the terminal device when the terminal device belongs to the first terminal type, if the cell corresponding to the network device allows the first terminal type to access, the terminal device uses random access resources configured for the first terminal type to perform random access; Alternatively, if the cell corresponding to the network device prohibits the access of the first terminal type and allows the access of the second terminal type, the terminal device uses the random access resources configured for the second terminal type to perform random access.
- the terminal device when the terminal device belongs to the second terminal type (for example, the terminal device does not have the TA pre-compensation capability, or the terminal device does not have the positioning capability, or the terminal device does not have the TA pre-compensation capability and/or the positioning capability ), if the first information contains random access resource configuration information corresponding to the second terminal type, the terminal device determines that the cell corresponding to the network device allows the terminal device to access; or, if the first information does not contain the second terminal type The terminal device determines that the cell corresponding to the network device prohibits the terminal device from accessing the corresponding random access resource configuration information.
- the terminal device determines that the cell corresponding to the network device allows the terminal device to access; or, if the first information does not contain the second terminal type The terminal device determines that the cell corresponding to the network device prohibits the terminal device from accessing the corresponding random access resource configuration information.
- the terminal device when the terminal device belongs to the second terminal type, if the cell corresponding to the network device allows the second terminal type to access, the terminal device uses random access resources configured for the second terminal type to perform random access.
- This application configures/does not configure corresponding random access resource configuration information for different terminal types, and implicitly indicates that access is allowed or prohibited through the random access resource configuration information, so that different terminal types can be configured separately. Perform cell access control.
- the terminal device when the terminal device belongs to the first terminal type (for example, the terminal device has the TA pre-compensation capability, or the terminal device has the positioning capability, or the terminal device has the TA pre-compensation capability and the positioning capability), the terminal The device first determines whether the cell corresponding to the network device allows the terminal device to access based on whether the first information contains random access resource configuration information corresponding to the first terminal type, and further, if it is determined that the cell corresponding to the network device prohibits the first terminal type access, the terminal device further determines whether the cell corresponding to the network device allows the terminal device to access based on whether the first information contains the random access resource configuration information corresponding to the second terminal type, and through two-step judgment, the maximum Ensure that terminal devices use the TA pre-compensation capability to access the network to ensure RACH capacity, and when the network is congested, they can also access without using the TA pre-compensation capability, which increases the chance of successful access and thus improves the access success rate.
- the terminal device belongs to the first
- the first information includes UAC configuration information
- the UAC configuration information is used by the terminal device to determine whether access to the cell is permitted or prohibited according to a UAC check result.
- the UAC configuration information includes at least one of the following: UAC-BarringInfoSetIndex corresponding to each access category, uac-BarringFactor corresponding to each access category, uac-BarringTime corresponding to each access category, The uac-BarringForAccessIdentity corresponding to the category.
- UAC-BarringInfoSetIndex corresponding to each access category
- uac-BarringFactor corresponding to each access category
- uac-BarringTime corresponding to each access category
- the uac-BarringForAccessIdentity corresponding to the category.
- the UAC check is passed based on the UAC configuration information corresponding to the terminal type, it is determined that the cell allows the terminal type to access; or, If the UAC check fails based on the UAC configuration information corresponding to the terminal type, it is determined that the cell prohibits the terminal type from accessing.
- the UAC check is passed based on the UAC configuration information corresponding to the first terminal type, it is determined that the cell allows the terminal device corresponding to the first terminal type to access; and/or, based on the UAC corresponding to the second terminal type If the UAC check of the configuration information is passed, it is determined that the cell allows the terminal device corresponding to the first terminal type to access. If the UAC check fails based on the UAC configuration information corresponding to the first terminal type, and if the UAC check fails based on the UAC configuration information corresponding to the second terminal type, determine that the cell prohibits the terminal device corresponding to the first terminal type access.
- the UAC check is passed based on the UAC configuration information corresponding to the second terminal type, it is determined that the cell allows the terminal device corresponding to the second terminal type to access; or, when the UAC is executed based on the UAC configuration information corresponding to the second terminal type If the check fails, it is determined that the cell prohibits the terminal device corresponding to the second terminal type from accessing.
- the UAC configuration information corresponding to the first terminal type may be the same as or different from the UAC configuration information corresponding to the second terminal type.
- the terminal device performs UAC check according to the UAC configuration information corresponding to the first terminal type.
- the terminal device performs UAC check according to the UAC configuration information corresponding to the second terminal type.
- the process of the above UAC check can be as follows:
- step S2 If the corresponding bit of the access identity in uac-BarringForAccessIdentity is set to 0, it means access is allowed; if the corresponding bit is set to 1, further judgment is required, and step S3 is executed;
- the terminal device when the first information includes UAC configuration information, performs a UAC check according to the UAC configuration information corresponding to the terminal type to which it belongs, and determines whether the cell corresponding to the network device allows or prohibits the UAC based on the UAC check result.
- Terminal equipment access. For example, as shown in Figure 10, the terminal device performs a UAC check based on the UAC configuration information corresponding to its own terminal type contained in the first information; if the UAC check passes, the terminal device determines that the cell corresponding to the network device allows the terminal device to access, or, if the UAC check fails, the terminal device determines that the cell corresponding to the network device prohibits the terminal device from accessing.
- the terminal device UAC configuration information executes UAC check, and determines that the cell corresponding to the network device allows the terminal device to access if the UAC check passes, and determines that the cell corresponding to the network device prohibits the terminal device from accessing if the UAC check fails; If the terminal device belongs to the second terminal type, the terminal device performs a UAC check based on the UAC configuration information corresponding to the second terminal type, and determines that the cell corresponding to the network device allows the terminal device to access if the UAC check passes. If it passes, it is determined that the cell corresponding to the network device prohibits the terminal device from accessing.
- the terminal device when the terminal device belongs to the first terminal type (for example, the terminal device has the TA pre-compensation capability, or the terminal device has the positioning capability, or the terminal device has the TA pre-compensation capability and the positioning capabilities), if the UAC check is passed based on the UAC configuration information corresponding to the first terminal type included in the first information, the terminal device determines that the cell corresponding to the network device allows the terminal device to access; or, if based on the first information contained in the If the UAC configuration information corresponding to the first terminal type of the device fails to perform the UAC check, and based on the UAC configuration information corresponding to the second terminal type contained in the first information, the terminal device determines that the cell corresponding to the network device allows the terminal to pass the UAC check.
