Method for implementing subscriber terminal access control

A user terminal and access control technology, applied in the field of CDMA mobile communication, can solve the problems of reduced normalized throughput rate of access channels, reduced access success rate of user terminals, and reduced access reliability, etc., so as to improve access. Time slot length, the effect of improving access success rate and reducing transmission time

Inactive Publication Date: 2011-03-16
ZTE CORP
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the ALOHA protocol, due to the randomness of user terminals initiating access, if more than two user terminals initiate access in one access channel time slot, access conflicts will occur, resulting in access failure
If more and more user terminals need to access the system according to service requests, that is, when the access channel is overloaded, the probability of access conflicts will increase, resulting in the normalized throughput of the access channel being Exponential decline, the access success rate of user terminals is greatly reduced
[0004] However, under different loads, the main factors affecting the access success rate of user terminals are different. From the above description, it can be obtained that when the access channel is overloaded, the main factor affecting the access success rate is the greater collision probability, but If the access channel is not overloaded, the main factor affecting the access success rate is the base station's ability to capture access channel messages. When the base station's ability to capture access channel messages decreases, the access reliability is reduced. As a result, the access success rate of the user terminal is greatly reduced

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for implementing subscriber terminal access control
  • Method for implementing subscriber terminal access control
  • Method for implementing subscriber terminal access control

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] When using the ALOHA protocol, when the load of the access channel is constant, the probability of user terminal collision is proportional to the length of the access channel time slot. The shorter the length of the access channel time slot, the higher the probability of collision. On the contrary, when the length of the access channel time slot is longer, the probability of collision will be greater. Therefore, if the length of the access channel time slot can be dynamically adjusted according to the load of the access channel, the access channel can be reduced. The probability of access conflicts and improve the success rate of access.

[0036] When the access load is overloaded, the probability of user terminal collisions increases greatly, but when the access load is not overloaded, since the length of the access channel time slot is proportional to the ability of the base station to capture access channel messages, the longer the length of the access channel time sl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for achieving user terminal access control, which comprises the following steps: confirming overloading mark of the current access channel according to an access channel overloading circumstance which is estimated by a base station in a certain periodic time and presetting access channel loading and overloading threshold, judging whether the comparison of the current access channel overloading mark and the original access channel overloading mark is the same, if is the same, keeping the original access channel overloading mark to be unchanged, and ending the flow, if not, adjusting access channel time slot length according the access channel overloading mark. The method of the invention improves access reliability under the circumstance that the access channel is not overloading, when in overloading, reducing access conflict probability among user terminals, thereby improving access success rate of user terminal. And access time slot length is improvedunder the circumstance that the access channel is loading and overloading, thereby reducing sending time of user terminals, lowering mutual disturbance among user terminals, and prolonging standby time of user terminals.

Description

technical field [0001] The invention relates to the technical field of CDMA mobile communication, in particular to a method for realizing user terminal access control. Background technique [0002] In a wireless mobile communication system, user terminals randomly initiate access through a shared reverse access channel to ensure that limited resources are fully utilized. The CDMA2000 system uses a time-slotted ALOHA (Slotted ALOHA) protocol to implement a random access process. The whole process of the user terminal from sending the access channel message to receiving (or failing to receive) the confirmation message of the message is called an access attempt, and each transmission in the access attempt is called an access probe. When a service request arrives or a paging message from the base station is received, an access probe is sent on the shared reverse access channel. In an access attempt, the access probes are divided into groups according to access probe sequences (...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W28/08H04B7/26
Inventor 孙云山罗夙
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products