Supercharge Your Innovation With Domain-Expert AI Agents!

An access method, device and system

An access method and a technology of an access device, applied in the field of communication, can solve problems such as network congestion, and achieve the effect of avoiding network congestion

Active Publication Date: 2017-12-05
HUAWEI TECH CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] In the research and time course of the existing UE random access process, the inventors of the present invention found that after the base station changes the carrier, a large number of terminals under the base station will initiate random access in a short time, which will easily lead to network congestion

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An access method, device and system
  • An access method, device and system
  • An access method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0076] This embodiment will be described from the perspective of a second network node. The second network node may be a user terminal, which may support CA, and may communicate with one site or communicate with two or more sites at the same time.

[0077] An embodiment of the present invention provides an access method, including:

[0078] The second network node receives the fallback parameter sent by the first network node and the configuration information of the second cell in the first cell;

[0079] The second network node determines the time to initiate access in the second cell according to the fallback parameter, and accesses the second cell at the determined time to initiate access.

[0080] It should be noted that the above-mentioned first network node may specifically be an evolved base station (evolved Node B, referred to as eNB), or a mobile base station (Node B, referred to as NB), or a control base station (Donor eNB, referred to as DeNB), or a home base statio...

Embodiment 2

[0116] This embodiment will be described from the perspective of the first network node.

[0117] An embodiment of the present invention provides another access method, including:

[0118] The first network node sends the fallback parameter and the configuration information of the second cell to the second network node in the first cell, so that the second network node determines the time to initiate access to the second cell according to the fallback parameter, and access the second cell at the determined time for initiating access.

[0119] The configuration information of the second cell includes at least one of the following: the operating frequency of the carrier corresponding to the second cell, the random access time-frequency resource of the carrier corresponding to the second cell, and the time-frequency resource of the carrier corresponding to the second cell. bandwidth;

[0120] Wherein, the first network node may put the fallback parameter and the configuration i...

Embodiment 3

[0134] This embodiment provides another access method, including:

[0135] The second network node receives the configuration information of the second cell broadcast by the first network node in the first cell; in each embodiment of the present invention, it is described in the form of broadcast, of course the second network node receives the configuration information of the second cell in the first cell The configuration information of the second cell sent by a network node may also be a dedicated message sent by the first network node to the second network node, which is not limited here. Various embodiments of the present invention will not be described repeatedly.

[0136] The second network node determines the time to initiate access to the second cell, and accesses the second cell at the determined time to initiate access.

[0137] Embodiment 3 is different from Embodiment 1 and Embodiment 2 in that what the second network node receives is a broadcast message from the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Disclosed are an access method, device and system, the access method comprising: after receiving in a first cell the configuration information of a second cell, a second network node determines, according to a rollback parameter transmitted by a first network node, a time to initiate the access to the second cell. Because the time when all network nodes in communication with the first network node receive the configuration information of the second cell, the rollback parameter, and the time when the access of the second cell is initiated can be different, when the first network node switches to a different cell, the nodes in communication with the first network node will not simultaneously initiate the access to a new cell all at once, thus avoiding the problem of network jam.

Description

technical field [0001] The present invention relates to the field of communication technology, and in particular to an access method, device and system. Background technique [0002] A station (such as a base station Pico1) connected to a user equipment (User Equipment, UE for short) currently uses a component carrier CC1 (Component Carrier) to serve the UE, and Pico1 can use CC2 and CC3 as backups at the same time. Then there is a new site. For example, when Pico2 is turned on, Pico2 can only use CC1. As a result, Pico1 needs to change the working carrier to CC2, so a large number of UEs under Pico1 also need to change the working carrier. [0003] The prior art mainly adopts the following steps for UE random access: [0004] Step 1. The UE sends a random access message RA-Preamble, for example, in subframe N; [0005] Step 2: After receiving the RA-Preamble from the UE, the base station replies with a message RA-Response; [0006] The UE opens the RA-Response Window on ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W74/08
CPCH04W74/08
Inventor 张亮亮张兴炜
Owner HUAWEI TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More