- the terminal device belongs to the first terminal type (for example, the terminal device has the TA pre-compensation capability, or the terminal device has the positioning capability, or the terminal device has the TA pre-compensation capability and the positioning capabilities)
- the terminal device
- the terminal device access; or, if the UAC check based on the UAC configuration information corresponding to the first terminal type included in the first information fails, and the UAC check based on the UAC configuration information corresponding to the second terminal type included in the first information fails. If it passes, the terminal device determines that the cell corresponding to the network device prohibits the terminal device from accessing.
- the terminal device when the terminal device belongs to the first terminal type (for example, the terminal device has the TA pre-compensation capability, or the terminal device has the positioning capability, or the terminal device has the TA pre-compensation capability and the positioning capability), if based on the first The UAC configuration information corresponding to the first terminal type included in the information passes the UAC check, or the UAC check is passed based on the UAC configuration information corresponding to the second terminal type included in the first information, then the terminal device determines the cell corresponding to the network device Allow the terminal device to access; or, if the UAC check based on the UAC configuration information corresponding to the first terminal type contained in the first information fails, and the UAC configuration information corresponding to the first terminal type contained in the first information performs If the UAC check fails, the terminal device determines that the cell corresponding to the network device prohibits the terminal device from accessing.
- the terminal device determines that the cell corresponding to the network device prohibits the terminal device from accessing.
- the terminal device when the terminal device belongs to the first terminal type, if the cell corresponding to the network device allows the first terminal type to access, the terminal device uses random access resources configured for the first terminal type to perform random access; Alternatively, if the cell corresponding to the network device prohibits the access of the first terminal type and allows the access of the second terminal type, the terminal device uses the random access resources configured for the second terminal type to perform random access.
- the terminal device when the terminal device belongs to the second terminal type (for example, the terminal device does not have the TA pre-compensation capability, or the terminal device does not have the positioning capability, or the terminal device does not have the TA pre-compensation capability and/or the positioning capability ), the terminal device performs a UAC check based on the UAC configuration information corresponding to the second terminal type contained in the first information, and if the UAC check passes, it is determined that the cell corresponding to the network device allows the terminal device to access, and if the UAC check fails, it is determined that the network The cell corresponding to the device prohibits the terminal device from accessing.
- the terminal device performs a UAC check based on the UAC configuration information corresponding to the second terminal type contained in the first information, and if the UAC check passes, it is determined that the cell corresponding to the network device allows the terminal device to access, and if the UAC check fails, it is determined that the network The cell corresponding to the device prohibits the terminal device from accessing.
- the terminal device when the terminal device belongs to the second terminal type, if the cell corresponding to the network device allows the second terminal type to access, the terminal device performs random access using random access resources configured for the second terminal type.
- This application configures corresponding UAC configuration information for different terminal types, and performs UAC check based on the UAC configuration information to determine whether access is allowed or prohibited, and realizes cell access control for different terminal types respectively.
- the terminal device when the terminal device belongs to the first terminal type (for example, the terminal device has the TA pre-compensation capability, or the terminal device has the positioning capability, or the terminal device has the TA pre-compensation capability and the positioning capability), the terminal The device first determines whether the cell corresponding to the network device allows the terminal device to access based on the UAC configuration information corresponding to the first terminal type. Further, if it is determined that the cell corresponding to the network device prohibits the first terminal type from accessing, the terminal device is further based on the first terminal type. The UAC configuration information corresponding to the terminal type is used to determine whether the cell corresponding to the network device allows the terminal device to access.
- the terminal device uses the TA pre-compensation capability to access the network to ensure the RACH capacity, and
- the network is congested, it is also possible to perform access without using the TA pre-compensation capability, which increases the chance of successful access and thus improves the success rate of access.
- the network device may also configure random access resource configuration information for the terminal device.
- the random access resource configuration information may be used to configure the random access resource corresponding to the first terminal type and/or the random access resource corresponding to the second terminal type, so that the terminal device uses the random access resource corresponding to a certain terminal type The access resource initiates random access.
- the technical solution of the present application is introduced and described only from the perspective of interaction between the terminal device and the network device.
- the steps performed by the relevant terminal equipment can be individually implemented as a cell access control method on the terminal equipment side, and the steps performed by the relevant network equipment can be independently implemented as a cell access control method on the network equipment side.
- FIG. 12 shows a block diagram of a cell access control device provided by an embodiment of the present application.
- the device has the function of realizing the above method example, and the function may be realized by hardware, or may be realized by executing corresponding software by hardware.
- the apparatus may be the terminal device described above, or may be set in the terminal device. As shown in FIG. 12 , the apparatus 1200 may include: a determining module 1210 .
- a determining module 1210 configured to determine whether the cell corresponding to the network device allows or prohibits the terminal device from accessing according to the first information from the network device and the terminal type to which the terminal device belongs;
- the terminal type includes at least a first terminal type and a second terminal type
- the first information is used to determine that the terminal device corresponding to each terminal type in the first terminal type and the second terminal type is allowed or is allowed Access to the cell is prohibited.
- the apparatus 1200 may include: an access module 1220 .
- the access module 1220 is configured to access or not access the cell according to the determined result that the cell allows or prohibits the terminal device from accessing.
- the determining module 1210 is configured to, if the terminal device belongs to the first terminal type, if the first information indicates that the cell allows the cell corresponding to the first terminal type If the terminal device accesses, it is determined that the cell allows the terminal device to access.
- the access module 1220 is configured to use random access resources configured for the first terminal type to perform random access.
- the determining module 1210 is further configured to: in the case where the first information indicates that the cell prohibits the terminal device corresponding to the first terminal type from accessing, if the first information indicates If the cell allows the terminal device corresponding to the second terminal type to access, then it is determined that the cell allows the terminal device to access.
- the access module 1220 is configured to use random access resources configured for the second terminal type to perform random access.
