Nothing Special   »   [go: up one dir, main page]

CN114071645A - Access control method, device, terminal and network side equipment - Google Patents

Access control method, device, terminal and network side equipment Download PDF

Info

Publication number
CN114071645A
CN114071645A CN202010763102.4A CN202010763102A CN114071645A CN 114071645 A CN114071645 A CN 114071645A CN 202010763102 A CN202010763102 A CN 202010763102A CN 114071645 A CN114071645 A CN 114071645A
Authority
CN
China
Prior art keywords
target
terminal
access
network side
access control
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010763102.4A
Other languages
Chinese (zh)
Other versions
CN114071645B (en
Inventor
金巴·迪·阿达姆·布巴卡
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN202010763102.4A priority Critical patent/CN114071645B/en
Priority to PCT/CN2021/109830 priority patent/WO2022022711A1/en
Publication of CN114071645A publication Critical patent/CN114071645A/en
Application granted granted Critical
Publication of CN114071645B publication Critical patent/CN114071645B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • H04W36/0055Transmission or use of information for re-establishing the radio link

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application discloses an access control method, an access control device, a terminal and network side equipment, and belongs to the technical field of communication. The access control method comprises the following steps: the terminal sends an access request for accessing the target RS to the network side equipment and receives a response message of the network side equipment based on the access request, so that the network access control can be based on the access network slice level, the granularity of the network access control is finer, and the network access of the terminal is more flexible.

