Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Access control method for neighbor service, and ProSe UE

A technology for access control and access level restriction, applied in the field of communications, which can solve problems such as increased network load and interference

Inactive Publication Date: 2016-07-27
ZTE CORP
View PDF6 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the access control for the neighbor service (ie, the D2D) has not been proposed in the prior art to avoid the problems of overloading the network and excessive interference, especially in high-load application scenarios and high-interference scenarios. Controlled user equipment access to the network to use D2D services will lead to further aggravation of network load and interference

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control method for neighbor service, and ProSe UE
  • Access control method for neighbor service, and ProSe UE
  • Access control method for neighbor service, and ProSe UE

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0196] This example describes the process of using the AC value of the cellular ACB mechanism to access a cell when ProSeUE initiates competition for resources for D2D communication and / or applies for access to the network. The method of accessing a cell by initiating competition for resources is the first resource allocation method in D2D communication; the method of accessing the network based on application is the second resource allocation method in D2D communication. In the second resource allocation mode, in order to be able to apply for resources to the eNB for data transmission of D2D communication, etc., the ProSeUE needs to access the network and enter the connected state.

[0197] When ProSeUE needs to perform D2D communication and the network is relatively congested, the network needs to control the competition initiation and / or access application preparation. ProSeUE uses the AC value in the ACB mechanism set in the cellular network to initiate contention and / or c...

example 2

[0208] like Image 6 As shown, the ProSeUE described in this example uses the cellular ACB mechanism when preparing for D2D communication to initiate competition for resources and / or to apply for access to the network. AC values ​​include:

[0209]Step S101: Determine whether T302 or Tbarring is running. The T302 and the Tbarring are the access barring timers described in the foregoing embodiments. When the T302 or Tbarring is running, go to step S108; when the T302 or Tbarring is not running, go to step S102. The running of Tbarring or T302 indicates that the access barring timer is valid, and the access barring time is not over yet. The non-running of Tbarring or T302 indicates that the access barring timer is invalid, the access barring time has expired or the access barring timer has not been started.

[0210] Step S102: Determine whether the access control information received from the base station includes ac-BarringInfo and ac-BarringForProSeComm; if yes, go to step ...

example 3

[0219] Example 3: When the ProSeUE needs to perform D2D discovery, the ProSeUE needs to obtain resources through competition. In the second resource allocation mode, in order to be able to apply for resources from the eNB to perform D2D discovery data transmission, etc., the ProSeUE needs to access the network and enter the connected state. When the network is relatively congested, the network needs to control the initiation of competition and / or the preparation for applying for access. When ProSeUE performs D2D discovery, it sets configuration information based on the EAB mechanism, then the ProSeUE configured with EAB makes an initial emergency call, and the ProSeUE with the AC value of ProSe communication ranging from 11 to 15 will ignore any EAB information broadcast by any network. If the network does not broadcast EAB information, ProSeUE will perform ACbarring to perform access control on the allocated competing resource pool / cell. If the EAB information broadcast by t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an access control method for the neighbor service, and a terminal. The method comprises the steps of determining whether an access-forbidden timer is running or not; on the condition that the timer is running, forbidding the ProSe UE to initiate a cell access request or visit the neighbor service to access to competitive resources; on the condition that the timer is not running, determining whether to allow the ProSe UE to initiate the cell access request or visit the neighbor service to access to competitive resources or not according to the access class restricted information contained in the access control information of the neighbor service and access class restricted parameters for the communication of the ProSe UE.

Description

technical field [0001] The present invention relates to an access control technology in the communication field, in particular to an access control method for Proximity-based Services (Proximity-based Services, ProSe) user equipment (User Equipment, UE). Background technique [0002] In the field of wireless communication, with the rapid development of smart terminals and mobile Internet applications, people have higher and higher requirements for user experience, high speed, and large data volume. The existing cellular network with the base station as the center of the data transmission node has obvious limitations in the support of high data rate and proximity service. Under the background of this demand, the D2D (Device-to-Device , device-to-device) communication (the D2D includes the above ProSe communication) technology emerges as the times require. The application of D2D technology can reduce the burden of the cellular network, reduce the battery power consumption of ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W48/04
CPCH04W48/04Y02D30/70
Inventor 罗宇民吴蕴璐黄莹罗薇陈琳马书宇
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products