[go: up one dir, main page]

WO2018126881A1 - 接入控制相关方法、基站和用户设备 - Google Patents

接入控制相关方法、基站和用户设备 Download PDF

Info

Publication number
WO2018126881A1
WO2018126881A1 PCT/CN2017/116899 CN2017116899W WO2018126881A1 WO 2018126881 A1 WO2018126881 A1 WO 2018126881A1 CN 2017116899 W CN2017116899 W CN 2017116899W WO 2018126881 A1 WO2018126881 A1 WO 2018126881A1
Authority
WO
WIPO (PCT)
Prior art keywords
access
network
access control
timer
control information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/CN2017/116899
Other languages
English (en)
French (fr)
Inventor
张崇铭
刘仁茂
肖芳英
常宁娟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sharp Corp
Original Assignee
Sharp Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sharp Corp filed Critical Sharp Corp
Priority to KR1020197020722A priority Critical patent/KR20190102007A/ko
Priority to KR1020227022083A priority patent/KR102581799B1/ko
Priority to NZ755555A priority patent/NZ755555B2/en
Priority to CA3048548A priority patent/CA3048548A1/en
Priority to EP17890160.9A priority patent/EP3567903B1/en
Priority to US16/475,507 priority patent/US11582680B2/en
Priority to BR112019013374A priority patent/BR112019013374A2/pt
Publication of WO2018126881A1 publication Critical patent/WO2018126881A1/zh
Anticipated expiration legal-status Critical
Priority to ZA2019/04892A priority patent/ZA201904892B/en
Ceased legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions
    • H04W48/06Access restriction performed under specific conditions based on traffic conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • H04W48/10Access restriction or access information delivery, e.g. discovery data delivery using broadcasted information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/18Selecting a network or a communication service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/18Management of setup rejection or failure
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/0289Congestion control
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/08Access point devices
    • H04W88/10Access point devices adapted for operation in multiple networks, e.g. multi-mode access points