Description

Access control method, device, terminal and network side equipment
Technical Field
The application belongs to the technical field of communication, and particularly relates to an access control method, an access control device, a terminal and network side equipment.
Background
The network slicing technology enables an operator to cut out a plurality of virtual end-to-end networks by using a software means on a hardware infrastructure, wherein each cut-out virtual network is logically and completely isolated from equipment to an access network, from the access network to a core network, and from the core network to a transmission network, and is respectively adapted to the technical requirements of respective services. That is to say, the network slicing technology can virtualize a plurality of logic sub-networks with different characteristics, and satisfy the technical difference requirements of services under different scenes (such as industrial control, automatic driving, telemedicine, etc.) through differentiated setting and optimization.
Currently, the network access control function is based on the level of a cell, and the access of a terminal is not flexible enough.
Disclosure of Invention
An object of the embodiments of the present application is to provide an access control method, an access control apparatus, a terminal, and a network side device, which can solve the problem that access of the terminal is not flexible enough due to the fact that a current network access control function is based on a cell level.
In order to solve the technical problem, the present application is implemented as follows:
in a first aspect, an access control method is provided, which is applied to a terminal, and includes:
sending an access request for accessing a target wireless access network slice RS to network side equipment;
receiving a response message of the network side equipment based on the access request
In a second aspect, an access control method is provided, which is applied to a network side device, and includes:
receiving an access request sent by a terminal and used for accessing a target wireless access network slice RS;
responding to the access request.
In a third aspect, an access control apparatus is provided, which is applied to a terminal, and includes:
the first sending module is used for sending an access request for accessing the target wireless access network slice RS to the network side equipment;
a first receiving module, configured to receive a response message based on the access request from the network side device.
In a fourth aspect, an access control apparatus is provided, which is applied to a network side device, and includes:
the first receiving module is used for receiving an access request which is sent by a terminal and used for accessing a target wireless access network slice RS;
and the response module is used for responding to the access request.
In a fifth aspect, a terminal is provided, which comprises a processor, a memory, and a program or instructions stored on the memory and executable on the processor, which when executed by the processor, implement the steps of the access control method according to the first aspect.
In a sixth aspect, a network-side device is provided, which includes a processor, a memory, and a program or an instruction stored on the memory and executable on the processor, and when executed by the processor, the program or the instruction implements the steps of the access control method according to the second aspect.
In a seventh aspect, a readable storage medium is provided, on which a program or instructions are stored, which when executed by a processor implement the steps of the access control method according to the first aspect or the steps of the access control method according to the second aspect.
In an eighth aspect, a chip is provided, where the chip includes a processor and a communication interface, where the communication interface is coupled to the processor, and the processor is configured to run a network-side device program or instruction, to implement the access control method according to the first aspect, or to implement the access control method according to the second aspect.
In the embodiment of the application, the terminal sends an access request for accessing the target RS to the network side equipment and receives a response message based on the access request from the network side equipment, so that the network access control can be based on the access network slice level, the granularity of the network access control is finer, and the network access of the terminal is more flexible.
Drawings
Fig. 1 is a block diagram of a network system according to an embodiment of the present application;
fig. 2 is a flowchart of an access control method provided in an embodiment of the present application;
fig. 3 is another flowchart of an access control method provided in an embodiment of the present application;
fig. 4 is a block diagram of an access control device according to an embodiment of the present application;
fig. 5 is another structural diagram of an access control apparatus according to an embodiment of the present application;
fig. 6 is a block diagram of a communication device provided in an embodiment of the present application;
fig. 7 is another structural diagram of a terminal provided in an embodiment of the present application;
fig. 8 is a structural diagram of a network-side device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some, but not all, embodiments of the present application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The terms first, second and the like in the description and in the claims of the present application are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It should be understood that the data so used are interchangeable under appropriate circumstances such that embodiments of the application can be practiced in sequences other than those illustrated or described herein, and the terms "first" and "second" used herein generally do not denote any order, nor do they denote any order, for example, the first object may be one or more. In addition, "and/or" in the specification and the claims means at least one of connected objects, and a character "/" generally means that a preceding and succeeding related objects are in an "or" relationship.
It is noted that the techniques described in the embodiments of the present application are not limited to Long Term Evolution (LTE)/LTE Evolution (LTE-Advanced) systems, but may also be used in other wireless communication systems, such as Code Division Multiple Access (CDMA), Time Division Multiple Access (TDMA), Frequency Division Multiple Access (FDMA), Orthogonal Frequency Division Multiple Access (OFDMA), Single-carrier Frequency-Division Multiple Access (SC-FDMA), and other systems. The terms "system" and "network" are often used interchangeably in the embodiments of the present application, and the techniques described may be used for bothThe above-mentioned systems and radio technologies may also be used for other systems and radio technologies. However, the following description describes a New Radio (NR) system for purposes of example, and NR terminology is used in much of the description below, although the techniques may also be applied to applications other than NR system applications, such as 6 th generation (6 th generation)thGeneration, 6G) communication system.
Fig. 1 shows a block diagram of a wireless communication system to which embodiments of the present application are applicable. The wireless communication system includes a terminal 11 and a network-side device 12. Wherein, the terminal 11 may also be called as a terminal Device or a User Equipment (UE), the terminal 11 may be a Mobile phone, a Tablet Personal Computer (Tablet Personal Computer), a Laptop Computer (Laptop Computer) or a notebook Computer, a Personal Digital Assistant (PDA), a palmtop Computer, a netbook, a super-Mobile Personal Computer (UMPC), a Mobile Internet Device (MID), a Wearable Device (Wearable Device) or a vehicle-mounted Device (VUE), a pedestrian terminal (PUE), and other terminal side devices, the Wearable Device includes: bracelets, earphones, glasses and the like. It should be noted that the embodiment of the present application does not limit the specific type of the terminal 11. The network-side device 12 may be a Base Station or a core network, where the Base Station may be referred to as a node B, an evolved node B, an access Point, a Base Transceiver Station (BTS), a radio Base Station, a radio Transceiver, a Basic Service Set (BSS), an Extended Service Set (ESS), a node B, an evolved node B (eNB), a home node B, a WLAN access Point, a WiFi node, a Transmit Receiving Point (TRP), or some other suitable terminology in the field, as long as the same technical effect is achieved, the Base Station is not limited to a specific technical vocabulary, and it should be noted that, in the embodiment of the present application, only the Base Station in the NR system is taken as an example, but a specific type of the Base Station is not limited.
The access control method provided by the embodiment of the present application is described in detail below with reference to the accompanying drawings through specific embodiments and application scenarios thereof.
Referring to fig. 2, fig. 2 is a flowchart of an access control method provided in an embodiment of the present application, where the access control method is applied to a terminal, and includes the following steps:
step 201, sending an access request for accessing the target wireless access network slice RS to a network side device.
A target Radio Access Network (RAN) slice (slice) may include one or more RSs.
Step 202, receiving a response message of the network side device based on the access request.
The response message may be a response message that the network side device accepts the terminal to access the target RS, if the target RS includes multiple RSs, the network side device selects one of the multiple RSs to accept the terminal to access, or may be a response message that the network side device rejects the terminal to access the target RS, and if the target RS includes multiple RSs, the network side device rejects the terminal to access any one of the target RSs.
