Unlock instant, AI-driven research and patent intelligence for your innovation.

User filtering method and base station for user filtering

A screening method and user technology, applied in security devices, network traffic/resource management, access restrictions, etc., can solve problems affecting device access, high system load, etc., to reduce false alarms, reduce impact, and improve system performance Effect

Active Publication Date: 2012-04-04
HUAWEI TECH CO LTD
View PDF4 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This will affect the access of other real user devices, and the system load will always be in a high load state

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User filtering method and base station for user filtering
  • User filtering method and base station for user filtering
  • User filtering method and base station for user filtering

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0022] figure 1 It is a flowchart of a user screening method provided by an embodiment of the present invention. In this embodiment, the execution subject may be a base station, or a module or device set on or connected to the base station. Such as figure 1 As shown, user screening methods include:

[0023] Step 11, judging whether the number of users detected in the current transmission time interval (Transmission Time Interval, TTI) exceeds the upper limit of ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a user filtering method and a base station for user filtering. The method comprises the following steps of: judging whether the detected user quantity in the TTI overpasses the user quantity upper limit that can be processed in the TTI; if so, rejecting the users corresponding to the leading sequence generated by the same sequence. By judging whether the detected user quantity in the TTI overpasses the user quantity upper limit that can be processed in the TTI, the current load condition can be acquired. Users detected under high load will be detected and rejected, so random access false alarm flow caused by interference signals can be effectively controlled.

Description

technical field [0001] The invention relates to wireless communication technology, in particular to a user screening method and a base station for user screening. Background technique [0002] A random access channel (Radom Access Channel, RACH) is mainly used for initial access of network access. In a Long Term Evolution (LTE) system, the RACH does not carry any user equipment data, and is mainly used to enable those user equipments that have not obtained or lost uplink synchronization to achieve uplink timing synchronization. [0003] The RACH corresponding to the physical layer is called a physical random access channel (Physical Radom Access Channel, PRACH). The access user sends a random access sequence according to the time-frequency resource configured by the base station, and the base station periodically detects the random access sequence transmitted by the user according to the same time-frequency resource configuration. During detection, the base station uses th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/00H04W24/00H04W48/06H04W12/122
CPCH04W28/0289H04W48/06H04W74/0833
Inventor 储建栋韩世进
Owner HUAWEI TECH CO LTD