Network access method, device and system

A technology for network access and configuration information, applied in the field of communication, can solve problems such as increasing network signaling load, and achieve the effects of avoiding sudden spikes, reducing signaling load, and solving congestion

Active Publication Date: 2014-06-25
HUAWEI TECH CO LTD
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In order to prevent M2M terminals from colliding when acquiring access resources, each M2M terminal must be assigned a dedicated access time, which will inevitably increase the signaling load of the network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network access method, device and system
  • Network access method, device and system
  • Network access method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0039] Such as figure 1 As shown, the network access method provided in this embodiment includes:

[0040] 101. Determine a service trigger time according to a predetermined trigger time randomization strategy.

[0041] The predetermined trigger moment randomization strategy may be to randomly select a certain moment within the time interval for data transmission as the service trigger moment; it may also be by setting a trigger condition (such as a threshold value) The moment of satisfaction is the service trigger moment.

[0042] The service triggering time may be the network access time when the M2M terminal reports information for a specific service; taking the smart meter reading service as an example, the service triggering time may be when the M2M terminal needs to report power consumption data. Moment of network random access request.

[0043] 102. At the determined service triggering moment, the terminal initiates a random access request procedure.

[0044] Specif...

Embodiment 2

[0052] to combine image 3 As shown, the network access method provided in this embodiment includes the following steps:

[0053] 301. The MTC Server (Machine Type Communication Server, machine communication server) sends data transmission configuration information to the M2M terminals in the group.

[0054] Wherein, the M2M terminals in the group refer to the M2M terminals of the same terminal group;

[0055]In this embodiment, the data transmission configuration information includes the start time and valid duration of data transmission by the M2M terminal; the start time and valid duration together define a time interval in which an M2M terminal can transmit data. If the data transmission configuration information does not include a start time, the time when the terminal receives the data transmission configuration information by default is the start time of data transmission.

[0056] In addition, the data transmission configuration information may also include service r...

Embodiment 3

[0074] In the second embodiment, since the application layer of the M2M terminal cannot know the configuration of the access channel on the wireless interface, it is impossible to maximize the use efficiency of the service random trigger mechanism. For example, if the current cell is equipped with two random access channels at the same time, it can provide access opportunities for two M2M terminals at the same time, but the M2M terminal application layer can only select the service trigger time in the dimension of time, so it is vacant. 1 / 2 of the access channel resources. Based on the above reasons, this embodiment provides a network access method based on RR layer control to implement a service trigger randomization mechanism.

[0075] to combine Figure 4 As shown, the network access method provided in this embodiment includes the following steps:

[0076] 401. The MTC Server sends data transmission configuration information to the M2M terminals in the group.

[0077] In...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Embodiments of the present invention provide a network access method and apparatus, which relate to the field of communications technologies, and are used to solve the problem of access congestion without adding signaling loads to the network. The network access method includes: determining service triggering time according to a predetermined triggering time randomization policy; and at the determined service triggering time, initiating, by a terminal, a random access request procedure. The method and apparatus provided by the embodiments of the present invention are applicable to all radio communication systems.

Description

technical field [0001] The present invention relates to the field of communication technologies, and in particular to a method, device and system for an M2M terminal to access a network. Background technique [0002] M2M (Machine to Machine, "machine" to "machine") communication is to connect various ubiquitous end devices or subsystems through a variety of Subsystem management and services. For example: install a module that can monitor the operating parameters of the distribution network in the power equipment to realize real-time monitoring, control, management and maintenance of the power distribution system; install a module that can collect oil well working information in the petroleum equipment to remotely adjust the oil well equipment and control, timely and accurately understand the working conditions of oil well equipment; equip vehicles with vehicle-mounted information terminals, remote monitoring systems, etc., to realize vehicle operation status monitoring, etc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W28/02H04W74/08
CPCH04W74/08
Inventor 邓永锋舒兵秦钧赵旸
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products