In this embodiment, the terminal sends an access request for accessing the target RS to the network side device, and receives a response message based on the access request from the network side device, so that the network access control can be based on the access network slice level, the granularity of the network access control is finer, and the network access of the terminal is more flexible.
In an embodiment of the present application, the access control method further includes:
and receiving the slice information and the access control information of the RS supported by the network side equipment, which are broadcasted by the network side equipment through a system message block.
The above steps may be performed before step 201, or may be performed after step 201, which is not limited herein. If the above steps are executed before step 201, before the terminal sends the access request for accessing the target RS to the network side device, the terminal receives the slice information and the access control information of the RS supported by the network side device, which are broadcast by the network side device, and may select a suitable RS to initiate the access request based on the access control information of the RS supported by the network side device, thereby improving the access efficiency.
If the above steps are executed after step 201, the terminal may select a suitable RS to initiate an access request based on the access control information of the RS supported by the network side device in the next access request, so as to improve the access efficiency.
The network side device broadcasts the slice Information and the access control Information of the RSs supported by the network side device through a System message block, for example, the slice Information and the access control Information of the RSs supported by the network side device are broadcast in a System message block (SIB) 1, and the terminal receives the System message block and learns the slice Information and the access control Information of the RSs supported by the network side device. In the system message block, the RS supported by the network side device may be one or more RSs.
The slice information of the RS may include: one or more of Public Land Mobile Network (PLMN) Identity (ID), Tracking area (Tracking area) information, RAN notification area (notification area) information, frequency information, service information, and cell information. The access control information of the RS supported by the network side device may include access control information of one or more RSs.
The network side device may broadcast Slice information (i.e., Slice information) of the supported RSs and access control information of each RS in the SIB1, where the access control information may be:
Figure BDA0002613626530000061
the Timer T39X (Timer T39X) is defined as shown in table 1 below:
TABLE 1
Figure BDA0002613626530000062
In this embodiment, the terminal may flexibly select a suitable RS to initiate an access request to the network side device according to the slice information and the access control information of the RS supported by the network side device, which are sent by the network side device, for example, select the RS supported by both the terminal and the network side device for access, thereby avoiding network access failure and improving network access efficiency.
In an embodiment of the present application, in a case that a terminal obtains slice information and access control information of an RS supported by a network side device, step 201, sending an access request for accessing a target radio access network slice RS to the network side device, includes:
if the access control information of the target RS is determined to be forbidden according to the access control information of the RS, starting a timer;
and if the timer is overtime, sending an access request for accessing the target RS to the network side equipment.
The access control information of the RS supported by the network side device includes access control information of one or more RSs, where the access control information of the one or more RSs includes access control information of a target RS.
Before initiating an access request for accessing a target RS, if the access control information of the target RS is determined to be forbidden according to the access control information of the RS, a terminal starts a timer, and sends the access request for accessing the target RS to the network side equipment after the timer is overtime.
Specifically, before a User Equipment (UE) (i.e., a terminal) initiates an access request, a related access control procedure is performed, and if the UAC-BarringPerSlice contains an RS to which the terminal is to initiate access, the terminal checks the UAC-BarringPerSlice configuration, and if the configuration is Barred, starts a timer (Start timer T39 x). By setting this timer, the network can protect itself from overload by prohibiting access attempts of certain UEs under high load conditions.
In an embodiment of the present application, the access control method further includes:
and sending first indication information to the network side equipment, wherein the first indication information is used for indicating the RS set supported by the terminal or expected to be accessed.
The above steps may be performed before step 201, or may be performed after step 201 and before step 202, which is not limited herein. The network side device may determine whether the RS set includes the target RS based on the first indication information sent by the terminal, so as to further determine to send the access resource to the terminal, or send an indication of denying access to the terminal.
The set of RSs may include RSs supported or desired to be accessed by one or more terminals. The network side device can learn one or more RSs supported by the terminal or expected to be accessed based on the first indication information, so as to determine whether to accept the terminal to access the target RS.
Wherein, the terminal sends the first indication information under the condition that at least one of the following conditions is satisfied:
during the connection initiation or during the connection recovery (i.e., resume);
when the connection is successful or the connection is recovered successfully;
after the connection is successful or the connection is recovered successfully;
when the handover is completed.
In an embodiment of the present application, the step 202 of receiving a response message of the network-side device based on the access request includes:
and receiving a response message that the network side equipment accepts the terminal to access the target RS under the condition that the RS set comprises the target RS, wherein the response message comprises the access resource of the target RS.
In this embodiment, the network side device receives the target RS accessed by the terminal. And under the condition that the network side equipment receives the target RS accessed by the terminal, providing the access resource of the target RS for the terminal, wherein the response message comprises the access resource of the target RS.
In an embodiment of the present application, the step 202 of receiving a response message of the network-side device based on the access request includes:
receiving a response message that the network side equipment refuses the terminal to access the target RS under the condition that the RS set comprises the target RS, wherein the response message is used for indicating at least one of the following items:
the target RS reaches the maximum number of connectable terminals;
the number of maximum connections that the target RS has reached;
the target RS reaches the maximum downlink connection number;
the target RS reaches the maximum uplink connection number;
the target RS is overloaded or congested;
the target RS is out of service.
In this embodiment, the RS set may include one or more RSs, and if the RS set includes the target RS, the target RS satisfies: when at least one of the number of terminals that can be connected to the target RS has reached the maximum, the number of connections that the target RS has reached the maximum, the number of downlink connections that the target RS has reached the maximum, the number of uplink connections that the target RS has reached the maximum, the overload or congestion of the target RS, and no service of the target RS is provided, the network side device rejects the terminal to access the target RS, and sends a response message to the terminal that rejects the terminal to access the target RS, for example, an access request that the terminal accesses the target RS is rejected through Radio Resource Control (RRC) signaling. The response message is used for indicating at least one item so as to inform the reason for rejecting the access of the terminal.
And the terminal receives a response message that the network side equipment refuses the terminal to access the target RS, wherein the response message comprises second indication information used for indicating waiting for preset duration.
When the network side device rejects the terminal to access the target RS, the network side device may send second indication information to the terminal, and indicate the terminal to wait for the preset duration, that is, the network side device may send the second indication information for indicating the preset duration to the terminal under the condition that the network side device rejects the terminal to access the target RS, further, the terminal waits for the preset duration after receiving the second indication information, and after the waiting time is overtime, the terminal may request to access the target RS again.
In one embodiment of the present application, the response message includes an access resource of a first RS, and the first RS belongs to the RS set.
The first RS belongs to the RS set, that is, the first RS is an RS supported by the terminal or expected to be accessed. If the network side device does not support the target RS or does not support the target RS at the current time period, the network side device may select a first RS supported by the terminal and also supported by the network side device for the terminal according to the RS set reported by the terminal, and send an access resource accessed to the first RS to the terminal, that is, the response message includes the access resource of the first RS, which may improve the efficiency of the terminal accessing the network.
