This disclosure relates to the field of communication technologies.
Compared with traditional 3G (third generation mobile communication technology) and 4G (fourth generation mobile communication technology) systems, a 5G (fifth generation mobile communication technology) system can provide larger bandwidths and higher data rates, and can support more types of terminals and vertical services. For this reason, a deployment frequency of a 5G system is obviously higher than those of 3G and 4G systems. For example, a 5G system may be deployed in a millimeter waveband.
However, the higher a carrier frequency, the more severe a fading experienced by signals during transmission. Therefore, in actual deployment of a 5G system, especially in the millimeter waveband, how to better enhance cell coverage becomes an urgent problem to be solved.
It should be noted that the above description of the background is merely provided for clear and complete explanation of this disclosure and for easy understanding by those skilled in the art. And it should not be understood that the above technical solution is known to those skilled in the art as it is described in the background of this disclosure.
In order to better solve the coverage problem of cellular mobile communication systems in practical deployment, use of a radio frequency (RF) repeater to amplify and forward signals between a terminal equipment and a network device is commonly used means of deployment. RF repeaters are widely used in actual deployment of 3G and 4G systems. Generally speaking, an RF repeater is a device that amplifies and forwards signals between a network device and a terminal equipment in the RF domain.
One of feasible solutions to address the coverage problem encountered in the deployment of 5G systems is to use RF repeaters for coverage enhancement. However, traditional repeaters do not have the ability to communicate with network devices and cannot obtain information on uplink and downlink configurations from the network devices. Therefore, deploying such repeaters in 5G systems, although it is helpful to enhancement of signal strengths, is not flexible enough to cope with complex environmental changes, and thus cannot achieve the same effects as deploying the same RF repeaters in 3G and 4G systems.
A smart repeater is enhancement of a traditional RF repeater, and has the ability to receive and process side control information from a network. The side control information allows the smart repeater to perform its amplification and forwarding operations in a more efficient manner. Hence, unnecessary noise amplification may be reduced, transmission and reception having better spatial directionality may be provided, and network integration may be simplified.
However, it was found by the inventors that for scenarios where smart repeaters are deployed, there is currently no research on how the smart repeaters perform access control.
In order to solve at least one of the above problems, embodiments of this disclosure provide an access control method and apparatus and a system.
According to one aspect of the embodiments of this disclosure, there is provided an access control apparatus, applicable to a repeater, the apparatus including:
According to another aspect of the embodiments of this disclosure, there is provided an access control apparatus, applicable to a network device, the apparatus including:
According to a further aspect of the embodiments of this disclosure, there is provided a communication system, including a network device and/or a repeater, the repeater including the access control apparatus described in the one aspect, and the network device including the access control apparatus described in the other aspect.
An advantage of the embodiments of this disclosure exists in that the repeater ignores the first information contained in the first message related to access control, and/or skips over first processing related to the access control, and/or performs second processing related to the access control, so that the repeater may not be controlled by an existing access control mechanism. Hence, network congestion may be alleviated, and the deployment cost may be lowered.
With reference to the following description and drawings, the particular embodiments of this disclosure are disclosed in detail, and the principle of this disclosure and the manners of use are indicated. It should be understood that the scope of the embodiments of this disclosure is not limited thereto. The embodiments of this disclosure contain many alternations, modifications and equivalents within the spirits and scope of the terms of the appended claims.
Features that are described and/or illustrated with respect to one embodiment may be used in the same way or in a similar way in one or more other embodiments and/or in combination with or instead of the features of the other embodiments.
It should be emphasized that the term “comprises/comprising/includes/including” when used in this specification is taken to specify the presence of stated features, integers, steps or components but does not preclude the presence or addition of one or more other features, integers, steps, components or groups thereof.
Elements and features depicted in one drawing or embodiment of the disclosure may be combined with elements and features depicted in one or more additional drawings or embodiments. Moreover, in the drawings, like reference numerals designate corresponding parts throughout the several views and may be used to designate like or similar parts in more than one embodiment.
These and further aspects and features of this disclosure will be apparent with reference to the following description and attached drawings. In the description and drawings, particular embodiments of the disclosure have been disclosed in detail as being indicative of some of the ways in which the principles of the disclosure may be employed, but it is understood that the disclosure is not limited correspondingly in scope. Rather, the disclosure includes all changes, modifications and equivalents coming within the spirit and terms of the appended claims.
In the embodiments of this disclosure, terms “first”, and “second”, etc., are used to differentiate different elements with respect to names, and do not indicate spatial arrangement or temporal orders of these elements, and these elements should not be limited by these terms. Terms “and/or” include any one and all combinations of one or more relevantly listed terms. Terms “contain”, “include” and “have” refer to existence of stated features, elements, components, or assemblies, but do not exclude existence or addition of one or more other features, elements, components, or assemblies.
In the embodiments of this disclosure, single forms “a”, and “the”, etc., include plural forms, and should be understood as “a kind of” or “a type of” in a broad sense, but should not defined as a meaning of “one”; and the term “the” should be understood as including both a single form and a plural form, except specified otherwise. Furthermore, the term “according to” should be understood as “at least partially according to”, the term “based on” should be understood as “at least partially based on”, except specified otherwise.
In the embodiments of this disclosure, the term “communication network” or “wireless communication network” may refer to a network satisfying any one of the following communication standards: long term evolution (LTE), long term evolution-advanced (LTE-A), wideband code division multiple access (WCDMA), and high-speed packet access (HSPA), etc.
And communication between devices in a communication system may be performed according to communication protocols at any stage, which may, for example, include but not limited to the following communication protocols: 1G (generation), 2G, 2.5G, 2.75G, 3G, 4G, 4.5G, and 5G and new radio (NR) in the future, etc., and/or other communication protocols that are currently known or will be developed in the future.
