User access method

An access method and user technology, applied in the communication field, can solve problems such as high wireless resource overhead

Inactive Publication Date: 2019-08-02
POTEVIO INFORMATION TECH
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0022] In scheme 2, it is necessary to send the complete PagingRecordList or the complete UE ID list corresponding to the specified Preamble in the beam responding to PIs (depending on whether...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User access method
  • User access method
  • User access method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059] In order to make the purpose, technical means and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings.

[0060] For solution 2 described in the background technology, here is an analysis of the reasons for the large downlink wireless resource overhead: in solution 2, it is necessary to send the complete PagingRecordList or the complete UE ID list corresponding to the specified Preamble in the beam responding to the PI (depending on whether A common Preamble is allocated to all UEs responding to PIs or a dedicated Preamble is allocated to each PI). Based on this processing, it can be seen that the size of the downlink overhead depends on the number of beams responding to PIs. If the UEs responding to the PI are distributed in different beams, the downlink overhead will be greatly affected. At the same time, in solution 2, UEs in the same beam that respond to PI may ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The application discloses a user access method, comprising: a UE detects a paging message, the paging message carries a paging indication PI, an exclusive Preamble index corresponding to each PI, anda random access PRACH channel resource index, wherein the PIs in the paging messages on the same beam correspond to the same PRACH resource; when the UE matches any PI, the UE uses an exclusive Preamble to send a random access request on a PRACH channel resource corresponding to the PI so as to respond to the PI; the gNode B only sends an RAR message on a wave beam responded by the UE, and carriesthe RAPID and the corresponding UE ID information; the UE reads the RAR message, checks the ID of the UE and confirms whether the UE is really paged or not; and when it is confirmed that the user equipment is really paged, the UE accesses the network to perform data transmission. Through the processing, the downlink overhead can be reduced, and the realization is simple.

Description

technical field [0001] The present application relates to communication technology, in particular to a user access method. Background technique [0002] In the LTE system, the basic mechanism of paging is: eNodeB broadcasts a paging message, the message carries a complete PagingRecordList, and each PagingRecord contains the identifier ue-Identity (UEID) of the UE being paged. The UE will wake up at the paging time (PO) to monitor and detect the PDCCH scrambled with the P-RNTI, and the UE reads the ue-Identity in each PagingRecord in the PagingRecordList. If the UE finds that its UE identity is consistent with a certain ue-Identity, it will send the ue-Identity and cn-Domain to the upper layer for further processing. If the UE does not find a ue-Identity consistent with its UE identity, the UE discards the received Paging message and enters dormancy. [0003] At present, in the research of 5G New Radio (NR) system, the concept of beam scanning is introduced, and RAN2 has ag...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W28/06H04W68/02H04W74/08
CPCH04W28/06H04W68/02H04W74/0833
Inventor 许彬周欣
Owner POTEVIO INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products