Base station, terminal access control device and method

A terminal access and control method technology, applied in the field of communications, can solve problems such as poor user experience, and achieve the effects of reducing processing load, improving accuracy, and improving path utilization.

Inactive Publication Date: 2018-09-25
ZTE CORP
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The embodiment of the present invention provides a base station, a terminal access control device and method, and the main technical problem to be solved is: solving the existing problem of repeated invalid terminal access process and poor user experience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Base station, terminal access control device and method
  • Base station, terminal access control device and method
  • Base station, terminal access control device and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0045]In order to avoid the failure of the service path requested by the terminal, the base station repeatedly creates the path, allows the terminal to access, releases the connected terminal, deletes the invalid access process of the path, improves the accuracy of terminal access, and reduces the processing load, the embodiment of the present invention provides a terminal access control method, please refer to figure 2 ,include:

[0046] S11: Monitor each service path that has been established between the base station and the serving gateway, and mark a currently faulty service path as a faulty service path.

[0047] Monitoring the status of the service path that has been established can be realized specifically through the base station on the service path. The base station sends an Echo Request response request message to the service gateway on the service path, and responds to the request based on the Echo Response fed back by the service gateway Respond to the message to...

Embodiment 2

[0074] On the basis of Embodiment 1, this embodiment of the present invention provides a terminal access control method. Please refer to image 3 , including the following steps:

[0075] S21: Monitor each service path that has been established between the base station and the serving gateway, and mark a currently faulty service path as a faulty service path.

[0076] S22: When it is detected that the user requests to access a certain service path, and the service path is a faulty service path, refuse the user to access the requested service path.

[0077] The above steps S21 and S22 are the same as the steps S11 and S12 in the first embodiment, and will not be repeated here. In order to better use the present invention, further, the terminal access control method provided in this embodiment further includes the following steps:

[0078] S23: Reserve the faulty service path, and send a response request message to the service gateway on the faulty service path according to a ...

Embodiment 3

[0101] An embodiment of the present invention provides a device for controlling terminal access, which is used to implement the method for controlling terminal access described in Embodiment 1 and / or Embodiment 2 above. Please refer to Figure 6 , the terminal access control device 6 includes:

[0102] The fault monitoring module 61 is configured to monitor each service path established between the base station and the serving gateway, and mark the service path that is currently faulty during monitoring as a faulty service path. Specifically, the fault monitoring module 61 can monitor the state of the service path by sending an Echo Request response request message to the service gateway on the service path. For example, when the fault monitoring module 61 sends an Echo Request message to the service gateway on the service path After the Request responds to the request message, if an Echo Response response message fed back by the service gateway is received within a preset tim...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Embodiments of the invention disclose a base station, a terminal access control device, and a terminal access control method, wherein the method comprises the steps of: monitoring each service path that has been established on the user plane between the base station and the serving gateway, and refusing to access the user to the requested service path when monitoring that the service path currently broken down is marked as a fault service path and detecting that the user requests access to a certain service path which is a fault service path, so that the repeated invalid access process of thepath establishment, access, release and deletion is avoided to ensure that the terminal may always access the normal service path, thereby improving the accuracy of the terminal access, reducing the invalid access of the terminal, simultaneously reducing the processing load of the communication system, and benefiting for improving the user experience.

Description

technical field [0001] The present invention relates to the field of communication technologies, and in particular to a base station, a terminal access control device and method. Background technique [0002] Terminal access is the necessary basis for normal information interaction between a user terminal and a communication network or other user terminals. For example, see figure 1 , if mobile phone 1 wants to realize a call connection with mobile phone 2, it should first successfully connect to its corresponding base station 3, then establish a service path with core network 5 through base station 3, and then establish a service path through core network 5 The service path between mobile phone 1 and mobile phone 2 can be realized through the service path between mobile phone 1 and mobile phone 2. Therefore, the whole process of terminal access is very important. Any error in the process may cause the communication between mobile phone 1 and mobile phone 2. The call connec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W48/16
CPCH04W48/16
Inventor 王转莉山海丰郭阿弟
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products