Unlock instant, AI-driven research and patent intelligence for your innovation.

User filtering method and base station for user filtering

A screening method and user technology, applied in security devices, network traffic/resource management, access restrictions, etc., can solve problems such as high system load and affect device access, reduce impact, reduce false alarms, and improve system performance Effect

Active Publication Date: 2015-07-08
HUAWEI TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This will affect the access of other real user devices, and the system load will always be in a high load state

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User filtering method and base station for user filtering
  • User filtering method and base station for user filtering
  • User filtering method and base station for user filtering

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0022] figure 1 It is a flowchart of a user screening method provided by an embodiment of the present invention. In this embodiment, the execution subject may be a base station, or a module or device set on or connected to the base station. Such as figure 1 As shown, user screening methods include:

[0023] Step 11, judging whether the number of users detected in the current transmission time interval (Transmission Time Interval, TTI) exceeds the upper limit of ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to a user screening method and a base station for user screening. The method includes: judging whether the number of users detected within a current TTI exceeds an upper limit of the number of users capable of being processed within the current TTI; and if the upper limit is exceeded, discarding users corresponding to preamble sequences generated by a same root sequence. Whether a current load condition is a high load is known by judging whether the number of users detected within the current TTI exceeds the upper limit of the number of users capable of being processed within the current TTI, and the users detected under a high load condition are detected and discarded, so that a random access false alarm flow caused by interference signals is effectively controlled.

Description

technical field [0001] The invention relates to wireless communication technology, in particular to a user screening method and a base station for user screening. Background technique [0002] A random access channel (Radom Access Channel, RACH) is mainly used for initial access of network access. In a Long Term Evolution (LTE) system, the RACH does not carry any user equipment data, and is mainly used to enable those user equipments that have not obtained or lost uplink synchronization to achieve uplink timing synchronization. [0003] The RACH corresponding to the physical layer is called a physical random access channel (Physical Radom Access Channel, PRACH). The access user sends a random access sequence according to the time-frequency resource configured by the base station, and the base station periodically detects the random access sequence transmitted by the user according to the same time-frequency resource configuration. During detection, the base station uses th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/00H04W24/00H04W48/06H04W12/122
CPCH04W28/0289H04W48/06H04W74/0833
Inventor 储建栋韩世进
Owner HUAWEI TECH CO LTD