CN112055336A - Method for identifying priority of alarm information - Google Patents

Method for identifying priority of alarm information Download PDF

Info

Publication number
CN112055336A
CN112055336A CN202010860166.6A CN202010860166A CN112055336A CN 112055336 A CN112055336 A CN 112055336A CN 202010860166 A CN202010860166 A CN 202010860166A CN 112055336 A CN112055336 A CN 112055336A
Authority
CN
China
Prior art keywords
priority
alarm information
emergency
primary
generation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010860166.6A
Other languages
Chinese (zh)
Inventor
吴宗鸿
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Hongcheng Technology Co ltd
Original Assignee
Zhejiang Hongcheng Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Hongcheng Technology Co ltd filed Critical Zhejiang Hongcheng Technology Co ltd
Priority to CN202010860166.6A priority Critical patent/CN112055336A/en
Publication of CN112055336A publication Critical patent/CN112055336A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/70Services for machine-to-machine communication [M2M] or machine type communication [MTC]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/0268Traffic management, e.g. flow control or congestion control using specific QoS parameters for wireless networks, e.g. QoS class identifier [QCI] or guaranteed bit rate [GBR]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/50Allocation or scheduling criteria for wireless resources
    • H04W72/56Allocation or scheduling criteria for wireless resources based on priority criteria
    • H04W72/566Allocation or scheduling criteria for wireless resources based on priority criteria of the information or information source or recipient

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides a method for identifying the priority of alarm information, which comprises an access request step, wherein an equipment receiving end sends an access request; the priority generation step comprises a priority primary generation sub-step and a priority secondary generation sub-step, wherein the priority primary generation sub-step is configured with a first priority and a priority primary generation strategy information identifier which is obtained according to a priority primary generation strategy and generates a first priority, and the equipment data factor is obtained according to a priority secondary generation strategy and generates a second priority; comparing the alarm information standard value with an alarm information set value, if the alarm information standard value is larger than the alarm information set value, judging whether the first priority meets a first emergency priority judgment condition or not according to a verification judgment strategy, and whether the second priority meets a second emergency priority judgment condition or not; and generating a corresponding output result signal at the base station according to the judgment condition, and feeding the output result signal back to the equipment receiving end. The invention can improve the access rate of the equipment and reduce the time delay.

