Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Access control method, access network element, core network element and user equipment

A technology for access control and user equipment, applied in electrical components, network traffic/resource management, wireless communication, etc., can solve problems such as low system transmission efficiency, congestion, network element overload, etc., and achieve the effect of alleviating overload or congestion

Active Publication Date: 2018-07-31
ZTE CORP
View PDF6 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the duration of Internet of Things devices accessing the network is short, and the amount of transmitted data is small, but the number of devices is very large. Every time a device is connected to a wireless communication network, it will result in a large number of control plane signaling on the air interface and control plane signaling on the ground side. However, compared to the amount of data transmitted by the device, the signaling overhead of the control plane is greater than the data volume of the user plane, which leads to low system transmission efficiency and corresponding network element overload and congestion problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control method, access network element, core network element and user equipment
  • Access control method, access network element, core network element and user equipment
  • Access control method, access network element, core network element and user equipment

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0160] This example is used to illustrate the access restriction process initiated by the radio access network itself.

[0161] In this example, an LTE access network is used as an example, and a network element of the radio access network is an eNB.

[0162] Such as Figure 5 As shown, the access restriction methods provided in this example include:

[0163] Step 101: the eNB judges whether its own load level is high or overloaded, and if so, the eNB initiates access restriction on the UE.

[0164] Step 102: For a UE that newly initiates an access request or a connection re-establishment request, the eNB can restrict the UE's access behavior through the RRC connection rejection process or the RRC re-establishment rejection process, and the RRC connection rejection signaling or the RRC connection re-establishment rejection signaling Carry specific access restriction rules and / or access restriction parameters; for a UE in the RRC connection state, the eNB can release the RRC ...

example 2

[0170] This example is used to illustrate the access restriction process initiated by the wireless access network according to the instructions of the core network elements;

[0171] This example takes the LTE access network as an example, the network element of the radio access network is an eNB, and the network element of the core network is an MME (Mobility Management Entity).

[0172] Such as Figure 6 As shown, the access restriction methods provided in this example include:

[0173] Step 201: The MME judges whether its own load level is high or overloaded, and if so, sends overload control information to the eNB through the interface with the eNB, and the information can be sent through the Overload start message or through other S1 interface signaling. The overload control information includes access restriction rules and or access restriction parameters;

[0174] Step 202: The eNB performs access control on UEs in its own cell according to the received overload contr...

example 3

[0177] This example is used to illustrate which access restriction methods and effects can be formed by combining different access restriction indications.

[0178]This implementation specifically explains in examples 1 and 2, what methods can be included in the access restriction rules and / or access restriction parameters contained in the RRC connection rejection signaling or RRC connection release signaling by the eNB, and what kind of access control can be achieved Effect;

[0179] Combining this example with examples 1 and 2, a complete and detailed example including access control procedures and access control parameters can be formed.

[0180] The access restriction rules and / or access restriction parameters contained in the RRC connection rejection signaling, RRC connection reestablishment rejection signaling or RRC connection release signaling by the eNB include the following categories:

[0181] (1) It is forbidden to use UP or legacy to initiate mo-data, or mo-Excep...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses an access control method, an access network element, a core network element and user equipment. The access control method comprises the steps that when the network load of a core network or an access network accords with the overload condition or the congestion status of the core network or the access network accords with the congestion condition, the access network element sends an access limiting indication to the user equipment (UE) through a private radio resource control (RRC) signaling.

Description

technical field [0001] The present invention relates to the field of wireless communication, in particular to an access control method, an access network element, a core network element and user equipment (User Equipment, UE). Background technique [0002] With the introduction of the Internet of Things, a large number of low-cost, small-bandwidth, and small-data IoT devices are connected to the network. However, the duration of Internet of Things devices accessing the network is short, and the amount of transmitted data is small, but the number of devices is very large. Every time a device is connected to a wireless communication network, it will result in a large number of control plane signaling on the air interface and control plane signaling on the ground side. However, compared to the amount of data transmitted by the device, the signaling overhead of the control plane is greater than the amount of data on the user plane, which leads to low system transmission efficien...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W28/02
CPCH04W28/0247H04W28/0289H04W28/02
Inventor 戴谦
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products