In an embodiment of the present application, the step 202 of receiving a response message of the network-side device based on the access request includes:
and receiving third indication information which is sent by the network side equipment and used for indicating the rejection of the access under the condition that the RS set does not comprise the target RS.
And if the RS set does not comprise the target RS, the network side equipment rejects the access request of the terminal, and under the condition, the terminal receives third indication information which is sent by the network side equipment and used for indicating the rejection of the access.
Wherein the third indication information is used for indicating at least one of the following items:
the target RS is not a serving RS of the terminal;
and the terminal does not sign the target RS.
At least one item is also the reason why the network side equipment refuses the terminal access request.
For example, if the network side device supports RS1, RS2, and RS3, the terminal reports first indication information supporting or desiring to access RS1, RS4 ', and RS4 to the network side device, that is, the RS set includes information of RS1, information of RS 4', and information of RS 4;
the terminal initiates an access request for accessing a target RS to the network side equipment, wherein the target RS comprises RS1, RS 4' and RS 4;
the network side device selects the RS, that is, RS1, supported by both the network side device and the terminal according to the RS set and the RS supported by the network side device, and issues an Access resource, such as a Random Access Channel (RACH), for the terminal to Access the RS 1.
Referring to fig. 3, fig. 3 is a flowchart of an access control method provided in an embodiment of the present application, where the access control method is applied to a network side device, and includes the following steps:
step 301, receiving an access request for accessing a target radio access network slice RS sent by a terminal.
A first Radio Access Network (RAN) slice (slice) may include one or more RSs.
Step 302, responding to the access request.
The response may be a response that the network side device accepts the terminal to access the target RS, if the target RS includes multiple RSs, the network side device selects one of the multiple RSs to accept the terminal to access, or the response that the network side device rejects the terminal to access the target RS, if the target RS includes multiple RSs, the network side device rejects the terminal to access any one of the target RSs.
In this embodiment, an access request for accessing a target RS, which is sent by a terminal, is received, and the access request is responded, so that network access control can be based on an access network slice level, granularity of the network access control is finer, and network access of the terminal is more flexible.
In an embodiment of the present application, the access control method further includes:
and broadcasting the slice information and the access control information of the RS supported by the network side equipment through a system message block.
The above steps may be performed before step 301, or may be performed after step 301, which is not limited herein. If the above steps are executed before step 301, before the terminal sends the access request for accessing the target RS to the network side device, the terminal receives the slice information and the access control information of the RS supported by the network side device, which are broadcast by the network side device, and may select a suitable RS to initiate the access request based on the access control information of the RS supported by the network side device, thereby improving the access efficiency.
If the above steps are executed after step 301, the terminal may select a suitable RS to initiate an access request based on the access control information of the RS supported by the network side device in the next access request, so as to improve the access efficiency.
The network side equipment broadcasts the slice information and the access control information of the RS supported by the network side equipment through the system message block, and the terminal receives the system message block and acquires the slice information and the access control information of the RS supported by the network side equipment. In the system message block, there may be one or more RSs supported by the network side device.
The slice information of the RS may include: one or more of Public Land Mobile Network (PLMN) Identity (ID), Tracking area (Tracking area) information, RAN notification area (notification area) information, frequency information, service information, and cell information. The access control information of the RS supported by the network side device may include access control information of one or more RSs.
In this embodiment, the network side device broadcasts the slice information and the access control information of the supported RS to the terminal, so that the terminal can flexibly select a proper RS to initiate an access request to the network side device, thereby improving the network access efficiency.
The network side device may broadcast Slice information (i.e., Slice information) of the supported RSs and access control information of each RS in the SIB1, where the access control information may specifically refer to the description in the embodiment shown in fig. 2, and is not described herein again.
In an embodiment of the present application, the access control method further includes: and receiving first indication information sent by the terminal, wherein the first indication information is used for indicating an RS set supported or expected to be accessed by the terminal.
The above steps may be performed before step 301, or may be performed after step 301 and before step 302, which is not limited herein. The network side device may determine whether the RS set includes the target RS based on the first indication information sent by the terminal, so as to further determine to send the access resource to the terminal, or send an indication of denying access to the terminal.
The RS set may include information of RSs supported or desired to be accessed by one or more terminals, and the information of the RS may be an identifier of the RS. The network side device can learn the information of one or more RSs supported by the terminal or expected to be accessed based on the first indication information, so as to determine whether to accept the terminal to access the target RS.
Wherein, the terminal sends the first indication information under the condition that at least one of the following conditions is satisfied:
in the process of initiating connection or in the process of recovering connection;
when the connection is successful or the connection is recovered successfully;
after the connection is successful or the connection is recovered successfully;
when the handover is completed.
In an embodiment of the present application, the step 302 of responding to the access request includes:
and if the RS set comprises the target RS, providing access resources accessed to the target RS for the terminal.
In this embodiment, if the RS set includes the target RS, the network side device receives the target RS accessed by the terminal, and provides an access resource for accessing the target RS for the terminal.
In an embodiment of the present application, the step 302 of responding to the access request includes:
and if the RS set comprises the target RS, sending a response message for rejecting the terminal to access the target RS to the terminal, wherein the response message is used for indicating at least one of the following items:
the target RS reaches the maximum number of connectable terminals;
the number of maximum connections that the target RS has reached;
the target RS reaches the maximum downlink connection number;
the target RS reaches the maximum uplink connection number;
the target RS is overloaded or congested;
the target RS is out of service.
In this embodiment, if the RS set includes the target RS, and the target RS satisfies: and when at least one of the number of the maximum connectable terminals of the target RS is reached, the number of the maximum connections of the target RS is reached, the number of the maximum downlink connections of the target RS is reached, the number of the maximum uplink connections of the target RS is reached, the overload or congestion of the target RS is reached and the service of the target RS is not provided, the network side equipment refuses the terminal to access the target RS.
Wherein the response message includes second indication information for indicating waiting for a preset duration.
When the network side device refuses the terminal to access the target RS, the network side device may send indication information to the terminal, and indicate the terminal to wait for the preset time length, that is, the network side device may send second indication information for indicating the preset time length to the terminal under the condition that the network side device refuses the terminal to access the target RS, further, the terminal waits for the preset time length after receiving the second indication information, and the terminal may request to access the target RS again after the waiting time is overtime.
In an embodiment of the present application, the step 302 of responding to the access request includes:
and under the condition that the RS set does not comprise the target RS, sending third indication information for indicating the rejection of the access to the terminal.
And if the RS set does not comprise the target RS, the network side equipment rejects the access request of the terminal, and under the condition, the network side equipment sends third indication information for indicating the rejection of the access to the terminal.
Wherein the third indication information is used for indicating at least one of the following:
the target RS is not a serving RS of the terminal;
and the terminal does not sign the target RS.
At least one item is also the reason why the network side equipment refuses the terminal access request.
