WO2023102743A1 - 接入控制方法及装置 - Google Patents

接入控制方法及装置 Download PDF

Info

Publication number
WO2023102743A1
WO2023102743A1 PCT/CN2021/136164 CN2021136164W WO2023102743A1 WO 2023102743 A1 WO2023102743 A1 WO 2023102743A1 CN 2021136164 W CN2021136164 W CN 2021136164W WO 2023102743 A1 WO2023102743 A1 WO 2023102743A1
Authority
WO
WIPO (PCT)
Prior art keywords
access control
relay
cell
selection
reselection
Prior art date
Application number
PCT/CN2021/136164
Other languages
English (en)
French (fr)
Inventor
杨星
Original Assignee
北京小米移动软件有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 北京小米移动软件有限公司 filed Critical 北京小米移动软件有限公司
Priority to CN202180004409.9A priority Critical patent/CN114342483B/zh
Priority to PCT/CN2021/136164 priority patent/WO2023102743A1/zh
Publication of WO2023102743A1 publication Critical patent/WO2023102743A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/08Reselecting an access point
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/15Setup of multiple wireless link connections
    • H04W76/16Involving different core network technologies, e.g. a packet-switched [PS] bearer in combination with a circuit-switched [CS] bearer
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Definitions

  • the present disclosure relates to the field of communication technologies, and in particular, to an access control method and device.
  • a terminal device may not be directly connected to a network device, but communicates with a network device through the relay of another terminal device.
  • a terminal device that is not connected to a network device is called a remote (remote) terminal device.
  • a terminal device with a relay function is called a relay terminal device, and the remote terminal device communicates with the relay terminal device through a sidelink (sidelink) unicast communication.
  • the timer T390 will be started. However, if the remote terminal device performs cell reselection, the selected cell is still the cell that was previously camped on through the relay, or, if the remote terminal device performs relay reselection, the cell that is camped on through the new relay is still the cell that was previously camped on through the relay. In the cell where the old relay resides, in this case, the terminal device will stop the timer T390. At this time, the access control fails, and the terminal device will continuously initiate access, which will cause network congestion.
  • the embodiment of the first aspect of the present disclosure provides an access control method, the method is executed by a terminal device, and the method includes: when the terminal device is in an access control forbidden state, according to cell selection, cell reselection, A selection result of relay reselection or relay selection determines whether to stop the access control prohibition state.
  • the terminal device when the terminal device is in the access control prohibited state, it is determined whether to stop the access control prohibited state according to the selection result of cell selection, cell reselection, relay reselection or relay selection.
  • the terminal equipment according to the selection result of cell selection, cell reselection, relay reselection or relay selection of the terminal equipment, it is determined whether the terminal equipment stops the access control prohibition state, so that when determining When the state of access control prohibition is not stopped (that is, maintained), it is prohibited to initiate access to the network, which can alleviate the situation of network congestion.
  • the determining whether to stop the access control prohibited state according to the selection result of cell selection, cell reselection, relay reselection or relay selection includes:
  • it also includes:
  • the cell reselection includes:
  • the relay reselection or relay selection includes:
  • the relay selection is performed without connecting to the network device through the relay corresponding to the terminal device.
  • the cell reselection is triggered by any of the following conditions:
  • the access control prohibited state is controlled by T390, wherein, when the T390 is running, it corresponds to the access control prohibited state, and when the T390 is stopped, it corresponds to stopping the access control prohibited state.
  • T390 when the T390 is running, it corresponds to the access control prohibited state, and when the T390 is stopped, it corresponds to stopping the access control prohibited state.
  • the access control prohibition state should be kept correspondingly.
  • the embodiment of the second aspect of the present disclosure provides an access control device, the access control device has some or all functions of the terminal device in the method described in the first aspect above, for example, the function of the access control device can have this
  • the functions in some or all of the embodiments in the disclosure may also have the function of implementing any one of the embodiments in the present disclosure independently.
  • the functions described above may be implemented by hardware, or may be implemented by executing corresponding software on the hardware.
  • the hardware or software includes one or more units or modules corresponding to the above functions.
  • the embodiment of the third aspect of the present disclosure provides an access control device, the device includes a processor, and when the processor invokes a computer program in a memory, it executes the method described in the first aspect above.
  • the embodiment of the fourth aspect of the present disclosure provides another access control device, which includes a processor and a memory, where a computer program is stored in the memory, and when the computer program is executed by the processor, the above-mentioned first step is performed.
  • the embodiment of the fifth aspect of the present disclosure provides another access control device, the device includes a processor and an interface circuit, the interface circuit is used to receive code instructions and transmit them to the processor, and the processor is used to run the code instructions so that the device executes the method described in the first aspect above.
  • the embodiment of the sixth aspect of the present disclosure provides a communication system.
  • the system includes the access control device described in the second aspect, or the system includes the access control device described in the third aspect, or the system includes the access control device described in the third aspect.
  • the embodiment of the seventh aspect of the present disclosure provides a computer-readable storage medium for storing instructions used by the above-mentioned terminal device, and when the instructions are executed, the terminal device executes the method described in the above-mentioned first aspect .
  • the embodiment of the eighth aspect of the present disclosure provides a computer program product including a computer program, which, when running on a computer, causes the computer to execute the method described in the first aspect above.
  • the embodiment of the ninth aspect of the present disclosure provides a chip system, the chip system includes at least one processor and an interface, used to support the network device to implement the functions involved in the first aspect, for example, determine or process the At least one of data and information.
  • the chip system further includes a memory, and the memory is used for saving necessary computer programs and data of the network device.
  • the system-on-a-chip may consist of chips, or may include chips and other discrete devices.
  • the embodiment of the tenth aspect of the present disclosure provides a computer program that, when running on a computer, causes the computer to execute the method described in the first aspect above.
  • FIG. 1 is a schematic structural diagram of a communication system provided by an embodiment of the present disclosure
  • FIG. 2 is a schematic flowchart of an access control method provided by an embodiment of the present disclosure
  • FIG. 3 is a schematic flowchart of another access control method provided by an embodiment of the present disclosure.
  • FIG. 4 is a schematic flowchart of another access control method provided by an embodiment of the present disclosure.
  • FIG. 5 is a schematic flowchart of another access control method provided by an embodiment of the present disclosure.
  • FIG. 6 is a schematic structural diagram of an access control device provided by an embodiment of the present disclosure.
  • FIG. 7 is a schematic structural diagram of another access control device provided by an embodiment of the present disclosure.
  • FIG. 8 is a schematic structural diagram of a chip provided by an embodiment of the present disclosure.
  • FIG. 1 is a schematic structural diagram of a communication system provided by an embodiment of the present disclosure.
  • the communication system may include, but is not limited to, a network device and a terminal device.
  • the number and shape of the devices shown in Figure 1 are for example only and do not constitute a limitation to the embodiments of the present disclosure. In practical applications, two or more network equipment, two or more terminal equipment.
  • the communication system shown in FIG. 1 includes one network device 101 and one terminal device 102 as an example.
  • LTE long term evolution
  • 5th generation 5th generation
  • 5G new radio new radio, NR
  • other future new mobile communication systems etc.
  • the network device 101 in the embodiment of the present disclosure is an entity on the network side for transmitting or receiving signals.
  • the network device 101 may be an evolved base station (evolved NodeB, eNB), a transmission reception point (transmission reception point or transmit receive point, TRP), a next generation base station (next generation NodeB, gNB) in the NR system, or other future mobile A base station in a communication system or an access node in a wireless fidelity (Wireless Fidelity, WiFi) system, etc.
  • eNB evolved base station
  • TRP transmission reception point or transmit receive point
  • next generation NodeB next generation NodeB
  • gNB next generation NodeB
  • the embodiments of the present disclosure do not limit the specific technology and specific device form adopted by the network device.
  • the network device provided by the embodiment of the present disclosure may be composed of a centralized unit (central unit, CU) and a distributed unit (distributed unit, DU), wherein the CU may also be called a control unit (control unit), and the CU-DU
  • the structure of the network device such as the protocol layer of the base station, can be separated, and the functions of some protocol layers are placed in the centralized control of the CU, and the remaining part or all of the functions of the protocol layer are distributed in the DU, and the CU centrally controls the DU.
  • the terminal device 102 in the embodiment of the present disclosure is an entity on the user side for receiving or transmitting signals, such as a mobile phone.
  • the terminal equipment may also be called terminal equipment (terminal), user equipment (user equipment, UE), mobile station (mobile station, MS), mobile terminal equipment (mobile terminal, MT) and so on.
  • the terminal device can be a car with communication functions, a smart car, a mobile phone, a wearable device, a tablet computer (Pad), a computer with a wireless transceiver function, a virtual reality (VR) terminal device, an augmented reality (augmented reality (AR) terminal equipment, wireless terminal equipment in industrial control (industrial control), wireless terminal equipment in self-driving (self-driving), wireless terminal equipment in remote medical surgery (remote medical surgery), smart grid ( Wireless terminal devices in smart grid, wireless terminal devices in transportation safety, wireless terminal devices in smart city, wireless terminal devices in smart home, etc.
  • the embodiments of the present disclosure do not limit the specific technology and specific device form adopted by the terminal device.
  • a terminal device when a terminal device needs to connect to the network, it needs to perform unified access control detection first. If the access control detection fails, the timer T390 will be started. During the running of the timer T390, the terminal device is prohibited from initiating access. During the running of the timer T390, if the terminal equipment in the idle state or the inactive state performs cell reselection, the timer T390 is stopped.
  • a terminal device may not be directly connected to a network device, but communicates with a network device through the relay of another terminal device.
  • a terminal device that is not connected to a network device is called a remote (remote) terminal device.
  • a terminal device with a relay function is called a relay terminal device, and the remote terminal device communicates with the relay terminal device through a sidelink (sidelink) unicast communication.
  • the relay terminal device and the remote terminal device can be in RRC (radio resource control, radio resource control) idle state or inactive state, when the remote terminal device has data to be relayed, the relay terminal device can be triggered to establish RRC Connect and enter the RRC connection state.
  • RRC radio resource control, radio resource control