- the determining module 1210 is further configured to: in the case where the first information indicates that the cell prohibits the terminal device corresponding to the first terminal type from accessing, if the first information indicates If the cell prohibits the terminal device corresponding to the second terminal type from accessing, then it is determined that the cell prohibits the terminal device from accessing.
- the determining module 1210 is configured to, if the terminal device belongs to the first terminal type, if the first information indicates that the cell allows the cell corresponding to the first terminal type If the terminal device and/or the terminal device corresponding to the second terminal type accesses, it is determined that the cell allows the terminal device to access.
- the access module 1220 is configured to allow terminal devices corresponding to the first terminal type and terminal devices corresponding to the second terminal type to access if the first information indicates that the cell allows access, or, the The first information indicates that the cell allows terminal equipment corresponding to the first terminal type to access, and prohibits terminal equipment corresponding to the second terminal type from accessing, then use the random access configured for the first terminal type or, if the first information indicates that the cell allows terminal equipment corresponding to the second terminal type to access and prohibits terminal equipment corresponding to the first terminal type from accessing, use The random access resource configured for the second terminal type performs random access.
- the determining module 1210 is configured to, if the terminal device belongs to the first terminal type, if the first information indicates that the cell prohibits the cell corresponding to the first terminal type If the terminal device and the terminal device corresponding to the second terminal type access, it is determined that the cell prohibits the terminal device from accessing.
- the determining module 1210 is configured to, if the terminal device belongs to the second terminal type, if the first information indicates that the cell allows the If the terminal device accesses, it is determined that the cell allows the terminal device to access.
- the access module 1220 is configured to use random access resources configured for the second terminal type to perform random access.
- the determining module 1210 is configured to determine that the cell prohibits the terminal device from accessing if the first information indicates that the cell prohibits the terminal device corresponding to the second terminal type from accessing. enter.
- the terminal type is determined based on at least one of the following capabilities: TA pre-compensation capability and GNSS positioning capability.
- the first terminal type has TA pre-compensation capability, and the second terminal type does not have TA pre-compensation capability; or, the first terminal type has GNSS positioning capability, and the second terminal type The second terminal type does not have the GNSS positioning capability; or, the first terminal type has the TA pre-compensation capability and the GNSS positioning capability, and the second terminal type does not have the TA pre-compensation capability and/or the GNSS positioning capability.
- the first information includes cell barred information
- the cellBarred information indicates that Barred indicates that access is prohibited
- the cellBarred information indicates that NotBarred indicates that access is allowed.
- the first information includes random access resource configuration information, and the random access resource configuration information is used to indicate that access is allowed or prohibited.
- the random access resource configuration information is associated with the first terminal type, indicating that the cell allows terminal devices corresponding to the first terminal type to access; and/or, the random access resource The configuration information is associated with the second terminal type, indicating that the cell allows terminal devices corresponding to the first terminal type to access.
- the first information includes UAC configuration information
- the UAC configuration information is used by the terminal device to determine whether access to the cell is permitted or prohibited according to a UAC check result.
- the UAC check is passed based on the UAC configuration information corresponding to the first terminal type, it is determined that the cell allows the terminal device corresponding to the first terminal type to access; and/or, based on the If the UAC configuration information corresponding to the second terminal type passes the UAC check, it is determined that the cell allows the terminal device corresponding to the first terminal type to access.
- the apparatus 1200 may include: a receiving module 1230 .
- the receiving module 1230 is configured to receive the first information sent by the network device through system information.
- the first information is completely in one MIB; or, the first information is completely in one SIB; or, the first information is dispersed in one MIB and at least one SIB; or, all The first information is dispersed in multiple SIBs.
- FIG. 13 shows a block diagram of a cell access control apparatus provided by another embodiment of the present application.
- the device has the function of realizing the above method example, and the function may be realized by hardware, or may be realized by executing corresponding software by hardware.
- the apparatus may be the network device described above, or may be set in the network device. As shown in FIG. 13 , the apparatus 1300 may include: a sending module 1310 .
- the sending module 1310 is configured to send first information, and the terminal device is configured to determine whether the cell corresponding to the network device allows or prohibits the terminal device from receiving the first information according to the received first information and the terminal type to which the terminal device belongs. enter;
- the terminal type includes at least a first terminal type and a second terminal type
- the first information is used to determine that the terminal device corresponding to each terminal type in the first terminal type and the second terminal type is allowed or is allowed Access to the cell is prohibited.
- the terminal device accesses or does not access the cell according to the determined result that the cell allows or prohibits the terminal device from accessing.
- the terminal device when the terminal device belongs to the first terminal type, if the first information indicates that the cell allows access by a terminal device corresponding to the first terminal type, the The terminal device determines that the cell allows the terminal device to access.
- the terminal device uses random access resources configured for the first terminal type to perform random access.
- the terminal device determines that the cell allows the terminal device to access.
- the terminal device uses random access resources configured for the second terminal type to perform random access.
- the terminal device determines that the cell prohibits the terminal device from accessing.
- the terminal device when the terminal device belongs to the first terminal type, if the first information indicates that the cell allows the terminal device corresponding to the first terminal type and/or the second If a terminal device corresponding to the two terminal types accesses, the terminal device determines that the cell allows the terminal device to access.
- the terminal equipment performs random access using the random access resources configured for the first terminal type access; or, if the first information indicates that the cell allows terminal equipment corresponding to the second terminal type to access, and prohibits terminal equipment corresponding to the first terminal type from accessing, the terminal equipment uses The random access resource configured for the second terminal type performs random access.
- the terminal device when the terminal device belongs to the first terminal type, if the first information indicates that the cell prohibits the terminal device corresponding to the first terminal type and the second terminal If the terminal device corresponding to the type accesses, the terminal device determines that the cell prohibits the terminal device from accessing.
- the terminal device if the terminal device belongs to the second terminal type, if the first information indicates that the cell allows access by a terminal device corresponding to the second terminal type, the The terminal device determines that the cell allows the terminal device to access.
- the terminal device uses random access resources configured for the second terminal type to perform random access.
- the terminal device determines that the cell prohibits the terminal device from accessing.
- the terminal type is determined based on at least one of the following capabilities: TA pre-compensation capability and GNSS positioning capability.
