CN102340821B - A kind of connection control method of MTC device and system - Google Patents
A kind of connection control method of MTC device and system Download PDFInfo
- Publication number
- CN102340821B CN102340821B CN201010233548.2A CN201010233548A CN102340821B CN 102340821 B CN102340821 B CN 102340821B CN 201010233548 A CN201010233548 A CN 201010233548A CN 102340821 B CN102340821 B CN 102340821B
- Authority
- CN
- China
- Prior art keywords
- mtc
- equipment
- information
- network side
- ran node
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/02—Access restriction performed under specific conditions
- H04W48/06—Access restriction performed under specific conditions based on traffic conditions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/66—Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
- H04M1/667—Preventing unauthorised calls from a telephone set
- H04M1/67—Preventing unauthorised calls from a telephone set by electronic means
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W28/00—Network traffic management; Network resource management
- H04W28/02—Traffic management, e.g. flow control or congestion control
- H04W28/06—Optimizing the usage of the radio link, e.g. header compression, information sizing, discarding information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/26—Network addressing or numbering for mobility support
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses the connection control method of a kind of machine type communication (MTC) equipment, comprising: network equipment carries out compression process to the MTC mark of forbidding accessing, and the information after compression process is sent to MTC device; MTC device is according to the information after compression process, and the MTC mark of self preserving, and determines self whether to allow to initiate access request.The invention also discloses a kind of access control system of MTC device.By the present invention, solve because MTC identifies the problem taking a large amount of broadcast resource.
Description
Technical Field
The present invention relates to Machine Type Communication (MTC) technology in network communication, and in particular, to an access control method and system for MTC devices.
Background
With the development of mobile network services and automation control technologies, a Machine-based communication system, also called Machine To Machine (M2M) communication system, has appeared, in which at least one party participating in communication is a Machine device.
M2M in the narrow sense is defined as machine-to-machine communication, but in a broad sense, M2M includes networked applications and services that are core to machine-terminal intelligent interactions. The M2M is based on the intelligent machine terminal, and takes a plurality of communication modes as access means, and can provide an informatization solution for the customer, so as to meet the informatization requirements of the customer on monitoring, commanding and scheduling, data acquisition, measurement and the like. M2M may be used in industrial applications (e.g., traffic monitoring, alarm systems, rescue at sea, vending machines, pay-per-view), home applications (e.g., automatic meter reading, temperature control), and personal applications (e.g., life detection, remote diagnostics), among others.
The communication object of M2M is a machine, and the communication behavior is automatically controlled, that is, the control of the initiation and termination of communication and some admission and restriction in the communication process are all automatic behaviors. This behavior is dependent on the constraints and controls on the behavior of the machines (i.e., terminals in M2M communication) in M2M communication, the behavior of the terminals in M2M communication is constrained by the service subscription data, and the network manages the terminals in M2M communication according to the service subscription data.
The most typical communication method in machine-type communication is communication between a terminal and an application Server, where the terminal is called an MTC device (MTC device) and the application Server is called an MTC Server (MTC Server).
Under 2G/3G/LTE access, M2M communication mainly uses a Packet Service (PS) network as a bottom bearer network, and implements Service layer communication between MTC devices and MTC servers. Fig. 1 is a schematic structural diagram of an M2M communication entity accessing an Evolved Packet System (EPS) in the prior art, and as shown in fig. 1, an underlying bearer network includes: an Evolved Universal mobile telecommunications system Terrestrial Radio access network (E-UTRAN), a Mobility Management Entity (MME), a Serving Gateway (S-GW), a Packet Data network Gateway (P-GW), a Home Subscriber Server (HSS), and a Policy and Charging Rules Function (PCRF). Wherein, the main network element of the E-UTRAN is an Evolved NodeB (eNodeB).
In fig. 1, an MME is responsible for operations related to a control plane, such as mobility management, processing of non-access stratum signaling, and management of context in user mobility management; the S-GW is an access gateway device connected with the E-UTRAN and is responsible for forwarding data between the E-UTRAN and the P-GW and caching paging waiting data; the P-GW is a border gateway between the EPS and a Packet Data Network (PDN), and is responsible for accessing the PDN and forwarding Data between the EPS and the PDN; the PCRF is a policy and charging rule function entity, and is connected to an operator network Protocol (IP, Internet Protocol) Service network through a receiving interface Rx to acquire Service information, and in addition, it may be connected to a gateway device in the network through a Gx interface to be responsible for initiating establishment of an IP bearer, ensuring quality of Service (QoS) of Service data, and performing charging control; the HSS is used to provide management of subscription data for the user, as well as management of important context information for the user's access to the network.
In addition, the MTC Server may serve as an Application Function entity (AF) and is connected to the PCRF through an Rx interface to implement bearer control; the MTC Server may also function AS a Session Initiation Protocol application Server (SIP AS) and connect with the HSS through an Sh interface to access application service data.
In fig. 1, the MTC UE accesses to the EPS network through E-utran (enodeb), and after being assigned with an IP address, an IP channel may be established between the MTC UE and the MTC Server, thereby implementing upper layer service communication with the MTC Server. The IP channel established between the MTC UE and the MTC Server is a logical IP channel, and the physical path of the IP channel passes through: eNodeB, S-GW, P-GW.
At present, one way to implement M2M communication is to establish a service layer interface protocol on an IP channel between the MTC UE and the MTC Server, where the MTC UE and the MTCServer interact with each other for service data through the service layer interface protocol, and the MTC Server also implements control over the MTC UE through the service layer protocol.
