M2M communication access control optimizing method for emergency event of LTE network

A technology for emergencies and optimization methods, which is applied in access restrictions, machine-to-machine/machine-type communication services, wireless communication, etc. It can solve the problems of unsmooth and unreliable M2M communication access, and improve latency performance. , high reliability, smooth access effect

Active Publication Date: 2017-08-22
PLA UNIV OF SCI & TECH
View PDF10 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In a word, the problem existing in the existing technology is: when an emergency event occurs on the LTE network, M2M communication access is not smooth and unreliable

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • M2M communication access control optimizing method for emergency event of LTE network
  • M2M communication access control optimizing method for emergency event of LTE network
  • M2M communication access control optimizing method for emergency event of LTE network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] Such as figure 1 As shown, the present invention responds to the M2M communication access control optimization method of the LTE network emergency, including the following steps:

[0028] (10) Report the occurrence of an emergency: the machine node sends a specific preamble to the base station, the specific preamble is reserved by the base station for an emergency, can only be sent by the machine node, and is used to report the occurrence of an emergency;

[0029] Such as figure 2 As shown, the (10) reporting emergency occurrence steps include:

[0030] (11) Transmission of emergency preamble: After an emergency event occurs, the emergency node transmits a special emergency preamble to the base station, which is specially reserved by the base station for the emergency node;

[0031] (12) Determine the occurrence of an emergency event: after receiving the emergency preamble, the base station determines that an emergency event occurs and prepares to make corresponding ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an M2M communication access control optimizing method for an emergency event of the LTE network. The method comprises the following steps of (10) reporting occurrence of the emergency event, in which a machine node sends a specific lead code to a base station; (20) preventing access of a common service by placing the emergency event in the highest priority according to the specific lead code; (30) estimating the number of emergency nodes, in which the base station estimates the number of nodes that request access; (40) adjusting the length of an access time slot adaptively, in which the base station adjusts the length of the access time slot adaptively according to the number of the nodes; (50) determining the event is processed, in which the emergency event is determined to be processed if there is no node transmission lead code; and (60) recovering the time slot of the base station to normal configuration, in which access forbidden parameters of common machine nodes are recovered to normal values, and the time length of the access time slot is recovered to normal configuration. Via the access control optimizing method, access is smooth, and the reliability is high.

Description

technical field [0001] The invention belongs to the technical field of machine communication, in particular to an M2M communication access control optimization method for unobstructed access and high reliability for LTE network emergencies. Background technique [0002] M2M (Machine-to-Machine) communication is a communication technology closely related to IoT (Internet of Things), which means that devices can transmit information through wired or wireless methods without human intervention. Currently, due to the huge commercial value and broad application prospects of M2M services, such as smart transportation, smart grid, earthquake monitoring, consumer equipment, smart home, public security and smart medical care, M2M communication is attracting more and more attention. [0003] In existing cellular networks such as LTE, there have been many studies on M2M communication. Existing cellular networks are mainly designed for human-to-human (H2H) communication. Since M2M comm...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L5/00H04W4/00H04W48/02H04W48/16H04W74/08
CPCH04L5/0048H04W4/70H04W48/02H04W48/16H04W74/0833H04W74/0875
Inventor 李宁曹朝王聪谢威许魁
Owner PLA UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products