- the first terminal type has TA pre-compensation capability, and the second terminal type does not have TA pre-compensation capability; or, the first terminal type has GNSS positioning capability, and the second terminal type The second terminal type does not have the GNSS positioning capability; or, the first terminal type has the TA pre-compensation capability and the GNSS positioning capability, and the second terminal type does not have the TA pre-compensation capability and/or the GNSS positioning capability.
- the first information includes cell barred information
- the cellBarred information indicates that Barred indicates that access is prohibited
- the cellBarred information indicates that NotBarred indicates that access is allowed.
- the first information includes random access resource configuration information, and the random access resource configuration information is used to indicate that access is allowed or prohibited.
- the random access resource configuration information is associated with the first terminal type, indicating that the cell allows terminal devices corresponding to the first terminal type to access; and/or, the random access resource The configuration information is associated with the second terminal type, indicating that the cell allows terminal devices corresponding to the first terminal type to access.
- the first information includes UAC configuration information
- the UAC configuration information is used by the terminal device to determine whether access to the cell is permitted or prohibited according to a UAC check result.
- the terminal device determines that the cell allows access by a terminal device corresponding to the first terminal type; and/or In a case where the UAC check is passed based on the UAC configuration information corresponding to the second terminal type, the terminal device determines that the cell allows access by a terminal device corresponding to the first terminal type.
- the sending module 1310 is configured to send the first information through system information.
- the first information is completely in one MIB; or, the first information is completely in one SIB; or, the first information is dispersed in one MIB and at least one SIB; or, all The first information is dispersed in multiple SIBs.
- the device provided by the above embodiment realizes its functions, it only uses the division of the above-mentioned functional modules as an example for illustration. In practical applications, the above-mentioned function allocation can be completed by different functional modules according to actual needs. That is, the content structure of the device is divided into different functional modules to complete all or part of the functions described above.
- FIG. 14 shows a schematic structural diagram of a terminal device 140 provided by an embodiment of the present application.
- the terminal device may be used to implement the above cell access control method.
- the terminal device 140 may include: a processor 141 , a receiver 142 , a transmitter 143 , a memory 144 and a bus 145 .
- the processor 141 includes one or more processing cores, and the processor 141 executes various functional applications and information processing by running software programs and modules.
- the receiver 142 and the transmitter 143 can be realized as a transceiver 146, and the transceiver 146 can be a communication chip.
- the memory 144 is connected to the processor 141 through the bus 145 .
- the memory 144 may be used to store a computer program, and the processor 141 is used to execute the computer program, so as to implement various steps performed by the terminal device in the foregoing method embodiments.
- memory 144 can be realized by any type of volatile or nonvolatile storage device or their combination, and volatile or nonvolatile storage device includes but not limited to: RAM (Random-Access Memory, random access memory) And ROM (Read-Only Memory, read-only memory), EPROM (Erasable Programmable Read-Only Memory, erasable programmable read-only memory), EEPROM (Electrically Erasable Programmable Read-Only Memory, electrically erasable programmable read-only memory memory), flash memory or other solid-state storage technology, CD-ROM (Compact Disc Read-Only Memory, CD-ROM), DVD (Digital Video Disc, high-density digital video disc) or other optical storage, tape cartridges, tapes, disks storage or other magnetic storage devices. in:
- the processor 141 is configured to determine whether the cell corresponding to the network device allows or prohibits the terminal device from accessing according to the first information from the network device and the terminal type to which the terminal device belongs;
- the terminal type includes at least a first terminal type and a second terminal type
- the first information is used to determine that the terminal device corresponding to each terminal type in the first terminal type and the second terminal type is allowed or is allowed Access to the cell is prohibited.
- FIG. 15 shows a schematic structural diagram of a network device 150 provided by an embodiment of the present application.
- the network device may be used to implement the above cell access control method.
- the network device 150 may include: a processor 151 , a receiver 152 , a transmitter 153 , a memory 154 and a bus 155 .
- the processor 151 includes one or more processing cores, and the processor 151 executes various functional applications and information processing by running software programs and modules.
- the receiver 152 and the transmitter 153 can be realized as a transceiver 156, and the transceiver 156 can be a communication chip.
- the memory 154 is connected to the processor 151 through the bus 155 .
- the memory 154 may be used to store a computer program, and the processor 151 is used to execute the computer program, so as to implement various steps performed by the network device in the foregoing method embodiments.
- memory 154 can be realized by any type of volatile or nonvolatile storage device or their combination, and volatile or nonvolatile storage device includes but not limited to: RAM (Random-Access Memory, random access memory) And ROM (Read-Only Memory, read-only memory), EPROM (Erasable Programmable Read-Only Memory, erasable programmable read-only memory), EEPROM (Electrically Erasable Programmable Read-Only Memory, electrically erasable programmable read-only memory memory), flash memory or other solid-state storage technology, CD-ROM (Compact Disc Read-Only Memory, CD-ROM), DVD (Digital Video Disc, high-density digital video disc) or other optical storage, tape cartridges, tapes, disks storage or other magnetic storage devices. in:
- the transceiver 156 is configured to send first information, and the terminal device is configured to determine whether the cell corresponding to the network device allows or prohibits the terminal according to the received first information and the terminal type to which the terminal device belongs device access;
- the terminal type includes at least a first terminal type and a second terminal type
- the first information is used to determine that the terminal device corresponding to each terminal type in the first terminal type and the second terminal type is allowed or is allowed Access to the cell is prohibited.
- An embodiment of the present application also provides a computer-readable storage medium, where a computer program is stored in the storage medium, and the computer program is used to be executed by a processor of a terminal device, so as to realize the above-mentioned cell access control on the terminal device side method.
- An embodiment of the present application also provides a computer-readable storage medium, where a computer program is stored in the storage medium, and the computer program is used to be executed by a processor of a network device, so as to realize the above-mentioned cell access control on the network device side method.
- the computer-readable storage medium may include: ROM (Read-Only Memory, read-only memory), RAM (Random-Access Memory, random access memory), SSD (Solid State Drives, solid state drive) or an optical disc, etc.
- the random access memory may include ReRAM (Resistance Random Access Memory, resistive random access memory) and DRAM (Dynamic Random Access Memory, dynamic random access memory).