Definitions

  • the present invention relates to the field of wireless communication technologies, and more particularly, to the access control related method and corresponding base station and user equipment.
  • the research topic of the new 5G wireless access technology was proposed at the 3rd Generation Partnership Project (3GPP) RAN#64 plenary meeting held in March 2016 (see Non-Patent Document: RP-160671 New SID Proposal: Study on New Radio Access Technology).
  • 3GPP 3rd Generation Partnership Project
  • RAN#64 plenary meeting held in March 2016 see Non-Patent Document: RP-160671 New SID Proposal: Study on New Radio Access Technology.
  • the working frequency band of the new communication system can be extended to 100 GHz, and at the same time, it will meet at least the demand for enhanced mobile broadband services, the communication requirements of massive IoT terminals, and the business requirements for high reliability requirements.
  • the research work of the project will end in 2018.
  • NextGen Core Next Generation Core
  • LTE Long Term Evolution, Long Term Evolution
  • EPC Evolved Packet Core
  • eLTE evolved LTE base stations
  • eNB evolution of LTE eNB
  • TR38.804 the eLTE eNB can support the connection with the EPC and the connection with the NextGen Core.
  • the eLTE base station connected to the EPC can be regarded as an E-UTRAN (Evolved Universal Terrestrial Radio Access Network) access network
  • the eLTE base station connected to the NextGen Core can be regarded as a 5G-RAN access network, that is, The cell covered by one eLTE base station may be an E-UTRAN cell or a 5G-RAN cell, depending on the type of the core network to which the base station is connected.
  • the UE user equipment
  • the UE needs to perform an access control check according to the access level and service characteristics of the UE before the idle connection (idle) initiates the connection establishment request.
  • the UE may continue to initiate a connection establishment request; if the result indicates that the UE is not allowed to access, the UE starts a timer, and during the running of the timer, does not initiate in the current cell.
  • the connection establishment request is notified, and the upper layer RRC connection establishment failure is also notified.
  • the cell covered by the eLTE base station may be an E-UTRAN cell or a 5G-RAN cell, it is necessary to solve the problem of how the UE performs the access control check in the coverage area of the eLTE base station.
  • R2-168196 it is proposed to broadcast corresponding access control information based on the core network, but how to use these access control information to perform access control and implement flow control is a problem to be solved.
  • the 5G-RAN supports the UE to perform data transmission in an inactive state (Inactive).
  • Inactive refers to a UE state in which the base station reserves the context of the UE.
  • the UE can transmit data without performing state transition in the inactive state. Therefore, how the access control of the UE in different states is also a problem to be solved.
  • the present disclosure provides the following technical solutions.
  • a method performed at a user equipment UE including:
  • the upper layer of the UE is notified of the access prohibition.
  • the method further includes:
  • At least one forbidden access timer set for the network of the at least one network type is respectively activated, and each of the forbidden access timers indicates a network for the corresponding network type. The length of time that access is prohibited.
  • the upper layer of the UE in case the one of the at least one forbidden access timer expires, the upper layer of the UE is notified of the access prohibition for the network of the corresponding network type; or the at least one is prohibited When the entry timers are all timed out, the upper layer of the UE is notified of the access prohibition for the network of the corresponding network type.
  • the method further includes:
  • the at least one forbidden access timer In the case that the at least one forbidden access timer is not activated, initiate a connection establishment request of any one of network types of networks corresponding to the inactivated access prohibition timer; otherwise, to the UE The upper layer notifies that the connection establishment failed; or
  • the method further includes:
  • the prohibition access timer is started, and the minimum or maximum value of the at least one value is used as the length of time that the forbidden access timer is used to prohibit network access.
  • the at least access timer is not activated when at least one of the at least one value is an invalid value.
  • the plurality of access control information are broadcast in the same or different system information.
  • a user equipment UE including:
  • the transceiver is configured to receive, from the base station, multiple access control information respectively corresponding to multiple network types;
  • the checking unit is configured to perform access control check for the network of the multiple network types by using the received multiple access control information
  • a boot unit configured to initiate a disable access timer based on a result of the access control check
  • the notification unit is configured to notify the upper layer of the UE of the access prohibition cancellation when the access prohibition timer expires.
  • the initiating unit is further configured to: when the check result indicates that access to the network of the at least one network type is prohibited, respectively initiating at least one forbidden access for the network setting of the at least one network type A timer, each of the forbidden access timers indicates a duration of forbidden access for a network of a corresponding network type.
  • the notification unit is further configured to:
  • the upper layer of the UE is notified of the access prohibition for the network of the corresponding network type.
  • the UE further includes:
  • a requesting unit configured to initiate a connection establishment request of any one of network types of networks corresponding to the non-initiated prohibition access timer if the at least one prohibition access timer is not activated ; otherwise, the notification unit fails to notify the upper layer of the UE that the connection establishment fails; or
  • a requesting unit configured to initiate any one of network types of networks corresponding to the non-initiated prohibition access timer if at least one of the at least one forbidden access timer is not activated Connection establishment request.
  • the UE further includes:
  • a generating unit configured to generate at least one value for the network of the at least one network type when the check result indicates that access to the network of the at least one network type is prohibited, each value indicating that the network for the corresponding network type is prohibited Length of entry,
  • the initiating unit is further configured to: when the at least one value is a valid value, start an access prohibition timer, and use a minimum or maximum value of the at least one value as the forbidden access timer The length of time during which network access is prohibited; and when at least one of the at least one value is an invalid value, the prohibition access timer is not activated.
  • the plurality of access control information are broadcast in the same or different system information.
  • a method performed at a user equipment UE including:
  • the upper layer of the UE is notified of the access prohibition.
  • selecting the type of network to use to provide the service is based on one of the following:
  • the core network type that the UE has registered is the core network type that the UE has registered.
  • the method further includes:
  • the prohibition access timer for the network of the selected network type is initiated, the prohibition access timer indicating the forbidden access of the network for the selected network type duration.
  • the same or different forbidden access timers are initiated for different network types.
  • a user equipment UE including:
  • a selection unit configured to select a network type to be used for providing a service from among a plurality of network types
  • a transceiver configured to receive, from the base station, access control information corresponding to the selected network type
  • An checking unit configured to perform an access control check for a network of the selected network type by using the received access control information
  • a boot unit configured to initiate a disable access timer based on a result of the access control check
  • the notification unit is configured to notify the upper layer of the UE of the access prohibition cancellation when the access prohibition timer expires.
  • the selection unit selects a network type to be used to provide a service based on one of:
  • the core network type that the UE has registered is the core network type that the UE has registered.
  • the initiating unit is further configured to: initiate a forbidden access timer for a network of the selected network type when the check result indicates that access to the network of the selected network type is prohibited, the prohibition The access timer indicates the length of time that the network is disabled for the selected network type.
  • the same or different forbidden access timers are initiated for different network types.
  • a method performed at a base station comprising:
  • the plurality of access control information are broadcast in the same or different system information.
  • a base station including:
  • a configuration unit configured to configure multiple access control information respectively corresponding to different network types supported by the base station
  • a transceiver configured to send the multiple access control information to the user equipment UE.
  • the plurality of access control information are broadcast in the same or different system information.
  • a method performed at a user equipment UE including:
  • the upper layer of the UE is notified of the access prohibition.
  • one access control information is used for network access control checks under various operating conditions of the UE.
  • the multiple access control information is used for the network access control check in multiple working conditions of the UE, and the step of performing the network access control check further includes:
  • the access control check for the working condition is performed using the received access control information corresponding to the working condition of the UE itself.
  • the working condition includes at least:
  • a UE in an idle state or an inactive state establishes a connection
  • the UE in the inactive state performs data transmission.
  • the method further includes:
  • the prohibition access timer for the working condition of the UE itself is started, and the forbidden access timer indicates the work for the UE itself. The length of time the access is prohibited.
  • the same forbidden access timer is initiated for different operating conditions
  • the upper layer of the UE is notified of the network access prohibition.
  • different forbidden access timers are initiated for different working conditions, and the upper layer of the UE is notified of network access for the corresponding working condition if the activated access prohibition timer expires. It is forbidden to lift.
  • a user equipment UE including:
  • the transceiver is configured to receive, from the base station, one access control information corresponding to multiple working conditions of the UE or multiple access control information corresponding to multiple working conditions of the UE, where the multiple working conditions indicate the UE Different access requirements in different states;
  • the checking unit is configured to perform a network access control check by using the received access control information according to the working condition of the UE itself;
  • a boot unit configured to initiate a disable access timer based on a result of the access control check
  • the notification unit is configured to notify the upper layer of the UE of the access prohibition cancellation when the access prohibition timer expires.
  • one access control information is used for network access control checks under various operating conditions of the UE.
  • the plurality of access control information are respectively used for network access control checking under various operating conditions of the UE, and the checking unit is further configured to:
  • the access control check for the working condition is performed using the received access control information corresponding to the working condition of the UE itself.
  • the working condition includes at least:
  • a UE in an idle state or an inactive state establishes a connection
  • the UE in the inactive state performs data transmission.
  • the initiating unit is further configured to: initiate a forbidden access timing for a working condition of the UE itself when the check result indicates that access to the network is prohibited under the working condition in which the UE itself is located
  • the forbidden access timer indicates a duration of forbidden access for a working condition in which the UE itself is located.
  • the initiating unit initiates the same forbidden access timer for different operating conditions
  • the notification unit notifies the upper layer of the UE that the network access prohibition is released when the prohibition access timer expires.
  • the notification unit is further configured to:
  • the upper layer of the UE is notified of the network access prohibition for the corresponding working condition.
  • a method performed at a base station comprising:
  • the multiple working The status indicates different access requirements of the UE in different states
  • the working condition includes at least:
  • a UE in an idle state or an inactive state establishes a connection
  • the UE in the inactive state performs data transmission.
  • the plurality of access control information are broadcast in the same or different system information.
  • a base station including:
  • a configuration unit configured to respectively configure one access control information corresponding to the multiple working conditions or multiple access control information corresponding to the multiple working conditions, for multiple working conditions of the user equipment UE, The plurality of operating conditions indicating different access requirements of the UE in different states;
  • a transceiver configured to send the one access control information or multiple access control information to the UE.
  • the working condition includes at least:
  • a UE in an idle state or an inactive state establishes a connection
  • the UE in the inactive state performs data transmission.
  • the plurality of access control information are broadcast in the same or different system information.
  • the terminal can perform access control check according to the type of the network or the state of the terminal before initiating the access or performing data transmission, thereby implementing access control and avoiding network congestion.
  • FIG. 1 is a block diagram showing a schematic configuration of a base station according to first, second, and third exemplary embodiments of the present invention
  • FIG. 2 is a flowchart showing an access control configuration method for a UE performed on a base station side according to first and second exemplary embodiments of the present invention
  • FIG. 3 is a block diagram showing a schematic configuration of a UE according to first and third exemplary embodiments of the present invention
  • FIG. 4 is a flowchart showing an access control method performed on a UE side according to a first exemplary embodiment of the present invention
  • FIG. 5 shows a schematic structural block diagram of a UE according to a second exemplary embodiment of the present invention
  • FIG. 6 is a flowchart showing an access control method performed on a UE side according to a second exemplary embodiment of the present invention.
  • FIG. 7 is a flowchart showing an access control configuration method for a UE performed on a base station side according to a third exemplary embodiment of the present invention.
  • FIG. 8 shows a flowchart of an access control method performed on the UE side according to a third exemplary embodiment of the present invention.
  • an embodiment of the present disclosure will be a cell covered by an eLTE base station (which may be an E-UTRAN cell) that can support both the connection with the EPC and the connection with the NextGen Core.
  • the access control may be performed within the 5G-RAN cell as an example, and the access control related scheme according to the present disclosure is described in detail.
  • the present disclosure is not limited to the foregoing examples of the base station, the UE, the access network, and the core network, and can also be used for other base stations supporting multiple network types of access, and the supported access thereof.
  • the first and second exemplary embodiments of the present disclosure provide an access control scheme in the case where a base station supports multiple types of network access.
  • FIG. 1 shows a schematic structural block diagram of a base station according to a first exemplary embodiment of the present invention.
  • the base station 110 includes a configuration unit 111 and a transceiver 113.
  • the configuration unit 111 and transceiver 113 associated with the present invention are shown in the base station 110 of FIG. 1 to avoid obscuring the present invention.
  • the base station according to an embodiment of the present invention further includes other units constituting the base station.
  • the configuration unit 111 is configured to configure a plurality of access control information respectively corresponding to different network types supported by the base station.
  • the transceiver 113 is configured to send the multiple access control information to the UE.
  • the plurality of access control information is broadcast by the base station 110 to the UE in the system information, which may be broadcast in the same system information or may be broadcast in different system information.
  • FIG. 2 shows a flowchart of an access control configuration method for a UE performed on a base station side according to a first exemplary embodiment of the present invention.
  • method 200 includes steps S201 and 203, which may be performed by base station 110 shown in FIG.
  • step S201 the configuration unit 111 of the base station 110 configures a plurality of access control information respectively corresponding to different network types supported by the base station 110.
  • step S203 the transceiver 113 of the base station 110 transmits the plurality of access control information to the UE.
  • FIG. 3 shows a schematic structural block diagram of a UE according to a first exemplary embodiment of the present invention.
  • the UE 320 includes a transceiver 321, an inspecting unit 323, an initiating unit 325, and a notifying unit 327.
  • the transceiver 321, the inspection unit 323, the activation unit 325, and the notification unit 327 associated with the present invention are shown in the UE 320 of FIG. 3 to avoid obscuring the present invention.
  • the UE according to an embodiment of the present invention further includes other units constituting the UE.
  • the transceiver 321 is configured to receive, from the base station, a plurality of access control information respectively corresponding to a plurality of network types.
  • the plurality of access control information is broadcast by the base station to the UE 320 in the system information, which may be broadcast in the same system information or may be broadcast in different system information.
  • the checking unit 323 is configured to perform access control checks for networks of a plurality of network types, respectively, using the received plurality of access control information.
  • the initiating unit 325 is configured to enable or disable the access prohibition timer according to the result of the access control check.
  • the check result indicates that access to at least one network type network is prohibited, the prohibition access timer can be started.
  • the notification unit 327 is configured to notify the upper layer of the UE of the access prohibition release when the access timer is disabled.
  • the initiating unit 325 may respectively start at least one forbidden access timer for the network setting of the at least one network type when the check result indicates that access to the network of the at least one network type is prohibited, wherein each prohibition The access timer indicates the duration of the forbidden access for the network of the corresponding network type.
  • the notification unit 327 can notify the upper layer of the UE of the access prohibition release for the network of the corresponding network type if one of the at least one prohibition access timers times out.
  • the notification unit 327 may notify the upper layer of the UE of the access prohibition release for the network of the corresponding network type if the at least one forbidden access timer expires.
  • the UE 320 further includes a requesting unit (not shown) configured to initiate and disable the access prohibition timer if the at least one forbidden access timer is not activated.
  • the requesting unit may initiate any one of network types corresponding to the non-initiated prohibition access timer if at least one of the at least one forbidden access timer is not activated. Connection establishment request.
  • the UE 320 may further include a generating unit (not shown) configured to respectively generate a network for the at least one network type when the check result indicates that access to the network of the at least one network type is prohibited. At least one value, each value indicating a duration of forbidden access for a network of a corresponding network type,
  • the initiating unit 325 may be further configured to: when the at least one value is a valid value, start a forbidden access timer, and use the minimum or maximum value of the at least one value as the forbidden connection
  • the entry timer is configured to disable the duration of the network access; and when at least one of the at least one value is an invalid value, the prohibition access timer is not activated.
  • FIG. 4 shows a flowchart of an access control method performed on the UE side according to the first exemplary embodiment of the present invention.
  • method 400 includes steps S402-S408, which may be performed by UE 320 shown in FIG.
  • step S402 the transceiver 321 of the UE 320 receives, from the base station, a plurality of access control information respectively corresponding to the plurality of network types.
  • a plurality of access control information corresponding to different network types are broadcast by the base station to the UE 320 in the system information, which may be broadcast in the same system information, or may be different. Broadcast in system information.
  • step S404 the checking unit 323 of the UE 320 performs access control check for the networks of the plurality of network types by using the received plurality of access control information.
  • step S406 the initiating unit 325 of the UE 320 starts or does not start the prohibition access timer according to the result of the access control check.
  • the prohibition access timer can be started.
  • step S408 the notification unit 327 of the UE 320 notifies the upper layer of the UE of the access prohibition release if the access timer is disabled.
  • the first access control information includes access control information for the E-UTRAN cell, or access control information for the corresponding EPC;
  • the access control information includes access control information for the 5G-RAN cell or access control information for the corresponding NextGen Core (but is not limited thereto).
  • the first and second access control information may be broadcast in the same system information or in different system information.
  • the access control check for the network of multiple network types may be performed simultaneously or sequentially, and the order of the access control check is not limited in the present disclosure.
  • the UE 320 first performs an access control check for the E-UTRAN cell (or for the corresponding EPC, the same below), and then performs access for the 5G-RAN cell (or for the corresponding NextGen Core, the same below). Control check.
  • the UE 320 After the UE 320 performs an access control check for the E-UTRAN cell, when the check result indicates that access is prohibited, the UE 320 starts (or activates or operates, the same below) the E-UTRAN-inhibited access timer T1, T1 indicates the forbidden access duration for the E-UTRAN cell; when the check result indicates that access is allowed, the UE 320 does not initiate the forbidden access timer T1 corresponding to the E-UTRAN.
  • the UE 320 After the UE 320 performs an access control check for the 5G-RAN cell, when the check result indicates that access is prohibited, the UE 320 initiates a forbidden access timer T2 corresponding to the 5G-RAN, and the T2 indicates that the 5G-RAN cell is for The time limit for prohibiting access; when the check result indicates that access is allowed, the UE 320 does not start the prohibition access timer T2 corresponding to the 5G-RAN.
  • the UE 320 can initiate a connection setup request with any of the two access network/core network type networks. If any of the access prohibition timers T1 and T2 is disabled, the UE 320 can notify its upper layer connection establishment failure.
  • the UE 320 may initiate for E-UTRAN (or E-UTRAN based).
  • the connection establishment request, or the UE 320 can initiate a service request to the EPC.
  • the UE 320 initiates a connection establishment request to the base station, and explicitly or implicitly indicates the result of the access control check in the request, the check result may include access check for the E-UTRAN cell, and optional The access check for the E-UTRAN cell prohibits access.
  • the two-bit indication bit is used in the access request message, the bit 1 corresponds to the access check result of the E-UTRAN cell, and the optional bit 2 corresponds to the access check result of the 5G-RAN cell, where the bit is The value "0" indicates that access is prohibited, "1" indicates that access is allowed, or the system information indicates that the random access of the E-UTRAN cell and the 5G-RAN cell uses different preambles, and the UE 320 Based on the result of the access check, a preamble sequence corresponding to the E-UTRAN cell is transmitted upon initiation of the E-UTRAN based connection setup request.
  • the base station routes the service request of the UE 320 to the corresponding core network according to the check result, which is an EPC in this example.
  • the UE 320 may initiate a 5G-RAN (or 5G-RAN based) connection setup request, or UE. 320 initiates a service request to NextGen Core. Specifically, the UE 320 initiates a connection establishment request to the base station, and displays or implicitly indicates the result of the access control check in the request, the check result may include an access check for the 5G-RAN cell to allow access, and optionally The access check for the E-UTRAN cell prohibits access. Based on the check result, the base station routes the service request of the UE 320 to the corresponding core network, which in this example is NextGen Core.
  • NextGen Core NextGen Core
  • the UE 320 When the forbidden access timers T1 and T2 are both enabled, during the operation of the forbidden access timer T1, the UE 320 cannot initiate access to the E-UTRAN in the cell, or cannot initiate a service request to the EPC; During the period when the access timer T2 is disabled, the UE 320 cannot initiate access to the 5G-RAN in the cell, or cannot initiate a service request to the NextGen Core. Optionally, the UE 320 notifies the upper layer RRC connection establishment failure.
  • the UE 320 may indicate an E-UTRAN-based access barring cancellation to the upper layer (or the upper layer or the non-access stratum, the same below), or indicate to the EPC request. Access to the service is prohibited.
  • the UE 320 may indicate the 5G-RAN based access barring cancellation to the upper layer or the access barring cancellation requesting the service to the NextGen Core.
  • the UE 320 may indicate the access prohibition release to the upper layer only when the forbidden access timers T1 and T2 both time out. Alternatively, the UE 320 may restart the access check control.
  • an access prohibition timer is separately set for each different network type to perform access control on a network of a corresponding network type.
  • only one forbidden access timer may be set for different network types.
  • At least one value for the network of the at least one network type is generated, each value indicating that the network for the corresponding network type is prohibited.
  • the length of time When the at least one value is a valid value, the prohibition access timer is started, and the minimum or maximum value of the at least one value is used as the duration of the forbidden access timer for prohibiting network access; When at least one of the at least one value is an invalid value, the prohibition access timer is not activated.
  • the UE 320 after the UE 320 performs an access control check for the E-UTRAN cell, when the check result indicates that access is prohibited, the UE 320 obtains a value V1 indicating the forbidden access for the E-UTRAN. When the check result indicates that access is allowed, the UE 320 may obtain a value of zero for the forbidden access of the E-UTRAN, or assign a value of zero to V1, or assign an invalid value to V1.
  • the UE 320 performs an access control check for the 5G-RAN cell
  • the UE 320 obtains a value V2 indicating the duration of the forbidden access for the 5G-RAN;
  • the UE 320 can obtain a value of zero for the prohibited access of the 5G-RAN, or assign a value of zero to V2, or assign an invalid value to V2.
  • the value of the disable access timer can take a minimum between the V1 and V2 values, or a maximum between the V1 and V2 values. If the value of the forbidden access timer is zero, the UE 320 does not start the disable access timer. If the value of the forbidden access timer is non-zero, the UE 320 starts the prohibition access timer.
  • the UE 320 When at least one of V1 and V2 is an invalid value or both are invalid values, the UE 320 does not initiate a disable access timer.
  • the UE 320 may indicate that the access prohibition is released to the upper layer or the access prohibition for requesting the service to any core network.
  • the UE 320 initiates an access request.
  • the structure of the base station and the method on the base station side according to the second exemplary embodiment of the present invention are completely identical to the configuration of the base station of the second exemplary embodiment and the method on the base station side, and thus a description thereof will be omitted herein.
  • the description of Figures 1 and 2 is made.
  • FIG. 5 shows a schematic structural block diagram of a UE according to a second exemplary embodiment of the present invention.
  • the UE 520 includes a transceiver 521, an inspection unit 523, an activation unit 525, a notification unit 527, and a selection unit 529.
  • the transceiver 521, the inspection unit 523, the activation unit 525, the notification unit 527, and the selection unit 529 associated with the present invention are shown in the UE 520 of FIG. 5 to avoid obscuring the present invention.
  • the UE according to an embodiment of the present invention further includes other units constituting the UE.
  • the selection unit 529 is configured to select a network type to be used for providing a service from among a plurality of network types. Once the network type is selected, the UE 520 will receive a corresponding type of access control information based on the selected network type to perform a corresponding access control check based on the received access control information.
  • the transceiver 521 is configured to: select and receive access control information corresponding to the selected network type from the plurality of access control information corresponding to the plurality of network types transmitted from the base station.
  • the checking unit 523 is configured to perform an access control check for the network of the selected network type using the received access control information.
  • the initiating unit 525 is configured to enable or disable the access prohibition timer according to the result of the access control check.
  • the prohibition access timer can be started.
  • the initiating unit 525 may be configured to: when the check result indicates that access to the network of the selected network type is prohibited, starting a forbidden access timer for the network of the selected network type, the prohibition access timer indication is directed to The length of time that the network of the selected network type is prohibited from accessing.
  • the initiating unit 525 can initiate the same or different forbidden access timers for different network types.
  • the notification unit 527 is configured to notify the upper layer of the UE of the access prohibition release when the access timer is disabled.
  • the selection unit 529 can select the type of network to be used to provide the service based on an indication received from the upper layer of the UE containing the selected network type.
  • the selection unit 529 may select a network type to be used for providing a service according to system information received from the base station or information about a network type priority included in the proprietary signaling.
  • the selection unit 529 may select a network type to be used for providing a service according to a core network type to which the UE has registered.
  • FIG. 6 shows a flowchart of an access control method performed on the UE side according to a second exemplary embodiment of the present invention.
  • method 600 includes steps S601-S608, which may be performed by UE 520 as shown in FIG.
  • step S601 the selection unit 529 of the UE 520 selects a network type to be used for providing a service from among a plurality of network types.
  • step S602 the transceiver 521 of the UE 520 selects to receive the access control information corresponding to the selected network type from the plurality of access control information corresponding to the plurality of network types transmitted by the base station.
  • a plurality of access control information corresponding to different network types are broadcast by the base station to the UE 520 in the system information, which may be broadcast in the same system information, or may be different. Broadcast in system information.
  • the checking unit 523 of the UE 520 performs an access control check for the network of the selected network type using the received access control information.
  • step S606 the initiating unit 525 of the UE 520 starts or does not start the prohibition access timer according to the result of the access control check.
  • the prohibition access timer can be started.
  • the initiating unit 525 may start a forbidden access timer for the network of the selected network type when the check result indicates that access to the network of the selected network type is prohibited, the prohibition access timer indication for the selected network type The length of time that the network is prohibited from accessing.
  • step S608 the notification unit 527 of the UE 520 notifies the upper layer of the UE of the access prohibition release in the case where the prohibition of the access timer expires.
  • the first access control information includes access control information for the E-UTRAN cell, or access control information for the corresponding EPC;
  • the access control information includes access control information for the 5G-RAN cell or access control information for the corresponding NextGen Core (but is not limited thereto).
  • the first and second access control information may be broadcast in the same system information or in different system information.
  • the UE 520 needs to select a corresponding access network type or a corresponding core network type, and receives according to the selected access network type or the corresponding core network type.
  • Corresponding one type of access control information performs a corresponding access control check based on the received access control information.
  • the process of selecting an access network type or a corresponding core network type may be:
  • the UE 520 receives an indication of its upper layer, the indication including the selected access network/core network type; or
  • the UE 520 obtains information about the type priority of the access network/core network in the broadcast system information or the proprietary signaling sent by the network side, and selects the type of the access network/core network according to the priority information. ;or
  • the UE 520 selects the access network/core network type according to the core network type it has registered.
  • the UE 520 will receive a corresponding type of access control information based on the selected access network/core network type to perform corresponding access control based on the received access control information. an examination.
  • the UE 520 selects the access network of the type 5G-RAN or the core network of the NextGen Core according to the foregoing method, and the UE 520 only needs to receive the system information including the foregoing second access control information, and according to the second access control.
  • the content in the message performs an access control check.
  • the UE 520 After the UE 520 performs the corresponding access control check, when the check result indicates that access is prohibited, the UE 520 starts the prohibition access timer, and optionally, the UE 520 notifies the upper layer connection establishment failure; otherwise, the UE 520 directly initiates the connection. Create a request.
  • the UE 520 can initiate the same forbidden access timer for different access network/core network types.
  • the UE 520 may initiate different forbidden access timers for different access network/core network types, for example, if the UE 520 selects an access network of the type E-UTRAN or an EPC core network. If the access is forbidden, the access prohibition timer T1 is started; and when the UE 520 selects the 5G-RAN access network or the NextGen Core core network, if the access is prohibited, the prohibition access timer is started. T2.
  • the 5G-RAN supports the UE to perform data transmission in an inactive state.
  • the so-called inactive state refers to a UE state in which the base station reserves the context of the UE, and the UE may not perform state transition in the inactive state. Data transfer is possible. Therefore, the UE needs to initiate an access control check at least under the following two working conditions:
  • the third exemplary embodiment of the present disclosure provides an access control scheme in the above scenario.
  • FIG. 1 A schematic structural block diagram of a base station according to a third exemplary embodiment of the present invention can be referred to FIG.
  • the base station 110 includes a configuration unit 111 and a transceiver 113.
  • the configuration unit 111 and transceiver 113 associated with the present invention are shown in the base station 110 of Figure 1 to avoid obscuring the present invention.
  • the base station according to an embodiment of the present invention further includes other units constituting the base station.
  • the configuration unit 111 is configured to configure one access control information corresponding to the multiple working conditions for multiple working conditions of the UE (ie, use one access control information for the UE) Network access control check under various working conditions) or multiple access control information corresponding to the multiple working conditions (ie, multiple access control information is used for multiple working conditions of the UE respectively) Network access control check).
  • the multiple working conditions indicate different access requirements of the UE in different states, and the at least the UE in the idle state or the inactive state establishes a connection; and the UE in the inactive state performs data transmission.
  • the transceiver 113 is configured to send the one access control information or the multiple access control information to the UE.
  • the plurality of access control information is broadcast by the base station 110 to the UE in the system information, which may be broadcast in the same system information or may be broadcast in different system information.
  • FIG. 7 shows a flowchart of an access control configuration method for a UE performed on a base station side according to a third exemplary embodiment of the present invention.
  • method 700 includes steps S701 and 703, which may be performed by base station 110 shown in FIG.
  • the configuration unit 111 of the base station 110 configures one access control information corresponding to the multiple working conditions for multiple working conditions of the UE (ie, one access control information is used for the UE).
  • Network access control check ).
  • the multiple working conditions indicate different access requirements of the UE in different states, and the at least the UE in the idle state or the inactive state establishes a connection; and the UE in the inactive state performs data transmission.
  • step S703 the transceiver 113 of the base station 110 transmits the one or more access control information to the UE.
  • the plurality of access control information is broadcast by the base station 110 to the UE in the system information, which may be broadcast in the same system information or may be broadcast in different system information.
  • FIG. 3 A schematic structural block diagram of a UE according to a third exemplary embodiment of the present invention can be seen in FIG.
  • the UE 320 includes a transceiver 321, an inspecting unit 323, an initiating unit 325, and a notifying unit 327.
  • the transceiver 321, the inspection unit 323, the activation unit 325, and the notification unit 327 associated with the present invention are shown in the UE 320 of FIG. 3 to avoid obscuring the present invention.
  • the UE according to an embodiment of the present invention further includes other units constituting the UE.
  • the transceiver 321 is configured to: receive one access control information corresponding to multiple operating conditions of the UE from the base station (ie, use one access control information for multiple operations of the UE) Network access control check under conditions) or multiple access control information corresponding to multiple working conditions of the UE respectively (ie, multiple access control information is used for network connection under various working conditions of the UE respectively) Into the control check).
  • the multiple working conditions indicate different access requirements of the UE in different states, and the at least the UE in the idle state or the inactive state establishes a connection; and the UE in the inactive state performs data transmission.
  • the plurality of access control information is broadcast by the base station to the UE 320 in the system information, which may be in the same system
  • the broadcast in the information can also be broadcast in different system information.
  • the checking unit 323 is configured to perform a network access control check using the received access control information according to the working condition of the UE itself.
  • the checking unit 323 is specifically configured to: utilize the received access corresponding to the working condition of the UE itself. Control information, performing an access control check for the working condition.
  • the initiating unit 325 is configured to enable or disable the access prohibition timer according to the result of the access control check.
  • the check result indicates that access to the network is prohibited under the working condition of the UE itself, the prohibition access timer may be started.
  • the initiating unit 325 starts a forbidden access timer for the working condition of the UE itself, and the prohibition access timer indicates The length of time that the UE's own working status is prohibited from accessing.
  • the initiating unit 325 can initiate the same or different forbidden access timers for different operating conditions.
  • the notification unit 327 is configured to notify the upper layer of the UE of the access prohibition release when the access timer is disabled.
  • the notification unit 327 notifies the upper layer of the UE of the network access prohibition release when the prohibition access timer expires.
  • the notification unit 327 notifies the upper layer of the UE of the network connection for the corresponding working condition if the activated prohibition access timer expires. The prohibition is lifted.
  • FIG. 8 shows a flowchart of an access control method performed on the UE side according to a third exemplary embodiment of the present invention.
  • method 800 includes steps S802-S808, which may be performed by UE 320 shown in FIG.
  • the transceiver 321 of the UE 320 receives, from the base station, one access control information corresponding to multiple operating conditions of the UE (ie, using one access control information for multiple operating conditions of the UE) Network access control check) or multiple access control information corresponding to multiple working conditions of the UE respectively (ie, multiple access control information is used for network access control check under multiple working conditions of the UE respectively) ).
  • the multiple working conditions indicate different access requirements of the UE in different states, and the at least the UE in the idle state or the inactive state establishes a connection; and the UE in the inactive state performs data transmission.
  • the plurality of access control information is broadcast by the base station to the UE 320 in the system information, which may be in the same system
  • the broadcast in the information can also be broadcast in different system information.
  • step S804 the checking unit 323 of the UE 320 performs a network access control check using the received access control information according to the working condition of the UE itself.
  • the checking unit 323 may perform the use of the received access control information corresponding to the working condition of the UE itself. An access control check for the working condition.
  • step S806 the initiating unit 325 of the UE 320 is configured to enable or disable the access prohibition timer according to the result of the access control check.
  • the prohibition access timer may be started.
  • the initiating unit 325 starts a forbidden access timer for the working condition of the UE itself, and the prohibition access timer indicates The length of time that the UE's own working status is prohibited from accessing.
  • the initiating unit 325 can initiate the same or different forbidden access timers for different operating conditions.
  • step S808 the notification unit 327 of the UE 320 notifies the upper layer of the UE of the access prohibition release in the case where the prohibition of the access timer expires.
  • the notification unit 327 notifies the upper layer of the UE of the network access prohibition release when the prohibition access timer expires.
  • the notification unit 327 notifies the upper layer of the UE of the network connection for the corresponding working condition if the activated prohibition access timer expires. The prohibition is lifted.
  • the UE may initiate an access control check under, for example, but not limited to, two operating conditions:
  • the base station may configure one access control information corresponding to the two working conditions for the UE, that is, one access control information is used for network access control check under the two working conditions of the UE.
  • the UE will initiate a disable access timer and, optionally, notify the upper layer access failure.
  • the UE may start different forbidden access timers according to different working conditions, for example, the UE performs an access control check under the working condition 1), and if the check result is that access is prohibited, the UE will start/ The access prohibition timer T3 is activated; the UE performs an access control check under the working condition 2), and if the check result is that the access is prohibited, the UE will activate/activate the access prohibition timer T4.
  • the UE may indicate to the upper layer that the connection is disabled in the idle state or the inactive state.
  • the access timer T4 When the access timer T4 is disabled, the UE may indicate to the upper layer that the data is transmitted in the inactive state. It is forbidden to lift.
  • the base station may configure two access control information corresponding to the two working conditions for the UE, that is, use the two access control information for the network connection in the two working conditions of the UE. Into the control check.
  • the third access control information is used for an access control check performed when the UE establishes a connection in an idle state or an inactive state;
  • the fourth access control information is used for performing access control when the UE transmits data in an inactive state.
  • the UE After receiving the above information, the UE selects or accesses access control information (such as establishing a connection, or transmitting data, etc.) according to the state in which it is located for access control. For example, if the UE is in an inactive state and needs to initiate a connection establishment, the UE uses the third access control information to perform access control. For example, if the UE is in an inactive state and needs to perform data transmission, the UE adopts the fourth access control information. Perform access control.
  • access control information such as establishing a connection, or transmitting data, etc.
  • the forbidden access timer activated based on the third access control information may be the same as or different from the forbidden access timer activated based on the fourth access control information. If it is different, for example, the forbidden access timer activated based on the third access control information is T5, and the forbidden access timer activated based on the fourth access control information is T6, when the access prohibition timer T5 is disabled, the UE The prohibition of establishing the connection in the idle state or the inactive state may be indicated to the upper layer; when the access timer T6 is disabled, the UE may indicate to the upper layer that the prohibition of the transmission of the data in the inactive state is released.
  • the program running on the device according to the present invention may be a program that causes a computer to implement the functions of the embodiments of the present invention by controlling a central processing unit (CPU).
  • the program or information processed by the program may be temporarily stored in a volatile memory (such as a random access memory RAM), a hard disk drive (HDD), a non-volatile memory (such as a flash memory), or other memory system.
  • a program for realizing the functions of the embodiments of the present invention can be recorded on a computer readable recording medium.
  • the corresponding functions can be realized by causing a computer system to read programs recorded on the recording medium and execute the programs.
  • the so-called "computer system” herein may be a computer system embedded in the device, and may include an operating system or hardware (such as a peripheral device).
  • the "computer readable recording medium” may be a semiconductor recording medium, an optical recording medium, a magnetic recording medium, a recording medium of a short-term dynamic storage program, or any other recording medium readable by a computer.
  • circuitry e.g., monolithic or multi-chip integrated circuits.
  • Circuitry designed to perform the functions described in this specification can include general purpose processors, digital signal processors (DSPs), application specific integrated circuits (ASICs), field programmable gate arrays (FPGAs), or other programmable logic devices, discrete Gate or transistor logic, discrete hardware components, or any combination of the above.
  • DSPs digital signal processors
  • ASICs application specific integrated circuits
  • FPGAs field programmable gate arrays
  • a general purpose processor may be a microprocessor or any existing processor, controller, microcontroller, or state machine.
  • the above circuit may be a digital circuit or an analog circuit.
  • One or more embodiments of the present invention may also be implemented using these new integrated circuit technologies in the context of new integrated circuit technologies that have replaced existing integrated circuits due to advances in semiconductor technology.
  • the present invention is not limited to the above embodiment. Although various examples of the embodiments have been described, the invention is not limited thereto.
  • Fixed or non-mobile electronic devices installed indoors or outdoors can be used as terminal devices or communication devices such as AV devices, kitchen devices, cleaning devices, air conditioners, office equipment, vending machines, and other home appliances.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本公开提供了一种在UE处执行的接入控制方法,包括:从基站接收与多个网络类型相对应的多个接入控制信息;利用接收到的多个接入控制信息,分别执行针对多个网络类型的网络的接入控制检查;根据接入控制检查的结果,启动禁止接入定时器;以及在禁止接入定时器超时的情况下,向UE的上层通知接入禁止解除。本公开还提供了一种在基站处执行的针对UE的接入控制的配置方法、以及相应的UE和基站。

Description

接入控制相关方法、基站和用户设备 技术领域
本发明涉及无线通信技术领域,更具体地,本发明涉及接入控制相关方法以及相应的基站和用户设备。
背景技术
随着移动通信的快速增长和技术的巨大进步,世界将走向一个完全互联互通的网络社会,即任何人或任何东西在任何时间和任何地方都可以获得信息和共享数据。预计到2020年,互联设备的数量将达到500亿部,其中仅有100亿部左右可能是手机和平板电脑,其它的则不是与人对话的机器,而是彼此对话的机器。因此,如何设计系统以更好地支持万物互联是一项需要深入研究的课题。
为此,在2016年3月举行的第三代合作伙伴计划(3GPP)RAN#64次全会上,提出了新5G无线接入技术的研究课题(参见非专利文献:RP-160671 New SID Proposal:Study on New Radio Access Technology)。在该工作项目的描述中,未来新的通信制式的工作频段可扩展至100GHz,同时将至少满足增强的移动宽带业务需求、海量物联网终端的通信需求,以及高可靠性要求的业务需求等,该项目研究工作将于2018年结束。
在研究5G无线接入技术的同时,支持5G接入的核心网技术的研究也同时开展.这种核心网可以称作下一代核心网(Next Generation Core,记为NextGen Core)和现有LTE(Long Term Evolution,长期演进)系统连接的核心网EPC(Evolved Packet Core,演进的分组核心网)不同,正在讨论中的NextGen Core将基于不同的Qos架构,因此可以认为是一种不同于EPC的新的核心网类型。
在5G接入网技术的研究中,为了避免运营商的重复投资,允许运营商升级已部署的LTE基站,使得其可以与NextGen Core相连,这类新型的基站被称为演进的LTE基站(eLTE eNB:evolution of LTE eNB)。根据TR38.804的定义,eLTE eNB可以支持与EPC的连接以及与NextGen Core的连接。
从接入网侧看,连接EPC的eLTE基站可以被认为是E-UTRAN(Evolved Universal Terrestrial Radio Access Network)接入网,而连接NextGen Core的eLTE基站可以被认为是5G-RAN接入网,即根据基站所连接的核心网类型的不同,一个eLTE基站覆盖的小区可以是E-UTRAN小区,也可以是5G-RAN小区。
目前,UE(用户设备)在空闲态(idle)发起连接建立请求之前,需要根据UE的接入等级以及业务特性进行接入控制检查。
根据检查的结果,如果结果显示UE被允许接入,则UE可以继续发起连接建立请求;如果结果显示UE不被允许接入,则UE会启动定时器,在定时器运行期间,不在当前小区发起连接建立请求,并同时通知上层RRC连接建立失败。
由于eLTE基站覆盖的小区可以是E-UTRAN小区、也可以是5G-RAN小区,因而需要解决UE在eLTE基站的覆盖区域内如何进行接入控制检查的问题。在文献R2-168196中提出了需要基于核心网广播相应的接入控制信息,但是如何利用这些接入控制信息来执行接入控制,实现流控,是需要解决的问题。
此外,5G-RAN支持UE在非激活态(Inactive)下进行数据传输。所谓非激活态是指基站保留UE的上下文的一种UE状态。UE在非激活态下可以不进行状态转换即可传输数据。因此UE在不同状态下的接入控制如何执行也同样是需要解决的问题。
发明内容
为了解决至少上述问题,本公开提供了以下技术方案。
根据本公开的一方面,提供了一种在用户设备UE处执行的方法,包括:
从基站接收与多个网络类型相对应的多个接入控制信息;
利用接收到的多个接入控制信息,分别执行针对多个网络类型的网络的接入控制检查;
根据接入控制检查的结果,启动禁止接入定时器;以及
在禁止接入定时器超时的情况下,向UE的上层通知接入禁止解除。
在一个示例性实施例中,所述方法还包括:
当检查结果显示禁止接入至少一个网络类型的网络时,分别启动针对所述至少一个网络类型的网络设置的至少一个禁止接入定时器,每个禁止接入定时器指示针对对应网络类型的网络的禁止接入的时长。
在一个示例性实施例中,在所述至少一个禁止接入定时器之一超时的情况下,向UE的上层通知针对对应网络类型的网络的接入禁止解除;或在所述至少一个禁止接入定时器均超时的情况下,向UE的上层通知针对对应网络类型的网络的接入禁止解除。
在一个示例性实施例中,所述方法还包括:
在所述至少一个禁止接入定时器均未被启动的情况下,发起与未被启动的禁止接入定时器相对应的网络类型的网络中的任意一个的连接建立请求;否则,向UE的上层通知连接建立失败;或
在所述至少一个禁止接入定时器中至少有一个未被启动的情况下,发起与未被启动的禁止接入定时器相对应的网络类型的网络中的任意一个的连接建立请求。
在一个示例性实施例中,所述方法还包括:
当检查结果显示禁止接入至少一个网络类型的网络时,分别生成针对所述至少一个网络类型的网络的至少一个值,每个值指示针对对应网络类型的网络的禁止接入的时长,
其中当所述至少一个值均为有效值时,启动禁止接入定时器,并将所述至少一个值中的最小值或最大值作为所述禁止接入定时器用于禁止网络接入的时长,
当所述至少一个值中至少有一个为无效值时,不启动所述禁止接入定时器。
在一个示例性实施例中,所述多个接入控制信息在相同或不同的系统信息中广播。
根据本公开的另一方面,提供了一种用户设备UE,包括:
收发机,被配置为从基站接收分别与多个网络类型相对应的多个接入控制信息;
检查单元,被配置为利用接收到的多个接入控制信息,分别执行针对多个网络类型的网络的接入控制检查;
启动单元,被配置为根据接入控制检查的结果,启动禁止接入定时器;以及
通知单元,被配置为在禁止接入定时器超时的情况下,向UE的上层通知接入禁止解除。
在一个示例性实施例中,所述启动单元进一步被配置为:当检查结果显示禁止接入至少一个网络类型的网络时,分别启动针对所述至少一个网络类型的网络设置的至少一个禁止接入定时器,每个禁止接入定时器指示针对对应网络类型的网络的禁止接入的时长。
在一个示例性实施例中,所述通知单元进一步被配置为:
在所述至少一个禁止接入定时器之一超时的情况下,向UE的上层通知针对对应网络类型的网络的接入禁止解除;或
在所述至少一个禁止接入定时器均超时的情况下,向UE的上层通知针对对应网络类型的网络的接入禁止解除。
在一个示例性实施例中,所述UE还包括:
请求单元,被配置为在所述至少一个禁止接入定时器均未被启动的情况下,发起与未被启动的禁止接入定时器相对应的网络类型的网络中的任意一个的连接建立请求;否则,由所述通知单元向UE的上层通知连接建立失败;或
请求单元,被配置为在所述至少一个禁止接入定时器中至少有一个未被启动的情况下,发起与未被启动的禁止接入定时器相对应的网络类型的网络中的任意一个的连接建立请求。
在一个示例性实施例中,所述UE还包括:
生成单元,被配置为当检查结果显示禁止接入至少一个网络类型的网络时,分别生成针对所述至少一个网络类型的网络的至少一个值,每个值指示针对对应网络类型的网络的禁止接入的时长,
所述启动单元进一步被配置为:当所述至少一个值均为有效值时,启动禁止接入定时器,并将所述至少一个值中的最小值或最大值作为所述禁止接入定时器用于禁止网络接入的时长;以及当所述至少一个值中至少有一个为无效值时,不启动所述禁止接入定时器。
在一个示例性实施例中,所述多个接入控制信息在相同或不同的系统信息中广播。
根据本公开的另一方面,提供了一种在用户设备UE处执行的方法,包括:
从多个网络类型中选择要用于提供服务的网络类型;
从基站接收与所选网络类型相对应的接入控制信息;
利用接收到的接入控制信息,执行针对所选网络类型的网络的接入控制检查;
根据接入控制检查的结果,启动禁止接入定时器;以及
在禁止接入定时器超时的情况下,向UE的上层通知接入禁止解除。
在一个示例性实施例中,选择要用于提供服务的网络类型基于以下各项之一:
从UE的上层接收的包含所选网络类型的指示;
从基站接收的系统信息或专有信令中包含的关于网络类型优先级的信息;
UE已注册的核心网类型。
在一个示例性实施例中,所述方法还包括:
当检查结果显示禁止接入所选网络类型的网络时,启动针对所选网络类型的网络的禁止接入定时器,所述禁止接入定时器指示针对所选网络类型的网络的禁止接入的时长。
在一个示例性实施例中,针对不同网络类型启动相同或不同的禁止接入定时器。
根据本公开的另一方面,提供了一种用户设备UE,包括:
选择单元,被配置为从多个网络类型中选择要用于提供服务的网络类型;
收发机,被配置为从基站接收与所选网络类型相对应的接入控制信息;
检查单元,被配置为利用接收到的接入控制信息,执行针对所选网络类型的网络的接入控制检查;
启动单元,被配置为根据接入控制检查的结果,启动禁止接入定时器;以及
通知单元,被配置为在禁止接入定时器超时的情况下,向UE的上层通知接入禁止解除。
在一个示例性实施例中,所述选择单元基于以下各项之一选择要用于提供服务的网络类型:
从UE的上层接收的包含所选网络类型的指示;
从基站接收的系统信息或专有信令中包含的关于网络类型优先级的信息;
UE已注册的核心网类型。
在一个示例性实施例中,所述启动单元进一步被配置为:当检查结果显示禁止接入所选网络类型的网络时,启动针对所选网络类型的网络的禁止接入定时器,所述禁止接入定时器指示针对所选网络类型的网络的禁止接入的时长。
在一个示例性实施例中,针对不同网络类型启动相同或不同的禁止接入定时器。
根据本公开的另一方面,提供了一种在基站处执行的方法,包括:
配置分别与基站所支持的多个网络类型相对应的多个接入控制信息;以及
向用户设备UE发送所述多个接入控制信息。
在一个示例性实施例中,所述多个接入控制信息在相同或不同的系统信息中广播。
根据本公开的另一方面,提供了一种基站,包括:
配置单元,用于配置分别与基站所支持的不同网络类型相对应的多个接入控制信息;以及
收发机,用于向用户设备UE发送所述多个接入控制信息。
在一个示例性实施例中,所述多个接入控制信息在相同或不同的系统信息中广播。
根据本公开的另一方面,提供了一种在用户设备UE处执行的方法,包括:
从基站接收与UE的多种工作状况相对应的一个接入控制信息或与UE的多种工作状况相对应的多个接入控制信息,所述多种工作状况指示UE在不同状态下的不同接入需求;
根据UE自身所处的工作状况,利用接收到的接入控制信息,执行网络接入控制检查;
根据接入控制检查的结果,启动禁止接入定时器;以及
在禁止接入定时器超时的情况下,向UE的上层通知接入禁止解除。
在一个示例性实施例中,将一个接入控制信息用于UE的多种工作状况下的网络接入控制检查。
在一个示例性实施例中,将多个接入控制信息分别用于UE的多种工作状况下的网络接入控制检查,以及执行网络接入控制检查的步骤进一步包括:
利用接收到的与UE自身所处的工作状况相对应的接入控制信息,执行针对所述工作状况的接入控制检查。
在一个示例性实施例中,所述工作状况至少包括:
处于空闲态或非激活态的UE建立连接;
处于非激活态的UE进行数据传输。
在一个示例性实施例中,所述方法还包括:
当检查结果显示在UE自身所处的工作状况下禁止接入网络时,启动针对UE自身所处的工作状况的禁止接入定时器,所述禁止接入定时器指示针对UE自身所处的工作状况的禁止接入的时长。
在一个示例性实施例中,针对不同的工作状况启动相同的禁止接入定时器,以及
在所述禁止接入定时器超时的情况下,向UE的上层通知网络接入禁止解除。
在一个示例性实施例中,针对不同的工作状况启动不同的禁止接入定时器,以及在被启动的禁止接入定时器超时的情况下,向UE的上层通知针对对应工作状况的网络接入禁止解除。
根据本公开的另一方面,提供了一种用户设备UE,包括:
收发机,被配置为从基站接收与UE的多种工作状况相对应的一个接入控制信息或与UE的多种工作状况相对应的多个接入控制信息,所述多种工作状况指示UE在不同状态下的不同接入需求;
检查单元,被配置为根据UE自身所处的工作状况,利用接收到的接入控制信息,执行网络接入控制检查;
启动单元,被配置为根据接入控制检查的结果,启动禁止接入定时器;以及
通知单元,被配置为在禁止接入定时器超时的情况下,向UE的上层通知接入禁止解除。
在一个示例性实施例中,将一个接入控制信息用于UE的多种工作状况下的网络接入控制检查。
在一个示例性实施例中,将多个接入控制信息分别用于UE的多种工作状况下的网络接入控制检查,以及所述检查单元进一步被配置为:
利用接收到的与UE自身所处的工作状况相对应的接入控制信息,执行针对所述工作状况的接入控制检查。
在一个示例性实施例中,所述工作状况至少包括:
处于空闲态或非激活态的UE建立连接;
处于非激活态的UE进行数据传输。
在一个示例性实施例中,所述启动单元还被配置为:当检查结果显示在UE自身所处的工作状况下禁止接入网络时,启动针对UE自身所处的工作状况的禁止接入定时器,所述禁止接入定时器指示针对UE自身所处的工作状况的禁止接入的时长。
在一个示例性实施例中,所述启动单元针对不同的工作状况启动相同的禁止接入定时器,以及
所述通知单元在所述禁止接入定时器超时的情况下,向UE的上层通知网络接入禁止解除。
在一个示例性实施例中,针对不同的工作状况启动不同的禁止接入定时器,以及所述通知单元进一步被配置为:
在被启动的禁止接入定时器超时的情况下,向UE的上层通知针对对应工作状况的网络接入禁止解除。
根据本公开的另一方面,提供了一种在基站处执行的方法,包括:
针对用户设备UE的多种工作状况,分别配置与所述多种工作状况相对应的一个接入控制信息或与所述多种工作状况相对应的多个接入控制信息,所述多种工作状况指示UE在不同状态下的不同接入需求;以及
向UE发送所述一个接入控制信息或多个接入控制信息。
在一个示例性实施例中,所述工作状况至少包括:
处于空闲态或非激活态的UE建立连接;
处于非激活态的UE进行数据传输。
在一个示例性实施例中,所述多个接入控制信息在相同或不同的系统信息中广播。
根据本公开的另一方面,提供了一种基站,包括:
配置单元,用于针对用户设备UE的多种工作状况,分别配置与所述多种工作状况相对应的一个接入控制信息或与所述多种工作状况相对应的多个接入控制信息,所述多种工作状况指示UE在不同状态下的不同接入需求;以及
收发机,用于向UE发送所述一个接入控制信息或多个接入控制信息。
在一个示例性实施例中,所述工作状况至少包括:
处于空闲态或非激活态的UE建立连接;
处于非激活态的UE进行数据传输。
在一个示例性实施例中,所述多个接入控制信息在相同或不同的系统信息中广播。
根据本公开的技术方案,可以使终端在发起接入或者进行数据传输之前,根据网络类型或者终端所处的状态进行接入控制检查,从而实现接入控制,避免网络拥塞。
附图说明
通过下文结合附图的详细描述,本公开的上述和其它特征将会变得更加明显,其中:
图1示出了根据本发明第一、第二和第三示例性实施例的基站的示意性结构框图;
图2示出了根据本发明第一和第二示例性实施例的在基站侧执行的针对UE的接入控制配置方法的流程图;
图3示出了根据本发明第一和第三示例性实施例的UE的示意性结构框图;
图4示出了根据本发明第一示例性实施例的在UE侧执行的接入控制方法的流程图;
图5示出了根据本发明第二示例性实施例的UE的示意性结构框图;
图6示出了根据本发明第二示例性实施例的在UE侧执行的接入控制方法的流程图;
图7示出了根据本发明第三示例性实施例的在基站侧执行的针对UE的接入控制配置方法的流程图;以及
图8示出了根据本发明第三示例性实施例的在UE侧执行的接入控制方法的流程图。
具体实施方式
下面结合附图和具体实施方式对本公开进行详细阐述。应当注意,本公开不应局限于下文所述的具体实施方式。另外,为了简便起见,省略了对与本公开没有直接关联的公知技术的详细描述,以防止对本公开的理解造成混淆。
为了更好地对本公开的技术方案进行说明,本公开的实施例将以UE在既可以支持与EPC的连接又可以支持与NextGen Core的连接的eLTE基站所覆盖的小区(可以是E-UTRAN小区、也可以是5G-RAN小区)内执行接入控制为例,详细描述根据本公开的接入控制相关方案。然而,本领域技术人员可以理解,本公开并不限于上述基站、UE、接入网和核心网的示例,也可以用于其他支持多种网络类型的接入的基站、其所支持的接入网和相应的核心网、以及在其覆盖范围内的UE。
本公开的第一和第二示例性实施例提供了在基站支持多种类型的网络接入的情况下的接入控制方案。
以下将参照图1至图4,对根据本公开的第一示例性实施例的接入控制方案进行描述。
图1示出了根据本发明第一示例性实施例的基站的示意性结构框图。如图1所示,基站110包括配置单元111和收发机113。本领域技术人员应理解,在图1的基站110中仅示出了与本发明相关的配置单元111和收发机113,以避免混淆本发明。然而,本领域技术人员应理解,尽管未在图1中示出,但是根据本发明实施例的基站还包括构成基站的其他单元。
在第一示例性实施例中,配置单元111用于配置分别与基站所支持的不同网络类型相对应的多个接入控制信息。
收发机113用于向UE发送所述多个接入控制信息。
所述多个接入控制信息由基站110在系统信息中向UE广播,其可以在相同的系统信息中广播,也可以在不同的系统信息中广播。
图2示出了根据本发明第一示例性实施例的在基站侧执行的针对UE的接入控制配置方法的流程图。
如图2所示,方法200包括步骤S201和203,其可由图1所示的基站110来执行。
具体地,在步骤S201,基站110的配置单元111配置分别与基站110所支持的不同网络类型相对应的多个接入控制信息。
在步骤S203,基站110的收发机113向UE发送所述多个接入控制信息。
图3示出了根据本发明第一示例性实施例的UE的示意性结构框图。如图3所示,UE 320包括收发机321、检查单元323、启动单元325和通知单元327。本领域技术人员应理解,在图3的UE 320中仅示出了与本发明相关的收发机321、检查单元323、启动单元325和通知单元327,以避免混淆本发明。然而,本领域技术人员应理解,尽管未在图3中示出,但是根据本发明实施例的UE还包括构成UE的其他单元。
在第一示例性实施例中,收发机321被配置为:从基站接收分别与多个网络类型相对应的多个接入控制信息。所述多个接入控制信息由基站在系统信息中向UE 320广播,其可以在相同的系统信息中广播,也可以在不同的系统信息中广播。
检查单元323被配置为:利用接收到的多个接入控制信息,分别执行针对多个网络类型的网络的接入控制检查。
启动单元325被配置为:根据接入控制检查的结果,启动或不启动禁止接入定时器。当检查结果显示禁止接入至少一个网络类型的网络时,可以启动禁止接入定时器。
通知单元327被配置为:在禁止接入定时器超时的情况下,向UE的上层通知接入禁止解除。
在一实施方式中,启动单元325可以在检查结果显示禁止接入至少一个网络类型的网络时,分别启动针对所述至少一个网络类型的网络设置的至少一个禁止接入定时器,其中每个禁止接入定时器指示针对对应网络类型的网络的禁止接入的时长。
相应地,通知单元327可以在所述至少一个禁止接入定时器之一超时的情况下,向UE的上层通知针对对应网络类型的网络的接入禁止解除。
备选地,通知单元327可以在所述至少一个禁止接入定时器均超时的情况下,向UE的上层通知针对对应网络类型的网络的接入禁止解除。
在一实施方式中,UE 320还包括请求单元(未示出),被配置为在所述至少一个禁止接入定时器均未被启动的情况下,发起与未被启动的禁止接入定时器相对应的网络类型的网络中的任意一个的连接建立请求;否则,由所述通知单元327向UE的上层通知连接建立失败。
备选地,请求单元可以在所述至少一个禁止接入定时器中至少有一个未被启动的情况下,发起与未被启动的禁止接入定时器相对应的网络类型的网络中的任意一个的连接建立请求。
在另一实施例中,UE 320还可以包括生成单元(未示出),被配置为当检查结果显示禁止接入至少一个网络类型的网络时,分别生成针对所述至少一个网络类型的网络的至少一个值,每个值指示针对对应网络类型的网络的禁止接入的时长,
相应地,启动单元325可以进一步被配置为:当所述至少一个值均为有效值时,启动一个禁止接入定时器,并将所述至少一个值中的最小值或最大值作为该禁止接入定时器用于禁止网络接入的时长;以及当所述至少一个值中至少有一个为无效值时,不启动该禁止接入定时器。
图4示出了根据本发明第一示例性实施例的在UE侧执行的接入控制方法的流程图。
如图4所示,方法400包括步骤S402-S408,其可由图3所示的UE 320来执行。
具体地,在步骤S402,UE 320的收发机321从基站接收分别与多个网络类型相对应的多个接入控制信息。
与不同网络类型(即,接入网/核心网类型)相对应的多个接入控制信息由基站在系统信息中向UE 320广播,其可以在相同的系统信息中广播,也可以在不同的系统信息中广播。
在UE 320收到上述接入控制信息后,在步骤S404,UE 320的检查单元323利用接收到的多个接入控制信息,分别执行针对多个网络类型的网络的接入控制检查。
在步骤S406,UE 320的启动单元325根据接入控制检查的结果,启动或不启动禁止接入定时器。当检查结果显示禁止接入至少一个网络类型的网络时,可以启动禁止接入定时器。
在步骤S408,UE 320的通知单元327在禁止接入定时器超时的情况下,向UE的上层通知接入禁止解除。
以下将结合本公开的示例场景详细描述本公开第一示例性实施例的接入控制方案。
在本公开的示例场景中,存在例如两个(但不限于此)不同的网络类型,即,E-UTRAN/EPC和5G-RAN/NextGen Core(但不限于此)。相应地,存在例如两个(但不限于此)接入控制信息,其中第一接入控制信息包含针对E-UTRAN小区的接入控制信息,或者是针对对应EPC的接入控制信息;第二接入控制信息包含针对5G-RAN小区的接入控制信息,或者是针对对应NextGen Core的接入控制信息(但不限于此)。
如前所述,第一和第二接入控制信息可以在相同的系统信息中广播,也可以在不同的系统信息中广播。
针对多个网络类型的网络的接入控制检查可以同时进行,也可以依次进行,本公开对接入控制检查的顺序不做限定。为了说明,这里假设UE 320先执行针对E-UTRAN小区(或针对对应EPC,下同)的接入控制检查,然后再执行针对5G-RAN小区(或针对对应NextGen Core,下同)的接入控制检查。
在UE 320执行针对E-UTRAN小区的接入控制检查之后,当检查结果 显示禁止接入时,UE 320启动(或称激活或运行,下同)对应E-UTRAN的禁止接入定时器T1,T1指示针对E-UTRAN小区的禁止接入时长;当检查结果显示允许接入时,UE 320不启动对应E-UTRAN的禁止接入定时器T1。
接下来,在UE 320执行针对5G-RAN小区的接入控制检查之后,当检查结果显示禁止接入时,UE 320启动对应5G-RAN的禁止接入定时器T2,T2指示针对5G-RAN小区的禁止接入时长;当检查结果显示允许接入时,UE 320不启动对应5G-RAN的禁止接入定时器T2。
在一实施方式中,当且仅当禁止接入定时器T1和T2均没有被启动时,即与两种接入网/核心网类型相对应的接入控制检查的结果都是允许接入时,UE 320才可以发起与这两种接入网/核心网类型的网络中的任意一个的连接建立请求。如果禁止接入定时器T1和T2中的任意一个被启动,则UE 320可以通知其上层连接建立失败。
备选地,在另一实施方式中,如果只有禁止接入定时器T2被启动、而禁止接入定时器T1没有被启动,则UE 320可以发起针对E-UTRAN(或称基于E-UTRAN)的连接建立请求,或者说UE 320可以发起向EPC的服务请求。具体地,UE 320向基站发起连接建立请求,在请求中显式或者隐式地指示接入控制检查的结果,该检查结果可以包括针对E-UTRAN小区的接入检查允许接入,以及可选地,针对E-UTRAN小区的接入检查禁止接入。具体可以是在接入请求消息中采用两比特指示位,比特位一对应E-UTRAN小区的接入检查结果,以及可选的比特位二对应5G-RAN小区的接入检查结果,其中比特位的取值“0”表示禁止接入,“1”表示允许接入;又或者在系统信息中指示E-UTRAN小区和5G-RAN小区的随机接入采用不同的前导序列(preamble),UE 320根据接入检查的结果,在发起基于E-UTRAN的连接建立请求时发送对应于E-UTRAN小区的前导序列。基站根据该检查结果,将UE 320的服务请求路由到对应的核心网,在本例中为EPC。
类似地,如果只有禁止接入定时器T1被启动、而禁止接入定时器T2没有被启动,则UE 320可以发起针对5G-RAN(或称基于5G-RAN)的连接建立请求,或者说UE 320发起向NextGen Core的服务请求。具体地,UE 320向基站发起连接建立请求,在请求中显示或者隐式地指示接入控制检查的结果,该检查结果可以包括针对5G-RAN小区的接入检查允许接入, 以及可选地,针对E-UTRAN小区的接入检查禁止接入。基站根据该检查结果,将UE 320的服务请求路由到对应的核心网,在本例中为NextGen Core。
当禁止接入定时器T1和T2均被启动时,在禁止接入定时器T1运行期间,UE 320在小区内不能发起针对E-UTRAN的接入,或者说是不能向EPC发起服务请求;在禁止接入定时器T2运行期间,UE 320在小区内不能发起针对5G-RAN的接入,或者说是不能向NextGen Core发起服务请求。可选地,UE 320通知上层RRC连接建立失败。
在一实施方式中,当禁止接入定时器T1超时时,UE 320可以向上层(或称高层或非接入层,下同)指示基于E-UTRAN的接入禁止解除,或者指示向EPC请求服务的接入禁止解除。
类似地,当禁止接入定时器T2超时时,UE 320可以向上层指示基于5G-RAN的接入禁止解除,或者指示向NextGen Core请求服务的接入禁止解除。
备选地,在另一实施方式中,只有禁止接入定时器T1和T2均超时时,UE 320才可以向上层指示接入禁止解除。可选地,UE 320可以重新启动接入检查控制。
以上描述了针对每个不同的网络类型分别设置一个禁止接入定时器,以对对应网络类型的网络执行接入控制的实施方式。在另一实施方式中,也可以针对不同的网络类型只设置一个禁止接入定时器。
在该实施方式中,当检查结果显示禁止接入至少一个网络类型的网络时,分别生成针对所述至少一个网络类型的网络的至少一个值,每个值指示针对对应网络类型的网络的禁止接入的时长。当所述至少一个值均为有效值时,启动禁止接入定时器,并将所述至少一个值中的最小值或最大值作为所述禁止接入定时器用于禁止网络接入的时长;当所述至少一个值中至少有一个为无效值时,不启动所述禁止接入定时器。
结合本公开的示例场景,在UE 320执行针对E-UTRAN小区的接入控制检查之后,当检查结果显示禁止接入时,UE 320获得一个值V1,用来指示针对E-UTRAN的禁止接入的时长;当检查结果显示允许接入时,UE 320可以获得针对E-UTRAN的禁止接入的时长为零的值,或者给V1赋值为零,或者给V1赋值为无效值。
类似地,当UE 320执行针对5G-RAN小区的接入控制检查之后,当检查结果显示禁止接入时,UE 320获得一个值V2,用来指示针对5G-RAN的禁止接入的时长;当检查结果显示允许接入时,UE 320可以获得针对5G-RAN的禁止接入的时长为零的值,或者给V2赋值为零,或者给V2赋值为无效值。
当V1和V2都是有效值(可以包含零)时,禁止接入定时器的取值可以在V1和V2值之间取最小值,或者在V1和V2值之间取最大值。如果禁止接入定时器的取值为零,则UE 320不启动禁止接入定时器。如果禁止接入定时器的取值非零,则UE 320启动禁止接入定时器。
当V1和V2中至少有一个为无效值或者两者都为无效值时,UE 320不启动禁止接入定时器。
当禁止接入定时器超时时,UE 320可以向上层指示接入禁止解除,或者指示向任意核心网请求服务的接入禁止解除。可选地,UE 320发起接入请求。
以下将参照图1和图2以及图5和图6,对根据本公开的第二示例性实施例的接入控制方案进行描述。
根据本发明第二示例性实施例的基站的结构以及基站侧的方法与第二示例性实施例的基站的结构以及基站侧的方法完全一致,因而在此省略对其的描述,具体可以参见前面关于图1和图2的说明。
图5示出了根据本发明第二示例性实施例的UE的示意性结构框图。如图5所示,UE 520包括收发机521、检查单元523、启动单元525、通知单元527和选择单元529。本领域技术人员应理解,在图5的UE 520中仅示出了与本发明相关的收发机521、检查单元523、启动单元525、通知单元527和选择单元529,以避免混淆本发明。然而,本领域技术人员应理解,尽管未在图5中示出,但是根据本发明实施例的UE还包括构成UE的其他单元。
在第二示例性实施例中,选择单元529被配置为:从多个网络类型中选择要用于提供服务的网络类型。一旦网络类型被选定,UE 520将会基于选定的网络类型来接收对应的一种接入控制信息,以基于收到的接入控制信息执行对应的接入控制检查。
相应地,收发机521被配置为:从基站发送的与多个网络类型相对应的多个接入控制信息中选择接收与所选网络类型相对应的接入控制信息。
检查单元523被配置为:利用接收到的接入控制信息,执行针对所选网络类型的网络的接入控制检查。
启动单元525被配置为:根据接入控制检查的结果,启动或不启动禁止接入定时器。当检查结果显示禁止接入所选网络类型的网络时,可以启动禁止接入定时器。具体地,启动单元525可以被配置为:当检查结果显示禁止接入所选网络类型的网络时,启动针对所选网络类型的网络的禁止接入定时器,所述禁止接入定时器指示针对所选网络类型的网络的禁止接入的时长。
启动单元525可以针对不同网络类型启动相同或不同的禁止接入定时器。
通知单元527被配置为:在禁止接入定时器超时的情况下,向UE的上层通知接入禁止解除。
在一实施方式中,选择单元529可以根据从UE的上层接收的包含所选网络类型的指示来选择要用于提供服务的网络类型。
备选地,选择单元529可以根据从基站接收的系统信息或专有信令中包含的关于网络类型优先级的信息来选择要用于提供服务的网络类型。
备选地,选择单元529可以根据UE已注册的核心网类型来选择要用于提供服务的网络类型。
图6示出了根据本发明第二示例性实施例的在UE侧执行的接入控制方法的流程图。
如图6所示,方法600包括步骤S601-S608,其可由图5所示的UE 520来执行。
具体地,在步骤S601,UE 520的选择单元529从多个网络类型中选择要用于提供服务的网络类型。
在步骤S602,UE 520的收发机521从基站发送的与多个网络类型相对应的多个接入控制信息中选择接收与所选网络类型相对应的接入控制信息。
与不同网络类型(即,接入网/核心网类型)相对应的多个接入控制信息由基站在系统信息中向UE 520广播,其可以在相同的系统信息中广播,也可以在不同的系统信息中广播。
在步骤S604,UE 520的检查单元523利用接收到的接入控制信息,执行针对所选网络类型的网络的接入控制检查。
在步骤S606,UE 520的启动单元525根据接入控制检查的结果,启动或不启动禁止接入定时器。当检查结果显示禁止接入所选网络类型的网络时,可以启动禁止接入定时器。具体地,启动单元525可以在检查结果显示禁止接入所选网络类型的网络时,启动针对所选网络类型的网络的禁止接入定时器,所述禁止接入定时器指示针对所选网络类型的网络的禁止接入的时长。
在步骤S608,UE 520的通知单元527在禁止接入定时器超时的情况下,向UE的上层通知接入禁止解除。
以下将结合本公开的示例场景详细描述本公开第二示例性实施例的接入控制方案。
在本公开的示例场景中,存在例如两个(但不限于此)不同的网络类型,即,E-UTRAN/EPC和5G-RAN/NextGen Core(但不限于此)。相应地,存在例如两个(但不限于此)接入控制信息,其中第一接入控制信息包含针对E-UTRAN小区的接入控制信息,或者是针对对应EPC的接入控制信息;第二接入控制信息包含针对5G-RAN小区的接入控制信息,或者是针对对应NextGen Core的接入控制信息(但不限于此)。
如前所述,第一和第二接入控制信息可以在相同的系统信息中广播,也可以在不同的系统信息中广播。
不同于第一示例性实施例,根据第二示例性实施例的UE 520需要选定相应的接入网类型或相应核心网类型,并根据所选的接入网类型或相应核心网类型来接收对应的一种接入控制信息,以基于收到的接入控制信息执行对应的接入控制检查。
如前所述,选择接入网类型或对应核心网类型的过程可以是:
UE 520接收其上层的指示,指示中包含了选定的接入网/核心网类型;或
UE 520在广播的系统信息或者是网络侧发来的专有信令中获取关于接入网/核心网的类型优先级的信息,根据该优先级的信息来选择接入网/核心网的类型;或
UE 520根据其已经注册的核心网类型来选择接入网/核心网类型。
一旦选择了接入网/核心网类型,UE 520将基于所选接入网/核心网类型来接收对应的一种接入控制信息,以基于收到的接入控制信息执行对应的接入控制检查。
例如,UE 520根据前述方法选择了类型为5G-RAN的接入网或者NextGen Core的核心网,则UE 520仅需要接收包含前述第二接入控制信息的系统信息,并根据第二接入控制信息中的内容执行接入控制检查。
当UE 520执行相应的接入控制检查之后,当检查结果显示禁止接入,则UE 520启动禁止接入定时器,以及可选地,UE 520通知上层连接建立失败;否则,UE 520直接发起连接建立请求。
无论选择了哪种类型的入网/核心网,当检查结果显示禁止接入时,UE 520可以为不同的接入网/核心网的类型启动相同的禁止接入定时器。
优选地,UE 520可以为不同的接入网/核心网的类型启动不同的禁止接入定时器,例如,在UE 520选定了类型为E-UTRAN的接入网或者EPC核心网的情况下,如果禁止接入,则启动禁止接入定时器T1;而在UE 520选定了5G-RAN的接入网或者NextGen Core核心网的情况下,如果禁止接入,则启动禁止接入定时器T2。
如前所述,5G-RAN支持UE在非激活态(Inactive)下进行数据传输,所谓非激活态是指基站保留UE的上下文的一种UE状态,UE在非激活态下可以不进行状态转换即可进行数据传输。因此该UE至少在以下两种工作状况下需要发起接入控制检查:
1)UE在空闲态或者非激活态下建立连接时;
2)UE在非激活态下进行数据传输时。
本公开的第三示例性实施例提供了在上述场景下的接入控制方案。
以下将参照图1和图7以及图3和图8,对根据本公开的第三示例性实施例的接入控制方案进行描述。
根据本发明第三示例性实施例的基站的示意性结构框图可以参照图1。如图1所示,基站110包括配置单元111和收发机113。本领域技术人员应 理解,在图1的基站110中仅示出了与本发明相关的配置单元111和收发机113,以避免混淆本发明。然而,本领域技术人员应理解,尽管未在图1中示出,但是根据本发明实施例的基站还包括构成基站的其他单元。
在第三示例性实施例中,配置单元111用于针对UE的多种工作状况,配置与所述多种工作状况相对应的一个接入控制信息(即,将一个接入控制信息用于UE的多种工作状况下的网络接入控制检查)或与所述多种工作状况相对应的多个接入控制信息(即,将多个接入控制信息分别用于UE的多种工作状况下的网络接入控制检查)。所述多种工作状况指示UE在不同状态下的不同接入需求,其至少包括:处于空闲态或非激活态的UE建立连接;处于非激活态的UE进行数据传输。
收发机113用于向UE发送所述一个接入控制信息或所述多个接入控制信息。
所述多个接入控制信息由基站110在系统信息中向UE广播,其可以在相同的系统信息中广播,也可以在不同的系统信息中广播。
图7示出了根据本发明第三示例性实施例的在基站侧执行的针对UE的接入控制配置方法的流程图。
如图7所示,方法700包括步骤S701和703,其可由图1所示的基站110来执行。
具体地,在步骤S701,基站110的配置单元111针对UE的多种工作状况,配置与所述多种工作状况相对应的一个接入控制信息(即,将一个接入控制信息用于UE的多种工作状况下的网络接入控制检查)或与所述多种工作状况相对应的多个接入控制信息(即,将多个接入控制信息分别用于UE的多种工作状况下的网络接入控制检查)。所述多种工作状况指示UE在不同状态下的不同接入需求,其至少包括:处于空闲态或非激活态的UE建立连接;处于非激活态的UE进行数据传输。
在步骤S703,基站110的收发机113向UE发送所述一个或多个接入控制信息。
所述多个接入控制信息由基站110在系统信息中向UE广播,其可以在相同的系统信息中广播,也可以在不同的系统信息中广播。
根据本发明第三示例性实施例的UE的示意性结构框图可以参见图3。如图3所示,UE 320包括收发机321、检查单元323、启动单元325和通知单元327。本领域技术人员应理解,在图3的UE 320中仅示出了与本发明相关的收发机321、检查单元323、启动单元325和通知单元327,以避免混淆本发明。然而,本领域技术人员应理解,尽管未在图3中示出,但是根据本发明实施例的UE还包括构成UE的其他单元。
在第三示例性实施例中,收发机321被配置为:从基站接收与UE的多种工作状况相对应的一个接入控制信息(即,将一个接入控制信息用于UE的多种工作状况下的网络接入控制检查)或分别与UE的多种工作状况相对应的多个接入控制信息(即,将多个接入控制信息分别用于UE的多种工作状况下的网络接入控制检查)。所述多种工作状况指示UE在不同状态下的不同接入需求,其至少包括:处于空闲态或非激活态的UE建立连接;处于非激活态的UE进行数据传输。在从基站接收分别与UE的多种工作状况相对应的多个接入控制信息的情况下,所述多个接入控制信息由基站在系统信息中向UE 320广播,其可以在相同的系统信息中广播,也可以在不同的系统信息中广播。
检查单元323被配置为:根据UE自身所处的工作状况,利用接收到的接入控制信息,执行网络接入控制检查。
在从基站接收分别与UE的多种工作状况相对应的多个接入控制信息的情况下,检查单元323具体被配置为:利用接收到的与UE自身所处的工作状况相对应的接入控制信息,执行针对所述工作状况的接入控制检查。
启动单元325被配置为:根据接入控制检查的结果,启动或不启动禁止接入定时器。当检查结果显示在UE自身所处的工作状况下禁止接入网络时,可以启动禁止接入定时器。
具体地,当检查结果显示在UE自身所处的工作状况下禁止接入网络时,启动单元325启动针对UE自身所处的工作状况的禁止接入定时器,所述禁止接入定时器指示针对UE自身所处的工作状况的禁止接入的时长。
启动单元325可以针对不同工作状况启动相同或不同的禁止接入定时器。
通知单元327被配置为:在禁止接入定时器超时的情况下,向UE的上层通知接入禁止解除。
在启动单元325针对不同的工作状况启动相同的禁止接入定时器的情况下,通知单元327在该禁止接入定时器超时的情况下,向UE的上层通知网络接入禁止解除。
在启动单元325针对不同的工作状况启动不同的禁止接入定时器的情况下,通知单元327在被启动的禁止接入定时器超时的情况下,向UE的上层通知针对对应工作状况的网络接入禁止解除。
图8示出了根据本发明第三示例性实施例的在UE侧执行的接入控制方法的流程图。
如图8所示,方法800包括步骤S802-S808,其可由图3所示的UE 320来执行。
具体地,在步骤S802,UE 320的收发机321从基站接收与UE的多种工作状况相对应的一个接入控制信息(即,将一个接入控制信息用于UE的多种工作状况下的网络接入控制检查)或分别与UE的多种工作状况相对应的多个接入控制信息(即,将多个接入控制信息分别用于UE的多种工作状况下的网络接入控制检查)。所述多种工作状况指示UE在不同状态下的不同接入需求,其至少包括:处于空闲态或非激活态的UE建立连接;处于非激活态的UE进行数据传输。在从基站接收分别与UE的多种工作状况相对应的多个接入控制信息的情况下,所述多个接入控制信息由基站在系统信息中向UE 320广播,其可以在相同的系统信息中广播,也可以在不同的系统信息中广播。
在步骤S804,UE 320的检查单元323根据UE自身所处的工作状况,利用接收到的接入控制信息,执行网络接入控制检查。
在从基站接收分别与UE的多种工作状况相对应的多个接入控制信息的情况下,检查单元323可以利用接收到的与UE自身所处的工作状况相对应的接入控制信息,执行针对所述工作状况的接入控制检查。
在步骤S806,UE 320的启动单元325被配置为:根据接入控制检查的结果,启动或不启动禁止接入定时器。当检查结果显示在UE自身所处的工作状况下禁止接入网络时,可以启动禁止接入定时器。
具体地,当检查结果显示在UE自身所处的工作状况下禁止接入网络时,启动单元325启动针对UE自身所处的工作状况的禁止接入定时器,所述禁止接入定时器指示针对UE自身所处的工作状况的禁止接入的时长。
启动单元325可以针对不同工作状况启动相同或不同的禁止接入定时器。
在步骤S808,UE 320的通知单元327在禁止接入定时器超时的情况下,向UE的上层通知接入禁止解除。
在启动单元325针对不同的工作状况启动相同的禁止接入定时器的情况下,通知单元327在该禁止接入定时器超时的情况下,向UE的上层通知网络接入禁止解除。
在启动单元325针对不同的工作状况启动不同的禁止接入定时器的情况下,通知单元327在被启动的禁止接入定时器超时的情况下,向UE的上层通知针对对应工作状况的网络接入禁止解除。
以下将结合本公开的另一示例场景详细描述本公开第三示例性实施例的接入控制方案。
在本公开的该示例场景中,UE可以在例如两种工作状况(但不限于此)下发起接入控制检查:
1)UE在空闲态或者非激活态下建立连接时;
2)UE在非激活态下进行数据传输时。
基站可以为UE配置对应于这两种工作状况的一个接入控制信息,即,将一个接入控制信息用于UE的这两种工作状况下的网络接入控制检查。
一旦检查结果是禁止接入,则UE将启动禁止接入定时器,以及可选地,通知上层接入失败。
可选地,UE可以根据上述工作状况的不同而启动不同的禁止接入定时器,例如,UE在工作状况1)下进行接入控制检查,如果检查结果是禁止接入,则UE将启动/激活禁止接入定时器T3;UE在工作状况2)下进行接入控制检查,如果检查结果是禁止接入,则UE将启动/激活禁止接入定时器T4。
当禁止接入定时器T3超时时,UE可以向上层指示空闲态或者非激活态下建立连接的禁止解除;当禁止接入定时器T4超时时,UE可以向上层 指示非激活态下传输数据的禁止解除。
在另一实施方式中,基站可以为UE配置对应于这两种工作状况的两个接入控制信息,即,将两个接入控制信息分别用于UE的这两种工作状况下的网络接入控制检查。
例如,第三接入控制信息用于UE在空闲态或者非激活态下建立连接时进行的接入控制检查;
第四接入控制信息用于UE在非激活态下传输数据时进行接入控制。
接收上述信息后,UE根据其所处的状态选择或者接入需求(例如建立连接、或传输数据等)对应的接入控制信息用于接入控制。例如,UE处于非激活态,需要发起连接建立,则UE采用第三接入控制信息进行接入控制;又例如,UE处于非激活态,需要进行数据传输,则UE采用第四接入控制信息进行接入控制。
可选地,基于第三接入控制信息激活的禁止接入定时器与基于第四接入控制信息激活的禁止接入定时器可以相同或者不同。如果不同,例如基于第三接入控制信息激活的禁止接入定时器为T5,基于第四接入控制信息激活的禁止接入定时器为T6,则当禁止接入定时器T5超时时,UE可以向上层指示空闲态或非激活态下建立连接的禁止解除;当禁止接入定时器T6超时时,UE可以向上层指示非激活态下传输数据的禁止解除。
运行在根据本发明的设备上的程序可以是通过控制中央处理单元(CPU)来使计算机实现本发明的实施例功能的程序。该程序或由该程序处理的信息可以临时存储在易失性存储器(如随机存取存储器RAM)、硬盘驱动器(HDD)、非易失性存储器(如闪速存储器)、或其他存储器系统中。
用于实现本发明各实施例功能的程序可以记录在计算机可读记录介质上。可以通过使计算机系统读取记录在所述记录介质上的程序并执行这些程序来实现相应的功能。此处的所谓“计算机系统”可以是嵌入在该设备中的计算机系统,可以包括操作系统或硬件(如外围设备)。“计算机可读记录介质”可以是半导体记录介质、光学记录介质、磁性记录介质、短时动态存储程序的记录介质、或计算机可读的任何其他记录介质。
用在上述实施例中的设备的各种特征或功能模块可以通过电路(例如,单片或多片集成电路)来实现或执行。设计用于执行本说明书所描述的功能的电路可以包括通用处理器、数字信号处理器(DSP)、专用集成电路(ASIC)、现场可编程门阵列(FPGA)、或其他可编程逻辑器件、分立的门或晶体管逻辑、分立的硬件组件、或上述器件的任意组合。通用处理器可以是微处理器,也可以是任何现有的处理器、控制器、微控制器、或状态机。上述电路可以是数字电路,也可以是模拟电路。因半导体技术的进步而出现了替代现有集成电路的新的集成电路技术的情况下,本发明的一个或多个实施例也可以使用这些新的集成电路技术来实现。
此外,本发明并不局限于上述实施例。尽管已经描述了所述实施例的各种示例,但本发明并不局限于此。安装在室内或室外的固定或非移动电子设备可以用作终端设备或通信设备,如AV设备、厨房设备、清洁设备、空调、办公设备、自动贩售机、以及其他家用电器等。
如上,已经参考附图对本发明的实施例进行了详细描述。但是,具体的结构并不局限于上述实施例,本发明也包括不偏离本发明主旨的任何设计改动。另外,可以在权利要求的范围内对本发明进行多种改动,通过适当地组合不同实施例所公开的技术手段所得到的实施例也包含在本发明的技术范围内。此外,上述实施例中所描述的具有相同效果的组件可以相互替代。

Claims (44)

  1. 一种在用户设备UE处执行的方法,包括:
    从基站接收与多个网络类型相对应的多个接入控制信息;
    利用接收到的多个接入控制信息,分别执行针对多个网络类型的网络的接入控制检查;
    根据接入控制检查的结果,启动禁止接入定时器;以及
    在禁止接入定时器超时的情况下,向UE的上层通知接入禁止解除。
  2. 根据权利要求1所述的方法,还包括:
    当检查结果显示禁止接入至少一个网络类型的网络时,分别启动针对所述至少一个网络类型的网络设置的至少一个禁止接入定时器,每个禁止接入定时器指示针对对应网络类型的网络的禁止接入的时长。
  3. 根据权利要求2所述的方法,其中
    在所述至少一个禁止接入定时器之一超时的情况下,向UE的上层通知针对对应网络类型的网络的接入禁止解除;或
    在所述至少一个禁止接入定时器均超时的情况下,向UE的上层通知针对对应网络类型的网络的接入禁止解除。
  4. 根据权利要求2所述的方法,还包括:
    在所述至少一个禁止接入定时器均未被启动的情况下,发起与未被启动的禁止接入定时器相对应的网络类型的网络中的任意一个的连接建立请求;否则,向UE的上层通知连接建立失败;或
    在所述至少一个禁止接入定时器中至少有一个未被启动的情况下,发起与未被启动的禁止接入定时器相对应的网络类型的网络中的任意一个的连接建立请求。
  5. 根据权利要求1所述的方法,还包括:
    当检查结果显示禁止接入至少一个网络类型的网络时,分别生成针对所述至少一个网络类型的网络的至少一个值,每个值指示针对对应网络类型的网络的禁止接入的时长,
    其中当所述至少一个值均为有效值时,启动禁止接入定时器,并将所述至少一个值中的最小值或最大值作为所述禁止接入定时器用于禁止网络接入的时长,
    当所述至少一个值中至少有一个为无效值时,不启动所述禁止接入定时器。
  6. 根据权利要求1所述的方法,其中
    所述多个接入控制信息在相同或不同的系统信息中广播。
  7. 一种用户设备UE,包括:
    收发机,被配置为从基站接收分别与多个网络类型相对应的多个接入控制信息;
    检查单元,被配置为利用接收到的多个接入控制信息,分别执行针对多个网络类型的网络的接入控制检查;
    启动单元,被配置为根据接入控制检查的结果,启动禁止接入定时器;以及
    通知单元,被配置为在禁止接入定时器超时的情况下,向UE的上层通知接入禁止解除。
  8. 根据权利要求7所述的UE,其中
    所述启动单元进一步被配置为:当检查结果显示禁止接入至少一个网络类型的网络时,分别启动针对所述至少一个网络类型的网络设置的至少一个禁止接入定时器,每个禁止接入定时器指示针对对应网络类型的网络的禁止接入的时长。
  9. 根据权利要求8所述的UE,其中
    所述通知单元进一步被配置为:
    在所述至少一个禁止接入定时器之一超时的情况下,向UE的上层通知针对对应网络类型的网络的接入禁止解除;或
    在所述至少一个禁止接入定时器均超时的情况下,向UE的上层通知针对对应网络类型的网络的接入禁止解除。
  10. 根据权利要求8所述的UE,还包括:
    请求单元,被配置为在所述至少一个禁止接入定时器均未被启动的情况下,发起与未被启动的禁止接入定时器相对应的网络类型的网络中的任 意一个的连接建立请求;否则,由所述通知单元向UE的上层通知连接建立失败;或
    请求单元,被配置为在所述至少一个禁止接入定时器中至少有一个未被启动的情况下,发起与未被启动的禁止接入定时器相对应的网络类型的网络中的任意一个的连接建立请求。
  11. 根据权利要求7所述的UE,还包括:
    生成单元,被配置为当检查结果显示禁止接入至少一个网络类型的网络时,分别生成针对所述至少一个网络类型的网络的至少一个值,每个值指示针对对应网络类型的网络的禁止接入的时长,
    所述启动单元进一步被配置为:当所述至少一个值均为有效值时,启动禁止接入定时器,并将所述至少一个值中的最小值或最大值作为所述禁止接入定时器用于禁止网络接入的时长;以及当所述至少一个值中至少有一个为无效值时,不启动所述禁止接入定时器。
  12. 根据权利要求7所述的UE,其中
    所述多个接入控制信息在相同或不同的系统信息中广播。
  13. 一种在用户设备UE处执行的方法,包括:
    从多个网络类型中选择要用于提供服务的网络类型;
    从基站接收与所选网络类型相对应的接入控制信息;
    利用接收到的接入控制信息,执行针对所选网络类型的网络的接入控制检查;
    根据接入控制检查的结果,启动禁止接入定时器;以及
    在禁止接入定时器超时的情况下,向UE的上层通知接入禁止解除。
  14. 根据权利要求13所述的方法,其中选择要用于提供服务的网络类型基于以下各项之一:
    从UE的上层接收的包含所选网络类型的指示;
    从基站接收的系统信息或专有信令中包含的关于网络类型优先级的信息;
    UE已注册的核心网类型。
  15. 根据权利要求13或14所述的方法,还包括:
    当检查结果显示禁止接入所选网络类型的网络时,启动针对所选网络类型的网络的禁止接入定时器,所述禁止接入定时器指示针对所选网络类型的网络的禁止接入的时长。
  16. 根据权利要求15所述的方法,其中
    针对不同网络类型启动相同或不同的禁止接入定时器。
  17. 一种用户设备UE,包括:
    选择单元,被配置为从多个网络类型中选择要用于提供服务的网络类型;
    收发机,被配置为从基站接收与所选网络类型相对应的接入控制信息;
    检查单元,被配置为利用接收到的接入控制信息,执行针对所选网络类型的网络的接入控制检查;
    启动单元,被配置为根据接入控制检查的结果,启动禁止接入定时器;以及
    通知单元,被配置为在禁止接入定时器超时的情况下,向UE的上层通知接入禁止解除。
  18. 根据权利要求17所述的UE,其中所述选择单元基于以下各项之一选择要用于提供服务的网络类型:
    从UE的上层接收的包含所选网络类型的指示;
    从基站接收的系统信息或专有信令中包含的关于网络类型优先级的信息;
    UE已注册的核心网类型。
  19. 根据权利要求17或18所述的UE,其中
    所述启动单元进一步被配置为:当检查结果显示禁止接入所选网络类型的网络时,启动针对所选网络类型的网络的禁止接入定时器,所述禁止接入定时器指示针对所选网络类型的网络的禁止接入的时长。
  20. 根据权利要求19所述的UE,其中
    针对不同网络类型启动相同或不同的禁止接入定时器。
  21. 一种在基站处执行的方法,包括:
    配置分别与基站所支持的多个网络类型相对应的多个接入控制信息;以及
    向用户设备UE发送所述多个接入控制信息。
  22. 根据权利要求21所述的方法,其中
    所述多个接入控制信息在相同或不同的系统信息中广播。
  23. 一种基站,包括:
    配置单元,用于配置分别与基站所支持的不同网络类型相对应的多个接入控制信息;以及
    收发机,用于向用户设备UE发送所述多个接入控制信息。
  24. 根据权利要求23所述的基站,其中
    所述多个接入控制信息在相同或不同的系统信息中广播。
  25. 一种在用户设备UE处执行的方法,包括:
    从基站接收与UE的多种工作状况相对应的一个接入控制信息或与UE的多种工作状况相对应的多个接入控制信息,所述多种工作状况指示UE在不同状态下的不同接入需求;
    根据UE自身所处的工作状况,利用接收到的接入控制信息,执行网络接入控制检查;
    根据接入控制检查的结果,启动禁止接入定时器;以及
    在禁止接入定时器超时的情况下,向UE的上层通知接入禁止解除。
  26. 根据权利要求25所述的方法,其中
    将一个接入控制信息用于UE的多种工作状况下的网络接入控制检查。
  27. 根据权利要求25所述的方法,其中
    将多个接入控制信息分别用于UE的多种工作状况下的网络接入控制检查,以及
    执行网络接入控制检查的步骤进一步包括:
    利用接收到的与UE自身所处的工作状况相对应的接入控制信息,执行针对所述工作状况的接入控制检查。
  28. 根据权利要求25所述的方法,其中所述工作状况至少包括:
    处于空闲态或非激活态的UE建立连接;
    处于非激活态的UE进行数据传输。
  29. 根据权利要求25所述的方法,还包括:
    当检查结果显示在UE自身所处的工作状况下禁止接入网络时,启动针对UE自身所处的工作状况的禁止接入定时器,所述禁止接入定时器指示针对UE自身所处的工作状况的禁止接入的时长。
  30. 根据权利要求29所述的方法,其中针对不同的工作状况启动相同的禁止接入定时器,以及
    在所述禁止接入定时器超时的情况下,向UE的上层通知网络接入禁止解除。
  31. 根据权利要求29所述的方法,其中针对不同的工作状况启动不同的禁止接入定时器,以及
    在被启动的禁止接入定时器超时的情况下,向UE的上层通知针对对应工作状况的网络接入禁止解除。
  32. 一种用户设备UE,包括:
    收发机,被配置为从基站接收与UE的多种工作状况相对应的一个接入控制信息或与UE的多种工作状况相对应的多个接入控制信息,所述多种工作状况指示UE在不同状态下的不同接入需求;
    检查单元,被配置为根据UE自身所处的工作状况,利用接收到的接入控制信息,执行网络接入控制检查;
    启动单元,被配置为根据接入控制检查的结果,启动禁止接入定时器;以及
    通知单元,被配置为在禁止接入定时器超时的情况下,向UE的上层通知接入禁止解除。
  33. 根据权利要求32所述的UE,其中
    将一个接入控制信息用于UE的多种工作状况下的网络接入控制检查。
  34. 根据权利要求32所述的UE,其中
    将多个接入控制信息分别用于UE的多种工作状况下的网络接入控制检查,以及
    所述检查单元进一步被配置为:
    利用接收到的与UE自身所处的工作状况相对应的接入控制信息,执行针对所述工作状况的接入控制检查。
  35. 根据权利要求32所述的UE,其中所述工作状况至少包括:
    处于空闲态或非激活态的UE建立连接;
    处于非激活态的UE进行数据传输。
  36. 根据权利要求32所述的UE,其中
    所述启动单元还被配置为:当检查结果显示在UE自身所处的工作状况下禁止接入网络时,启动针对UE自身所处的工作状况的禁止接入定时器,所述禁止接入定时器指示针对UE自身所处的工作状况的禁止接入的时长。
  37. 根据权利要求36所述的UE,其中所述启动单元针对不同的工作状况启动相同的禁止接入定时器,以及
    所述通知单元在所述禁止接入定时器超时的情况下,向UE的上层通知网络接入禁止解除。
  38. 根据权利要求36所述的UE,其中针对不同的工作状况启动不同的禁止接入定时器,以及所述通知单元进一步被配置为:
    在被启动的禁止接入定时器超时的情况下,向UE的上层通知针对对应工作状况的网络接入禁止解除。
  39. 一种在基站处执行的方法,包括:
    针对用户设备UE的多种工作状况,分别配置与所述多种工作状况相对应的一个接入控制信息或与所述多种工作状况相对应的多个接入控制信息,所述多种工作状况指示UE在不同状态下的不同接入需求;以及
    向UE发送所述一个接入控制信息或多个接入控制信息。
  40. 根据权利要求39所述的方法,其中所述工作状况至少包括:
    处于空闲态或非激活态的UE建立连接;
    处于非激活态的UE进行数据传输。
  41. 根据权利要求39或40所述的方法,其中
    所述多个接入控制信息在相同或不同的系统信息中广播。
  42. 一种基站,包括:
    配置单元,用于针对用户设备UE的多种工作状况,分别配置与所述多种工作状况相对应的一个接入控制信息或与所述多种工作状况相对应的多个接入控制信息,所述多种工作状况指示UE在不同状态下的不同接入需求;以及
    收发机,用于向UE发送所述一个接入控制信息或多个接入控制信息。
  43. 根据权利要求42所述的基站,其中所述工作状况至少包括:
    处于空闲态或非激活态的UE建立连接;
    处于非激活态的UE进行数据传输。
  44. 根据权利要求42或43所述的基站,其中
    所述多个接入控制信息在相同或不同的系统信息中广播。
PCT/CN2017/116899 2017-01-06 2017-12-18 接入控制相关方法、基站和用户设备 Ceased WO2018126881A1 (zh)

Priority Applications (8)

Application Number Priority Date Filing Date Title
KR1020197020722A KR20190102007A (ko) 2017-01-06 2017-12-18 액세스 제어 관련 방법, 기지국 및 사용자 장비
KR1020227022083A KR102581799B1 (ko) 2017-01-06 2017-12-18 액세스 제어 관련 방법, 기지국 및 사용자 장비
NZ755555A NZ755555B2 (en) 2017-12-18 Access control related method, base station and user equipment
CA3048548A CA3048548A1 (en) 2017-01-06 2017-12-18 Access control related method, base station and user equipment
EP17890160.9A EP3567903B1 (en) 2017-01-06 2017-12-18 Access control related method and user equipment
US16/475,507 US11582680B2 (en) 2017-01-06 2017-12-18 Access control related method, base station, and user equipment
BR112019013374A BR112019013374A2 (pt) 2017-01-06 2017-12-18 método relacionado a controle de acesso, estação base, e equipamento de usuário
ZA2019/04892A ZA201904892B (en) 2017-01-06 2019-07-25 Access control related method, base station and user equipment

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710012256.8A CN108282820B (zh) 2017-01-06 2017-01-06 接入控制相关方法、基站和用户设备
CN201710012256.8 2017-01-06

Publications (1)

Publication Number Publication Date
WO2018126881A1 true WO2018126881A1 (zh) 2018-07-12

Family

ID=62789120

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/116899 Ceased WO2018126881A1 (zh) 2017-01-06 2017-12-18 接入控制相关方法、基站和用户设备

Country Status (8)

Country Link
US (1) US11582680B2 (zh)
EP (1) EP3567903B1 (zh)
KR (2) KR20190102007A (zh)
CN (1) CN108282820B (zh)
BR (1) BR112019013374A2 (zh)
CA (1) CA3048548A1 (zh)
WO (1) WO2018126881A1 (zh)
ZA (1) ZA201904892B (zh)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110784942B (zh) * 2018-07-31 2022-04-12 华为技术有限公司 一种连接建立方法及装置
US11432190B2 (en) * 2019-01-11 2022-08-30 Blackberry Limited Aggregation of data frames
US11202273B2 (en) 2019-11-08 2021-12-14 Blackberry Limited Aggregating messages into a single transmission
KR20240021552A (ko) * 2022-08-10 2024-02-19 삼성전자주식회사 Rrc 비활성 모드에서 mbs sps 수신을 위한 방법 및 장치

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013093192A1 (en) * 2011-12-19 2013-06-27 Nokia Corporation Deterministic user equipment barring
CN103857008A (zh) * 2012-12-03 2014-06-11 电信科学技术研究院 接入控制方法和设备
CN104168617A (zh) * 2014-07-04 2014-11-26 重庆邮电大学 一种用于5g蜂窝网络中多rat选择/切换的方法
CN104284398A (zh) * 2008-09-22 2015-01-14 开曼群岛威睿电通股份有限公司 解除接入限制的使用者装置与方法

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8891356B2 (en) * 2010-06-28 2014-11-18 Qualcomm Incorporated System and method for multi-point HSDPA communication utilizing a multi-link RLC sublayer
US20140146796A1 (en) * 2012-11-27 2014-05-29 Qualcomm Incorporated Buffer size reporting in time division high speed uplink packet access (td-hsupa) systems
US8971893B2 (en) * 2012-11-29 2015-03-03 At&T Intellectual Property I, Lp Apparatus and method for management of radio resource control connections
WO2015037882A1 (ko) * 2013-09-13 2015-03-19 엘지전자 주식회사 제어 평면을 담당하는 네트워크 노드를 재선택하는 방법
CN107079368A (zh) * 2014-05-16 2017-08-18 联发科技(新加坡)私人有限公司 移动终端接入网络的增强机制
WO2017078424A1 (en) * 2015-11-03 2017-05-11 Lg Electronics Inc. Method and apparatus for controlling an access of a terminal in a wireless communication system
CN112333782B (zh) * 2016-11-04 2022-02-18 华为技术有限公司 一种小区重选方法及装置

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104284398A (zh) * 2008-09-22 2015-01-14 开曼群岛威睿电通股份有限公司 解除接入限制的使用者装置与方法
WO2013093192A1 (en) * 2011-12-19 2013-06-27 Nokia Corporation Deterministic user equipment barring
CN103857008A (zh) * 2012-12-03 2014-06-11 电信科学技术研究院 接入控制方法和设备
CN104168617A (zh) * 2014-07-04 2014-11-26 重庆邮电大学 一种用于5g蜂窝网络中多rat选择/切换的方法

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
HUAWEI ET AL.: "Network Selection and Access Control Framework for eLTE", 3GPP TSG-RAN WG2 MEETING #96 R2-168196, 4 November 2016 (2016-11-04), XP051192974 *

Also Published As

Publication number Publication date
KR20190102007A (ko) 2019-09-02
US20190327664A1 (en) 2019-10-24
BR112019013374A2 (pt) 2019-12-17
CN108282820A (zh) 2018-07-13
EP3567903C0 (en) 2023-10-11
NZ755555A (en) 2025-03-28
EP3567903B1 (en) 2023-10-11
EP3567903A4 (en) 2020-09-23
US11582680B2 (en) 2023-02-14
KR20220098395A (ko) 2022-07-12
EP3567903A1 (en) 2019-11-13
KR102581799B1 (ko) 2023-09-25
CA3048548A1 (en) 2018-07-12
CN108282820B (zh) 2022-12-30
ZA201904892B (en) 2020-12-23

Similar Documents

Publication Publication Date Title
US11452160B2 (en) Radio terminal, base station, and method therefor
JP6969636B2 (ja) 無線端末、無線端末における方法、及び無線局
AU2020214502B2 (en) Communication method, apparatus, and system
US9955419B2 (en) Network nodes, a user equipment and methods therein for establishing a connection between the user equipment and a wireless communications network
CN110651511B (zh) 参与无线电接入网更新过程的用户设备和基站
JP7720977B2 (ja) ユーザ機器および方法
US9723476B2 (en) Location registration for a device-to-device (D2D) user equipment
CN110178439A (zh) 用于扩展覆盖的按需系统信息传递
CN108541034A (zh) 处理状态的转换的装置及方法
KR20160048186A (ko) 무선 링크 실패 동안의 콜 관리
CN111385830A (zh) 通信方法和装置
US20190297562A1 (en) Mobile telecommunications system method, user equipment and base station for transmitting on demand system information
EP3664511B1 (en) Method and device for resetting media access control layer
WO2020062820A1 (zh) 信号传输方法及通信装置
WO2019192387A1 (zh) 接入控制方法及用户设备
WO2018126881A1 (zh) 接入控制相关方法、基站和用户设备
KR102812131B1 (ko) 사용자 장비에 의해 구현되는 방법 및 사용자 장비
CN110063087A (zh) 会话管理层拥塞控制中处理退避计时器的方法和装置
RU2769540C2 (ru) Способ конфигурации ширины полосы и электронное устройство для его осуществления
WO2020156488A1 (zh) 一种通信方法、装置及系统
US20240365423A1 (en) Method and apparatus for small data transmission
CN115604864A (zh) 用于释放rrc连接的方法和用户设备
JP2022108426A (ja) ユーザ機器、基地局及びネットワークノード

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17890160

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 3048548

Country of ref document: CA

NENP Non-entry into the national phase

Ref country code: DE

REG Reference to national code

Ref country code: BR

Ref legal event code: B01A

Ref document number: 112019013374

Country of ref document: BR

ENP Entry into the national phase

Ref document number: 20197020722

Country of ref document: KR

Kind code of ref document: A

ENP Entry into the national phase

Ref document number: 2017890160

Country of ref document: EP

Effective date: 20190806

ENP Entry into the national phase

Ref document number: 112019013374

Country of ref document: BR

Kind code of ref document: A2

Effective date: 20190627

WWG Wipo information: grant in national office

Ref document number: 755555

Country of ref document: NZ