WO2021023185A1 - Method and device for access restriction detection - Google Patents

Method and device for access restriction detection Download PDF

Info

Publication number
WO2021023185A1
WO2021023185A1 PCT/CN2020/106834 CN2020106834W WO2021023185A1 WO 2021023185 A1 WO2021023185 A1 WO 2021023185A1 CN 2020106834 W CN2020106834 W CN 2020106834W WO 2021023185 A1 WO2021023185 A1 WO 2021023185A1
Authority
WO
WIPO (PCT)
Prior art keywords
access
access restriction
parameters
target
parameter
Prior art date
Application number
PCT/CN2020/106834
Other languages
French (fr)
Chinese (zh)
Inventor
陈磊
李秉肇
许斌
王宏
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2021023185A1 publication Critical patent/WO2021023185A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/70Services for machine-to-machine communication [M2M] or machine type communication [MTC]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/18Selecting a network or a communication service

Definitions

  • This application relates to the field of wireless communication, and in particular to a method and device for detecting access restriction.
  • small data packets small data packets
  • the terminal device needs to frequently switch between the idle state or the inactive state and the connected state, which will cause a large amount of signaling overhead and result in low resource utilization of the wireless communication network.
  • EDT early data transmission
  • the terminal device can only establish a link with the network device and send data to the network device only through the access restriction detection.
  • the terminal device does not need to enter the connected state when using the small data packet transmission method for data transmission, which makes it necessary to enter the connected state for data transmission methods (that is, data transmission methods that occupy more network resources) corresponding to the connection
  • the access restriction parameter does not apply to the access restriction detection corresponding to the small data packet transmission mode.
  • the embodiments of the present application provide a method and device for detecting access restriction. Using the method provided in the embodiments of the present application can improve the pass rate of the terminal device's access restriction detection before data transmission based on the small data packet transmission mode, so that the terminal device does not need to repeatedly trigger the access restriction detection before the small data packet transmission , Improve the resource utilization rate of the wireless communication network.
  • an embodiment of the present application provides an access restriction detection method.
  • the network device determines at least one set of first access restriction parameters.
  • the network device sends a first message to the terminal device, where the first message includes the foregoing at least one set of first access restriction parameters.
  • the aforementioned at least one set of first access restriction parameters corresponds to a small data packet transmission mode, and the aforementioned at least one set of first access restriction parameters is used for access restriction detection.
  • the network device can provide the terminal device with at least one set of access restriction parameters suitable for the access restriction detection before the transmission of small data packets, which can solve the inability of the terminal device caused by the mismatch of the access restriction parameters.
  • the problem of access restriction detection before the fractional packet transmission is normally passed, avoiding the situation that the terminal device repeatedly initiates the access restriction detection before the small data packet transmission. Therefore, the terminal device does not need to repeatedly trigger the access restriction detection before transmitting the small data packet, which improves the resource utilization rate of the wireless communication network.
  • the first message includes a set of first access restriction parameters
  • the set of first access restriction parameters includes a first access threshold and a first access waiting parameter.
  • the network device separately configures a set of access restriction parameters for the terminal device for the access restriction detection before the small data packet transmission, so that the terminal device does not need to repeatedly trigger the access restriction detection before the small data packet transmission, which improves the wireless The resource utilization of the communication network.
  • the first message includes multiple sets of first access restriction parameters.
  • Each group of first access restriction parameters in the above-mentioned multiple sets of first access restriction parameters includes a first access threshold, a first access waiting parameter, and an access identifier.
  • the first access restriction parameters with different access identifiers have different probabilities of passing the access restriction detection.
  • the network equipment configures different sets of access restriction parameters for the access restriction detection before the transmission of small data packets for the terminal equipment of different equipment levels, which can make the terminal equipment with higher equipment level easier to access than the terminal equipment with lower equipment level
  • the restriction detection not only improves the resource utilization rate of the wireless communication network, but also ensures the rationality of the access restriction detection operation, and improves the practicability of the access restriction detection method.
  • the first message includes a set of first access restriction parameters and a set of second access restrictions corresponding to data transmission methods other than the aforementioned small data packet transmission method parameter.
  • the foregoing set of second access restriction parameters is used for access restriction detection.
  • the aforementioned first access restriction parameter includes a first coefficient and a second coefficient.
  • the foregoing second access restriction parameter includes a second access threshold and a second access waiting parameter.
  • the first coefficient is used to adjust the second access threshold, and/or the second coefficient is used to adjust the second access waiting parameter.
  • the network device adjusts the existing second access restriction parameter suitable for the access restriction detection of the second service through the first access restriction parameter generated by the network device to obtain the access restriction detection before the transmission of the small data packet.
  • the access restriction parameter avoids a large number of modifications to the existing signaling structure or communication protocol caused by generating a set of access restriction parameters applicable to the above-mentioned first service, and avoids the increase in development cost, which makes this application
  • the provided access restriction detection method is easier to implement, which improves the practicability of the access restriction detection method while improving the resource utilization rate of the wireless communication network.
  • the first message includes multiple sets of first access restriction parameters and multiple sets of second access restrictions corresponding to data transmission methods other than the aforementioned small data packet transmission method Parameters
  • a group of first access restriction parameters corresponds to a group of second access restriction parameters
  • each group of second access restriction parameters in the above-mentioned multiple sets of second access restriction parameters is used for access restriction detection.
  • Each of the foregoing second access restriction parameters includes a second access threshold, a second access waiting parameter, and an access identifier.
  • a group of first access restriction parameters corresponding to each group of second access restriction parameters includes a first coefficient, a second coefficient, and the aforementioned access identifier.
  • the first coefficient is used to adjust the second access threshold, and/or the second coefficient is used to adjust the second access waiting parameter, the first access restriction parameter and the second access parameter with different access identifiers
  • the probability of the access restriction parameter being detected by the access restriction is different.
  • the network device adjusts the existing multiple sets of second access restriction parameters applicable to the second service through the multiple sets of first access restriction parameters generated by it, so that terminal devices of different equipment levels can use different parameters for small data
  • the access restriction detection before the packet transmission can make the terminal equipment with high equipment level have a higher probability of passing the access restriction detection, and avoid the interference caused by the separate generation of multiple sets of access restriction parameters suitable for the first service.
  • There are a large number of modifications brought about by the signaling structure or communication protocol which avoids the increase in development costs, and improves the practicability of the access restriction detection method while improving the resource utilization of the wireless communication network.
  • an embodiment of the present application provides an access restriction detection method.
  • the terminal device receives the first message from the network device.
  • the foregoing first message includes at least one set of first access restriction parameters corresponding to the small data packet transmission mode. If the terminal device determines that the data transmission mode is the aforementioned small data packet transmission mode, it performs access restriction detection according to the aforementioned at least one set of first access restriction parameters.
  • the terminal device performs access restriction detection based on at least one set of access restriction parameters suitable for transmission of small data packets provided by the network device, which can solve the problem that the terminal device cannot be normal due to the mismatch of the access restriction parameters Through the problem of access restriction detection before fractional packet transmission, the situation that the terminal device repeatedly initiates access restriction detection before small data packet transmission is avoided, and the resource utilization rate of the wireless communication network is improved.
  • the first message includes a set of first access restriction parameters
  • the foregoing set of first access restriction parameters includes a first access threshold and a first access waiting parameter.
  • the terminal device performs access restriction detection according to the first access threshold and the first access waiting parameter.
  • the first message includes multiple sets of first access restriction parameters, and each of the multiple sets of first access restriction parameters includes the first access restriction parameter.
  • the foregoing terminal device determines a target access identifier.
  • the terminal device determines the target first access restriction parameter from the multiple sets of first access restriction parameters according to the target access identifier.
  • the target first access restriction parameter includes the target first access threshold, the target first access waiting parameter, and the target access identifier.
  • the terminal device performs access restriction detection according to the target first access threshold and the target first access waiting parameter.
  • the first message includes a set of first access restriction parameters and a set of second access restriction parameters corresponding to data transmission methods other than the aforementioned small data packet transmission .
  • the above-mentioned set of second access restriction parameters are used for access restriction detection.
  • the first access restriction parameter includes a first coefficient and a second coefficient
  • the second access restriction parameter includes a second access threshold and a second access waiting parameter.
  • the first coefficient is used to adjust the second access threshold
  • the second coefficient is used to adjust the second access waiting parameter.
  • the terminal device adjusts the second access threshold according to the first coefficient to obtain the target access threshold. And/or, the terminal device adjusts the second access waiting parameter according to the second coefficient to obtain the target access waiting parameter.
  • the terminal device performs access restriction detection according to the target access threshold and the target access waiting parameter.
  • the first message includes multiple sets of first access restriction parameters and multiple sets of second access restrictions corresponding to data transmission methods other than the aforementioned small data packet transmission method Parameters
  • a group of first access restriction parameters corresponds to a group of second access restriction parameters
  • each group of second access restriction parameters in the above-mentioned multiple sets of second access restriction parameters is used for access restriction detection.
  • Each set of second access restriction parameters includes a second access threshold, a second access waiting parameter, and an access identifier
  • each set of second access restriction parameters corresponds to a set of first access restriction parameters that includes the first access restriction parameter.
  • a coefficient, a second coefficient, and the access identifier wherein the first coefficient is used to adjust the second access threshold, and/or the second coefficient is used to adjust the second access waiting parameter, the access identifier
  • Different first access restriction parameters and second access restriction parameters have different probability of passing the access restriction detection.
  • the foregoing terminal device determines a target access identifier.
  • the terminal device determines the target first access restriction parameter and the target second access restriction parameter from the multiple sets of first access restriction parameters and the multiple sets of second access restriction parameters according to the target access identifier.
  • the target first access restriction parameter includes a target first coefficient, a target second coefficient, and the target access identifier
  • the target second access restriction parameter includes a target second access threshold, a target second access Wait for the parameters and the aforementioned target access identifier.
  • the terminal device adjusts the target second access threshold according to the target first coefficient to obtain the target access threshold.
  • the terminal device adjusts the target second access waiting parameter according to the target second coefficient to obtain the target access waiting parameter.
  • the terminal device performs access restriction detection according to the target access threshold and the target access waiting parameter.
  • an embodiment of the present application provides a device.
  • the device can be the network device itself, or can be a component or module such as a chip inside the network device.
  • the device includes a unit for executing the access restriction detection method provided by any one of the possible implementations of the first aspect, so it can also achieve the beneficial effects of the access restriction detection method provided by the first aspect ( Or advantages).
  • an embodiment of the present application provides a device.
  • the device can be the terminal device itself, or an internal component or module such as a chip in the terminal device.
  • the device includes a unit for executing the access restriction detection method provided by any one of the possible implementations of the second aspect, so it can also achieve the beneficial effects of the access restriction detection method provided by the second aspect ( Or advantages).
  • the embodiments of the present application provide a device, which may be the network device itself, or may be a component or module such as a chip inside the network device.
  • the device includes a memory, a processor, and a transceiver.
  • the processor is configured to call the code stored in the memory to execute the access restriction detection method provided by any feasible implementation manner in the first aspect.
  • an embodiment of the present application provides a device, which may be the terminal device itself, or may be an element or module such as a chip inside the terminal device.
  • the device includes a memory, a processor, and a transceiver.
  • the processor is configured to call the code stored in the memory to execute the access restriction detection method provided by any feasible implementation manner in the first aspect.
  • an embodiment of the present application provides a device, which may be the network device itself, or may be a component or module such as a chip inside the network device.
  • the device includes a processor and an interface circuit.
  • the interface circuit is used to receive code instructions and transmit them to the processor.
  • the processor is configured to run the foregoing code instructions to implement the access restriction detection method provided by any one of the feasible implementation manners of the foregoing first aspect, and can also achieve the beneficial effects of the access restriction detection method provided by the foregoing first aspect (Or advantages).
  • an embodiment of the present application provides a device, which may be the terminal device itself, or may be a component or module such as a chip inside the terminal device.
  • the device includes a processor and an interface circuit.
  • the interface circuit is used to receive code instructions and transmit them to the processor.
  • the processor is configured to run the foregoing code instructions to implement the access restriction detection method provided by any one of the feasible implementation manners of the foregoing first aspect, and can also achieve the beneficial effects of the access restriction detection method provided by the foregoing first aspect (Or advantages).
  • an embodiment of the present application provides a computer-readable storage medium that stores instructions in the computer-readable storage medium, and when the instructions are run on a computer, any one of the feasible implementations in the first aspect is realized
  • the access restriction detection method provided by the method can also achieve the beneficial effects (or advantages) of the access restriction detection method provided in the first aspect.
  • an embodiment of the present application provides a computer-readable storage medium that stores instructions in the computer-readable storage medium, and when the instructions are run on a computer, any one of the possible implementations of the second aspect mentioned above is realized
  • the access restriction detection method provided by the method can also achieve the beneficial effects (or advantages) of the access restriction detection method provided in the second aspect.
  • an embodiment of the present application provides a computer program product containing instructions.
  • the computer program product runs on a computer, the computer can execute the access restriction detection method provided in the first aspect above, and the first aspect can also be implemented.
  • the provided access restriction detection method has the beneficial effects.
  • the embodiments of the present application provide a computer program product containing instructions.
  • the computer program product When the computer program product is run on a computer, the computer can execute the access restriction detection method provided in the second aspect, which can also implement the first The beneficial effects of the access restriction detection method provided by the two aspects.
  • the embodiments of the present application provide a communication system, which includes the devices described in the third and fourth aspects above, or the devices described in the fifth and sixth aspects above, or, The device described in the seventh and eighth aspects above.
  • the pass rate of the access restriction detection before the data transmission of the terminal device based on the small data packet transmission mode can be improved, and the resource utilization rate of the wireless communication network can be improved.
  • FIG. 1 is a schematic structural diagram of a communication system provided by an embodiment of the present application.
  • FIG. 2 is a schematic flowchart of an access restriction detection method provided by an embodiment of the present application.
  • FIG. 3 is a schematic structural diagram of a device provided by an embodiment of the present application.
  • FIG. 4 is another schematic structural diagram of a device provided by an embodiment of the present application.
  • FIG. 5 is another schematic structural diagram of a device provided by an embodiment of the present application.
  • FIG. 6 is a schematic diagram of another structure of an apparatus provided by an embodiment of the present application.
  • a data packet whose data volume is less than a preset data volume threshold can be called a small data packet.
  • the above-mentioned data amount threshold is generally only a few bytes.
  • Different communication networks may have different definitions of small data packets. For example, in communication network A, a data packet with a data volume less than D1 bytes can be defined as a decimal packet, while in communication network B, a data packet with a data volume less than D2 bytes can be defined as a small data packet.
  • a terminal device in an idle state or in an inactive state needs to transmit multiple control signaling with the network device and enter the connected state in response before it can exchange data or information with the network device.
  • small data packet transmission refers to that after the terminal device determines that the data packet to be transmitted is a small data packet, it integrates the small data packet into some control signaling, and then uses these control signaling to make the small data packet Transmit to network equipment. Or, it refers to using the data plane context stored by the terminal to transmit small data packets to the network device.
  • the aforementioned control signaling may include non-access stratum (NAS) signaling, radio resource control (radio resource control, RRC) signaling, and so on.
  • NAS non-access stratum
  • RRC radio resource control
  • small data packet transmission refers to the transmission method of the data transmission process that the terminal device does not need to enter the connected state.
  • the terminal device can send data to the network device without entering the connected state, which solves the problem of a large amount of signaling overhead caused by frequent switching of the terminal device between the idle state and the inactive state and the connected state.
  • the problem has improved the wasteful utilization of resources in the communication network.
  • data transmission technologies using small data packet transmission methods can include early data transmission (EDT), 2-step random access, pre-configured uplink resource configuration (PUR), etc. There are no restrictions.
  • Access restriction detection is a way for network equipment to control its load. That is, whenever a terminal device needs to establish a connection with a network device to perform a certain service, the terminal device needs to send multiple sets of parameters for access restriction detection corresponding to multiple service types from the network device based on the service type corresponding to the service. (Access restriction parameters will be substituted for the description below) The access restriction parameters corresponding to the target service are determined, and then the access restriction parameters are substituted into the preset detection rules for an access attempt, or an access restriction Detection. Only when the terminal device satisfies the detection passing condition included in the foregoing detection rule according to the access restriction parameters corresponding to the service, the terminal device can initiate random access to the network device to establish or restore the connection with the network device.
  • the above-mentioned service types may include multiple types, such as data transmission, multimedia phone services, and so on.
  • the above detection rules are mainly used to restrict the terminal equipment to perform the access restriction detection process.
  • the detection rules may be pre-configured by the terminal equipment at the factory, or configured by the network equipment in real time or periodically for the terminal equipment. There are no specific restrictions.
  • the above-mentioned detection rule may be a first detection rule, and the first detection rule relates to a formula for generating a passing condition and a waiting time, or in other words, the first detecting rule is related to a formula for generating a passing condition and a waiting time.
  • the above detection passing condition may specifically be that the random number a1 generated by the terminal device that is greater than or equal to 0 and less than 1 is less than the access threshold A configured by the network device.
  • T is the waiting time
  • r1 and r2 are constants
  • a2 is another random number greater than or equal to 0 and less than 1 generated by the terminal device
  • C is the access waiting parameter configured by the network device.
  • Both the access threshold A and the access waiting parameter C are greater than or equal to 0 and less than 1.
  • r1 can be set to a value of 0.7
  • r2 can be set to a value of 0.6.
  • the above access threshold can be used to determine whether the access restriction detection is passed, and the above waiting time formula is used to determine the waiting time for the terminal device to initiate the access restriction detection again.
  • the terminal device obtains multiple sets of access restriction parameters, and then based on the type of service that it currently needs to perform, determines a set of access restriction parameters including the access threshold A1 and the access waiting parameter C1 from the foregoing multiple access restriction parameters. Access restriction parameters. Then a random number a1 is randomly generated. If the terminal device determines that the random number a1 is less than the access threshold A1, it can be determined that it has passed the access restriction detection.
  • the embodiment of the present application provides an access restriction detection method, which is applicable to various wireless communication systems that can perform data transmission in a small data packet transmission manner.
  • MTC system code division multiple access (CDMA) system, wideband code division multiple access (WCDMA) system, general packet radio service (GPRS), long-term evolution ( long term evolution, LTE) system, LTE frequency division duplex (FDD) system, LTE time division duplex (TDD), universal mobile telecommunication system (UMTS), global interconnected microwave Access (worldwide interoperability for microwave access, WiMAX) communication systems, the future 5th generation (5G) system or new radio (NR), etc.
  • CDMA code division multiple access
  • WCDMA wideband code division multiple access
  • GPRS general packet radio service
  • LTE long-term evolution
  • FDD frequency division duplex
  • TDD LTE time division duplex
  • UMTS universal mobile telecommunication system
  • WiMAX global interconnected microwave Access (worldwide interoperability for microwave access, WiMAX) communication systems, the future 5th
  • the terminal equipment involved in the embodiments of this application may be user equipment, access terminal, user unit, user station, mobile station, mobile station, remote station, remote terminal, mobile device, user terminal, terminal, wireless communication device, user agent Or user device, it can also be a cellular phone, a cordless phone, a session initiation protocol (SIP) phone, a wireless local loop (WLL) station, a personal digital assistant (PDA), Handheld devices, computing devices, or other processing devices connected to wireless modems, in-vehicle devices, roadside units, wearable devices, terminal devices in the future 5G network, or future evolution of public land mobile communication networks (public land mobile The terminal equipment in the network, PLMN) is not limited in the embodiment of the present application. To facilitate understanding, in the embodiments of the present application, the first terminal device or the second terminal device will be collectively described.
  • the network device involved in the embodiment of this application is a device deployed in a radio access network (RAN) to provide wireless communication functions for terminal devices.
  • the network device may specifically be a base station, and the above-mentioned base station may include various forms of macro base stations, micro base stations, relay stations, access point base station controllers, transceiver nodes (transmission reception points, TRP), and so on.
  • the specific names of base stations may be different.
  • eNBs evolved NodeBs
  • gNB new radio node B
  • a network device will be used as an example for description.
  • FIG. 1 is a schematic diagram of the architecture of a communication system provided by an embodiment of the present application.
  • the communication system includes network equipment and user equipment.
  • the network device can establish a connection with the terminal device through a wired connection, a wireless connection, or other connection methods.
  • the above-mentioned terminal device may be prohibited or mobile, which may be determined according to actual application scenarios.
  • the communication system may include one or more network devices, and may include one or more terminal devices (such as terminal device 1 to terminal device 5 in FIG. 1).
  • the network device can issue at least one set of access restriction parameters for access restriction detection to the terminal device.
  • the terminal device Before a terminal device needs to establish a connection with a network device to perform a certain service, the terminal device needs to perform access restriction detection according to the aforementioned at least one set of access restriction parameters and preset detection rules.
  • the access restriction parameter used for the access restriction detection before the data transmission service is set in the scenario that the network device needs to switch to the connected state for the terminal device to perform data transmission, and is not applicable to the terminal.
  • the device uses the small data transmission method for data transmission. If the terminal device still uses the access restriction parameters corresponding to the method that needs to enter the connected state for data transmission to perform access restriction detection, the probability of the terminal device passing the access restriction detection is low, which makes it difficult for the terminal device to pass the test normally.
  • the data packet transmission method sends small data packets to the network equipment, which reduces the resource utilization rate of the wireless communication network.
  • the technical problem to be solved by the method provided in the embodiments of this application is: how to configure the access restriction parameters suitable for the small data packet transmission method for the terminal device, so as to improve the detection of the access restriction when the terminal device uses the small data packet transmission method to transmit Probability, improve the resource utilization rate of wireless communication network.
  • FIG. 2 is an access restriction detection method provided by an embodiment of the present application.
  • the proposed access restriction detection method will be described by taking the first detection rule described for the concept of access detection as an example.
  • the access detection method may include the following steps:
  • the network device determines at least one set of first access restriction parameters.
  • the network device can determine at least one set of access restriction parameters after detecting the arrival of the preset parameter determination period or the occurrence of other triggering events (in order to facilitate understanding and distinction, the following will use the first connection Enter the restriction parameter instead of description).
  • the above-mentioned at least one set of first access restriction parameters is used for the access restriction detection of the terminal device before data transmission in a small data packet transmission mode.
  • the network device after the network device detects that the preset parameter determination period arrives or other triggering event occurs, it can perform the data transmission service based on the small data packet transmission mode according to the load status parameter of the communication network (for To facilitate the distinction, the following will replace the description of the first service with the service priority information and/or the device level of each terminal device among the multiple terminal devices that can implement the first service to determine at least one group of first services corresponding to the first service.
  • Access restriction parameters may specifically include network load rate, channel utilization rate, bandwidth utilization rate, etc.
  • the foregoing service priority information may specifically be determined by factors such as a service type and service resource occupation information of a certain service.
  • the priority of making emergency calls such as 110 is higher than that of ordinary calls.
  • video services take up more resources, so when the communication network is heavily loaded, the priority of voice services will be higher than that of video services.
  • the device level of the terminal device is determined based on the probability of passing the access restriction detection required by the terminal device in different application scenarios (the passing probability is used instead of the description below).
  • the above passing probability refers to the probability of passing when the terminal device performs an access restriction detection operation. In practical applications, the higher the passing probability required by the terminal device, the higher the level of equipment corresponding to the terminal device.
  • the passing probability required by terminal equipment used in military communication services is greater than that required by terminal equipment used in civilian communication services. That is, the equipment level of terminal equipment applied to military communication services is higher than that of terminal equipment applied to civilian communication services.
  • the communication request initiated by the terminal equipment on the ambulance is more urgent than the communication request initiated by the terminal equipment on the ordinary truck. Therefore, the equipment level of the terminal equipment applied to the ambulance will be more urgent than that of the terminal equipment applied to the ambulance.
  • the equipment level of terminal equipment on ordinary trucks is higher.
  • the above-mentioned other trigger events may also include the change of the network load rate of the communication network reaching a preset change threshold, the restart of the communication network, etc., which are not specifically limited here.
  • the network device can also use the same or similar method to determine at least one set of access restriction parameters corresponding to other types of services other than the first service.
  • network equipment can perform data transmission services according to the load status of the communication network and terminal equipment through other data transmission methods (that is, the method that needs to enter the connected state to perform data transmission) except for the small data packet transmission method (for ease of description)
  • the second service is used to replace the description below) corresponding priority information and/or the device level of each terminal device among the multiple terminal devices that can implement the second service determines at least one set of access restrictions corresponding to the second service Parameters (for the convenience of understanding and distinction, the second access restriction parameter will be substituted for the description below).
  • the network device can also perform the media phone service according to the load status of the communication network and the terminal device to perform the media phone service (for the convenience of description, the third service is used to replace the description below) corresponding priority information and/or the third service can be realized
  • the device level of each terminal device in the plurality of terminal devices determines at least one set of access restriction parameters corresponding to the third service (the third access parameter will be substituted for the description below).
  • the process of determining the first access restriction parameter and/or the second access restriction parameter by the network device may include the following four possible implementation manners:
  • the network device may determine a set of first access restriction parameters according to the load status parameters of the communication network and the priority information of the first service.
  • the set of access restriction parameters may specifically include a first access threshold and a first access threshold.
  • Access waiting parameters For example, the above-mentioned first access restriction parameter may specifically be an array [A1, C1], where A1 is the first access threshold, and C1 is the first access waiting parameter.
  • the foregoing first access threshold may be used for the terminal device to determine whether it can pass the access restriction detection.
  • the above-mentioned first access waiting parameter may be used to determine the waiting time for the terminal device to initiate the access restriction detection operation again in the case that the terminal device determines that it has failed the access restriction detection.
  • the network device separately configures a set of access restriction parameters for the terminal device for the access restriction detection before the small data packet transmission, so that the terminal device does not need to repeatedly trigger the access restriction detection before the small data packet transmission, which improves the wireless The resource utilization of the communication network.
  • the network device may determine multiple sets of first access restriction parameters according to the load status parameters of the communication network, the priority information of the first service, and the device level of each terminal device among the multiple terminal devices that can initiate the first service.
  • the terminal equipment corresponding to each group of first access restriction parameters has different equipment levels, and the probability of each group of first access restriction parameters passing the access restriction detection is also different.
  • the higher the corresponding device level the higher the probability that the first access restriction parameter passes the access restriction detection. For example, suppose that the foregoing multiple sets of first access restriction parameters include a set of first access restriction parameters K1 and a set of first access restriction parameters K2.
  • each group of first access restriction parameters may specifically include a first access threshold, a first access waiting parameter, and an access identifier.
  • the access identifier included in any set of first access restriction parameters is used to indicate the device level corresponding to the terminal device that can use the any set of first access restriction parameters to perform access restriction detection.
  • the access identifier of a certain group of first access restriction parameters is 1, it means that the devices that can use the first access restriction parameters of the group are civilian devices, and the access identifier of a certain group of first access restriction parameters If it is 2, it means that the terminal device that can use the first access restriction parameter of the group is a civilian device, and so on.
  • the aforementioned access identifier can be used by the terminal device to determine a group of applicable first access restriction parameters from the aforementioned multiple sets of first access restriction parameters based on its own equipment level.
  • the terminal device should be configured in advance with data entities such as a table indicating the correspondence between the device level and the access flag, so that the terminal device can determine its corresponding access identifier based on its own device level.
  • the above-mentioned first access threshold may be used for the terminal device to determine whether it can pass the access restriction detection.
  • the above-mentioned first access waiting parameter may be used for the terminal device to calculate the waiting time for it to initiate the access restriction detection operation again in the case where it is determined that it has not passed the access restriction detection.
  • the foregoing multiple sets of first access restriction parameters include at least a first access restriction parameter K1 and a first access restriction parameter K2.
  • the above-mentioned first access restriction parameter K1 may specifically be an array [A11, C11, L1].
  • A11 is the first access threshold in the first access restriction parameter K1
  • C11 is the first access waiting parameter in the first access restriction parameter K1
  • L1 is the access in the first access restriction parameter K1 Logo.
  • the aforementioned first access restriction parameter K2 may specifically be an array [A12, C12, L2], where A12 is the first access threshold in the first access restriction parameter K2, and C12 is the first access restriction parameter K2.
  • the first access waiting parameter, L2 is the access identifier in the first access restriction parameter K2.
  • the required pass probabilities of two or more terminal devices with similar equipment levels may also be the same. Therefore, in a specific implementation, the first access threshold and the first access waiting parameter contained in each first access parameter in the different two or more sets of first access parameters may also be the same.
  • the implementation of this application The examples do not make specific restrictions.
  • a set of first access restriction parameters may also include multiple different Access ID.
  • the above-mentioned first access restriction parameter K1 can also be specifically an array [A11, C11, L1, L2, L3], that is, three terminal devices with the corresponding access identifiers L1, L2, or L3 can use the first access Enter the parameter A11 and/or the first access waiting parameter C11 to perform an access restriction detection operation.
  • the network equipment configures different sets of access restriction parameters for the access restriction detection before the transmission of small data packets for the terminal equipment of different equipment levels, which can make the terminal equipment with higher equipment level easier to access than the terminal equipment with lower equipment level
  • the restriction detection not only improves the resource utilization rate of the wireless communication network, but also ensures the rationality of the access restriction detection operation, and improves the practicability of the access restriction detection method.
  • the network device may first obtain the second access restriction parameter applicable to the above-mentioned second service from the internal or external memory. Then, the network device may also determine a set of first access restriction parameters corresponding to the first service according to the load status parameter of the communication network, the priority information corresponding to the first service, and the second access restriction parameter. Wherein, the first access restriction parameter may include a first coefficient and a second coefficient. After the terminal device initiates the service request corresponding to the first service, the terminal device may determine whether it can pass the access restriction detection based on the first coefficient and the second access threshold. If the terminal device determines that it has not passed the access restriction detection, the terminal device may also determine the waiting time for the next time it initiates the access restriction detection operation corresponding to the first service according to the second coefficient and the second access waiting parameter.
  • the acquired second access restriction parameter may specifically be the array [A1, C1], where A1 is the second access threshold included in the second access restriction parameter, and C2 is the The second access waiting parameter included in the second access restriction parameter.
  • the above-mentioned first access restriction parameter may specifically be an array [R1, R2], where R1 is the first coefficient and R2 is the second coefficient.
  • the network device adjusts the existing second access restriction parameter suitable for the access restriction detection of the second service through the first access restriction parameter generated by the network device to obtain the access restriction detection before the transmission of the small data packet.
  • the access restriction parameter avoids a large number of modifications to the existing signaling structure or communication protocol caused by generating a set of access restriction parameters applicable to the above-mentioned first service, and avoids the increase in development cost, which makes this application
  • the provided access restriction detection method is easier to implement, which improves the practicability of the access restriction detection method while improving the resource utilization rate of the wireless communication network.
  • the network device may first obtain multiple sets of second access restriction parameters suitable for the foregoing second service from internal or external storage.
  • each set of second access restriction parameters is different from each other, and the equipment level of the terminal device corresponding to each set of second access restriction parameters is different, and each set of second access restriction parameters passes
  • the probability of access restriction detection is also different.
  • the second access restriction parameter corresponding to the higher device level has a higher probability of passing the access restriction detection.
  • the foregoing multiple sets of second access restriction parameters include a set of first access restriction parameters K21 and a set of second access restriction parameters K22.
  • each group of second access restriction parameters may specifically include a second access threshold, a second access waiting parameter, and an access identifier.
  • the access identifier included in any set of second access restriction parameters is used to indicate the device corresponding to the terminal device that can use the any set of second access restriction parameters to perform access restriction detection before the second service grade.
  • the access identifier of a certain set of second access restriction parameters is 1, it may indicate that the terminal devices that can use the second access restriction parameters of the set are civilian equipment. If the access identifier of a certain set of second access restriction parameters is 2, it may indicate that the terminal devices that can use the second access restriction parameters of the set are military equipment, and so on.
  • the aforementioned access identifier can be used for the terminal device to determine a group of applicable second access restriction parameters from the aforementioned multiple sets of second access restriction parameters based on its own equipment level.
  • the terminal device should be configured in advance with data entities such as a table indicating the correspondence between the device level and the access flag, so that the terminal device can determine its corresponding access identifier based on its own device level.
  • the foregoing second access threshold may be used for the terminal device to determine whether it can pass the access restriction detection before the second service.
  • the above-mentioned first access waiting parameter may be used to calculate the waiting time for the terminal device to initiate the access restriction detection operation again when it is determined that it has not passed the access restriction detection before the second service.
  • the network device may also determine multiple sets of first access restriction parameters corresponding to the first service according to the load status parameters of the communication network, the priority information corresponding to the first service, and the multiple sets of second access restriction parameters.
  • a set of second access restriction parameters corresponds to a set of first access restriction parameters.
  • Any set of first access restriction parameters includes a first coefficient, a second coefficient, and an access identifier, and this access identifier corresponds to the second access corresponding to the any set of first access restriction parameters.
  • the access identifier included in the access restriction parameter is the same. Or, in other words, there is a correspondence between the first access restriction parameter and the second access restriction parameter with the same access identifier.