  • the remote terminal device when the remote terminal device camps on a cell through the relay terminal device, if the access control detection fails, the timer T390 will be started. However, if the remote terminal device performs cell reselection, the selected cell is still the cell that was camped on through the relay before. In addition, if the remote terminal device performs relay reselection, the cell that is camped on through the new relay is still the cell that was camped on through the previous relay. In the cell where the old relay resides, in this case, the remote terminal device will stop the timer T390, causing the access control to fail and causing network congestion.
  • the present disclosure provides access control methods and devices.
  • FIG. 2 is a schematic flowchart of an access control method provided by an embodiment of the present disclosure.
  • the access control method may be executed by a terminal device in the communication system shown in FIG. 1 .
  • the access control method may include but not limited to the following steps:
  • Step 201 when the terminal device is in the access control prohibited state, determine whether to stop the access control prohibited state according to the selection result of cell selection, cell reselection, relay reselection or relay selection.
  • the terminal device can select a cell without accessing the network.
  • cell reselection may include that the terminal device connects to the network device through a relay corresponding to the terminal device, and performs cell reselection.
  • the relay reselection may include that the terminal device connects to the network device through a relay corresponding to the terminal device, and performs relay reselection. That is, when the terminal device is connected to the network device through the corresponding relay, it can trigger relay reselection and perform relay reselection to connect to the network device through the reselected relay.
  • relay selection may include that the terminal device does not connect to the network device through the relay corresponding to the terminal device, and performs relay selection. For example, when the terminal device is directly connected to the network device, it may trigger relay selection, and perform relay selection, so as to connect to the network device through the selected relay. Alternatively, the terminal device may also trigger relay selection when not connected to the network, and perform relay selection, so as to connect to the network device through the selected relay.
  • the access control prohibited state is a state in which the terminal device is prohibited from access control.
  • the access control is controlled by the timer T390, and the access control prohibited state corresponds to the running of the timer T390.
  • the terminal device may be determined whether the terminal device stops access control barring according to the selection result of the terminal device's cell selection, cell reselection, relay reselection, or relay selection. state.
  • the terminal device stops the access control prohibition state, it can initiate access to the network, and when it is determined not to stop (that is, maintain) the access control prohibition state, it is prohibited to initiate access to the network.
  • the terminal device when the terminal device is in the access control prohibited state, it is determined whether to stop the access control prohibited state according to the selection result of cell selection, cell reselection, relay reselection or relay selection .
  • the terminal equipment according to the selection result of cell selection, cell reselection, relay reselection or relay selection of the terminal equipment, it is determined whether the terminal equipment stops the access control prohibition state, so that when determining When the state of access control prohibition is not stopped (that is, maintained), it is prohibited to initiate access to the network, which can alleviate the situation of network congestion.
  • FIG. 3 is a schematic flowchart of another access control method provided by an embodiment of the present disclosure.
  • the access control method may be executed by a terminal device in the communication system shown in FIG. 1 .
  • the access control method may be executed alone, or may be executed in combination with any embodiment in the present disclosure or a possible implementation in the embodiment, or may be executed in combination with any technical solution in related technologies .
  • the access control method may include but not limited to the following steps:
  • Step 301 when the terminal equipment is in the state of access control prohibition, in response to the selection result of cell selection, cell reselection, relay reselection or relay selection, perform cell selection, cell reselection, relay reselection or relay selection for the terminal equipment
  • the camping cell before relay selection is different from the current camping cell after cell selection, cell reselection, relay reselection or relay selection, and the access control prohibition state is stopped.
  • the explanations of the access control prohibited state, cell selection, cell reselection, relay reselection or relay selection can be referred to any embodiment of the present disclosure, and will not be repeated here.
  • the cell where the terminal device resides before cell selection can be determined, or the cell where the terminal device resides before cell reselection is determined, or the cell where the terminal device resides before relay reselection is determined , or, determine the camping cell before the terminal device performs relay selection.
  • the current cell where the terminal device resides after performing cell selection or determine the current cell where the terminal device resides after performing cell reselection, or determine the current cell where the terminal device resides after performing relay reselection.
  • the current camping cell, or the current camping cell after the terminal device performs relay selection is determined.
  • the selection result of cell selection, cell reselection, relay reselection or relay selection is the cell where the terminal device resides before cell selection, cell reselection, relay reselection or relay selection If it is different from the current camping cell, it may be determined that the terminal device stops the access control prohibition state.
  • the access control prohibition state corresponds to the running of the timer T390.
  • the terminal device performs cell selection, cell reselection, relay reselection or relay selection, the cell where it resides is different from the cell where it currently resides.
  • Timer T390 can be stopped.
  • the terminal device when the terminal device is in the access control prohibited state, it is determined whether to stop the access control prohibited state according to the selection result of cell selection, cell reselection, relay reselection or relay selection .
  • the terminal equipment according to the selection result of cell selection, cell reselection, relay reselection or relay selection of the terminal equipment, it is determined whether the terminal equipment stops the access control prohibition state, so that when determining When the state of access control prohibition is not stopped (that is, maintained), it is prohibited to initiate access to the network, which can alleviate the situation of network congestion.
  • FIG. 4 is a schematic flowchart of another access control method provided by an embodiment of the present disclosure.
  • the access control method may be executed by a terminal device in the communication system shown in FIG. 1 .
  • the access control method may be executed alone, or may be executed in combination with any embodiment in the present disclosure or a possible implementation in the embodiment, or may be executed in combination with any technical solution in related technologies .
  • the access control method may include but not limited to the following steps:
  • Step 401 when the terminal device is in the state of access control prohibition, perform cell selection, cell reselection, relay reselection or relay selection for the terminal device in response to the selection result of cell selection, cell reselection, relay reselection or relay selection
  • the camping cell before relay selection is the same as the current camping cell after cell selection, cell reselection, relay reselection or relay selection, and the access control prohibition state remains.
  • the camping cell before the terminal device performs cell selection, cell reselection, relay reselection or relay selection, the camping cell and the current cell after cell selection, cell reselection, relay reselection or relay selection
  • the camping cells In the case that the camping cells are the same, it is determined that the terminal equipment maintains (that is, does not stop) the access control forbidden state.
  • the access control prohibition state corresponds to the running of the timer T390.
  • the terminal device performs cell selection, cell reselection, relay reselection or relay selection, the cell where it resides is the same as the cell where it currently resides. Timer T390 may not be stopped.
  • the terminal device when the terminal device is in the access control prohibited state, it is determined whether to stop the access control prohibited state according to the selection result of cell selection, cell reselection, relay reselection or relay selection .
  • the terminal equipment according to the selection result of cell selection, cell reselection, relay reselection or relay selection of the terminal equipment, it is determined whether the terminal equipment stops the access control prohibition state, so that when determining When the state of access control prohibition is not stopped (that is, maintained), it is prohibited to initiate access to the network, which can alleviate the situation of network congestion.
  • FIG. 5 is a schematic flowchart of another access control method provided by an embodiment of the present disclosure.
  • the access control method may be executed by a terminal device in the communication system shown in FIG. 1 .
  • the access control method may be executed alone, or may be executed in combination with any embodiment in the present disclosure or a possible implementation in the embodiment, or may be executed in combination with any technical solution in related technologies .
  • the access control method may include but not limited to the following steps:
  • Step 501 when the terminal device is in the access control prohibited state, determine whether to stop the access control prohibited state according to the selection result of cell selection, cell reselection, relay reselection or relay selection; wherein, the access control prohibited state It is controlled by the timer T390.
  • T390 When T390 is running, it corresponds to the access control prohibited state.
  • T390 When T390 is stopped, it corresponds to the stop of the access control prohibited state.
  • T390 is not stopped, it corresponds to the access control prohibited state.
  • a terminal device may connect to a network device through a relay corresponding to the terminal device to perform cell reselection.
  • the terminal device may connect to the network device through the relay corresponding to the terminal device to perform relay reselection.
  • the terminal device may not connect to the network device through the relay corresponding to the terminal device to perform relay selection.
  • cell reselection may be triggered by an access stratum condition of a terminal device in an idle state or an inactive state.
  • cell reselection may be triggered by re-establishment.
  • the terminal device may be determined whether the terminal device stops access control barring according to the selection result of the terminal device's cell selection, cell reselection, relay reselection, or relay selection. state.
  • the timer T390 may be stopped, and when it is determined that the terminal equipment does not stop (that is, maintain) the access control forbidden state, the timer T390 may not be stopped.
  • the terminal device when the terminal device is in the access control prohibited state, it is determined whether to stop the access control prohibited state according to the selection result of cell selection, cell reselection, relay reselection or relay selection .
  • the terminal equipment according to the selection result of cell selection, cell reselection, relay reselection or relay selection of the terminal equipment, it is determined whether the terminal equipment stops the access control prohibition state, so that when determining When the state of access control prohibition is not stopped (that is, maintained), it is prohibited to initiate access to the network, which can alleviate the situation of network congestion.
  • the terminal device when the terminal device is in the access control prohibited state, it may be determined whether to stop the access control prohibited state according to the selection result of cell reselection or relay selection of the terminal device.
  • the timer T390 when the timer T390 is running, if the terminal device performs cell reselection and the cell in which it resides after the cell reselection is different from the cell in which it resides before the cell reselection, the timer T390 is stopped.
  • the terminal device when the timer T390 is running, when the terminal device is directly connected to the network device, the terminal device is connected to the network device through the corresponding relay, for example, when the terminal device is directly connected to the network device In this case, the terminal device selects a relay and connects to the network device through the selected relay. At this time, if the terminal device performs cell reselection, and the cell after If the remaining cells are different, stop the timer T390.
  • the timer T390 when the timer T390 is running, if the terminal equipment performs relay selection or relay reselection, and the camped cell after relay reselection or relay selection is the same as before relay reselection or relay selection If the residential cells are different, stop the timer T390.
  • cell reselection and relay reselection may be triggered by access stratum conditions of terminal equipment in idle state and inactive state, or may be triggered by reestablishment.
  • the methods provided in the embodiments of the present disclosure are introduced from the perspective of a terminal device.
  • the terminal device may include a hardware structure and a software module, and realize the above various functions in the form of a hardware structure, a software module, or a hardware structure plus a software module.
  • a certain function among the above-mentioned functions may be implemented in the form of a hardware structure, a software module, or a hardware structure plus a software module.
  • FIG. 6 is a schematic structural diagram of an access control device 60 provided by an embodiment of the present disclosure.
  • the access control device 60 shown in FIG. 6 may include a processing unit 601 .
  • the access control device 60 may also include a transceiver unit, the transceiver unit may include a sending unit and/or a receiving unit, the sending unit is used to realize the sending function, the receiving unit is used to realize the receiving function, and the sending and receiving unit can realize sending function and/or receive function.
  • the access control device 60 may be a terminal device, or a device in the terminal device, or a device that can be matched with the terminal device.
  • the access control device 60 is a terminal device: a processing unit 601 configured to determine whether to stop accessing according to the selection result of cell selection, cell reselection, relay reselection or relay selection when the terminal device is in the access control forbidden state. into the control disabled state.
  • the above-mentioned processing unit 601 is specifically configured to: perform cell selection, cell reselection, relay reselection or the camping cell before relay selection, cell selection, and cell reselection for the terminal device in response to the selection result 1.
  • the current camping cell after relay reselection or relay selection is different, and the access control prohibited state is stopped.
  • the above processing unit 601 is specifically configured to: in response to the selection result, perform cell selection, cell reselection, relay reselection, or relay selection for the terminal device before the camping cell is the same as the current camping cell, Keep Access Control Disabled.
  • the cell reselection includes: connecting to the network device through a relay corresponding to the terminal device, and performing cell reselection.
  • the relay reselection or relay selection includes: connecting to the network device through the relay corresponding to the terminal device, and performing relay reselection; or, not connecting to the network device through the relay corresponding to the terminal device, performing Trunk selection.
  • cell reselection is triggered by any one of the following conditions: triggered by an access stratum condition of a terminal device in an idle state or an inactive state; and triggered by re-establishment.
  • the access control prohibited state is controlled by T390, wherein when T390 is running, it corresponds to the access control prohibited state, when T390 is stopped, it corresponds to the access control prohibited state, and when T390 is not stopped, it corresponds to maintaining the access control Prohibited state.
  • FIG. 7 is a schematic structural diagram of another access control device provided by an embodiment of the present disclosure.
  • the access control apparatus 70 may be a terminal device, and may also be a chip, a chip system, or a processor that supports the terminal device to implement the foregoing method.
  • the device can be used to implement the methods described in the above method embodiments, and for details, refer to the descriptions in the above method embodiments.
  • the access control device 70 may include one or more processors 701 .
  • the processor 701 may be a general-purpose processor or a special-purpose processor or the like. For example, it can be a baseband processor or a central processing unit.
  • the baseband processor can be used to process communication protocols and communication data
  • the central processor can be used to control access control devices (such as base stations, baseband chips, terminal equipment, terminal equipment chips, DU or CU, etc.), execute A computer program that processes data for a computer program.
  • the access control device 70 may further include one or more memories 702, on which a computer program 703 may be stored, and the processor 701 executes the computer program 703, so that the access control device 70 executes the above method embodiments. described method.
  • the computer program 703 may be solidified in the processor 701, and in this case, the processor 701 may be implemented by hardware.
  • data may also be stored in the memory 702 .
  • the access control device 70 and the memory 702 can be set separately or integrated together.
  • the access control device 70 may further include a transceiver 705 and an antenna 706 .
  • the transceiver 705 may be called a transceiver unit, a transceiver, or a transceiver circuit, etc., and is used to implement a transceiver function.
  • the transceiver 705 may include a receiver and a transmitter, and the receiver may be called a receiver or a receiving circuit for realizing a receiving function; the transmitter may be called a transmitter or a sending circuit for realizing a sending function.
  • the access control device 70 may further include one or more interface circuits 707 .
  • the interface circuit 707 is used to receive code instructions and transmit them to the processor 701 .
  • the processor 701 runs code instructions to enable the access control device 70 to execute the methods described in the foregoing method embodiments.
  • the access control apparatus 70 is a terminal device: a processor 701 configured to execute any one of the foregoing method embodiments of the present disclosure.
  • the processor 701 may include a transceiver for implementing receiving and sending functions.
  • the transceiver may be a transceiver circuit, or an interface, or an interface circuit.
  • the transceiver circuits, interfaces or interface circuits for realizing the functions of receiving and sending can be separated or integrated together.
  • the above-mentioned transceiver circuit, interface or interface circuit may be used for reading and writing code/data, or the above-mentioned transceiver circuit, interface or interface circuit may be used for signal transmission or transfer.
  • the access control device 70 may include a circuit, and the circuit may implement the function of sending or receiving or communicating in the foregoing method embodiments.
  • the processors and transceivers described in this disclosure can be implemented on integrated circuits (integrated circuits, ICs), analog ICs, radio frequency integrated circuits (RFICs), mixed signal ICs, application specific integrated circuits (ASICs), printed circuit boards ( printed circuit board, PCB), electronic equipment, etc.
  • the processor and transceiver can also be fabricated using various IC process technologies such as complementary metal oxide semiconductor (CMOS), nMetal-oxide-semiconductor (NMOS), P-type Metal oxide semiconductor (positive channel metal oxide semiconductor, PMOS), bipolar junction transistor (bipolar junction transistor, BJT), bipolar CMOS (BiCMOS), silicon germanium (SiGe), gallium arsenide (GaAs), etc.
  • CMOS complementary metal oxide semiconductor
  • NMOS nMetal-oxide-semiconductor
  • PMOS P-type Metal oxide semiconductor
  • BJT bipolar junction transistor
  • BiCMOS bipolar CMOS
  • SiGe silicon germanium
  • GaAs gallium arsenide
  • a set of one or more ICs may also include storage components for storing data and computer programs;
  • ASIC such as modem (Modem);
  • the access control device may be a chip or a chip system
  • the chip shown in FIG. 8 includes a processor 801 and an interface 802 .
  • the number of processors 801 may be one or more, and the number of interfaces 802 may be more than one.
  • Interface 802 used to transmit code instructions to the processor
  • the processor 801 is configured to run code instructions to execute the methods shown in FIG. 2 to FIG. 5 .
  • the chip further includes a memory 803 for storing necessary computer programs and data.
  • An embodiment of the present disclosure further provides a communication system, the system includes the access control apparatus as the terminal device in the foregoing embodiment in FIG. 7 , or the system includes the access control device as the terminal device in the foregoing embodiment in FIG. 8 .
  • the present disclosure also provides a readable storage medium on which instructions are stored, and when the instructions are executed by a computer, the functions of any one of the above method embodiments are realized.
  • the present disclosure also provides a computer program product, which implements the functions of any one of the above method embodiments when executed by a computer.
  • all or part of them may be implemented by software, hardware, firmware or any combination thereof.
  • software When implemented using software, it may be implemented in whole or in part in the form of a computer program product.
  • the computer program product comprises one or more computer programs. When the computer program is loaded and executed on the computer, all or part of the processes or functions according to the embodiments of the present disclosure will be generated.
  • the computer can be a general purpose computer, a special purpose computer, a computer network, or other programmable devices.
  • the computer program can be stored in or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer program can be downloaded from a website, computer, server or data center Transmission to another website site, computer, server or data center by wired (such as coaxial cable, optical fiber, digital subscriber line (DSL)) or wireless (such as infrared, wireless, microwave, etc.).
  • the computer-readable storage medium may be any available medium that can be accessed by a computer, or a data storage device such as a server or a data center integrated with one or more available media.
  • the available medium may be a magnetic medium (for example, a floppy disk, a hard disk, a magnetic tape), an optical medium (for example, a high-density digital video disc (digital video disc, DVD)), or a semiconductor medium (for example, a solid state disk (solid state disk, SSD)) etc.
  • a magnetic medium for example, a floppy disk, a hard disk, a magnetic tape
  • an optical medium for example, a high-density digital video disc (digital video disc, DVD)
  • a semiconductor medium for example, a solid state disk (solid state disk, SSD)
  • At least one in the present disclosure can also be described as one or more, and a plurality can be two, three, four or more, and the present disclosure is not limited.
  • the technical feature is distinguished by "first”, “second”, “third”, “A”, “B”, “C” and “D”, etc.
  • the technical features described in the “first”, “second”, “third”, “A”, “B”, “C” and “D” have no sequence or order of magnitude among the technical features described.
  • the word “if” may be construed as “at” or “when” or “in response to a determination.”
  • each table in the present disclosure may be configured or predefined.
  • the values of the information in each table are just examples, and may be configured as other values, which are not limited in the present disclosure.
  • the corresponding relationship shown in some rows may not be configured.
  • appropriate deformation adjustments can be made based on the above table, for example, splitting, merging, and so on.
  • the names of the parameters shown in the titles of the above tables may also adopt other names understandable by the communication device, and the values or representations of the parameters may also be other values or representations understandable by the communication device.
  • other data structures can also be used, for example, arrays, queues, containers, stacks, linear tables, pointers, linked lists, trees, graphs, structures, classes, heaps, hash tables or hash tables can be used wait.
  • Predefinition in the present disclosure can be understood as definition, predefinition, storage, prestorage, prenegotiation, preconfiguration, curing, or prefiring.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

一种接入控制方法及装置,可以应用于移动通信技术中,方法包括:当终端设备处于接入控制禁止状态时,根据小区选择、小区重选、中继重选或中继选择的选择结果,确定是否停止接入控制禁止状态。由此,根据终端设备的小区选择的选择结果、小区重选的选择结果、中继重选的选择结果或中继选择的选择结果,确定该终端设备是否停止接入控制禁止状态,从而在确定不停止(即保持)接入控制禁止状态时,禁止向网络发起接入,可以缓解网络拥塞的情况。

Description

接入控制方法及装置 技术领域
本公开涉及通信技术领域,尤其涉及一种接入控制方法及装置。
背景技术
终端设备可以不直接与网络设备连接,而通过另外一个终端设备的中继,来实现与网络设备的通信,其中,未与网络设备连接的终端设备称为远端(remote)终端设备,提供中继功能的终端设备称为中继(relay)终端设备,远端终端设备与中继终端设备之间通过侧行链路(sidelink)单播通信。
目前,当远端终端设备通过中继终端设备驻留到一个小区时,如果接入控制检测失败,会启动定时器T390。但是,如果远端终端设备进行了小区重选,选择的小区还是之前通过中继驻留的小区,或者,如果远端终端设备进行中继重选,通过新中继驻留的小区还是之前通过旧中继驻留的小区,在这种情况下,终端设备会停止定时器T390,此时,接入控制失效,终端设备会不停的发起接入,进而造成网络拥塞。
发明内容
本公开第一方面实施例提供了一种接入控制方法,所述方法由终端设备执行,所述方法包括:当所述终端设备处于接入控制禁止状态时,根据小区选择、小区重选、中继重选或中继选择的选择结果,确定是否停止所述接入控制禁止状态。
在该技术方案中,当终端设备处于接入控制禁止状态时,根据小区选择、小区重选、中继重选或中继选择的选择结果,确定是否停止接入控制禁止状态。由此,根据终端设备的小区选择的选择结果、小区重选的选择结果、中继重选的选择结果或中继选择的选择结果,确定该终端设备是否停止接入控制禁止状态,从而在确定不停止(即保持)接入控制禁止状态时,则禁止向网络发起接入,可以缓解网络拥塞的情况。
在一种可能的实现方式中,所述根据小区选择、小区重选、中继重选或中继选择的选择结果,确定是否停止所述接入控制禁止状态,包括:
响应于所述选择结果为所述终端设备进行所述小区选择、小区重选、中继重选或中继选择之前的驻留小区和所述小区选择、小区重选、中继重选或中继选择之后的当前驻留小区不同,停止所述接入控制禁止状态。
在一种可能的实现方式中,还包括:
响应于所述选择结果为所述终端设备进行所述小区选择、小区重选、中继重选或中继选择之前的驻留小区和所述当前驻留小区相同,保持所述接入控制禁止状态。
在一种可能的实现方式中,所述小区重选包括:
通过所述终端设备对应的中继连接到网络设备,进行小区重选。
在一种可能的实现方式中,所述中继重选或中继选择包括:
通过所述终端设备对应的中继连接到网络设备,进行所述中继重选;
或,不通过所述终端设备对应的中继连接到网络设备,进行中继选择。
在一种可能的实现方式中,所述小区重选由以下任意一种条件触发:
处于空闲状态或非激活状态的所述终端设备的接入层条件触发;
重建触发。
在一种可能的实现方式中,所述接入控制禁止状态由T390控制,其中,当所述T390运行时对应接入控制禁止状态,当停止所述T390时对应停止接入控制禁止状态,当不停止T390时对应保持接入控制禁止状态。
本公开第二方面实施例提供了一种接入控制装置,该接入控制装置具有实现上述第一方面所述的方法中终端设备的部分或全部功能,比如接入控制装置的功能可具备本公开中的部分或全部实施例中的功能,也可以具备单独实施本公开中的任一个实施例的功能。所述功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。所述硬件或软件包括一个或多个与上述功能相对应的单元或模块。
本公开第三方面实施例提供了一种接入控制装置,该装置包括处理器,当该处理器调用存储器中的计算机程序时,执行上述第一方面所述的方法。
本公开第四方面实施例提供了另一种接入控制装置,该装置包括处理器和存储器,所述存储器中存储有计算机程序,当所述计算机程序被所述处理器执行时,执行上述第一方面所述的方法。
本公开第五方面实施例提供了另一种接入控制装置,该装置包括处理器和接口电路,该接口电路用于接收代码指令并传输至该处理器,该处理器用于运行所述代码指令以使该装置执行上述第一方面所述的方法。
本公开第六方面实施例提供了一种通信系统,该系统包括第二方面所述的接入控制装置,或者,该系统包括第三方面所述的接入控制装置,或者,该系统包括第四方面所述的接入控制装置,或者,该系统包括第五方面所述的接入控制装置。
本公开第七方面实施例提供了一种计算机可读存储介质,用于储存为上述终端设备所用的指令,当所述指令被执行时,使所述终端设备执行上述第一方面所述的方法。
本公开第八方面实施例提供了一种包括计算机程序的计算机程序产品,当其在计算机上运行时,使得计算机执行上述第一方面所述的方法。
本公开第九方面实施例提供了一种芯片系统,该芯片系统包括至少一个处理器和接口,用于支持网络设备实现第一方面所涉及的功能,例如,确定或处理上述方法中所涉及的数据和信息中的至少一种。在一种可能的设计中,所述芯片系统还包括存储器,所述存储器,用于保存网络设备必要的计算机程序和数据。该芯片系统,可以由芯片构成,也可以包括芯片和其他分立器件。
本公开第十方面实施例提供了一种计算机程序,当其在计算机上运行时,使得计算机执行上述第一方面所述的方法。
附图说明
为了更清楚地说明本公开实施例或背景技术中的技术方案,下面将对本公开实施例或背景技术中所需要使用的附图进行说明。
图1是本公开实施例提供的一种通信系统的架构示意图;
图2是本公开实施例提供的一种接入控制方法的流程示意图;
图3是本公开实施例提供的另一种接入控制方法的流程示意图;
图4是本公开实施例提供的另一种接入控制方法的流程示意图;
图5是本公开实施例提供的另一种接入控制方法的流程示意图;
图6是本公开实施例提供的一种接入控制装置的结构示意图;
图7是本公开实施例提供的另一种接入控制装置的结构示意图;
图8是本公开实施例提供的一种芯片的结构示意图。
具体实施方式
为了更好的理解本公开实施例公开的一种接入控制方法,下面首先对本公开实施例适用的通信系统进行描述。
为使本公开的目的、技术方案和优点更加清楚,下面将结合附图对本公开实施方式作进一步地详细描述。
这里将详细地对示例性实施例进行说明,其示例表示在附图中。下面的描述涉及附图时除非另有表示,不同附图中的相同数字表示相同或相似的要素。以下示例性实施例中所描述的实施方式并不代表与本公开相一致的所有实施方式。相反,它们仅是与如所附权利要求书中所详述的、本公开的一些方面相一致的装置和方法的例子。
请参见图1,图1为本公开实施例提供的一种通信系统的架构示意图。该通信系统可包括但不限于一个网络设备和一个终端设备,图1所示的设备数量和形态仅用于举例并不构成对本公开实施例的限定,实际应用中可以包括两个或两个以上的网络设备,两个或两个以上的终端设备。图1所示的通信系统以包括一个网络设备101、一个终端设备102为例。
需要说明的是,本公开实施例的技术方案可以应用于各种通信系统。例如:长期演进(long term evolution,LTE)系统、第五代(5th generation,5G)移动通信系统、5G新空口(new radio,NR)系统,或者其他未来的新型移动通信系统等。
本公开实施例中的网络设备101是网络侧的一种用于发射或接收信号的实体。例如,网络设备101可以为演进型基站(evolved NodeB,eNB)、传输接收点(transmission reception point或transmit receive point,TRP)、NR系统中的下一代基站(next generation NodeB,gNB)、其他未来移动通信系统中的基站或无线保真(wireless fidelity,WiFi)系统中的接入节点等。本公开的实施例对网络设备所采用的具体技术和具体设备形态不做限定。本公开实施例提供的网络设备可以是由集中单元(central unit,CU)与分布式单元(distributed unit,DU)组成的,其中,CU也可以称为控制单元(control unit),采用CU-DU的结构可以将网络设备,例如基站的协议层拆分开,部分协议层的功能放在CU集中控制,剩下部分或全部协议层的功能分布在DU中,由CU集中控制DU。
本公开实施例中的终端设备102是用户侧的一种用于接收或发射信号的实体,如手机。终端设备也可以称为终端设备(terminal)、用户设备(user equipment,UE)、移动台(mobile station,MS)、移动终端设备(mobile terminal,MT)等。终端设备可以是具备通信功能的汽车、智能汽车、手机(mobile phone)、穿戴式设备、平板电脑(Pad)、带无线收发功能的电脑、虚拟现实(virtual reality,VR)终端设备、增强现实(augmented reality,AR)终端设备、工业控制(industrial control)中的无线终端设备、无人驾驶(self-driving)中的无线终端设备、远程手术(remote medical surgery)中的无线终端设备、智能电网(smart grid)中的无线终端设备、运输安全(transportation safety)中的无线终端设备、智慧城市(smart city)中的无线终端设备、智慧家庭(smart home)中的无线终端设备等等。本公开的实施例对终端设备所采用的具体技术和具体设备形态不做限定。
上述通信系统中,当终端设备需要连接网络时,需要首先进行统一的接入控制检测,如果接入控制检测失败,会启动定时器T390,在定时器T390运行期间,禁止该终端设备向网络发起接入。在定时器T390运行期间,如果处于空闲态或者非激活态的终端设备进行了小区重选,则停止定时器T390。
终端设备可以不直接与网络设备连接,而通过另外一个终端设备的中继,来实现与网络设备的通信,其中,未与网络设备连接的终端设备称为远端(remote)终端设备,提供中继功能的终端设备称为中继(relay)终端设备,远端终端设备与中继终端设备之间通过侧行链路(sidelink)单播通信。
其中,当远端终端设备通过中继终端设备与网络设备建立连接时,也需要进行统一的接入控制检测。
其中,中继终端设备和远端终端设备可以处于RRC(radio resource control,无线资源控制)空闲状态或者非激活状态,当远端终端设备有数据需要中继时,可以触发中继终端设备建立RRC连接,进入RRC连接态。
目前,当远端终端设备通过中继终端设备驻留到一个小区时,如果接入控制检测失败,会启动定时器T390。但是,如果远端终端设备进行了小区重选,选择的小区还是之前通过中继驻留的小区,此外,如果远端终端设备进行中继重选,通过新中继驻留的小区还是之前通过旧中继驻留的小区,在这种情况下,远端终端设备会停止定时器T390,导致接入控制失效,进而造成网络拥塞。
针对上述问题,本公开提供了接入控制方法及装置。
可以理解的是,本公开实施例描述的通信系统是为了更加清楚的说明本公开实施例的技术方案,并不构成对于本公开实施例提供的技术方案的限定,本领域普通技术人员可知,随着系统架构的演变和新业务场景的出现,本公开实施例提供的技术方案对于类似的技术问题,同样适用。
下面结合附图对本公开所提供的接入控制方法及装置进行详细地介绍。
请参见图2,图2是本公开实施例提供的一种接入控制方法的流程示意图。该接入控制方法可以由图1所示的通信系统中的终端设备执行。
如图2所示,该接入控制方法可以包括但不限于如下步骤:
步骤201,当终端设备处于接入控制禁止状态时,根据小区选择、小区重选、中继重选或中继选择的选择结果,确定是否停止接入控制禁止状态。
在本公开的任意一个实施例之中,终端设备可以在未接入网络的情况下,进行小区选择。
在本公开的任意一个实施例之中,小区重选可以包括终端设备通过该终端设备对应的中继连接到网络设备,进行小区重选。
在本公开的任意一个实施例之中,中继重选可以包括终端设备通过该终端设备对应的中继连接到网络设备,进行中继重选。即终端设备在通过对应的中继连接到网络设备的情 况下,可以触发中继重选,并进行中继重选,以通过重新选择的中继连接网络设备。
在本公开的任意一个实施例之中,中继选择可以包括终端设备不通过该终端设备对应的中继连接到网络设备,进行中继选择。例如,终端设备在与网络设备直接连接的情况下,可以触发中继选择,并进行中继选择,以通过选择的中继连接网络设备。或者,终端设备也可以在未接入网络的情况下,触发中继选择,并进行中继选择,以通过选择的中继连接网络设备。
在本公开实施例中,接入控制禁止状态为终端设备处于禁止接入控制的状态。
在本公开实施例中,接入控制是通过定时器T390控制的,接入控制禁止状态对应定时器T390运行。
在本公开实施例中,在终端设备处于接入控制禁止状态时,可以进行小区选择、小区重选、中继重选或中继选择。
在本公开实施例中,可以根据终端设备的小区选择的选择结果、小区重选的选择结果、中继重选的选择结果或中继选择的选择结果,确定该终端设备是否停止接入控制禁止状态。在确定终端设备停止接入控制禁止状态时,可以向网络发起接入,而在确定不停止(即保持)接入控制禁止状态时,则禁止向网络发起接入。
本公开实施例的接入控制方法,通过当终端设备处于接入控制禁止状态时,根据小区选择、小区重选、中继重选或中继选择的选择结果,确定是否停止接入控制禁止状态。由此,根据终端设备的小区选择的选择结果、小区重选的选择结果、中继重选的选择结果或中继选择的选择结果,确定该终端设备是否停止接入控制禁止状态,从而在确定不停止(即保持)接入控制禁止状态时,则禁止向网络发起接入,可以缓解网络拥塞的情况。
请参见图3,图3是本公开实施例提供的另一种接入控制方法的流程示意图。该接入控制方法可以由图1所示的通信系统中的终端设备执行。该接入控制方法可以单独被执行,也可以结合本公开中的任一个实施例或是实施例中的可能的实现方式一起被执行,还可以结合相关技术中的任一种技术方案一起被执行。
如图3所示,该接入控制方法可以包括但不限于如下步骤:
步骤301,当终端设备处于接入控制禁止状态时,响应于小区选择、小区重选、中继重选或中继选择的选择结果为终端设备进行小区选择、小区重选、中继重选或中继选择之前的驻留小区和小区选择、小区重选、中继重选或中继选择之后的当前驻留小区不同,停止接入控制禁止状态。
在本公开的实施例中,接入控制禁止状态、小区选择、小区重选、中继重选或中继选择的解释说明,可以参见本公开任一实施例,在此不做赘述。
在本公开实施例中,可以确定终端设备进行小区选择之前的驻留小区,或者,确定终 端设备进行小区重选之前的驻留小区,或者,确定终端设备进行中继重选之前的驻留小区,或者,确定终端设备进行中继选择之前的驻留小区。
在本公开实施例中,还可以确定终端设备进行小区选择之后的当前驻留小区,或者,确定终端设备进行小区重选之后的当前驻留小区,或者,确定终端设备进行中继重选之后的当前驻留小区,或者,确定终端设备进行中继选择之后的当前驻留小区。
在本公开实施例中,在小区选择、小区重选、中继重选或中继选择的选择结果为终端设备进行小区选择、小区重选、中继重选或中继选择之前的驻留小区和当前驻留小区不同的情况下,可以确定终端设备停止接入控制禁止状态。
作为一种示例,接入控制禁止状态对应定时器T390运行,在终端设备进行小区选择、小区重选、中继重选或中继选择之前的驻留小区和当前驻留小区不同的情况下,可以停止定时器T390。
本公开实施例的接入控制方法,通过当终端设备处于接入控制禁止状态时,根据小区选择、小区重选、中继重选或中继选择的选择结果,确定是否停止接入控制禁止状态。由此,根据终端设备的小区选择的选择结果、小区重选的选择结果、中继重选的选择结果或中继选择的选择结果,确定该终端设备是否停止接入控制禁止状态,从而在确定不停止(即保持)接入控制禁止状态时,则禁止向网络发起接入,可以缓解网络拥塞的情况。
需要说明的是,上述的这些可能的实现方式可以单独被执行,也可以结合在一起被执行,本公开实施例并不对此作出限定。
请参见图4,图4是本公开实施例提供的另一种接入控制方法的流程示意图。该接入控制方法可以由图1所示的通信系统中的终端设备执行。该接入控制方法可以单独被执行,也可以结合本公开中的任一个实施例或是实施例中的可能的实现方式一起被执行,还可以结合相关技术中的任一种技术方案一起被执行。
如图4所示,该接入控制方法可以包括但不限于如下步骤:
步骤401,当终端设备处于接入控制禁止状态时,响应于小区选择、小区重选、中继重选或中继选择的选择结果为终端设备进行小区选择、小区重选、中继重选或中继选择之前的驻留小区和小区选择、小区重选、中继重选或中继选择之后的当前驻留小区相同,保持接入控制禁止状态。
在本公开实施例中,在终端设备进行小区选择、小区重选、中继重选或中继选择之前的驻留小区和小区选择、小区重选、中继重选或中继选择之后的当前驻留小区相同的情况下,则确定终端设备保持(即不停止)接入控制禁止状态。
作为一种示例,接入控制禁止状态对应定时器T390运行,在终端设备进行小区选择、小区重选、中继重选或中继选择之前的驻留小区和当前驻留小区相同的情况下,可以不停止定时器T390。
本公开实施例的接入控制方法,通过当终端设备处于接入控制禁止状态时,根据小区选择、小区重选、中继重选或中继选择的选择结果,确定是否停止接入控制禁止状态。由此,根据终端设备的小区选择的选择结果、小区重选的选择结果、中继重选的选择结果或中继选择的选择结果,确定该终端设备是否停止接入控制禁止状态,从而在确定不停止(即保持)接入控制禁止状态时,则禁止向网络发起接入,可以缓解网络拥塞的情况。
需要说明的是,上述的这些可能的实现方式可以单独被执行,也可以结合在一起被执行,本公开实施例并不对此作出限定。
请参见图5,图5是本公开实施例提供的另一种接入控制方法的流程示意图。该接入控制方法可以由图1所示的通信系统中的终端设备执行。该接入控制方法可以单独被执行,也可以结合本公开中的任一个实施例或是实施例中的可能的实现方式一起被执行,还可以结合相关技术中的任一种技术方案一起被执行。
如图5所示,该接入控制方法可以包括但不限于如下步骤:
步骤501,当终端设备处于接入控制禁止状态时,根据小区选择、小区重选、中继重选或中继选择的选择结果,确定是否停止接入控制禁止状态;其中,接入控制禁止状态由定时器T390控制,当T390运行时对应接入控制禁止状态,当停止T390时对应停止接入控制禁止状态,当不停止T390时对应保持接入控制禁止状态。
在本公开的任意一个实施例之中,终端设备可以通过该终端设备对应的中继连接到网络设备,进行小区重选。
在本公开的任意一个实施例之中,终端设备可以通过该终端设备对应的中继连接到网络设备,进行中继重选。
在本公开的任意一个实施例之中,终端设备可以不通过该终端设备对应的中继连接到网络设备,进行中继选择。
在本公开的任意一个实施例之中,可以由处于空闲状态或非激活状态的终端设备的接入层条件触发小区重选。
在本公开的任意一个实施例之中,可以由重建触发小区重选。
在本公开实施例中,可以根据终端设备的小区选择的选择结果、小区重选的选择结果、中继重选的选择结果或中继选择的选择结果,确定该终端设备是否停止接入控制禁止状态。当确定终端设备停止接入控制禁止状态时,可以停止定时器T390,而当确定终端设备不停 止(即保持)接入控制禁止状态时,可以不停止定时器T390。
本公开实施例的接入控制方法,通过当终端设备处于接入控制禁止状态时,根据小区选择、小区重选、中继重选或中继选择的选择结果,确定是否停止接入控制禁止状态。由此,根据终端设备的小区选择的选择结果、小区重选的选择结果、中继重选的选择结果或中继选择的选择结果,确定该终端设备是否停止接入控制禁止状态,从而在确定不停止(即保持)接入控制禁止状态时,则禁止向网络发起接入,可以缓解网络拥塞的情况。
需要说明的是,上述的这些可能的实现方式可以单独被执行,也可以结合在一起被执行,本公开实施例并不对此作出限定。
在本公开的任意一个实施例之中,当终端设备处于接入控制禁止状态时,可以根据终端设备的小区重选的选择结果或中继选择的选择结果,确定是否停止接入控制禁止状态。
作为一种示例,当定时器T390运行时,如果终端设备进行小区重选,且小区重选之后的驻留小区与小区重选之前的驻留小区不同,则停止定时器T390。
作为另一种示例,当定时器T390运行时,当终端设备从与网络设备直接连接,变为该终端设备通过对应的中继与网络设备连接时,例如,在终端设备与网络设备直接连接的情况下,该终端设备进行中继选择,并通过选择的中继与网络设备连接,此时,如果该终端设备进行小区重选,且小区重选之后的驻留小区与小区重选之前的驻留小区不同,则停止定时器T390。
作为又一种示例,当定时器T390运行时,如果终端设备进行中继选择或中继重选,且中继重选或中继选择之后的驻留小区与中继重选或中继选择之前的驻留小区不同,则停止定时器T390。
其中,小区重选和中继重选可以由处于空闲状态和非激活状态的终端设备的接入层条件触发,也可以由重建触发。
上述本公开提供的实施例中,从终端设备的角度对本公开实施例提供的方法进行了介绍。为了实现上述本公开实施例提供的方法中的各功能,终端设备可以包括硬件结构、软件模块,以硬件结构、软件模块、或硬件结构加软件模块的形式来实现上述各功能。上述各功能中的某个功能可以以硬件结构、软件模块、或者硬件结构加软件模块的方式来执行。
请参见图6,为本公开实施例提供的一种接入控制装置60的结构示意图。图6所示的接入控制装置60可包括处理单元601。可选地,该接入控制装置60也可以包括收发单元,该收发单元可包括发送单元和/或接收单元,发送单元用于实现发送功能,接收单元用于实现接收功能,收发单元可以实现发送功能和/或接收功能。
接入控制装置60可以是终端设备,也可以是终端设备中的装置,还可以是能够与终端 设备匹配使用的装置。
接入控制装置60为终端设备:处理单元601,用于当终端设备处于接入控制禁止状态时,根据小区选择、小区重选、中继重选或中继选择的选择结果,确定是否停止接入控制禁止状态。
在一些实施例中,上述处理单元601,具体用于:响应于选择结果为终端设备进行小区选择、小区重选、中继重选或中继选择之前的驻留小区和小区选择、小区重选、中继重选或中继选择之后的当前驻留小区不同,停止接入控制禁止状态。
在一些实施例中,上述处理单元601,具体用于:响应于选择结果为终端设备进行小区选择、小区重选、中继重选或中继选择之前的驻留小区和当前驻留小区相同,保持接入控制禁止状态。
在一些实施例中,小区重选包括:通过终端设备对应的中继连接到网络设备,进行小区重选。
在一些实施例中,中继重选或中继选择包括:通过终端设备对应的中继连接到网络设备,进行中继重选;或,不通过终端设备对应的中继连接到网络设备,进行中继选择。
在一些实施例中,小区重选由以下任意一种条件触发:处于空闲状态或非激活状态的终端设备的接入层条件触发;重建触发。
在一些实施例中,接入控制禁止状态由T390控制,其中,当T390运行时对应接入控制禁止状态,当停止T390时对应停止接入控制禁止状态,当不停止T390时对应保持接入控制禁止状态。
需要说明的是,前述图2至图5任一实施例中对终端设备侧执行的方法的解释说明,也适用于该实施例的接入控制装置60,其实现原理类似,此处不做赘述。
请参见图7,图7是本公开实施例提供的另一种接入控制装置的结构示意图。接入控制装置70可以是终端设备,还可以是支持终端设备实现上述方法的芯片、芯片系统、或处理器等。该装置可用于实现上述方法实施例中描述的方法,具体可以参见上述方法实施例中的说明。
接入控制装置70可以包括一个或多个处理器701。处理器701可以是通用处理器或者专用处理器等。例如可以是基带处理器或中央处理器。基带处理器可以用于对通信协议以及通信数据进行处理,中央处理器可以用于对接入控制装置(如,基站、基带芯片,终端设备、终端设备芯片,DU或CU等)进行控制,执行计算机程序,处理计算机程序的数据。
可选的,接入控制装置70中还可以包括一个或多个存储器702,其上可以存有计算机程序703,处理器701执行计算机程序703,以使得接入控制装置70执行上述方法实施例 中描述的方法。计算机程序703可能固化在处理器701中,该种情况下,处理器701可能由硬件实现。