Description

Method for identifying priority of alarm information
Technical Field
The invention relates to the technical field of data processing, in particular to a method for identifying priority of alarm information.
Background
MTC brings very different characteristics to current mobile communication systems such as extreme power limitation, mostly very low data rates, intermittent data, very large number of devices and generally low mobility. The SAE/LTE system may be optimized for these MTC features and thus architecture enhancements may be needed, where these architecture enhancements may fit the MTC features while minimizing the impact of the current network.
In recent years, with the increasing maturity of cellular network technology and low-power wide area network technology, M2M has been developed rapidly, and various M2M service applications have come into force. However, due to the large number of M2M communication terminals, when a large number of M2M terminals initiate random access requests at the same time, problems of collision, network congestion and excessive delay are caused. On the other hand, the problem that a large number of M2M terminals are used for a pipeline of shared resources is called an access management problem, and to solve the problem, the access problem of each device receiving end needs to be solved, which is a key part of M2M communication management, so that competing terminals need to be allocated to enable resource allocation to meet the maximization of a continuous number, and energy consumption is minimum while ensuring service quality. Generally, the types of devices at the device receiving end are not completely the same, the device receiving end may be classified according to several key parameters, and the priority is divided according to the different parameters, and the alarm information standard value stored at the device receiving end is used as a parameter matched with the identity of the device receiving end, and cannot be associated with the preset alarm information setting value and the priority of the device, that is, it is difficult to configure and integrate resources according to the condition of the device receiving end.
Disclosure of Invention
In view of this, the present invention provides a method for identifying priority of alarm information.
In order to solve the technical problems, the invention adopts the technical scheme that: a method of alert information priority identification, the method comprising: an access request step, a priority generation step, a verification step and a result generation step;
the access request step is configured with an information identifier and a device data factor, and an access request is sent through a device receiving end;
the priority generation step comprises a priority primary generation sub-step and a priority secondary generation sub-step, wherein the priority primary generation sub-step is configured with a first priority and a priority primary generation strategy, and the information identifier is obtained according to the priority primary generation strategy and generates the first priority; the priority secondary generation sub-step is configured with a second priority and a priority secondary generation strategy, and the equipment data factor is obtained and generated according to the priority secondary generation strategy;
the verification step is configured with an alarm information standard value, an alarm information set value and a verification judgment strategy, the alarm information standard value is compared with the alarm information set value, if the alarm information standard value is larger than the alarm information set value, whether the first priority meets a first emergency priority judgment condition is judged according to the verification judgment strategy, and the verification judgment strategy is continuously called to judge whether the second priority meets a second emergency priority judgment condition;
and the result generation step is to generate a corresponding output result signal at the base station according to the alarm information standard value, the first priority and the second priority, and the output result signal is fed back to the equipment receiving end.
In the present invention, preferably, the first emergency priority is configured with a first primary priority, a first secondary priority and a first tail priority, and the first emergency priority determination condition is that the first priority is the first primary priority or the first secondary priority.
In the present invention, preferably, the second emergency priority is configured with a second primary priority, a second secondary priority and a second tail priority, and the second emergency priority determination condition is that the second priority is the second primary priority or the second secondary priority.
In the present invention, preferably, the output result signal includes an access permission result and an access barring result, and if the first emergency priority determination condition and the second emergency priority determination condition are satisfied at the same time, the access permission result is correspondingly output, otherwise, the access barring result is correspondingly output.
In the present invention, preferably, the verification determination policy further configures a system delay time and an access request initiation policy, and determines whether the system delay time is overtime and whether there is a data initiation transmission signal according to the access request initiation policy, if so, then sends an access request to the base station, otherwise, there is no action.
In the present invention, preferably, the output result signal is a blocking access result, the count is one, the accumulated count is a blocking amount, and when the blocking amount is greater than a preset blocking threshold, the second emergency priority determination condition is that the second priority is a second tail priority.
In the present invention, preferably, the device receiving end is configured with a plurality of random access resources, and when the number of the device receiving ends is less than or equal to the number of the random access resources, the value of the device data factor is 1; when the number of the receiving ends of the equipment is larger than the number of the random access resources, the value of the data factor of the equipment is L/E (N),
Figure BDA0002645928610000031
the device data factor is H, the number of the device receiving ends is E (N), and the number of the random access resources is L.
The invention has the advantages and positive effects that: the method comprises the steps of verifying, wherein a warning information standard value, a warning information set value and a verification judgment strategy are configured in the verifying step, the warning information standard value is compared with the warning information set value, if the warning information standard value is larger than the warning information set value, whether a first priority meets a first emergency priority judgment condition is judged according to the verification judgment strategy, and whether a second priority meets a second emergency priority judgment condition is judged by continuously calling the verification judgment strategy; and a result generation step, namely generating a corresponding output result signal at the base station according to the alarm information standard value, the first priority and the second priority, and feeding back the output result signal to the equipment receiving end, so that the blocking rate can be effectively reduced, the time delay can be reduced, and the terminal access rate and the access energy efficiency can be improved.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the principles of the invention and not to limit the invention. In the drawings:
FIG. 1 is an overall flow chart of a method of alarm information priority identification of the present invention;
fig. 2 is a flowchart of the verification steps of a method for warning information priority identification according to the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It will be understood that when an element is referred to as being "secured to" another element, it can be directly on the other element or intervening elements may also be present. When a component is referred to as being "connected" to another component, it can be directly connected to the other component or intervening components may also be present. When a component is referred to as being "disposed on" another component, it can be directly on the other component or intervening components may also be present. The terms "vertical," "horizontal," "left," "right," and the like as used herein are for illustrative purposes only.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. The terminology used in the description of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used herein, the term "and/or" includes any and all combinations of one or more of the associated listed items.
As shown in fig. 1 and fig. 2, the present invention provides a method for identifying priority of alarm information, which includes: an access request step, a priority generation step, a verification step and a result generation step;
the access request step is configured with information identification and equipment data factors, and an access request is sent through an equipment receiving end;
the priority generation step comprises a priority primary generation sub-step and a priority secondary generation sub-step, wherein the priority primary generation sub-step is configured with a first priority and a priority primary generation strategy, and the information identifier is obtained and generated according to the priority primary generation strategy; the priority secondary generation sub-step is configured with a second priority and a priority secondary generation strategy, and the equipment data factor is obtained and generated according to the priority secondary generation strategy;
the verification step is configured with an alarm information standard value, an alarm information set value and a verification judgment strategy, the alarm information standard value is compared with the alarm information set value, if the alarm information standard value is larger than the alarm information set value, whether the first priority meets a first emergency priority judgment condition is judged according to the verification judgment strategy, and whether the second priority meets a second emergency priority judgment condition is judged by continuously calling the verification judgment strategy;
and a result generation step, namely generating a corresponding output result signal at the base station according to the alarm information standard value, the first priority and the second priority, and feeding back the output result signal to the equipment receiving end.
In this embodiment, further, the first emergency priority is configured with a first primary priority, a first secondary priority and a first tail priority, and the first emergency priority determination condition is that the first priority is the first primary priority or the first secondary priority.
In this embodiment, further, the second emergency priority is configured with a second primary priority, a second secondary priority and a second tail priority, and the second emergency priority determination condition is that the second priority is the second primary priority or the second secondary priority.
In this embodiment, the output result signal further includes an access permission result and an access barring result, and if the first emergency priority determination condition and the second emergency priority determination condition are satisfied at the same time, the access permission result is correspondingly output, otherwise, the access barring result is correspondingly output.
In this embodiment, further, the verification determination policy further configures a system delay time and an access request start policy, and determines whether the system delay time is over and whether there is a data start transmission signal according to the access request start policy, if so, then sends the access request to the base station, otherwise, there is no action.
In this embodiment, the output result signal is a blocking access result, the count is one, the accumulated count is a blocking amount, and when the blocking amount is greater than the preset blocking threshold, the second emergency priority determination condition is that the second priority is a second tail priority.
In this embodiment, further, the device receiving end is configured with a plurality of random access resources, and when the number of the device receiving ends is less than or equal to the number of the random access resources, the value of the device data factor is 1; when the number of the receiving ends of the equipment is larger than the number of the random access resources, the value of the data factor of the equipment is L/E (N),
Figure BDA0002645928610000061
the device data factor is H, the number of the device receiving ends is E (N), the number of the random access resources is L, only L/N (E) device receiving ends can initiate the access request, and the other device receiving ends wait for a period of time to initiate the access request, so that the access efficiency can be improved, and the collision is reduced. A large number of equipment receiving ends can cause collision when initiating access requests simultaneously, because random access resources in one frame are limited but not fixed, each frame comprises a physical uplink shared channel, a physical uplink control channel and a physical random access channel, the physical random access channel is used for transmitting time-frequency resources of random access preamble signals, six resource blocks are corresponding to a frequency domain, and random access subframes are corresponding to the six resource blocks in a time domainThe last 1ms includes 64 random access resources, wherein 54 of the random access resources are provided for a device receiving end to compete for use, the remaining 10 are reserved for the device receiving end to be free of competition, when the device receiving end is in contention access, a leader sequence (random access opportunity) is randomly selected, one random access subframe is taken as a unit, the device receiving end in the first primary priority in the uniform random access subframe preferentially selects the random access opportunity, if the random access machine has the surplus random access opportunity, the first secondary priority continues to select the random access opportunity, and when the device receiving end in the first secondary priority completely selects the random access opportunity, the device receiving end in the first tail priority still has the surplus random access opportunity. In the process of selecting random access opportunities by a device receiving end, collision occurs when a plurality of device receiving ends select the same random access opportunities, a base station refuses the access of the device receiving ends and performs access after a period of time delay, aiming at the condition that the number of the device receiving ends only selects the random access opportunities for one device receiving end, namely collision does not occur, the access of the device receiving end is allowed, the more the number of the device receiving ends is, the lower the success probability of the access is, the backoff occurs after the device receiving ends collide, a binary exponential backoff algorithm is adopted by the backoff algorithm, the algorithm mainly doubles the time delay interval of each device receiving end until the maximum value after the collision occurs, reduces the time delay interval of each device receiving end to the minimum value after the successful access, and avoids the collision possibly caused by simultaneously initiating access requests by a plurality of device receiving ends, defining access type parameters through an access type blocking process, when the network load is heavier, a base station broadcasts the access type blocking defined parameters as part of system information to equipment, the parameters specifically comprise access probability and system delay time, an equipment receiving end which wants to access the network firstly generates a random number within a range from zero to one, if the random number is smaller than the access probability of the access type corresponding to the equipment receiving end and broadcasted by the base station, the equipment receiving end obtains a random access permission request, otherwise, the equipment receiving end carries out system backoff according to the system delay time broadcasted by the base station until the system delay time is overtime and then carries out the next timeAnd (5) accessing.
The method comprises the steps that equipment receiving ends are registered in a network and comprise equipment category, position information and the like, wherein each equipment receiving end corresponds to a plurality of information identifications, the network allocates a uniquely determined information identification for each equipment receiving end, the information identification is acquired according to a priority primary generation strategy and generates a first priority, the equipment receiving ends are configured with a plurality of random access resources, when the number of the equipment receiving ends is smaller than or equal to the number of the random access resources, an equipment data factor takes a value of 1, when the number of the equipment receiving ends is larger than the number of the random access resources, the value of the equipment data factor is the ratio of the equipment data factor to the number of the random access resources, the equipment data factor acquires and generates a second priority according to a priority secondary generation strategy, and the network informs a base station of the information identification, the equipment data factor and the information identification corresponding to each equipment receiving end, the equipment data factor and the, The method comprises the steps of verifying a first priority and a second priority corresponding to equipment data factors respectively, wherein a warning information standard value and a warning information set value are configured in a verifying step, comparing the sizes of the warning information standard value and the warning information set value, if the warning information standard value is larger than the warning information set value, judging whether the first priority meets a first emergency priority judgment condition according to a verifying judgment strategy, continuing to call the verifying judgment strategy to judge whether the second priority meets a second emergency priority judgment condition, outputting an access permission result signal when the first priority meets the first emergency priority judgment condition and the second priority meets the second emergency priority judgment condition, and otherwise, outputting a blocking access result signal. Specifically, the first emergency priority is configured with a first primary priority, a first secondary priority and a first tail priority, the high priority corresponds to low delay and low delay variation, and the low priority corresponds to high delay and high delay variation, wherein the priority degrees of the first primary priority, the first secondary priority and the first tail priority are sequentially reduced, and the delay variation are sequentially increased. The first emergency priority determination condition is that the first priority is a first primary priority or a first secondary priority, the second emergency priority is configured with a second primary priority, a second secondary priority and a second tail priority, and the second emergency priority determination condition is that the second priority is a second primary priority or a second secondary priority. And when the output result shows that the blocking access result appears, counting the blocking amount to be one, and if the blocking threshold is set to be 10, and when the accumulated number of the blocking amounts is 11, correcting the second emergency priority judgment condition to be that the second priority is the second tail priority. The base station updates the equipment data factor and the corresponding relation between the first priority and the second priority according to the equipment type and the information identification of the current equipment receiving end, so that resources can be dynamically allocated corresponding to the equipment receiving end with the priority degree being prior in time, the access rate is improved, and the time delay and the energy consumption are reduced.
The embodiments of the present invention have been described in detail, but the present invention is only the preferred embodiments of the present invention, and is not to be considered as limiting the scope of the present invention. All equivalent changes and modifications made within the scope of the present invention should be covered by the present patent.