Through the IP connection between the MTC UE and the MTC Server, data communication between the MTC UE and the MTCServer can be achieved, however, the MTC monitoring requirement is difficult to be achieved on the IP connection: the MTCServer needs to monitor the operating state of the MTC UE, dynamically acquire the current state of the MTC UE in time, and obtain a notification in time when the current state of the MTC UE changes. The status changes of the mtues may include: the MTC UE is detached from the network, the MTC UE enters a non-connection state, the MTC UE releases wireless connection, the current position of the MTC UE is changed, and the like. These changes in the status of MTC UEs, referred to as MTC events, may generally define which MTC events need to be monitored in MTC subscription data of a Home Location Register (HLR)/HSS, and are issued by the HLR/HSS to a Serving GPRS Support Node (SGSN)/MME through a procedure of the MTC UE attaching to a network. For the detection of the MTC event, a network entity of the core network is usually required to detect the MTC event, for example, the network element in the EPS network responsible for detecting the MTC event may be: MME/S-GW/P-GW, etc., and a network element in charge of detecting an MTC event in a General Packet Radio Service (GPRS) network may be an SGSN/Gateway GPRS Support Node (GGSN), etc. When the MTC event is detected, the MTC event is usually reported to the MTC Server, so that the MTC Server can timely know the operation status of the MTC UE.
When congestion occurs on the network side, the existing congestion control flow is shown in fig. 2, and mainly includes the following steps:
step 201, the MME/SGSN sends an OVERLOAD START message to a Radio Access Network (RAN) node according to a load condition of a current Network, and triggers an Access control process for the MTC device.
According to different access control granularities, the message carries different access control information. When Access control is for an MTC Group (MTC Group), the OVERLOAD START message carries an associated Group identity (Group ID) or Access Point Name (APN).
Step 202, after receiving the information, the RAN node broadcasts a Group ID or an APN over the air interface to prohibit access.
The MTC devices receiving the broadcast will not subsequently initiate access requests to these Group IDs or APNs, step 203, to avoid further congestion.
However, when multiple Group accesses need to be prohibited, the prior art needs to broadcast the Group ID list or APN list in a broadcast message, which occupies a large amount of broadcast message resources and is unacceptable for the network.
Disclosure of Invention
In view of the above, the main objective of the present invention is to provide an access control method and system for MTC devices, so as to solve the problem that a large amount of broadcast message resources are occupied by broadcasting a Group ID list or an APN list.
In order to achieve the purpose, the technical scheme of the invention is realized as follows:
the invention provides an access control method of Machine Type Communication (MTC) equipment, which comprises the following steps:
the network side equipment compresses the MTC identification which is forbidden to be accessed and sends the compressed information to the MTC equipment;
and the MTC equipment determines whether to allow the MTC equipment to initiate an access request according to the compressed information and the MTC identification stored by the MTC equipment.
The network side equipment compresses the MTC identification which is forbidden to be accessed, and sends the compressed information to the MTC equipment, and the method specifically comprises the following steps:
the network side equipment determines the same bit information of the MTC identification which is forbidden to be accessed, and sends the same bit information to the MTC equipment through a broadcast message;
correspondingly, the MTC device determines whether to allow itself to initiate an access request according to the compressed information and the MTC identifier stored in the MTC device, which specifically includes:
the MTC equipment matches the received same bit information with the MTC identification stored by the MTC equipment, and determines whether the MTC equipment allows to initiate an access request according to a matching result.
The method further comprises the following steps: and the network side equipment sends the same bit information to the MTC equipment in a wildcard form through a broadcast message.
The network side equipment compresses the MTC identification which is forbidden to be accessed, and sends the compressed information to the MTC equipment, and the method specifically comprises the following steps:
the network side equipment encodes and compresses the MTC identification which is forbidden to be accessed, and sends the MTC identification after encoding and compression to the MTC equipment through a broadcast message;
correspondingly, the MTC device determines whether to allow itself to initiate an access request according to the compressed information and the MTC identifier stored in the MTC device, which specifically includes:
and the MTC equipment decompresses the information in the broadcast message, matches the decompressed MTC identification with the MTC identification stored by the MTC equipment, and determines whether the MTC equipment allows to initiate an access request according to a matching result.
The network side equipment compresses the MTC identification which is forbidden to be accessed, and sends the compressed information to the MTC equipment, and the method specifically comprises the following steps:
the network side equipment performs modular operation on the MTC identification which is forbidden to be accessed, and sends the information after the modular operation to the MTC equipment;
correspondingly, the MTC device determines whether to allow itself to initiate an access request according to the compressed information and the MTC identifier stored in the MTC device, which specifically includes:
and the MTC equipment determines whether to allow the MTC equipment to initiate an access request according to the information after the modulus operation and the MTC identification stored by the MTC equipment.
The network side device includes: a mobility management network element and a Radio Access Network (RAN) node;
correspondingly, the network side device compresses the MTC identity which is prohibited from accessing, and sends the compressed information to the MTC device, which specifically includes:
the mobility management network element compresses the MTC identification which is forbidden to be accessed, and sends the compressed information to the RAN node, and the RAN node sends the compressed information to MTC equipment through a broadcast message;
or, the mobility management network element sends the access-forbidden MTC identifier to the RAN node, and the RAN node compresses the access-forbidden MTC identifier and sends the compressed information to the MTC device through a broadcast message.
The network side device includes: a RAN node;
correspondingly, the network side device compresses the MTC identity which is prohibited from accessing, and sends the compressed information to the MTC device, which specifically includes:
and the RAN node compresses the MTC identification which is stored by the RAN node and is forbidden to access, and sends the compressed information to the MTC equipment through a broadcast message.
