Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A method and system for configuring access control parameters

A technology of access control and configuration method, which is applied in the field of shared network, can solve the problems of system message bit increase, UE power consumption increase, frequency increase, etc., to reduce bit number and update frequency, reduce power consumption, and better load control Effect

Active Publication Date: 2018-01-02
ZTE CORP
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In order to solve this problem, different EAB parameters can be set for different networks. If a set of EAB parameters requires 10 bits, then 60 bits are required for the shared 6 networks (6 PLMNs), which will cause a network-side broadcast system The number of message bits increases a lot, which greatly increases the overhead of air interface signaling; and because the significant increase in the number of bits will cause an increase in the number of system message modifications, which will cause frequent updates of system messages, which in turn will cause an increase in paging signaling. The number of times paging to obtain new system messages increases, thereby increasing UE power consumption

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system for configuring access control parameters
  • A method and system for configuring access control parameters
  • A method and system for configuring access control parameters

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0042] figure 2 It is a schematic flow chart of Embodiment 1 of the method for configuring access control parameters in the present invention. In an LTE system, a cell under the jurisdiction of a base station is a cell shared by multiple networks, and the network list (PLMNIdentity List) contained in its system message is as follows: Network PLMN 1, Network PLMN 2 and Network PLMN 3; in order to cope with the large-scale introduction of UEs or communication devices suitable for EAB, the base station needs to broadcast EAB parameters in the cell to control UEs accessing the network and control the load of the network, such as figure 2 As shown, the method includes the following steps:

[0043] Step 201, the base station obtains the load status of the access network side network and / or the load status of the core network side network;

[0044] Specifically, the base station can obtain the network (Selected PLMN) selected by the UE from the UE accessing the network, and then m...

Embodiment 2

[0058] image 3 It is a schematic flow diagram of Embodiment 2 of the method for configuring access control parameters in the present invention. In the LTE system, in the UMTS shared network, the shared radio network controller (RNC, Radio Network Controller) uses EAB parameters to configure the access control parameters of the access network. UE performs access control, such as image 3 As shown, the method includes the following steps:

[0059] In step 301, a shared core network element is overloaded, and a PLMN that needs access control is determined.

[0060] In step 302, the shared core network element sends an overload message to the shared RNC, and the message carries the identification of the PLMN that needs to perform access control.

[0061] In this embodiment, the networks broadcast in the cell (one or more cells) under the jurisdiction of the RNC include PLMN1, PLMN 2, PLMN 3, and PLMN 4, and the PLMN identification contained in the overload message sent by the c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses a method for configuring access control parameters, comprising: a user equipment (UE) receiving a set of access control (EAB) parameters configured by a wireless network side for multiple networks and broadcasted through system messages and a network applying the EAB parameters information, and decide whether to apply the EAB parameters to the initial access decision according to the network information of the applied EAB parameters; the present invention also provides a configuration system for access control parameters. According to the technical scheme of the present invention, the number of bits in the system information can be effectively reduced, and the times of updating the system information can be reduced.

Description

technical field [0001] The invention relates to a shared network technology in the communication field, in particular to a configuration method and system for access control parameters. Background technique [0002] The shared network can provide multiple operators' Public Land Mobile Networks (PLMN, Public Land Mobile Network) with common use of the same network node, which can avoid repeated network construction in the same area and save operators' network construction costs. In the shared network, when the core network node is overloaded, it sends an overload indication message to the access network node. After receiving the overload indication message, the access network node will no longer select the core network node as the service node of the terminal, but Select other available core network nodes; if there is no available core network node, the access network node will reject the terminal's access request or broadcast Access Class Barring (ACB, Access Class Barring) ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W48/10H04W48/16H04W68/02
Inventor 塞尔吉奥帕洛拉里邓云
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products