In the embodiments of this disclosure, the term “network device”, for example, refers to a device in a communication system that accesses a user equipment to the communication network and provides services for the user equipment. The network device may include but not limited to the following devices: a base station (BS), an access point (AP), a transmission reception point (TRP), a broadcast transmitter, a mobile management entity (MME), a gateway, a server, a radio network controller (RNC), a base station controller (BSC), etc.
The base station may include but not limited to a node B (NodeB or NB), an evolved node B (eNodeB or eNB), and a 5G base station (gNB), etc. Furthermore, it may include a remote radio head (RRH), a remote radio unit (RRU), a relay, or a low-power node (such as a femto, and a pico, etc.). The term “base station” may include some or all of its functions, and each base station may provide communication coverage for a specific geographical area. And a term “cell” may refer to a base station and/or its coverage area, depending on a context of the term. Without causing confusion, “a cell” and “a base station” are interchangeable.
In the embodiments of this disclosure, the term “user equipment (UE)” or “a terminal equipment (TE) or a terminal device” refers to, for example, an equipment accessing to a communication network and receiving network services via a network device. The terminal equipment may be fixed or mobile, and may also be referred to as a mobile station (MS), a terminal, a subscriber station (SS), an access terminal (AT), an IAB-MT, or a station, etc.
The terminal equipment may include but not limited to the following devices: a cellular phone, a personal digital assistant (PDA), a wireless modem, a wireless communication device, a hand-held device, a Machine-type communication device, a lap-top, a cordless telephone, a smart cell phone, a smart watch, and a digital camera, etc.
For another example, in a scenario of the Internet of Things (IoT), etc., the user equipment may also be a Machine or a device performing monitoring or measurement. For example, it may include but not limited to a Machine-type communication (MTC) terminal, a vehicle mounted communication terminal, a device to device (D2D) terminal, and a machine to machine (M2M) terminal, etc.
Moreover, the term “network side” or “network device side” refers to a side of a network, which may be a base station or a core network device, and may include one or more network devices described above. The term “user side” or “terminal side” or “terminal equipment side” refers to a side of a user or a terminal, which may be a UE, and may include one or more terminal equipments described above. In this text, “a device” may refer to a network device, or may refer to a terminal equipment, except specified otherwise.
Scenarios of the embodiments of this disclosure shall be described below by way of examples; however, this disclosure is not limited thereto.
As shown in
In the embodiment of this disclosure, existing traffics or traffics that may be implemented in the future may be performed between the network device and the terminal equipment. For example, such traffics may include but not limited to enhanced mobile broadband (eMBB), massive machine type communication (MTC), ultra-reliable and low-latency communication (URLLC), and Vehicle to Everything (V2X), etc.
Description in
In the present embodiment, the beam may also be expressed as a lobe, a reference signal (RS), a transmission configuration indication (TCI), and a spatial domain filter, etc., or, it may also be expressed as a beam index, a lobe index, a reference signal index, a transmission configuration indication index, and a spatial filter index, etc. The reference signal is, for example, a channel state information reference signal (CSI-RS), a sounding reference signal (SRS), an RS for use by a repeater, and an RS transmitted by a repeater, etc. The TCI may also be expressed as a TCI state.
In the embodiments of this disclosure, the repeater may also be expressed as a network controlled repeater (NCR), or a reconfigurable intelligent surface (RIS), or a repeater station, or a relay, or a radio frequency repeater, or a radio frequency relay; or, it may also be expressed as a repeater station node, a relay node; or, it may also be expressed as an intelligent repeater station, an intelligent relay, an intelligent repeater station node, and an intelligent relay node, etc. The repeater may be a node, or a device, or an entity, etc., and this disclosure is not limited thereto.
In the embodiment of this disclosure, the network device may be a device of a serving cell of a terminal equipment, or may also be a device of a cell where the repeater is located, or a device of a serving cell of the repeater, or a parent node of the repeater. Names of the repeater are not limited in this disclosure, and any device capable of achieving the above functions is included in the scope of the repeater of this application.
Currently, taking network congestion and other issues into account, NG-RAN supports overload and access control functionality, including a backoff in a random access procedure, radio resource control (RRC) connection rejection, RRC connection release, and a UE based access barring mechanism.
For example, in the random access procedure, the terminal equipment may possibly receive a backoff indication, the backoff mechanism is applicable to a contention-based random access procedure, and the backoff indication specifies a range of time needed by the terminal equipment in waiting before reselecting random access resources and/or transmitting random access preambles. The terminal equipment obtains a PREAMBLE_BACKOFF value according to the backoff indication, multiplies the value by a coefficient SCALING_FACTOR_BI, takes a random value between 0 and PREAMBLE_BACKOFF×SCALING_FACTOR_BI, in a case where random access is unsuccessful, after waiting for a period of the random value, performs selection and/or determination of random access resources and/or random access preambles, and transmits selected/determined random access preambles on determined random access resources.
For example, in the random access procedure, the terminal equipment may transmit a radio resource control (RRC) establishment request or resume request to a network side, the request carrying an establishment cause or resume cause. Based on the establishment cause or resume cause, the network side may determine whether to accept the request, and if the network side accepts the request, it may transmit an RRC establishment message or an RRC resume message, otherwise, it may make a response with an RRC reject message. By accepting or rejecting the RRC establishment request or the RRC resume request, the network side may control the congestion situation.
The network device prioritizes access attempts (i.e. emergency calls, MPS, and MCS users) with establishment causes of “emergency”, “mps-PriorityAccess” and “mcs-PriorityAccess”, and only makes response to these access attempts with connection reject messages under extreme network load conditions that may pose a threat to the stability of network device.
For example, RRC connection release is usually initiated by the network device, and a purpose of an RRCRelease procedure is to release RRC connection, including release of established radio bearers, backhaul radio link control (BH LRC) channels and radio resources.
The RRC connection release procedure may also be used to reorient the terminal equipment to an NR frequency or an E-UTRA carrier frequency. A reorientation mechanism in the RRC release may be used to achieve load balancing in NR.
For example, an access barring mechanism based on a terminal equipment is used for a unified access control procedure/mechanism/architecture, that is, a terminal-equipment-based access barring mechanism. The network side may broadcast access control parameters, and based on access control parameters applicable to access categories to which the access attempts correspond, the network device checks whether to make actual access attempts. A unified access control mechanism may be applicable to user equipment that access to a 5G core network by using the Evolved Universal Mobile Telecommunications System (UMTS) Terrestrial Radio Access (E-UTRA) or NR. In addition, this mechanism may also be applicable a case where a user equipment in an idle or inactive or connected state initiates a new access attempt (such as a new session request, such as before transmitting MSG3, before transmitting a connection request message, or before transmitting a connection resume request message).
The NG-RAN broadcasts access control parameters associated with access categories and access IDs (in case of network sharing, the access control parameters may be set separately for each public land mobile communication network (PLMN)).
Based on the prohibited information broadcast for the access categories and access IDs selected for the selected PLMN and access attempts, the terminal equipment determines whether an access attempt is granted, for a request triggered by a non-access stratum (NAS, an upper layer), the NAS determines the access categories and access IDs, and for a request triggered by an access stratum (AS), RRC determines the access categories while the NAS determines the access IDs.
It was found by the inventors that for a scenario where a smart repeater is deployed, there is currently no research on how the smart repeater performs access control. The inventors believe that as a repeater does not initiate actual services, network congestion will not be caused, and the repeater does not need to be controlled by an access control mechanism. In addition, after the repeater is connected to the network, it will provide better radio quality for a terminal equipment at an edge of a cell, which may improve resource utilization, reduce resources needed in transmission, and effectively alleviate network congestion. This further indicates that the repeater does not need to be controlled by an access control mechanism.
It was further found by the inventors that if an existing access control mechanism for terminal equipment is followed, the repeater is controlled by the access control mechanism and may not be to access the network, thereby limiting application scenarios of the repeater and increasing deployment costs.
Addressed to the above problems, this disclosure shall be described below with reference to various implementations of the embodiments. These implementations are illustrative only and are not intended to limit this disclosure.
The embodiment of this disclosure provides an access control method, which shall be described from a terminal equipment.
With the embodiment of this disclosure, the repeater ignores the first information contained in the first message related to the access control, and/or skips over first processing related to the access control, and/or performs second processing related to the access control, so that the repeater is not controlled by an existing access control mechanism, thereby alleviating network congestion and lowering deployment costs. The “is not controlled” may be replaced with “is not applied/applicable”, “does not use”, “ignores”, or “skips over”, etc., and this disclosure is not limited thereto.
The existing access control mechanism mainly includes: backoff in a random access procedure, radio resource control (RRC) rejection, RRC release, and a unified access control procedure. Behaviors of the repeater in the above scenarios of access control mechanism shall be respectively described below, and the first message related to the access control is the first message in the above access control process.
In some embodiments, the random access procedure may be related contention-based random access, including two times of interaction (4-step RA) between the network device and the terminal equipment. In the first time of interaction, the terminal equipment initiates a random access request (MSG1) and receives a random access response (MSG2) fed back by the network device. In the second time of interaction, the terminal equipment transmits information including a user identifier (MSG3) to the network device and receives MSG4 fed back by the network device; or, the random access procedure may also be two-step random access (2-step RA), that is, original MSG1 and MSG3 are merged into a new MSGA, and MSG2 and MSG4 are merged into MSGB, and reference may be made to existing techniques for details, which shall not be repeated herein any further.
In some embodiments, the first message may include a random access response (RAR) in MSG2 or MSGB, and the first information may include backoff indication related information, the backoff indication related information being, for example, an MAC subheader carrying a backoff indication field. A value of the backoff indication field may be regarded as an index value of a backoff parameter, that is, the backoff indication field is used to indicate a backoff parameter value, which denotes a range of time needed in waiting before retransmitting a random access preamble. In 701, “receives” in “receives the first message related to access control by the repeater” may also be replaced with “detecting”, “received”, or “attempting to receive”, that is, the “receive” here may indicate that the repeater performs a behavior of receiving (detecting) the first message, but does not indicate success or failure of reception, that is, the repeater may have received the first message or attempted to receive the first message but unsuccessful received it; however, the embodiment of this disclosure is not limited thereto.
In some embodiments, when the network device may distinguish between the terminal equipment and the repeater before transmitting the first message, the RAR or MSGB does not contain backoff indication related information, or contains backoff indication related information, and a value of the backoff indication field carried in the backoff indication related information is a specific value, which may be a specific value other than 0-13. The backoff parameter value to which the specific value (index) corresponds is 0 (ms), for example, the specific value may be 14 or 15; however, the embodiment of this disclosure is not limited thereto.
For example, when the first message is an RAR, the RAR does not contain MAC subheader (sub-PDU) carrying a backoff indication field, or, the RAR contains an MAC subheader (sub-PDU) carrying a backoff indication field, but a value of the backoff indication field is the specific value.
For example, when the first message is an MSGB, the MSGB may not contain an MAC subheader (sub-PDU) carrying a backoff indication field. For example, a value of a T1 field in the MSGB is 1 (indicating that the MAC subheader includes a random access preamble but does not include a T2 field, that is, it does not include a BI field), or a value of the T1 field in MSGB1 is 0 but a value of the T2 field is 1 (indicating that the MAC subheader contains an MAC SDU indicator but does not include the backoff indication field).
For example, when the first message is an MSGB, the MSGB may contain an MAC subheader (sub-PDU) carrying a backoff indication field. For example, a value of a T1 field in MSGB1 is 0, and a value of T2 field therein is 0 (indicating that the MAC subheader contains a backoff indication field), but a value of the backoff indication field is the specific value.
It can be seen from the above embodiment that as the first message does not contain backoff indication related information, or the value of the backoff indication field is a specific value (equivalent to that a backoff parameter value is 0 (ms)), in 702, the repeater skips over the first processing related to the access control after receiving the first message, such as not needing to perform backoff (waiting), that is, it is not controlled by the backoff mechanism in the random access procedure. Hence, network congestion may be alleviated and deployment costs may be lowered.
In some embodiments, before transmitting the first message, no matter whether the network device can distinguish between the terminal equipment and the repeater, the RAR or MSGB may contain the backoff indication related information. In 702, the ignoring the backoff indication and/or skipping over the first processing related to the access control by the repeater include(s) setting PREAMBLE_BACKOFF to be 0. That is, regardless of the value indicated by the backoff indication, the repeater does not need to look up a table to acquire a value of PREAMBLE-BACKOFF corresponding to the BI, rather, it directly sets PREAMBLE-BACKOFF to be 0. Hence, the repeater does not need to delay executing a random access resource selection procedure, or, in other words, the repeater executes the random access resource selection procedure with a wait time of 0, that is, it is not controlled by the backoff mechanism in the random access procedure. Hence, network congestion may be alleviated, and deployment costs may be lowered.
In some embodiments, when the first message is not successfully received in 701, in 702, the first processing related to the access control (including executing the random access resource selection process) is skipped over. For example, when the RAR is not successfully received, if the random access procedure is not completed, the repeater (immediately) executes the random access resource selection process. Thus, the repeater is not controlled by the backoff mechanism in the random access procedure. Hence, network congestion may be alleviated, and deployment costs may be lowered.
In some embodiments, the repeater receives the RAR in a random access response reception time window (ra-ResponseWindow, or msgB-ResponseWindow), the random access response reception time window being configured in beam failure recovery configuration BeamFailureRecoveryConfig or random access common configuration RACH-ConfigCommon (which is determined according to a triggering cause of random access, for example, if it is random access triggered by beam failure recovery, ra-ResponseWindow configured in BeamFailureRecoveryConfig is used) transmitted by the network device, and that the RAR is not successfully received includes at least one of the following cases where,
In some embodiments, before 701, when the repeater in an RRC idle state attempts to establish new connection, and/or the repeater in an RRC inactive state attempts to resume connection, it transmits a second message to the network, the second message including an RRC establishment request or an RRC resume request. In 701, the network device transmits the first message to the repeater, the first message including an RRC reject message. The first information includes a wait time waitTime, the wait time denoting a duration of timer T302 and being used to indicate a wait time of the repeater in initiating a next time of RRC connection establishment/resume process.
In some embodiments, the RRC reject message does not include a wait time. Therefore, in 702, the repeater skips over the first processing related to the access control after receiving the first message, such as not needing to start T302 (or setting T302 to be 0), that is, it immediately initiates a next time of RRC connection establishment/resume process without needing to wait, that is, it is not controlled by the wait time in the RRC reject message. Thus, network congestion may be alleviated and deployment costs may be lowered.
In some embodiments, the RRC reject message may also include a wait time, a value range of the wait time being [1,16] (illustrative, not inclusive of 0). In 702, the ignoring the wait time and/or skipping over the first processing related to the access control by the repeater includes determining the wait time to be 0. That is, regardless of a value of the wait time, the repeater does not need to be controlled by the wait time, and does not need to start T302 (or sets T302 to be 0). Therefore, the repeater does not need to delay and immediately initiates the next time of RRC connection establishment/resume process, or, in other words, the repeater waits time 0 and initiates the next of RRC connection establishment/resume process, that is, it is not controlled by the wait time in the RRC rejection, which may alleviate network congestion and lower deployment costs.
In some embodiments, the RRC reject message may also include a wait time, a value range of the wait time being [0,16] (illustrative, inclusive of 0). When a value of the wait time is not 0, the above operations are executed. When a value of the wait time is 0, in 702, the ignoring the wait time and/or skipping over the first processing related to the access control by the repeater includes determining the wait time to be 0, and/or the performing the second processing related to the access control includes setting T302 to be 0, and the repeater immediately initiates the next time of RRC connection establishment/resume process, that is, the wait time may be set to be 0. Therefore, the repeater does not need to delay and immediately initiates the next time of RRC connection establishment/resume process, or, in other words, the repeater waits time 0 and initiates the next of RRC connection establishment/resume process, that is, it is not controlled by the wait time in the RRC rejection, which may alleviate network congestion and lower deployment costs.
In some embodiments, in 701, the network device transmits the first message to the repeater, the first message including an RRC release message. The first information includes a wait time, the wait time denoting a duration of timer T302. The wait time is used to indicate a wait time of the repeater in initiating the next time of RRC connection establishment procedure, and within the wait time, access attempts are barred.
In some embodiments, the RRC release message does not include a wait time. Therefore, in 702, the skipping over the first processing related to the access control by the repeater after receiving the first message includes that the repeater does not need to start T302 (or sets T302 to be 0). Therefore, the repeater may perform access attempt without needing to wait, that is, it is not controlled by the wait time in the RRC release, which may alleviate network congestion and lower deployment costs.
In some embodiments, the RRC release message may also include a wait time, a value range of the wait time being [1,16] (illustrative, not inclusive of 0). In 702, the ignoring the wait time and/or skipping over the first processing related to the access control by the repeater includes determining the wait time to be 0. That is, regardless of a value of the wait time, the repeater does not need to be controlled by the wait time, and does not need to start T302 (or sets T302 to be 0). Therefore, the repeater may perform access attempt without needing to wait, that is, it is not controlled by the wait time in the RRC release, which may alleviate network congestion and lower deployment costs.
In some embodiments, the RRC release message may also include a wait time, a value range of the wait time being [0,16] (illustrative, inclusive of 0). When a value of the wait time is not 0, the above operations are executed. When a value of the wait time is 0, in 702, the ignoring the wait time and/or skipping over the first processing related to the access control by the repeater includes determining the wait time to be 0, and/or the performing the second processing related to the access control includes setting T302 to be 0, and the repeater may perform access attempt without needing to wait, that is, it is not controlled by the wait time in the RRC release, which may alleviate network congestion and lower deployment costs.
In some embodiments, the first message includes system information (such as SIB1) broadcast by the network device, the first information including access control parameters, the access control parameters being associated with an access category and an access ID. The access control parameter may include at least one of UAC-BarringInfoSetList, UAC-BarringPerCatList and UAC-BarringPerPLMN-List, and the access control parameter includes a barring time (uac-BarringTime) and/or a barring factor (uac-BarringFactor). The barring factor is used to compare with a random number, and whether access attempts are allowed is determined according to a comparison result. The barring time is used to calculate a duration of timer T390 (corresponding to the access category), and the access control parameter may be configured separately for each PLMN.
For example, multiple access categories may be pre-defined, including AC 0 to AC 30 defined in stands and AC 31 to AC 63 defined by operators. Multiple access categories may correspond to one establishment cause value, for example, AC 0 to AC 3 correspond to establishment cause value 1, AC 4 to AC 10 correspond to establishment cause value 2, etc., and this application is not limited thereto. Access categories and establishment cause values may be defined on demand.
For example, the access ID indicates provided configuration, and a range of values includes 0 to 15, wherein 0 indicates that no parameter is configured, 1 indicates that an MPS (multimedia priority service) is configured, 2 indicates that an MCS (mission critical service) is configured, 3 indicates a UE to which disaster conditions are applicable, 4-10 are reserved, and 11-15 indicates that configured access categories are 11-15.
In some embodiments, in a unified access control procedure, the network device may provide an access category, an access ID and the above access control parameter. The repeater may determine an applicable access barring parameter according to an access ID and access category of an access attempt, and perform a unified access control procedure (including access barring check), so as to determine whether the access attempt may be performed or whether it is barred. When the access attempt is barred, timer T390 corresponding to the access category is started, and when T390 expires, when timer T302 is not running (if the access category is 2, whether timer T302 is running needs not to be considered), barring of the access category is alleviated.
In some embodiments, after receiving the access control parameter, the repeater may skip over the unified access control procedure, or may perform the unified access control procedure according to the access control parameter, which shall be respectively described below.
In some embodiments, in 701, the repeater receives SIB1, including the access control parameter, transmitted by the network device. In 702, the skipping over the first processing related to the access control by the repeater includes skipping over the unified access control procedure.
In some embodiments, when a first condition is satisfied, an RRC layer of the repeater skips over the unified access control procedure, the first condition including that:
In some embodiments, when the RRC connection resume procedure is initiated and the resuming the RRC connection is triggered by the response to the NG-RAN paging, the skipping over the first processing related to the access control includes: skipping over the unified access control procedure by the lower layer (e.g. the RRC layer) of the repeater, and optionally, it may also include: selecting 0 as an access category by the RRC layer of the repeater.
In some embodiments, when the RRC connection resume procedure is initiated and the resuming the RRC connection is triggered due to the RNA update, the unified access control procedure includes: skipping over the unified access control procedure by the RRC layer of the repeater, and optionally, it may also include: not determining an access category by the RRC layer of the repeater, and/or in performing emergency services, setting a resume establishment cause to be an emergency situation by the RRC layer of the repeater.
In some embodiments, the RRC connection establishment/resume request cause needs to include an establishment cause. Although the lower layer (e.g. RRC layer) of the repeater skips over access control check, in order to obtain an RRC establishment cause, for an access attempt, the lower layer (e.g. RRC layer) of the repeater needs to determine an access category and (one or more) access IDs, thereby determining an RRC establishment cause corresponding to the access category. Or, the upper layer (such as an NAS) of the repeater does not provide an access category and access ID to the lower layer (such as the RRC layer), but provides an RRC establishment cause. Hence, as the upper layer has already provided the RRC establishment cause, even if an access category is not determined, an establishment cause may still be determined.
In some embodiments, in order to ensure access barring check of an access attempt determined by the lower layer in an inactive state or in a 5GMM connected state inactively indicated by RRC, the upper layer (such as the NAS) of the repeater provides an access ID used by a determined access attempt to the lower layer (such as the RRC layer).
In some embodiments, the access control parameter may be associated with a repeater-specific access category and/or a repeater-specific access ID.
For example, there may be multiple pre-defined access categories, such as including AC 0 to AC 30 defined in standards and AC 31 to AC 63 defined by operators. In addition, a repeater-specific access category (AC) may be defined, such as AC 64, AC 65, or an existing AC may be modified to be repeater-specific, such as AC 31, AC 63. Additionally, at least one of 4-10 reserved in the access IDs may be modified to be a repeater-specific access ID. In 702, the repeater performs second processing related to the access control includes executing the unified access control procedure by the repeater based on the repeater-specific access category and/or the repeater-specific access ID. For example, the repeater determines the repeater-specific access category and/or the repeater-specific access ID, and the access control parameters include a barring time and/or a barring factor, the barring time and/or the barring factor being applicable to the repeater-specific access category and/or the repeater-specific access ID, and the repeater executes the unified access control procedure according to the access control parameters associated with the repeater-specific access category and/or the repeater-specific access ID.
In some embodiments, the access control parameter may be repeater-specific access control parameter, including a repeater-specific barring factor and/or a repeater-specific barring time configured for the access category and/or access ID; or, the access control parameter may be a repeater-specific ratio/factor. For example, the repeater-specific barring factor and/or the repeater-specific barring time is/are obtained by calculating (+×MOD, etc.) a barring factor and/or the barring time of the terminal equipment in the access control parameter with the repeater-specific ratio/factor. In 702, the repeater performs second processing related to the access control includes performing the unified access control procedure by the repeater by using the repeater-specific access control parameter. For example, the repeater determines the access category and/or access ID, and performs the unified access control procedure according to the repeater-specific access control parameter associated with the access category and/or the access ID.
In some embodiments, the performing the unified access control procedure by the repeater according to the access control parameter (the access control parameter associated with the repeater-specific access category and/or the access ID, or the repeater-specific access control parameter associated with the access category and/or the access ID) includes: acquiring a random number uniformly distributed in a range of [0,1] by the repeater, and determining by the repeater that the access attempt is allowed if the random number is less than a value indicated by a barring factor obtained according to the access control parameter; otherwise, deeming by the repeater that the access attempt is barred. If the access attempt is barred, the repeater acquires a random number uniformly distributed in the range of [0,1], and starts timer T390 of this access category, a value of the timer being calculated by using the barring time obtained according to the access control parameter and a calculation formula T390=(0.7+0.6×random number)×barring time. When T390 expires, when timer T302 is not running (if the access category is 2, whether timer T302 is running needs not to be considered), barring of the access category is alleviated.
It should be noted that
It can be seen from the above embodiment that the repeater ignores the first information contained in the first message related to access control, and/or skips over first processing related to the access control, and/or performs second processing related to the access control, so that the repeater may not be controlled by an existing access control mechanism. Hence, network congestion may be alleviated, and the deployment cost may be lowered.
The embodiment of this disclosure provides an access control method, which shall be described from a network device.
In some embodiments, the first message includes: an RAR or MSGB, and the first information includes backoff indication related information.
In some embodiments, the RAR or MSGB does not contain the backoff indication related information, or contains s backoff indication related information, and a value of the backoff indication is 0.
In some embodiments, the first message includes: an RRC reject message or an RRC release message, and the first information includes a wait time.
In some embodiments, the RRC reject message or the RRC release message does not include the wait time, or includes the wait time, and a value of the wait time is 0.
In some embodiments, the first message includes SIB1, and the first information includes access control parameter.
In some embodiments, SIB1 includes the access control parameter.
In some embodiments, the access control parameter is repeater-specific access control parameter, the repeater-specific access control parameter including a repeater-specific barring factor and/or a repeater-specific barring time, or a repeater-specific ratio/factor.
In some embodiments, the access control parameter is associated with an access category and an access ID, the access category being repeater-specific access category, and the access ID being repeater-specific access ID.
In some embodiments, reference may be made to (1) to (4) in the embodiment of the first aspect for implementations of the first message and first information, which shall not be repeated herein any further.
It can be seen from the above embodiment that the repeater is not controlled by an existing access control mechanism. Hence, network congestion may be alleviated, and deployment costs may be lowered.
In some embodiments, in radio resource control (RRC) reject and RRC release, the first message includes an RRC reject message and/or an RRC release message, and the network device does not transmit the RRC reject message to the repeater, or does not transmit the RRC release message, that is, the repeater will not receive the first message related to access control (the RRC reject message and/or the RRC release message) transmitted by the network device.
In some embodiments, for a radio resource control (RRC) reject mechanism, before 901, the method may further include (not shown): the network device receives, a second message transmitted by the repeater, the second message including an RRC establishment request and/or an RRC resume request, that is, the network device does not reject the RRC establishment request of the repeater and/or does not reject the RRC resume request of the repeater.
In some embodiments, optionally, the method may further include (not shown): the network device transmits a third message to the repeater, the third message including an RRC establishment message and/or an RRC resume message, and reference may be made to existing techniques for details, which shall not be repeated herein any further.
In some embodiments, for an RRC release mechanism, the network device does not release RRC connection of the repeater, hence, it does not transmit an RRC release message to the repeater.
In some embodiments, for the radio resource control (RRC) reject mechanism, before 901, the method may further include (not shown): the repeater transmits a second message to the network device, the second message including an RRC establishment request and/or an RRC resume request.
In some embodiments, optionally, the method may further include (not shown): the network device receives a third message transmitted, the third message including an RRC establishment message and/or an RRC resume message, and reference may be made to existing techniques for details, which shall not be repeated herein any further.
In some embodiments, for the RRC release mechanism, the network device will not release the RRC connection of the repeater, hence, it does not transmit an RRC release message to the repeater.
Hence, the repeater does not receive the RRC reject message and/or the RRC release message, and is not controlled by the existing access control mechanism. Thus, network congestion may be alleviated, and deployment costs may be lowered.
In some embodiments, the method may further include (not shown): when a second condition is satisfied, the network device transmits a first message to the repeater, the first message including an RRC reject message. The second condition includes: an extreme network load that may pose a threat to the stability of network device. That is, the access attempts of the repeater (the request related to the second message) are rejected only under extreme network load conditions that may pose a threat to the stability of network device, that is, the RRC reject message for the access attempts of the repeater is transmitted to the repeater.
In some embodiments, in 1001, the repeater transmits the second message in attempting to establish new connection in an RRC idle state or in attempting to resume connection from an RRC inactive state. For example, the repeater transmits an RRC establishment request message in attempting to establish new connection in the RRC idle state, or transmits an RRC resume request message in attempting to resume the connection from the RRC inactive state.
Hence, the network device processes the requests related to the second message with a high priority, so as to lower a probability that access attempts of the repeater are rejected. Thus, network congestion may be alleviated, and deployment costs may be lowered.
The embodiment of this disclosure provides an access control apparatus. The apparatus may be, for example, a repeater, or may also be one or more components or assemblies configured in the repeater, with contents identical to those in the embodiment of the first aspect being not going to be described herein any further.
In some embodiments, reference may be made to 701-702 for implementations of first receiving unit 1101 and the first processing unit 1102, with repeated parts being not going to be described herein any further.
In some embodiments, the first message includes an RAR or an MSGB, and the first information includes backoff indication related information.
In some embodiments, the RAR or MSGB does not contain the backoff indication related information, or contains the backoff indication related information, and a value of a backoff indication field in the backoff indication related information is a specific value.
In some embodiments, the RAR or MSGB contains the backoff indication related information.
In some embodiments, that the first processing unit ignores the value of backoff indication field in the backoff indication related information and/or skips over first processing related to the access control include(s) setting PREAMBLE_BACKOFF to be 0.
In some embodiments, when the first receiving unit fails in receiving the first message related to access control, the first processing unit skips over the first processing related to the access control.
In some embodiments, when the first receiving unit fails in receiving the RAR, if a random access procedure is not completed, the first processing unit performs a random access resource selection procedure.
In some embodiments, that the RAR is not successfully received includes:
In some embodiments, the first message includes an RRC reject message or an RRC release message, and the first information includes a wait time.
In some embodiments, that the repeater ignores the wait time and/or skips over the first processing related to the access control include(s) setting the wait time to be 0.
In some embodiments, the RRC reject message or the RRC release message does not contain a wait time or contains a wait time, a value of the wait time being 0.
In some embodiments, the first message includes SIB1, and the first information includes an access control parameter.
In some embodiments, the SIB1 includes the access control parameter.
In some embodiments, that the first processing unit ignores the access control parameter and/or skips over first processing related to access control include(s) that the first processing unit skips over a unified access control procedure.
In some embodiments, when a first condition is satisfied, the repeater skips over the unified access control procedure at an RRC layer,
In some embodiments, that the first processing unit skips over first processing related to access control further includes that the first processing unit selects 0 as the access category at the RRC layer or does not determine an access category.
In some embodiments, the first processing unit is further configured to:
In some embodiments, the access control parameter is associated with an access category and/or an access ID, the access category being a repeater-specific access category, and the access ID being a repeater-specific access ID.
In some embodiments, the access control parameter is a repeater-specific access control parameter.
In some embodiments, the repeater-specific access control parameter includes a repeater-specific barring factor and/or a repeater-specific barring time, or a repeater-specific ratio/factor.
In some embodiments, that the first processing unit performs second processing related to access control includes that performs a unified access control procedure by using the access control parameter.
In some embodiments, the repeater is a network controlled repeater.
In some embodiments, the apparatus further includes:
In some embodiments, after the second transmitting unit transmits the second message, the third receiving unit will not receive the first message.
In some embodiments, the third receiving unit is further configured to receive a third message transmitted by the network device.
In some embodiments, the first message includes an RRC reject message or an RRC release message.
In some embodiments, the second message includes an RRC establishment request message, or an RRC resume request message.
In some embodiments, the third message includes an RRC establishment message, or an RRC resume message.
The above implementations only illustrate the embodiment of this disclosure. However, this disclosure is not limited thereto, and appropriate variants may be made on the basis of these implementations. For example, the above implementations may be executed separately, or one or more of them may be executed in a combined manner.
It should be noted that the components or modules related to this disclosure are only described above. However, this disclosure is not limited thereto, and the access control apparatuses 1100/1200 may further include other components or modules, and reference may be made to related techniques for particulars of these components or modules.
Furthermore, for the sake of simplicity, connection relationships between the components or modules or signal profiles thereof are only illustrated in
It can be seen from the above embodiment that the repeater ignores the first information contained in the first message related to access control, and/or skips over first processing related to the access control, and/or performs second processing related to the access control, so that the repeater may not be controlled by an existing access control mechanism. Hence, network congestion may be alleviated, and the deployment cost may be lowered.
The embodiment of this disclosure provides an access control apparatus. The apparatus may be, for example, a network device, or may also be one or more components or assemblies configured in the network device, with contents identical to those in the embodiment of the second aspect being not going to be described herein any further.
In some embodiments, that the first transmitting unit does not transmit a first message related to access control to a repeater includes that the first transmitting unit does not transmit an RRC reject message to the repeater, or does not transmit an RRC release message to the repeater.
In some embodiments, when a second condition is satisfied, the first transmitting unit transmits a first message to the repeater.
In some embodiments, the second condition includes: an extreme network load that may pose a threat to the stability of network device.
In some embodiments, the first message includes: an RRC reject message or an RRC release message.
In some embodiments, the first message includes: an RAR or MSGB, and the first information includes backoff indication related information.
In some embodiments, the RAR or MSGB does not contain the backoff indication related information, or contains the backoff indication related information, and a value of a backoff indication field in the backoff indication related information is a specific value.
In some embodiments, that the first transmitting unit transmit a first message related to access control to the repeater includes: transmitting the RRC reject message or the RRC release message by the network device to the repeater.
In some embodiments, the first information includes a wait time.
In some embodiments, the RRC reject message or the RRC release message does not include the wait time, or includes the wait time, and a value of the wait time is 0.
In some embodiments, the first message includes SIB1, and the first information includes access control parameter.
In some embodiments, SIB1 includes the access control parameter.
In some embodiments, the access control parameter is associated with an access category and/or an access ID, the access category being repeater-specific access category, and the access ID being repeater-specific access ID.
In some embodiments, the access control parameter is a repeater-specific access control parameter.
In some embodiments, the repeater-specific access control parameter includes a repeater-specific barring factor and/or a repeater-specific barring time, or a repeater-specific ratio/factor.
In some embodiments, that the second processing unit processes a request related to the second message with a high priority includes processing an access attempt of the repeater with a high priority.
In some embodiments, the repeater transmits the second message in attempting to establish new connection in an RRC idle state or in attempting to resume connection from an RRC inactive state.
In some embodiments, the second message includes an RRC establishment request message, or an RRC resume request message.
In some embodiments, reference may be made to 801 or 901 for implementation of the first transmitting unit 1301, and reference may be made to 1001-1002 for implementations of the second receiving unit 1401 and the second processing unit 1402, which shall not be described herein any further.
The above implementations only illustrate the embodiment of this disclosure. However, this disclosure is not limited thereto, and appropriate variants may be made on the basis of these implementations. For example, the above implementations may be executed separately, or one or more of them may be executed in a combined manner.
It should be noted that the components or modules related to this disclosure are only described above. However, this disclosure is not limited thereto, and the access control apparatuses 1300/1400 may further include other components or modules, and reference may be made to related techniques for particulars of these components or modules.
Furthermore, for the sake of simplicity, connection relationships between the components or modules or signal profiles thereof are only illustrated in
The embodiment of this disclosure provides a communication system, and reference may be made to
In some embodiments, the communication system may include a repeater 1500.
In some embodiments, the communication system may include a network device 1600.
The embodiment of this disclosure further provides a network device, which may be, for example, a base station. However, this disclosure is not limited thereto, and it may also be another network device.
For example, the processor 1510 may be configured to execute a program to carry out the access control method as described in the embodiment of the third aspect.
Furthermore, as shown in
The embodiment of this disclosure further provides a repeater; however, this disclosure is not limited thereto, and it may also be other devices, such as a terminal equipment having functions of a repeater.
For example, the processor 1610 may be configured to execute a program to carry out the access control method as described in the embodiment of the first aspect.
As shown in
An embodiment of this disclosure provides a computer readable program, which, when executed in a repeater, causes the repeater to carry out the access control method as described in the embodiment of the first aspect.
An embodiment of this disclosure provides a computer storage medium, including a computer readable program, which causes a repeater to carry out the access control method as described in the embodiment of the first aspect.
An embodiment of this disclosure provides a computer readable program, which, when executed in a repeater, causes the repeater to carry out the access control method as described in the embodiment of the second aspect.
An embodiment of this disclosure provides a computer storage medium, including a computer readable program, which causes a repeater to carry out the access control method as described in the embodiment of the second aspect.
The above apparatuses and methods of this disclosure may be implemented by hardware, or by hardware in combination with software. This disclosure relates to such a computer-readable program that when the program is executed by a logic device, the logic device is enabled to carry out the apparatus or components as described above, or to carry out the methods or steps as described above. This disclosure also relates to a storage medium for storing the above program, such as a hard disk, a floppy disk, a CD, a DVD, and a flash memory, etc.
The methods/apparatuses described with reference to the embodiments of this disclosure may be directly embodied as hardware, software modules executed by a processor, or a combination thereof. For example, one or more functional block diagrams and/or one or more combinations of the functional block diagrams shown in the drawings may either correspond to software modules of procedures of a computer program, or correspond to hardware modules. Such software modules may respectively correspond to the steps shown in the drawings. And the hardware module, for example, may be carried out by firming the soft modules by using a field programmable gate array (FPGA).
The soft modules may be located in an RAM, a flash memory, an ROM, an EPROM, an EEPROM, a register, a hard disc, a floppy disc, a CD-ROM, or any memory medium in other forms known in the art. A memory medium may be coupled to a processor, so that the processor may be able to read information from the memory medium, and write information into the memory medium; or the memory medium may be a component of the processor. The processor and the memory medium may be located in an ASIC. The soft modules may be stored in a memory of a mobile terminal, and may also be stored in a memory card of a pluggable mobile terminal. For example, if equipment (such as a mobile terminal) employs an MEGA-SIM card of a relatively large capacity or a flash memory device of a large capacity, the soft modules may be stored in the MEGA-SIM card or the flash memory device of a large capacity.
One or more functional blocks and/or one or more combinations of the functional blocks in the drawings may be realized as a universal processor, a digital signal processor (DSP), an application-specific integrated circuit (ASIC), a field programmable gate array (FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware component or any appropriate combinations thereof carrying out the functions described in this application. And the one or more functional block diagrams and/or one or more combinations of the functional block diagrams in the drawings may also be realized as a combination of computing equipment, such as a combination of a DSP and a microprocessor, multiple processors, one or more microprocessors in communication combination with a DSP, or any other such configuration.
This disclosure is described above with reference to particular embodiments. However, it should be understood by those skilled in the art that such a description is illustrative only, and not intended to limit the protection scope of the present disclosure. Various variants and modifications may be made by those skilled in the art according to the spirits and principle of the present disclosure, and such variants and modifications fall within the scope of the present disclosure.
As to implementations containing the above embodiments, following supplements are further disclosed.
This application is a continuation application of International Application PCT/CN2022/074834 filed on Jan. 28, 2022, and designated the U.S., the entire contents of which are incorporated herein by reference.
Number | Date | Country | |
---|---|---|---|
Parent | PCT/CN2022/074834 | Jan 2022 | WO |
Child | 18777732 | US |