- the embodiment of the present application also provides a chip, the chip includes a programmable logic circuit and/or program instructions, and when the chip runs on the terminal device, it is used to implement the above cell access control method on the terminal device side.
- the embodiment of the present application also provides a chip, the chip includes a programmable logic circuit and/or program instructions, and when the chip runs on the network device, it is used to implement the above cell access control method on the network device side.
- the embodiment of the present application also provides a computer program product or computer program, the computer program product or computer program includes computer instructions, the computer instructions are stored in a computer-readable storage medium, and the processor of the terminal device reads from the computer The readable storage medium reads and executes the computer instructions, so as to implement the above cell access control method on the terminal device side.
- the embodiment of the present application also provides a computer program product or computer program, the computer program product or computer program includes computer instructions, the computer instructions are stored in a computer-readable storage medium, and the processor of the network device reads from the computer The readable storage medium reads and executes the computer instructions, so as to implement the above cell access control method on the network device side.
- the "indication" mentioned in the embodiments of the present application may be a direct indication, may also be an indirect indication, and may also mean that there is an association relationship.
- a indicates B which can mean that A directly indicates B, for example, B can be obtained through A; it can also indicate that A indirectly indicates B, for example, A indicates C, and B can be obtained through C; it can also indicate that there is an association between A and B relation.
- the term "corresponding" may indicate that there is a direct or indirect correspondence between the two, or that there is an association between the two, or that it indicates and is indicated, configuration and is configuration etc.
- the "plurality” mentioned herein means two or more.
- “And/or” describes the association relationship of associated objects, indicating that there may be three types of relationships, for example, A and/or B may indicate: A exists alone, A and B exist simultaneously, and B exists independently.
- the character “/” generally indicates that the contextual objects are an "or” relationship.
- the numbering of the steps described herein only exemplarily shows a possible sequence of execution among the steps.
- the above-mentioned steps may not be executed according to the order of the numbers, such as two different numbers
- the steps are executed at the same time, or two steps with different numbers are executed in the reverse order as shown in the illustration, which is not limited in this embodiment of the present application.
- the functions described in the embodiments of the present application may be implemented by hardware, software, firmware or any combination thereof.
- the functions may be stored on or transmitted over as one or more instructions or code on a computer-readable medium.
- Computer-readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another.
- a storage media may be any available media that can be accessed by a general purpose or special purpose computer.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- Astronomy & Astrophysics (AREA)
- Aviation & Aerospace Engineering (AREA)
- General Physics & Mathematics (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims (51)
- 一种小区接入控制方法,其特征在于,所述方法由终端设备执行,所述方法包括:根据来自网络设备的第一信息和所述终端设备所属的终端类型,确定所述网络设备对应的小区允许或禁止所述终端设备接入;其中,所述终端类型至少包括第一终端类型和第二终端类型,所述第一信息用于确定所述第一终端类型和第二终端类型中每种终端类型对应的终端设备被允许或被禁止接入所述小区。
- 根据权利要求1所述的方法,其特征在于,所述方法还包括:根据确定的所述小区允许或者禁止所述终端设备接入的结果,接入或者不接入所述小区。
- 根据权利要求1或2所述的方法,其特征在于,所述根据来自网络设备的第一信息和所述终端设备所属的终端类型,确定所述网络设备对应的小区允许或禁止所述终端设备接入,包括:在所述终端设备属于所述第一终端类型的情况下,若所述第一信息指示所述小区允许所述第一终端类型对应的终端设备接入,则确定所述小区允许所述终端设备接入。
- 根据权利要求3所述的方法,其特征在于,所述根据确定的所述小区允许或者禁止所述终端设备接入的结果,接入或者不接入所述小区,包括:使用配置给所述第一终端类型的随机接入资源进行随机接入。
- 根据权利要求3所述的方法,其特征在于,所述方法还包括:在所述第一信息指示所述小区禁止所述第一终端类型对应的终端设备接入的情况下,若所述第一信息指示所述小区允许所述第二终端类型对应的终端设备接入,则确定所述小区允许所述终端设备接入。
- 根据权利要求5所述的方法,其特征在于,所述根据确定的所述小区允许或者禁止所述终端设备接入的结果,接入或者不接入所述小区,包括:使用配置给所述第二终端类型的随机接入资源进行随机接入。
- 根据权利要求3所述的方法,其特征在于,所述方法还包括:在所述第一信息指示所述小区禁止所述第一终端类型对应的终端设备接入的情况下,若所述第一信息指示所述小区禁止所述第二终端类型对应的终端设备接入,则确定所述小区禁止所述终端设备接入。
- 根据权利要求1或2所述的方法,其特征在于,所述根据来自网络设备的第一信息和所述终端设备所属的终端类型,确定所述网络设备对应的小区允许或禁止所述终端设备接入,包括:在所述终端设备属于所述第一终端类型的情况下,若所述第一信息指示所述小区允许所述第一终端类型对应的终端设备和/或所述第二终端类型对应的终端设备接入,则确定所述小区允许所述终端设备接入。
- 根据权利要求8所述的方法,其特征在于,所述根据确定的所述小区允许或者禁止所述终端设备接入的结果,接入或者不接入所述小区,包括:若所述第一信息指示所述小区允许所述第一终端类型对应的终端设备和所述第二终端类型对应的终端设备接入,或者,所述第一信息指示所述小区允许所述第一终端类型对应的终端设备接入,且禁止所述第二终端类型对应的终端设备接入,则使用配置给所述第一终端类型的随机接入资源进行随机接入;或者,若所述第一信息指示所述小区允许所述第二终端类型对应的终端设备接入,且禁止所述第一终端类型对应的终端设备接入,则使用配置给所述第二终端类型的随机接入资源进行随机接入。
- 根据权利要求1或2所述的方法,其特征在于,所述根据来自网络设备的第一信息和所述终端设备所属的终端类型,确定所述网络设备对应的小区允许或禁止所述终端设备接入,包括:在所述终端设备属于所述第一终端类型的情况下,若所述第一信息指示所述小区禁止所述第一终端类型对应的终端设备和所述第二终端类型对应的终端设备接入,则确定所述小区禁止所述终端设备接入。
- 根据权利要求1至10任一项所述的方法,其特征在于,所述根据来自网络设备的第一信息和所述终端设备所属的终端类型,确定所述网络设备对应的小区允许或禁止所述终端设备接入,包括:在所述终端设备属于所述第二终端类型的情况下,若所述第一信息指示所述小区允许所述第二终端类型对应的终端设备接入,则确定所述小区允许所述终端设备接入。
- 根据权利要求11所述的方法,其特征在于,所述根据确定的所述小区允许或者禁止所述终端设备接入的结果,接入或者不接入所述小区,包括:使用配置给所述第二终端类型的随机接入资源进行随机接入。
- 根据权利要求11所述的方法,其特征在于,所述根据来自网络设备的第一信息和所述终端设备所属的终端类型,确定所述网络设备对应的小区允许或禁止所述终端设备接入,还包括:若所述第一信息指示所述小区禁止所述第二终端类型对应的终端设备接入,则确定所述小区禁止所述终端设备接入。
- 根据权利要求1至13任一项所述的方法,其特征在于,所述终端类型基于以下至少一项能力确定:定时提前TA预补偿能力、全球导航卫星系统GNSS定位能力。
- 根据权利要求1至14任一项所述的方法,其特征在于,所述第一终端类型具有TA预补偿能力,且所述第二终端类型不具有TA预补偿能力;或者,所述第一终端类型具有GNSS定位能力,且所述第二终端类型不具有GNSS定位能力;或者,所述第一终端类型具有TA预补偿能力和GNSS定位能力,且所述第二终端类型不具有TA预补偿能力和/或GNSS定位能力。
- 根据权利要求1至15任一项所述的方法,其特征在于,所述第一信息包括小区禁止cellBarred信息,所述cellBarred信息指示Barred表示禁止接入,所述cellBarred信息指示NotBarred表示允许接入。
- 根据权利要求1至15任一项所述的方法,其特征在于,所述第一信息包括随机接入资源配置信息,所述随机接入资源配置信息用于指示允许接入或禁止接入。
- 根据权利要求17所述的方法,其特征在于,所述随机接入资源配置信息与所述第一终端类型存在关联,表示所述小区允许所述第一终端类型对应的终端设备接入;和/或,所述随机接入资源配置信息与所述第二终端类型存在关联,表示所述小区允许所述第一终端类型对应的终端设备接入。
- 根据权利要求1至15任一项所述的方法,其特征在于,所述第一信息包括统一接入控制UAC配置信息,所述UAC配置信息用于所述终端设备根据UAC检查结果确定所述小区允许接入或禁止接入。
- 根据权利要求19所述的方法,其特征在于,在基于所述第一终端类型对应的UAC配置信息执行UAC检查通过的情况下,确定所述小区允许所述第一终端类型对应的终端设备接入;和/或,在基于所述第二终端类型对应的UAC配置信息执行UAC检查通过的情况下,确定所述小区允许所述第一终端类型对应的终端设备接入。
- 根据权利要求1至20任一项所述的方法,其特征在于,所述方法还包括:接收所述网络设备通过系统信息发送的所述第一信息。
- 根据权利要求21所述的方法,其特征在于,所述第一信息完整地在一个主信息块MIB中;或者,所述第一信息完整地在一个系统信息块SIB中;或者,所述第一信息分散在一个MIB和至少一个SIB中;或者,所述第一信息分散在多个SIB中。
- 一种小区接入控制方法,其特征在于,所述方法由网络设备执行,所述方法包括:发送第一信息,终端设备用于根据接收到的所述第一信息和所述终端设备所属的终端类型,确定所述网络设备对应的小区允许或禁止所述终端设备接入;其中,所述终端类型至少包括第一终端类型和第二终端类型,所述第一信息用于确定所述第一终端类型和第二终端类型中每种终端类型对应的终端设备被允许或被禁止接入所述小区。
- 根据权利要求23所述的方法,其特征在于,所述终端设备根据确定的所述小区允许或者禁止所述终端设备接入的结果,接入或者不接入所述小区。
- 根据权利要求23或24所述的方法,其特征在于,在所述终端设备属于所述第一终端类型的情况下,若所述第一信息指示所述小区允许所述第一终端类型对应的终端设备接入,则所述终端设备确定所述小区允许所述终端设备接入。
- 根据权利要求25所述的方法,其特征在于,所述终端设备使用配置给所述第一终端类型的随机接入资源进行随机接入。
- 根据权利要求25所述的方法,其特征在于,在所述第一信息指示所述小区禁止所述第一终端类型对应的终端设备接入的情况下,若所述第一信息指示所述小区允许所述第二终端类型对应的终端设备接入,则所述终端设备确定所述小区允许所述终端设备接入。
- 根据权利要求27所述的方法,其特征在于,所述终端设备使用配置给所述第二终端类型的随机接入资源进行随机接入。
- 根据权利要求25所述的方法,其特征在于,在所述第一信息指示所述小区禁止所述第一终端类型对应的终端设备接入的情况下,若所述第一信息指示所述小区禁止所述第二终端类型对应的终端设备接 入,则所述终端设备确定所述小区禁止所述终端设备接入。
- 根据权利要求23或24所述的方法,其特征在于,在所述终端设备属于所述第一终端类型的情况下,若所述第一信息指示所述小区允许所述第一终端类型对应的终端设备和/或所述第二终端类型对应的终端设备接入,则所述终端设备确定所述小区允许所述终端设备接入。
- 根据权利要求30所述的方法,其特征在于,若所述第一信息指示所述小区允许所述第一终端类型对应的终端设备和所述第二终端类型对应的终端设备接入,或者,所述第一信息指示所述小区允许所述第一终端类型对应的终端设备接入,且禁止所述第二终端类型对应的终端设备接入,则所述终端设备使用配置给所述第一终端类型的随机接入资源进行随机接入;或者,若所述第一信息指示所述小区允许所述第二终端类型对应的终端设备接入,且禁止所述第一终端类型对应的终端设备接入,则所述终端设备使用配置给所述第二终端类型的随机接入资源进行随机接入。
- 根据权利要求23或24所述的方法,其特征在于,在所述终端设备属于所述第一终端类型的情况下,若所述第一信息指示所述小区禁止所述第一终端类型对应的终端设备和所述第二终端类型对应的终端设备接入,则所述终端设备确定所述小区禁止所述终端设备接入。
- 根据权利要求23至32任一项所述的方法,其特征在于,在所述终端设备属于所述第二终端类型的情况下,若所述第一信息指示所述小区允许所述第二终端类型对应的终端设备接入,则所述终端设备确定所述小区允许所述终端设备接入。
- 根据权利要求33所述的方法,其特征在于,所述终端设备使用配置给所述第二终端类型的随机接入资源进行随机接入。
- 根据权利要求33所述的方法,其特征在于,若所述第一信息指示所述小区禁止所述第二终端类型对应的终端设备接入,则所述终端设备确定所述小区禁止所述终端设备接入。
- 根据权利要求23至35任一项所述的方法,其特征在于,所述终端类型基于以下至少一项能力确定:定时提前TA预补偿能力、全球导航卫星系统GNSS定位能力。
- 根据权利要求23至36任一项所述的方法,其特征在于,所述第一终端类型具有TA预补偿能力,且所述第二终端类型不具有TA预补偿能力;或者,所述第一终端类型具有GNSS定位能力,且所述第二终端类型不具有GNSS定位能力;或者,所述第一终端类型具有TA预补偿能力和GNSS定位能力,且所述第二终端类型不具有TA预补偿能力和/或GNSS定位能力。
- 根据权利要求23至37任一项所述的方法,其特征在于,所述第一信息包括小区禁止cellBarred信息,所述cellBarred信息指示Barred表示禁止接入,所述cellBarred信息指示NotBarred表示允许接入。
- 根据权利要求23至37任一项所述的方法,其特征在于,所述第一信息包括随机接入资源配置信息,所述随机接入资源配置信息用于指示允许接入或禁止接入。
- 根据权利要求39所述的方法,其特征在于,所述随机接入资源配置信息与所述第一终端类型存在关联,表示所述小区允许所述第一终端类型对应的终端设备接入;和/或,所述随机接入资源配置信息与所述第二终端类型存在关联,表示所述小区允许所述第一终端类型对应的终端设备接入。
- 根据权利要求23至37任一项所述的方法,其特征在于,所述第一信息包括统一接入控制UAC配置信息,所述UAC配置信息用于所述终端设备根据UAC检查结果确定所述小区允许接入或禁止接入。
- 根据权利要求41所述的方法,其特征在于,在基于所述第一终端类型对应的UAC配置信息执行UAC检查通过的情况下,所述终端设备确定所述小区允许所述第一终端类型对应的终端设备接入;和/或,在基于所述第二终端类型对应的UAC配置信息执行UAC检查通过的情况下,所述终端设备确定所述小区允许所述第一终端类型对应的终端设备接入。
- 根据权利要求23至42任一项所述的方法,其特征在于,所述发送第一信息,包括:通过系统信息发送所述第一信息。
- 根据权利要求43所述的方法,其特征在于,所述第一信息完整地在一个主信息块MIB中;或者,所述第一信息完整地在一个系统信息块SIB中;或者,所述第一信息分散在一个MIB和至少一个SIB中;或者,所述第一信息分散在多个SIB中。
- 一种小区接入控制装置,其特征在于,所述装置包括:确定模块,用于根据来自网络设备的第一信息和所述终端设备所属的终端类型,确定所述网络设备对应的小区允许或禁止所述终端设备接入;其中,所述终端类型至少包括第一终端类型和第二终端类型,所述第一信息用于确定所述第一终端类型和第二终端类型中每种终端类型对应的终端设备被允许或被禁止接入所述小区。
- 一种小区接入控制装置,其特征在于,所述装置包括:发送模块,用于发送第一信息,终端设备用于根据接收到的所述第一信息和所述终端设备所属的终端类型,确定所述网络设备对应的小区允许或禁止所述终端设备接入;其中,所述终端类型至少包括第一终端类型和第二终端类型,所述第一信息用于确定所述第一终端类型和第二终端类型中每种终端类型对应的终端设备被允许或被禁止接入所述小区。
- 一种终端设备,其特征在于,所述终端设备包括处理器;所述处理器,用于根据来自网络设备的第一信息和所述终端设备所属的终端类型,确定所述网络设备对应的小区允许或禁止所述终端设备接入;其中,所述终端类型至少包括第一终端类型和第二终端类型,所述第一信息用于确定所述第一终端类型和第二终端类型中每种终端类型对应的终端设备被允许或被禁止接入所述小区。
- 一种网络设备,其特征在于,所述网络设备包括收发器;所述收发器,用于发送第一信息,终端设备用于根据接收到的所述第一信息和所述终端设备所属的终端类型,确定所述网络设备对应的小区允许或禁止所述终端设备接入;其中,所述终端类型至少包括第一终端类型和第二终端类型,所述第一信息用于确定所述第一终端类型和第二终端类型中每种终端类型对应的终端设备被允许或被禁止接入所述小区。
- 一种计算机可读存储介质,其特征在于,所述存储介质中存储有计算机程序,所述计算机程序用于被处理器执行,以实现如权利要求1至22任一项所述的小区接入控制方法,或者如权利要求23至44任一项所述的小区接入控制方法。
- 一种芯片,其特征在于,所述芯片包括可编程逻辑电路和/或程序指令,当所述芯片运行时,用于实现如权利要求1至22任一项所述的小区接入控制方法,或者如权利要求23至44任一项所述的小区接入控制方法。
- 一种计算机程序产品或计算机程序,其特征在于,所述计算机程序产品或计算机程序包括计算机指令,所述计算机指令存储在计算机可读存储介质中,处理器从所述计算机可读存储介质读取并执行所述计算机指令,以实现如权利要求1至22任一项所述的小区接入控制方法,或者如权利要求23至44任一项所述的小区接入控制方法。
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202180097855.9A CN117280762A (zh) | 2021-05-21 | 2021-05-21 | 小区接入控制方法、装置、设备及存储介质 |
EP21940247.6A EP4284068A4 (en) | 2021-05-21 | 2021-05-21 | CELL ACCESS CONTROL METHOD AND APPARATUS, DEVICE, AND STORAGE MEDIUM |
PCT/CN2021/095333 WO2022241794A1 (zh) | 2021-05-21 | 2021-05-21 | 小区接入控制方法、装置、设备及存储介质 |
US18/243,337 US20230422147A1 (en) | 2021-05-21 | 2023-09-07 | Cell access control method, terminal device, and network device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2021/095333 WO2022241794A1 (zh) | 2021-05-21 | 2021-05-21 | 小区接入控制方法、装置、设备及存储介质 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US18/243,337 Continuation US20230422147A1 (en) | 2021-05-21 | 2023-09-07 | Cell access control method, terminal device, and network device |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2022241794A1 true WO2022241794A1 (zh) | 2022-11-24 |
Family
ID=84140139
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2021/095333 WO2022241794A1 (zh) | 2021-05-21 | 2021-05-21 | 小区接入控制方法、装置、设备及存储介质 |
Country Status (4)
Country | Link |
---|---|
US (1) | US20230422147A1 (zh) |
EP (1) | EP4284068A4 (zh) |
CN (1) | CN117280762A (zh) |
WO (1) | WO2022241794A1 (zh) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103210686A (zh) * | 2010-11-12 | 2013-07-17 | 株式会社Ntt都科摩 | 移动通信系统及移动终端 |
CN104584462A (zh) * | 2012-07-10 | 2015-04-29 | Lg电子株式会社 | 在无线通信系统中执行接入等级限制的方法和设备 |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2021028850A1 (en) * | 2019-08-15 | 2021-02-18 | Telefonaktiebolaget Lm Ericsson (Publ) | RANDOM ACCESS IN NETWORK SUPPORTING UEs WITH DIFFERENT PRE-COMPENSATION AND/OR GNSS CAPABILITIES |
CN111918359A (zh) * | 2020-07-03 | 2020-11-10 | 中兴通讯股份有限公司 | 接入控制方法、第一网络节点、第二网络节点及存储介质 |
EP4266758A4 (en) * | 2020-12-17 | 2024-02-21 | Beijing Xiaomi Mobile Software Co Ltd | ACCESS CONTROL METHOD, ACCESS CONTROL DEVICE AND STORAGE MEDIUM |
-
2021
- 2021-05-21 EP EP21940247.6A patent/EP4284068A4/en active Pending
- 2021-05-21 CN CN202180097855.9A patent/CN117280762A/zh active Pending
- 2021-05-21 WO PCT/CN2021/095333 patent/WO2022241794A1/zh active Application Filing
-
2023
- 2023-09-07 US US18/243,337 patent/US20230422147A1/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103210686A (zh) * | 2010-11-12 | 2013-07-17 | 株式会社Ntt都科摩 | 移动通信系统及移动终端 |
CN104584462A (zh) * | 2012-07-10 | 2015-04-29 | Lg电子株式会社 | 在无线通信系统中执行接入等级限制的方法和设备 |
Non-Patent Citations (2)
Title |
---|
SAMSUNG: "Considerations on access barring and UE capability", 3GPP DRAFT; R1-2003913, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. RAN WG1, no. e-Meeting; 20200525 - 20200605, 15 May 2020 (2020-05-15), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France , XP051885679 * |
See also references of EP4284068A4 * |
Also Published As
Publication number | Publication date |
---|---|
CN117280762A (zh) | 2023-12-22 |
EP4284068A1 (en) | 2023-11-29 |
EP4284068A4 (en) | 2024-03-27 |
US20230422147A1 (en) | 2023-12-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2023123514A1 (zh) | Gnss有效性的处理方法、装置、设备及存储介质 | |
WO2022073247A1 (zh) | 网络选择方法、装置、设备及存储介质 | |
US20230189136A1 (en) | Cell selection method and apparatus, device and medium | |
US20240088993A1 (en) | Relay determination method and apparatus, remote device and storage medium | |
WO2022077141A1 (zh) | 随机接入响应接收窗的确定方法、装置、设备及介质 | |
WO2022241794A1 (zh) | 小区接入控制方法、装置、设备及存储介质 | |
WO2022241793A1 (zh) | 小区接入控制方法、装置、设备及存储介质 | |
WO2022205232A1 (zh) | 覆盖增强等级的确定方法、配置方法、装置及存储介质 | |
US11877254B2 (en) | Systems and methods to avail services of a network | |
WO2022116099A1 (zh) | 随机接入的触发控制方法、装置、设备及存储介质 | |
EP4050925A1 (en) | Method and apparatus for information transmission, device, and storage medium | |
CN117044324A (zh) | 一种随机接入方法、电子设备及存储介质 | |
US20230269686A1 (en) | Method and apparatus for reporting timing advance in ntn, method and apparatus for receiving timing advance in ntn, and device | |
WO2023230844A1 (zh) | 小区参数的配置方法、装置、设备及存储介质 | |
WO2023015406A1 (zh) | 通信方法及装置 | |
US20240031960A1 (en) | Synchronization method and apparatus, and terminal device, and network device | |
WO2022021308A1 (zh) | 带宽检查方法、装置、计算机设备及存储介质 | |
US20230403068A1 (en) | Method for time-domain parameter determination, terminal device, and network device | |
WO2023050401A1 (zh) | 无线通信方法和设备 | |
EP4340494A1 (en) | Wireless communication method, terminal device, and network device | |
WO2022261948A1 (zh) | 随机接入方法及装置 | |
WO2023240413A1 (zh) | 随机接入方法、装置、设备及存储介质 | |
WO2023039809A1 (zh) | Sr触发方法、随机接入方法、装置、设备及存储介质 | |
US20230018952A1 (en) | Physical channel monitoring method, terminal device, and non-transitory computer-readable storage medium | |
WO2023082191A1 (zh) | 一种无线通信方法、装置、通信设备及存储介质 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 21940247 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2021940247 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref document number: 2021940247 Country of ref document: EP Effective date: 20230824 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 202180097855.9 Country of ref document: CN |
|
NENP | Non-entry into the national phase |
Ref country code: DE |