The invention also provides an access control system of the MTC equipment, which comprises the following components: a network side device and an MTC device, wherein,
the network side equipment is used for compressing the MTC identification which is forbidden to be accessed and sending the compressed information to the MTC equipment;
and the MTC equipment is used for determining whether the MTC equipment allows to initiate an access request according to the compressed information and the MTC identification stored by the MTC equipment.
The network side equipment is further used for determining the same bit information of the MTC identification which is forbidden to be accessed, and sending the same bit information to the MTC equipment through a broadcast message;
correspondingly, the MTC device is further configured to match the received same bit information with the MTC identifier stored in the MTC device, and determine whether the MTC device is allowed to initiate an access request according to a matching result.
The network side device is further configured to send the same bit information to the MTC device in a wildcard format through a broadcast message.
The network side equipment is further used for coding and compressing the MTC identification which is forbidden to be accessed and sending the coded and compressed MTC identification to the MTC equipment through a broadcast message;
correspondingly, the MTC device is further configured to decompress the information in the broadcast message, match the decompressed MTC identifier with the MTC identifier stored in the MTC device, and determine whether the MTC device is allowed to initiate an access request according to a matching result.
The network side equipment is further used for carrying out modular operation on the MTC identification which is forbidden to be accessed and sending the information after the modular operation to the MTC equipment;
correspondingly, the MTC device is further configured to determine whether to allow itself to initiate an access request according to the information obtained after the modulo operation and the MTC identifier stored in itself.
The network side device includes: a mobility management network element and a RAN node; wherein,
the mobility management network element is used for compressing the MTC identification which is forbidden to be accessed and sending the compressed information to the RAN node; the RAN node is used for sending the compressed information to MTC equipment through a broadcast message;
or, the mobility management network element is configured to send the MTC identifier prohibited from being accessed to the RAN node; and the RAN node is used for compressing the MTC identification which is forbidden to be accessed and sending the compressed information to the MTC equipment through a broadcast message.
The network side device includes: and the RAN node is used for compressing the MTC identifier which is stored by the RAN node and forbidden to access, and sending the compressed information to the MTC equipment through a broadcast message.
According to the access control method and system of the MTC equipment, the network side equipment compresses the MTC identification which is forbidden to be accessed (including the steps of taking the same bit information, coding compression, modular operation and the like), and broadcasts the compressed information to the MTC equipment, so that a large amount of empty broadcast resources are avoided being occupied.
Drawings
Fig. 1 is a schematic diagram illustrating an architecture of an M2M communication entity accessing an EPS in the prior art;
fig. 2 is a flow chart of congestion control in the prior art;
fig. 3 is a flowchart of an access control method of an MTC device according to the present invention;
fig. 4 is a flowchart of an access control method of an MTC device according to an embodiment of the present invention;
fig. 5 is a flowchart of an access control method of MTC devices according to a second embodiment of the present invention;
fig. 6 is a flowchart of an access control method of MTC devices according to a third embodiment of the present invention;
fig. 7 is a flowchart of an access control method of an MTC device according to a fourth embodiment of the present invention;
fig. 8 is a flowchart of an access control method of an MTC device according to a fifth embodiment of the present invention;
fig. 9 is a flowchart of an access control method of an MTC device according to a sixth embodiment of the present invention;
fig. 10 is a flowchart of an access control method of an MTC device according to a seventh embodiment of the present invention;
fig. 11 is a flowchart of an access control method of an MTC device according to an eighth embodiment of the present invention;
fig. 12 is a flowchart of an access control method of an MTC device according to a ninth embodiment of the present invention.
Detailed Description
The technical solution of the present invention is further elaborated below with reference to the drawings and the specific embodiments.
In order to solve the problem that a broadcast Group ID list or APN list occupies a large amount of broadcast message resources, an access control method for MTC devices provided in the present invention, as shown in fig. 3, includes the following steps:
step 301, the network side device compresses the MTC identity which is prohibited from accessing, and sends the compressed information to the MTC device.
Step 302, the MTC device determines whether to allow itself to initiate an access request according to the compressed information and the MTC identity stored in itself. Wherein, the MTC identity includes, but is not limited to, a Group ID or an APN.
Based on the above method, a feasible access control method for MTC devices in the embodiments of the present invention is: the network side equipment determines the same bit information of the MTC identification which is forbidden to be accessed, and sends the same bit information to the MTC equipment through a broadcast message; the MTC equipment matches the received same bit information with the MTC identification stored by the MTC equipment, and determines whether the MTC equipment allows to initiate an access request according to a matching result.
Taking the MTC identifier as a Group ID or an APN as an example, since the Group IDs or APNs allocated by the operator have some similarities, that is, multiple Group IDs or APNs have some same bits, when broadcasting the Group ID list or the APN list, the RAN node may only broadcast the same bits of the Group IDs or APNs to identify multiple groups that need to be restricted from access. After receiving the broadcasted bit, the MTC device judges whether an access request can be initiated or not by comparing with the Group ID or APN stored by the MTC device.
In addition, the network side device of this embodiment is composed of a mobility management network element and a RAN node on the network side, where the mobility management network element in a Long Term Evolution (LTE) system is an MME, and the RAN node is an eNodeB; a mobility management Network element in a Universal mobile telecommunications System (UTMS) is an SGSN, and a RAN node is a Radio Network Controller (RNC).
As shown in fig. 4, the specific access control procedure mainly includes the following steps:
step 401, the MME/SGSN determines the same bit information of the Group ID or APN that needs to be barred from accessing according to the current network load condition and the similarity of the Group ID or APN.
Step 402, MME/SGSN sends OVERLOAD START message to RAN node, the message carries the same bit information of Group ID or APN which is forbidden to access.
In step 403, the RAN node broadcasts the same bit information of the Group ID or APN for which access is forbidden.
Step 404, after receiving the same bit information in the broadcast message, the MTC device compares the same bit information with a Group ID or APN stored in the MTC device, and if the same bit information matches the received same bit information, does not initiate an access request; otherwise, an access request may be initiated.
For example: the Group ID is composed of a Mobile Country Code (MCC), a Mobile Country Code (MNC), a Mobile Network Code (MNC), a regional identifier (mnd), and a Group identifier (cid). If a plurality of groups needing to be prohibited from accessing belong to the same area of the same operator, the MME/SGSN carries an MCC + MNC + area identity in an OVERLOAD START message sent to the RAN node, instead of the GroupID list. Likewise, the RAN node broadcasts only the MCC + MNC + area identity in a broadcast message. After the MTC equipment receives the broadcast message, comparing the Group ID stored by the MTC equipment, if the MCC + MNC + area identification in the Group ID stored by the MTC equipment is matched with the area identification carried in the broadcast message, not initiating an access request; otherwise, an access request may be initiated.
For another example: the Group ID contains an identification bit of an MTC feature (MTC feature) indicating the MTC feature or MTC feature combination the MTC Group is currently subscribed to. When access control is carried out on a plurality of groups with certain MTC features or MTC feature combinations, an MME/SGSN carries an identification bit of the MTC features or the MTC feature combinations in OVERLOAD START messages sent to RAN nodes; similarly, the RAN node broadcasts only the identification bit of the MTC feature or the MTC feature combination in the broadcast message. After the MTC equipment receives the broadcast message, comparing the Group ID stored by the MTC equipment, if the identification bit of the MTC feature or the MTC feature combination in the Group ID stored by the MTC equipment is matched with that carried in the broadcast message, not initiating an access request; otherwise, an access request may be initiated. Assuming that 3 bits in the Group ID are used to identify the subscribed MTC feature or MTC feature combination, 001 identifies Low Mobility (Low Mobility), and 010 identifies that Only the originating caller (MO Only) and Time control (Time Controlled) can be performed. If the network needs to forbid the Group access of the Low Mobility characteristic, the RAN node broadcasts the MTC feature for forbidding the access to be 001, the MTC equipment checks whether the MTC feature bit of the Group ID stored by the MTC equipment is the same as the received MTC feature bit, and if the MTC feature bit is the same as the received MTC feature bit, the MTC equipment does not initiate an access request; otherwise, an access request may be initiated.
It should be noted that, in the embodiment of sending the same bit information, the network side device needs to agree in advance with the MTC device where the same bit information is located in the MTC identifier, and only after receiving the same bit information, the MTC device can know which information in the MTC identifier stored in the MTC device is matched with the MTC device. Of course, if the network side device sends the same bit information in the form of a wildcard, it is not necessary to agree in advance with the MTC device about the location of the same bit information in the MTC identity. Taking the above "MCC + MNC + region id + group id" as an example, if the same bit information is "MCC + MNC + region id", the structure of the same bit information sent in the wildcard form is "MCC + MNC + region id + -; the structure of the information carried by the ". star" is the same as the data structure of the MTC identifier, and the information carried by the information except the information of the same bit is null; under the condition of the same data structure, the matching operation of the MTC equipment to the MTC identification becomes relatively simple.
Another possible access control procedure of MTC devices, as shown in fig. 5, mainly includes the following steps:
step 501, the MME/SGSN determines the GroupID or APN to be barred from access according to the current network load condition.
Step 502, the MME/SGSN sends an OVERLOAD START message to the RAN node, where the message carries the Group ID or APN to which access is prohibited.
Step 503-504, the RAN node determines the same bit information of the Group ID or the APN which is forbidden to access, and broadcasts the same bit information of the Group ID or the APN which is forbidden to access.
Step 505, after receiving the same bit information in the broadcast message, the MTC device compares the same bit information with a Group ID or APN stored in the MTC device, and if the same bit information matches the received same bit information, does not initiate an access request; otherwise, an access request may be initiated.
The embodiment shown in fig. 5 is different from fig. 4 in that the extraction operation of the same bit information is performed on the RAN node (the RAN node obtains the Group ID or APN that needs to be barred from the MME/SGSN), and other operations are basically similar.
In addition, the network side device in this embodiment may also include only a RAN node, and then an access control procedure of a corresponding MTC device is as follows: and the RAN node extracts the same bit information from the access-forbidden MTC identification stored by the RAN node and sends the same bit information to the MTC equipment through a broadcast message. The specific operation flow is shown in fig. 6, and mainly includes the following steps:
step 601, the RAN node extracts the same bit information from the Group ID or APN which is stored by itself and is forbidden to access.
The Group ID or APN for barring access stored in the RAN node itself is usually obtained in a mobility management procedure or a session management procedure.
In step 602, the RAN node broadcasts the same bit information to the MTC devices.
Step 603, after receiving the same bit information in the broadcast message, the MTC device compares the same bit information with a Group ID or APN stored in the MTC device, and if the same bit information matches the received same bit information, does not initiate an access request; otherwise, an access request may be initiated.
The embodiment shown in fig. 6 differs from fig. 5 in that the Group ID or APN for which access is barred is no longer provided by the mobility management element but is obtained and stored by the RAN node in the mobility management procedure or session management procedure. In this embodiment, the RAN node may also send the same bit information to the MTC devices in the form of a wildcard.
Another feasible access control method for the MTC devices according to the embodiments of the present invention is: the network side equipment encodes and compresses the MTC identification which is forbidden to be accessed, and sends the MTC identification after encoding and compression to the MTC equipment through a broadcast message; the MTC equipment decompresses the information in the broadcast message, matches the decompressed MTC identification with the MTC identification stored by the MTC equipment, and determines whether the MTC equipment allows to initiate an access request according to a matching result.
Taking MTC identity as Group ID or APN as an example, the network side device of this embodiment is composed of a mobility management network element and a RAN node on the network side, where the mobility management network element in the LTE system is MME and the RAN node is eNodeB; the mobile management network element in the UTMS is SGSN, and the RAN node is RNC.
The common encoding compression algorithm can be a Hash (Hash) algorithm, and the Hash algorithm is used for compressing the Group ID or APN which needs to be prohibited from being accessed, so that the information quantity which needs to be broadcasted can be reduced. However, the encoding compression algorithm described in the embodiment of the present invention is not limited to the Hash algorithm, and any algorithm capable of implementing data compression should be applicable to the embodiment of the present invention.
Based on the above coding compression algorithm, a feasible access control procedure of the MTC device is: and performing Message Digest (MD5, Message Digest5) coding on the Group ID or APN to be broadcasted on the network side, wherein the MD5 coding of the Group ID or APN to be prohibited is sent in the broadcast Message. After the MTC device receives the codes, the MTC device locally restores the Group ID or APN, and then judges whether the access request can be initiated according to the Group ID or APN stored by the MTC device. One possible operational flow is shown in fig. 7, which mainly includes the following steps:
step 701, the MME/SGSN determines the Group ID or APN that needs to be barred from accessing according to the load condition of the current network, and performs MD5 encoding on the Group ID or APN that needs to be barred from accessing.
Step 702, the MME/SGSN sends an OVERLOAD START message to the RAN node, where the message carries the Group ID or APN encoded by MD 5.
In step 703, the MME/SGSN broadcasts the Group ID or APN encoded by MD 5.
Step 704, the MTC device performs MD5 decoding, locally restores the Group ID or APN that needs to be barred from accessing, and determines whether to initiate an access request by referring to the Group ID or APN stored in the MTC device.
Another possible operation flow is shown in fig. 8, and mainly includes the following steps:
step 801, the MME/SGSN determines a Group ID or APN to be barred from access according to the load condition of the current network.
Step 802, the MME/SGSN sends OVERLOAD START information to the RAN node, and the information carries the Group ID or APN which is forbidden to be accessed.
And 803-804, the RAN node carries out MD5 coding on the Group ID or APN which needs to be prohibited from accessing, and broadcasts the Group ID or APN coded by MD 5.
Step 805, the MTC device performs MD5 decoding, locally restores the Group ID or APN that needs to be prohibited from accessing, and determines whether to initiate an access request by referring to the Group ID or APN stored in the MTC device.
The embodiment shown in fig. 8 is different from that shown in fig. 7 in that the MD5 encoding operation is performed on the RAN node (the RAN node obtains a Group ID or APN that needs to be barred from the MME/SGSN), and other operations are basically similar.
In addition, the network side device in this embodiment may also include only a RAN node, and then an access control procedure of a corresponding MTC device is as follows: the RAN node directly carries out MD5 coding on the Group ID or APN which is stored by the RAN node and is forbidden to access, and carries the Group ID or APN coded by the MD5 in a broadcast message and sends the broadcast message to the MTC equipment; the MTC device carries out MD5 decoding, locally restores the Group ID or APN which needs to be forbidden to access, and judges whether an access request can be initiated or not according to the Group ID or APN stored by the MTC device. The specific operation flow is shown in fig. 9, and mainly includes the following steps:
in step 901, the RAN node performs MD5 encoding on the Group ID or APN of the prohibited access stored in the RAN node itself.
The Group ID or APN for barring access stored in the RAN node itself is usually obtained in a mobility management procedure or a session management procedure.
Step 902, the RAN node sends the Group ID or APN encoded by MD5 to the MTC device in a broadcast message.
Step 903, after receiving the broadcast message, the MTC device performs MD5 decoding, locally restores the Group ID or APN that needs to be prohibited from accessing, and compares the Group ID or APN with the Group ID or APN stored in the MTC device, and if the Group ID or APN stored in the MTC device can be matched with the Group ID or APN stored in the MTC device, does not initiate an access request; otherwise, an access request may be initiated.
The embodiment shown in fig. 9 differs from fig. 8 in that the Group ID or APN for barred access is no longer provided by the mobility management element but is instead saved by the RAN node in the mobility management procedure or session management procedure.
Another feasible access control method for the MTC devices in the embodiments of the present invention is: the network side equipment performs modular operation on the MTC identification which is forbidden to be accessed, and sends the information after the modular operation to the MTC equipment; and the MTC equipment determines whether to allow the MTC equipment to initiate an access request according to the information after the modulo operation and the MTC identification stored by the MTC equipment.
Taking MTC identity as Group ID or APN as an example, the network side device of this embodiment is composed of a mobility management network element and a RAN node on the network side, where the mobility management network element in the LTE system is MME and the RAN node is eNodeB; the mobile management network element in the UTMS is SGSN, and the RAN node is RNC.
Based on the above modulo operation method, a feasible operation flow is shown in fig. 10, which mainly includes the following steps:
step 1001, the MME/SGSN determines a Group ID or an APN to which access barring is required according to a load condition of a current network, and performs a modulo operation on each determined Group ID or APN, where information after each modulo operation is mapped to one bit, and the plurality of bits form a character string.
Step 1002, the MME/SGSN sends an OVERLOAD START message to the RAN node, where the message carries the character string (including the information after the modulo operation).
In step 1003, the RAN node broadcasts the string (containing the modulo information).
And step 1004, the MTC device determines whether to allow itself to initiate an access request according to the received character string and the MTC identity stored in itself.
Specifically, the method comprises the following steps: the MTC equipment can also perform the same modular operation as the MME/SGSN on the MTC identification stored in the MTC equipment, then match the information of the MTC equipment after the modular operation with the character string, and if the information of the MTC equipment after the modular operation exists in the character string, the MTC equipment does not initiate an access request; otherwise, an access request may be initiated;
or the MTC equipment performs inverse operation of modular operation according to the received character string, then matches the obtained information with the MTC identification stored by the MTC equipment, and does not initiate an access request if the MTC identification stored by the MTC equipment exists in the information after the inverse operation; otherwise, an access request may be initiated.
Another possible operation flow is shown in fig. 11, which mainly includes the following steps:
step 1101, the MME/SGSN determines the Group ID or APN which needs to be forbidden to access according to the load condition of the current network.
Step 1102, MME/SGSN sends an OVERLOAD START message to RAN node, where the message carries a Group ID or APN to which access is prohibited.
1103-1104, the RAN node performs a modulus operation on the Group ID or APN to which access is prohibited, wherein information after each modulus operation is mapped to a bit, and the bits form a character string; the RAN node broadcasts the string (containing the modulo information).
Step 1105, the MTC device determines whether it is allowed to initiate an access request according to the received character string and the MTC identity stored in itself. The detailed operation is the same as the foregoing step 1004, and is not described herein again.
The embodiment shown in fig. 11 is different from fig. 10 in that the operation of the modulo operation is performed on the RAN node (the RAN node obtains the Group ID or APN that needs to be barred from the MME/SGSN), and other operations are basically similar.
In addition, the network side device in this embodiment may also include only a RAN node, and then an access control procedure of a corresponding MTC device is as follows: the RAN node directly performs the modulus operation on the Group ID or APN which is stored by the RAN node and is forbidden to access, and carries the information after the modulus operation in the broadcast message and sends the information to the MTC equipment; and the MTC equipment determines whether to allow the MTC equipment to initiate an access request according to the information after the modulo operation and the MTC identification stored by the MTC equipment. The specific operation flow is shown in fig. 12, and mainly includes the following steps:
step 1201, the RAN node performs a modular operation on the Group ID or APN which is stored in the RAN node and is prohibited from accessing, information after each modular operation is mapped to a bit, and the plurality of bits form a character string.
The Group ID or APN for barring access stored in the RAN node itself is usually obtained in a mobility management procedure or a session management procedure.
At step 1202, the RAN node broadcasts the string (containing the modulo information).
Step 1203, the MTC device determines whether it is allowed to initiate an access request according to the received character string and the MTC identity stored in the MTC device. The detailed operation is the same as the foregoing step 1004, and is not described herein again.
The embodiment shown in fig. 12 differs from fig. 11 in that the Group ID or APN for barred access is no longer provided by the mobility management element but is instead maintained by the RAN node in the mobility management procedure or session management procedure.
Corresponding to the access control method of the MTC device, the present invention further provides an access control system of the MTC device, including: network side equipment and MTC equipment. And the network side equipment is used for compressing the MTC identification which is forbidden to be accessed and sending the compressed information to the MTC equipment. And the MTC equipment is used for determining whether the MTC equipment allows to initiate the access request according to the information after the compression processing and the MTC identification stored by the MTC equipment.
Preferably, the network side device is further configured to determine the same bit information of the MTC identity to which access is prohibited, and send the same bit information to the MTC device through a broadcast message; correspondingly, the MTC device is further configured to match the received same bit information with the MTC identity stored in the MTC device, and determine whether the MTC device is allowed to initiate an access request according to a matching result. The network side device may also send the same bit information to the MTC device in the form of a wildcard through a broadcast message.
Preferably, the network side device is further configured to encode and compress the MTC identifier prohibited from being accessed, and send the encoded and compressed MTC identifier to the MTC device through a broadcast message; correspondingly, the MTC device is further configured to decompress the information in the broadcast message, match the decompressed MTC identifier with the MTC identifier stored in the MTC device, and determine whether the MTC device is allowed to initiate an access request according to the matching result.
Preferably, the network side device is further configured to perform a modular operation on the MTC identifier to which access is prohibited, and send information after the modular operation to the MTC device; correspondingly, the MTC device is further configured to determine whether to allow itself to initiate an access request according to the information obtained after the modulo operation and the MTC identifier stored in itself.
Preferably, the network side device may include: the system comprises a mobility management network element and a RAN node, wherein the mobility management network element is used for compressing the MTC identification which is forbidden to be accessed and sending the compressed information to the RAN node; the RAN node is used for sending the compressed information to the MTC equipment through a broadcast message;
or, the mobility management network element is configured to send the access-prohibited MTC identifier to the RAN node; and the RAN node is used for compressing the MTC identification which is forbidden to be accessed and sending the compressed information to the MTC equipment through a broadcast message.
The network side device may include only: and the RAN node is used for compressing the MTC identifier which is stored by the RAN node and forbidden to access, and sending the compressed information to the MTC equipment through a broadcast message.
The above description is only a preferred embodiment of the present invention, and is not intended to limit the scope of the present invention.
Claims (14)
1. An access control method for Machine Type Communication (MTC) equipment is characterized by comprising the following steps:
the network side equipment compresses the MTC identification which is forbidden to be accessed and sends the compressed information to the MTC equipment; wherein the compression process is: taking the same bit information, coding compression or modular operation;
and the MTC equipment determines whether to allow the MTC equipment to initiate an access request according to the compressed information and the MTC identification stored by the MTC equipment.
2. The access control method of the MTC device according to claim 1, wherein the network side device compresses the MTC identity which is prohibited from being accessed, and sends the compressed information to the MTC device, specifically:
the network side equipment determines the same bit information of the MTC identification which is forbidden to be accessed, and sends the same bit information to the MTC equipment through a broadcast message;
correspondingly, the MTC device determines whether to allow itself to initiate an access request according to the compressed information and the MTC identifier stored in the MTC device, which specifically includes:
the MTC equipment matches the received same bit information with the MTC identification stored by the MTC equipment, and determines whether the MTC equipment allows to initiate an access request according to a matching result.
3. The access control method of the MTC device according to claim 2, wherein the method further comprises: and the network side equipment sends the same bit information to the MTC equipment in a wildcard form through a broadcast message.
4. The access control method of the MTC device according to claim 1, wherein the network side device compresses the MTC identity which is prohibited from being accessed, and sends the compressed information to the MTC device, specifically:
the network side equipment encodes and compresses the MTC identification which is forbidden to be accessed, and sends the MTC identification after encoding and compression to the MTC equipment through a broadcast message;
correspondingly, the MTC device determines whether to allow itself to initiate an access request according to the compressed information and the MTC identifier stored in the MTC device, which specifically includes:
and the MTC equipment decompresses the information in the broadcast message, matches the decompressed MTC identification with the MTC identification stored by the MTC equipment, and determines whether the MTC equipment allows to initiate an access request according to a matching result.
5. The access control method of the MTC device according to claim 1, wherein the network side device compresses the MTC identity which is prohibited from being accessed, and sends the compressed information to the MTC device, specifically:
the network side equipment performs modular operation on the MTC identification which is forbidden to be accessed, and sends the information after the modular operation to the MTC equipment;
correspondingly, the MTC device determines whether to allow itself to initiate an access request according to the compressed information and the MTC identifier stored in the MTC device, which specifically includes:
and the MTC equipment determines whether to allow the MTC equipment to initiate an access request according to the information after the modulus operation and the MTC identification stored by the MTC equipment.
6. The access control method of the MTC device according to any one of claims 1 to 5, wherein the network side device comprises: a mobility management network element and a radio access network, RAN, node;
correspondingly, the network side device compresses the MTC identity which is prohibited from accessing, and sends the compressed information to the MTC device, which specifically includes:
the mobility management network element compresses the MTC identification which is forbidden to be accessed, and sends the compressed information to the RAN node, and the RAN node sends the compressed information to MTC equipment through a broadcast message;
or, the mobility management network element sends the access-forbidden MTC identifier to the RAN node, and the RAN node compresses the access-forbidden MTC identifier and sends the compressed information to the MTC device through a broadcast message.
7. The access control method of the MTC device according to any one of claims 1 to 5, wherein the network side device comprises: a RAN node;
correspondingly, the network side device compresses the MTC identity which is prohibited from accessing, and sends the compressed information to the MTC device, which specifically includes:
and the RAN node compresses the MTC identification which is stored by the RAN node and is forbidden to access, and sends the compressed information to the MTC equipment through a broadcast message.
8. An access control system of a Machine Type Communication (MTC) device, the system comprising: a network side device and an MTC device, wherein,
the network side equipment is used for compressing the MTC identification which is forbidden to be accessed and sending the compressed information to the MTC equipment; wherein the compression process is: taking the same bit information, coding compression or modular operation;
and the MTC equipment is used for determining whether the MTC equipment allows to initiate an access request according to the compressed information and the MTC identification stored by the MTC equipment.
9. The access control system of the MTC device according to claim 8, wherein the network side device is further configured to determine the same bit information of the MTC identity which is prohibited from being accessed, and send the same bit information to the MTC device through a broadcast message;
correspondingly, the MTC device is further configured to match the received same bit information with the MTC identifier stored in the MTC device, and determine whether the MTC device is allowed to initiate an access request according to a matching result.
10. The access control system of the MTC device according to claim 9, wherein the network side device is further configured to send the same bit information to the MTC device in a broadcast message in a form of a wildcard.
11. The access control system of the MTC device according to claim 8, wherein the network side device is further configured to encode and compress the MTC identifier which is prohibited from being accessed, and send the encoded and compressed MTC identifier to the MTC device through a broadcast message;
correspondingly, the MTC device is further configured to decompress the information in the broadcast message, match the decompressed MTC identifier with the MTC identifier stored in the MTC device, and determine whether the MTC device is allowed to initiate an access request according to a matching result.
12. The access control system of the MTC device according to claim 8, wherein the network side device is further configured to perform a modulo operation on an MTC identifier that is prohibited from being accessed, and send information after the modulo operation to the MTC device;
correspondingly, the MTC device is further configured to determine whether to allow itself to initiate an access request according to the information obtained after the modulo operation and the MTC identifier stored in itself.
13. The access control system of the MTC equipment according to any one of claims 8 to 12, wherein the network side equipment comprises: a mobility management network element and a RAN node; wherein,
the mobility management network element is used for compressing the MTC identification which is forbidden to be accessed and sending the compressed information to the RAN node; the RAN node is used for sending the compressed information to MTC equipment through a broadcast message;
or, the mobility management network element is configured to send the MTC identifier prohibited from being accessed to the RAN node; and the RAN node is used for compressing the MTC identification which is forbidden to be accessed and sending the compressed information to the MTC equipment through a broadcast message.
14. The access control system of the MTC equipment according to any one of claims 8 to 12, wherein the network side equipment comprises: and the RAN node is used for compressing the MTC identifier which is stored by the RAN node and forbidden to access, and sending the compressed information to the MTC equipment through a broadcast message.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201010233548.2A CN102340821B (en) | 2010-07-20 | 2010-07-20 | A kind of connection control method of MTC device and system |
PCT/CN2011/076319 WO2012010040A1 (en) | 2010-07-20 | 2011-06-24 | Control method and system for accessing of machine type communication mtc device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201010233548.2A CN102340821B (en) | 2010-07-20 | 2010-07-20 | A kind of connection control method of MTC device and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102340821A CN102340821A (en) | 2012-02-01 |
CN102340821B true CN102340821B (en) | 2015-09-16 |
Family
ID=45496509
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201010233548.2A Expired - Fee Related CN102340821B (en) | 2010-07-20 | 2010-07-20 | A kind of connection control method of MTC device and system |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN102340821B (en) |
WO (1) | WO2012010040A1 (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102404792A (en) * | 2010-09-14 | 2012-04-04 | 中兴通讯股份有限公司 | Overload control method and system |
CN109963320B (en) * | 2012-10-26 | 2021-03-23 | 华为技术有限公司 | Service access control method and device |
CN104469884B (en) * | 2013-09-23 | 2018-06-26 | 中国移动通信集团公司 | A kind of connection control method and equipment |
CN105636156B (en) * | 2014-11-07 | 2019-11-29 | 上海诺基亚贝尔股份有限公司 | The method for controlling MTC UE access |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1756405A (en) * | 2004-09-27 | 2006-04-05 | 华为技术有限公司 | Mobile network over loading control method |
CN101494925A (en) * | 2008-01-21 | 2009-07-29 | 联芯科技有限公司 | Access method and apparatus for multi-model terminal |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1435749A1 (en) * | 2002-12-30 | 2004-07-07 | Evolium S.A.S. | Location based call barring |
US7471951B2 (en) * | 2003-04-04 | 2008-12-30 | Alcatel-Lucent Usa, Inc. | Signaling of multi-task calls carried by a hybrid circuit/packet network |
US9167505B2 (en) * | 2007-10-08 | 2015-10-20 | Qualcomm Incorporated | Access management for wireless communication |
CN102045810B (en) * | 2009-10-09 | 2014-01-08 | 华为技术有限公司 | Method, device and system for accessing machine type communication terminal equipment to network |
-
2010
- 2010-07-20 CN CN201010233548.2A patent/CN102340821B/en not_active Expired - Fee Related
-
2011
- 2011-06-24 WO PCT/CN2011/076319 patent/WO2012010040A1/en active Application Filing
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1756405A (en) * | 2004-09-27 | 2006-04-05 | 华为技术有限公司 | Mobile network over loading control method |
CN101494925A (en) * | 2008-01-21 | 2009-07-29 | 联芯科技有限公司 | Access method and apparatus for multi-model terminal |
Non-Patent Citations (2)
Title |
---|
3GPP.3GPP TS 22.368 V10.0.0.《3GPP TS 22.368 V10.0.0》.2010,全文. * |
Sierra Wireless.MTC Device Access Control.《3GPP TSG-SA1 #46,S1-091120,MTC Device Access Control》.3GPP,2009,全文. * |
Also Published As
Publication number | Publication date |
---|---|
WO2012010040A1 (en) | 2012-01-26 |
CN102340821A (en) | 2012-02-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2498526B1 (en) | Method and system for obtaining information of machine type communication terminal | |
CN101977416B (en) | A kind of overload controlling method of MTC device and system | |
KR101824987B1 (en) | Method for efficiently transmitting downlink small data of machine type communication in mobile communications system | |
KR101655693B1 (en) | Access Control Method and Apparatus for Machine Type Communication Devices with Dual Priority Applications | |
US9491591B2 (en) | Method and apparatus for reliably transmitting group multicast using a cell broadcasting technique in a mobile communication system | |
EP2665310A1 (en) | Access control method and device | |
JP5718484B2 (en) | Shared network access control method, access network node, and core network node | |
CN108347746B (en) | Access control method, access network element and user equipment | |
CN101969635A (en) | Access control method and system for machine communication | |
US8804621B2 (en) | Data transmitting method using machine type communication group based tunneling, and mobile communication system using the same | |
CN110915264B (en) | Session processing method in wireless communication and terminal equipment | |
CN102404792A (en) | Overload control method and system | |
CN102340821B (en) | A kind of connection control method of MTC device and system | |
CN102056128B (en) | Information acquisition method and system of machinery communication terminals | |
CN102625271B (en) | A kind of signaling optimization method and system setting MTC device altogether | |
US11129229B2 (en) | Method and apparatus for wireless device connectivity management | |
Taleb et al. | An efficient scheme for MTC overload control based on signaling message compression | |
CN103188728B (en) | A kind of method for controlling network congestion and system | |
CN103108358B (en) | A kind of small data transmission method and device, system | |
CN102625418A (en) | Method and device for selecting public land mobile communication network access network | |
CN102480799A (en) | Wireless communication network and method for informing machine-type communication equipment to be in off-line state | |
US12231393B2 (en) | IP address allocation in a wireless communication network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20150916 Termination date: 20190720 |
|
CF01 | Termination of patent right due to non-payment of annual fee |