For example, if the network side device supports RS1, RS2, and RS3, the terminal reports first indication information supporting or desiring to access RS1, RS4 ', and RS4 to the network side device, that is, the RS set includes information of RS1, information of RS 4', and information of RS 4;
the terminal initiates an access request for accessing a target RS to the network side equipment, wherein the target RS comprises RS1, RS 4' and RS 4;
the network side equipment selects the RS, namely RS1, supported by both the network side equipment and the terminal according to the RS set and the RS supported by the network side equipment, and issues an access resource, such as RACH resource, for the terminal to access RS 1.
It should be noted that, in the access control method provided in the embodiment of the present application, the execution main body may be an access control device, or a control module in the access control device for executing the access control method. In the embodiment of the present application, an access control apparatus executes an access control method as an example, and the access control apparatus provided in the embodiment of the present application is described.
Referring to fig. 4, fig. 4 is a structural diagram of an access control apparatus according to an embodiment of the present application, where the access control apparatus 400 is applied to a terminal, and includes:
a first sending module 401, configured to send an access request for accessing a target radio access network slice RS to a network side device;
a first receiving module 402, configured to receive a response message based on the access request from the network side device.
Further, the access control apparatus 400 further includes:
and the second receiving module is used for receiving the slice information and the access control information of the RS supported by the network side equipment, which are broadcasted by the network side equipment through a system message block.
Further, the access control apparatus 400 further includes:
a second sending module, configured to send first indication information to the network side device, where the first indication information is used to indicate an RS set supported by the terminal or expected to be accessed.
Further, the response message includes access resources of a first RS, and the first RS belongs to the RS set.
Further, the first indication information is sent when at least one of the following conditions is satisfied:
in the process of initiating connection or in the process of recovering connection;
when the connection is successful or the connection is recovered successfully;
after the connection is successful or the connection is recovered successfully;
when the handover is completed.
Further, the first receiving module 402 is further configured to receive a response message that the network side device accepts the terminal to access the target RS, where the response message includes an access resource of the target RS, if the RS set includes the target RS.
Further, the first receiving module 402 is further configured to receive a response message that the network side device rejects the terminal to access the target RS if the RS set includes the target RS, where the response message is used to indicate at least one of:
the target RS reaches the maximum number of connectable terminals;
the number of maximum connections that the target RS has reached;
the target RS reaches the maximum downlink connection number;
the target RS reaches the maximum uplink connection number;
the target RS is overloaded or congested;
the target RS is out of service.
Further, the response message includes second indication information indicating waiting for a preset duration.
Further, the first receiving module 402 is further configured to receive, when the RS set does not include the target RS, third indication information that is sent by the network side device and used for indicating that access is denied.
Further, the third indication information is used for indicating at least one of the following:
the target RS is not a serving RS of the terminal;
and the terminal does not sign the target RS.
Further, the first sending module 401 includes:
the starting submodule is used for starting a timer if the access control information of the target RS is determined to be forbidden according to the access control information of the RS supported by the network side equipment;
and the sending submodule is used for sending an access request for accessing the target RS to the network side equipment if the timer is overtime.
The access control device in the embodiment of the present application may be a device, and may also be a component, an integrated circuit, or a chip in a terminal. The device can be a mobile terminal or a non-mobile terminal. By way of example, the mobile terminal may include, but is not limited to, the above-listed type of terminal 11, and the non-mobile terminal may be a server, a Network Attached Storage (NAS), a Personal Computer (PC), a Television (TV), a teller machine, a kiosk, or the like, and the embodiments of the present application are not limited in particular.
The access control device in the embodiment of the present application may be a device having an operating system. The operating system may be an Android (Android) operating system, an ios operating system, or other possible operating systems, and embodiments of the present application are not limited specifically.
The access control apparatus 400 provided in this embodiment of the present application can implement each process implemented in the method embodiment of fig. 2, and achieve the same technical effect, and for avoiding repetition, details are not described here again.
Referring to fig. 5, fig. 5 is a structural diagram of an access control apparatus 500 according to an embodiment of the present application, where the access control apparatus is applied to a network side device, and includes:
a receiving module 501, configured to receive an access request sent by a terminal for accessing a target radio access network slice RS;
a response module 502, configured to respond to the access request.
Further, the access control apparatus 500 further includes a broadcasting module, configured to broadcast, through a system message block, the slice information and the access control information of the RS supported by the network side device.
Further, the access control apparatus 500 further includes a second receiving module, configured to receive first indication information sent by the terminal, where the first indication information is used to indicate an RS set supported by or expected to be accessed by the terminal.
Further, the response module is configured to send a response message for accessing a first RS to the terminal, where the response message includes an access resource of the first RS, and the first RS belongs to the RS set.
Further, the first indication information is received when at least one of the following conditions is satisfied:
the terminal initiates a connection process or recovers the connection process;
when the terminal is successfully connected or the connection is successfully restored;
after the terminal is successfully connected or the connection is successfully restored;
and when the terminal switching is completed.
Further, the response module 502 is configured to send a response message for accessing the target RS to the terminal if the RS set includes the target RS, where the response message includes an access resource of the target RS.
Further, the responding module 502 is configured to send, to the terminal, a response message rejecting the terminal to access the target RS if the RS set includes the target RS, where the response message is used to indicate at least one of:
the target RS reaches the maximum number of connectable terminals;
the number of maximum connections that the target RS has reached;
the target RS reaches the maximum downlink connection number;
the target RS reaches the maximum uplink connection number;
the target RS is overloaded or congested;
the target RS is out of service.
Further, the response message includes second indication information indicating waiting for a preset duration.
Further, the responding module 502 is configured to send, to the terminal, third indication information indicating that access is denied if the RS set does not include the target RS.
Further, the third indication information is used for indicating at least one of the following:
the target RS is not a serving RS of the terminal;
and the terminal does not sign the target RS.
The access control apparatus 500 provided in this embodiment of the present application can implement each process implemented in the method embodiment of fig. 3, and achieve the same technical effect, and for avoiding repetition, details are not described here again.
Optionally, as shown in fig. 6, an embodiment of the present application further provides a terminal 600, which includes a processor 601, a memory 602, and a program or an instruction stored in the memory 602 and executable on the processor 601, where the program or the instruction is executed by the processor 601 to implement each process of the access control method embodiment shown in fig. 2, and can achieve the same technical effect, and in order to avoid repetition, details are not repeated here.
Fig. 7 is a schematic diagram of a hardware structure of a terminal for implementing the embodiment of the present application.
The terminal 1000 includes, but is not limited to: a radio frequency unit 1001, a network module 1002, an audio output unit 1003, an input unit 1004, a sensor 1005, a display unit 1006, a user input unit 1007, an interface unit 1008, a memory 1009, and a processor 1010.
Those skilled in the art will appreciate that terminal 1000 can also include a power supply (e.g., a battery) for powering the various components, which can be logically coupled to processor 1010 via a power management system to provide management of charging, discharging, and power consumption via the power management system. The terminal structure shown in fig. 7 does not constitute a limitation of the terminal, and the terminal may include more or less components than those shown, or combine some components, or have a different arrangement of components, and will not be described again here.
It should be understood that in the embodiment of the present application, the input Unit 1004 may include a Graphics Processing Unit (GPU) 10041 and a microphone 10042, and the Graphics Processing Unit 10041 processes image data of still pictures or videos obtained by an image capturing device (such as a camera) in a video capturing mode or an image capturing mode. The display unit 1006 may include a display panel 10061, and the display panel 10061 may be configured in the form of a liquid crystal display, an organic light emitting diode, or the like. The user input unit 1007 includes a touch panel 10071 and other input devices 10072. The touch panel 10071 is also referred to as a touch screen. The touch panel 10071 may include two parts, a touch detection device and a touch controller. Other input devices 10072 may include, but are not limited to, a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, a mouse, and a joystick, which are not described in detail herein.
In this embodiment of the application, the radio frequency unit 1001 receives downlink data from a network side device and then processes the downlink data to the processor 1010; in addition, the uplink data is transmitted to the base station. In general, radio frequency unit 1001 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like.
The memory 1009 may be used to store software programs or instructions and various data. The memory 1009 may mainly include a program or instruction storage area and a data storage area, wherein the program or instruction storage area may store an operating system, an application program or instruction (such as a sound playing function, an image playing function, and the like) required for at least one function, and the like. Further, the Memory 1009 may include a high-speed random access Memory and may also include a nonvolatile Memory, where the nonvolatile Memory may be a Read-Only Memory (ROM), a Programmable ROM (PROM), an Erasable Programmable PROM (EPROM), an Electrically Erasable Programmable ROM (EEPROM), or a flash Memory. Such as at least one magnetic disk storage device, flash memory device, or other non-volatile solid state storage device.
Processor 1010 may include one or more processing units; alternatively, processor 1010 may integrate an application processor that handles primarily the operating system, user interface, and application programs or instructions, and a modem processor that handles primarily wireless communications, such as a baseband processor. It will be appreciated that the modem processor described above may not be integrated into processor 1010.
The radio frequency unit 1001 is configured to send an access request for accessing a target radio access network slice RS to a network side device, and receive a response message based on the access request from the network side device.
Further, the radio frequency unit 1001 is further configured to receive slice information and access control information of an RS supported by the network side device, where the slice information and the access control information are broadcasted by the network side device through a system message block.
Further, the radio frequency unit 1001 is further configured to send first indication information to the network side device, where the first indication information is used to indicate an RS set supported by the terminal or expected to be accessed.
Further, the response message includes access resources of a first RS, and the first RS belongs to the RS set.
Further, the first indication information is sent when at least one of the following conditions is satisfied:
in the process of initiating connection or in the process of recovering connection;
when the connection is successful or the connection is recovered successfully;
after the connection is successful or the connection is recovered successfully;
when the handover is completed.
Further, the radio frequency unit 1001 is further configured to receive, when the RS set includes the target RS, a response message that the network side device accepts that the terminal accesses the target RS, where the response message includes an access resource of the target RS.
Further, the radio frequency unit 1001 is further configured to receive a response message that the network side device rejects the terminal to access the target RS if the RS set includes the target RS, where the response message is used to indicate at least one of:
the target RS reaches the maximum number of connectable terminals;
the number of maximum connections that the target RS has reached;
the target RS reaches the maximum downlink connection number;
the target RS reaches the maximum uplink connection number;
the target RS is overloaded or congested;
the target RS is out of service.
Further, the response message includes second indication information indicating waiting for a preset duration.
Further, the radio frequency unit 1001 is further configured to receive, when the RS set does not include the target RS, third indication information that is sent by the network side device and used for indicating that access is denied.
Further, the third indication information is used for indicating at least one of the following:
the target RS is not a serving RS of the terminal;
and the terminal does not sign the target RS.
Further, the processor 1010 is configured to start a timer if it is determined that the access control information of the target RS is prohibited according to the access control information of the RS supported by the network side device, and control the radio frequency unit 1001 to send an access request for accessing the target RS to the network side device when the timer expires.
The terminal provided in the embodiment of the present application can implement each process implemented by the method embodiment of fig. 2, and achieve the same technical effect, and for avoiding repetition, details are not repeated here.
Specifically, the embodiment of the application further provides a network side device. As shown in fig. 8, the network-side device 700 includes: an antenna 71, a radio frequency device 72, a baseband device 73. The antenna 71 is connected to a radio frequency device 72. In the uplink direction, the rf device 72 receives information via the antenna 71 and sends the received information to the baseband device 73 for processing. In the downlink direction, the baseband device 73 processes information to be transmitted and transmits the information to the rf device 72, and the rf device 72 processes the received information and transmits the processed information through the antenna 71.
The above-mentioned band processing means may be located in the baseband device 73, and the method performed by the network side device in the above embodiment may be implemented in the baseband device 73, where the baseband device 73 includes a processor 74 and a memory 75.
The baseband device 73 may include, for example, at least one baseband board, on which a plurality of chips are disposed, as shown in fig. 8, where one of the chips, for example, the processor 74, is connected to the memory 75 to call up the program in the memory 75 to perform the network-side device operation shown in the above method embodiment.
The baseband device 73 may further include a network interface 76, such as a Common Public Radio Interface (CPRI), for exchanging information with the radio frequency device 72.
Specifically, the network side device of the embodiment of the present invention further includes: the instructions or programs stored in the memory 75 and capable of being executed on the processor 74, and the processor 74 calls the instructions or programs in the memory 75 to execute the method executed by each module shown in fig. 5, and achieve the same technical effect, and are not described herein in detail to avoid repetition.
An embodiment of the present application further provides a readable storage medium, where a program or an instruction is stored on the readable storage medium, and when the program or the instruction is executed by a processor, the program or the instruction implements each process of the embodiment of the access control method in fig. 3, and can achieve the same technical effect, and in order to avoid repetition, details are not repeated here.
Wherein, the processor is the processor in the terminal described in the above embodiment. The readable storage medium includes a computer readable storage medium, such as a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and so on.
The embodiment of the present application further provides a chip, where the chip includes a processor and a communication interface, the communication interface is coupled to the processor, and the processor is configured to run a network-side device program or an instruction, to implement each process in the access control method embodiments of fig. 2 and 3, and can achieve the same technical effect, and details are not repeated here to avoid repetition.
It should be understood that the chips mentioned in the embodiments of the present application may also be referred to as a system-on-chip, a system-on-chip or a system-on-chip, etc.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element. Further, it should be noted that the scope of the methods and apparatus of the embodiments of the present application is not limited to performing the functions in the order illustrated or discussed, but may include performing the functions in a substantially simultaneous manner or in a reverse order based on the functions involved, e.g., the methods described may be performed in an order different than that described, and various steps may be added, omitted, or combined. In addition, features described with reference to certain examples may be combined in other examples.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present application may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present application.
While the present embodiments have been described with reference to the accompanying drawings, it is to be understood that the invention is not limited to the precise embodiments described above, which are meant to be illustrative and not restrictive, and that various changes may be made therein by those skilled in the art without departing from the spirit and scope of the invention as defined by the appended claims.

Claims (30)

1. An access control method applied to a terminal is characterized by comprising the following steps:
sending an access request for accessing a target wireless access network slice RS to network side equipment;
and receiving a response message of the network side equipment based on the access request.
2. The method of claim 1, further comprising:
and receiving the slice information and the access control information of the RS supported by the network side equipment, which are broadcasted by the network side equipment through a system message block.
3. The method of claim 1, further comprising:
and sending first indication information to the network side equipment, wherein the first indication information is used for indicating the RS set supported by the terminal or expected to be accessed.
4. The method of claim 3, wherein the response message comprises access resources of a first RS, and wherein the first RS belongs to the set of RSs.
5. The method of claim 3, wherein the first indication information is sent if at least one of the following is satisfied:
in the process of initiating connection or in the process of recovering connection;
when the connection is successful or the connection is recovered successfully;
after the connection is successful or the connection is recovered successfully;
when the handover is completed.
6. The method according to claim 3, wherein the receiving the response message of the network-side device based on the access request includes:
and receiving a response message that the network side equipment accepts the terminal to access the target RS under the condition that the RS set comprises the target RS, wherein the response message comprises the access resource of the target RS.
7. The method according to claim 3, wherein the receiving the response message of the network-side device based on the access request includes:
receiving a response message that the network side equipment refuses the terminal to access the target RS under the condition that the RS set comprises the target RS, wherein the response message is used for indicating at least one of the following items:
the target RS reaches the maximum number of connectable terminals;
the number of maximum connections that the target RS has reached;
the target RS reaches the maximum downlink connection number;
the target RS reaches the maximum uplink connection number;
the target RS is overloaded or congested;
the target RS is out of service.
8. The method according to claim 7, wherein the response message includes second indication information indicating waiting for a preset duration.
9. The method according to claim 3, wherein the receiving the response message of the network-side device based on the access request includes:
and receiving third indication information which is sent by the network side equipment and used for indicating the rejection of the access under the condition that the RS set does not comprise the target RS.
10. The method of claim 9, wherein the third indication information is used for indicating at least one of the following:
the target RS is not a serving RS of the terminal;
and the terminal does not sign the target RS.
11. The method of claim 2, wherein the sending an access request for accessing a target radio access network slice (RS) to a network side device comprises:
if the access control information of the target RS is determined to be forbidden according to the access control information of the RS supported by the network side equipment, starting a timer;
and if the timer is overtime, sending an access request for accessing the target RS to the network side equipment.
12. An access control method is applied to a network side device, and is characterized by comprising the following steps:
receiving an access request sent by a terminal and used for accessing a target wireless access network slice RS;
responding to the access request.
13. The method of claim 12, further comprising:
and broadcasting the slice information and the access control information of the RS supported by the network side equipment through a system message block.
14. The method of claim 12, further comprising:
and receiving first indication information sent by the terminal, wherein the first indication information is used for indicating an RS set supported or expected to be accessed by the terminal.
15. The method of claim 14, wherein the responding to the access request comprises:
and sending a response message for accessing a first RS to the terminal, wherein the response message comprises the access resource of the first RS, and the first RS belongs to the RS set.
16. The method of claim 14, wherein the first indication information is received when at least one of:
the terminal initiates a connection process or recovers the connection process;
when the terminal is successfully connected or the connection is successfully restored;
after the terminal is successfully connected or the connection is successfully restored;
and when the terminal switching is completed.
17. The method of claim 14, wherein the responding to the access request comprises:
and if the RS set comprises the target RS, sending a response message for accessing the target RS to the terminal, wherein the response message comprises the access resource of the target RS.
18. The method of claim 14, wherein the responding to the access request comprises:
and if the RS set comprises the target RS, sending a response message for rejecting the terminal to access the target RS to the terminal, wherein the response message is used for indicating at least one of the following items:
the target RS reaches the maximum number of connectable terminals;
the number of maximum connections that the target RS has reached;
the target RS reaches the maximum downlink connection number;
the target RS reaches the maximum uplink connection number;
the target RS is overloaded or congested;
the target RS is out of service.
19. The method of claim 18, wherein the response message includes second indication information indicating waiting for a preset duration.
20. The method of claim 14, wherein the responding to the access request comprises:
and under the condition that the RS set does not comprise the target RS, sending third indication information for indicating the rejection of the access to the terminal.
21. The method of claim 20, wherein the third indication information is used for indicating at least one of the following:
the target RS is not a serving RS of the terminal;
and the terminal does not sign the target RS.
22. An access control device applied to a terminal, comprising:
the first sending module is used for sending an access request for accessing the target wireless access network slice RS to the network side equipment;
a first receiving module, configured to receive a response message based on the access request from the network side device.
23. The apparatus of claim 22, further comprising:
and the second receiving module is used for receiving the slice information and the access control information of the RS supported by the network side equipment, which are broadcasted by the network side equipment through a system message block.
24. The apparatus of claim 22, further comprising:
a second sending module, configured to send first indication information to the network side device, where the first indication information is used to indicate an RS set supported by the terminal or expected to be accessed.
25. An access control device applied to a network side device, comprising:
the receiving module is used for receiving an access request which is sent by a terminal and used for accessing a target wireless access network slice RS;
and the response module is used for responding to the access request.
26. The apparatus of claim 25, further comprising a broadcasting module configured to broadcast slice information and access control information of RSs supported by the network side device through a system message block.
27. The apparatus of claim 25, further comprising a second receiving module, configured to receive first indication information sent by the terminal, where the first indication information is used to indicate a set of RSs supported or expected to be accessed by the terminal.
28. A terminal comprising a processor, a memory and a program or instructions stored on the memory and executable on the processor, the program or instructions when executed by the processor implementing the steps of the access control method according to any one of claims 1 to 11.
29. A network side device comprising a processor, a memory and a program or instructions stored on the memory and executable on the processor, the program or instructions when executed by the processor implementing the steps of the access control method according to any one of claims 12 to 21.
30. A readable storage medium, characterized in that a program or instructions are stored on the readable storage medium, which program or instructions, when executed by a processor, implement the access control method according to any one of claims 1-11, or the steps of the access control method according to any one of claims 12 to 21.
CN202010763102.4A 2020-07-31 2020-07-31 Access control method, device, terminal and network side equipment Active CN114071645B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202010763102.4A CN114071645B (en) 2020-07-31 2020-07-31 Access control method, device, terminal and network side equipment
PCT/CN2021/109830 WO2022022711A1 (en) 2020-07-31 2021-07-30 Access control method and apparatus, terminal, and network side device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010763102.4A CN114071645B (en) 2020-07-31 2020-07-31 Access control method, device, terminal and network side equipment

Publications (2)

Publication Number Publication Date
CN114071645A true CN114071645A (en) 2022-02-18
CN114071645B CN114071645B (en) 2023-07-21

Family

ID=80037635

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010763102.4A Active CN114071645B (en) 2020-07-31 2020-07-31 Access control method, device, terminal and network side equipment

Country Status (2)

Country Link
CN (1) CN114071645B (en)
WO (1) WO2022022711A1 (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106851589A (en) * 2016-12-30 2017-06-13 北京小米移动软件有限公司 Wireless network access method, apparatus and system
US20180176858A1 (en) * 2016-07-04 2018-06-21 Apple Inc. Network Slice Selection
CN108243483A (en) * 2016-12-23 2018-07-03 大唐移动通信设备有限公司 A kind of communication means, apparatus and system
CN108347751A (en) * 2017-01-25 2018-07-31 华为技术有限公司 Communication means and communication device
CN110391926A (en) * 2018-04-20 2019-10-29 中国移动通信有限公司研究院 Network is sliced application control method and device, communication equipment and storage medium

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110572838B (en) * 2016-03-03 2020-08-07 华为技术有限公司 Communication method, terminal equipment and network side equipment
BR112019004445A2 (en) * 2016-09-07 2019-06-18 Huawei Tech Co Ltd access control method and appliances

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180176858A1 (en) * 2016-07-04 2018-06-21 Apple Inc. Network Slice Selection
CN108243483A (en) * 2016-12-23 2018-07-03 大唐移动通信设备有限公司 A kind of communication means, apparatus and system
CN106851589A (en) * 2016-12-30 2017-06-13 北京小米移动软件有限公司 Wireless network access method, apparatus and system
CN108347751A (en) * 2017-01-25 2018-07-31 华为技术有限公司 Communication means and communication device
CN110391926A (en) * 2018-04-20 2019-10-29 中国移动通信有限公司研究院 Network is sliced application control method and device, communication equipment and storage medium

Also Published As

Publication number Publication date
CN114071645B (en) 2023-07-21
WO2022022711A1 (en) 2022-02-03

Similar Documents

Publication Publication Date Title
US20230224766A1 (en) Cell reselection method and related device
EP4192114A1 (en) Access control method and apparatus, and communication device
US20230164876A1 (en) Discontinuous Reception Processing Method and Apparatus, Terminal, and Network-Side Device
CN114430578A (en) Configuration and acquisition method of auxiliary cell group information and communication equipment
CN113746876A (en) Communication agent establishing method, device and terminal
CN114071495A (en) Initial access method and device, terminal and network side equipment
CN114071741A (en) Information transmission method, device, terminal and network side equipment
JP2023554088A (en) Network selection method, device, equipment and storage medium
US20230328789A1 (en) Busy indication transmission method and apparatus
EP4192118A1 (en) Access control method, terminal, and network side device
CN114071645B (en) Access control method, device, terminal and network side equipment
CN114501570B (en) Switching method, device, equipment and storage medium based on side chain relay
CN114080045B (en) Data transmission processing method, resource allocation method and related equipment
CN114363954A (en) Congestion control method and device, terminal and network side equipment
CN114339955A (en) Network selection method, information sending method, information acquisition method and device
CN116017590A (en) Target information reporting method, terminal and access network equipment
CN115134797A (en) Processing method of emergency service, network side equipment and terminal
CN114339616A (en) Congestion control method, device and equipment for broadcast multicast service
US20240040447A1 (en) Transmission switching method, terminal, and network-side device
CN114302492B (en) Slice request method, terminal and network equipment
EP4319276A1 (en) Information acquisition method, information sending method, related device, and readable storage medium
CN113784384B (en) Mode switching method, terminal and network side equipment
WO2023274072A1 (en) Cell evaluation method and apparatus, terminal, relay, and storage medium
EP4181615A1 (en) Method and apparatus for establishing connection, and device
CN115884277A (en) Advanced redirection processing method, device and related equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant