Network connecting control technology in CDMA system
A network access and access controller technology, applied in access restrictions, transmission systems, network topology, etc., can solve problems such as heavy instantaneous loads, and achieve the effect of congestion and network load reduction
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 example
[0028] Referring to FIG. 2A, the CDMA wireless access control node 200 according to the first embodiment of the present invention has a hardware structure, and the hardware structure includes a state management table 210, a program-controlled processor 211, a program memory 212, wireless system hardware 213 , and wired system hardware 214 . According to the present embodiment, the program memory 212 stores an access control program, and the access control program runs on the program-controlled processor 211 to implement network access control operations. The state management table 210 can be created in a random access memory (not shown) in the CDMA radio access control node 200 .
[0029] Referring to Figure-2B, the state management table 210 manages the received access requests of users whose wireless / wired resource setting operations have not been completed, in other words, the above request primitives have been sent but not yet received. to the primitive of the response. ...
no. 2 example
[0051] According to a second embodiment of the present invention, access control is implemented by using priorities previously assigned to individual CDMA wireless terminals.
[0052] Referring to Fig.-5A, 5C, a CDMA radio access control node 200 according to the second embodiment of the present invention includes a state management table 220, which manages received access start requests while viewing their priorities.
[0053] In the present embodiment, the state management table 220 may contain a predetermined number of items, which is the maximum number of simultaneously operable primitives as in the case of the first embodiment. Each item in the status management table 220 includes a user identifier and its priority. As shown in Figure-5A, user terminal A is assigned a priority of 3, user terminal B is assigned a priority of 2, which is higher than priority 3, and so on. In this example, user terminal D is assigned the highest priority of 1 and user terminals F and H are ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 