Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Access control method and communication node

A communication node and access control technology, applied in the field of wireless communication, can solve problems such as access congestion, and achieve the effect of improving the success rate of access and avoiding the phenomenon of access congestion.

Inactive Publication Date: 2017-03-29
ZTE CORP
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Considering that the number of user communication devices supported in the Internet of Things is very large, and these user devices are usually accessed through a Physical Random Access Channel (PRACH) of the LTE / LTE-A system, in specific When using it, it is often found that there will be access congestion

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control method and communication node
  • Access control method and communication node
  • Access control method and communication node

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0083] Such as figure 1 As shown, this embodiment provides an access control method, the method comprising:

[0084] Step S100: the first type of node sends indication information through a downlink channel; wherein, the indication information includes at least configuration information of a first physical random access channel (PRACH) resource. The indication information may be used to control the second type of nodes to access the first type of nodes.

[0085] The access control method described in the embodiment of the present invention can be applied to a first type of node, and the first type of node can include a macro base station (Macrocell), a micro base station (Microcell), a pico base station (Picocell), and a femto base station ( Femtocell) is also called home base station, low power node (LPN) and relay station (Relay) and other communication nodes.

[0086] The first PRACH resource is a PRACH resource newly configured by the node of the first type after the pre...

Embodiment 2

[0122] Such as figure 2 As shown, this embodiment provides an access control method, the method comprising:

[0123] Step S210: When the first condition is met, the second type of node detects the indication information sent by the first type of node; wherein, the indication information includes at least the configuration information of the first physical random access channel PRACH resource

[0124] Step S220: According to the indication information, send random access signaling to the first type of node through the first PRACH resource.

[0125] The access control method described in this embodiment can be applied to a second type of node, and the second type of node can be a second type of node of human-to-human H2H, a second type of node of machine-to-machine M2M, or a vehicle-to-vehicle V2V The second type of node or the second type of node for device-to-device D2D. Typical representatives of the second type of H2H nodes may include mobile phones and the like. The sec...

example 1

[0192] The first type of node sends indication information to the second type of node through a downlink channel, wherein the second indication information includes at least one of the following:

[0193] First PRACH resource configuration information.

[0194] The indication information may be sent in a random access response message.

[0195] The configuration information of the first PRACH resource includes at least one of the following:

[0196] Time-frequency resource configuration information of the first PRACH resource;

[0197] Carrier information corresponding to the first PRACH resource;

[0198] Index information of the random access sequence of the first PRACH resource;

[0199] Duration information of the first PRACH resource;

[0200] Enabling time information of the first PRACH resource;

[0201] Disabling time information of the first PRACH resource;

[0202] Furthermore, the disabling time information included in the disabling time information of the fir...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses an access control method and a communication node. The method comprises the following steps: a node of a first type sends indication information through a downlink channel, wherein the indication information at least comprises configuration information of first physical random access channel PRACH resources.

Description

technical field [0001] The present invention relates to the field of wireless communication, in particular to an access control method and a communication node. Background technique [0002] Machine Type Communication (MTC for short) User Equipment (UE for short) (hereinafter referred to as MTC UE), also known as Machine to Machine (M2M for short) user communication equipment, is the main application form. Low power consumption and low cost are important guarantees for its large-scale application. Currently, the M2M devices deployed in the market are mainly based on the Global System of Mobile communication (GSM for short) system. In recent years, due to the improvement of spectrum efficiency of Long Term Evolution (LTE) / LTE-A, more and more mobile operators choose LTE / LTE-A as the future broadband wireless communication system direction of evolution. M2M multi-type data services based on LTE / LTE-A will also be more attractive. Only when the cost of LTE-M2M equipment ca...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W28/02
CPCH04W28/0289H04W28/02Y02D30/70
Inventor 刘锟戴博夏树强陈宪明石靖张雯
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products