WO2012083741A1 - Procédé d'accès aléatoire et terminal - Google Patents
Procédé d'accès aléatoire et terminal Download PDFInfo
- Publication number
- WO2012083741A1 WO2012083741A1 PCT/CN2011/080062 CN2011080062W WO2012083741A1 WO 2012083741 A1 WO2012083741 A1 WO 2012083741A1 CN 2011080062 W CN2011080062 W CN 2011080062W WO 2012083741 A1 WO2012083741 A1 WO 2012083741A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- access
- terminal
- control factor
- random access
- delay time
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W28/00—Network traffic management; Network resource management
- H04W28/02—Traffic management, e.g. flow control or congestion control
- H04W28/0205—Traffic management, e.g. flow control or congestion control at the air interface
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/16—Discovering, processing access restriction or access information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W74/00—Wireless channel access
- H04W74/08—Non-scheduled access, e.g. ALOHA
Definitions
- the present invention relates to the field of mobile communications, and in particular, to a random access method and a terminal. Background technique
- H2H Human to Human
- ⁇ 2 ⁇ machine to machine
- the definition is based on the intelligent interaction of the machine terminal, and the networked application and service. It is based on the intelligent machine terminal, and uses multiple communication methods as access means to provide customers with information solutions to meet customer requirements. Information needs for monitoring, command and dispatch, data collection and measurement.
- ⁇ 2 ⁇ can be applied to industrial applications, home applications, personal applications, etc., in the field of industrial applications such as: traffic monitoring, warning systems, maritime rescue, vending machines, car payment, etc., in the field of home applications such as: Automatic meter reading, temperature control, etc., for personal use applications such as: life detection, remote diagnosis, etc.
- ⁇ 2 ⁇ communication object is machine-to-machine or person-to-machine, data communication between one or more machines is defined as Machine Type Communication (MTC), in this case less human-computer interaction is required, and participation in MTC Machine, defined as MTC equipment (MTC Device, MD ).
- MTC Machine Type Communication
- MD MTC equipment
- the MTC device is a terminal of the MTC user, and can communicate with the MTC device and the MTC server through a public Land Mobile Network (PLMN) network.
- PLMN public Land Mobile Network
- the existing system can be optimized according to its characteristics to meet the requirements of the M2M application, and it does not affect the ordinary H2H equipment in the existing system.
- Some notable features of the M2M application include: The number of MTC devices is huge, and the number is much higher than the existing H2H devices; the data transmission is regular, the amount of data transmitted per time is small; the mobility of MTC devices is low, and a large part of MTC devices are Not moving.
- FIG 1 is a flow chart of the contention-based random access procedure in the existing LTE system. As shown in Figure 1, in Long Term Evolution (LTE).
- the contention-based random access procedure mainly includes the following four steps: Step 102: User Equipment (UE) randomly selects a Preamble (Physical Random Access Channel, PRACH) Send on.
- UE User Equipment
- PRACH Physical Random Access Channel
- Step 104 After detecting the transmission of the Preamble code, the base station (eNB) sends a random access response (RAR) in the downlink, where the random access response generally includes the following information: The number of the received Preamble code The time adjustment amount corresponding to the received Preamble code, the uplink resource location indication information allocated to the terminal, and the temporary Temporary Cell Radio Network Temporary Identifier (Temporary C-RNTI) allocation.
- RAR random access response
- Step 106 After receiving the random access response, the UE sends an uplink message on the allocated uplink resource according to the indication.
- the uplink message is also called Message 3 (Msg3), and at least should include: the terminal's unique identifier (TMSI) or random identifier (Random ID), and the establishment cause ( Establishment Cause ).
- Step 108 The base station receives the uplink message of the UE, and returns a contention to the UE with successful access.
- Contention Resolution also known as Msg4. If the UE receives the message before the collision resolution timer expires, and the packet is confirmed to be the Msg4 expected by the UE, it is determined that the random access procedure is successful; otherwise, the UE is re-initiated the random access. The UE re-initiating random access needs to restart from step 102.
- the random access fails.
- the random access of the LTE system is implemented in the medium access control (MAC). After the random access fails, the MAC layer needs to notify the upper layer of the user equipment of the failure. If the upper layer of the user equipment still needs to initiate a service, it will trigger the MAC layer to initiate random access again.
- MAC medium access control
- the MTC device continuously initiates random access until the data is successfully transmitted, and the number of MTC devices is Huge, many MTC devices sending data multiple times will consume a large amount of wireless resources, especially random access resources, and if the number of MTC devices that initiate data transmission at the same time is large, random access overload will occur, which will result in all user equipment.
- the random access initiated by the H2H device and the MTC device fails, and the user equipment initiates random access again after the random access failure, so that the random access is always in an overload state, and the network cannot be restored to the normal state.
- the main purpose of the present invention is to provide a random access method and a terminal, which can avoid the problem that a large number of terminals initiate random access at the same time, causing network overload and failing to recover smoothly, and improving the success rate of random access.
- a random access method including:
- the terminal Before the terminal initiates random access, receiving the medium including the access delay time and/or the access control factor Accessing a layer protocol data unit MAC PDU, and obtaining the access delay time and/or an access control factor therefrom;
- the terminal controls the time at which the random access is initiated according to the acquired access delay time and/or the access control factor.
- the MAC PDU includes a random access response, and the random access response includes an access delay time and/or an access control factor.
- the terminal obtains an access delay time and/or an access control factor from the MAC PDU as follows: the terminal reads one or more MAC PDUs, and obtains one or more access delay times and/or access control factors.
- the terminal controls the time for initiating the random access according to the acquired access delay time and/or the access control factor: when the terminal acquires an access delay time and/or an access control factor, directly according to the slave MAC
- the access delay time and/or the access control factor acquired by the PDU control the time when the random access is initiated; when the terminal acquires multiple access delay times and/or access control factors, the multiple access delay times and/or Or the average, maximum or minimum value of the access control factor as the finally determined access delay time and/or access control factor, and controlling the terminal to initiate according to the finally determined access delay time and/or the access control factor
- the time of random access when the terminal acquires an access delay time and/or an access control factor, directly according to the slave MAC
- the access delay time and/or the access control factor acquired by the PDU control the time when the random access is initiated; when the terminal acquires multiple access delay times and/or access control factors, the multiple access delay times and/or Or the average, maximum or minimum value of the access control factor as the finally determined access delay time and
- the terminal controls the time for initiating the random access according to the access delay time to: initiate random access after the access delay time expires, or take a random number between 0 and the access delay time as an actual The access delay time, when the actual access delay time expires, initiate random access.
- the terminal controls the time for initiating the random access according to the access control factor: the terminal generates a random number, and the generated random number is lower than the access control factor, the terminal may initiate random access; If the random number is not lower than the access control factor, the terminal cannot initiate random access immediately.
- the method further includes: the terminal immediately initiates random access Incoming, or delaying the set time to initiate random access.
- the method further includes: after the interval setting time, the terminal reselects the random number, and performs the determination again by referring to the access control factor; or, after the interval is set, Initiate random access.
- the terminal controls the time for initiating the random access according to the access delay time and the access control factor: the terminal generates a random number, and the generated random number is lower than the access control factor, and the terminal delays the connection After the delay time is initiated, random access is initiated; if the generated random number is not lower than the access control factor, the terminal cannot initiate random access immediately.
- the method further includes: after the interval setting time, the terminal reselects the random number, and further determines, by referring to the access control factor, the random number is lower than the access control factor. Then, the terminal initiates random access after delaying the access delay time.
- the method further includes: the terminal determining, by using a system message, a parameter related to receiving the MAC PDU.
- the terminal initiates random access, including:
- Step a the terminal selects a preamble to be sent on the physical random access channel PRACH; step b, the terminal receives the random access response within a predetermined time window, then step c is performed; otherwise, step e is performed;
- Step c The terminal sends Msg3 on the indicated uplink resource or uplink authorization according to the received random access response, and starts a conflict resolution timer.
- Step d The terminal receives the desired contention resolution message Msg4 sent by the base station before the conflict resolution timer expires, the random access succeeds, and the process ends; otherwise, step e is performed;
- Step e the number of preamble transmissions is increased by 1;
- Step f The terminal determines whether the number of preamble transmissions is greater than the maximum number of transmissions. If the number of preamble transmissions is greater than the maximum number of transmissions, the random access fails, and the process ends; otherwise, the step & is performed.
- the terminal is a machine type communication MTC device and/or a person-to-person communication H2H device.
- the access delay time and/or the access control factor included in the MAC PDU is an access delay time and/or an access control factor determined by the base station according to the load of the random access.
- a terminal configured to receive a MAC PDU including an access delay time and/or an access control factor, and obtain the access delay time and/or an access control factor therefrom before initiating random access;
- the acquired access delay time and/or access control factor controls the time at which random access is initiated.
- the terminal obtains an access delay time and/or an access control factor from the MAC PDU as follows: the terminal reads one or more MAC PDUs, and obtains one or more access delay times and/or access control factors.
- the terminal controls the time for initiating the random access according to the acquired access delay time and/or the access control factor: when the terminal acquires an access delay time and/or an access control factor, directly according to the slave MAC
- the access delay time and/or the access control factor acquired by the PDU control the time when the random access is initiated; when the terminal acquires multiple access delay times and/or access control factors, the multiple access delay times and/or Or the average, maximum or minimum value of the access control factor as the finally determined access delay time and/or access control factor, and controlling the terminal to initiate according to the finally determined access delay time and/or the access control factor
- the time of random access when the terminal acquires an access delay time and/or an access control factor, directly according to the slave MAC
- the access delay time and/or the access control factor acquired by the PDU control the time when the random access is initiated; when the terminal acquires multiple access delay times and/or access control factors, the multiple access delay times and/or Or the average, maximum or minimum value of the access control factor as the finally determined access delay time and
- the terminal controls the time for initiating the random access according to the access delay time to: initiate random access after the access delay time expires, or take a random number between 0 and the access delay time as an actual The access delay time, when the actual access delay time expires, initiate random access;
- the terminal controls the time for initiating the random access according to the access control factor: the terminal generates a random number, and the generated random number is lower than the access control factor, the terminal may initiate random access; If the random number is not lower than the access control factor, the terminal cannot initiate random access immediately;
- the terminal controls the time for initiating the random access according to the access delay time and the access control factor: the terminal generates a random number, and the generated random number is lower than the access control factor, and the terminal delays the connection After the delay time is initiated, random access is initiated; if the generated random number is not lower than the access control factor, the terminal cannot initiate random access immediately.
- the terminal is further configured to determine, by using a system message, a parameter related to receiving the MAC PDU before receiving the MAC PDU.
- the terminal is an MTC device and/or an H2H device.
- the present invention provides a random access method and a terminal, and before receiving a random access, a terminal receives a MAC Protocol Data Unit (PDU) including an access delay time and/or an access control factor, and obtains the The access delay time and/or the access control factor, after which the terminal controls the time at which the random access is initiated according to the acquired access delay time and/or the access control factor.
- PDU MAC Protocol Data Unit
- the terminal first acquires the current radio resource status before initiating the random access, and avoids the radio resource overload, especially when the radio access is overloaded, especially when the random access is overloaded. The problem that caused the network to be overloaded and unable to recover smoothly.
- the present invention can average the number of terminals accessing the network per unit time, thereby improving the success rate of random access.
- 1 is a flow chart of a contention-based random access procedure in an existing LTE system
- FIG. 2 is a schematic flowchart of a random access method according to the present invention.
- FIG. 3 is a schematic flowchart of an MTC device accessing a network according to Embodiment 1 of the present invention
- FIG. 4 is a schematic diagram of a MAC header format of a MAC header and a RAR according to the prior art
- FIG. 5 is a schematic diagram of a Backoff indication MAC subheader according to an embodiment of the present invention. detailed description
- the basic idea of the present invention is: before the terminal initiates random access, receiving a MAC PDU including an access delay time and/or an access control factor, and obtaining the access delay time and/or an access control factor therefrom, and then the terminal The time at which the random access is initiated is controlled according to the acquired access delay time and/or the access control factor.
- Step 201 Before a random connection is initiated, a terminal receives a MAC PDU including an access delay time and/or an access control factor, and The access delay time and/or access control factor is obtained therefrom.
- the MAC PDU includes a random access response, and the random access response includes an access delay time and/or an access control factor.
- Step 202 The terminal controls a time for initiating random access according to the acquired access delay time and/or an access control factor.
- the terminal controls the time at which the random access is initiated by the access delay time and/or the access control factor generally involves the following situations:
- the terminal obtains the access delay time from the MAC PDU, and then initiates random access after the access delay time expires (generally starting from the time when the access delay time is acquired);
- the terminal obtains the access delay time from the MAC PDU, and takes a random number between 0 and the access delay time as the actual access delay time, when the actual access delay time expires (for example, the access can be obtained from the access) Random access can only be initiated after the delay time or the time at which the actual access delay time begins. It should be noted that the random number obtained may also be 0 or the access delay time. When the random number is 0, the terminal immediately initiates random access, and when the random number takes the access delay time, the same situation 1 Said.
- the terminal acquires an access control factor from the MAC PDU, and the terminal needs to generate a random number. If the generated random number is lower than the access control factor, the terminal may initiate random access; the generated random number is not lower than If the access control factor is used, the terminal cannot initiate random access immediately. It should be noted that, in the case that it is determined that random access can be initiated, the terminal may initiate random access immediately, or may initiate random access after a set time delay; if it is determined that random access cannot be initiated immediately, the terminal may be in the interval. After the time is set, the random number is reselected, and the access control factor is used to determine again according to the foregoing method. The terminal can initiate random access only when the random number is lower than the access control factor; or the terminal sets the time at the interval. After that, random access is initiated. The set time is set by a protocol pre-agreed, or system message.
- the terminal obtains the access delay time and the access control factor from the MAC PDU, and the terminal needs to generate a random number, where the generated random number is lower than the access control factor, the terminal delays the access delay time. After the random access is initiated, the generated random number is not lower than the access control factor, and the terminal cannot initiate random access immediately.
- the terminal may reselect the random number after the interval is set, and perform the judgment again by referring to the access control factor according to the above method. Only when the random number is lower than the access control factor, the terminal can initiate random access after delaying the access delay time.
- the terminal may read one or more MAC PDUs, obtain one or more access delay times and/or access control factors, and acquire an access delay time and/or access control.
- the access delay time and/or the access control factor obtained from the MAC PDU may be directly applied to the four situations described in step 202 to control the time at which the terminal initiates random access;
- the average, maximum or minimum value of the multiple access delay times and/or access control factors needs to be taken as the final determined access delay time.
- an access control factor and then applying the finally determined access delay time and/or access control factor to the four conditions described in step 202 to control the time at which the terminal initiates random access.
- the terminal in the present invention includes an MTC device and/or an H2H device, or a terminal that initiates a time tolerable service (or a low priority service), for example, an initiation time may be used.
- MTC devices and/or H2H devices that tolerate services include MTC devices and/or H2H devices that tolerate services.
- the present invention further provides a terminal, configured to receive a MAC PDU including an access delay time and/or an access control factor, and obtain the access delay time and/or access therefrom before initiating random access. Control factor; Thereafter, the time at which random access is initiated is controlled according to the acquired access delay time and/or access control factor.
- the terminal obtains an access delay time and/or an access control factor from the MAC PDU as follows: the terminal reads one or more MAC PDUs, and obtains one or more access delay times and/or access control factors.
- the terminal controls the time for initiating the random access according to the acquired access delay time and/or the access control factor: when the terminal acquires an access delay time and/or an access control factor, directly according to the slave MAC
- the access delay time and/or the access control factor acquired by the PDU control the time when the random access is initiated; when the terminal acquires multiple access delay times and/or access control factors, the multiple access delay times and/or Or the average, maximum or minimum value of the access control factor as the finally determined access delay time and/or access control factor, and controlling the terminal to initiate according to the finally determined access delay time and/or the access control factor
- the time of random access when the terminal acquires an access delay time and/or an access control factor, directly according to the slave MAC
- the access delay time and/or the access control factor acquired by the PDU control the time when the random access is initiated; when the terminal acquires multiple access delay times and/or access control factors, the multiple access delay times and/or Or the average, maximum or minimum value of the access control factor as the finally determined access delay time and
- the terminal controls the time for initiating the random access according to the access delay time to: initiate random access after the access delay time expires, or take a random number between 0 and the access delay time as an actual The access delay time, when the actual access delay time expires, initiate random access;
- the terminal controls the time for initiating the random access according to the access control factor: the terminal generates a random number, and the generated random number is lower than the access control factor, the terminal may initiate random access; If the random number is not lower than the access control factor, the terminal cannot initiate random access immediately;
- the terminal controls the time for initiating random access according to the access delay time and the access control factor: the terminal generates a random number, and the generated random number is lower than the access control factor, The terminal initiates random access after delaying the access delay time; if the generated random number is not lower than the access control factor, the terminal cannot initiate random access immediately.
- the terminal is further configured to determine, by the system message, a parameter related to receiving the MAC PDU before receiving the MAC PDU.
- the terminal is an MTC device and/or an H2H device.
- Example 1 The implementation of the technical solution of the present invention will be further described in detail below with reference to specific embodiments.
- Example 1
- FIG. 3 is a schematic flowchart of an MTC device (referred to as MD1) accessing a network according to Embodiment 1 of the present invention. As shown in FIG. 3, the process includes:
- Step 301 The MD1 reads a MAC PDU including a random access response (RAR) in the current subframe (for example, the subframe number is called k), and obtains an access delay time.
- RAR random access response
- the MD1 when the MD1 accesses the network, first select a random access preamble according to the system message, determine the slot and power of the preamble, and send the preamble to the base station. After that, the random access response is received in a time window (RA Response window).
- the time window protocol has a clear specification.
- the length of the time window is the length of the time window from the third subframe after the preamble is sent from MD1 (ra-ResponseWindowSize ) Configured by system messages.
- the MD1 parses the allocated uplink resource location indication information, the temporary cell radio network temporary identifier, and the like.
- the MD1 in order to receive the random access response in the subframe k, the MD1 needs to determine the random access preamble through the system message in the previous several subframes (at least in the K-3 subframe), and determine the transmission preamble.
- a parameter related to receiving a random access response such as a slot, can receive a corresponding random access response in subframe k.
- MD1 does not send the preamble, but The time at which the random access preamble is initiated is determined by the access delay time included in the received MAC PDU.
- FIG. 4 is a schematic diagram of a MAC header format of a MAC header and a RAR according to the prior art.
- the MAC RAR PDU is composed of a MAC header, zero or more MAC random access responses (MAC RAR), and possible padding.
- the MAC PDU header is composed of one or more MAC PDU subheaders, and each subheader corresponds to one MAC RAR. Except for the Backoff indication subheader, if the Backoff indication subheader is included, only one MAC PDU header is included. Backoff indicates the subheader and appears as the first subheader.
- FIG. 5 is a schematic diagram of a Backoff indication MAC subheader according to an embodiment of the present invention. As shown in FIG.
- the Backoff indication subheader includes five header fields E/T/R/R/BI, and the MAC RAR PDU header size is variable. It consists of the following fields: E: Extended field, the extended field is a flag indicating whether there are other fields in the MAC header. If the E field is set to
- E field means MAC RAR or padding from the following byte; T: type field, the type field is a flag bit, indicating that the MAC subheader contains a random access preamble ID. Still a Backoff indication. If the T field is "0", it indicates that there is a Backoff indication (BI) field in the subheader. If the T field is "1”, it indicates that there is a random access preamble ID (RAPID) field in the subheader; R: pre-reserved bit, set to "0"; BI: Backoff indicates that the cell is in an overload state.
- the length of the BI field is 4 bits, which is used to indicate the delay time for the terminal to initiate random access again.
- RAPID The random access preamble identification field indicates the transmitted random access preamble. The length of the RAPID field is 6 bits.
- the backoff indication in the existing FIG. 5 may be multiplexed, and the indication is originally used for the time that the terminal that has sent the preamble needs to delay the random access, and is used to indicate that the random access preamble has not been sent.
- the MD1 of the code needs to wait. Only after the timeout expires, the MD1 can initiate the random access preamble; or add a new cell to the MAC PDU to indicate the time that the MTC device needs to wait, such as using reserved bits. Or use a padding table Indicates the time to wait. MD1 can only initiate a random access preamble after the timeout expires.
- the base station determines the access delay time and/or the access control factor according to the current random access load, and sends the MAC PDU to the terminal, so that the base station can effectively control the number of terminals that initiate random access, and can improve random access. Success rate.
- Step 302 After the access delay time expires (greater than or equal to the access delay time), the MD1 initializes the relevant parameters, such as setting the preamble transmission number ( PREAMBLE_ TRANSMISSION_COUNTER) to 1.
- PREAMBLE_ TRANSMISSION_COUNTER setting the preamble transmission number
- Step 303 The MD1 randomly selects a preamble (Preamble) and transmits it on a Physical Random Channel (PRACH).
- Preamble a preamble
- PRACH Physical Random Channel
- Step 304 Whether the MD1 receives the random access response within the predetermined time window, if yes, step 305 is performed; otherwise, step 308 is performed.
- the predetermined time window is a time window in which the terminal specifies a random access response by the protocol.
- Step 305 The MD1 sends the Msg3 on the indicated uplink resource (or the uplink grant) according to the received random access response, and starts the conflict resolution timer.
- Msg3 should at least include: the terminal's unique identifier (TMSI) or random identifier (Random ID), and the establishment cause ( Establishment Cause ).
- the MD1 receives the indication sent by the base station that the Msg3 response message (ie, the NACK message) is not received, the Msg3 is retransmitted and the conflict resolution timer is restarted.
- Step 306 The MD1 determines whether the expected contention resolution message Msg4 sent by the base station is received before the conflict resolution timer expires. If yes, step 307 is performed; otherwise, step 308 is performed.
- Step 307 the random access is successful, and the process ends.
- Step 308 The number of preamble transmissions is increased by one.
- Step 309 MD1 determines whether the number of preamble transmissions is greater than the maximum number of transmissions. If yes, go to step 310; otherwise, go to step 303.
- Step 310 The random access fails, and the process ends.
- the MD1 first obtains an access delay time, and after the timeout expires, the random access procedure can be initiated.
- the access delay time MD1 can know the congestion status of the random access resources, because the base station can set a longer access delay time when detecting the random access load is high, and avoid other terminals accessing the network at this time. Increase the load on wireless resources.
- the MTC device Based on the received access delay time, the MTC device can avoid the shortage of random access resources and conflicts caused by a large number of MTC devices accessing the network. By delaying the time, the number of MTC devices accessing the network per unit time can be averaged. The success rate of random access of MTC devices is improved.
- the scenario of the MTC device is described, and in fact is equally applicable to the H2H device.
- different terminals can initiate services of different priorities, for low-priority service requests, such services are time-tolerant (Delay Tolerant), and the terminal can delay access for a certain period of time when initiating such services. Therefore, the protocol can be directed to a terminal that initiates a low priority service (or called Delay Tolerant) to apply the method of the present invention.
- Delay Tolerant a low priority service
- Example 2 There are other implementation manners in this embodiment, such as the MAC PDU including the random access response, whether the random access is overloaded, or whether the random access indication information needs to be delayed, and the MD1 obtains the indication in step 301, and then Whether to initiate a random access decision immediately.
- Example 2 the MAC PDU including the random access response, whether the random access is overloaded, or whether the random access indication information needs to be delayed, and the MD1 obtains the indication in step 301, and then Whether to initiate a random access decision immediately.
- a large number of MTC devices and H2H devices reside in a cell managed by any one of the LTE systems. Some of these devices are in a connected state, and some are in an idle state. At some point, some MTC devices need to initiate a service request because of data transmission.
- the process of accessing the network by one of the MTC devices (referred to as MD2) is the same as that shown in FIG. 3, except that in this embodiment, the MD reads the current multiple multiple subframes including the random access response (Random Access Response) , referred to as RAR) MAC PDU, to obtain the access delay time.
- RAR Random Access Response
- the MD1 when the random access needs to be initiated, the MD1 immediately reads the MAC PDUs that include the random access response in the current multiple subframes, and obtains multiple access delay times, which are respectively called Delay-1, Delay-2... Delay—N. Where N is an integer greater than or equal to 1. MD1 can take the average of these multiple delay times, the most A large value, or a minimum value, is used as the access delay time. The MD1 can initiate random access only after the access delay time expires. The specific control principle is the same as that described in steps 302 to 310.
- the MTC device can avoid the shortage of random access resources and the conflicts caused by a large number of MTC devices accessing the network at the same time. By delaying the time, the number of MTC devices accessing the network per unit time can be avoided. Averaging improves the success rate of random access of MTC devices.
- the MTC device obtains an access delay time included in multiple subframes, and takes an average value, a maximum value, or a minimum value of the multiple delay times as an access delay time. After obtaining the access delay time, the MTC device can take a random number between 0 and the access delay time as the access delay time, so that different terminals can obtain different access delay times and make the access timing discrete. It is more conducive to the success of random access.
- Example 3
- a large number of MTC devices and H2H devices reside in a cell managed by any one of the LTE systems. Some of these devices are in a connected state, and some are in an idle state. At some point, some H2H devices need to initiate a service request because of data transmission.
- the process of accessing the network by one of the H2H devices (called UE1) is as follows:
- UE1 reads the MAC PDU containing the random access response in the current subframe to obtain an access control factor (ac-BarringFactor).
- the existing MAC PDU shown in FIG. 4 there is no cell including the access control factor, so it is necessary to extend the existing MAC PDU to include the cell with the access control factor, and the existing reserved bit can be multiplexed. Or use padding bits to indicate the access control factor.
- UE1 After acquiring the access control factor, UE1 takes a random number. If the random number is smaller than the access control factor, UE1 may initiate random access (for example, performing step 302 above); otherwise, random access cannot be initiated immediately, and needs to be based again.
- the received access control factor determines whether random access can be initiated. Generally, the access control factor is set to a number between 0 and 1. Therefore, the range of the random number of UE1 is also between 0 and 1, and a random number is uniformly distributed. When the random number is smaller than the access control factor, the UE can initiate. Random access.
- the H2H device can avoid the shortage of random access resources and conflicts caused by a large number of H2H devices accessing the network at the same time. By restricting the access of some terminals, the H2H device can access the network per unit time. The number of H2H devices is averaged, which improves the success rate of random access of H2H devices.
- the UE may obtain a random number after acquiring the access control factor. If the random number is greater than the access control factor, the UE1 may initiate random access (for example, performing the foregoing step 302). Otherwise, random access cannot be initiated, and it is necessary to determine whether random access can be initiated according to the received access control factor.
- modules or steps of the present invention can be implemented by a general-purpose computing device, which can be concentrated on a single computing device or distributed over a network composed of multiple computing devices. Alternatively, they may be implemented by program code executable by the computing device, such that they may be stored in the storage device by the computing device and, in some cases, may be different from the order herein.
- the steps shown or described are performed, or they are separately fabricated into individual integrated circuit modules, or a plurality of modules or steps are fabricated as a single integrated circuit module.
- the invention is not limited to any specific combination of hardware and software.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
L'invention concerne un procédé d'accès aléatoire dans lequel, avant d'initier un accès aléatoire, un terminal reçoit une unité de données de protocole (PDU) MAC comprenant un temps de retard d'accès et/ou un facteur de contrôle d'accès, et acquiert le temps de retard d'accès et/ou le facteur de contrôle d'accès à partir du PDU MAC, puis le terminal contrôle le temps d'initiation de l'accès aléatoire selon le temps de retard d'accès et/ou le facteur de contrôle d'accès acquis. Un terminal est également décrit. Grâce à la présente invention, le problème suivant, à savoir que le terminal initie fréquemment la procédure d'accès aléatoire dans une situation de surcharge de ressource radio, et spécialement de surcharge d'accès aléatoire, entraînant un manque de ressource radio et causant même une surcharge excessive du réseau, peut être évité. En outre, la présente invention permet de moyenner le nombre de terminaux accédant au réseau dans une unité de temps, augmentant ainsi le taux de succès de l'accès aléatoire.
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201010602036.9 | 2010-12-22 | ||
| CN201010602036.9A CN102573097B (zh) | 2010-12-22 | 2010-12-22 | 一种随机接入方法及终端 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2012083741A1 true WO2012083741A1 (fr) | 2012-06-28 |
Family
ID=46313119
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CN2011/080062 Ceased WO2012083741A1 (fr) | 2010-12-22 | 2011-09-22 | Procédé d'accès aléatoire et terminal |
Country Status (2)
| Country | Link |
|---|---|
| CN (1) | CN102573097B (fr) |
| WO (1) | WO2012083741A1 (fr) |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN104105214A (zh) * | 2013-04-01 | 2014-10-15 | 电信科学技术研究院 | 一种数据传输方法及装置 |
| CN107041015A (zh) * | 2017-04-07 | 2017-08-11 | 惠州市天泽盈丰物联网科技股份有限公司 | 避免网传数据碰撞的方法、避免网传数据碰撞系统 |
Families Citing this family (9)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN102740492B (zh) * | 2011-04-01 | 2018-01-02 | 中兴通讯股份有限公司 | 随机接入控制方法及系统 |
| CN102740374B (zh) * | 2011-04-01 | 2017-09-26 | 中兴通讯股份有限公司 | 接入控制方法及系统 |
| WO2015010227A1 (fr) * | 2013-07-20 | 2015-01-29 | 华为技术有限公司 | Procédé et appareil de commande pour accès aléatoire, procédé et appareil d'accès aléatoire |
| CN104349496B (zh) * | 2013-08-09 | 2018-07-06 | 上海诺基亚贝尔股份有限公司 | 在基于机器类通信的通信环境中发送Msg3消息的方法 |
| CN103929826B (zh) * | 2014-05-05 | 2015-11-18 | 盐城工学院 | 一种机器类通信终端自适应随机接入方法及系统 |
| CN107809753A (zh) * | 2016-09-07 | 2018-03-16 | 中兴通讯股份有限公司 | 一种eMTC终端连接基站的控制方法及装置 |
| CN106982470A (zh) * | 2017-02-21 | 2017-07-25 | 北京邮电大学 | 网络接入方法、mtc设备及基站 |
| CN110087258A (zh) * | 2018-01-25 | 2019-08-02 | 普天信息技术有限公司 | 一种用户的接入方法 |
| CN117156595A (zh) * | 2022-05-24 | 2023-12-01 | 荣耀终端有限公司 | 随机接入的方法和终端设备 |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101662836A (zh) * | 2009-09-23 | 2010-03-03 | 普天信息技术研究院有限公司 | 竞争随机接入的方法、系统和演进基站 |
| EP2205037A1 (fr) * | 2009-01-02 | 2010-07-07 | LG Electronics Inc. | Schéma d'accès aléatoire pour équipement utilisateur |
| CN101848539A (zh) * | 2009-03-25 | 2010-09-29 | 大唐移动通信设备有限公司 | 确定发起随机接入的成员载波及发起时间的方法及设备 |
| CN101919298A (zh) * | 2008-01-04 | 2010-12-15 | 交互数字专利控股公司 | 用于在cell_fach状态中执行增强型随机接入信道过程的方法和设备 |
-
2010
- 2010-12-22 CN CN201010602036.9A patent/CN102573097B/zh active Active
-
2011
- 2011-09-22 WO PCT/CN2011/080062 patent/WO2012083741A1/fr not_active Ceased
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101919298A (zh) * | 2008-01-04 | 2010-12-15 | 交互数字专利控股公司 | 用于在cell_fach状态中执行增强型随机接入信道过程的方法和设备 |
| EP2205037A1 (fr) * | 2009-01-02 | 2010-07-07 | LG Electronics Inc. | Schéma d'accès aléatoire pour équipement utilisateur |
| CN101848539A (zh) * | 2009-03-25 | 2010-09-29 | 大唐移动通信设备有限公司 | 确定发起随机接入的成员载波及发起时间的方法及设备 |
| CN101662836A (zh) * | 2009-09-23 | 2010-03-03 | 普天信息技术研究院有限公司 | 竞争随机接入的方法、系统和演进基站 |
Cited By (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN104105214A (zh) * | 2013-04-01 | 2014-10-15 | 电信科学技术研究院 | 一种数据传输方法及装置 |
| CN104105214B (zh) * | 2013-04-01 | 2017-08-18 | 电信科学技术研究院 | 一种数据传输方法及装置 |
| CN107041015A (zh) * | 2017-04-07 | 2017-08-11 | 惠州市天泽盈丰物联网科技股份有限公司 | 避免网传数据碰撞的方法、避免网传数据碰撞系统 |
| CN107041015B (zh) * | 2017-04-07 | 2020-01-10 | 惠州市天泽盈丰物联网科技股份有限公司 | 避免网传数据碰撞的方法 |
Also Published As
| Publication number | Publication date |
|---|---|
| CN102573097B (zh) | 2014-09-24 |
| CN102573097A (zh) | 2012-07-11 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| JP7714627B2 (ja) | 無線通信システムでランダムアクセスバックオフを行う方法及び装置 | |
| WO2012083741A1 (fr) | Procédé d'accès aléatoire et terminal | |
| KR102530272B1 (ko) | 랜덤 액세스 절차를 수행하는 방법 및 장치 | |
| CN103957603B (zh) | 机器类型通信的增强型随机接入信道设计 | |
| JP6486987B2 (ja) | 無線通信システムで拡張アクセス遮断適用方法及び装置 | |
| CN102740493B (zh) | 终端接入控制调整方法及系统 | |
| TWI435632B (zh) | 具有優先次序的隨機接取方法 | |
| CN102548012B (zh) | 一种随机接入方法及终端 | |
| Hasan et al. | Random access for machine-to-machine communication in LTE-advanced networks: Issues and approaches | |
| WO2012024996A1 (fr) | Procédé d'accès aléatoire et système apparenté | |
| CN111478760A (zh) | 用于改善随机接入消息的发送的通信装置和方法 | |
| CN102724746A (zh) | 随机接入过程中前导码发送功率的控制、确定方法及系统 | |
| EP2929747A1 (fr) | Contrôle de surcharge dans un réseau de communication | |
| CN102740492A (zh) | 随机接入控制方法及系统 | |
| WO2012041112A1 (fr) | Procédé de régulation de puissance, appareil côté réseau et terminal associé | |
| CN102740374A (zh) | 接入控制方法及系统 | |
| WO2012058985A1 (fr) | Procédé et système d'accès réseau par terminal | |
| WO2012058965A1 (fr) | Procédé et terminal capable d'accéder à un réseau | |
| KR101845558B1 (ko) | 무선 통신 시스템에서의 그룹 페이징 방법 및 장치와 이를 이용한 랜덤 액세스 수행 방법 및 장치 | |
| Borodakiy et al. | Modelling a random access channel with collisions for M2M traffic in LTE networks | |
| de Andrade et al. | Random access mechanism for RAN overload control in LTE/LTE-A networks | |
| WO2012041111A1 (fr) | Procédé, système, terminal et équipement côté réseau pour la commande d'instant d'accès de terminaux |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 11852131 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 11852131 Country of ref document: EP Kind code of ref document: A1 |