  • the multiple sets of first access restriction parameters include a first access restriction parameter K11, which corresponds to the second access restriction parameter K21 in the multiple sets of second access restriction parameters.
  • the terminal device may first according to the first coefficient contained in the above-mentioned first access restriction parameter K11 and the second access threshold contained in the above-mentioned second access restriction parameter K21. It is determined whether it can pass the access restriction detection before the first service. If the terminal device determines that it has not passed the access restriction detection, the terminal device can determine according to the second coefficient included in the first access restriction parameter K11 and the second access waiting parameter included in the second access restriction parameter K21. The waiting time for the next initiation of access restriction detection.
  • the foregoing multiple sets of second access restriction parameters may include at least a second access restriction parameter K21 and a second access restriction parameter K22.
  • the foregoing multiple sets of second access restriction parameters may include at least a second access restriction parameter K21 and a second access restriction parameter K22.
  • the second access restriction parameter K21 corresponds to the first access restriction parameter K11 in the multiple sets of first access restriction parameters
  • the second access restriction parameter K22 corresponds to the first access in the multiple sets of first access restriction parameters.
  • the above-mentioned second access restriction parameter K21 may specifically be an array [A21, C21, L1], where A21 is the second access threshold in the second access restriction parameter K21, and C21 is the second access restriction parameter K21
  • the second access waiting parameter, L1 is the access identifier in the second access restriction parameter K21.
  • the foregoing first access restriction parameter K11 may specifically be an array [R11, R21, L1].
  • R11 is the first coefficient in the first access restriction parameter K11
  • R21 is the second coefficient in the first access restriction parameter K11
  • L1 is the access identifier.
  • the above-mentioned second access restriction parameter K22 may specifically be an array [A22, C22, L2], where A22 is the second access threshold in the second access restriction parameter K22, and C22 is the second access restriction parameter K22
  • the second access waiting parameter, L22 is the access identifier in the second access restriction parameter K22.
  • the aforementioned first access restriction parameter K12 may specifically be an array [R12, R22, L2].
  • R12 is the first coefficient in the first access restriction parameter K12
  • R22 is the second coefficient in the first access restriction parameter K12
  • L2 is the access identifier.
  • the pass probabilities required by two or more terminal devices with similar equipment levels may also be the same. Therefore, in a specific implementation, the first coefficient and the second coefficient contained in each first access parameter in different two or more sets of first access parameters may be different or may be the same.
  • the implementation of this application The examples do not make specific restrictions.
  • the second access threshold or the second access waiting parameter included in each second access parameter in the multiple sets of second access parameters may be the same or may be different.
  • a set of first access restriction parameters may also include multiple different Access ID.
  • the above-mentioned first access restriction parameter K11 can also be specifically an array [R11, R21, L1, L2, L3], and its corresponding second access restriction parameter K21 can also be specifically [A21, C21, L1, L2, L3]. That is, the three terminal devices whose corresponding access identifiers are L1, L2, or L3 can use the above-mentioned first access restriction parameter K11 and second access restriction parameter K21 to perform an access restriction detection operation.
  • the network device adjusts the existing multiple sets of second access restriction parameters applicable to the second service through the multiple sets of first access restriction parameters generated by it, so that terminal devices of different equipment levels can use different parameters for small data
  • the access restriction detection before the packet transmission can make the terminal equipment with high equipment level have a higher probability of passing the access restriction detection, and avoid the interference caused by the separate generation of multiple sets of access restriction parameters suitable for the first service.
  • the network device sends a first message including at least one set of first access restriction parameters to the terminal device.
  • the network device may package the above at least one set of first access restriction parameters in a system information block (SIB).
  • SIB system information block
  • the first message is generated, and the first message is sent to the terminal device in a manner of broadcast, multicast, or unicast.
  • the network device may send the above-mentioned first message to each terminal device with which a communication link is established.
  • the network device may send the foregoing first message to each terminal device in its pre-configured multicast group.
  • the network device may send the first message to one or more terminal devices that have initiated the unicast request.
  • the network device may pack the at least one set of first access restriction parameters in system information block type 1 (system information block type 1, SIB1) to generate the first message. Then, when the preset SIB sending period arrives, the first message is broadcast to the terminal device.
  • the network device may also package the at least one set of first access restriction parameters in system information block type 2 (SIB2) to generate the first message. Then, when the preset SIB2 sending trigger condition is satisfied, the first message is broadcast to the terminal device.
  • SIB2 system information block type 2
  • the network device determines at least one set of first access restriction parameters and at least one set of second access parameters
  • the aforementioned at least one set of access restriction parameters and at least one set of The group second access parameter is packaged in the SIB to obtain the first message, and the first message is sent to the terminal device in a manner of broadcast, unicast or multicast.
  • the first message may not only include at least one set of first access restriction parameters corresponding to the first service and/or at least one set of second access restriction parameters corresponding to the second service. It may also include at least one set of third access restriction parameters corresponding to the aforementioned third service, or access restriction parameters corresponding to more other types of services.
  • the corresponding business types may also be different according to different predetermined business type division rules. For example, in some more complicated service type division rules, the above-mentioned first service and the above-mentioned second service are two different types of services.
  • the above-mentioned first service and the above-mentioned second service will be uniformly divided into the data transmission type of service, that is, the first service and the second service are both data transmission services. Therefore, in the case where the data entity of the access restriction detection parameter included in the first message corresponds to the service type, the difference in the service type division rule may also cause the data structure of the first message to be different.
  • the aforementioned data entities may include arrays, structures, data tables, etc., which are not limited here.
  • the above-mentioned first message may contain at least three data entities. The first data entity corresponds to the above-mentioned first service, and contains at least one set of first access restriction parameters and the second data entity.
  • the entity corresponds to the aforementioned second service and contains at least one set of second access restriction parameters
  • the third data entity corresponds to the aforementioned third service, and contains at least one set of third access restriction parameters.
  • the above-mentioned first message may contain at least two data entities.
  • the first data entity corresponds to a type of service of data transmission, that is, the first data entity also contains at least one corresponding to the first service.
  • the second data entity corresponds to the foregoing third service, and contains at least one set of third access restriction parameters.
  • a data entity corresponding to a larger service category may include one or more access restriction detection parameters corresponding to a smaller service category.
  • Using relatively simple service type division rules such as assigning the above-mentioned first service and the above-mentioned second service to the service of data transmission, can avoid the high complexity of the signaling structure of the first message caused by the complicated division of service types This can simplify the signaling structure of the first message.
  • the terminal device receives the first message, and when determining that the data transmission mode is small data packet transmission, performs access restriction detection according to at least one set of first access restriction parameters.
  • the terminal device may receive the first message broadcast, unicast, or multicast from the network device, and parse the first message according to a predetermined communication protocol between the terminal device and the network device to obtain the foregoing At least one set of first access restriction parameters and/or the aforementioned at least one set of second access restriction parameters. Then, when the terminal device determines that a certain data packet needs to be transmitted (for ease of understanding and distinction, the target data packet is used in the following to replace the description), it may first obtain the preset data volume threshold. What needs to be explained here is that network devices will periodically broadcast different data volume thresholds in their different coverage areas, and terminal devices in these different coverage areas can determine whether they can use small data packets according to these different data volume thresholds.
  • the terminal device can determine whether the data volume of the target data packet is less than the preset data volume threshold. If the terminal device determines that the data volume of the target data packet is less than its corresponding data volume threshold, it is determined that it can transmit the target data in a small data packet transmission mode (that is, the terminal device determines that it can perform the first service). If the terminal device determines that the data volume of the target data packet is equal to or greater than its corresponding data volume threshold, it is determined that it can transmit the target data through other output transmission methods other than the small data packet transmission method (that is, the terminal device determines that it can execute the above Second business).
  • the terminal device may perform the first service according to the aforementioned at least one set of first access restriction parameters and/or the aforementioned at least one set of second access restriction parameters The access restriction detection operation.
  • the first scenario is that the first message only contains a set of first access restriction parameters.
  • the second scenario is that the first message contains multiple sets of first access restriction parameters.
  • the third scenario is that the first message contains a group of first access restriction parameters and a group of second access restriction parameters.
  • the fourth scenario is that the first message contains multiple sets of first access restriction parameters and multiple sets of second access restriction parameters.
  • the foregoing first message includes a set of first access restriction parameters.
  • the first access restriction parameter is [A1, C1].
  • the terminal device may obtain the first access restriction parameter from the first message.
  • the terminal device can generate a first random number x1. If the terminal device determines that the first random number x1 is less than the above-mentioned first access threshold A1, the terminal device can determine that the access detection restriction is passed, and can initiate a random access request to the network device. Establish or restore the network connection, and then achieve the target data transmission. If the terminal device determines that the first random number x1 is equal to or greater than the above-mentioned first access threshold A1, it can generate a second random number x2 again.
  • the foregoing first message includes multiple sets of first access restriction parameters. It is now assumed that the multiple sets of first access restriction parameters include a set of first access restriction parameters K1 and a set of second access restriction parameters K2.
  • the aforementioned first access restriction parameter K1 is specifically [A11, C11, L1]
  • the aforementioned first access restriction parameter K2 is specifically [A12, C12, L2].
  • the terminal device may obtain the above-mentioned at least one set of first access restriction parameters from the above-mentioned first message.
  • the terminal device can obtain its system configuration information, determine its device level based on the system configuration information, and determine the target access identifier corresponding to the terminal device according to the preset relationship table between the configuration level and the access identifier.
  • the terminal device can determine the above-mentioned first access restriction parameter K1 as the target first access restriction parameter to be used according to the target access identifier.
  • the terminal device can generate a first random number x1.
  • the terminal device determines that the first random number x1 is less than the target access threshold A11 in the target first access restriction parameter, the terminal device can determine that the access detection restriction is passed, and can initiate a random access request to the network device to establish or restore the network Connect, and then achieve the target data transmission. If the terminal device determines that the first random number x1 is equal to or greater than the aforementioned target access threshold A11, it can generate a second random number x2 again.
  • the above-mentioned first message includes a group of first access restriction parameters and a group of second access restriction parameters, and this group of first access restriction parameters is included in the service category corresponding to the first service.
  • this set of second access restriction parameters are included in the data entity corresponding to the business category of the second service (the second data entity is used to replace the description below) )in.
  • the second access restriction parameter is specifically [A1, C1].
  • the foregoing first access restriction parameter is specifically [R1, R2].
  • the terminal device may first adjust the second access threshold in the second access restriction parameter according to the first coefficient in the first access restriction parameter to obtain the target Access threshold. For example, the terminal device may adjust the second access threshold A1 according to the first coefficient R1 to obtain the target access threshold R1*A1. Then, the terminal device can first generate a first random number x1. If the terminal device determines that the first random number x1 is less than the target access threshold R1*A1, the terminal device can determine that the access detection restriction is passed, and can initiate a random access to the network device. Into the request to establish or restore the network connection, and then achieve the target data transmission.
  • the foregoing first message includes a set of first access restriction parameters and a set of second access restriction parameters, and the set of first access restriction parameters and the set of second access restriction parameters It is also included in the data entity corresponding to the category of data transmission (the third data entity is used to replace the description below).
  • the above-mentioned first access restriction parameter is specifically [R1, R2]
  • the second access restriction parameter is specifically [A1, C1].
  • the terminal device can generate a first random number x1. If the terminal device determines that the first random number x1 is less than the above-mentioned first access threshold R1, the terminal device can determine that the access detection restriction is passed, and can initiate a random access request to the network device. Establish or restore the network connection, and then achieve the target data transmission. If the terminal device determines that the first random number x1 is equal to or greater than the above-mentioned first access threshold R1, it can generate a second random number x2 again.
  • the foregoing first message includes multiple sets of first access restriction parameters and multiple sets of second access restriction parameters, and the multiple sets of first access restriction parameters are included in the service category corresponding to the first service.
  • the multiple sets of second access restriction parameters are included in the data entity corresponding to the business category of the second service (the second data entity is used below to replace Description).
  • the foregoing multiple sets of first access restriction parameters may include at least a second access restriction parameter K21 and a second access restriction parameter K22.
  • the second access restriction parameter K21 corresponds to the first access restriction parameter K11 in the multiple sets of first access restriction parameters
  • the second access restriction parameter K22 corresponds to the first access in the multiple sets of first access restriction parameters.
  • the above-mentioned second access restriction parameter K21 is specifically [A21, C21, L1].
  • the aforementioned first access restriction parameter K11 is specifically [R11, R21, L1].
  • the above-mentioned second access restriction parameter K22 is specifically [A22, C22, L2].
  • the aforementioned first access restriction parameter K12 is specifically [R12, R22, L2].
  • the terminal device can obtain its system configuration information, determine its device level based on the system configuration information, and determine the target access identifier corresponding to the terminal device according to the preset relationship table between the configuration level and the access identifier.
  • the terminal device can determine the first access restriction from the multiple sets of first access restriction parameters and multiple sets of second access restriction parameters according to the target access identifier.
  • the parameter K11 is the target first access restriction parameter that needs to be used
  • the above-mentioned second access restriction parameter K21 is the target second access restriction parameter that needs to be used.
  • the terminal device may first adjust the target second access threshold A21 in the target second access restriction parameter according to the target first coefficient R11 in the target first access restriction parameter to obtain the target access threshold R11 *A21.
  • the terminal device can generate a first random number x1. If the terminal device determines that the first random number x1 is less than the target access threshold R11*A21, the terminal device can determine that the access detection restriction is passed, and can initiate random access to the network device Request to establish or restore the network connection, and then achieve the target data transmission.
  • the foregoing first message includes multiple sets of first access restriction parameters and multiple sets of second access restriction parameters, and multiple sets of first access restriction parameters and multiple sets of second access restriction parameters are simultaneously It is included in the data entity corresponding to the business category of data transmission (for the sake of understanding, the third data entity is used to replace the description below).
  • the above-mentioned multiple sets of first access restriction parameters include the second access restriction parameter K21.
  • the second access restriction parameter K21 includes the first access restriction parameter K11 in the aforementioned multiple sets of first access restriction parameters.
  • the above-mentioned second access restriction parameter K21 is specifically [A21, C21, L1].
  • the aforementioned first access restriction parameter K11 is specifically [R11, R21, L1].
  • the terminal device may first obtain the aforementioned third data entity from the aforementioned first message, and then obtain the multiple corresponding multiple small data packet transmission methods from the aforementioned third data entity. Group first access restriction parameter. Then, the terminal device can obtain its system configuration information, determine its device level based on the system configuration information, and determine the target access identifier corresponding to the terminal device according to the preset relationship table between the configuration level and the access identifier.
  • the target access identifier determined by the terminal device is L1
  • the terminal device can determine the first access restriction from the multiple sets of first access restriction parameters and multiple sets of second access restriction parameters according to the target access identifier.
  • the parameter K11 is the target first access restriction parameter that needs to be used. That is, R11 is the target first access threshold, and R21 is the target first access waiting parameter. Then, the terminal device can generate a first random number x1. If the terminal device determines that the first random number x1 is less than the target first access threshold R11, the terminal device can determine that the access detection restriction is passed, and can initiate a random access to the network device. Into the request to establish or restore the network connection, and then achieve the target data transmission. If the terminal device determines that the first random number x1 is equal to or greater than the above-mentioned target first access threshold R11, a second random number x2 can be generated again.
  • the network device may provide one or more sets of access restriction parameters for the terminal device to perform the access restriction detection operation before data transmission through the small data packet transmission mode.
  • the terminal device uses the small data packet transmission method for data transmission, it can prevent the terminal device from entering the connected state for data transmission (that is, the data transmission method that takes up more network resources) corresponding access restriction parameters
  • the low pass rate of the access restriction detection caused by the access restriction detection eliminates the need for the terminal device to repeatedly trigger the access restriction detection before transmitting small data packets, which improves the resource utilization rate of the wireless communication network.
  • Fig. 3 is a schematic structural diagram of a device provided by an embodiment of the present application. As shown in FIG. 3, the device can be applied to the communication system shown in FIG. 1 to perform the functions of the network device in the first embodiment.
  • the device can be the network device itself, or an internal component or module of the network device.
  • the device may include one or more transceiving units 301 and one or more determining units 302.
  • the foregoing transceiver unit 301 may be referred to as a transceiver, a transceiver circuit, or a transceiver, etc., which may include at least one antenna and a radio frequency unit.
  • the above-mentioned transceiver unit 301 is mainly used for transmitting and receiving radio frequency signals and conversion between radio frequency signals and baseband signals, for example, for sending the above-mentioned first message in the above-mentioned embodiment to a terminal device.
  • the above-mentioned determining unit 302 is mainly used to perform baseband processing, control the device, and so on.
  • the foregoing transceiver unit 301 and the determining unit 302 may be physically arranged together or separately arranged physically, that is, a distributed device.
  • the above-mentioned determining unit 302 may be used to control the apparatus to execute the determination process of at least one set of first access parameters and/or at least one set of second access parameters in the above-mentioned first embodiment.
  • the above-mentioned determining unit 302 may be composed of one or more single boards, and multiple single boards may jointly support a radio access network (such as an NR network) with a single access indication, or may respectively support different access standards. Wireless access network.
  • the aforementioned determining unit 302 further includes a memory and a processor, and the aforementioned memory is used to store necessary instructions and data.
  • the foregoing processor is used to control the device to perform necessary actions, for example, to control the device to execute the operation flow of the device in the foregoing method embodiment.
  • the aforementioned memory and processor may serve one or more single boards. In other words, the memory and the processor can be set separately on each board. It can also be that multiple boards share the same memory and processor. In addition, necessary circuits can be provided on each board.
  • the above determining unit 302 is configured to perform the determination process of at least one group of first access restriction parameters in step S10 in FIG. 2.
  • the foregoing sending unit 301 is configured to execute the sending process of the first message including at least one set of first access restriction parameters in step S10 in FIG. 2.
  • the above determining unit 302 is configured to perform the process of determining a set of first access restriction parameters described in Embodiment 1 in step S10.
  • the set of access restriction parameters may specifically include a first access threshold and a first access waiting parameter.
  • the above determining unit 302 is configured to perform the process of determining multiple sets of first access restriction parameters described in the second embodiment in step S10.
  • Each group of first access restriction parameters may specifically include a first access threshold, a first access waiting parameter, and an access identifier.
  • the access identifier included in any set of first access restriction parameters is used to indicate the device level corresponding to the terminal device that can use the any set of first access restriction parameters to perform access restriction detection.
  • the determination unit 302 is configured to perform the determination according to the load status parameter of the communication network, the priority information corresponding to the first service, and the second access restriction parameter described in the third embodiment in step S10.
  • the first access restriction parameter may include a first coefficient and a second coefficient.
  • the second access restriction parameter specifically includes a second access threshold, a second access waiting parameter, and an access identifier.
  • the above determining unit 302 is configured to perform the process of determining multiple sets of first access restriction parameters and multiple sets of second access restriction parameters described in Embodiment 4 in step S10.
  • a set of first access restriction parameters corresponds to a set of second access restriction parameters.
  • Each set of second access restriction parameters includes a second access threshold, a second access waiting parameter, and an access identifier
  • each set of second access restriction parameters corresponds to a set of first access restriction parameters that includes the first access restriction parameter.
  • Different first access parameters and second access parameters have different probabilities for passing access restriction detection.
  • the foregoing transceiver unit 301 is configured to perform the process of sending at least one set of first access restriction parameters to the terminal device described in step S20.
  • FIG. 4 is a schematic structural diagram of an apparatus provided by an embodiment of the present application.
  • the device can be used to perform the functions of the terminal equipment in the first embodiment above.
  • the device can be the terminal device itself, or an internal component or module of the terminal device.
  • the device includes a processor, a memory, a radio frequency circuit, an antenna, and an input and output device.
  • the processor is mainly used to process the communication protocol and communication data, control the device, execute the software program, and process the data of the software program.
  • the memory is mainly used to store software programs and data.
  • the radio frequency circuit is mainly used for the conversion of baseband signal and radio frequency signal and the processing of radio frequency signal.
  • the antenna is mainly used to send and receive radio frequency signals in the form of electromagnetic waves.
  • Input and output devices such as touch screens, display screens, keyboards, etc., are mainly used to receive data input by a user who uses the device and output data to the user. It should be noted that in some scenarios, the communication device may not include an input and output device.
  • the processor When data needs to be sent, the processor performs baseband processing on the data to be sent, and outputs the baseband signal to the radio frequency circuit.
  • the radio frequency circuit performs radio frequency processing on the baseband signal and sends the radio frequency signal to the outside in the form of electromagnetic waves through the antenna.
  • the radio frequency circuit receives the radio frequency signal through the antenna, converts the radio frequency signal into a baseband signal, and outputs the baseband signal to the processor, and the processor converts the baseband signal into data and processes the data.
  • FIG. 4 only one memory and processor are shown in FIG. 4. In an actual device product, there may be one or more processors and one or more memories.
  • the memory may also be referred to as a storage medium or storage device.
  • the memory may be set independently of the processor, or may be integrated with the processor, which is not limited in the embodiment of the present application.
  • the processor may include a baseband processor and/or a central processing unit.
  • the baseband processor is mainly used to process communication protocols and communication data
  • the central processing unit is mainly used to control the entire device. Execute the software program and process the data of the software program.
  • the processor in FIG. 4 can integrate the functions of the baseband processor and the central processing unit.
  • the baseband processor and the central processing unit can also be independent processors and are interconnected by technologies such as buses.
  • the device may include multiple baseband processors to adapt to different network standards, the device may include multiple central processors to enhance its processing capabilities, and various components of the device may be connected through various buses.
  • the aforementioned baseband processor can also be expressed as a baseband processing circuit or a baseband processing chip.
  • the aforementioned central processing unit can also be expressed as a central processing circuit or a central processing chip.
  • the function of processing the communication protocol and communication data can be built in the processor, or can be stored in the storage unit in the form of a software program, and the processor executes the software program to realize the baseband processing function.
  • the antenna and radio frequency circuit with the transceiver function may be regarded as the transceiver unit of the device, and the processor with the processing function may be regarded as the processing unit of the device.
  • the device includes a transceiver unit 410 and a detection unit 420.
  • the device for implementing the receiving function in the transceiver unit 410 can be regarded as the receiving unit, and the device for implementing the sending function in the transceiver unit 410 as the sending unit, that is, the transceiver unit 410 includes a receiving unit and a sending unit.
  • the receiving unit may also be called a receiver, a receiver, or a receiving circuit.
  • the transmitting unit may sometimes be called a transmitter, a transmitter, or a transmitting circuit.
  • the transceiving unit 410 is configured to perform the operation of receiving the first message in the first embodiment
  • the detecting unit 420 is configured to perform the operation of detecting the access restriction according to at least one set of first access restriction parameters in the first embodiment.
  • the detection unit 420 is configured to perform the process of performing access restriction detection according to a set of first access control parameters described in scenario 1 in step S30 in FIG. 2.
  • the detection unit 420 is configured to perform the process of determining the target access identifier described in the second scenario in step S30.
  • the detection unit 420 is further configured to perform the process of determining the first access restriction parameter of the target connection described in the second scenario in step S30.
  • the detection unit 420 is further configured to perform the process of performing access restriction detection according to the target first access restriction parameter described in the second scenario in step S30.
  • the detection unit 420 is configured to perform the process of adjusting the second access threshold according to the above-mentioned first coefficient described in scenario 3 in step S30 to obtain the target access threshold.
  • the detection unit 420 is further configured to perform the process of adjusting the second access waiting parameter according to the second coefficient described in scenario 3 in step S30 to obtain the target access waiting parameter.
  • the detection unit 420 is further configured to perform the process of performing access restriction detection according to the target access threshold and the target access waiting parameter described in scenario 3 in step S30.
  • the detection unit 420 is configured to perform the process of determining the target access identifier described in scenario 4 in step S30.
  • the detection unit 420 is configured to perform the process of determining the target first access restriction parameter and the target second access restriction parameter described in scenario 4 in step S30.
  • the detection unit 420 is further configured to perform the adjustment of the target second access threshold according to the target first coefficient as described in the fourth scenario in step S30 to obtain the target access threshold, and/or, the target second coefficient according to the target second coefficient.
  • the process of adjusting the access waiting parameters to obtain the target access waiting parameters.
  • the detection unit 420 is further configured to perform the process of performing access restriction detection according to the target access threshold and the target access waiting parameter described in scenario 4 in step S30.
  • FIG. 5 is a schematic diagram of another structure of an apparatus provided by an embodiment of the present application.
  • the device may be the network device in the first embodiment, and may be used to implement the access restriction detection method described in the first embodiment.
  • the device includes a processor 51, a memory 52, a transceiver 53 and a bus system 54.
  • the memory 51 includes but is not limited to RAM, ROM, EPROM or CD-ROM, and the memory 51 is used to store related instructions and data.
  • the memory 51 stores the following elements, executable modules or data structures, or their subsets, or their extended sets:
  • Operating instructions including various operating instructions, used to implement various operations.
  • Operating system including various system programs, used to implement various basic services and process hardware-based tasks.
  • FIG. 5 Only one memory is shown in FIG. 5. Of course, the memory can also be set to multiple as required.
  • the transceiver 53 may be a communication module or a transceiver circuit. Applied in the embodiment of this application, the transceiver 53 is used to execute the sending process of the first message involved in the first embodiment.
  • the processor 51 may be a controller, a CPU, a general-purpose processor, DSP, ASIC, FPGA or other programmable logic devices, transistor logic devices, hardware components, or any combination thereof. It can implement or execute various exemplary logical blocks, modules, and circuits described in conjunction with the disclosure of the embodiments of the present application. The procedure for determining at least one set of first access restriction detection parameters as described in the first embodiment.
  • the processor 51 may also be a combination for realizing computing functions, for example, including a combination of one or more microprocessors, a combination of a DSP and a microprocessor, and so on.
  • bus system 54 In addition to the data bus, the bus system 54 may also include a power bus, a control bus, and a status signal bus. However, for the sake of clarity, various buses are marked as the bus system 54 in FIG. 5. For ease of illustration, FIG. 5 is only schematically drawn.
  • the processor in the embodiment of the present application may be an integrated circuit chip with signal processing capability.
  • the steps of the foregoing method embodiments can be completed by hardware integrated logic circuits in the processor or instructions in the form of software.
  • the above-mentioned processor can be a general-purpose processor, a digital signal processor (digital signal processor, DSP), an application specific integrated circuit (ASIC), a ready-made programmable gate array (field programmable gate array, FPGA) or other Programming logic devices, discrete gates or transistor logic devices, discrete hardware components.
  • DSP digital signal processor
  • ASIC application specific integrated circuit
  • FPGA field programmable gate array
  • Programming logic devices discrete gates or transistor logic devices, discrete hardware components.
  • the memory in the embodiment of the present application may be a volatile memory or a non-volatile memory, or may include both volatile and non-volatile memory.
  • the non-volatile memory can be read-only memory (ROM), programmable read-only memory (programmable ROM, PROM), erasable programmable read-only memory (erasable PROM, EPROM), and electronic Erase programmable read-only memory (electrically EPROM, EEPROM) or flash memory.
  • the volatile memory may be random access memory (RAM), which is used as an external cache.
  • RAM random access memory
  • static random access memory static random access memory
  • dynamic RAM dynamic random access memory
  • synchronous dynamic random access memory synchronous DRAM, SDRAM
  • double data rate synchronous dynamic random access memory double data rate SDRAM, DDR SDRAM
  • enhanced synchronous dynamic random access memory enhanced SDRAM, ESDRAM
  • synchronous connection dynamic random access memory direct rambus RAM, DR RAM
  • direct rambus RAM direct rambus RAM
  • the embodiment of the present application also provides a computer-readable medium on which a computer program is stored, and when the computer program is executed by a computer, the method or step executed by the network device in the first embodiment is implemented.
  • the embodiment of the present application also provides a computer program product, which, when executed by a computer, implements the method or step executed by the network device in the first embodiment.
  • the embodiment of the present application also provides a device, which may be the network device in the first embodiment.
  • the device includes a processor and an interface.
  • the processor is used to execute the method or step executed by the network device in the first embodiment.
  • the foregoing network device may be a chip, and the foregoing processor may be implemented by hardware or software.
  • the processor When implemented by hardware, the processor may be a logic circuit, an integrated circuit, or the like.
  • the processor When implemented by software, the processor may be a general-purpose processor, which is implemented by reading software codes stored in the memory, and the memory may be integrated in the processor, may be located outside the foregoing processor, and exist independently.
  • FIG. 6 is a schematic diagram of another structure of a device provided by an embodiment of the present application.
  • the device may be the terminal device in the first embodiment, and may be used to implement the access restriction detection method described in the first embodiment.
  • the device includes a processor 61, a memory 62, a transceiver 63 and a bus system 64.
  • the memory 61 includes but is not limited to RAM, ROM, EPROM or CD-ROM, and the memory 61 is used to store related instructions and data.
  • the memory 61 stores the following elements, executable modules or data structures, or their subsets, or their extended sets:
  • Operating instructions including various operating instructions, used to implement various operations.
  • Operating system including various system programs, used to implement various basic services and process hardware-based tasks.
  • the transceiver 63 may be a communication module or a transceiver circuit. In the embodiment of the present application, the transceiver 63 is used to execute the first message receiving process involved in the first embodiment.
  • the processor 61 may be a controller, a CPU, a general-purpose processor, a DSP, an ASIC, an FPGA or other programmable logic devices, transistor logic devices, hardware components, or any combination thereof. It can implement or execute various exemplary logical blocks, modules, and circuits described in conjunction with the disclosure of the embodiments of the present application. As the access restriction detection process involved in the first embodiment.
  • the processor 61 may also be a combination that implements computing functions, for example, includes a combination of one or more microprocessors, a combination of a DSP and a microprocessor, and so on.
  • bus system 64 the various components of the device are coupled together through a bus system 64, where the bus system 64 may include a power bus, a control bus, and a status signal bus in addition to a data bus.
  • bus system 64 may include a power bus, a control bus, and a status signal bus in addition to a data bus.
  • various buses are marked as the bus system 64 in FIG. 6.
  • FIG. 6 is only schematically drawn.
  • the processor in the embodiment of the present application may be an integrated circuit chip with signal processing capability.
  • the steps of the foregoing method embodiments can be completed by hardware integrated logic circuits in the processor or instructions in the form of software.
  • the above-mentioned processor can be a general-purpose processor, a digital signal processor (digital signal processor, DSP), an application specific integrated circuit (ASIC), a ready-made programmable gate array (field programmable gate array, FPGA) or other Programming logic devices, discrete gates or transistor logic devices, discrete hardware components.
  • DSP digital signal processor
  • ASIC application specific integrated circuit
  • FPGA field programmable gate array
  • Programming logic devices discrete gates or transistor logic devices, discrete hardware components.
  • the memory in the embodiment of the present application may be a volatile memory or a non-volatile memory, or may include both volatile and non-volatile memory.
  • the non-volatile memory can be read-only memory (ROM), programmable read-only memory (programmable ROM, PROM), erasable programmable read-only memory (erasable PROM, EPROM), and electronic Erase programmable read-only memory (electrically EPROM, EEPROM) or flash memory.
  • the volatile memory may be random access memory (RAM), which is used as an external cache.
  • RAM random access memory
  • static random access memory static random access memory
  • dynamic RAM dynamic random access memory
  • synchronous dynamic random access memory synchronous DRAM, SDRAM
  • double data rate synchronous dynamic random access memory double data rate SDRAM, DDR SDRAM
  • enhanced synchronous dynamic random access memory enhanced SDRAM, ESDRAM
  • synchronous connection dynamic random access memory direct rambus RAM, DR RAM
  • direct rambus RAM direct rambus RAM
  • the embodiment of the present application also provides a computer-readable medium on which a computer program is stored, and when the computer program is executed by a computer, the method or step executed by the network device in the first embodiment is implemented.
  • the embodiment of the present application also provides a computer program product, which, when executed by a computer, implements the method or step executed by the terminal device in the first embodiment.
  • An embodiment of the present application also provides a device, which may be the terminal device in the first embodiment.
  • the device includes a processor and an interface.
  • the processor is used to execute the method or step executed by the terminal device in the first embodiment.
  • the foregoing terminal device may be a chip, and the foregoing processor may be implemented by hardware or software.
  • the processor When implemented by hardware, the processor may be a logic circuit, an integrated circuit, or the like.
  • the processor When implemented by software, the processor may be a general-purpose processor, which is implemented by reading software codes stored in the memory, and the memory may be integrated in the processor, may be located outside the foregoing processor, and exist independently.
  • the above method embodiments it may be implemented in whole or in part by software, hardware, firmware, or any combination thereof.
  • software it can be implemented in the form of a computer program product in whole or in part.
  • the above-mentioned computer program product includes one or more computer instructions.
  • the foregoing computer instructions are loaded and executed on a computer, the foregoing processes or functions according to the embodiments of the present application are generated in whole or in part.
  • the above-mentioned computer may be a general-purpose computer, a special-purpose computer, a computer network, or other programmable devices.
  • the aforementioned computer instructions can be stored in a computer-readable storage medium, or transmitted from one computer-readable storage medium to another computer-readable storage medium.
  • the aforementioned computer instructions can be transmitted from a website, computer, server, or data center through a wired (Such as coaxial cable, optical fiber, digital subscriber line (digital subscriber Line, DSL) or wireless (such as infrared, wireless, microwave, etc.) transmission to another website site, computer, server or data center.
  • a wired such as coaxial cable, optical fiber, digital subscriber line (digital subscriber Line, DSL) or wireless (such as infrared, wireless, microwave, etc.) transmission to another website site, computer, server or data center.
  • the medium can be any usable medium that can be accessed by a computer or a data storage device such as a server or data center integrated with one or more usable media.
  • the above usable media can be magnetic media (for example, floppy disks, hard disks, tapes), optical media (For example, a high-density digital video disc (digital video disc, DVD), or a semiconductor medium (for example, a solid state disk (SSD), etc.).
  • magnetic media for example, floppy disks, hard disks, tapes
  • optical media for example, a high-density digital video disc (digital video disc, DVD), or a semiconductor medium (for example, a solid state disk (SSD), etc.
  • SSD solid state disk
  • system and “network” in the embodiments of the present application can often be used interchangeably.
  • the term “and/or” in this embodiment is only an association relationship describing the associated objects, indicating that there can be three types of relationships, for example, A and/or B, which can mean that A exists alone, and A and B exist at the same time. There are three cases of B alone.
  • the character "/" in this text generally indicates that the associated objects before and after are in an "or” relationship.
  • the disclosed system, device, and method may be implemented in other ways.
  • the device described above is only illustrative.
  • the division of units is only a logical function division. In actual implementation, there may be other divisions.
  • multiple units or components can be combined or integrated into another. A system or some features can be ignored or not implemented.
  • the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may also be electrical, mechanical or other forms of connection.
  • the functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit.
  • the above-mentioned integrated unit can be implemented in the form of hardware or software functional unit.

Abstract

Disclosed are a method and device for access restriction detection, capable of solving the problem of a terminal device being unable to transmit normally a prior access restriction detection via small data packets due to mismatching access restriction parameters, thus avoiding a case in which the terminal device has to repeatedly launch access restriction detection prior to transmitting small data packets. A network device first determines at least one group of first access restriction parameters corresponding to a small data packet transmission scheme. The network device transmits to the terminal device a first message comprising the at least one group of first access restriction parameters. The employment of the method provided in the embodiments of the present application increases the pass rate of an access restriction detection prior to data transmission performed by the terminal device on the basis of a small data packet transmission scheme, and increases the resource utilization rate for a radio communication network.

Description

一种接入限制检测方法和装置Method and device for detecting access restriction
本申请要求于2019年08月07日提交中国专利局、申请号为201910733373.2、申请名称为“一种接入限制检测方法和装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。This application claims the priority of a Chinese patent application filed with the Chinese Patent Office on August 07, 2019, the application number is 201910733373.2, and the application name is "a method and device for access restriction detection", the entire content of which is incorporated herein by reference Applying.
技术领域Technical field
本申请涉及无线通信领域,尤其涉及一种接入限制检测方法和装置。This application relates to the field of wireless communication, and in particular to a method and device for detecting access restriction.
背景技术Background technique
随着无线通信技术的发展,各种新的业务层出不穷,不同业务会需求不同的资源,这就使得如何提升无线通信网络的资源利用率成为人们日益关注的问题。在现有的无线通信网络中,尤其是诸如机器类通信(machine type communication,MTC)网络,终端设备经常需要向网络设备发送一些数据量小的数据包(下文简称为小数据包)。为了发送这些小数据包,终端设备需要频繁的在空闲态或非激活状态与连接态之间进行切换,会造成大量的信令开销,导致无线通信网络的资源利用率低。为了解决这个问题,人们提出了诸如数据早传(early data transmission,EDT)等适用于小数据包的数据传输方式,可使得终端设备在空闲态或者非激活态即可向网络设备发送一些小数据包,从而节省了无线通信网络的信令开销。With the development of wireless communication technology, various new services emerge in an endless stream, and different services require different resources. This makes how to improve the resource utilization rate of wireless communication networks has become an issue of increasing concern. In existing wireless communication networks, especially such as machine type communication (MTC) networks, terminal devices often need to send some small data packets (hereinafter referred to as small data packets) to network devices. In order to send these small data packets, the terminal device needs to frequently switch between the idle state or the inactive state and the connected state, which will cause a large amount of signaling overhead and result in low resource utilization of the wireless communication network. In order to solve this problem, people have proposed data transmission methods suitable for small data packets such as early data transmission (EDT), which can enable the terminal device to send some small data to the network device in the idle or inactive state Packets, thereby saving the signaling overhead of the wireless communication network.
现有技术中,终端设备只有通过接入限制检测才能与网络设备建立链接并向网络设备发送数据。实际应用中,终端设备采用小数据包传输方式进行数据传输时无需进入连接态,这就使得需要进入连接态才能进行数据传输的方法(即占用网络资源较多的数据传输方法)所对应的接入限制参数并不适用于小数据包传输方式所对应的接入限制检测。In the prior art, the terminal device can only establish a link with the network device and send data to the network device only through the access restriction detection. In practical applications, the terminal device does not need to enter the connected state when using the small data packet transmission method for data transmission, which makes it necessary to enter the connected state for data transmission methods (that is, data transmission methods that occupy more network resources) corresponding to the connection The access restriction parameter does not apply to the access restriction detection corresponding to the small data packet transmission mode.
发明内容Summary of the invention
本申请实施例提供了一种接入限制检测方法和装置。采用本申请实施例提供的方法,可提升终端设备基于小数据包传输方式进行数据传输之前的接入限制检测的通过率,使得终端设备在进行小数据包传输之前无需重复的触发接入限制检测,提升了无线通信网络的资源利用率。The embodiments of the present application provide a method and device for detecting access restriction. Using the method provided in the embodiments of the present application can improve the pass rate of the terminal device's access restriction detection before data transmission based on the small data packet transmission mode, so that the terminal device does not need to repeatedly trigger the access restriction detection before the small data packet transmission , Improve the resource utilization rate of the wireless communication network.
第一方面,本申请实施例提供了一种接入限制检测方法。网络设备确定至少一组第一接入限制参数。网络设备向终端设备发送第一消息,该第一消息包含上述至少一组第一接入限制参数。这里,上述至少一组第一接入限制参数对应小数据包传输方式,上述至少一组第一接入限制参数用于接入限制检测。In the first aspect, an embodiment of the present application provides an access restriction detection method. The network device determines at least one set of first access restriction parameters. The network device sends a first message to the terminal device, where the first message includes the foregoing at least one set of first access restriction parameters. Here, the aforementioned at least one set of first access restriction parameters corresponds to a small data packet transmission mode, and the aforementioned at least one set of first access restriction parameters is used for access restriction detection.
在本申请实施例中,网络设备可为终端设备提供至少一组适用于小数据包传输之前的接入限制检测的接入限制参数,可解决因接入限制参数不匹配所导致的终端设备无法正常通过小数包传输之前接入限制检测的问题,避免了终端设备在进行小数据包传输之前重复的发起接入限制检测的情况。使得终端设备在进行小数据包传输之前无需重复的触发接入限制检测,提升了无线通信网络的资源利用率。In the embodiment of the present application, the network device can provide the terminal device with at least one set of access restriction parameters suitable for the access restriction detection before the transmission of small data packets, which can solve the inability of the terminal device caused by the mismatch of the access restriction parameters. The problem of access restriction detection before the fractional packet transmission is normally passed, avoiding the situation that the terminal device repeatedly initiates the access restriction detection before the small data packet transmission. Therefore, the terminal device does not need to repeatedly trigger the access restriction detection before transmitting the small data packet, which improves the resource utilization rate of the wireless communication network.
结合第一方面,在一种可行的实现方式中,第一消息中包括一组第一接入限制参数,上述一组第一接入限制参数中包括第一接入阈值和第一接入等待参数。网络设备单独为终端设备配置一组用于小数据包传输之前的接入限制检测的接入限制参数,可使得终端设备在进行小数据包传输之前无需重复的触发接入限制检测,提升了无线通信网络的资源利用率。With reference to the first aspect, in a feasible implementation manner, the first message includes a set of first access restriction parameters, and the set of first access restriction parameters includes a first access threshold and a first access waiting parameter. The network device separately configures a set of access restriction parameters for the terminal device for the access restriction detection before the small data packet transmission, so that the terminal device does not need to repeatedly trigger the access restriction detection before the small data packet transmission, which improves the wireless The resource utilization of the communication network.
结合第一方面,在一种可行的实现方式中,第一消息中包括多组第一接入限制参数。上述多组第一接入限制参数中的每组第一接入限制参数中包括第一接入阈值、第一接入等待参数和接入标识。这里,接入标识不同的第一接入限制参数通过接入限制检测的概率不同。网络设备为不同设备等级的终端设备配置不同组用于小数据包传输之前的接入限制检测的接入限制参数,可使得设备等级高的终端设备比设备等级低的终端设备更容易通过接入限制检测,在提升无线通信网络的资源利用率的同时也保证了接入限制检测操作的合理性,提升了接入限制检测方法的实用性。With reference to the first aspect, in a feasible implementation manner, the first message includes multiple sets of first access restriction parameters. Each group of first access restriction parameters in the above-mentioned multiple sets of first access restriction parameters includes a first access threshold, a first access waiting parameter, and an access identifier. Here, the first access restriction parameters with different access identifiers have different probabilities of passing the access restriction detection. The network equipment configures different sets of access restriction parameters for the access restriction detection before the transmission of small data packets for the terminal equipment of different equipment levels, which can make the terminal equipment with higher equipment level easier to access than the terminal equipment with lower equipment level The restriction detection not only improves the resource utilization rate of the wireless communication network, but also ensures the rationality of the access restriction detection operation, and improves the practicability of the access restriction detection method.
结合第一方面,在一种可行的实现方式中,第一消息中包括一组第一接入限制参数和除上述小数据包传输方式以外的其他数据传输方式对应的一组第二接入限制参数。上述一组第二接入限制参数用于接入限制检测。上述第一接入限制参数中包括第一系数和第二系数。上述第二接入限制参数包括第二接入阈值和第二接入等待参数。这里,上述第一系数用于调整上述第二接入阈值,和/或,上述第二系数用于调整上述第二接入等待参数。网络设备通过其生成的第一接入限制参数对现有的适用于第二业务的接入限制检测的第二接入限制参数进行调整以得到用于小数据包传输之前的接入限制检测的接入限制参数,避免了因单独生成一整套适用于上述第一业务的接入限制参数所导致的对现有信令结构或通信协议带来的大量修改,避免了开发成本增加,使得本申请提供的接入限制检测方法更容易实现,在提升无线通信网络的资源利用率的同时也提升了接入限制检测方法的实用性。With reference to the first aspect, in a feasible implementation manner, the first message includes a set of first access restriction parameters and a set of second access restrictions corresponding to data transmission methods other than the aforementioned small data packet transmission method parameter. The foregoing set of second access restriction parameters is used for access restriction detection. The aforementioned first access restriction parameter includes a first coefficient and a second coefficient. The foregoing second access restriction parameter includes a second access threshold and a second access waiting parameter. Here, the first coefficient is used to adjust the second access threshold, and/or the second coefficient is used to adjust the second access waiting parameter. The network device adjusts the existing second access restriction parameter suitable for the access restriction detection of the second service through the first access restriction parameter generated by the network device to obtain the access restriction detection before the transmission of the small data packet. The access restriction parameter avoids a large number of modifications to the existing signaling structure or communication protocol caused by generating a set of access restriction parameters applicable to the above-mentioned first service, and avoids the increase in development cost, which makes this application The provided access restriction detection method is easier to implement, which improves the practicability of the access restriction detection method while improving the resource utilization rate of the wireless communication network.
结合第一方面,在一种可行的实现方式中,第一消息中包括多组第一接入限制参数和除上述小数据包传输方式以外的其他数据传输方式对应的多组第二接入限制参数,一组第一接入限制参数对应一组第二接入限制参数,上述多组第二接入限制参数中的每组第二接入限制参数均用于接入限制检测。上述每组第二接入限制参数中包括第二接入阈值、第二接入等待参数和接入标识。上述每组第二接入限制参数对应的一组第一接入限制参数中包括第一系数、第二系数和上述接入标识。其中,上述第一系数用于调整上述第二接入阈值,和/或,上述第二系数用于调整上述第二接入等待参数,接入标识不同的第一接入限制参数和第二接入限制参数通过接入限制检测的概率不同。网络设备通过其生成的多组第一接入限制参数对现有的适用于第二业务的多组第二接入限制参数进行调整以使得不同设备等级的终端设备可以使用不同的参数进行小数据包传输之前的接入限制检测,可使得设备等级高的终端设备通过接入限制检测的概率更高,避免了因单独生成多套适用于上述第一业务的接入限制参数所导致的对现有信令结构或通信协议带来的大量修改,避免了开发成本增加,在提升无线通信网络的资源利用率的同时也提升了接入限制检测方法的实用性。With reference to the first aspect, in a feasible implementation manner, the first message includes multiple sets of first access restriction parameters and multiple sets of second access restrictions corresponding to data transmission methods other than the aforementioned small data packet transmission method Parameters, a group of first access restriction parameters corresponds to a group of second access restriction parameters, and each group of second access restriction parameters in the above-mentioned multiple sets of second access restriction parameters is used for access restriction detection. Each of the foregoing second access restriction parameters includes a second access threshold, a second access waiting parameter, and an access identifier. A group of first access restriction parameters corresponding to each group of second access restriction parameters includes a first coefficient, a second coefficient, and the aforementioned access identifier. Wherein, the first coefficient is used to adjust the second access threshold, and/or the second coefficient is used to adjust the second access waiting parameter, the first access restriction parameter and the second access parameter with different access identifiers The probability of the access restriction parameter being detected by the access restriction is different. The network device adjusts the existing multiple sets of second access restriction parameters applicable to the second service through the multiple sets of first access restriction parameters generated by it, so that terminal devices of different equipment levels can use different parameters for small data The access restriction detection before the packet transmission can make the terminal equipment with high equipment level have a higher probability of passing the access restriction detection, and avoid the interference caused by the separate generation of multiple sets of access restriction parameters suitable for the first service. There are a large number of modifications brought about by the signaling structure or communication protocol, which avoids the increase in development costs, and improves the practicability of the access restriction detection method while improving the resource utilization of the wireless communication network.
第二方面,本申请实施例提供一种接入限制检测方法。终端设备接收来自网络设备的第一消息。这里,上述第一消息中包括小数据包传输方式对应的至少一组第一接入限制参数。若终端设备确定数据传输方式为上述小数据包传输方式,则根据上述至少一组第一接 入限制参数进行接入限制检测。In the second aspect, an embodiment of the present application provides an access restriction detection method. The terminal device receives the first message from the network device. Here, the foregoing first message includes at least one set of first access restriction parameters corresponding to the small data packet transmission mode. If the terminal device determines that the data transmission mode is the aforementioned small data packet transmission mode, it performs access restriction detection according to the aforementioned at least one set of first access restriction parameters.
在本申请实施例中,终端设备基于网络设备提供的至少一组适用于小数据包传输的接入限制参数进行接入限制检测,可解决因接入限制参数不匹配所导致的终端设备无法正常通过小数包传输之前接入限制检测的问题,避免了终端设备在进行小数据包传输之前重复的发起接入限制检测的情况,提升了无线通信网络的资源利用率。In the embodiment of the present application, the terminal device performs access restriction detection based on at least one set of access restriction parameters suitable for transmission of small data packets provided by the network device, which can solve the problem that the terminal device cannot be normal due to the mismatch of the access restriction parameters Through the problem of access restriction detection before fractional packet transmission, the situation that the terminal device repeatedly initiates access restriction detection before small data packet transmission is avoided, and the resource utilization rate of the wireless communication network is improved.
结合第二方面,在一种可行的实现方式中,第一消息中包括一组第一接入限制参数,上述一组第一接入限制参数中包括第一接入阈值和第一接入等待参数。With reference to the second aspect, in a feasible implementation manner, the first message includes a set of first access restriction parameters, and the foregoing set of first access restriction parameters includes a first access threshold and a first access waiting parameter.
结合第二方面,在一种可行的实现方式中,上述终端设备根据上述第一接入阈值和上述第一接入等待参数进行接入限制检测。With reference to the second aspect, in a feasible implementation manner, the terminal device performs access restriction detection according to the first access threshold and the first access waiting parameter.
结合第二方面,在一种可行的实现方式中,第一消息中包括多组第一接入限制参数,上述多组第一接入限制参数中每组第一接入限制参数中包括第一接入阈值、第一接入等待参数和接入标识,其中,接入标识不同的第一接入限制参数通过接入限制检测的概率不同。With reference to the second aspect, in a feasible implementation manner, the first message includes multiple sets of first access restriction parameters, and each of the multiple sets of first access restriction parameters includes the first access restriction parameter. The access threshold, the first access waiting parameter and the access identifier, where the first access restriction parameters with different access identifiers have different probabilities of passing the access restriction detection.
结合第二方面,在一种可行的实现方式中,上述终端设备确定目标接入标识。上述终端设备根据上述目标接入标识从上述多组第一接入限制参数中确定出目标第一接入限制参数。这里,上述目标第一接入限制参数中包括目标第一接入阈值、目标第一接入等待参数和上述目标接入标识。上述终端设备根据上述目标第一接入阈值和上述目标第一接入等待参数进行接入限制检测。With reference to the second aspect, in a feasible implementation manner, the foregoing terminal device determines a target access identifier. The terminal device determines the target first access restriction parameter from the multiple sets of first access restriction parameters according to the target access identifier. Here, the target first access restriction parameter includes the target first access threshold, the target first access waiting parameter, and the target access identifier. The terminal device performs access restriction detection according to the target first access threshold and the target first access waiting parameter.
结合第二方面,在一种可行的实现方式中,第一消息中包括一组第一接入限制参数和除上述小数据包传输以外的其他数据传输方式对应的一组第二接入限制参数,上述一组第二接入限制参数用于接入限制检测。上述第一接入限制参数中包括第一系数和第二系数,上述第二接入限制参数包括第二接入阈值和第二接入等待参数。这里,上述第一系数用于调整上述第二接入阈值,和/或,上述第二系数用于调整上述第二接入等待参数。With reference to the second aspect, in a feasible implementation manner, the first message includes a set of first access restriction parameters and a set of second access restriction parameters corresponding to data transmission methods other than the aforementioned small data packet transmission , The above-mentioned set of second access restriction parameters are used for access restriction detection. The first access restriction parameter includes a first coefficient and a second coefficient, and the second access restriction parameter includes a second access threshold and a second access waiting parameter. Here, the first coefficient is used to adjust the second access threshold, and/or the second coefficient is used to adjust the second access waiting parameter.
结合第二方面,在一种可行的实现方式中,上述终端设备根据上述第一系数对上述第二接入阈值进行调整,以得到目标接入阈值。和/或,上述终端设备根据上述第二系数对上述第二接入等待参数进行调整,以得到目标接入等待参数。上述终端设备根据上述目标接入阈值和上述目标接入等待参数进行接入限制检测。With reference to the second aspect, in a feasible implementation manner, the terminal device adjusts the second access threshold according to the first coefficient to obtain the target access threshold. And/or, the terminal device adjusts the second access waiting parameter according to the second coefficient to obtain the target access waiting parameter. The terminal device performs access restriction detection according to the target access threshold and the target access waiting parameter.
结合第二方面,在一种可行的实现方式中,第一消息中包括多组第一接入限制参数和除上述小数据包传输方式以外的其他数据传输方式对应的多组第二接入限制参数,一组第一接入限制参数对应一组第二接入限制参数,上述多组第二接入限制参数中的每组第二接入限制参数均用于接入限制检测。上述每组第二接入限制参数中包括第二接入阈值、第二接入等待参数和接入标识,上述每组第二接入限制参数对应的一组第一接入限制参数中包括第一系数、第二系数和上述接入标识,其中,上述第一系数用于调整上述第二接入阈值,和/或,上述第二系数用于调整上述第二接入等待参数,接入标识不同的第一接入限制参数和第二接入限制参数通过接入限制检测的概率不同。With reference to the second aspect, in a feasible implementation manner, the first message includes multiple sets of first access restriction parameters and multiple sets of second access restrictions corresponding to data transmission methods other than the aforementioned small data packet transmission method Parameters, a group of first access restriction parameters corresponds to a group of second access restriction parameters, and each group of second access restriction parameters in the above-mentioned multiple sets of second access restriction parameters is used for access restriction detection. Each set of second access restriction parameters includes a second access threshold, a second access waiting parameter, and an access identifier, and each set of second access restriction parameters corresponds to a set of first access restriction parameters that includes the first access restriction parameter. A coefficient, a second coefficient, and the access identifier, wherein the first coefficient is used to adjust the second access threshold, and/or the second coefficient is used to adjust the second access waiting parameter, the access identifier Different first access restriction parameters and second access restriction parameters have different probability of passing the access restriction detection.
结合第二方面,在一种可行的实现方式中,上述终端设备确定目标接入标识。上述终端设备根据上述目标接入标识从上述多组第一接入限制参数和上述多组第二接入限制参数中确定出目标第一接入限制参数和目标第二接入限制参数。这里,上述目标第一接入限制参数中包括目标第一系数、目标第二系数和上述目标接入标识,上述目标第二接入限制参 数中包括目标第二接入阈值、目标第二接入等待参数和上述目标接入标识。上述终端设备根据上述目标第一系数对上述目标第二接入阈值进行调整,以得到目标接入阈值。和/或,上述终端设备根据上述目标第二系数对上述目标第二接入等待参数进行调整,以得到目标接入等待参数。上述终端设备根据上述目标接入阈值和上述目标接入等待参数进行接入限制检测。With reference to the second aspect, in a feasible implementation manner, the foregoing terminal device determines a target access identifier. The terminal device determines the target first access restriction parameter and the target second access restriction parameter from the multiple sets of first access restriction parameters and the multiple sets of second access restriction parameters according to the target access identifier. Here, the target first access restriction parameter includes a target first coefficient, a target second coefficient, and the target access identifier, and the target second access restriction parameter includes a target second access threshold, a target second access Wait for the parameters and the aforementioned target access identifier. The terminal device adjusts the target second access threshold according to the target first coefficient to obtain the target access threshold. And/or, the terminal device adjusts the target second access waiting parameter according to the target second coefficient to obtain the target access waiting parameter. The terminal device performs access restriction detection according to the target access threshold and the target access waiting parameter.
第三方面,本申请实施例提供了一种装置。该装置可为网络设备本身,也可为网络设备内部的如芯片等元件或者模块。该装置包括用于执行上述第一方面的任意一种可能的实现方式所提供的接入限制检测方法的单元,因此也能是实现第一方面提供的接入限制检测方法所具备的有益效果(或者优点)。In the third aspect, an embodiment of the present application provides a device. The device can be the network device itself, or can be a component or module such as a chip inside the network device. The device includes a unit for executing the access restriction detection method provided by any one of the possible implementations of the first aspect, so it can also achieve the beneficial effects of the access restriction detection method provided by the first aspect ( Or advantages).
第四方面,本申请实施例提供了一种装置。该装置可为终端设备本身,也可为终端设备内部的如芯片等元件或者模块。该装置包括用于执行上述第二方面的任意一种可能的实现方式所提供的接入限制检测方法的单元,因此也能是实现第二方面提供的接入限制检测方法所具备的有益效果(或者优点)。In the fourth aspect, an embodiment of the present application provides a device. The device can be the terminal device itself, or an internal component or module such as a chip in the terminal device. The device includes a unit for executing the access restriction detection method provided by any one of the possible implementations of the second aspect, so it can also achieve the beneficial effects of the access restriction detection method provided by the second aspect ( Or advantages).
第五方面,本申请实施例提供了一种装置,该装置可为网络设备本身,也可为网络设备内部的如芯片等元件或者模块。该装置包括存储器、处理器、和收发器。其中,该处理器用于调用存储器存储的代码执行上述第一方面中任意一种可行的实现方式所提供的接入限制检测方法。In the fifth aspect, the embodiments of the present application provide a device, which may be the network device itself, or may be a component or module such as a chip inside the network device. The device includes a memory, a processor, and a transceiver. Wherein, the processor is configured to call the code stored in the memory to execute the access restriction detection method provided by any feasible implementation manner in the first aspect.
第六方面,本申请实施例提供了一种装置,该装置可为终端设备本身,也可为终端设备内部的如芯片等元件或者模块。该装置包括存储器、处理器、和收发器。其中,该处理器用于调用存储器存储的代码执行上述第一方面中任意一种可行的实现方式所提供的接入限制检测方法。In a sixth aspect, an embodiment of the present application provides a device, which may be the terminal device itself, or may be an element or module such as a chip inside the terminal device. The device includes a memory, a processor, and a transceiver. Wherein, the processor is configured to call the code stored in the memory to execute the access restriction detection method provided by any feasible implementation manner in the first aspect.
第七方面,本申请实施例提供了一种装置,该装置可为网络设备本身,也可为网络设备内部的如芯片等元件或者模块。该装置包括:处理器和接口电路。该接口电路用于接收代码指令并传输至该处理器。该处理器用于运行上述代码指令以实现上述第一方面中任意一种可行的实现方式所提供的接入限制检测方法,也能实现上述第一方面提供的接入限制检测方法所具备的有益效果(或者优点)。In a seventh aspect, an embodiment of the present application provides a device, which may be the network device itself, or may be a component or module such as a chip inside the network device. The device includes a processor and an interface circuit. The interface circuit is used to receive code instructions and transmit them to the processor. The processor is configured to run the foregoing code instructions to implement the access restriction detection method provided by any one of the feasible implementation manners of the foregoing first aspect, and can also achieve the beneficial effects of the access restriction detection method provided by the foregoing first aspect (Or advantages).
第八方面,本申请实施例提供了一种装置,该装置可为终端设备本身,也可为终端设备内部的如芯片等元件或者模块。该装置包括:处理器和接口电路。该接口电路用于接收代码指令并传输至该处理器。该处理器用于运行上述代码指令以实现上述第一方面中任意一种可行的实现方式所提供的接入限制检测方法,也能实现上述第一方面提供的接入限制检测方法所具备的有益效果(或者优点)。In an eighth aspect, an embodiment of the present application provides a device, which may be the terminal device itself, or may be a component or module such as a chip inside the terminal device. The device includes a processor and an interface circuit. The interface circuit is used to receive code instructions and transmit them to the processor. The processor is configured to run the foregoing code instructions to implement the access restriction detection method provided by any one of the feasible implementation manners of the foregoing first aspect, and can also achieve the beneficial effects of the access restriction detection method provided by the foregoing first aspect (Or advantages).
第九方面,本申请实施例提供了一种计算机可读存储介质,该计算机可读存储介质中存储有指令,当该指令在计算机上运行时,实现上述第一方面中任意一种可行的实现方式所提供的接入限制检测方法,也能实现上述第一方面提供的接入限制检测方法所具备的有益效果(或者优点)。In a ninth aspect, an embodiment of the present application provides a computer-readable storage medium that stores instructions in the computer-readable storage medium, and when the instructions are run on a computer, any one of the feasible implementations in the first aspect is realized The access restriction detection method provided by the method can also achieve the beneficial effects (or advantages) of the access restriction detection method provided in the first aspect.
第十方面,本申请实施例提供了一种计算机可读存储介质,该计算机可读存储介质中存储有指令,当该指令在计算机上运行时,实现上述第二方面中任意一种可行的实现方式所提供的接入限制检测方法,也能实现上述第二方面提供的接入限制检测方法所具备的有 益效果(或者优点)。In a tenth aspect, an embodiment of the present application provides a computer-readable storage medium that stores instructions in the computer-readable storage medium, and when the instructions are run on a computer, any one of the possible implementations of the second aspect mentioned above is realized The access restriction detection method provided by the method can also achieve the beneficial effects (or advantages) of the access restriction detection method provided in the second aspect.
第十一方面,本申请实施例提供了一种包含指令的计算机程序产品,当该计算机程序产品在计算机上运行时,使得计算机执行上述第一方面提供的接入限制检测方法,也能实现第一方面提供的接入限制检测方法所具备的有益效果。In an eleventh aspect, an embodiment of the present application provides a computer program product containing instructions. When the computer program product runs on a computer, the computer can execute the access restriction detection method provided in the first aspect above, and the first aspect can also be implemented. On the one hand, the provided access restriction detection method has the beneficial effects.
第十二方面,本申请实施例提供了一种包含指令的计算机程序产品,当该计算机程序产品在计算机上运行时,使得计算机执行上述第二方面提供的接入限制检测方法,也能实现第二方面提供的接入限制检测方法所具备的有益效果。In the twelfth aspect, the embodiments of the present application provide a computer program product containing instructions. When the computer program product is run on a computer, the computer can execute the access restriction detection method provided in the second aspect, which can also implement the first The beneficial effects of the access restriction detection method provided by the two aspects.
第十三方面,本申请实施例提供了一种通信***,该通信***包括上述第三方面和第四方面所描述的装置,或者,上述第五方面和第六方面所描述的装置,或者,上述第七方面和第八方面所描述的装置。In a thirteenth aspect, the embodiments of the present application provide a communication system, which includes the devices described in the third and fourth aspects above, or the devices described in the fifth and sixth aspects above, or, The device described in the seventh and eighth aspects above.
采用本申请实施例提供的方法,可提升终端设备基于小数据包传输方式进行数据传输之前的接入限制检测的通过率,可提升无线通信网络的资源利用率。By adopting the method provided in the embodiment of the present application, the pass rate of the access restriction detection before the data transmission of the terminal device based on the small data packet transmission mode can be improved, and the resource utilization rate of the wireless communication network can be improved.
附图说明Description of the drawings
图1是本申请实施例提供的一种通信***结构示意图;FIG. 1 is a schematic structural diagram of a communication system provided by an embodiment of the present application;
图2是本申请实施例提供的一种接入限制检测方法流程示意图;2 is a schematic flowchart of an access restriction detection method provided by an embodiment of the present application;
图3是本申请实施例提供的一种装置一结构示意图;FIG. 3 is a schematic structural diagram of a device provided by an embodiment of the present application;
图4是本申请实施例提供的一种装置又一结构示意图;FIG. 4 is another schematic structural diagram of a device provided by an embodiment of the present application;
图5是本申请实施例提供的一种装置又一结构示意图;FIG. 5 is another schematic structural diagram of a device provided by an embodiment of the present application;
图6是本申请实施例提供的一种装置又一结构示意图。FIG. 6 is a schematic diagram of another structure of an apparatus provided by an embodiment of the present application.
具体实施方式detailed description
首先,为了方便对本申请实施例的理解,这里对本申请实施例涉及到的几个重要概念进行解释说明。First, in order to facilitate the understanding of the embodiments of the present application, several important concepts involved in the embodiments of the present application are explained here.
概念一:小数包传输Concept 1: Fractional packet transmission
一般情况下,在某一通信网络中,可将数据量小于预设的数据量阈值的数据包称为小数据包。这里,可以理解到的是,上述数据量阈值一般仅为几个字节。不同的通信网络中可能对小数据包的定义不同。例如,在通信网络A中,可将数据量小于D1字节的数据包定义为小数包,而在通信网络B中,可将数据量小于D2字节的数据包定义为小数据包。在传统的通信网络中,空闲态或者非激活态的终端设备需要先与网络设备进行多条控制信令的传输与响应进入连接态,然后才能与网络设备进行数据或者信息的互传。而在诸如机器类通信(machine type communication,MTC)等通信网络中,终端设备会频繁的向网络设备发送一些小数据包,这就会导致终端设备需要频繁的在空闲态或者非激活态与连接态之间进行切换,造成大量的信令开销,降低了通信网络的资源浪费。针对这种情况,人们提出了一种通过小数据包进行数据传输的方式,即小数据包传输。所谓的小数据包传输,指代的是终端设备在确定需要传输的数据包是小数据包后,将该小数据包整合在一些控制信令中,然后通过这些控制信令将该小数据包传输至网络设备。或者,指代的是利用终端存储的数据面上下文,将小数据包传输给网络设备。这里,上述控制信令可包括非接入层 (non-access stratum,NAS)信令、无线资源控制(radio resource control,RRC)信令等。换句话说,所谓的小数据包传输指代就是终端设备无需进入连接态即可完成的数据传输过程的传输方式。通过小数据包传输,能使得终端设备无需进入连接态即可将数据发送给网络设备,解决了终端设备因频繁的在空闲态和非激活态与连接态之间切换造成大量的信令开销的问题,提升了通信网络的资源浪费利用率。实际应用中,采用小数据包传输方式进行数据传输的技术可包括数据早传(early data transmission,EDT)、2步随机接入,预先上行资源配置(pre-configured uplink resource,PUR)等,此处不做限定。Generally, in a certain communication network, a data packet whose data volume is less than a preset data volume threshold can be called a small data packet. Here, it can be understood that the above-mentioned data amount threshold is generally only a few bytes. Different communication networks may have different definitions of small data packets. For example, in communication network A, a data packet with a data volume less than D1 bytes can be defined as a decimal packet, while in communication network B, a data packet with a data volume less than D2 bytes can be defined as a small data packet. In a traditional communication network, a terminal device in an idle state or in an inactive state needs to transmit multiple control signaling with the network device and enter the connected state in response before it can exchange data or information with the network device. In communication networks such as machine type communication (MTC), terminal equipment will frequently send some small data packets to the network equipment, which will cause the terminal equipment to frequently be in idle or inactive state and connect Switching between states causes a large amount of signaling overhead and reduces the waste of resources in the communication network. In response to this situation, people have proposed a way of data transmission through small data packets, that is, small data packet transmission. The so-called small data packet transmission refers to that after the terminal device determines that the data packet to be transmitted is a small data packet, it integrates the small data packet into some control signaling, and then uses these control signaling to make the small data packet Transmit to network equipment. Or, it refers to using the data plane context stored by the terminal to transmit small data packets to the network device. Here, the aforementioned control signaling may include non-access stratum (NAS) signaling, radio resource control (radio resource control, RRC) signaling, and so on. In other words, the so-called small data packet transmission refers to the transmission method of the data transmission process that the terminal device does not need to enter the connected state. Through the transmission of small data packets, the terminal device can send data to the network device without entering the connected state, which solves the problem of a large amount of signaling overhead caused by frequent switching of the terminal device between the idle state and the inactive state and the connected state. The problem has improved the wasteful utilization of resources in the communication network. In practical applications, data transmission technologies using small data packet transmission methods can include early data transmission (EDT), 2-step random access, pre-configured uplink resource configuration (PUR), etc. There are no restrictions.
概念二:接入限制检测(access barring check)Concept 2: Access Barring Check
接入限制检测是网络设备控制其负载的一种方式。即,每当终端设备需要与网络设备建立连接以执行某项业务之前,终端设备需要基于该业务对应的业务类型从网络设备下发的多种业务类型对应的多套用于接入限制检测的参数(下文将以接入限制参数代替描述)中确定出目标业务对应的接入限制参数,再将该接入限制参数代入到预设的检测规则进行一次接入尝试,或者说进行一次接入限制检测。只有当终端设备根据该业务对应的接入限制参数满足上述检测规则中包括的检测通过条件时,终端设备才能够向网络设备发起随机接入以建立或者恢复与网络设备的连接。这里需要说明的是,上述业务类型可包括多种,如数据传输、多媒体电话服务等。上述检测规则主要用于约束终端设备进行接入限制检测的过程,该检测规则可以是终端设备在出厂时预先配置好的,也可以是由网络设备实时的或者周期性为终端设备配置的,此处不做具体限制。例如,上述检测规则可为第一检测规则,该第一检测规则涉及检测通过条件和等待时间生成公式,或者说第一检测规则与检测通过条件和等待时间生成公式相关。上述检测通过条件具体可为终端设备生成的大于或等于0且小于1的随机数a1小于网络设备配置的接入阈值A。上述等待时间生成公式具体可为T=(r1+r2*b)*C。这里,T为等待时间,r1和r2为常数,a2为终端设备生成的一个另一个大于或等于0且小于1的随机数,C为网络设备配置的接入等待参数。接入阈值A和接入等待参数C均大于或等于0且小于1。实际应用中,r1可取值为0.7,r2可取值为0.6。上述接入阈值可用于判定是否通过接入限制检测,上述等待时间公式用于确定出终端设备再一次发起接入限制检测的等待时间。具体实现中,终端设备获取到多组接入限制参数,然后基于其当前需要执行的业务类型从上述多组接入限制参数中确定出一组包含有接入阈值A1和接入等待参数C1的接入限制参数。然后再随机生成一个随机数a1,若终端设备确定随机数a1小于接入阈值A1,则可确定通过了接入限制检测。若终端设备确定随机数a1大于或者等于接入阈值A1,则确定未通过接入限制检测。此时,终端设备可再次生成一个随机数a2,然后结合接入等待参数C1和公式T=(r1+r2*a2)*C确定终端设备可在等待(r1+r2*b1)*C1时长后再次发起接入限制检测。Access restriction detection is a way for network equipment to control its load. That is, whenever a terminal device needs to establish a connection with a network device to perform a certain service, the terminal device needs to send multiple sets of parameters for access restriction detection corresponding to multiple service types from the network device based on the service type corresponding to the service. (Access restriction parameters will be substituted for the description below) The access restriction parameters corresponding to the target service are determined, and then the access restriction parameters are substituted into the preset detection rules for an access attempt, or an access restriction Detection. Only when the terminal device satisfies the detection passing condition included in the foregoing detection rule according to the access restriction parameters corresponding to the service, the terminal device can initiate random access to the network device to establish or restore the connection with the network device. It should be noted here that the above-mentioned service types may include multiple types, such as data transmission, multimedia phone services, and so on. The above detection rules are mainly used to restrict the terminal equipment to perform the access restriction detection process. The detection rules may be pre-configured by the terminal equipment at the factory, or configured by the network equipment in real time or periodically for the terminal equipment. There are no specific restrictions. For example, the above-mentioned detection rule may be a first detection rule, and the first detection rule relates to a formula for generating a passing condition and a waiting time, or in other words, the first detecting rule is related to a formula for generating a passing condition and a waiting time. The above detection passing condition may specifically be that the random number a1 generated by the terminal device that is greater than or equal to 0 and less than 1 is less than the access threshold A configured by the network device. The foregoing waiting time generation formula may specifically be T=(r1+r2*b)*C. Here, T is the waiting time, r1 and r2 are constants, a2 is another random number greater than or equal to 0 and less than 1 generated by the terminal device, and C is the access waiting parameter configured by the network device. Both the access threshold A and the access waiting parameter C are greater than or equal to 0 and less than 1. In practical applications, r1 can be set to a value of 0.7, and r2 can be set to a value of 0.6. The above access threshold can be used to determine whether the access restriction detection is passed, and the above waiting time formula is used to determine the waiting time for the terminal device to initiate the access restriction detection again. In specific implementation, the terminal device obtains multiple sets of access restriction parameters, and then based on the type of service that it currently needs to perform, determines a set of access restriction parameters including the access threshold A1 and the access waiting parameter C1 from the foregoing multiple access restriction parameters. Access restriction parameters. Then a random number a1 is randomly generated. If the terminal device determines that the random number a1 is less than the access threshold A1, it can be determined that it has passed the access restriction detection. If the terminal device determines that the random number a1 is greater than or equal to the access threshold A1, it is determined that the access restriction detection is not passed. At this time, the terminal device can generate a random number a2 again, and then combine the access waiting parameter C1 and the formula T=(r1+r2*a2)*C to determine that the terminal device can wait for (r1+r2*b1)*C1 Initiate access restriction detection again.
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚、完整地描述。The technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application.
本申请实施例提供了一种接入限制检测方法,该方法适用于可通过小数据包传输方式进行数据传输的各种无线通信***。例如MTC***、码分多址(code division multiple access,CDMA)***、宽带码分多址(wideband code division multiple access,WCDMA)***、通用分组无线业务(general packet radio service,GPRS)、长期演进(long term evolution, LTE)***、LTE频分双工(frequency division duplex,FDD)***、LTE时分双工(time division duplex,TDD)、通用移动通信***(universal mobile telecommunication system,UMTS)、全球互联微波接入(worldwide interoperability for microwave access,WiMAX)通信***、未来的第五代(5th generation,5G)***或新无线(new radio,NR)等。The embodiment of the present application provides an access restriction detection method, which is applicable to various wireless communication systems that can perform data transmission in a small data packet transmission manner. Such as MTC system, code division multiple access (CDMA) system, wideband code division multiple access (WCDMA) system, general packet radio service (GPRS), long-term evolution ( long term evolution, LTE) system, LTE frequency division duplex (FDD) system, LTE time division duplex (TDD), universal mobile telecommunication system (UMTS), global interconnected microwave Access (worldwide interoperability for microwave access, WiMAX) communication systems, the future 5th generation (5G) system or new radio (NR), etc.
本申请实施例中涉及的终端设备可以是用户设备、接入终端、用户单元、用户站、移动站、移动台、远方站、远程终端、移动设备、用户终端、终端、无线通信设备、用户代理或用户装置,也可以是蜂窝电话、无绳电话、会话启动协议(session initiation protocol,SIP)电话、无线本地环路(wireless local loop,WLL)站、个人数字处理(personal digital assistant,PDA)、具有无线通信功能的手持设备、计算设备或连接到无线调制解调器的其它处理设备、车载设备、路边单元、可穿戴设备,未来5G网络中的终端设备或者未来演进的公用陆地移动通信网络(public land mobile network,PLMN)中的终端设备等,本申请实施例对此并不限定。为方便理解,在本申请实施例中,将以第一终端设备或者第二终端设备统一进行描述。The terminal equipment involved in the embodiments of this application may be user equipment, access terminal, user unit, user station, mobile station, mobile station, remote station, remote terminal, mobile device, user terminal, terminal, wireless communication device, user agent Or user device, it can also be a cellular phone, a cordless phone, a session initiation protocol (SIP) phone, a wireless local loop (WLL) station, a personal digital assistant (PDA), Handheld devices, computing devices, or other processing devices connected to wireless modems, in-vehicle devices, roadside units, wearable devices, terminal devices in the future 5G network, or future evolution of public land mobile communication networks (public land mobile The terminal equipment in the network, PLMN) is not limited in the embodiment of the present application. To facilitate understanding, in the embodiments of the present application, the first terminal device or the second terminal device will be collectively described.
本申请实施例所涉及到的网络设备是一种部署在无线接入网(radio access network,RAN)中用以为终端设备提供无线通信功能的设备。网络设备具体可为基站,上述基站可以包括各种形式的宏基站,微基站,中继站,接入点基站控制器,收发节点(transmission reception point,TRP)等等。在采用不同的无线接入技术的***中,基站的具体名称可能会有所不同,例如在LTE网络中,称为演进的节点B(evolved NodeB,eNB),在后续的演进***中,还可以称为新无线节点B(new radio nodeB,gNB)。为方便描述,本申请后续的描述中,将以网络设备为例进行说明。The network device involved in the embodiment of this application is a device deployed in a radio access network (RAN) to provide wireless communication functions for terminal devices. The network device may specifically be a base station, and the above-mentioned base station may include various forms of macro base stations, micro base stations, relay stations, access point base station controllers, transceiver nodes (transmission reception points, TRP), and so on. In systems using different wireless access technologies, the specific names of base stations may be different. For example, in LTE networks, they are called evolved NodeBs (eNBs). In subsequent evolved systems, you can also It is called new radio node B (gNB). For ease of description, in the subsequent description of this application, a network device will be used as an example for description.
请参见图1,图1是本申请实施例提供的一种通信***的架构示意图。由图1可知,该通信***包括网络设备和用户设备。网络设备可通过有线连接、无线连接或者其他连接方式与终端设备建立连接。上述终端设备可以是禁止的,也可以是移动的,具体可根据实际应用场景确定。当然,可以理解到的是,该通信***中包含的网络设备可以是一个或者多个,包含的终端设备也可以是一个或者多个(如图1中的终端设备1到终端设备5)。在如图1所示的通信***中,网络设备可向终端设备下发至少一组用于接入限制检测的接入限制参数。终端设备因执行某项业务需要与网络设备建立连接之前,终端设备需要根据上述至少一组接入限制参数和预设的检测规则进行接入限制检测。但是,现有技术中,用于数据传输业务之前的接入限制检测的接入限制参数是网络设备针对终端设备需要切换至连接态才能进行数据传输这种场景下设定的,不适用于终端设备采用小数据传输方式进行数据传输这一场景。若终端设备仍然采用需要进入连接态才能进行数据传输的方法所对应的接入限制参数进行接入限制检测,会导致终端设备通过接入限制检测的概率低,从而使得终端设备难以正常的通过小数据包传输方式向网络设备发送小数据包,降低了无线通信网络的资源利用率。Please refer to FIG. 1, which is a schematic diagram of the architecture of a communication system provided by an embodiment of the present application. It can be seen from Figure 1 that the communication system includes network equipment and user equipment. The network device can establish a connection with the terminal device through a wired connection, a wireless connection, or other connection methods. The above-mentioned terminal device may be prohibited or mobile, which may be determined according to actual application scenarios. Of course, it can be understood that the communication system may include one or more network devices, and may include one or more terminal devices (such as terminal device 1 to terminal device 5 in FIG. 1). In the communication system as shown in FIG. 1, the network device can issue at least one set of access restriction parameters for access restriction detection to the terminal device. Before a terminal device needs to establish a connection with a network device to perform a certain service, the terminal device needs to perform access restriction detection according to the aforementioned at least one set of access restriction parameters and preset detection rules. However, in the prior art, the access restriction parameter used for the access restriction detection before the data transmission service is set in the scenario that the network device needs to switch to the connected state for the terminal device to perform data transmission, and is not applicable to the terminal. The device uses the small data transmission method for data transmission. If the terminal device still uses the access restriction parameters corresponding to the method that needs to enter the connected state for data transmission to perform access restriction detection, the probability of the terminal device passing the access restriction detection is low, which makes it difficult for the terminal device to pass the test normally. The data packet transmission method sends small data packets to the network equipment, which reduces the resource utilization rate of the wireless communication network.
本申请实施例提供的方法所要解决的技术问题是:如何为终端设备配置适用于小数据包传输方式的接入限制参数,以提升终端设备采用小数据包传输方式传输时通过接入限制检测的概率,提升无线通信网络的资源利用率。The technical problem to be solved by the method provided in the embodiments of this application is: how to configure the access restriction parameters suitable for the small data packet transmission method for the terminal device, so as to improve the detection of the access restriction when the terminal device uses the small data packet transmission method to transmit Probability, improve the resource utilization rate of wireless communication network.
实施例一Example one
请参见图2,图2是本申请实施例提供的一种接入限制检测方法。在本申请实施例中,将以上述针对接入检测这一概念所描述的第一检测规则为例对提出的接入限制检测方法进行描述。由图2可知,该接入检测方法可包括以下步骤:Please refer to FIG. 2, which is an access restriction detection method provided by an embodiment of the present application. In the embodiments of the present application, the proposed access restriction detection method will be described by taking the first detection rule described for the concept of access detection as an example. As can be seen from Figure 2, the access detection method may include the following steps:
S10,网络设备确定至少一组第一接入限制参数。S10. The network device determines at least one set of first access restriction parameters.
在一些可行的实施方式中,网络设备在检测到预设的参数确定周期到达或者其他触发事件发生后,可确定出至少一组接入限制参数(为了方便理解和区别,下文将以第一接入限制参数代替描述)。这里,上述至少一组第一接入限制参数用于终端设备在通过小数据包传输方式进行数据传输之前的接入限制检测。In some feasible implementation manners, the network device can determine at least one set of access restriction parameters after detecting the arrival of the preset parameter determination period or the occurrence of other triggering events (in order to facilitate understanding and distinction, the following will use the first connection Enter the restriction parameter instead of description). Here, the above-mentioned at least one set of first access restriction parameters is used for the access restriction detection of the terminal device before data transmission in a small data packet transmission mode.
可选的,具体实现中,网络设备在检测到预设的参数确定周期到达或者其他触发事件发生后,可根据通信网络的负载状态参数、基于小数据包传输方式进行数据传输这种业务(为方便区别,下文将以第一业务代替描述)的业务优先级信息和/或能够实现第一业务的多个终端设备中各终端设备的设备等级确定出该第一业务对应的至少一组第一接入限制参数。这里,上述网络负载参数具体可包括网络负载率、信道利用率、带宽利用率等,上述业务优先级信息具体可由某一业务的业务类型、业务资源占用信息等因素决定。例如,同样是语音业务,拨打诸如110等紧急电话的业务优先级就比拨打普通电话的业务优先级高。又例如,视频业务和语音业务相比,其占用的资源会更多,那么在通信网络负载较大时,语音业务的优先级就会比视频业务的优先级高。终端设备的设备等级是基于终端设备在不同应用场景中所要求的通过接入限制检测的概率(下文以通过概率代替描述)大小划定。这里,上述通过概率就是终端设备进行接入限制检测操作时,该检测结果为通过的可能性大小。实际应用中,终端设备所要求的通过概率越高,则终端设备所对应的设备等级越高。比如,由于军用通信业务相比于民用通信业务来说更为重要,因此,应用于军用通信业务的终端设备所需求的通过概率就比应用于民用通信业务的终端设备所需求的通过概率大,即应用于军用通信业务的终端设备的设备等级比应用于民用通信业务的终端设备的设备等级高。又比如,救护车上的终端设备所发起的通信请求相比于普通货车上的终端设备所发起的通信请求更为紧急,因此,应用于救护车上的终端设备其设备等级就会比应用于普通货车上的终端设备的设备等级要高。上述其他触发事件还可包括通信网络的网络负载率的变化量达到预设变化量阈值、通信网络重启等,此处不多具体限定。Optionally, in specific implementation, after the network device detects that the preset parameter determination period arrives or other triggering event occurs, it can perform the data transmission service based on the small data packet transmission mode according to the load status parameter of the communication network (for To facilitate the distinction, the following will replace the description of the first service with the service priority information and/or the device level of each terminal device among the multiple terminal devices that can implement the first service to determine at least one group of first services corresponding to the first service. Access restriction parameters. Here, the foregoing network load parameters may specifically include network load rate, channel utilization rate, bandwidth utilization rate, etc., and the foregoing service priority information may specifically be determined by factors such as a service type and service resource occupation information of a certain service. For example, for the same voice service, the priority of making emergency calls such as 110 is higher than that of ordinary calls. For another example, compared with voice services, video services take up more resources, so when the communication network is heavily loaded, the priority of voice services will be higher than that of video services. The device level of the terminal device is determined based on the probability of passing the access restriction detection required by the terminal device in different application scenarios (the passing probability is used instead of the description below). Here, the above passing probability refers to the probability of passing when the terminal device performs an access restriction detection operation. In practical applications, the higher the passing probability required by the terminal device, the higher the level of equipment corresponding to the terminal device. For example, because military communication services are more important than civilian communication services, the passing probability required by terminal equipment used in military communication services is greater than that required by terminal equipment used in civilian communication services. That is, the equipment level of terminal equipment applied to military communication services is higher than that of terminal equipment applied to civilian communication services. For another example, the communication request initiated by the terminal equipment on the ambulance is more urgent than the communication request initiated by the terminal equipment on the ordinary truck. Therefore, the equipment level of the terminal equipment applied to the ambulance will be more urgent than that of the terminal equipment applied to the ambulance. The equipment level of terminal equipment on ordinary trucks is higher. The above-mentioned other trigger events may also include the change of the network load rate of the communication network reaching a preset change threshold, the restart of the communication network, etc., which are not specifically limited here.
当然,这里还可以理解到的是,网络设备还可采用相同或相似的方法确定出除上述第一业务以外的其他种业务所对应的至少一组接入限制参数。比如,网络设备可根据通信网络的负载状态以及终端设备通过除小数据包传输方式以外的其他数据传输方式(即需要进入连接态才能进行数据传输的方式)进行数据传输这种业务(为方便描述,下文以第二业务代替描述)所对应的优先级信息和/或能够实现第二业务的多个终端设备中各终端设备的设备等级确定出该第二业务所对应的至少一组接入限制参数(为方便理解和区别,下文将以第二接入限制参数代替进行描述)。又比如,网络设备还可根据通信网络的负载状态以及终端设备进行媒体电话服务这种业务(为方便描述,下文以第三业务代替描述)所对应的优先级信息和/或能够实现第三业务的多个终端设备中各终端设备的设备等级确定出该第三业务所对应的至少一组接入限制参数(下文将以第三接入参数代替描述)。Of course, it can also be understood here that the network device can also use the same or similar method to determine at least one set of access restriction parameters corresponding to other types of services other than the first service. For example, network equipment can perform data transmission services according to the load status of the communication network and terminal equipment through other data transmission methods (that is, the method that needs to enter the connected state to perform data transmission) except for the small data packet transmission method (for ease of description) , The second service is used to replace the description below) corresponding priority information and/or the device level of each terminal device among the multiple terminal devices that can implement the second service determines at least one set of access restrictions corresponding to the second service Parameters (for the convenience of understanding and distinction, the second access restriction parameter will be substituted for the description below). For another example, the network device can also perform the media phone service according to the load status of the communication network and the terminal device to perform the media phone service (for the convenience of description, the third service is used to replace the description below) corresponding priority information and/or the third service can be realized The device level of each terminal device in the plurality of terminal devices determines at least one set of access restriction parameters corresponding to the third service (the third access parameter will be substituted for the description below).
需要补充说明的是,网络设备针对不同的检测规则确定出的第一接入参数和/或第二接 入参数所包含的具体内容可能会有所不同。在本申请实施例中,针对前文描述的第一检测规则,网络设备确定上述第一接入限制参数和/或上述第二接入限制参数的过程可包括如下四种可能的实现方式:It needs to be supplemented that the specific content of the first access parameter and/or the second access parameter determined by the network device for different detection rules may be different. In this embodiment of the present application, for the first detection rule described above, the process of determining the first access restriction parameter and/or the second access restriction parameter by the network device may include the following four possible implementation manners:
实现方式一:Implementation method one:
网络设备可根据通信网络的负载状态参数以及上述第一业务的优先级信息确定出一组第一接入限制参数,该组接入限制参数中具体可包括一个第一接入阈值和一个第一接入等待参数。例如,上述第一接入限制参数具体可为数组[A1,C1],其中,A1为第一接入阈值,C1为第一接入等待参数。上述第一接入阈值可用于终端设备确定其能否通过接入限制检测。上述第一接入等待参数可用于在终端设备确定其未通过接入限制检测的情况下,确定其再一次发起接入限制检测操作的等待时间。网络设备单独为终端设备配置一组用于小数据包传输之前的接入限制检测的接入限制参数,可使得终端设备在进行小数据包传输之前无需重复的触发接入限制检测,提升了无线通信网络的资源利用率。The network device may determine a set of first access restriction parameters according to the load status parameters of the communication network and the priority information of the first service. The set of access restriction parameters may specifically include a first access threshold and a first access threshold. Access waiting parameters. For example, the above-mentioned first access restriction parameter may specifically be an array [A1, C1], where A1 is the first access threshold, and C1 is the first access waiting parameter. The foregoing first access threshold may be used for the terminal device to determine whether it can pass the access restriction detection. The above-mentioned first access waiting parameter may be used to determine the waiting time for the terminal device to initiate the access restriction detection operation again in the case that the terminal device determines that it has failed the access restriction detection. The network device separately configures a set of access restriction parameters for the terminal device for the access restriction detection before the small data packet transmission, so that the terminal device does not need to repeatedly trigger the access restriction detection before the small data packet transmission, which improves the wireless The resource utilization of the communication network.
实现方式二:Implementation method two:
网络设备可根据通信网络的负载状态参数、第一业务的优先级信息以及可以发起上述第一业务的多个终端设备中各终端设备的设备等级确定出多组第一接入限制参数。每组第一接入限制参数所对应的终端设备的设备等级不同,每组第一接入限制参数通过接入限制检测的概率也不同。这里,对应的设备等级越高的第一接入限制参数通过接入限制检测的概率越高。例如,假设上述多组第一接入限制参数中包括一组第一接入限制参数K1和一组第一接入限制参数K2。其中,第一接入限制参数K1对应的终端设备为民用设备,第一接入限制参数K2对应的终端设备军用设备,则第一接入限制参数K2通过接入限制检测的概率比第一接入限制参数K1通过接入限制检测的概率要大。实际应用中,每组第一接入限制参数中具体均可包括一个第一接入阈值、一个第一接入等待参数和一个接入标识。这里,任意一组第一接入限制参数中所包含的接入标识用于指示可使用该任意一组第一接入限制参数进行接入限制检测的终端设备所对应的设备等级。比如,假设某一组第一接入限制参数的接入标识为1,则表示可使用该组第一接入限制参数的设备为民用设备,某一组第一接入限制参数的接入标识为2,则表示可使用该组第一接入限制参数的终端设备为民用设备,以此类推。换一句话说,就是上述接入标识可用于终端设备基于其自身的设备等级从上述多组第一接入限制参数中确定出一组适用的第一接入限制参数。这里需要说明的是,终端设备应提前配置有用于指示设备等级与接入标志之间对应关系的表格等数据实体,从而使得终端设备可基于其自身的设备等级确定出其对应的接入标识。此外,上述第一接入阈值可用于终端设备确定其能否通过接入限制检测。上述第一接入等待参数可用于终端设备在确定其未通过接入限制检测的情况下,计算其再一次发起接入限制检测操作的等待时间。The network device may determine multiple sets of first access restriction parameters according to the load status parameters of the communication network, the priority information of the first service, and the device level of each terminal device among the multiple terminal devices that can initiate the first service. The terminal equipment corresponding to each group of first access restriction parameters has different equipment levels, and the probability of each group of first access restriction parameters passing the access restriction detection is also different. Here, the higher the corresponding device level, the higher the probability that the first access restriction parameter passes the access restriction detection. For example, suppose that the foregoing multiple sets of first access restriction parameters include a set of first access restriction parameters K1 and a set of first access restriction parameters K2. Wherein, the terminal equipment corresponding to the first access restriction parameter K1 is a civilian equipment, and the terminal equipment corresponding to the first access restriction parameter K2 is a military equipment, then the first access restriction parameter K2 has a higher probability of passing the access restriction detection than the first access restriction parameter K2. The probability that the access restriction parameter K1 passes the access restriction detection is greater. In practical applications, each group of first access restriction parameters may specifically include a first access threshold, a first access waiting parameter, and an access identifier. Here, the access identifier included in any set of first access restriction parameters is used to indicate the device level corresponding to the terminal device that can use the any set of first access restriction parameters to perform access restriction detection. For example, assuming that the access identifier of a certain group of first access restriction parameters is 1, it means that the devices that can use the first access restriction parameters of the group are civilian devices, and the access identifier of a certain group of first access restriction parameters If it is 2, it means that the terminal device that can use the first access restriction parameter of the group is a civilian device, and so on. In other words, the aforementioned access identifier can be used by the terminal device to determine a group of applicable first access restriction parameters from the aforementioned multiple sets of first access restriction parameters based on its own equipment level. It should be noted here that the terminal device should be configured in advance with data entities such as a table indicating the correspondence between the device level and the access flag, so that the terminal device can determine its corresponding access identifier based on its own device level. In addition, the above-mentioned first access threshold may be used for the terminal device to determine whether it can pass the access restriction detection. The above-mentioned first access waiting parameter may be used for the terminal device to calculate the waiting time for it to initiate the access restriction detection operation again in the case where it is determined that it has not passed the access restriction detection.
例如,具体实现中,上述多组第一接入限制参数中至少包括第一接入限制参数K1和第一接入限制参数K2。上述第一接入限制参数K1具体可为数组[A11,C11,L1]。其中,A11为第一接入限制参数K1中的第一接入阈值,C11为第一接入限制参数K1中的第一接入等待参数,L1为第一接入限制参数K1中的接入标识。上述第一接入限制参数K2具体可为数组[A12,C12,L2],其中,A12为第一接入限制参数K2中的第一接入阈值,C12为 第一接入限制参数K2中的第一接入等待参数,L2为第一接入限制参数K2中的接入标识。For example, in a specific implementation, the foregoing multiple sets of first access restriction parameters include at least a first access restriction parameter K1 and a first access restriction parameter K2. The above-mentioned first access restriction parameter K1 may specifically be an array [A11, C11, L1]. Among them, A11 is the first access threshold in the first access restriction parameter K1, C11 is the first access waiting parameter in the first access restriction parameter K1, and L1 is the access in the first access restriction parameter K1 Logo. The aforementioned first access restriction parameter K2 may specifically be an array [A12, C12, L2], where A12 is the first access threshold in the first access restriction parameter K2, and C12 is the first access restriction parameter K2. The first access waiting parameter, L2 is the access identifier in the first access restriction parameter K2.
这里,需要补充说明的是,在对通过概率的精度要求低的情况下,设备等级相近同的两个或者多个终端设备所需求通过概率也可以是相同的。因此,在具体实现中,不同的两组或多组第一接入参数中各第一接入参数所包含的第一接入阈值和第一接入等待参数也可能是相同的,本申请实施例不作具体限制。另外,在某些可能的场景下,当不同设备等级的终端设备其需求的通过接入限制检测的概率相同,为了节省信令开销,一组第一接入限制参数中还可包括多个不同的接入标识。例如,上述第一接入限制参数K1还可具体为数组[A11,C11,L1,L2,L3],即对应的接入标识为L1、L2或者L3的三种终端设备均可使用第一接入参数A11和/或第一接入等待参数C11进行接入限制检测操作。Here, it needs to be supplemented that, in a case where the accuracy of the pass probability is low, the required pass probabilities of two or more terminal devices with similar equipment levels may also be the same. Therefore, in a specific implementation, the first access threshold and the first access waiting parameter contained in each first access parameter in the different two or more sets of first access parameters may also be the same. The implementation of this application The examples do not make specific restrictions. In addition, in some possible scenarios, when terminal devices of different equipment levels require the same probability of passing access restriction detection, in order to save signaling overhead, a set of first access restriction parameters may also include multiple different Access ID. For example, the above-mentioned first access restriction parameter K1 can also be specifically an array [A11, C11, L1, L2, L3], that is, three terminal devices with the corresponding access identifiers L1, L2, or L3 can use the first access Enter the parameter A11 and/or the first access waiting parameter C11 to perform an access restriction detection operation.
网络设备为不同设备等级的终端设备配置不同组用于小数据包传输之前的接入限制检测的接入限制参数,可使得设备等级高的终端设备比设备等级低的终端设备更容易通过接入限制检测,在提升无线通信网络的资源利用率的同时也保证了接入限制检测操作的合理性,提升了接入限制检测方法的实用性。The network equipment configures different sets of access restriction parameters for the access restriction detection before the transmission of small data packets for the terminal equipment of different equipment levels, which can make the terminal equipment with higher equipment level easier to access than the terminal equipment with lower equipment level The restriction detection not only improves the resource utilization rate of the wireless communication network, but also ensures the rationality of the access restriction detection operation, and improves the practicability of the access restriction detection method.
实现方式三:Implementation method three:
网络设备可先从内部或者外部存储器中获取适用于上述第二业务的第二接入限制参数。然后,网络设备还可根据通信网络的负载状态参数、上述第一业务对应的优先级信息以及上述第二接入限制参数确定出上述第一业务对应的一组第一接入限制参数。其中,该第一接入限制参数中可包括第一系数和第二系数。当终端设备发起上述第一业务对应的业务请求后,终端设备可基于上述第一系数和上述第二接入阈值确定其是否能够通过接入限制检测。若终端设备确定其未通过接入限制检测,则终端设备还可根据上述第二系数和第二接入等待参数确定出其下一次发起上述第一业务对应的接入限制检测操作的等待时间。The network device may first obtain the second access restriction parameter applicable to the above-mentioned second service from the internal or external memory. Then, the network device may also determine a set of first access restriction parameters corresponding to the first service according to the load status parameter of the communication network, the priority information corresponding to the first service, and the second access restriction parameter. Wherein, the first access restriction parameter may include a first coefficient and a second coefficient. After the terminal device initiates the service request corresponding to the first service, the terminal device may determine whether it can pass the access restriction detection based on the first coefficient and the second access threshold. If the terminal device determines that it has not passed the access restriction detection, the terminal device may also determine the waiting time for the next time it initiates the access restriction detection operation corresponding to the first service according to the second coefficient and the second access waiting parameter.
例如,具体实现中,获取到的第二接入限制参数具体可为数组[A1,C1],这里,上述A1为该第二接入限制参数中包含的第二接入阈值,上述C2为该第二接入限制参数中包含的第二接入等待参数。上述第一接入限制参数具体可为数组[R1,R2],其中,R1为第一系数,R2为第二系数。For example, in specific implementation, the acquired second access restriction parameter may specifically be the array [A1, C1], where A1 is the second access threshold included in the second access restriction parameter, and C2 is the The second access waiting parameter included in the second access restriction parameter. The above-mentioned first access restriction parameter may specifically be an array [R1, R2], where R1 is the first coefficient and R2 is the second coefficient.
网络设备通过其生成的第一接入限制参数对现有的适用于第二业务的接入限制检测的第二接入限制参数进行调整以得到用于小数据包传输之前的接入限制检测的接入限制参数,避免了因单独生成一整套适用于上述第一业务的接入限制参数所导致的对现有信令结构或通信协议带来的大量修改,避免了开发成本增加,使得本申请提供的接入限制检测方法更容易实现,在提升无线通信网络的资源利用率的同时也提升了接入限制检测方法的实用性。The network device adjusts the existing second access restriction parameter suitable for the access restriction detection of the second service through the first access restriction parameter generated by the network device to obtain the access restriction detection before the transmission of the small data packet. The access restriction parameter avoids a large number of modifications to the existing signaling structure or communication protocol caused by generating a set of access restriction parameters applicable to the above-mentioned first service, and avoids the increase in development cost, which makes this application The provided access restriction detection method is easier to implement, which improves the practicability of the access restriction detection method while improving the resource utilization rate of the wireless communication network.
实现方式四:Realization way four:
网络设备可先从内部或者外部存储器中获取适用于上述第二业务的多组第二接入限制参数。该多组第二接入限制参数中每组第二接入限制参数均互不相同,每组第二接入限制参数所对应的终端设备的设备等级不同,每组第二接入限制参数通过接入限制检测的概率也不同。这里,对应的设备等级越高的第二接入限制参数通过接入限制检测的概率越高。例如,假设上述多组第二接入限制参数中包括一组第一接入限制参数K21和一组第二接入限制参数K22。其中,第二接入限制参数K21对应的终端设备为民用设备,第二接入限制 参数K22对应的终端设备为军用设备,则第二接入限制参数K22通过接入限制检测的概率比第二接入限制参数K21通过接入限制检测的概率要大。实际应用中,每组第二接入限制参数中具体均可包括一个第二接入阈值、一个第二接入等待参数和一个接入标识。这里,任意一组第二接入限制参数中所包含的接入标识用于指示可使用该任意一组第二接入限制参数进行第二业务之前的接入限制检测的终端设备所对应的设备等级。比如,假设某一组第二接入限制参数的接入标识为1,可表示能够使用该组第二接入限制参数的终端设备为民用设备。某一组第二接入限制参数的接入标识为2,则可表示能够使用该组第二接入限制参数的终端设备为军用设备,以此类推。换句话说,上述接入标识可用于终端设备基于其自身的设备等级从上述多组第二接入限制参数中确定出一组适用的第二接入限制参数。这里需要说明的是,终端设备应提前配置有用于指示设备等级与接入标志之间对应关系的表格等数据实体,从而使得终端设备可基于其自身的设备等级确定出其对应的接入标识。上述第二接入阈值可用于终端设备确定其能否通过第二业务之前的接入限制检测。上述第一接入等待参数可用于终端设备在确定其未通过第二业务之前的接入限制检测的情况下,计算其再一次发起接入限制检测操作的等待时间。The network device may first obtain multiple sets of second access restriction parameters suitable for the foregoing second service from internal or external storage. In the multiple sets of second access restriction parameters, each set of second access restriction parameters is different from each other, and the equipment level of the terminal device corresponding to each set of second access restriction parameters is different, and each set of second access restriction parameters passes The probability of access restriction detection is also different. Here, the second access restriction parameter corresponding to the higher device level has a higher probability of passing the access restriction detection. For example, suppose that the foregoing multiple sets of second access restriction parameters include a set of first access restriction parameters K21 and a set of second access restriction parameters K22. Wherein, the terminal device corresponding to the second access restriction parameter K21 is a civilian device, and the terminal device corresponding to the second access restriction parameter K22 is a military device, and the second access restriction parameter K22 has a higher probability of passing the access restriction detection than the second The access restriction parameter K21 has a greater probability of passing the access restriction detection. In practical applications, each group of second access restriction parameters may specifically include a second access threshold, a second access waiting parameter, and an access identifier. Here, the access identifier included in any set of second access restriction parameters is used to indicate the device corresponding to the terminal device that can use the any set of second access restriction parameters to perform access restriction detection before the second service grade. For example, assuming that the access identifier of a certain set of second access restriction parameters is 1, it may indicate that the terminal devices that can use the second access restriction parameters of the set are civilian equipment. If the access identifier of a certain set of second access restriction parameters is 2, it may indicate that the terminal devices that can use the second access restriction parameters of the set are military equipment, and so on. In other words, the aforementioned access identifier can be used for the terminal device to determine a group of applicable second access restriction parameters from the aforementioned multiple sets of second access restriction parameters based on its own equipment level. It should be noted here that the terminal device should be configured in advance with data entities such as a table indicating the correspondence between the device level and the access flag, so that the terminal device can determine its corresponding access identifier based on its own device level. The foregoing second access threshold may be used for the terminal device to determine whether it can pass the access restriction detection before the second service. The above-mentioned first access waiting parameter may be used to calculate the waiting time for the terminal device to initiate the access restriction detection operation again when it is determined that it has not passed the access restriction detection before the second service.
然后,网络设备还可根据通信网络的负载状态参数、上述第一业务对应的优先级信息、上述多组第二接入限制参数确定出上述第一业务对应的多组第一接入限制参数。其中,一组第二接入限制参数对应一组第一接入限制参数。任意一组第一接入限制参数中均包括一个第一系数、一个第二系数和一个接入标识,并且,这个接入标识与该任意一组第一接入限制参数所对应的第二接入限制参数中包含的接入标识相同。或者,换一句话说,接入标识相同的第一接入限制参数和第二接入限制参数之间存在的对应关系。这里,假设上述多组第一接入限制参数中包括第一接入限制参数K11,其在上述多组第二接入限制参数中对应第二接入限制参数K21。在终端设备发起上述第一业务对应的业务请求后,终端设备可先根据上述第一接入限制参数K11所包含的第一系数和上述第二接入限制参数K21中包含的第二接入阈值确定其是否能够通过该第一业务之前的接入限制检测。若终端设备确定其未通过接入限制检测,则终端设备可根据上述第一接入限制参数K11所包含的第二系数和上述第二接入限制参数K21中包含的第二接入等待参数确定出其下一次发起接入限制检测的等待时间。例如,具体实现中,上述多组第二接入限制参数中至少可包括第二接入限制参数K21和第二接入限制参数K22。Then, the network device may also determine multiple sets of first access restriction parameters corresponding to the first service according to the load status parameters of the communication network, the priority information corresponding to the first service, and the multiple sets of second access restriction parameters. Wherein, a set of second access restriction parameters corresponds to a set of first access restriction parameters. Any set of first access restriction parameters includes a first coefficient, a second coefficient, and an access identifier, and this access identifier corresponds to the second access corresponding to the any set of first access restriction parameters. The access identifier included in the access restriction parameter is the same. Or, in other words, there is a correspondence between the first access restriction parameter and the second access restriction parameter with the same access identifier. Here, it is assumed that the multiple sets of first access restriction parameters include a first access restriction parameter K11, which corresponds to the second access restriction parameter K21 in the multiple sets of second access restriction parameters. After the terminal device initiates the service request corresponding to the above-mentioned first service, the terminal device may first according to the first coefficient contained in the above-mentioned first access restriction parameter K11 and the second access threshold contained in the above-mentioned second access restriction parameter K21. It is determined whether it can pass the access restriction detection before the first service. If the terminal device determines that it has not passed the access restriction detection, the terminal device can determine according to the second coefficient included in the first access restriction parameter K11 and the second access waiting parameter included in the second access restriction parameter K21. The waiting time for the next initiation of access restriction detection. For example, in a specific implementation, the foregoing multiple sets of second access restriction parameters may include at least a second access restriction parameter K21 and a second access restriction parameter K22.
例如,具体实现中,上述多组第二接入限制参数中至少可包括第二接入限制参数K21和第二接入限制参数K22。第二接入限制参数K21在上述多组第一接入限制参数中对应第一接入限制参数K11,第二接入限制参数K22在上述多组第一接入限制参数中对应第一接入限制参数K12。上述第二接入限制参数K21具体可为数组[A21,C21,L1],其中,A21为第二接入限制参数K21中的第二接入阈值,C21为第二接入限制参数K21中的第二接入等待参数,L1为第二接入限制参数K21中的接入标识。上述第一接入限制参数K11可具体为数组[R11,R21,L1]。这里,R11为该第一接入限制参数K11中的第一系数,R21为该第一接入限制参数K11中的第二系数,L1为接入标识。上述第二接入限制参数K22具体可为数组[A22,C22,L2],其中,A22为第二接入限制参数K22中的第二接入阈值,C22为第二接入限制参数K22中的第二接入等待参数,L22为第二接入限制参数K22中的接入标识。 上述第一接入限制参数K12可具体为数组[R12,R22,L2]。这里,R12为该第一接入限制参数K12中的第一系数,R22为该第一接入限制参数K12中的第二系数,L2为接入标识。For example, in a specific implementation, the foregoing multiple sets of second access restriction parameters may include at least a second access restriction parameter K21 and a second access restriction parameter K22. The second access restriction parameter K21 corresponds to the first access restriction parameter K11 in the multiple sets of first access restriction parameters, and the second access restriction parameter K22 corresponds to the first access in the multiple sets of first access restriction parameters. Limit parameter K12. The above-mentioned second access restriction parameter K21 may specifically be an array [A21, C21, L1], where A21 is the second access threshold in the second access restriction parameter K21, and C21 is the second access restriction parameter K21 The second access waiting parameter, L1 is the access identifier in the second access restriction parameter K21. The foregoing first access restriction parameter K11 may specifically be an array [R11, R21, L1]. Here, R11 is the first coefficient in the first access restriction parameter K11, R21 is the second coefficient in the first access restriction parameter K11, and L1 is the access identifier. The above-mentioned second access restriction parameter K22 may specifically be an array [A22, C22, L2], where A22 is the second access threshold in the second access restriction parameter K22, and C22 is the second access restriction parameter K22 The second access waiting parameter, L22 is the access identifier in the second access restriction parameter K22. The aforementioned first access restriction parameter K12 may specifically be an array [R12, R22, L2]. Here, R12 is the first coefficient in the first access restriction parameter K12, R22 is the second coefficient in the first access restriction parameter K12, and L2 is the access identifier.
这里,需要补充说明的是,在对通过概率的精度要求低的情况下,设备等级相近同的两个或者多个终端设备所需求的通过概率也可以是相同的。因此,在具体实现中,不同的两组或多组第一接入参数中各第一接入参数所包含的第一系数和第二系数可能是不同的,也可能是相同的,本申请实施例不作具体限制。同理,上述多组第二接入参数中各第二接入参数中包含的第二接入阈值或者第二接入等待参数可能相同,也可能不同。另外,在某些可能的场景下,当不同设备等级的终端设备其需求的通过接入限制检测的概率相同,为了节省信令开销,一组第一接入限制参数中还可包括多个不同的接入标识。例如,上述第一接入限制参数K11还可具体为数组[R11,R21,L1,L2,L3],其对应的第二接入限制参数K21还可具体为[A21,C21,L1,L2,L3]。即对应的接入标识为L1、L2或者L3的三种终端设备均可使用上述第一接入限制参数K11和第二接入限制参数K21进行接入限制检测操作。Here, it needs to be supplemented that, in the case that the accuracy of the pass probability is low, the pass probabilities required by two or more terminal devices with similar equipment levels may also be the same. Therefore, in a specific implementation, the first coefficient and the second coefficient contained in each first access parameter in different two or more sets of first access parameters may be different or may be the same. The implementation of this application The examples do not make specific restrictions. In the same way, the second access threshold or the second access waiting parameter included in each second access parameter in the multiple sets of second access parameters may be the same or may be different. In addition, in some possible scenarios, when terminal devices of different equipment levels require the same probability of passing access restriction detection, in order to save signaling overhead, a set of first access restriction parameters may also include multiple different Access ID. For example, the above-mentioned first access restriction parameter K11 can also be specifically an array [R11, R21, L1, L2, L3], and its corresponding second access restriction parameter K21 can also be specifically [A21, C21, L1, L2, L3]. That is, the three terminal devices whose corresponding access identifiers are L1, L2, or L3 can use the above-mentioned first access restriction parameter K11 and second access restriction parameter K21 to perform an access restriction detection operation.
网络设备通过其生成的多组第一接入限制参数对现有的适用于第二业务的多组第二接入限制参数进行调整以使得不同设备等级的终端设备可以使用不同的参数进行小数据包传输之前的接入限制检测,可使得设备等级高的终端设备通过接入限制检测的概率更高,避免了因单独生成多套适用于上述第一业务的接入限制参数所导致的对现有信令结构或通信协议带来的大量修改,避免了开发成本增加,在提升无线通信网络的资源利用率的同时也提升了接入限制检测方法的实用性。The network device adjusts the existing multiple sets of second access restriction parameters applicable to the second service through the multiple sets of first access restriction parameters generated by it, so that terminal devices of different equipment levels can use different parameters for small data The access restriction detection before the packet transmission can make the terminal equipment with high equipment level have a higher probability of passing the access restriction detection, and avoid the interference caused by the separate generation of multiple sets of access restriction parameters suitable for the first service. There are a large number of modifications brought about by the signaling structure or communication protocol, which avoids the increase in development cost, and improves the practicability of the access restriction detection method while improving the resource utilization rate of the wireless communication network.
S20,网络设备向终端设备发送包含至少一组第一接入限制参数的第一消息。S20: The network device sends a first message including at least one set of first access restriction parameters to the terminal device.
在一些可行的实施方式中,网络设备在确定出至少一组第一接入限制参数后,可将上述至少一组第一接入限制参数打包在***信息块(system information block,SIB)中其生成第一消息,并通过广播、组播或者单播的方式向终端设备发送该第一消息。具体的,网络设备在生成第一消息后,可向每个与之建立通信链接的终端设备发送上述第一消息。或者,网络设备生成第一消息后,可向其预先配置的组播组中的每个终端设备发送上述第一消息。或者,网络设备在生成上述第一消息后,可向某一个或者多个已经发起单播请求的终端设备发送上述第一消息。例如,网络设备可将该至少一组第一接入限制参数打包在***信息块类型一(system information block type 1,SIB1)中以生成第一消息。然后在预设的SIB发送周期到达时,将该第一消息广播给终端设备。又例如,网络设备还可将该至少一组第一接入限制参数打包在***信息块类型二(system information block type 2,SIB2)中以生成第一消息。然后在预设的SIB2发送触发条件满足时,将该第一消息广播给终端设备。以上示出的仅是网络设备发送上述第一消息的部分方式,不具备限定作用。同理,在网络设备确定出至少一组第一接入限制参数和至少一组第二接入参数后,也可采用如前文上述的方式将上述至少一组第一接入限制参数和至少一组第二接入参数打包在SIB中以得到第一消息,并通过广播、单播或者组播的方式将该第一消息发送给终端设备。In some feasible implementation manners, after determining at least one set of first access restriction parameters, the network device may package the above at least one set of first access restriction parameters in a system information block (SIB). The first message is generated, and the first message is sent to the terminal device in a manner of broadcast, multicast, or unicast. Specifically, after generating the first message, the network device may send the above-mentioned first message to each terminal device with which a communication link is established. Alternatively, after the network device generates the first message, it may send the foregoing first message to each terminal device in its pre-configured multicast group. Or, after generating the first message, the network device may send the first message to one or more terminal devices that have initiated the unicast request. For example, the network device may pack the at least one set of first access restriction parameters in system information block type 1 (system information block type 1, SIB1) to generate the first message. Then, when the preset SIB sending period arrives, the first message is broadcast to the terminal device. For another example, the network device may also package the at least one set of first access restriction parameters in system information block type 2 (SIB2) to generate the first message. Then, when the preset SIB2 sending trigger condition is satisfied, the first message is broadcast to the terminal device. The foregoing is only a part of the manner in which the network device sends the foregoing first message, and does not have a limiting effect. In the same way, after the network device determines at least one set of first access restriction parameters and at least one set of second access parameters, the aforementioned at least one set of access restriction parameters and at least one set of The group second access parameter is packaged in the SIB to obtain the first message, and the first message is sent to the terminal device in a manner of broadcast, unicast or multicast.
需要补充说明的是,具体实现中,上述第一消息中不仅可包括上述第一业务对应的至少一组第一接入限制参数和/上述第二业务对应的至少一组第二接入限制参数,还可包括上述第三业务所对应的至少一组第三接入限制参数,或者更多其他种类的业务所对应的接入 限制参数。在实际应用中,针对于同一业务来说,随着预定的业务类型划分规则的不同,其所对应的业务类型也可能有所不同。例如,在一些较为复杂的业务类型划分规则中,上述第一业务和上述第二业务就是两种不同类型的业务。而在一些较为简略的业务类型划分规则中,上述第一业务和上述二业务会被统一划分为数据传输这一类业务,即第一业务和第二业务同属于数据传输业务。因此,在第一消息中包含的接入限制检测参数的数据实体与业务类型分别对应的情况下,业务类型划分规则的不同也可能会导致第一消息的数据结构也有所不同。这里,上述数据实体可以包括数组、结构体、数据表等,此处不做限定。例如,在一种实现中,上述第一消息中可至少包含三个数据实体,第一个数据实体对应上述第一业务,其内包含有至少一组第一接入限制参数,第二个数据实体对应上述第二业务,其内包含有至少一组第二接入限制参数,第三个数据实体对应上述第三业务,其内包含有至少一组第三接入限制参数。在另一种实现中,上述第一消息中可至少包含二个数据实体,第一个数据实体对应的是数据传输这一类业务,即第一数据实体中同时包含第一业务对应的至少一组第一接入限制参数和第二业务对应的至少一组第二接入限制参数。第二个数据实体对应上述第三业务,其内包含有至少一组第三接入限制参数。换言之,就是某一个范畴较大的业务类别所对应的数据实体中,可包括一个或者多个的业务类别范畴较小的业务所对应的接入限制检测参数。使用较为简略业务类型划分规则,比如将上述第一业务和上述第二业务归属于数据传输这一业务,能够避免因业务类型的划分方式过于复杂所导致的第一消息的信令结构复杂度高的问题,可简化上述第一消息的信令结构。It should be supplemented that, in specific implementation, the first message may not only include at least one set of first access restriction parameters corresponding to the first service and/or at least one set of second access restriction parameters corresponding to the second service. It may also include at least one set of third access restriction parameters corresponding to the aforementioned third service, or access restriction parameters corresponding to more other types of services. In actual applications, for the same business, the corresponding business types may also be different according to different predetermined business type division rules. For example, in some more complicated service type division rules, the above-mentioned first service and the above-mentioned second service are two different types of services. In some relatively simple service type division rules, the above-mentioned first service and the above-mentioned second service will be uniformly divided into the data transmission type of service, that is, the first service and the second service are both data transmission services. Therefore, in the case where the data entity of the access restriction detection parameter included in the first message corresponds to the service type, the difference in the service type division rule may also cause the data structure of the first message to be different. Here, the aforementioned data entities may include arrays, structures, data tables, etc., which are not limited here. For example, in one implementation, the above-mentioned first message may contain at least three data entities. The first data entity corresponds to the above-mentioned first service, and contains at least one set of first access restriction parameters and the second data entity. The entity corresponds to the aforementioned second service and contains at least one set of second access restriction parameters, and the third data entity corresponds to the aforementioned third service, and contains at least one set of third access restriction parameters. In another implementation, the above-mentioned first message may contain at least two data entities. The first data entity corresponds to a type of service of data transmission, that is, the first data entity also contains at least one corresponding to the first service. Set the first access restriction parameters and at least one set of second access restriction parameters corresponding to the second service. The second data entity corresponds to the foregoing third service, and contains at least one set of third access restriction parameters. In other words, a data entity corresponding to a larger service category may include one or more access restriction detection parameters corresponding to a smaller service category. Using relatively simple service type division rules, such as assigning the above-mentioned first service and the above-mentioned second service to the service of data transmission, can avoid the high complexity of the signaling structure of the first message caused by the complicated division of service types This can simplify the signaling structure of the first message.
S30,终端设备接收第一消息,并在确定数据传输方式为小数据包传输时,根据至少一组第一接入限制参数进行接入限制检测。S30: The terminal device receives the first message, and when determining that the data transmission mode is small data packet transmission, performs access restriction detection according to at least one set of first access restriction parameters.
在一些可行的实现方式中,终端设备可接收网络设备广播、单播或者组播的第一消息,并根据终端设备与网络设备之间预定的通信协议对上述第一消息进行解析,以得到上述至少一组第一接入限制参数和/或上述至少一组第二接入限制参数。然后,终端设备在确定需要传输某一数据包(为方便理解和区别,下文以目标数据包代替描述)时,可先获取预设的数据量阈值。这里需要说明的是,网络设备会周期性的在其不同的覆盖区域中广播不同的数据量阈值,这些不同的覆盖区域中终端设备可根据这些不同的数据量阈值确定其是否能够使用小数据包传输方式进行数据传输。终端设备在获取到对应的数据量阈值后,可判断上述目标数据包的数据量是否小于预设的数据量阈值。若终端设备确定目标数据包的数据量小于其对应的数据量阈值,则确定其能够通过小数据包传输方式传输上述目标数据(即终端设备确定其能够执行上述第一业务)。若终端设备确定目标数据包的数据量等于或者大于其对应的数据量阈值,则确定其能够通过除小数据包传输方式以外的其他输出传输方式传输上述目标数据(即终端设备确定其能够执行上述第二业务)。In some feasible implementation manners, the terminal device may receive the first message broadcast, unicast, or multicast from the network device, and parse the first message according to a predetermined communication protocol between the terminal device and the network device to obtain the foregoing At least one set of first access restriction parameters and/or the aforementioned at least one set of second access restriction parameters. Then, when the terminal device determines that a certain data packet needs to be transmitted (for ease of understanding and distinction, the target data packet is used in the following to replace the description), it may first obtain the preset data volume threshold. What needs to be explained here is that network devices will periodically broadcast different data volume thresholds in their different coverage areas, and terminal devices in these different coverage areas can determine whether they can use small data packets according to these different data volume thresholds. Transmission method for data transmission. After acquiring the corresponding data volume threshold, the terminal device can determine whether the data volume of the target data packet is less than the preset data volume threshold. If the terminal device determines that the data volume of the target data packet is less than its corresponding data volume threshold, it is determined that it can transmit the target data in a small data packet transmission mode (that is, the terminal device determines that it can perform the first service). If the terminal device determines that the data volume of the target data packet is equal to or greater than its corresponding data volume threshold, it is determined that it can transmit the target data through other output transmission methods other than the small data packet transmission method (that is, the terminal device determines that it can execute the above Second business).
当终端设备确定其需要通过小数据包传输方式传输上述目标数据时,终端设备可根据上述至少一组第一接入限制参数和/或上述至少一组第二接入限制参数进行第一业务之前的接入限制检测操作。结合前文内容可知,上述第一消息中所包含内容至少有四种实现场景。第一种场景就是第一消息中仅包含一组第一接入限制参数。第二种场景是第一消息中包含多组第一接入限制参数。第三种场景是第一消息中包含一组第一接入限制参数和一组第二接入限制参数。第四种场景是第一消息中包含多组第一接入限制参数和多组第二接入 限制参数。下面将结合上述四种场景以及上述第一检测规则对终端设备进行第一业务之前的接入限制检测操作的过程进行简单的描述。When the terminal device determines that it needs to transmit the aforementioned target data through small data packet transmission, the terminal device may perform the first service according to the aforementioned at least one set of first access restriction parameters and/or the aforementioned at least one set of second access restriction parameters The access restriction detection operation. According to the foregoing content, there are at least four implementation scenarios for the content contained in the first message. The first scenario is that the first message only contains a set of first access restriction parameters. The second scenario is that the first message contains multiple sets of first access restriction parameters. The third scenario is that the first message contains a group of first access restriction parameters and a group of second access restriction parameters. The fourth scenario is that the first message contains multiple sets of first access restriction parameters and multiple sets of second access restriction parameters. The following briefly describes the process of the access restriction detection operation before the terminal device performs the first service in combination with the foregoing four scenarios and the foregoing first detection rule.
场景一:scene one:
上述第一消息中包含一组第一接入限制参数。该第一接入限制参数为[A1,C1]。终端在确定其需要通过小数据包传输方式进行数据传输后,终端设备可从上述第一消息中获取到上述第一接入限制参数。终端设备可生成一个第一随机数x1,若终端设备确定第一随机数x1小于上述第一接入阈值A1,则终端设备可确定接入检测限制通过,可向网络设备发起随机接入请求以建立或者恢复网络连接,继而实现目标数据传输。若终端设备确定第一随机数x1等于或者大于上述第一接入阈值A1,则可再生成一个第二随机数x2。然后,终端设备可根据公式T=(r1+r2*a2)*C确定出等待时间为(r1+r2*x2)*C1,即终端设备可在(r1+r2*x2)*C1时间后再次发起接入限制检测操作。The foregoing first message includes a set of first access restriction parameters. The first access restriction parameter is [A1, C1]. After the terminal determines that it needs to perform data transmission through the small data packet transmission mode, the terminal device may obtain the first access restriction parameter from the first message. The terminal device can generate a first random number x1. If the terminal device determines that the first random number x1 is less than the above-mentioned first access threshold A1, the terminal device can determine that the access detection restriction is passed, and can initiate a random access request to the network device. Establish or restore the network connection, and then achieve the target data transmission. If the terminal device determines that the first random number x1 is equal to or greater than the above-mentioned first access threshold A1, it can generate a second random number x2 again. Then, the terminal device can determine that the waiting time is (r1+r2*x2)*C1 according to the formula T=(r1+r2*a2)*C, that is, the terminal device can retry after (r1+r2*x2)*C1 time Initiate the access restriction detection operation.
场景二:Scene two:
上述第一消息中包括多组第一接入限制参数。现假设该多组第一接入限制参数中包括一组第一接入限制参数K1和一组第二接入限制参数K2。其中,上述第一接入限制参数K1具体为[A11,C11,L1],上述第一接入限制参数K2具体为[A12,C12,L2]。当确定需要通过小数据包传输方式传输上述目标数据后,终端设备可从上述第一消息中获取到到上述至少一组第一接入限制参数。然后,终端设备可获取其***配置信息,基于该***配置信息确定其设备等级并根据预设的配置等级与接入标识之间的关系表确定出终端设备对应的目标接入标识。这里,假设终端设备确定出的目标接入标识为L1,则终端设备可根据目标接入标识确定上述第一接入限制参数K1为其需要使用的目标第一接入限制参数。然后,终端设备可生成一个第一随机数x1。若终端设备确定第一随机数x1小于目标第一接入限制参数中的目标接入阈值A11,则终端设备可确定接入检测限制通过,可向网络设备发起随机接入请求以建立或者恢复网络连接,继而实现目标数据传输。若终端设备确定第一随机数x1等于或者大于上述目标接入阈值A11,则可再生成一个第二随机数x2。然后,终端设备可根据公式T=(r1+r2*a2)*C以及目标接入等待参数C1确定出等待时间为(r1+r2*x2)*C1,即终端设备可在(r1+r2*x2)*C1时间后再次发起接入限制检测操作。The foregoing first message includes multiple sets of first access restriction parameters. It is now assumed that the multiple sets of first access restriction parameters include a set of first access restriction parameters K1 and a set of second access restriction parameters K2. The aforementioned first access restriction parameter K1 is specifically [A11, C11, L1], and the aforementioned first access restriction parameter K2 is specifically [A12, C12, L2]. When it is determined that the above-mentioned target data needs to be transmitted in a small data packet transmission mode, the terminal device may obtain the above-mentioned at least one set of first access restriction parameters from the above-mentioned first message. Then, the terminal device can obtain its system configuration information, determine its device level based on the system configuration information, and determine the target access identifier corresponding to the terminal device according to the preset relationship table between the configuration level and the access identifier. Here, assuming that the target access identifier determined by the terminal device is L1, the terminal device can determine the above-mentioned first access restriction parameter K1 as the target first access restriction parameter to be used according to the target access identifier. Then, the terminal device can generate a first random number x1. If the terminal device determines that the first random number x1 is less than the target access threshold A11 in the target first access restriction parameter, the terminal device can determine that the access detection restriction is passed, and can initiate a random access request to the network device to establish or restore the network Connect, and then achieve the target data transmission. If the terminal device determines that the first random number x1 is equal to or greater than the aforementioned target access threshold A11, it can generate a second random number x2 again. Then, the terminal equipment can determine the waiting time as (r1+r2*x2)*C1 according to the formula T=(r1+r2*a2)*C and the target access waiting parameter C1, that is, the terminal equipment can be in (r1+r2* x2) * Initiate the access restriction detection operation again after C1 time.
场景三:Scene three:
在一种实现方式中,上述第一消息中包括一组第一接入限制参数和一组第二接入限制参数,且这组第一接入限制参数包含于第一业务这个业务类别所对应的数据实体(为方别理解,下文以第一数据实体代替描述)中,这组第二接入限制参数包含于第二业务这个业务类别所对应的数据实体(下文以第二数据实体代替描述)中。该第二接入限制参数具体为[A1,C1]。上述第一接入限制参数具体为[R1,R2]。当确定需要通过小数据包传输方式传输上述目标数据时,终端设备可先根据第一接入限制参数中的第一系数对第二接入限制参数中的第二接入阈值进行调整以得到目标接入阈值。例如,终端设备可根据第一系数R1对第二接入阈值A1进行调整以得到目标接入阈值R1*A1。然后,终端设备可先生成一个第一随机数x1,若终端设备确定第一随机数x1小于目标接入阈值R1*A1,则终端设备可确定接入检测限制通过,可向网络设备发起随机接入请求以建立或者恢复网络连接,继而实现目标数据传输。若终端设备确定第一随机数x1等于或者大于上述目标接入阈值 R1*A1,则可再生成一个第二随机数x2。然后,终端设备还可根据第一接入限制参数[R1,R2]中的第二系数R2对上述第二接入限制参数[A1,C1]中的第二接入等待参数C1进行调整以得到目标接入等待参数R2*C1。最后,终端设备可根据公式T=(r1+r2*a2)*C以及目标接入等待参数R2*C1确定出等待时间为(r1+r2*x2)*R2*C1,即终端设备可在(r1+r2*x2)*R2*C1时间后再次发起接入限制检测操作。In an implementation manner, the above-mentioned first message includes a group of first access restriction parameters and a group of second access restriction parameters, and this group of first access restriction parameters is included in the service category corresponding to the first service. In the data entity (for the understanding of the parties, the first data entity is used to replace the description below), this set of second access restriction parameters are included in the data entity corresponding to the business category of the second service (the second data entity is used to replace the description below) )in. The second access restriction parameter is specifically [A1, C1]. The foregoing first access restriction parameter is specifically [R1, R2]. When it is determined that the foregoing target data needs to be transmitted through small data packet transmission, the terminal device may first adjust the second access threshold in the second access restriction parameter according to the first coefficient in the first access restriction parameter to obtain the target Access threshold. For example, the terminal device may adjust the second access threshold A1 according to the first coefficient R1 to obtain the target access threshold R1*A1. Then, the terminal device can first generate a first random number x1. If the terminal device determines that the first random number x1 is less than the target access threshold R1*A1, the terminal device can determine that the access detection restriction is passed, and can initiate a random access to the network device. Into the request to establish or restore the network connection, and then achieve the target data transmission. If the terminal device determines that the first random number x1 is equal to or greater than the target access threshold R1*A1, it can generate a second random number x2. Then, the terminal device can also adjust the second access waiting parameter C1 in the second access restriction parameter [A1, C1] according to the second coefficient R2 in the first access restriction parameter [R1, R2] to obtain The target access waiting parameter R2*C1. Finally, the terminal equipment can determine the waiting time as (r1+r2*x2)*R2*C1 according to the formula T=(r1+r2*a2)*C and the target access waiting parameter R2*C1, that is, the terminal equipment can be in ( r1+r2*x2)*R2*C1 time later, initiate the access restriction detection operation again.
在另一种实现方式中,上述第一消息中包括一组第一接入限制参数和一组第二接入限制参数,且这组第一接入限制参数和这组第二接入限制参数同时包含于数据传输这个类别所对应的数据实体(下文以第三数据实体代替描述)中。这里,假设上述第一接入限制参数具体为[R1,R2],该第二接入限制参数具体为[A1,C1]。当确定需要通过小数据包传输方式传输上述目标数据时,终端设备从上述第一消息中获取到数据传输这个业务类型所对应的数据实体,然后再从中确定出上述第一业务所对的第一接入限制参数[R1,R2]。终端设备可生成一个第一随机数x1,若终端设备确定第一随机数x1小于上述第一接入阈值R1,则终端设备可确定接入检测限制通过,可向网络设备发起随机接入请求以建立或者恢复网络连接,继而实现目标数据传输。若终端设备确定第一随机数x1等于或者大于上述第一接入阈值R1,则可再生成一个第二随机数x2。然后,终端设备可根据公式T=(r1+r2*a2)*C确定出等待时间为(r1+r2*x2)*R2,即终端设备可在(r1+r2*x2)*R2时间后再次发起接入限制检测操作。In another implementation manner, the foregoing first message includes a set of first access restriction parameters and a set of second access restriction parameters, and the set of first access restriction parameters and the set of second access restriction parameters It is also included in the data entity corresponding to the category of data transmission (the third data entity is used to replace the description below). Here, it is assumed that the above-mentioned first access restriction parameter is specifically [R1, R2], and the second access restriction parameter is specifically [A1, C1]. When it is determined that the aforementioned target data needs to be transmitted through small data packet transmission, the terminal device obtains the data entity corresponding to the service type of data transmission from the aforementioned first message, and then determines the first data entity corresponding to the aforementioned first service. Access restriction parameters [R1, R2]. The terminal device can generate a first random number x1. If the terminal device determines that the first random number x1 is less than the above-mentioned first access threshold R1, the terminal device can determine that the access detection restriction is passed, and can initiate a random access request to the network device. Establish or restore the network connection, and then achieve the target data transmission. If the terminal device determines that the first random number x1 is equal to or greater than the above-mentioned first access threshold R1, it can generate a second random number x2 again. Then, the terminal device can determine that the waiting time is (r1+r2*x2)*R2 according to the formula T=(r1+r2*a2)*C, that is, the terminal device can retry after (r1+r2*x2)*R2 Initiate access restriction detection operation.
场景四:Scene four:
在一种实现方式中,上述第一消息中包括多组第一接入限制参数和多组第二接入限制参数,且多组第一接入限制参数包含于第一业务这个业务类别所对应的数据实体(为方别理解,下文以第一数据实体代替描述)中,这多组第二接入限制参数包含于第二业务这个业务类别所对应的数据实体(下文以第二数据实体代替描述)中。这里,假设上述多组第一接入限制参数中至少可包括第二接入限制参数K21和第二接入限制参数K22。第二接入限制参数K21在上述多组第一接入限制参数中对应第一接入限制参数K11,第二接入限制参数K22在上述多组第一接入限制参数中对应第一接入限制参数K12。上述第二接入限制参数K21具体为[A21,C21,L1]。上述第一接入限制参数K11具体为[R11,R21,L1]。上述第二接入限制参数K22具体为[A22,C22,L2]。上述第一接入限制参数K12具体为[R12,R22,L2]。当确定需要通过小数据包传输方式传输上述目标数据时,可先从上述第一消息中获取多组第一接入限制参数和多组第二接入限制参数。然后,终端设备可获取其***配置信息,基于该***配置信息确定其设备等级并根据预设的配置等级与接入标识之间的关系表确定出终端设备对应的目标接入标识。这里,假设终端设备确定出的目标接入标识为L1,则终端设备可根据目标接入标识从上述多组第一接入限制参数和多组第二接入限制参数确定上述第一接入限制参数K11为其需要使用的目标第一接入限制参数,上述第二接入限制参数K21为其需要使用的目标第二接入限制参数。然后,终端设备可先根据该目标第一接入限制参数中的目标第一系数R11对上述目标第二接入限制参数中的目标第二接入阈值A21进行调整,以得到目标接入阈R11*A21。然后,端设备可生成一个第一随机数x1,若终端设备确定第一随机数x1小于目标接入阈值R11*A21,则终端设备可确定接入检测限制通过,可向网络设备发起随机接入请求以建立或者恢复网络连接,继而实现目标数 据传输。若终端设备确定第一随机数x1等于或者大于上述目标接入阈值R11*A21,则可再生成一个第二随机数x2。然后,终端设备还可根据目标第一接入限制参数中的目标第二系数R21对上述目标第二接入限制参数中的目标第二接入等待参数C21进行调整以得到目标接入等待参数R21*C21。最后,终端设备可根据公式T=(r1+r2*a2)*C以及目标接入等待参数R21*C21确定出等待时间为(r1+r2*x2)*R21*C21,即终端设备可在(r1+r2*x2)*R21*C21时间后再次发起接入限制检测操作。In an implementation manner, the foregoing first message includes multiple sets of first access restriction parameters and multiple sets of second access restriction parameters, and the multiple sets of first access restriction parameters are included in the service category corresponding to the first service. In the data entity (for the understanding of the parties, the first data entity is used to replace the description below), the multiple sets of second access restriction parameters are included in the data entity corresponding to the business category of the second service (the second data entity is used below to replace Description). Here, it is assumed that the foregoing multiple sets of first access restriction parameters may include at least a second access restriction parameter K21 and a second access restriction parameter K22. The second access restriction parameter K21 corresponds to the first access restriction parameter K11 in the multiple sets of first access restriction parameters, and the second access restriction parameter K22 corresponds to the first access in the multiple sets of first access restriction parameters. Limit parameter K12. The above-mentioned second access restriction parameter K21 is specifically [A21, C21, L1]. The aforementioned first access restriction parameter K11 is specifically [R11, R21, L1]. The above-mentioned second access restriction parameter K22 is specifically [A22, C22, L2]. The aforementioned first access restriction parameter K12 is specifically [R12, R22, L2]. When it is determined that the foregoing target data needs to be transmitted in a small data packet transmission mode, multiple sets of first access restriction parameters and multiple sets of second access restriction parameters may be acquired from the foregoing first message. Then, the terminal device can obtain its system configuration information, determine its device level based on the system configuration information, and determine the target access identifier corresponding to the terminal device according to the preset relationship table between the configuration level and the access identifier. Here, assuming that the target access identifier determined by the terminal device is L1, the terminal device can determine the first access restriction from the multiple sets of first access restriction parameters and multiple sets of second access restriction parameters according to the target access identifier. The parameter K11 is the target first access restriction parameter that needs to be used, and the above-mentioned second access restriction parameter K21 is the target second access restriction parameter that needs to be used. Then, the terminal device may first adjust the target second access threshold A21 in the target second access restriction parameter according to the target first coefficient R11 in the target first access restriction parameter to obtain the target access threshold R11 *A21. Then, the terminal device can generate a first random number x1. If the terminal device determines that the first random number x1 is less than the target access threshold R11*A21, the terminal device can determine that the access detection restriction is passed, and can initiate random access to the network device Request to establish or restore the network connection, and then achieve the target data transmission. If the terminal device determines that the first random number x1 is equal to or greater than the aforementioned target access threshold R11*A21, it can generate a second random number x2. Then, the terminal device may also adjust the target second access waiting parameter C21 in the target second access restriction parameter according to the target second coefficient R21 in the target first access restriction parameter to obtain the target access waiting parameter R21. *C21. Finally, the terminal device can determine that the waiting time is (r1+r2*x2)*R21*C21 according to the formula T=(r1+r2*a2)*C and the target access waiting parameter R21*C21, that is, the terminal device can be in ( r1+r2*x2)*R21*C21 time later, initiate the access restriction detection operation again.
在一种实现方式中,上述第一消息中包括多组第一接入限制参数和多组第二接入限制参数,且多组第一接入限制参数和多组第二接入限制参数同时包含于数据传输这个业务类别所对应的数据实体(为方别理解,下文以第三数据实体代替描述)中。这里,假设上述多组第一接入限制参数中包括第二接入限制参数K21。第二接入限制参数K21在上述多组第一接入限制参数中包括第一接入限制参数K11。上述第二接入限制参数K21具体为[A21,C21,L1]。上述第一接入限制参数K11具体为[R11,R21,L1]。当确定需要通过小数据包传输方式传输上述目标数据时,终端设备可先从上述第一消息中获取上述第三数据实体,然后从上述第三数据实体中获取小数据包传输方式多对应的多组第一接入限制参数。然后,终端设备可获取其***配置信息,基于该***配置信息确定其设备等级并根据预设的配置等级与接入标识之间的关系表确定出终端设备对应的目标接入标识。这里,假设终端设备确定出的目标接入标识为L1,则终端设备可根据目标接入标识从上述多组第一接入限制参数和多组第二接入限制参数确定上述第一接入限制参数K11为其需要使用的目标第一接入限制参数。即R11为目标第一接入阈值,R21为目标第一接入等待参数。然后,终端设备可生成一个第一随机数x1,若终端设备确定第一随机数x1小于上述目标第一接入阈值R11,则终端设备可确定接入检测限制通过,可向网络设备发起随机接入请求以建立或者恢复网络连接,继而实现目标数据传输。若终端设备确定第一随机数x1等于或者大于上述目标第一接入阈值R11,则可再生成一个第二随机数x2。然后,终端设备可根据公式T=(r1+r2*a2)*C确定出等待时间为(r1+r2*x2)*R21,即终端设备可在(r1+r2*x2)*R21时间后再次发起接入限制检测操作。In an implementation manner, the foregoing first message includes multiple sets of first access restriction parameters and multiple sets of second access restriction parameters, and multiple sets of first access restriction parameters and multiple sets of second access restriction parameters are simultaneously It is included in the data entity corresponding to the business category of data transmission (for the sake of understanding, the third data entity is used to replace the description below). Here, it is assumed that the above-mentioned multiple sets of first access restriction parameters include the second access restriction parameter K21. The second access restriction parameter K21 includes the first access restriction parameter K11 in the aforementioned multiple sets of first access restriction parameters. The above-mentioned second access restriction parameter K21 is specifically [A21, C21, L1]. The aforementioned first access restriction parameter K11 is specifically [R11, R21, L1]. When it is determined that the aforementioned target data needs to be transmitted through the small data packet transmission method, the terminal device may first obtain the aforementioned third data entity from the aforementioned first message, and then obtain the multiple corresponding multiple small data packet transmission methods from the aforementioned third data entity. Group first access restriction parameter. Then, the terminal device can obtain its system configuration information, determine its device level based on the system configuration information, and determine the target access identifier corresponding to the terminal device according to the preset relationship table between the configuration level and the access identifier. Here, assuming that the target access identifier determined by the terminal device is L1, the terminal device can determine the first access restriction from the multiple sets of first access restriction parameters and multiple sets of second access restriction parameters according to the target access identifier. The parameter K11 is the target first access restriction parameter that needs to be used. That is, R11 is the target first access threshold, and R21 is the target first access waiting parameter. Then, the terminal device can generate a first random number x1. If the terminal device determines that the first random number x1 is less than the target first access threshold R11, the terminal device can determine that the access detection restriction is passed, and can initiate a random access to the network device. Into the request to establish or restore the network connection, and then achieve the target data transmission. If the terminal device determines that the first random number x1 is equal to or greater than the above-mentioned target first access threshold R11, a second random number x2 can be generated again. Then, the terminal device can determine that the waiting time is (r1+r2*x2)*R21 according to the formula T=(r1+r2*a2)*C, that is, the terminal device can retry after (r1+r2*x2)*R21 time Initiate the access restriction detection operation.
这里,需要说明的是,上述四种场景仅为可选的场景,具体的接入检测可因预设得检测规则的改变而产生一定的变化,本申请不作具体限定。Here, it should be noted that the above-mentioned four scenarios are only optional scenarios, and the specific access detection may have certain changes due to changes in preset detection rules, which are not specifically limited in this application.
在本申请实施例中,网络设备可为终端设备提供一组或者多组用于通过小数据包传输方式进行数据传输之前的接入限制检测操作的接入限制参数。在终端设备采用小数据包传输方式进行数据传输的场景下,可避免终端设备因使用进入连接态才能进行数据传输的方法(即占用网络资源较多的数据传输方法)所对应的接入限制参数进行接入限制检测而导致的接入限制检测通过率低的情况,使得终端设备在进行小数据包传输之前无需重复的触发接入限制检测,提升了无线通信网络的资源利用率。In the embodiment of the present application, the network device may provide one or more sets of access restriction parameters for the terminal device to perform the access restriction detection operation before data transmission through the small data packet transmission mode. In the scenario where the terminal device uses the small data packet transmission method for data transmission, it can prevent the terminal device from entering the connected state for data transmission (that is, the data transmission method that takes up more network resources) corresponding access restriction parameters The low pass rate of the access restriction detection caused by the access restriction detection eliminates the need for the terminal device to repeatedly trigger the access restriction detection before transmitting small data packets, which improves the resource utilization rate of the wireless communication network.
图3是本申请实施例提供的一种装置一结构示意图。如图3所示,该装置可应用于如图1所示的通信***中,执行上述实施例一中网络设备的功能。该装置可以就是网络设备本身,也可以是网络设备内部的元件或者模块。该装置可包括一个或多个收发单元301和一个或多个确定单元302。上述收发单元301可以称为收发机、收发电路、或者收发器等等,其可以包括至少一个天线和射频单元。上述收发单元301部分主要用于射频信号的收 发以及射频信号与基带信号的转换,例如用于向终端设备发送上述实施例中上述的第一消息。上述确定单元302部分主要用于进行基带处理,对装置进行控制等。上述收发单元301与确定单元302可以是物理上设置在一起,也可以物理上分离设置的,即分布式装置。例如上述确定单元302可以用于控制装置执行上述实施例一中关于至少一组第一接入参数和/或至少一组第二接入参数的确定过程。在具体实现中,上述确定单元302可以由一个或多个单板构成,多个单板可以共同支持单一接入指示的无线接入网(如NR网),也可以分别支持不同接入制式的无线接入网。上述确定单元302还包括存储器和处理器,上述存储器用于存储必要的指令和数据。上述处理器用于控制装置进行必要的动作,例如用于控制装置执行上述方法实施例中关于装置的操作流程。上述存储器和处理器可以服务于一个或多个单板。也就是说,可以每个单板上单独设置存储器和处理器。也可以是多个单板共用相同的存储器和处理器。此外每个单板上还可以设置有必要的电路。Fig. 3 is a schematic structural diagram of a device provided by an embodiment of the present application. As shown in FIG. 3, the device can be applied to the communication system shown in FIG. 1 to perform the functions of the network device in the first embodiment. The device can be the network device itself, or an internal component or module of the network device. The device may include one or more transceiving units 301 and one or more determining units 302. The foregoing transceiver unit 301 may be referred to as a transceiver, a transceiver circuit, or a transceiver, etc., which may include at least one antenna and a radio frequency unit. The above-mentioned transceiver unit 301 is mainly used for transmitting and receiving radio frequency signals and conversion between radio frequency signals and baseband signals, for example, for sending the above-mentioned first message in the above-mentioned embodiment to a terminal device. The above-mentioned determining unit 302 is mainly used to perform baseband processing, control the device, and so on. The foregoing transceiver unit 301 and the determining unit 302 may be physically arranged together or separately arranged physically, that is, a distributed device. For example, the above-mentioned determining unit 302 may be used to control the apparatus to execute the determination process of at least one set of first access parameters and/or at least one set of second access parameters in the above-mentioned first embodiment. In a specific implementation, the above-mentioned determining unit 302 may be composed of one or more single boards, and multiple single boards may jointly support a radio access network (such as an NR network) with a single access indication, or may respectively support different access standards. Wireless access network. The aforementioned determining unit 302 further includes a memory and a processor, and the aforementioned memory is used to store necessary instructions and data. The foregoing processor is used to control the device to perform necessary actions, for example, to control the device to execute the operation flow of the device in the foregoing method embodiment. The aforementioned memory and processor may serve one or more single boards. In other words, the memory and the processor can be set separately on each board. It can also be that multiple boards share the same memory and processor. In addition, necessary circuits can be provided on each board.
在一种可行的实施方式中,上述确定单元302用于执行上述图2中步骤S10中至少一组第一接入限制参数的确定过程。上述发送单元301用于执行图2中步骤S10中的包含有至少一组第一接入限制参数的第一消息的发送过程。In a feasible implementation manner, the above determining unit 302 is configured to perform the determination process of at least one group of first access restriction parameters in step S10 in FIG. 2. The foregoing sending unit 301 is configured to execute the sending process of the first message including at least one set of first access restriction parameters in step S10 in FIG. 2.
例如,在一种实现方式中,上述确定单元302用于执行步骤S10中实施方式一所描述的确定出一组第一接入限制参数的过程。该组接入限制参数中具体可包括一个第一接入阈值和一个第一接入等待参数。For example, in an implementation manner, the above determining unit 302 is configured to perform the process of determining a set of first access restriction parameters described in Embodiment 1 in step S10. The set of access restriction parameters may specifically include a first access threshold and a first access waiting parameter.
例如,在一种实现方式中,上述确定单元302用于执行步骤S10中实施方式二所描述的确定出多组第一接入限制参数的过程。每组第一接入限制参数中具体均可包括一个第一接入阈值、一个第一接入等待参数和一个接入标识。这里,任意一组第一接入限制参数中所包含的接入标识用于指示可使用该任意一组第一接入限制参数进行接入限制检测的终端设备所对应的设备等级。For example, in an implementation manner, the above determining unit 302 is configured to perform the process of determining multiple sets of first access restriction parameters described in the second embodiment in step S10. Each group of first access restriction parameters may specifically include a first access threshold, a first access waiting parameter, and an access identifier. Here, the access identifier included in any set of first access restriction parameters is used to indicate the device level corresponding to the terminal device that can use the any set of first access restriction parameters to perform access restriction detection.
例如,在一种实现方式中,上述确定单元302用于执行步骤S10中实施方式三中所描述的根据通信网络的负载状态参数、第一业务对应的优先级信息以及第二接入限制参数确定出第一业务对应的一组第一接入限制参数的过程。这里,该第一接入限制参数中可包括第一系数和第二系数。第二接入限制参数中具体包括一个第二接入阈值、一个第二接入等待参数和一个接入标识。For example, in an implementation manner, the determination unit 302 is configured to perform the determination according to the load status parameter of the communication network, the priority information corresponding to the first service, and the second access restriction parameter described in the third embodiment in step S10. The process of extracting a set of first access restriction parameters corresponding to the first service. Here, the first access restriction parameter may include a first coefficient and a second coefficient. The second access restriction parameter specifically includes a second access threshold, a second access waiting parameter, and an access identifier.
例如,在一种实现方式中,上述确定单元302用于执行步骤S10中实施方式四中所描述的确定出多组第一接入限制参数和多组第二接入限制参数的过程。一组第一接入限制参数对应一组第二接入限制参数。上述每组第二接入限制参数中包括第二接入阈值、第二接入等待参数和接入标识,上述每组第二接入限制参数对应的一组第一接入限制参数中包括第一系数、第二系数和上述接入标识,其中,上述第一系数用于调整上述第二接入阈值,和/或,上述第二系数用于调整上述第二接入等待参数,接入标识不同的第一接入参数和第二接入参数通过接入限制检测的概率不同。For example, in an implementation manner, the above determining unit 302 is configured to perform the process of determining multiple sets of first access restriction parameters and multiple sets of second access restriction parameters described in Embodiment 4 in step S10. A set of first access restriction parameters corresponds to a set of second access restriction parameters. Each set of second access restriction parameters includes a second access threshold, a second access waiting parameter, and an access identifier, and each set of second access restriction parameters corresponds to a set of first access restriction parameters that includes the first access restriction parameter. A coefficient, a second coefficient, and the access identifier, wherein the first coefficient is used to adjust the second access threshold, and/or the second coefficient is used to adjust the second access waiting parameter, the access identifier Different first access parameters and second access parameters have different probabilities for passing access restriction detection.
例如,在一种实现方式中,上述收发单元301用于执行步骤S20中所描述的向终端设备发送包含至少一组第一接入限制参数的过程。For example, in an implementation manner, the foregoing transceiver unit 301 is configured to perform the process of sending at least one set of first access restriction parameters to the terminal device described in step S20.
请参见图4,图4是本申请实施例提供的一种装置一结构示意图。该装置可用于执行上述实施例一中终端设备的功能。该装置可以就是终端设备本身,也可以是终端设备内部 的元件或者模块。为了便于说明,图4中仅示出了装置的主要部件。由图4可知,该装置包括处理器、存储器、射频电路、天线以及输入输出装置。处理器主要用于对通信协议以及通信数据进行处理,以及对装置进行控制,执行软件程序,处理软件程序的数据等。存储器主要用于存储软件程序和数据。射频电路主要用于基带信号与射频信号的转换以及对射频信号的处理。天线主要用于收发电磁波形式的射频信号。输入输出装置,例如触摸屏、显示屏,键盘等主要用于接收使用该装置的用户输入的数据以及对该用户输出数据。需要说明的是,在某些场景下,该通信设备可以不包括输入输出装置。Please refer to FIG. 4, which is a schematic structural diagram of an apparatus provided by an embodiment of the present application. The device can be used to perform the functions of the terminal equipment in the first embodiment above. The device can be the terminal device itself, or an internal component or module of the terminal device. For ease of description, only the main components of the device are shown in FIG. 4. It can be seen from Figure 4 that the device includes a processor, a memory, a radio frequency circuit, an antenna, and an input and output device. The processor is mainly used to process the communication protocol and communication data, control the device, execute the software program, and process the data of the software program. The memory is mainly used to store software programs and data. The radio frequency circuit is mainly used for the conversion of baseband signal and radio frequency signal and the processing of radio frequency signal. The antenna is mainly used to send and receive radio frequency signals in the form of electromagnetic waves. Input and output devices, such as touch screens, display screens, keyboards, etc., are mainly used to receive data input by a user who uses the device and output data to the user. It should be noted that in some scenarios, the communication device may not include an input and output device.
当需要发送数据时,处理器对待发送的数据进行基带处理后,输出基带信号至射频电路,射频电路将基带信号进行射频处理后将射频信号通过天线以电磁波的形式向外发送。当有数据发送到装置时,射频电路通过天线接收到射频信号,将射频信号转换为基带信号,并将基带信号输出至处理器,处理器将基带信号转换为数据并对该数据进行处理。为便于说明,图4中仅示出了一个存储器和处理器。在实际的装置产品中,可以存在一个或多个处理器和一个或多个存储器。存储器也可以称为存储介质或者存储设备等。存储器可以是独立于处理器设置,也可以是与处理器集成在一起,本申请实施例对此不做限制。When data needs to be sent, the processor performs baseband processing on the data to be sent, and outputs the baseband signal to the radio frequency circuit. The radio frequency circuit performs radio frequency processing on the baseband signal and sends the radio frequency signal to the outside in the form of electromagnetic waves through the antenna. When data is sent to the device, the radio frequency circuit receives the radio frequency signal through the antenna, converts the radio frequency signal into a baseband signal, and outputs the baseband signal to the processor, and the processor converts the baseband signal into data and processes the data. For ease of description, only one memory and processor are shown in FIG. 4. In an actual device product, there may be one or more processors and one or more memories. The memory may also be referred to as a storage medium or storage device. The memory may be set independently of the processor, or may be integrated with the processor, which is not limited in the embodiment of the present application.
作为一种可选的实现方式,处理器可以包括基带处理器和/或中央处理器,基带处理器主要用于对通信协议以及通信数据进行处理,中央处理器主要用于对整个装置进行控制,执行软件程序,处理软件程序的数据。图4中的处理器可以集成基带处理器和中央处理器的功能,本领域技术人员可以理解,基带处理器和中央处理器也可以是各自独立的处理器,通过总线等技术互联。本领域技术人员可以理解,装置可以包括多个基带处理器以适应不同的网络制式,装置可以包括多个中央处理器以增强其处理能力,装置的各个部件可以通过各种总线连接。上述基带处理器也可以表述为基带处理电路或者基带处理芯片。上述中央处理器也可以表述为中央处理电路或者中央处理芯片。对通信协议以及通信数据进行处理的功能可以内置在处理器中,也可以以软件程序的形式存储在存储单元中,由处理器执行软件程序以实现基带处理功能。As an optional implementation, the processor may include a baseband processor and/or a central processing unit. The baseband processor is mainly used to process communication protocols and communication data, and the central processing unit is mainly used to control the entire device. Execute the software program and process the data of the software program. The processor in FIG. 4 can integrate the functions of the baseband processor and the central processing unit. Those skilled in the art can understand that the baseband processor and the central processing unit can also be independent processors and are interconnected by technologies such as buses. Those skilled in the art can understand that the device may include multiple baseband processors to adapt to different network standards, the device may include multiple central processors to enhance its processing capabilities, and various components of the device may be connected through various buses. The aforementioned baseband processor can also be expressed as a baseband processing circuit or a baseband processing chip. The aforementioned central processing unit can also be expressed as a central processing circuit or a central processing chip. The function of processing the communication protocol and communication data can be built in the processor, or can be stored in the storage unit in the form of a software program, and the processor executes the software program to realize the baseband processing function.
在本申请实施例中,可以将具有收发功能的天线和射频电路视为装置的收发单元,将具有处理功能的处理器视为装置的处理单元。如图4所示,装置包括收发单元410和检测单元420。可选的,可以将收发单元410中用于实现接收功能的器件视为接收单元,将收发单元410中用于实现发送功能的器件视为发送单元,即收发单元410包括接收单元和发送单元。这里,接收单元有时也可以称为接收机、接收器、或接收电路等。发送单元有时也可以称为发射机、发射器或者发射电路等。In the embodiments of the present application, the antenna and radio frequency circuit with the transceiver function may be regarded as the transceiver unit of the device, and the processor with the processing function may be regarded as the processing unit of the device. As shown in FIG. 4, the device includes a transceiver unit 410 and a detection unit 420. Optionally, the device for implementing the receiving function in the transceiver unit 410 can be regarded as the receiving unit, and the device for implementing the sending function in the transceiver unit 410 as the sending unit, that is, the transceiver unit 410 includes a receiving unit and a sending unit. Here, the receiving unit may also be called a receiver, a receiver, or a receiving circuit. The transmitting unit may sometimes be called a transmitter, a transmitter, or a transmitting circuit.
应理解,收发单元410用于执行上述实施例一中第一消息的接收操作,检测单元420用于执行上述实施例一中根据至少一组第一接入限制参数进行接入限制检测的操作。It should be understood that the transceiving unit 410 is configured to perform the operation of receiving the first message in the first embodiment, and the detecting unit 420 is configured to perform the operation of detecting the access restriction according to at least one set of first access restriction parameters in the first embodiment.
例如,在一种实现方式中,检测单元420用于执行图2中步骤S30中的场景一内所描述的根据一组第一接入控制参数进行接入限制检测的过程。For example, in an implementation manner, the detection unit 420 is configured to perform the process of performing access restriction detection according to a set of first access control parameters described in scenario 1 in step S30 in FIG. 2.
例如,在一种实现方式中,检测单元420用于执行步骤S30中的场景二内所描述确定目标接入标识的过程。检测单元420还用于执行步骤S30中的场景二内所描述确定目标接目标第一接入限制参数的过程。检测单元420还用于执行步骤S30中的场景二内所描述根据目标第一接入限制参数进行接入限制检测的过程。For example, in an implementation manner, the detection unit 420 is configured to perform the process of determining the target access identifier described in the second scenario in step S30. The detection unit 420 is further configured to perform the process of determining the first access restriction parameter of the target connection described in the second scenario in step S30. The detection unit 420 is further configured to perform the process of performing access restriction detection according to the target first access restriction parameter described in the second scenario in step S30.
例如,在一种实现方式中,检测单元420用于执行步骤S30中的场景三内所描述根据上述第一系数对第二接入阈值进行调整,以得到目标接入阈值的过程。检测单元420还用于执行步骤S30中的场景三内所描述根据第二系数对第二接入等待参数进行调整,以得到目标接入等待参数的过程。检测单元420还用于执行步骤S30中的场景三内所描述根据目标接入阈值和目标接入等待参数进行接入限制检测的过程。For example, in an implementation manner, the detection unit 420 is configured to perform the process of adjusting the second access threshold according to the above-mentioned first coefficient described in scenario 3 in step S30 to obtain the target access threshold. The detection unit 420 is further configured to perform the process of adjusting the second access waiting parameter according to the second coefficient described in scenario 3 in step S30 to obtain the target access waiting parameter. The detection unit 420 is further configured to perform the process of performing access restriction detection according to the target access threshold and the target access waiting parameter described in scenario 3 in step S30.
例如,在一种实现方式中,检测单元420用于执行步骤S30中的场景四内所描述确定目标接入标识的过程。检测单元420用于执行步骤S30中的场景四内所描述确定出目标第一接入限制参数和目标第二接入限制参数过程。检测单元420还用于执行步骤S30中的场景四内所描述根据目标第一系数对目标第二接入阈值进行调整,以得到目标接入阈值,和/或,根据目标第二系数对目标第二接入等待参数进行调整,以得到目标接入等待参数的过程。检测单元420还用于执行步骤S30中的场景四内所描述根据目标接入阈值和目标接入等待参数进行接入限制检测的过程。For example, in an implementation manner, the detection unit 420 is configured to perform the process of determining the target access identifier described in scenario 4 in step S30. The detection unit 420 is configured to perform the process of determining the target first access restriction parameter and the target second access restriction parameter described in scenario 4 in step S30. The detection unit 420 is further configured to perform the adjustment of the target second access threshold according to the target first coefficient as described in the fourth scenario in step S30 to obtain the target access threshold, and/or, the target second coefficient according to the target second coefficient. Second, the process of adjusting the access waiting parameters to obtain the target access waiting parameters. The detection unit 420 is further configured to perform the process of performing access restriction detection according to the target access threshold and the target access waiting parameter described in scenario 4 in step S30.
请参见图5,图5是本申请实施例提供的一种装置又一结构示意图。该装置可以是实施例一中的网络设备,可用于实现上述实施例一中描述的接入限制检测方法。该装置包括:处理器51、存储器52、收发器53和总线***54。Please refer to FIG. 5, which is a schematic diagram of another structure of an apparatus provided by an embodiment of the present application. The device may be the network device in the first embodiment, and may be used to implement the access restriction detection method described in the first embodiment. The device includes a processor 51, a memory 52, a transceiver 53 and a bus system 54.
存储器51包括但不限于是RAM、ROM、EPROM或CD-ROM,该存储器51用于存储相关指令及数据。存储器51存储了如下的元素,可执行模块或者数据结构,或者它们的子集,或者它们的扩展集:The memory 51 includes but is not limited to RAM, ROM, EPROM or CD-ROM, and the memory 51 is used to store related instructions and data. The memory 51 stores the following elements, executable modules or data structures, or their subsets, or their extended sets:
操作指令:包括各种操作指令,用于实现各种操作。Operating instructions: including various operating instructions, used to implement various operations.
操作***:包括各种***程序,用于实现各种基础业务以及处理基于硬件的任务。Operating system: including various system programs, used to implement various basic services and process hardware-based tasks.
图5中仅示出了一个存储器,当然,存储器也可以根据需要,设置为多个。Only one memory is shown in FIG. 5. Of course, the memory can also be set to multiple as required.
收发器53可以是通信模块、收发电路。应用在本申请实施例中,收发器53用于执行实施例一中所涉及的第一消息的发送过程。The transceiver 53 may be a communication module or a transceiver circuit. Applied in the embodiment of this application, the transceiver 53 is used to execute the sending process of the first message involved in the first embodiment.
处理器51可以是控制器,CPU,通用处理器,DSP,ASIC,FPGA或者其他可编程逻辑器件、晶体管逻辑器件、硬件部件或者其任意组合。其可以实现或执行结合本申请实施例公开内容所描述的各种示例性的逻辑方框,模块和电路。如实施例一中所描述的至少一组第一接入限制检测参数的确定规程。处理器51也可以是实现计算功能的组合,例如包含一个或多个微处理器组合,DSP和微处理器的组合等等。The processor 51 may be a controller, a CPU, a general-purpose processor, DSP, ASIC, FPGA or other programmable logic devices, transistor logic devices, hardware components, or any combination thereof. It can implement or execute various exemplary logical blocks, modules, and circuits described in conjunction with the disclosure of the embodiments of the present application. The procedure for determining at least one set of first access restriction detection parameters as described in the first embodiment. The processor 51 may also be a combination for realizing computing functions, for example, including a combination of one or more microprocessors, a combination of a DSP and a microprocessor, and so on.
具体的应用中,装置的各个组件通过总线***54耦合在一起,其中总线***54除包括数据总线之外,还可以包括电源总线、控制总线和状态信号总线等。但是为了清楚说明起见,在图5中将各种总线都标为总线***54。为便于表示,图5中仅是示意性画出。In a specific application, the various components of the device are coupled together through a bus system 54. In addition to the data bus, the bus system 54 may also include a power bus, a control bus, and a status signal bus. However, for the sake of clarity, various buses are marked as the bus system 54 in FIG. 5. For ease of illustration, FIG. 5 is only schematically drawn.
应注意,实际应用中,本申请实施例中的处理器可以是一种集成电路芯片,具有信号的处理能力。在实现过程中,上述方法实施例的各步骤可以通过处理器中的硬件的集成逻辑电路或者软件形式的指令完成。上述的处理器可以是通用处理器、数字信号处理器(digital signal Processor,DSP)、专用集成电路(application specific integrated circuit,ASIC)、现成可编程门阵列(field programmable gate array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件。可以实现或者执行本申请实施例中的公开的各方法、步骤及逻辑框图。It should be noted that in practical applications, the processor in the embodiment of the present application may be an integrated circuit chip with signal processing capability. In the implementation process, the steps of the foregoing method embodiments can be completed by hardware integrated logic circuits in the processor or instructions in the form of software. The above-mentioned processor can be a general-purpose processor, a digital signal processor (digital signal processor, DSP), an application specific integrated circuit (ASIC), a ready-made programmable gate array (field programmable gate array, FPGA) or other Programming logic devices, discrete gates or transistor logic devices, discrete hardware components. The methods, steps, and logical block diagrams disclosed in the embodiments of the present application can be implemented or executed.
可以理解,本申请实施例中的存储器可以是易失性存储器或非易失性存储器,或可包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(read-only memory,ROM)、可编程只读存储器(programmable ROM,PROM)、可擦除可编程只读存储器(erasable PROM,EPROM)、电可擦除可编程只读存储器(electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(random access memory,RAM),其用作外部高速缓存。通过示例性但不是限制性说明,许多形式的RAM可用,例如静态随机存取存储器(static RAM,SRAM)、动态随机存取存储器(dynamic RAM,DRAM)、同步动态随机存取存储器(synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(double data rate SDRAM,DDR SDRAM)、增强型同步动态随机存取存储器(enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(synchlink DRAM,SLDRAM)和直接内存总线随机存取存储器(direct rambus RAM,DR RAM)。应注意,本申请实施例描述的存储器旨在包括但不限于这些和任意其它适合类型的存储器。It can be understood that the memory in the embodiment of the present application may be a volatile memory or a non-volatile memory, or may include both volatile and non-volatile memory. Among them, the non-volatile memory can be read-only memory (ROM), programmable read-only memory (programmable ROM, PROM), erasable programmable read-only memory (erasable PROM, EPROM), and electronic Erase programmable read-only memory (electrically EPROM, EEPROM) or flash memory. The volatile memory may be random access memory (RAM), which is used as an external cache. By way of exemplary but not restrictive description, many forms of RAM are available, such as static random access memory (static RAM, SRAM), dynamic random access memory (dynamic RAM, DRAM), synchronous dynamic random access memory (synchronous DRAM, SDRAM), double data rate synchronous dynamic random access memory (double data rate SDRAM, DDR SDRAM), enhanced synchronous dynamic random access memory (enhanced SDRAM, ESDRAM), synchronous connection dynamic random access memory (synchlink DRAM, SLDRAM) ) And direct memory bus random access memory (direct rambus RAM, DR RAM). It should be noted that the memories described in the embodiments of this application are intended to include, but are not limited to, these and any other suitable types of memories.
本申请实施例还提供了一种计算机可读介质,其上存储有计算机程序,该计算机程序被计算机执行时实现上述实施例一中网络设备执行的方法或者步骤。The embodiment of the present application also provides a computer-readable medium on which a computer program is stored, and when the computer program is executed by a computer, the method or step executed by the network device in the first embodiment is implemented.
本申请实施例还提供了一种计算机程序产品,该计算机程序产品被计算机执行时实现上述实施例一中网络设备执行的方法或者步骤。The embodiment of the present application also provides a computer program product, which, when executed by a computer, implements the method or step executed by the network device in the first embodiment.
本申请实施例还提供了一种装置,该装置可以是实施例一中的网络设备。该装置包括处理器和接口。该处理器用于执行上述实施例一中网络设备执行的方法或者步骤。应理解,上述网络设备可以是一个芯片,上述处理器可以通过硬件来实现也可以通过软件来实现,当通过硬件实现时,该处理器可以是逻辑电路、集成电路等。当通过软件来实现时,该处理器可以是一个通用处理器,通过读取存储器中存储的软件代码来实现,改存储器可以集成在处理器中,可以位于上述处理器之外,独立存在。The embodiment of the present application also provides a device, which may be the network device in the first embodiment. The device includes a processor and an interface. The processor is used to execute the method or step executed by the network device in the first embodiment. It should be understood that the foregoing network device may be a chip, and the foregoing processor may be implemented by hardware or software. When implemented by hardware, the processor may be a logic circuit, an integrated circuit, or the like. When implemented by software, the processor may be a general-purpose processor, which is implemented by reading software codes stored in the memory, and the memory may be integrated in the processor, may be located outside the foregoing processor, and exist independently.
请参见图6,图6是本申请实施例提供的一种装置又一结构示意图。该装置可以是实施例一中的终端设备,可用于实现上述实施例一中描述的接入限制检测方法。该装置包括:处理器61、存储器62、收发器63和总线***64。Please refer to FIG. 6, which is a schematic diagram of another structure of a device provided by an embodiment of the present application. The device may be the terminal device in the first embodiment, and may be used to implement the access restriction detection method described in the first embodiment. The device includes a processor 61, a memory 62, a transceiver 63 and a bus system 64.
存储器61包括但不限于是RAM、ROM、EPROM或CD-ROM,该存储器61用于存储相关指令及数据。存储器61存储了如下的元素,可执行模块或者数据结构,或者它们的子集,或者它们的扩展集:The memory 61 includes but is not limited to RAM, ROM, EPROM or CD-ROM, and the memory 61 is used to store related instructions and data. The memory 61 stores the following elements, executable modules or data structures, or their subsets, or their extended sets:
操作指令:包括各种操作指令,用于实现各种操作。Operating instructions: including various operating instructions, used to implement various operations.
操作***:包括各种***程序,用于实现各种基础业务以及处理基于硬件的任务。Operating system: including various system programs, used to implement various basic services and process hardware-based tasks.
图6中仅示出了一个存储器,当然,存储器也可以根据需要,设置为多个。Only one memory is shown in FIG. 6, of course, the memory can also be set to multiple as needed.
收发器63可以是通信模块、收发电路。应用在本申请实施例中,收发器63用于执行实施例一中所涉及的第一消息的接收过程。The transceiver 63 may be a communication module or a transceiver circuit. In the embodiment of the present application, the transceiver 63 is used to execute the first message receiving process involved in the first embodiment.
处理器61可以是控制器,CPU,通用处理器,DSP,ASIC,FPGA或者其他可编程逻辑器件、晶体管逻辑器件、硬件部件或者其任意组合。其可以实现或执行结合本申请实施例公开内容所描述的各种示例性的逻辑方框,模块和电路。如实施例一中所涉及的接入限制检测的过程。处理器61也可以是实现计算功能的组合,例如包含一个或多个微处理器组合,DSP和微处理器的组合等等。The processor 61 may be a controller, a CPU, a general-purpose processor, a DSP, an ASIC, an FPGA or other programmable logic devices, transistor logic devices, hardware components, or any combination thereof. It can implement or execute various exemplary logical blocks, modules, and circuits described in conjunction with the disclosure of the embodiments of the present application. As the access restriction detection process involved in the first embodiment. The processor 61 may also be a combination that implements computing functions, for example, includes a combination of one or more microprocessors, a combination of a DSP and a microprocessor, and so on.
具体的应用中,装置的各个组件通过总线***64耦合在一起,其中总线***64除包括数据总线之外,还可以包括电源总线、控制总线和状态信号总线等。但是为了清楚说明起见,在图6中将各种总线都标为总线***64。为便于表示,图6中仅是示意性画出。In a specific application, the various components of the device are coupled together through a bus system 64, where the bus system 64 may include a power bus, a control bus, and a status signal bus in addition to a data bus. However, for the sake of clarity, various buses are marked as the bus system 64 in FIG. 6. For ease of illustration, FIG. 6 is only schematically drawn.
应注意,实际应用中,本申请实施例中的处理器可以是一种集成电路芯片,具有信号的处理能力。在实现过程中,上述方法实施例的各步骤可以通过处理器中的硬件的集成逻辑电路或者软件形式的指令完成。上述的处理器可以是通用处理器、数字信号处理器(digital signal Processor,DSP)、专用集成电路(application specific integrated circuit,ASIC)、现成可编程门阵列(field programmable gate array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件。可以实现或者执行本申请实施例中的公开的各方法、步骤及逻辑框图。It should be noted that in practical applications, the processor in the embodiment of the present application may be an integrated circuit chip with signal processing capability. In the implementation process, the steps of the foregoing method embodiments can be completed by hardware integrated logic circuits in the processor or instructions in the form of software. The above-mentioned processor can be a general-purpose processor, a digital signal processor (digital signal processor, DSP), an application specific integrated circuit (ASIC), a ready-made programmable gate array (field programmable gate array, FPGA) or other Programming logic devices, discrete gates or transistor logic devices, discrete hardware components. The methods, steps, and logical block diagrams disclosed in the embodiments of the present application can be implemented or executed.
可以理解,本申请实施例中的存储器可以是易失性存储器或非易失性存储器,或可包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(read-only memory,ROM)、可编程只读存储器(programmable ROM,PROM)、可擦除可编程只读存储器(erasable PROM,EPROM)、电可擦除可编程只读存储器(electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(random access memory,RAM),其用作外部高速缓存。通过示例性但不是限制性说明,许多形式的RAM可用,例如静态随机存取存储器(static RAM,SRAM)、动态随机存取存储器(dynamic RAM,DRAM)、同步动态随机存取存储器(synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(double data rate SDRAM,DDR SDRAM)、增强型同步动态随机存取存储器(enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(synchlink DRAM,SLDRAM)和直接内存总线随机存取存储器(direct rambus RAM,DR RAM)。应注意,本申请实施例描述的存储器旨在包括但不限于这些和任意其它适合类型的存储器。It can be understood that the memory in the embodiment of the present application may be a volatile memory or a non-volatile memory, or may include both volatile and non-volatile memory. Among them, the non-volatile memory can be read-only memory (ROM), programmable read-only memory (programmable ROM, PROM), erasable programmable read-only memory (erasable PROM, EPROM), and electronic Erase programmable read-only memory (electrically EPROM, EEPROM) or flash memory. The volatile memory may be random access memory (RAM), which is used as an external cache. By way of exemplary but not restrictive description, many forms of RAM are available, such as static random access memory (static RAM, SRAM), dynamic random access memory (dynamic RAM, DRAM), synchronous dynamic random access memory (synchronous DRAM, SDRAM), double data rate synchronous dynamic random access memory (double data rate SDRAM, DDR SDRAM), enhanced synchronous dynamic random access memory (enhanced SDRAM, ESDRAM), synchronous connection dynamic random access memory (synchlink DRAM, SLDRAM) ) And direct memory bus random access memory (direct rambus RAM, DR RAM). It should be noted that the memories described in the embodiments of this application are intended to include, but are not limited to, these and any other suitable types of memories.
本申请实施例还提供了一种计算机可读介质,其上存储有计算机程序,该计算机程序被计算机执行时实现上述实施例一中网络设备执行的方法或者步骤。The embodiment of the present application also provides a computer-readable medium on which a computer program is stored, and when the computer program is executed by a computer, the method or step executed by the network device in the first embodiment is implemented.
本申请实施例还提供了一种计算机程序产品,该计算机程序产品被计算机执行时实现上述实施例一中终端设备执行的方法或者步骤。The embodiment of the present application also provides a computer program product, which, when executed by a computer, implements the method or step executed by the terminal device in the first embodiment.
本申请实施例还提供了一种装置,该装置可以是实施例一中的终端设备。该装置包括处理器和接口。该处理器用于执行上述实施例一中终端设备执行的方法或者步骤。应理解,上述终端设备可以是一个芯片,上述处理器可以通过硬件来实现也可以通过软件来实现,当通过硬件实现时,该处理器可以是逻辑电路、集成电路等。当通过软件来实现时,该处理器可以是一个通用处理器,通过读取存储器中存储的软件代码来实现,改存储器可以集成在处理器中,可以位于上述处理器之外,独立存在。An embodiment of the present application also provides a device, which may be the terminal device in the first embodiment. The device includes a processor and an interface. The processor is used to execute the method or step executed by the terminal device in the first embodiment. It should be understood that the foregoing terminal device may be a chip, and the foregoing processor may be implemented by hardware or software. When implemented by hardware, the processor may be a logic circuit, an integrated circuit, or the like. When implemented by software, the processor may be a general-purpose processor, which is implemented by reading software codes stored in the memory, and the memory may be integrated in the processor, may be located outside the foregoing processor, and exist independently.
在上述方法实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。上述计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行上述计算机指令时,全部或部分地产生按照本申请实施例上述的流程或功能。上述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。上述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,上述计算 机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(digital subscriber Line,DSL)或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。上述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。上述可用介质可以是磁性介质(例如,软盘、硬盘、磁带)、光介质(例如,高密度数字视频光盘(digital video disc,DVD)、或者半导体介质(例如,固态硬盘(solid state disk,SSD)等。In the above method embodiments, it may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. When implemented by software, it can be implemented in the form of a computer program product in whole or in part. The above-mentioned computer program product includes one or more computer instructions. When the foregoing computer instructions are loaded and executed on a computer, the foregoing processes or functions according to the embodiments of the present application are generated in whole or in part. The above-mentioned computer may be a general-purpose computer, a special-purpose computer, a computer network, or other programmable devices. The aforementioned computer instructions can be stored in a computer-readable storage medium, or transmitted from one computer-readable storage medium to another computer-readable storage medium. For example, the aforementioned computer instructions can be transmitted from a website, computer, server, or data center through a wired (Such as coaxial cable, optical fiber, digital subscriber line (digital subscriber Line, DSL) or wireless (such as infrared, wireless, microwave, etc.) transmission to another website site, computer, server or data center. The above-mentioned computer-readable storage The medium can be any usable medium that can be accessed by a computer or a data storage device such as a server or data center integrated with one or more usable media. The above usable media can be magnetic media (for example, floppy disks, hard disks, tapes), optical media (For example, a high-density digital video disc (digital video disc, DVD), or a semiconductor medium (for example, a solid state disk (SSD), etc.).
应理解,本申请实施例中的术语“***”和“网络”常可被互换使用。本实施例中术语“和/或”,仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。另外,本文中字符“/”,一般表示前后关联对象是一种“或”的关系。It should be understood that the terms "system" and "network" in the embodiments of the present application can often be used interchangeably. The term "and/or" in this embodiment is only an association relationship describing the associated objects, indicating that there can be three types of relationships, for example, A and/or B, which can mean that A exists alone, and A and B exist at the same time. There are three cases of B alone. In addition, the character "/" in this text generally indicates that the associated objects before and after are in an "or" relationship.
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、计算机软件或者二者的结合来实现,为了清楚地说明硬件和软件的可互换性,在上述说明中已经按照功能一般性地描述了各示例的组成及步骤。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。A person of ordinary skill in the art may realize that the units and algorithm steps of the examples described in the embodiments disclosed herein can be implemented by electronic hardware, computer software, or a combination of the two, in order to clearly illustrate the hardware and software Interchangeability. In the above description, the composition and steps of each example have been generally described in terms of function. Whether these functions are executed by hardware or software depends on the specific application and design constraint conditions of the technical solution. Professionals and technicians can use different methods for each specific application to implement the described functions, but such implementation should not be considered beyond the scope of this application.
在本申请所提供的实施例中,应该理解到,所揭露的***、装置和方法,可以通过其它的方式实现。例如,以上所描述的装置仅仅是示意性的,例如,单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个***,或一些特征可以忽略,或不执行。另外,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口、装置或单元的间接耦合或通信连接,也可以是电的,机械的或其它的形式连接。In the embodiments provided in this application, it should be understood that the disclosed system, device, and method may be implemented in other ways. For example, the device described above is only illustrative. For example, the division of units is only a logical function division. In actual implementation, there may be other divisions. For example, multiple units or components can be combined or integrated into another. A system or some features can be ignored or not implemented. In addition, the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may also be electrical, mechanical or other forms of connection.
另外,在本申请实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以是两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。In addition, the functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit. The above-mentioned integrated unit can be implemented in the form of hardware or software functional unit.
总之,以上上述仅为本申请技术方案的较佳实施例而已,并非用于限定本申请的保护范围。凡在本申请的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本申请的保护范围之内。In short, the above are only preferred embodiments of the technical solution of the present application, and are not used to limit the protection scope of the present application. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of this application shall be included in the protection scope of this application.

Claims (36)

  1. 一种接入限制检测方法,其特征在于,所述方法包括:An access restriction detection method, characterized in that the method includes:
    网络设备确定至少一组第一接入限制参数;The network device determines at least one set of first access restriction parameters;
    所述网络设备发送第一消息,所述第一消息包含所述至少一组第一接入限制参数;Sending a first message by the network device, where the first message includes the at least one set of first access restriction parameters;
    其中,所述至少一组第一接入限制参数对应小数据包传输方式,所述至少一组第一接入限制参数用于接入限制检测。Wherein, the at least one set of first access restriction parameters corresponds to a small data packet transmission mode, and the at least one set of first access restriction parameters is used for access restriction detection.
  2. 根据权利要求1所述的方法,其特征在于,所述第一消息中包括一组第一接入限制参数,所述一组第一接入限制参数中包括第一接入阈值和第一接入等待参数。The method according to claim 1, wherein the first message includes a set of first access restriction parameters, and the set of first access restriction parameters includes a first access threshold and a first access Enter the waiting parameters.
  3. 根据权利要求1所述的方法,其特征在于,所述第一消息中包括多组第一接入限制参数,所述多组第一接入限制参数中的每组第一接入限制参数中包括第一接入阈值、第一接入等待参数和接入标识,其中,接入标识不同的第一接入限制参数通过接入限制检测的概率不同。The method according to claim 1, wherein the first message includes multiple sets of first access restriction parameters, and each of the multiple sets of first access restriction parameters includes It includes a first access threshold, a first access waiting parameter, and an access identifier, where the first access restriction parameters with different access identifiers have different probability of passing the access restriction detection.
  4. 根据权利要求1所述的方法,其特征在于,所述第一消息中包括一组第一接入限制参数和除所述小数据包传输方式以外的其他数据传输方式对应的一组第二接入限制参数,所述一组第二接入限制参数用于接入限制检测;The method according to claim 1, wherein the first message includes a group of first access restriction parameters and a group of second access parameters corresponding to data transmission modes other than the small data packet transmission mode. Access restriction parameters, the set of second access restriction parameters is used for access restriction detection;
    所述第一接入限制参数中包括第一系数和第二系数,所述第二接入限制参数包括第二接入阈值和第二接入等待参数,其中,所述第一系数用于调整所述第二接入阈值,和/或,所述第二系数用于调整所述第二接入等待参数。The first access restriction parameter includes a first coefficient and a second coefficient, and the second access restriction parameter includes a second access threshold and a second access waiting parameter, wherein the first coefficient is used to adjust The second access threshold, and/or, the second coefficient is used to adjust the second access waiting parameter.
  5. 根据权利要求1所述的方法,其特征在于,所述第一消息中包括多组第一接入限制参数和除所述小数据包传输方式以外的其他数据传输方式对应的多组第二接入限制参数,一组第一接入限制参数对应一组第二接入限制参数,所述多组第二接入限制参数中的每组第二接入限制参数用于接入限制检测;The method according to claim 1, wherein the first message includes multiple sets of first access restriction parameters and multiple sets of second access corresponding to data transmission modes other than the small data packet transmission mode. Access restriction parameters, a group of first access restriction parameters corresponds to a group of second access restriction parameters, and each group of second access restriction parameters in the plurality of sets of second access restriction parameters is used for access restriction detection;
    所述每组第二接入限制参数中包括第二接入阈值、第二接入等待参数和接入标识,所述每组第二接入限制参数对应的一组第一接入限制参数中包括第一系数、第二系数和所述接入标识,其中,所述第一系数用于调整所述第二接入阈值,和/或,所述第二系数用于调整所述第二接入等待参数,接入标识不同的第一接入限制参数和第二接入限制参数通过接入限制检测的概率不同。Each group of second access restriction parameters includes a second access threshold, a second access waiting parameter, and an access identifier, and each group of second access restriction parameters corresponds to a group of first access restriction parameters Including a first coefficient, a second coefficient, and the access identifier, wherein the first coefficient is used to adjust the second access threshold, and/or the second coefficient is used to adjust the second access For the input waiting parameter, the first access restriction parameter and the second access restriction parameter with different access identifiers have different probability of passing the access restriction detection.
  6. 一种接入限制检测方法,其特征在于,所述方法包括:An access restriction detection method, characterized in that the method includes:
    终端设备接收来自网络设备的第一消息,其中,所述第一消息中包括小数据包传输方式对应的至少一组第一接入限制参数;The terminal device receives a first message from the network device, where the first message includes at least one set of first access restriction parameters corresponding to a small data packet transmission mode;
    所述终端设备确定数据传输方式为所述小数据包传输方式,根据所述至少一组第一接入限制参数进行接入限制检测。The terminal device determines that the data transmission mode is the small data packet transmission mode, and performs access restriction detection according to the at least one set of first access restriction parameters.
  7. 根据权利要求6所述的方法,其特征在于,所述第一消息中包括一组第一接入限制参数,所述一组第一接入限制参数中包括第一接入阈值和第一接入等待参数。The method according to claim 6, wherein the first message includes a set of first access restriction parameters, and the set of first access restriction parameters includes a first access threshold and a first access Enter the waiting parameters.
  8. 根据权利要求7所述的方法,其特征在于,所述根据所述至少一组第一接入限制参数进行接入限制检测包括:The method according to claim 7, wherein the performing access restriction detection according to the at least one set of first access restriction parameters comprises:
    所述终端设备根据所述第一接入阈值和所述第一接入等待参数进行接入限制检测。The terminal device performs access restriction detection according to the first access threshold and the first access waiting parameter.
  9. 根据权利要求6所述的方法,其特征在于,所述第一消息中包括多组第一接入限制参数,所述多组第一接入限制参数中每组第一接入限制参数中包括第一接入阈值、第一接入等待参数和接入标识,其中,接入标识不同的第一接入限制参数通过接入限制检测的概率不同。The method according to claim 6, wherein the first message includes multiple sets of first access restriction parameters, and each of the multiple sets of first access restriction parameters includes The first access threshold, the first access waiting parameter, and the access identifier, where the first access restriction parameters with different access identifiers have different probabilities of passing the access restriction detection.
  10. 根据权利要求9所述的方法,其特征在于,所述根据所述至少一组第一接入限制参数进行接入限制检测包括:The method according to claim 9, wherein the performing access restriction detection according to the at least one set of first access restriction parameters comprises:
    所述终端设备确定目标接入标识;The terminal device determines the target access identifier;
    所述终端设备根据所述目标接入标识从所述多组第一接入限制参数中确定出目标第一接入限制参数,其中,所述目标第一接入限制参数中包括目标第一接入阈值、目标第一接入等待参数和所述目标接入标识;The terminal device determines a target first access restriction parameter from the plurality of sets of first access restriction parameters according to the target access identifier, where the target first access restriction parameter includes the target first access restriction parameter. An entry threshold, a target first access waiting parameter, and the target access identifier;
    所述终端设备根据所述目标第一接入阈值和所述目标第一接入等待参数进行接入限制检测。The terminal device performs access restriction detection according to the target first access threshold and the target first access waiting parameter.
  11. 根据权利要求6所述的方法,其特征在于,所述第一消息中包括一组第一接入限制参数和除所述小数据包传输以外的其他数据传输方式对应的一组第二接入限制参数,所述一组第二接入限制参数用于接入限制检测;The method according to claim 6, wherein the first message includes a set of first access restriction parameters and a set of second access parameters corresponding to other data transmission modes except for the small data packet transmission. Restriction parameters, the set of second access restriction parameters is used for access restriction detection;
    所述第一接入限制参数中包括第一系数和第二系数,所述第二接入限制参数包括第二接入阈值和第二接入等待参数,其中,所述第一系数用于调整所述第二接入阈值,和/或,所述第二系数用于调整所述第二接入等待参数。The first access restriction parameter includes a first coefficient and a second coefficient, and the second access restriction parameter includes a second access threshold and a second access waiting parameter, wherein the first coefficient is used to adjust The second access threshold, and/or, the second coefficient is used to adjust the second access waiting parameter.
  12. 根据权利要求11所述的方法,其特征在于,所述根据所述至少一组第一接入限制参数进行接入限制检测包括:The method according to claim 11, wherein the performing access restriction detection according to the at least one set of first access restriction parameters comprises:
    所述终端设备根据所述第一系数对所述第二接入阈值进行调整,以得到目标接入阈值;和/或,The terminal device adjusts the second access threshold according to the first coefficient to obtain a target access threshold; and/or,
    所述终端设备根据所述第二系数对所述第二接入等待参数进行调整,以得到目标接入等待参数;The terminal device adjusts the second access waiting parameter according to the second coefficient to obtain a target access waiting parameter;
    所述终端设备根据所述目标接入阈值和所述目标接入等待参数进行接入限制检测。The terminal device performs access restriction detection according to the target access threshold and the target access waiting parameter.
  13. 根据权利要求6所述的方法,其特征在于,所述第一消息中包括多组第一接入限 制参数和除所述小数据包传输方式以外的其他数据传输方式对应的多组第二接入限制参数,一组第一接入限制参数对应一组第二接入限制参数,所述多组第二接入限制参数中的每组第二接入限制参数均用于接入限制检测;The method according to claim 6, wherein the first message includes multiple sets of first access restriction parameters and multiple sets of second access corresponding to data transmission modes other than the small data packet transmission mode. Access restriction parameters, a group of first access restriction parameters corresponds to a group of second access restriction parameters, and each group of second access restriction parameters in the plurality of sets of second access restriction parameters is used for access restriction detection;
    所述每组第二接入限制参数中包括第二接入阈值、第二接入等待参数和接入标识,所述每组第二接入限制参数对应的一组第一接入限制参数中包括第一系数、第二系数和所述接入标识,其中,所述第一系数用于调整所述第二接入阈值,和/或,所述第二系数用于调整所述第二接入等待参数,接入标识不同的第一接入限制参数和第二接入限制参数通过接入限制检测的概率不同。Each group of second access restriction parameters includes a second access threshold, a second access waiting parameter, and an access identifier, and each group of second access restriction parameters corresponds to a group of first access restriction parameters Including a first coefficient, a second coefficient, and the access identifier, wherein the first coefficient is used to adjust the second access threshold, and/or the second coefficient is used to adjust the second access For the input waiting parameter, the first access restriction parameter and the second access restriction parameter with different access identifiers have different probability of passing the access restriction detection.
  14. 根据权利要求13所述的方法,其特征在于,所述根据所述至少一组第一接入限制参数进行接入限制检测包括:The method according to claim 13, wherein the performing access restriction detection according to the at least one set of first access restriction parameters comprises:
    所述终端设备确定目标接入标识;The terminal device determines the target access identifier;
    所述终端设备根据所述目标接入标识从所述多组第一接入限制参数和所述多组第二接入限制参数中确定出目标第一接入限制参数和目标第二接入限制参数,其中,所述目标第一接入限制参数中包括目标第一系数、目标第二系数和所述目标接入标识,所述目标第二接入限制参数中包括目标第二接入阈值、目标第二接入等待参数和所述目标接入标识;The terminal device determines a target first access restriction parameter and a target second access restriction from the multiple sets of first access restriction parameters and the multiple sets of second access restriction parameters according to the target access identifier Parameters, wherein the target first access restriction parameter includes a target first coefficient, a target second coefficient, and the target access identifier, and the target second access restriction parameter includes a target second access threshold, The target second access waiting parameter and the target access identifier;
    所述终端设备根据所述目标第一系数对所述目标第二接入阈值进行调整,以得到目标接入阈值;和/或,The terminal device adjusts the target second access threshold according to the target first coefficient to obtain the target access threshold; and/or,
    所述终端设备根据所述目标第二系数对所述目标第二接入等待参数进行调整,以得到目标接入等待参数;The terminal device adjusts the target second access waiting parameter according to the target second coefficient to obtain the target access waiting parameter;
    所述终端设备根据所述目标接入阈值和所述目标接入等待参数进行接入限制检测。The terminal device performs access restriction detection according to the target access threshold and the target access waiting parameter.
  15. 一种装置,其特征在于,所述装置包括:A device, characterized in that the device comprises:
    确定单元,用于确定至少一组第一接入限制参数;A determining unit, configured to determine at least one group of first access restriction parameters;
    收发单元,用于发送第一消息,所述第一消息包含所述确定单元确定的至少一组第一接入限制参数;A transceiver unit, configured to send a first message, where the first message includes at least one set of first access restriction parameters determined by the determining unit;
    其中,所述至少一组第一接入限制参数对应小数据包传输方式,所述至少一组第一接入限制参数用于接入限制检测。Wherein, the at least one set of first access restriction parameters corresponds to a small data packet transmission mode, and the at least one set of first access restriction parameters is used for access restriction detection.
  16. 根据权利要求15所述的装置,其特征在于,所述第一消息中包括一组第一接入限制参数,所述一组第一接入限制参数中包括第一接入阈值和第一接入等待参数。The apparatus according to claim 15, wherein the first message includes a set of first access restriction parameters, and the set of first access restriction parameters includes a first access threshold and a first access restriction parameter. Enter the waiting parameters.
  17. 根据权利要求15所述的装置,其特征在于,所述第一消息中包括多组第一接入限制参数,所述多组第一接入限制参数中的每组第一接入限制参数中包括第一接入阈值、第一接入等待参数和接入标识,其中,接入标识不同的第一接入限制参数通过接入限制检测的概率不同。The apparatus according to claim 15, wherein the first message includes multiple sets of first access restriction parameters, and each of the multiple sets of first access restriction parameters includes It includes a first access threshold, a first access waiting parameter, and an access identifier, where the first access restriction parameters with different access identifiers have different probability of passing the access restriction detection.
  18. 根据权利要求15所述的装置,其特征在于,所述第一消息中包括一组第一接入限 制参数和除所述小数据包传输方式以外的其他数据传输方式对应的一组第二接入限制参数,所述一组第二接入限制参数用于接入限制检测;The apparatus according to claim 15, wherein the first message includes a group of first access restriction parameters and a group of second access parameters corresponding to other data transmission modes except the small data packet transmission mode. Access restriction parameters, the set of second access restriction parameters is used for access restriction detection;
    所述第一接入限制参数中包括第一系数和第二系数,所述第二接入限制参数包括第二接入阈值和第二接入等待参数,其中,所述第一系数用于调整所述第二接入阈值,和/或,所述第二系数用于调整所述第二接入等待参数。The first access restriction parameter includes a first coefficient and a second coefficient, and the second access restriction parameter includes a second access threshold and a second access waiting parameter, wherein the first coefficient is used to adjust The second access threshold, and/or, the second coefficient is used to adjust the second access waiting parameter.
  19. 根据权利要求15所述的装置,其特征在于,所述第一消息中包括多组第一接入限制参数和除所述小数据包传输方式以外的其他数据传输方式对应的多组第二接入限制参数,一组第一接入限制参数对应一组第二接入限制参数,所述多组第二接入限制参数中的每组第二接入限制参数均用于接入限制检测;The apparatus according to claim 15, wherein the first message includes multiple sets of first access restriction parameters and multiple sets of second access corresponding to other data transmission modes except the small data packet transmission mode. Access restriction parameters, a group of first access restriction parameters corresponds to a group of second access restriction parameters, and each group of second access restriction parameters in the plurality of sets of second access restriction parameters is used for access restriction detection;
    所述每组第二接入限制参数中包括第二接入阈值、第二接入等待参数和接入标识,所述每组第二接入限制参数对应的一组第一接入限制参数中包括第一系数、第二系数和所述接入标识,其中,所述第一系数用于调整所述第二接入阈值,和/或,所述第二系数用于调整所述第二接入等待参数,接入标识不同的第一接入限制参数和第二接入限制参数通过接入限制检测的概率不同。Each group of second access restriction parameters includes a second access threshold, a second access waiting parameter, and an access identifier, and each group of second access restriction parameters corresponds to a group of first access restriction parameters Including a first coefficient, a second coefficient, and the access identifier, wherein the first coefficient is used to adjust the second access threshold, and/or the second coefficient is used to adjust the second access For the input waiting parameter, the first access restriction parameter and the second access restriction parameter with different access identifiers have different probability of passing the access restriction detection.
  20. 一种装置,其特征在于,所述装置包括:A device, characterized in that the device comprises:
    收发单元,用于接收来自网络设备的第一消息,其中,所述第一消息中包括小数据包传输方式对应的至少一组第一接入限制参数;The transceiver unit is configured to receive a first message from a network device, where the first message includes at least one set of first access restriction parameters corresponding to a small data packet transmission mode;
    检测单元,用于若确定数据传输方式为所述小数据包传输方式,则根据所述接收单元接收到的所述至少一组第一接入限制参数进行接入限制检测。The detecting unit is configured to, if it is determined that the data transmission mode is the small data packet transmission mode, perform access restriction detection according to the at least one set of first access restriction parameters received by the receiving unit.
  21. 根据权利要求20所述的装置,其特征在于,所述第一消息中包括一组第一接入限制参数,所述一组第一接入限制参数中包括第一接入阈值和第一接入等待参数。The apparatus according to claim 20, wherein the first message includes a set of first access restriction parameters, and the set of first access restriction parameters includes a first access threshold and a first access restriction parameter. Enter the waiting parameters.
  22. 根据权利要求21所述的装置,其特征在于,所述检测单元用于:The device according to claim 21, wherein the detection unit is configured to:
    根据所述第一接入阈值和所述第一接入等待参数进行接入限制检测。Perform access restriction detection according to the first access threshold and the first access waiting parameter.
  23. 根据权利要求20所述的装置,其特征在于,所述第一消息中包括多组第一接入限制参数,所述多组第一接入限制参数中每组第一接入限制参数中包括第一接入阈值、第一接入等待参数和接入标识,其中,接入标识不同的第一接入限制参数通过接入限制检测的概率不同。The apparatus according to claim 20, wherein the first message includes multiple sets of first access restriction parameters, and each of the multiple sets of first access restriction parameters includes The first access threshold, the first access waiting parameter, and the access identifier, where the first access restriction parameters with different access identifiers have different probabilities of passing the access restriction detection.
  24. 根据权利要求23所述的装置,其特征在于,所述检测单元用于:The device according to claim 23, wherein the detection unit is configured to:
    确定目标接入标识;Determine the target access identifier;
    根据所述目标接入标识从所述多组第一接入限制参数中确定出目标第一接入限制参数,其中,所述目标第一接入限制参数中包括目标第一接入阈值、目标第一接入等待参数和所述目标接入标识;According to the target access identifier, a target first access restriction parameter is determined from the plurality of sets of first access restriction parameters, where the target first access restriction parameter includes a target first access threshold, a target The first access waiting parameter and the target access identifier;
    根据所述目标第一接入阈值和所述目标第一接入等待参数进行接入限制检测。Perform access restriction detection according to the target first access threshold and the target first access waiting parameter.
  25. 根据权利要求20所述的装置,其特征在于,所述第一消息中包括一组第一接入限制参数和除所述小数据包传输以外的其他数据传输方式对应的一组第二接入限制参数,所述一组第二接入限制参数用于接入限制检测;The apparatus according to claim 20, wherein the first message includes a set of first access restriction parameters and a set of second access parameters corresponding to other data transmission modes except for the small data packet transmission. Restriction parameters, the set of second access restriction parameters is used for access restriction detection;
    所述第一接入限制参数中包括第一系数和第二系数,所述第二接入限制参数包括第二接入阈值和第二接入等待参数,其中,所述第一系数用于调整所述第二接入阈值,和/或,所述第二系数用于调整所述第二接入等待参数。The first access restriction parameter includes a first coefficient and a second coefficient, and the second access restriction parameter includes a second access threshold and a second access waiting parameter, wherein the first coefficient is used to adjust The second access threshold, and/or, the second coefficient is used to adjust the second access waiting parameter.
  26. 根据权利要求25所述的装置,其特征在于,所述检测单元用于:The device according to claim 25, wherein the detection unit is configured to:
    根据所述第一系数对所述第二接入阈值进行调整,以得到目标接入阈值;和/或,Adjust the second access threshold according to the first coefficient to obtain a target access threshold; and/or,
    根据所述第二系数对所述第二接入等待参数进行调整,以得到目标接入等待参数;Adjusting the second access waiting parameter according to the second coefficient to obtain a target access waiting parameter;
    根据所述目标接入阈值和所述目标接入等待参数进行接入限制检测。Perform access restriction detection according to the target access threshold and the target access waiting parameter.
  27. 根据权利要去20所述的装置,其特征在于,所述第一消息中包括多组第一接入限制参数和除所述小数据包传输方式以外的其他数据传输方式对应的多组第二接入限制参数,一组第一接入限制参数对应一组第二接入限制参数,所述多组第二接入限制参数中的每组第二接入限制参数均用于接入限制检测;The device according to claim 20, wherein the first message includes multiple sets of first access restriction parameters and multiple sets of second data corresponding to other data transmission modes except the small data packet transmission mode. Access restriction parameters, a group of first access restriction parameters corresponds to a group of second access restriction parameters, and each group of second access restriction parameters in the plurality of sets of second access restriction parameters is used for access restriction detection ;
    所述每组第二接入限制参数中包括第二接入阈值、第二接入等待参数和接入标识,所述每组第二接入限制参数对应的一组第一接入限制参数中包括第一系数、第二系数和所述接入标识,其中,所述第一系数用于调整所述第二接入阈值,和/或,所述第二系数用于调整所述第二接入等待参数,接入标识不同的第一接入限制参数和第二接入限制参数通过接入限制检测的概率不同。Each group of second access restriction parameters includes a second access threshold, a second access waiting parameter, and an access identifier, and each group of second access restriction parameters corresponds to a group of first access restriction parameters Including a first coefficient, a second coefficient, and the access identifier, wherein the first coefficient is used to adjust the second access threshold, and/or the second coefficient is used to adjust the second access For the input waiting parameter, the first access restriction parameter and the second access restriction parameter with different access identifiers have different probability of passing the access restriction detection.
  28. 根据权利要求27所述的装置,其特征在于,所述检测单元用于:The device according to claim 27, wherein the detection unit is configured to:
    确定目标接入标识;Determine the target access identifier;
    根据所述目标接入标识从所述多组第一接入限制参数和所述多组第二接入限制参数中确定出目标第一接入限制参数和目标第二接入限制参数,其中,所述目标第一接入限制参数中包括目标第一系数、目标第二系数和所述目标接入标识,所述目标第二接入限制参数中包括目标第二接入阈值、目标第二接入等待参数和所述目标接入标识;According to the target access identifier, a target first access restriction parameter and a target second access restriction parameter are determined from the multiple sets of first access restriction parameters and the multiple sets of second access restriction parameters, where: The target first access restriction parameter includes a target first coefficient, a target second coefficient, and the target access identifier, and the target second access restriction parameter includes a target second access threshold, a target second access Incoming waiting parameters and the target access identifier;
    根据目标第一系数对所述目标第二接入阈值进行调整,以得到目标接入阈值;和/或,Adjust the target second access threshold according to the target first coefficient to obtain the target access threshold; and/or,
    根据目标第二系数对所述目标第二接入等待参数进行调整,以得到目标接入等待参数;Adjusting the target second access waiting parameter according to the target second coefficient to obtain the target access waiting parameter;
    根据所述目标接入阈值和所述目标接入等待参数进行接入限制检测。Perform access restriction detection according to the target access threshold and the target access waiting parameter.
  29. 一种可读存储介质,用于存储指令,当所述指令被执行时,使如权利要求1-5中任一项所述的方法被实现。A readable storage medium for storing instructions. When the instructions are executed, the method according to any one of claims 1-5 is realized.
  30. 一种可读存储介质,用于存储指令,当所述指令被执行时,使如权利要求6-14中任一项所述的方法被实现。A readable storage medium for storing instructions. When the instructions are executed, the method according to any one of claims 6-14 is realized.
  31. 一种装置,其特征在于,包括:处理器,存储器和收发器;A device characterized by comprising: a processor, a memory and a transceiver;
    所述存储器,用于存储计算机程序;The memory is used to store computer programs;
    所述处理器,用于执行所述存储器中存储的计算机程序,以使得所述通信装置执行如权利要求1-5中任一项所述的方法。The processor is configured to execute a computer program stored in the memory, so that the communication device executes the method according to any one of claims 1-5.
  32. 一种装置,其特征在于,包括:处理器,存储器和收发器;A device characterized by comprising: a processor, a memory and a transceiver;
    所述存储器,用于存储计算机程序;The memory is used to store computer programs;
    所述处理器,用于执行所述存储器中存储的计算机程序,以使得所述通信装置执行如权利要求6-14中任一项所述的方法。The processor is configured to execute a computer program stored in the memory, so that the communication device executes the method according to any one of claims 6-14.
  33. 一种装置,其特征在于,包括:处理器和接口电路;A device characterized by comprising: a processor and an interface circuit;
    所述接口电路,用于接收代码指令并传输至所述处理器;The interface circuit is used to receive code instructions and transmit them to the processor;
    所述处理器用于运行所述代码指令以执行如权利要求1-5中的任一项所述的方法。The processor is configured to execute the code instructions to execute the method according to any one of claims 1-5.
  34. 一种装置,其特征在于,包括:处理器和接口电路;A device characterized by comprising: a processor and an interface circuit;
    所述接口电路,用于接收代码指令并传输至所述处理器;The interface circuit is used to receive code instructions and transmit them to the processor;
    所述处理器用于运行所述代码指令以执行如权利要求6-14中的任一项所述的方法。The processor is configured to execute the code instructions to execute the method according to any one of claims 6-14.
  35. 一种芯片,其特征在于,包括处理器和通信接口,所述处理器用于读取指令以执行如权利要求1-5中任意一项所述的方法,或者执行如权利要求6-14中任意一项所述的方法。A chip, characterized by comprising a processor and a communication interface, the processor being used to read instructions to execute the method according to any one of claims 1-5, or to execute any one of claims 6-14 The method described in one item.
  36. 一种通信***,包括权利要求15-19任意一项所述的通信装置、以及包括权利要求20-28任意一项所述的通信装置。A communication system comprising the communication device according to any one of claims 15-19 and the communication device according to any one of claims 20-28.
PCT/CN2020/106834 2019-08-07 2020-08-04 Method and device for access restriction detection WO2021023185A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910733373.2 2019-08-07
CN201910733373.2A CN112351470B (en) 2019-08-07 2019-08-07 Access restriction detection method and device

Publications (1)

Publication Number Publication Date
WO2021023185A1 true WO2021023185A1 (en) 2021-02-11

Family

ID=74367600

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/106834 WO2021023185A1 (en) 2019-08-07 2020-08-04 Method and device for access restriction detection

Country Status (2)

Country Link
CN (1) CN112351470B (en)
WO (1) WO2021023185A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20220039194A1 (en) * 2020-07-31 2022-02-03 Mediatek Singapore Pte. Ltd. Methods and apparatus for data transmission in connectionless way

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2011134329A1 (en) * 2010-04-26 2011-11-03 中兴通讯股份有限公司 Method and system for transmitting small data packets
CN106572516A (en) * 2016-09-28 2017-04-19 华为技术有限公司 Network slice selection method, terminal equipment and network equipment
CN109151950A (en) * 2017-06-16 2019-01-04 华为技术有限公司 A kind of method, the network equipment and the terminal device of access control

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102271382B (en) * 2010-06-07 2014-08-20 电信科学技术研究院 Access control method and equipment for machine type communication (MTC) equipment
EP3364680B1 (en) * 2015-11-06 2021-08-25 Huawei Technologies Co., Ltd. Method, apparatus and system for information transmission
CN110012557A (en) * 2018-01-05 2019-07-12 夏普株式会社 Wireless telecom equipment and method
WO2020258191A1 (en) * 2019-06-27 2020-12-30 Oppo广东移动通信有限公司 Access control method and apparatus and terminal

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2011134329A1 (en) * 2010-04-26 2011-11-03 中兴通讯股份有限公司 Method and system for transmitting small data packets
CN106572516A (en) * 2016-09-28 2017-04-19 华为技术有限公司 Network slice selection method, terminal equipment and network equipment
CN109151950A (en) * 2017-06-16 2019-01-04 华为技术有限公司 A kind of method, the network equipment and the terminal device of access control

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
ZTE ET AL.: "3GPP TSG RAN Meeting #84 RP-191074", NEW WID ON SMALL DATA TRANSMISSION FOR NR, 6 June 2019 (2019-06-06), XP051739358 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20220039194A1 (en) * 2020-07-31 2022-02-03 Mediatek Singapore Pte. Ltd. Methods and apparatus for data transmission in connectionless way

Also Published As

Publication number Publication date
CN112351470A (en) 2021-02-09
CN112351470B (en) 2022-04-05

Similar Documents

Publication Publication Date Title
CN110149732B (en) Communication method and wireless communication device
US11950245B2 (en) Method and device for cross carrier scheduling physical downlink shared channel
WO2017166221A1 (en) Radio access control method, device and system
WO2021012996A1 (en) Information transmission method and device
US11259362B2 (en) Method for repeatedly transmitting data and device
WO2020155076A1 (en) Service processing method, device, chip, and computer program
US11432370B2 (en) D2D communication method and terminal device
WO2021087828A1 (en) Method for activating or updating path loss rs of srs and device
EP4192082A1 (en) Communication method, apparatus and system
US20230032142A1 (en) Information transmission method and device
WO2021016777A1 (en) Wireless communication method, terminal device and network device
US11375474B2 (en) Method of sending downlink information, access and mobility management function entity and network function entity
WO2022206315A1 (en) Access control method and apparatus for network slice
WO2021092865A1 (en) Access control method and apparatus, and terminal device
WO2021023185A1 (en) Method and device for access restriction detection
WO2020258191A1 (en) Access control method and apparatus and terminal
CN110545579B (en) Processing method, network side equipment and user equipment
US20220124790A1 (en) Method for data transmission, method for data reception, and device
WO2019076226A1 (en) Method and apparatus for data transmission in multiple carriers
WO2022236835A1 (en) Method and apparatus for determining behavior of terminal device, and terminal device and network device
CN112217618B (en) Information transmission method and device
CN112217617B (en) Information transmission method and device
WO2020087546A1 (en) Network information transmission method and obtaining method, network device, and terminal device
WO2022233134A1 (en) Resource processing method, device, medium, chip, and chip module
US20230156696A1 (en) Data communication method and apparatus

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20850871

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20850871

Country of ref document: EP

Kind code of ref document: A1