可选的,存储器702中还可以存储有数据。接入控制装置70和存储器702可以单独设置,也可以集成在一起。
可选的,接入控制装置70还可以包括收发器705、天线706。收发器705可以称为收发单元、收发机、或收发电路等,用于实现收发功能。收发器705可以包括接收器和发送器,接收器可以称为接收机或接收电路等,用于实现接收功能;发送器可以称为发送机或发送电路等,用于实现发送功能。
可选的,接入控制装置70中还可以包括一个或多个接口电路707。接口电路707用于接收代码指令并传输至处理器701。处理器701运行代码指令以使接入控制装置70执行上述方法实施例中描述的方法。
接入控制装置70为终端设备:处理器701,用于执行本公开上述任一方法实施例。
需要说明的是,前述图2至图5任一实施例中对接入控制方法的解释说明,也适用于该实施例的接入控制装置70,其实现原理类似,此处不做赘述。
在一种实现方式中,处理器701中可以包括用于实现接收和发送功能的收发器。例如该收发器可以是收发电路,或者是接口,或者是接口电路。用于实现接收和发送功能的收发电路、接口或接口电路可以是分开的,也可以集成在一起。上述收发电路、接口或接口电路可以用于代码/数据的读写,或者,上述收发电路、接口或接口电路可以用于信号的传输或传递。
在一种实现方式中,接入控制装置70可以包括电路,电路可以实现前述方法实施例中发送或接收或者通信的功能。本公开中描述的处理器和收发器可实现在集成电路(integrated circuit,IC)、模拟IC、射频集成电路RFIC、混合信号IC、专用集成电路(application specific integrated circuit,ASIC)、印刷电路板(printed circuit board,PCB)、电子设备等上。该处理器和收发器也可以用各种IC工艺技术来制造,例如互补金属氧化物半导体(complementary metal oxide semiconductor,CMOS)、N型金属氧化物半导体(nMetal-oxide-semiconductor,NMOS)、P型金属氧化物半导体(positive channel metal oxide semiconductor,PMOS)、双极结型晶体管(bipolar junction transistor,BJT)、双极CMOS(BiCMOS)、硅锗(SiGe)、砷化镓(GaAs)等。
以上实施例描述中的接入控制装置可以是终端设备,但本公开中描述的接入控制装置的范围并不限于此,而且接入控制装置的结构可以不受图7的限制。接入控制装置可以是独立的设备或者可以是较大设备的一部分。例如接入控制装置可以是:
(1)独立的集成电路IC,或芯片,或,芯片系统或子系统;
(2)具有一个或多个IC的集合,可选的,该IC集合也可以包括用于存储数据,计算机程序的存储部件;
(3)ASIC,例如调制解调器(Modem);
(4)可嵌入在其他设备内的模块;
(5)接收机、终端设备、智能终端设备、蜂窝电话、无线设备、手持机、移动单元、车载设备、网络设备、云设备、人工智能设备等等;
(6)其他等等。
对于接入控制装置可以是芯片或芯片系统的情况,可参见图8所示的芯片的结构示意图。图8所示的芯片包括处理器801和接口802。其中,处理器801的数量可以是一个或多个,接口802的数量可以是多个。
对于芯片用于实现本公开实施例中终端设备的功能的情况:
接口802,用于代码指令并传输至处理器;
处理器801,用于运行代码指令以执行如图2至图5的方法。
可选的,芯片还包括存储器803,存储器803用于存储必要的计算机程序和数据。
需要说明的是,前述图2至图5任一实施例中对接入控制方法的解释说明,也适用于该实施例的芯片,其实现原理类似,此处不做赘述。
本领域技术人员还可以了解到本公开实施例列出的各种说明性逻辑块(illustrative logical block)和步骤(step)可以通过电子硬件、电脑软件,或两者的结合进行实现。这样的功能是通过硬件还是软件来实现取决于特定的应用和整个系统的设计要求。本领域技术人员可以对于每种特定的应用,可以使用各种方法实现的功能,但这种实现不应被理解为超出本公开实施例保护的范围。
本公开实施例还提供一种通信系统,该系统包括前述图7实施例中作为终端设备的接入控制装置,或者,该系统包括前述图8实施例中作为终端设备的接入控制装置。
本公开还提供一种可读存储介质,其上存储有指令,该指令被计算机执行时实现上述任一方法实施例的功能。
本公开还提供一种计算机程序产品,该计算机程序产品被计算机执行时实现上述任一方法实施例的功能。
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机程序。在计算机上加载和执行所述计算机程序时,全部或部分地 产生按照本公开实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机程序可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机程序可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(digital subscriber line,DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质(例如,软盘、硬盘、磁带)、光介质(例如,高密度数字视频光盘(digital video disc,DVD))、或者半导体介质(例如,固态硬盘(solid state disk,SSD))等。
本领域普通技术人员可以理解:本公开中涉及的第一、第二等各种数字编号仅为描述方便进行的区分,并不用来限制本公开实施例的范围,也表示先后顺序。
本公开中的至少一个还可以描述为一个或多个,多个可以是两个、三个、四个或者更多个,本公开不做限制。在本公开实施例中,对于一种技术特征,通过“第一”、“第二”、“第三”、“A”、“B”、“C”和“D”等区分该种技术特征中的技术特征,该“第一”、“第二”、“第三”、“A”、“B”、“C”和“D”描述的技术特征间无先后顺序或者大小顺序。
可以理解的是,本公开中“多个”是指两个或两个以上,其它量词与之类似。“和/或”,描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。字符“/”一般表示前后关联对象是一种“或”的关系。单数形式的“一种”、“所述”和“该”也旨在包括多数形式,除非上下文清楚地表示其他含义。
在此所使用的词语“如果”可以被解释成为“在……时”或“当……时”或“响应于确定”。
本公开中各表所示的对应关系可以被配置,也可以是预定义的。各表中的信息的取值仅仅是举例,可以配置为其他值,本公开并不限定。在配置信息与各参数的对应关系时,并不一定要求必须配置各表中示意出的所有对应关系。例如,本公开中的表格中,某些行示出的对应关系也可以不配置。又例如,可以基于上述表格做适当的变形调整,例如,拆分,合并等等。上述各表中标题示出参数的名称也可以采用通信装置可理解的其他名称,其参数的取值或表示方式也可以通信装置可理解的其他取值或表示方式。上述各表在实现时,也可以采用其他的数据结构,例如可以采用数组、队列、容器、栈、线性表、指针、链表、树、图、结构体、类、堆、散列表或哈希表等。
本公开中的预定义可以理解为定义、预先定义、存储、预存储、预协商、预配置、固化、或预烧制。
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本公开的范围。
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
以上所述,仅为本公开的具体实施方式,但本公开的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本公开揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本公开的保护范围之内。因此,本公开的保护范围应以所述权利要求的保护范围为准。

Claims (11)

  1. 一种接入控制方法,其特征在于,由终端设备执行,所述方法包括:
    当所述终端设备处于接入控制禁止状态时,根据小区选择、小区重选、中继重选或中继选择的选择结果,确定是否停止所述接入控制禁止状态。
  2. 如权利要求1所述的方法,其特征在于,所述根据小区选择、小区重选、中继重选或中继选择的选择结果,确定是否停止所述接入控制禁止状态,包括:
    响应于所述选择结果为所述终端设备进行所述小区选择、小区重选、中继重选或中继选择之前的驻留小区和所述小区选择、小区重选、中继重选或中继选择之后的当前驻留小区不同,停止所述接入控制禁止状态。
  3. 如权利要求2所述的方法,其特征在于,还包括:
    响应于所述选择结果为所述终端设备进行所述小区选择、小区重选、中继重选或中继选择之前的驻留小区和所述当前驻留小区相同,保持所述接入控制禁止状态。
  4. 如权利要求1所述的方法,其特征在于,所述小区重选包括:
    通过所述终端设备对应的中继连接到网络设备,进行小区重选。
  5. 如权利要求1所述的方法,其特征在于,所述中继重选或中继选择包括:
    通过所述终端设备对应的中继连接到网络设备,进行所述中继重选;
    或,不通过所述终端设备对应的中继连接到网络设备,进行中继选择。
  6. 如权利要求1所述的方法,其特征在于,所述小区重选由以下任意一种条件触发:
    处于空闲状态或非激活状态的所述终端设备的接入层条件触发;
    重建触发。
  7. 如权利要求1所述的方法,其特征在于,所述接入控制禁止状态由T390控制,其中,当所述T390运行时对应接入控制禁止状态,当停止所述T390时对应停止接入控制禁止状态,当不停止T390时对应保持接入控制禁止状态。
  8. 一种接入控制装置,其特征在于,应用于终端设备,包括:
    处理单元,用于当所述终端设备处于接入控制禁止状态时,根据小区选择、小区重选、中继重选或中继选择的选择结果,确定是否停止所述接入控制禁止状态。
  9. 一种接入控制装置,其特征在于,所述装置包括处理器和存储器,所述存储器中存储有计算机程序,当所述计算机程序被所述处理器执行时,执行如权利要求1至7中任一项所述的方法。
  10. 一种接入控制装置,其特征在于,包括:处理器和接口电路;
    所述接口电路,用于接收代码指令并传输至所述处理器;
    所述处理器,用于运行所述代码指令以执行如权利要求1至7中任一项所述的方法。
  11. 一种计算机可读存储介质,用于存储有指令,当所述指令被执行时,使如权利要求1至7中任一项所述的方法被实现。
PCT/CN2021/136164 2021-12-07 2021-12-07 接入控制方法及装置 WO2023102743A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202180004409.9A CN114342483B (zh) 2021-12-07 2021-12-07 接入控制方法及装置
PCT/CN2021/136164 WO2023102743A1 (zh) 2021-12-07 2021-12-07 接入控制方法及装置

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2021/136164 WO2023102743A1 (zh) 2021-12-07 2021-12-07 接入控制方法及装置

Publications (1)

Publication Number Publication Date
WO2023102743A1 true WO2023102743A1 (zh) 2023-06-15

Family

ID=81022714

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/136164 WO2023102743A1 (zh) 2021-12-07 2021-12-07 接入控制方法及装置

Country Status (2)

Country Link
CN (1) CN114342483B (zh)
WO (1) WO2023102743A1 (zh)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115278814A (zh) * 2021-04-30 2022-11-01 夏普株式会社 由侧行通信远端ue执行的方法及用户设备
CN115280888A (zh) * 2022-06-13 2022-11-01 北京小米移动软件有限公司 一种接入控制的方法及装置

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107079368A (zh) * 2014-05-16 2017-08-18 联发科技(新加坡)私人有限公司 移动终端接入网络的增强机制
CN110621080A (zh) * 2018-06-19 2019-12-27 夏普株式会社 接入控制方法及用户设备
US20210266817A1 (en) * 2018-06-21 2021-08-26 Telefonaktiebolaget Lm Ericsson (Publ) Stop of Barring Timers

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102892177B (zh) * 2011-07-20 2018-01-02 中兴通讯股份有限公司 一种终端接入控制处理方法及装置
CN110351872B (zh) * 2018-04-02 2024-04-30 夏普株式会社 接入控制方法及用户设备
WO2020091684A1 (en) * 2018-11-01 2020-05-07 Telefonaktiebolaget Lm Ericsson (Publ) Radio network area update in a wireless communication system
CN112954771B (zh) * 2021-02-19 2023-04-14 Oppo广东移动通信有限公司 一种接入控制方法及终端、存储介质

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107079368A (zh) * 2014-05-16 2017-08-18 联发科技(新加坡)私人有限公司 移动终端接入网络的增强机制
CN110621080A (zh) * 2018-06-19 2019-12-27 夏普株式会社 接入控制方法及用户设备
US20210266817A1 (en) * 2018-06-21 2021-08-26 Telefonaktiebolaget Lm Ericsson (Publ) Stop of Barring Timers

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
XIAOMI: "Discussion on connection control", 3GPP DRAFT; R2-2110222, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. RAN WG2, no. Electronic; 20211101 - 20211112, 22 October 2021 (2021-10-22), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France, XP052066668 *

Also Published As

Publication number Publication date
CN114342483B (zh) 2024-05-07
CN114342483A (zh) 2022-04-12

Similar Documents

Publication Publication Date Title
CN113396611B (zh) 接入失败处理方法、装置、终端设备和存储介质
WO2023028962A1 (zh) 一种信息传输方法和装置
WO2022233064A1 (zh) 一种释放远端终端设备的方法及其装置
WO2023000149A1 (zh) 一种中继终端设备测量上报的方法及其装置
WO2023102743A1 (zh) 接入控制方法及装置
WO2023039852A1 (zh) 系统信息传输方法和装置
WO2023151065A1 (zh) 初始带宽部分配置方法及装置、初始带宽部分切换方法及装置
WO2024000531A1 (zh) 一种循环前缀扩展cpe的发送方法及其装置
WO2023201756A1 (zh) 一种用于基于条件的移动性的信息的处理方法及装置
WO2023164951A1 (zh) 一种智能中继时分复用图样的确定方法及其装置
WO2023240419A1 (zh) 一种接入控制的方法及装置
WO2024060143A1 (zh) 一种上报方法/装置/设备及存储介质
WO2023245453A1 (zh) 一种消息传输方法/装置/设备及存储介质
WO2024000208A1 (zh) 一种定时提前报告tar的触发方法、装置、设备及存储介质
WO2024045042A1 (zh) 一种能力交互触发方法/装置/设备及存储介质
WO2023102689A1 (zh) 一种基于四步随机接入的第三条消息重复的覆盖增强方法
WO2023130321A1 (zh) 一种数据压缩方法和装置
WO2023010429A1 (zh) 一种带宽部分的同步方法及其装置
WO2023108655A1 (zh) 一种确定直连链路非连续接收配置的方法及其装置
WO2023108369A1 (zh) 资源确定方法和装置
WO2023164851A1 (zh) 侧行链路监听方法及装置
WO2024036519A1 (zh) 一种侧行链路pdcp复用的激活方法及装置
WO2023173257A1 (zh) 一种请求系统信息的方法及其装置
WO2024092532A1 (zh) 一种侧行链路harq rtt定时器的启动或重启方法及装置
WO2023122990A1 (zh) 物理随机接入信道prach的传输方法和装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21966667

Country of ref document: EP

Kind code of ref document: A1