Claims (7)

1. The method for identifying priority of alarm information according to claim 1, wherein the method comprises: an access request step, a priority generation step, a verification step and a result generation step;
the access request step is configured with an information identifier and a device data factor, and an access request is sent through a device receiving end;
the priority generation step comprises a priority primary generation sub-step and a priority secondary generation sub-step, wherein the priority primary generation sub-step is configured with a first priority and a priority primary generation strategy, and the information identifier is obtained according to the priority primary generation strategy and generates the first priority; the priority secondary generation sub-step is configured with a second priority and a priority secondary generation strategy, and the equipment data factor is obtained and generated according to the priority secondary generation strategy;
the verification step is configured with an alarm information standard value, an alarm information set value and a verification judgment strategy, the alarm information standard value is compared with the alarm information set value, if the alarm information standard value is larger than the alarm information set value, whether the first priority meets a first emergency priority judgment condition is judged according to the verification judgment strategy, and the verification judgment strategy is continuously called to judge whether the second priority meets a second emergency priority judgment condition;
and the result generation step is to generate a corresponding output result signal at the base station according to the alarm information standard value, the first priority and the second priority, and the output result signal is fed back to the equipment receiving end.
2. The method as claimed in claim 1, wherein the first emergency priority is configured with a first primary priority, a first secondary priority and a first end priority, and the first emergency priority is determined according to whether the first priority is the first primary priority or the first secondary priority.
3. The method as claimed in claim 1, wherein the second emergency priority is configured with a second primary priority, a second secondary priority and a second tail priority, and the second emergency priority is determined according to whether the second priority is the second primary priority or the second secondary priority.
4. The method as claimed in claim 1, wherein the output result signal includes an allowed access result and a blocked access result, and the first emergency priority determination condition and the second emergency priority determination condition are both satisfied, and the allowed access result is output accordingly, otherwise the blocked access result is output accordingly.
5. The method according to claim 1, wherein the verification policy further configures a system delay time and an access request initiation policy, and determines whether the system delay time is over and whether there is a data initiation transmission signal according to the access request initiation policy, if so, then the access request is transmitted to the base station, otherwise, no action is taken.
6. The method as claimed in claim 1, wherein the count is one if the output result signal is a barring access result, the accumulated count is a barring amount, and the second urgent priority determination condition is that the second priority is a second tail priority when the barring amount is greater than a preset barring threshold.
7. The method according to claim 1, wherein the device receiving end is configured with a plurality of random access resources, and when the number of the device receiving ends is less than or equal to the number of the random access resources, the value of the device data factor is 1; when the number of the receiving ends of the equipment is larger than the number of the random access resources, the value of the data factor of the equipment is L/E (N),
Figure FDA0002645928600000021
the device data factor is H, the number of the device receiving ends is E (N), and the number of the random access resources is L.
CN202010860166.6A 2020-08-24 2020-08-24 Method for identifying priority of alarm information Pending CN112055336A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010860166.6A CN112055336A (en) 2020-08-24 2020-08-24 Method for identifying priority of alarm information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010860166.6A CN112055336A (en) 2020-08-24 2020-08-24 Method for identifying priority of alarm information

Publications (1)

Publication Number Publication Date
CN112055336A true CN112055336A (en) 2020-12-08

Family

ID=73599498

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010860166.6A Pending CN112055336A (en) 2020-08-24 2020-08-24 Method for identifying priority of alarm information

Country Status (1)

Country Link
CN (1) CN112055336A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112882920A (en) * 2021-04-29 2021-06-01 云账户技术(天津)有限公司 Alarm policy verification method and device, electronic equipment and readable storage medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112882920A (en) * 2021-04-29 2021-06-01 云账户技术(天津)有限公司 Alarm policy verification method and device, electronic equipment and readable storage medium
CN112882920B (en) * 2021-04-29 2021-06-29 云账户技术(天津)有限公司 Alarm policy verification method and device, electronic equipment and readable storage medium

Similar Documents

Publication Publication Date Title
US11032802B2 (en) Mobile terminal device and associated method for obtaining uplink resources
Tello-Oquendo et al. Reinforcement learning-based ACB in LTE-A networks for handling massive M2M and H2H communications
CN103535102B (en) For adapting to the method and apparatus that resource is distributed to the Stochastic accessing of user equipment
Cheng et al. Prioritized random access with dynamic access barring for RAN overload in 3GPP LTE-A networks
CN110636613B (en) Random access method, terminal, base station, storage medium and electronic device
US9635673B2 (en) Base station and associated method for assigning uplink resources to terminal devices with a similar traffic profile
EP3030035B1 (en) Station and access point for managing contention in a wireless communications system
CN106470492B (en) Resource occupation method and device and user equipment
CN103155665B (en) implicit reject response
EP2680660B1 (en) Network access method, base station, and network access system for randomizing network access time
US5574728A (en) Methods of terminal registration
Madueno et al. Massive M2M access with reliability guarantees in LTE systems
WO2016154818A1 (en) Multi-site access method, apparatus and system
Tello-Oquendo et al. Dynamic access class barring parameter tuning in LTE-A networks with massive M2M traffic
Althumali et al. Dynamic backoff collision resolution for massive M2M random access in cellular IoT networks
EP2640151A1 (en) Communication system, communication method, base station device, and communication device
CN107534998A (en) MTC device cut-in method, base station and system
CN107734595B (en) Access control method, device and system
US11979205B1 (en) Method for configuring and updating random access resources in multi-antenna MIMO environment
de Andrade et al. Random access mechanism for RAN overload control in LTE/LTE-A networks
CN107431901B (en) Apparatus and method for allocating resources on a radio interface of a cellular network
CN112055336A (en) Method for identifying priority of alarm information
CN108631978B (en) Random access method and device and method and device for allocating random access resources
KR101707163B1 (en) Method and apparatus for dynamic random access control and resource allocation in wireless communication system
CN116326120A (en) Communication method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination