[go: up one dir, main page]

CN102548012B - A kind of accidental access method and terminal - Google Patents

A kind of accidental access method and terminal Download PDF

Info

Publication number
CN102548012B
CN102548012B CN201010602025.0A CN201010602025A CN102548012B CN 102548012 B CN102548012 B CN 102548012B CN 201010602025 A CN201010602025 A CN 201010602025A CN 102548012 B CN102548012 B CN 102548012B
Authority
CN
China
Prior art keywords
terminal
waiting time
random access
length
system message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201010602025.0A
Other languages
Chinese (zh)
Other versions
CN102548012A (en
Inventor
艾建勋
邓云
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201010602025.0A priority Critical patent/CN102548012B/en
Priority to PCT/CN2011/080006 priority patent/WO2012083739A1/en
Publication of CN102548012A publication Critical patent/CN102548012A/en
Application granted granted Critical
Publication of CN102548012B publication Critical patent/CN102548012B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA
    • H04W74/0833Random access procedures, e.g. with 4-step access
    • H04W74/0841Random access procedures, e.g. with 4-step access with collision treatment
    • H04W74/085Random access procedures, e.g. with 4-step access with collision treatment collision avoidance

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a kind of accidental access method, after end-probing to random access failure, setting time is waited to initiate random access again.The present invention also accordingly discloses a kind of terminal.Through the invention, terminal is after random access failure, it can wait for a period of time and re-initiate random access again, so as to avoid in the case where radio resource overloads, as terminal frequently re-initiate random access and caused by radio resource it is nervous, also, it can make the unit time that the terminal quantity equalization into network be inscribed using the present invention, so as to improve the success rate of random access.

Description

Random access method and terminal
Technical Field
The present invention relates to the field of mobile communications, and in particular, to a random access method and a terminal.
Background
Human-to-Human communication (H2H) refers to communication between people and devices, the existing wireless communication technology is developed based on H2H, while Machine-to-Machine communication (M2M) is broadly defined as networked applications and services with intelligent interaction between Machine terminals and cores, and is an informatization solution provided for clients by taking multiple communication modes as access means based on intelligent Machine terminals, and is used for meeting informatization requirements of clients on monitoring, command scheduling, data acquisition, measurement and the like.
The development of the wireless technology is an important factor for the development of the M2M market, and the wireless technology breaks through the space-time limitation and the geographical barrier of the traditional communication mode, so that enterprises and the public get rid of the cable constraint, customers can more effectively control the cost, the installation cost is reduced, and the use is simple and convenient. In addition, the increasing demand pushes M2M to develop continuously, contradicts with the increasing information processing capability and network bandwidth, the means of information acquisition is far behind, and M2M well meets the demand of people, by the technology, people can monitor the external environment in real time, and large-scale and automatic information acquisition is realized. Therefore, M2M may be applied in the fields of industrial applications, home applications, personal applications, etc., where the use is for example: traffic monitoring, alarm systems, rescue at sea, vending machines, driving payments, etc., in the field of home applications such as: automatic meter reading, temperature control, etc., and are used in personal applications such as: life detection, remote diagnostics, etc.
The Communication object of M2M is Machine-to-Machine or human-to-Machine, and data Communication between one or more machines is defined as Machine Type Communication (MTC), in which case human-Machine interaction is less required, and the Machine participating in MTC is defined as MTC Device (MD). The MTC device is a terminal of an MTC user, and can communicate with the MTC device and an MTC server through a Public Land Mobile Network (PLMN) network.
After the M2M application is introduced, the existing system can be optimized according to the characteristics of the existing system so as to meet the requirements of the M2M application, and the ordinary H2H equipment in the existing system is not influenced. Some notable features of the M2M application include: the number of MTC devices is large and far exceeds that of the existing H2H devices; the data transmission is regular, and the data volume transmitted each time is small; the mobility of MTC devices is low and a large part of MTC devices are not mobile.
When an MTC device accesses a network, it needs to initiate random access, fig. 1 is a flowchart of a contention-based random access process in a Long Term Evolution (LTE) system according to a related technology, and as shown in fig. 1, a contention-based random access process in LTE mainly includes the following four steps:
step 102: a User Equipment (UE) randomly selects a Preamble (Preamble) and transmits the Preamble on a Physical Random Access Channel (PRACH).
Step 104: after detecting that a Preamble code is transmitted, a base station (eNB) transmits a Random Access Response (RAR) in a downlink, where the RAR generally includes the following information: the number of the received Preamble code, the time adjustment amount corresponding to the received Preamble code, the uplink resource location indication information allocated to the terminal, and the Temporary Cell Radio Network Temporary identifier (Temporary C-RNTI) are allocated.
Step 106: and after receiving the random access response, the UE sends the uplink message on the allocated uplink resource according to the indication. The uplink Message is also called Message 3(Msg3), which at least includes: a unique identification (TMSI) or a Random identification (Random ID) of the terminal, and an Establishment Cause (Establishment Cause).
Step 108: the base station receives the uplink message of the UE and returns a Contention Resolution message (also referred to as Msg4) to the UE with successful access. If the UE receives the message before the conflict resolution timer is overtime and the Msg4 is confirmed to be the Msg4 expected by the UE through unpacking, the random access process is determined to be successful; otherwise, the UE initiates random access again. The UE re-initiating random access requires a restart from step 102.
When the number of times that the user equipment transmits the preamble exceeds the maximum number of transmissions (preambleTransMax), that is, the number of times that the preamble is transmitted is equal to preambleTransMax +1, this random access fails. Since the random Access of the LTE system is implemented in a Medium Access Control (MAC) layer, after the random Access fails, the MAC layer needs to notify an upper layer of the user equipment of the failure. If the upper layer of the user equipment still has the requirement of initiating the service, the upper layer triggers the MAC layer to initiate random access again.
Before the MTC equipment is not introduced, the initiation and release of the service are controlled by people. When a user needs to initiate a service, the user equipment may continuously initiate random access until the random access is successful, and if the random access fails for a plurality of times, the user may terminate the service connection request. However, after the MTC device is introduced, since no person participates, when the MTC device has data to send (when a service needs to be initiated), the MTC device will continuously initiate random access until the data is successfully sent, so that when a large number of MTC devices need to access a network to send data or perform location area update at the same time, wireless resources will be in an overload state, which results in that the random access initiated by the MTC device will fail, and the network cannot be successfully recovered because the MTC device continuously initiates random access.
Disclosure of Invention
In view of the above, the main objective of the present invention is to provide a random access method and a terminal, which can solve the problems that a large number of terminals continuously initiate random access in a random access process, resulting in network overload and unsuccessful recovery, and improve the success rate of random access.
In order to achieve the purpose, the technical scheme of the invention is realized as follows:
a random access method, comprising: and after the random access of the terminal fails, waiting for a set time and then starting the random access.
The set time is obtained according to a waiting time length agreed in advance by a protocol, or according to the waiting time length carried by the system message.
The length of the waiting time prearranged by the protocol or the length of the waiting time carried by the system message is as follows: according to the type of the terminal, and/or the priority of the service initiated by the terminal, and/or whether the service initiated by the terminal is allowed to delay, and/or the group to which the terminal belongs, and/or the access class of the terminal, and/or the roaming condition of the terminal, the corresponding waiting time length is set,
the terminal acquires the set time as follows: the terminal inquires the length of the waiting time carried by a protocol convention or a system message according to the information such as the terminal type, the terminal priority, the terminal initiated service priority, whether the terminal initiated service allows time delay or not, the group to which the terminal belongs, the terminal access grade, the terminal roaming condition and the like, and the obtained value of the length of the waiting time is used as the set time.
When the terminal reselects the cell after the random access fails, the set time obtained according to the waiting time length carried by the system message is: and acquiring the set time according to the waiting time length carried by the system message of the new cell.
The terminal is a Machine Type Communication (MTC) device and/or a human-to-human communication (H2H) device.
The waiting time length carried by the system message is the waiting time length set by the network side according to the random access load or the access limitation requirement set by the core network.
A terminal is used for waiting for a set time to initiate random access after the random access fails.
The set time is obtained by the terminal according to the preset waiting time length of the protocol, or the terminal according to the waiting time length carried by the system message.
The length of the waiting time prearranged by the protocol according to which the terminal obtains the set time or the length of the waiting time carried by the system message is as follows: according to the type of the terminal, and/or the priority of the service initiated by the terminal, and/or whether the service initiated by the terminal is allowed to delay, and/or the group to which the terminal belongs, and/or the access class of the terminal, and/or the roaming condition of the terminal, the corresponding waiting time length is set,
the terminal acquires the set time as follows: the terminal inquires the length of the waiting time carried by a protocol convention or a system message according to the information such as the terminal type, the terminal priority, the terminal initiated service priority, whether the terminal initiated service allows time delay or not, the group to which the terminal belongs, the terminal access grade, the terminal roaming condition and the like, and the obtained value of the length of the waiting time is used as the set time.
Under the condition that the cell is reselected after the random access fails, the terminal obtains the set time according to the waiting time length carried by the system message as follows: and acquiring the set time according to the waiting time length carried by the system message of the new cell.
The terminal is an MTC device and/or an H2H device.
The invention provides a random access method and a terminal. By the invention, the terminal can wait for a period of time and then reinitiate the random access after the random access fails, thereby avoiding the radio resource shortage caused by the frequent reinitiation of the random access by the terminal under the condition of radio resource overload, and the number of the terminals accessed to the network in unit time can be averaged by adopting the invention, thereby improving the success rate of the random access.
Drawings
Fig. 1 is a flowchart of a contention-based random access procedure in an LTE system according to the related art;
FIG. 2 is a flow chart of a random access method according to the present invention;
fig. 3 is a flowchart illustrating an MTC device (referred to as MD1) accessing a network according to embodiment 1 of the present invention.
Detailed Description
The basic idea of the invention is: and after the terminal detects that the random access fails, the terminal waits for a set time and then starts the random access.
Fig. 2 is a schematic flow chart of a random access method of the present invention, as shown in fig. 2, the method includes:
step 201: the terminal fails random access.
Step 202: and after waiting for the set time, the terminal initiates random access again.
Here, the set time may be obtained by the terminal according to a predetermined waiting time length of the protocol, or may be obtained by the terminal according to a waiting time length carried by the system message.
The length of the pre-agreed waiting time of the protocol can be as follows: the protocol appoints the waiting time length of a certain type of terminal in advance; and/or appointing the waiting time length of a terminal with a certain priority; and/or appointing the waiting time length of a terminal for initiating a certain priority service; and/or appointing the waiting time length of the terminal for initiating the allowable delay service; and/or appointing the waiting time length of the terminal belonging to a certain group; and/or appointing the waiting time length of a terminal of a certain access class; and/or appointing whether to roam the waiting time length of the terminal, in other words, the corresponding waiting time length can be set by a protocol appointed mode according to the terminal type, and/or the terminal priority, and/or the priority of the service initiated by the terminal, and/or whether the service initiated by the terminal is allowed to delay, and/or the group to which the terminal belongs, and/or the terminal access class, and/or the terminal roaming condition.
The system message carrying waiting time length may be: the system message comprises the waiting time length of a certain type of terminal; and/or, including the waiting time length of a certain priority terminal; and/or, the waiting time length of the terminal for initiating a certain priority service is included; and/or, the waiting time length when the terminal initiates whether to allow the delay service is included; and/or, including the length of the waiting time of the terminals belonging to a certain group; and/or, the length of the waiting time of a terminal comprising a certain access class; and/or, the waiting time length of whether the terminal roams is included, in other words, the system side may set a corresponding waiting time length according to the terminal type, and/or the terminal priority, and/or the priority of the service initiated by the terminal, and/or whether the service initiated by the terminal is allowed to be delayed, and/or the group to which the terminal belongs, and/or the terminal access class, and/or the terminal roaming condition, and carry the set waiting time length through the system message.
The terminal inquires the length of the waiting time carried by a protocol convention or a system message according to the information such as the type of the terminal, the priority of the service initiated by the terminal, the permission of the service initiated by the terminal to delay, the group to which the terminal belongs, the access grade of the terminal, the roaming condition of the terminal and the like, and the obtained value of the length of the waiting time is used as the set time.
If the terminal obtains the waiting time length through the system message, the network side sets the waiting time length contained in the system message according to the random access load or the access limit requirement set by the core network.
It should be noted that, if the terminal fails to perform random access and reselects a cell, the obtaining of the set time according to the waiting time length carried by the system message is as follows: and acquiring the set time according to the waiting time length carried by the system message of the new cell.
It should be noted that, in the present invention, the terminal may be an MTC device and/or an H2H device.
The invention also correspondingly provides a terminal which is used for waiting for the set time and then starting the random access after the random access fails.
The set time is obtained by the terminal according to the preset waiting time length of the protocol, or the terminal according to the waiting time length carried by the system message.
The length of the waiting time prearranged by the protocol according to which the terminal obtains the set time or the length of the waiting time carried by the system message is as follows: according to the type of the terminal, and/or the priority of the service initiated by the terminal, and/or whether the service initiated by the terminal is allowed to delay, and/or the group to which the terminal belongs, and/or the access class of the terminal, and/or the roaming condition of the terminal, the corresponding waiting time length is set,
the terminal acquires the set time as follows: the terminal inquires the length of the waiting time carried by a protocol convention or a system message according to the information such as the type of the terminal, the priority of the service initiated by the terminal, the permission of the service initiated by the terminal to delay, the group to which the terminal belongs, the access grade of the terminal, the roaming condition of the terminal and the like, and the obtained value of the length of the waiting time is used as the set time.
Under the condition that the cell is reselected after the random access fails, the terminal obtains the set time according to the waiting time length carried by the system message as follows: and acquiring the set time according to the waiting time length carried by the system message of the new cell.
The terminal is an MTC device and/or an H2H device.
The following describes the implementation of the technical solution of the present invention in detail with reference to specific examples.
Example 1
In this embodiment, a cell governed by any one base station of the LTE system resides in a large number of MTC devices and H2H devices, some of which are in a connected state and some of which are in an idle state. At a certain moment, some MTC devices need to initiate a service request due to data transmission. Fig. 3 is a schematic flowchart of an MTC device (referred to as MD1) accessing a network according to embodiment 1 of the present invention, and as shown in fig. 3, the flowchart includes:
step 301: MD1 initializes the relevant parameters, such as setting the PREAMBLE TRANSMISSION number (PREAMBLE _ TRANSMISSION _ COUNTER) to 1.
Step 302: MD1 randomly selects a Preamble (Preamble) to transmit on a Physical Random Access Channel (PRACH).
Step 303: MD1 is receiving random access response within a predetermined time window, if yes, go to step 304; otherwise, step 307 is executed. In this step, the predetermined time window is a time window in which the terminal defined by the protocol receives the random access response.
Step 304: the MD1 sends Msg3 on the indicated uplink resource (or uplink grant) according to the received random access response, and starts a collision resolution timer, wherein Msg3 at least includes: a unique identification (TMSI) or a Random identification (Random ID) of the terminal, and an Establishment Cause (Establishment Cause). It should be noted that if the MD1 receives a response message (i.e., NACK message) sent by the base station indicating that the Msg3 was not received, the Msg3 is retransmitted and the collision resolution timer is restarted.
Step 305: the MD1 judges whether an expected contention resolution message Msg4 sent by the base station is received before the time-out of the conflict resolution timer, if yes, the step 306 is executed; otherwise, step 307 is executed.
Step 306: the random access is successful, and the process is finished.
Step 307: the number of preamble transmissions is increased by 1.
Step 308: MD1 determines whether the preamble transmission number is greater than the maximum transmission number, if so, performs step 309; otherwise, step 302 is performed.
Step 309: the random access fails, the random access failure is reported to an upper layer, the upper layer (RRC layer or non-access layer) of the MD1 judges whether a service request needs to be initiated again, if the service request needs to be initiated again, the upper layer waits for a period of time, the MAC layer is triggered again to initiate the random access, and the MD1 restarts to execute the step 301; if not, the flow of accessing the network by the MD1 is finished, and the MD1 still keeps idle state.
In step 309, if MD1 needs to continue initiating the service request, it needs to start a timer, and when the timer expires, the MAC layer is triggered to initiate random access again. The method can avoid the shortage and the aggravation of random access resources caused by the fact that a large number of MTC equipment are accessed into the network, and can average the number of the MTC equipment accessed into the network in unit time by delaying for a period of time, thereby improving the success rate of the random access of the MTC equipment. The overload of wireless resources caused by the fact that a large number of MTC devices are simultaneously accessed into the network can be avoided, and the network cannot be recovered to a normal state due to the random access initiated again.
In this embodiment, the waiting period (or the duration of the timer) is predetermined by a protocol, and the protocol may predetermine the waiting time length of a certain type of terminal, for example, when the MTC device needs to wait for 600 seconds, the H2H device needs to wait for 0 second;
the protocol may also pre-agree the waiting time length of a certain priority terminal, such as a terminal with a certain low priority needs to wait for 1000 seconds, and a terminal with a normal priority needs to wait for 100 seconds;
the protocol may also pre-stipulate the waiting time length for the terminal to initiate a certain priority service (or whether to allow the delay service), for example, when the terminal is determined to initiate a low priority service (or allow the delay service), it needs to wait 500 seconds, and when the terminal is determined to initiate a high priority service (or not allow the delay service), it needs to wait 100 seconds; the existing protocol supports the terminal to initiate high priority service (highpriority Access), Emergency service (Emergency, the priority of Emergency service is the highest), service initiated by paging (mt-Access), signaling service (mo-signaling) initiated by user, Data service (mo-Data) initiated by user, aiming at introducing MTC equipment, other priority level services can be added, such as services with high time tolerance for electronic meter reading services (reporting quantity of intelligent electric meters, intelligent water meters and the like), such traffic may be referred to as low priority traffic or Delay Tolerant traffic (Delay Tolerant), alarm service initiated by the MTC equipment for monitoring class service such as vehicle theft prevention belongs to service with low time tolerance, this kind of service may be classified as a high priority service, or a new priority may be introduced to indicate that the MTC device initiates a service (non Delay Tolerant) that is not allowed to Delay.
The protocol may also pre-agree on the waiting time lengths of terminals belonging to a certain Group (Group), and different terminals may belong to different groups, for example, the protocol pre-agrees that a terminal of a certain Group needs to wait for 200 seconds, and terminals of other groups need to wait for 100 seconds;
the protocol may also pre-agree on the waiting time length of a terminal of a certain Access Class (Access Class), and store the corresponding Access Class in the terminal, that is, the protocol may pre-agree on the waiting time lengths of terminals of different Access classes;
the protocol may also store a subscribed local Public Land Mobile Network (HPLMN) in a Universal Subscriber Identity Module (USIM) of the terminal according to whether the terminal roams a predetermined waiting time length, or further include an Equivalent local Public Land Mobile Network (EHPLMN), and if the terminal access Network does not belong to the HPLMN or does not belong to the HPLMN and the EHPLMN, the terminal is a roaming terminal, for example, the protocol may stipulate that the waiting time length of the roaming terminal is 1000 seconds, and the waiting time length of the non-roaming terminal is 0 second.
Example 2
In this embodiment, a cell governed by any one base station of the LTE system resides in a large number of MTC devices and H2H devices, some of which are in a connected state and some of which are in an idle state. At a certain moment, some MTC devices need to initiate a service request due to data transmission. The procedure of accessing the MTC device (referred to as MD2) to the network is similar to that described in embodiment 1, except that after determining that the retransmission times are greater than the maximum retransmission times, the upper layer (RRC layer or non-access layer) of MD2 determines whether to initiate a service request again, and if so, waits for a period of time and triggers the MAC layer to initiate random access again; if not, the flow of accessing the network by the MD2 is finished, and the MD2 still keeps idle state. In this embodiment, the waiting period is obtained from the system message, and MD2 obtains the waiting period from the system message when accessing the current cell, but MD2 does not apply the parameter immediately, and only applies the parameter after the random access failure.
In the existing system message, there is no cell requiring latency for re-initiating random access, and in order to implement the present invention, the existing system message needs to be expanded, and a cell indicating latency is added to a certain system message block. Uniform waiting time can be set for all terminals in the system message;
or setting different waiting times for different types of terminals, for example, setting the waiting time of the MTC device to be 600 seconds and the waiting time of the H2H device to be 0 second;
or setting the waiting time for the priority of the terminal, for example, setting the waiting time of a terminal with low priority (or only MTC equipment) to be 1000 seconds, and setting the waiting time of a terminal with normal priority to be 100 seconds;
or setting the waiting time for the priority of the service initiated by the terminal, for example, setting the waiting time when the terminal initiates a low-priority service (allowing a delay service) to be 5 minutes, and setting the waiting time of other priority services to be 0 minute;
or setting the waiting time aiming at the access grade of the terminal, for example, setting the waiting time of the AC 0-AC 9 as 100 seconds and the waiting time of other ACs as 0 second;
or setting waiting time for the groups to which the terminal belongs, for example, setting the waiting time of some groups (according to group identifiers) to be 500 seconds and the waiting time of other groups to be 100 seconds;
or setting the waiting time for the roaming characteristics of the terminal, for example, setting the waiting time of the roaming terminal (or only the MTC equipment) to be 600 seconds, and setting the waiting time of the non-roaming terminal to be 0 second.
When entering the current cell to reside, the terminal obtains the waiting time from the system message, the terminal stores the parameter, if the terminal fails to access randomly because of needing to initiate the service request, the terminal starts a corresponding timer, the time length of the timer is equal to the waiting time, and only when the timer is overtime, the terminal can initiate random access again. The base station sets the waiting time through the system message, can dynamically set the waiting time according to the load level of the current wireless resource, and can reasonably control the number of terminals initiating random access in unit time; the core network will also put forward an access restriction requirement to the base station according to its own load, for example, send an access restriction requirement to the base station to restrict the access rate of a certain terminal, and the base station will set the waiting time length in the system message according to the requirement put forward by the core network.
It should be noted that, if the terminal fails to perform random access, and the signal quality of the cell changes, the terminal selects another cell, and when the terminal initiates random access again, the terminal needs to apply the waiting time in the system message of the newly-resided cell, and can initiate random access again after the timer corresponding to the waiting time is overtime; or the terminal still uses the waiting time in the system message of the original cell after reselecting the cell, and the random access can be initiated again after the timer corresponding to the waiting time is overtime.
In this embodiment, there are other implementation manners, the base station may set a waiting time in the random access response, and after the terminal obtains the waiting time through the random access response, the terminal needs to wait for the set time after the random access fails, and then can initiate the random access again. This requires that a new information element is added to the random access response to indicate the latency.
In this embodiment, there are other implementation manners, the terminal obtains the waiting time through the system message, after the random access of the terminal fails, the terminal takes a random number between 0 and the waiting time as the actual waiting time, and only after the actual waiting time is overtime, the terminal can initiate the random access again.
Example 3
In a Wideband Code Division Multiple Access (WCDMA) system of this embodiment, a large number of MTC devices and H2H devices reside in a certain cell governed by a Radio Network Controller (RNC), and some of these devices are in a connected state and some are in an idle state. At a certain moment, some MTC devices need to initiate a service request due to data transmission. One of the procedures for the MTC device (referred to as MD1) to initiate random access is as follows:
the random access process of the physical layer in WCDMA is triggered by the MAC layer, the physical layer firstly determines the random access resources (signature and available time slot) and the power for sending Preamble according to the parameters obtained from the RRC layer and MAC, sends Preamble (RACH Preamble part), and then receives feedback AI on the downlink time slot corresponding to the uplink time slot for sending Preamble. For the reception of AI, there are three cases in total:
1. the ACK identification is received on the downlink slot: the physical layer sends an access message (RACH message) to the network side. And after the data transmission is finished, feeding back the state 'RACH message transmitted' to the MAC layer, and exiting the physical random access process. This indicates that the random access was successful.
2. NACK identification is received on the downlink slot: at this time, the physical layer feeds back the state "Nack on aichreaded" to the MAC and exits the physical random access procedure.
3. If neither an ACK nor a NACK is received: at this time, if the sending times of the Preamble does not reach the upper limit Trans _ Max, the physical layer reselects the random access resource, increases the transmitting power and performs the random access again; if the sending times of the Preamble reaches the upper limit, the physical layer feeds back the state 'No ack on AICH' to the MAC layer and exits the physical random access process.
If the upper layer of MD1 does not receive the "RACH message transmitted" fed back by the physical layer, it indicates that the random access has failed. If MD1 still needs to initiate a service request, the physical layer will be triggered again to perform a random access procedure. There is a waiting period, which may be controlled by the RRC layer, or by the MAC layer, or by the physical layer. The waiting time can be set in a mode predetermined by a protocol or set by a system message. The protocol agreement is in the same manner as the method described in embodiment 1, and the system message setting is the same as the method described in embodiment 2.
By setting the waiting time, the number of terminals initiating random access in unit time can be controlled, and the success rate of the random access of the terminals is improved. The overload of wireless resources caused by the fact that a large number of terminals access the network at the same time can be avoided.
In this embodiment, if the terminal reselects another cell before the terminal initiates random access again, the terminal deletes the configuration of the waiting time of the original cell, and immediately initiates random access in the new cell.
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict.
It will be apparent to those skilled in the art that the modules or steps of the present invention described above may be implemented by a general purpose computing device, they may be centralized on a single computing device or distributed across a network of multiple computing devices, and alternatively, they may be implemented by program code executable by a computing device, such that they may be stored in a storage device and executed by a computing device, and in some cases, the steps shown or described may be performed in an order different than that described herein, or they may be separately fabricated into individual integrated circuit modules, or multiple ones of them may be fabricated into a single integrated circuit module. Thus, the present invention is not limited to any specific combination of hardware and software.
The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (6)

1. A random access method, comprising: after the random access of the terminal fails, the random access is initiated after waiting for a set time; wherein,
the set time is acquired according to a waiting time length agreed in advance by a protocol, or acquired according to the waiting time length carried by a system message;
the length of the waiting time prearranged by the protocol or the length of the waiting time carried by the system message is as follows: according to the type of the terminal, and/or the priority of the service initiated by the terminal, and/or whether the service initiated by the terminal is allowed to delay, and/or the group to which the terminal belongs, and/or the access class of the terminal, and/or the roaming condition of the terminal, the corresponding waiting time length is set,
the terminal acquires the set time as follows: the terminal inquires the length of waiting time appointed by a protocol or carried by a system message according to the information such as the terminal type, the terminal priority, the terminal initiated service priority, whether the terminal initiated service allows time delay or not, the group to which the terminal belongs, the terminal access grade and/or the terminal roaming condition, and the like, and takes the obtained value of the length of the waiting time as the set time;
the waiting time length carried by the system message is the waiting time length set by the network side according to the random access load or the access limitation requirement set by the core network.
2. The method of claim 1, wherein when the terminal reselects the cell after the random access fails, the obtaining of the set time according to the waiting time length carried by the system message is as follows: and acquiring the set time according to the waiting time length carried by the system message of the new cell.
3. The method according to claim 1, wherein the terminal is a Machine Type Communication (MTC) device and/or a human-to-human communication (H2H) device.
4. A terminal, characterized in that the terminal comprises: the device comprises a computing device and a storage device, wherein the storage device is used for storing and executing program codes of the computing device, and the computing device is used for waiting for set time and then initiating random access after the random access fails; wherein,
the set time is acquired by the terminal according to a waiting time length agreed in advance by a protocol, or acquired by the terminal according to the waiting time length carried by the system message;
the length of the waiting time prearranged by the protocol according to which the terminal obtains the set time or the length of the waiting time carried by the system message is as follows: according to the type of the terminal, and/or the priority of the service initiated by the terminal, and/or whether the service initiated by the terminal is allowed to delay, and/or the group to which the terminal belongs, and/or the access class of the terminal, and/or the roaming condition of the terminal, the corresponding waiting time length is set,
the terminal acquires the set time as follows: the terminal inquires the length of waiting time appointed by a protocol or carried by a system message according to the information such as the terminal type, the terminal priority, the terminal initiated service priority, whether the terminal initiated service allows time delay or not, the group to which the terminal belongs, the terminal access grade and/or the terminal roaming condition, and the like, and takes the obtained value of the length of the waiting time as the set time;
the waiting time length carried by the system message is the waiting time length set by the network side according to the random access load or the access limitation requirement set by the core network.
5. The terminal of claim 4, wherein in case of reselecting a cell after a random access failure, the computing device is further configured to: and acquiring the set time according to the waiting time length carried by the system message of the new cell.
6. The terminal according to claim 4, wherein the terminal is an MTC device and/or an H2H device.
CN201010602025.0A 2010-12-22 2010-12-22 A kind of accidental access method and terminal Active CN102548012B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201010602025.0A CN102548012B (en) 2010-12-22 2010-12-22 A kind of accidental access method and terminal
PCT/CN2011/080006 WO2012083739A1 (en) 2010-12-22 2011-09-22 Random access method and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201010602025.0A CN102548012B (en) 2010-12-22 2010-12-22 A kind of accidental access method and terminal

Publications (2)

Publication Number Publication Date
CN102548012A CN102548012A (en) 2012-07-04
CN102548012B true CN102548012B (en) 2019-03-15

Family

ID=46313117

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201010602025.0A Active CN102548012B (en) 2010-12-22 2010-12-22 A kind of accidental access method and terminal

Country Status (2)

Country Link
CN (1) CN102548012B (en)
WO (1) WO2012083739A1 (en)

Families Citing this family (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109547186B (en) * 2013-08-14 2022-02-18 华为技术有限公司 A method, terminal and base station for random access to a network
CN106162923A (en) * 2015-04-10 2016-11-23 中兴通讯股份有限公司 Random access signaling resend method and device
CN106412091A (en) * 2016-10-25 2017-02-15 广东欧珀移动通信有限公司 Data transmission control method, device and system
CN112087814B (en) 2016-12-26 2022-10-28 Oppo广东移动通信有限公司 Random access method and device
ES2856089T3 (en) * 2017-01-23 2021-09-27 Guangdong Oppo Mobile Telecommunications Corp Ltd Method for random access, terminal device and network device
WO2018191899A1 (en) * 2017-04-20 2018-10-25 北京小米移动软件有限公司 User equipment protection method, device, user equipment and base station
US11184941B2 (en) 2017-05-18 2021-11-23 Beijing Xiaomi Mobile Software Co., Ltd. Method and apparatus for protecting user equipment, user equipment and base station
RU2740512C1 (en) * 2017-08-09 2021-01-15 Бейджин Сяоми Мобайл Софтвеа Ко., Лтд. Overheating protection method and device of user equipment, user equipment and base station
CN109429356B (en) * 2017-08-23 2020-07-14 维沃移动通信有限公司 System information transmission processing method and user terminal
CN107404746B (en) * 2017-08-25 2020-12-29 深圳传音通讯有限公司 Reselection optimization system and method after random access cell failure
CN108769995B (en) * 2018-05-29 2023-04-18 武汉虹信科技发展有限责任公司 Service scheduling processing method and device
CN113473571B (en) * 2021-06-29 2022-10-21 中信科移动通信技术股份有限公司 Cell access control method, device and base station
CN115379586B (en) * 2022-08-22 2025-02-14 上海移芯通信科技股份有限公司 A random access fallback optimization method and device
CN119865923A (en) * 2025-01-06 2025-04-22 中国联合网络通信集团有限公司 Communication method, program product, device and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1505336A (en) * 2002-12-03 2004-06-16 华为技术有限公司 A random access control method
CN101616488A (en) * 2008-06-23 2009-12-30 华为技术有限公司 A control method, device and system for enhanced random access

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101132622B (en) * 2006-08-20 2010-05-12 华为技术有限公司 A Quality of Service Control Method for Random Access
CN101247647B (en) * 2007-02-15 2011-10-26 中兴通讯股份有限公司 Method for reinforcing ascending link and implementing fast switch-over
CN101547513B (en) * 2008-03-25 2011-09-14 华为技术有限公司 Method for controlling access of user equipment in multi-frequency system and network equipment
GB2461780B (en) * 2008-06-18 2011-01-05 Lg Electronics Inc Method for detecting failures of random access procedures

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1505336A (en) * 2002-12-03 2004-06-16 华为技术有限公司 A random access control method
CN101616488A (en) * 2008-06-23 2009-12-30 华为技术有限公司 A control method, device and system for enhanced random access

Also Published As

Publication number Publication date
CN102548012A (en) 2012-07-04
WO2012083739A1 (en) 2012-06-28

Similar Documents

Publication Publication Date Title
CN102548012B (en) A kind of accidental access method and terminal
CN107864499B (en) Access control method and device for user equipment
CN102740493B (en) Terminal Access Control method of adjustment and system
Cheng et al. Overload control for machine-type-communications in LTE-advanced system
EP2929747B1 (en) Overload control in a communication network
CN102448117B (en) A kind of method and apparatus of spatial load forecasting
US8462722B2 (en) Access control for machine-type communication devices
EP2665310B1 (en) Access control method and device
CN103929826B (en) A kind of machine type communication terminal self-adapting random cut-in method and system
US20160143063A1 (en) Enhanced RACH Design for Machine-Type Communications
US20130040597A1 (en) System and method for applying extended accessing barring in wireless communication system
CN102469554B (en) Method for terminal to switch in network and terminal
CN102573097B (en) Method for random access and terminal
JP2014522163A (en) Enhanced access control method in LTE advanced system
CN102740374B (en) Connection control method and system
CN102740492A (en) Method and system for random access control
WO2012024996A1 (en) Random access method and system thereof
WO2012129905A1 (en) Method and system for controlling and determining transmission power of preamble during random access process
WO2012041112A1 (en) Power control method, network side apparatus and terminal
Cheng et al. Performance evaluation of radio access network overloading from machine type communications in LTE-A networks
CN102638880A (en) Method and device for terminal data transmission
CN102238689B (en) A kind of connection control method of mechanical type communication terminal and system
EP3573374B1 (en) Method and communication device for controlling access to a wireless access network
CN102448142B (en) Method and device for controlling terminal to select network
CN113556726A (en) Communication processing method, device and base station

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant