CN107318113B - Network slice processing method and device - Google Patents

Network slice processing method and device Download PDF

Info

Publication number
CN107318113B
CN107318113B CN201610267844.1A CN201610267844A CN107318113B CN 107318113 B CN107318113 B CN 107318113B CN 201610267844 A CN201610267844 A CN 201610267844A CN 107318113 B CN107318113 B CN 107318113B
Authority
CN
China
Prior art keywords
network slice
protocol configuration
identifier
terminal equipment
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610267844.1A
Other languages
Chinese (zh)
Other versions
CN107318113A (en
Inventor
李宏
张锦芳
张伟
晋英豪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN201610267844.1A priority Critical patent/CN107318113B/en
Priority to PCT/CN2017/077376 priority patent/WO2017185909A1/en
Publication of CN107318113A publication Critical patent/CN107318113A/en
Application granted granted Critical
Publication of CN107318113B publication Critical patent/CN107318113B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • H04W36/0055Transmission or use of information for re-establishing the radio link
    • H04W36/0066Transmission or use of information for re-establishing the radio link of control information between different types of networks in order to establish a new radio link in the target network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/002Transmission of channel access control information

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the invention provides a network slice processing method and device. The method comprises the following steps: the method comprises the steps that a terminal device is accessed to a source network slice, the terminal device sends a network slice processing request to a network manager, the network manager receives the network slice processing request sent by the terminal device, the network manager carries out target network slice access authorization corresponding to a target identifier on the terminal device according to the network slice processing request, first protocol configuration information corresponding to a target network slice is obtained, the network manager sends the first protocol configuration information to the terminal device, and the first protocol configuration information is used for indicating the terminal device to carry out protocol configuration according to the first protocol configuration information so as to access the target network slice. The method and the device realize that the terminal equipment can be correctly accessed into the target network slice, and improve the success rate when the terminal equipment is switched to the target network slice or is simultaneously accessed into the target network slice.

Description

Network slice processing method and device
Technical Field
The present invention relates to communications technologies, and in particular, to a method and an apparatus for processing network slices.
Background
With the rapid development of wireless communication technology, the fifth Generation (5th Generation, abbreviated as 5G) wireless communication technology has been the hot spot in the industry. In the future, wireless communication services are diversified, and different services have different requirements on network performance, for example, a service with high-speed mobile characteristics has higher requirements on network performance indexes such as switching delay and mobility; machine Type Communication (MTC) has high requirements for the number of service connections, and has no requirements for handover delay and mobility. Therefore, in the 5G communication system, in order to meet the requirements of different services on different network performances, the network needs to have the capability of being formulated as required, and flexible network slicing needs to be realized. The development trend of the 5G communication system is to establish different network slices for different types of services through a virtualization technology, each network slice can be regarded as a complete network, and the network slices corresponding to the different types of services can adopt different network forms, for example, different protocol stack structures are adopted on a data plane or a signaling plane to better match the characteristics of the services.
When different network slices adopt different data or signaling transmission protocols, if a terminal device needs to be switched from one network slice to another network slice, or the terminal device needs to be simultaneously accessed to another network slice, a protocol stack corresponding to an original network slice on the terminal device may not match with a protocol stack corresponding to a switched network slice or a newly accessed network slice, thereby causing a problem that the terminal device fails to switch the network slice.
Disclosure of Invention
The embodiment of the invention provides a network slice processing method and device, which are used for improving the success rate when a terminal device is switched to a target network slice or simultaneously accesses the target network slice.
In a first aspect, an embodiment of the present invention provides a network slice processing method. Wherein, the method comprises the following steps: the network manager receives a network slice processing request which is sent by the terminal equipment and comprises a target identifier, and the terminal equipment has access to a source network slice. And the network manager performs target network slice access authorization corresponding to the target identification on the terminal equipment according to the network slice processing request, acquires first protocol configuration information corresponding to the target network slice, and sends the first protocol configuration information to the terminal equipment, wherein the first protocol configuration information is used for indicating the terminal equipment to perform protocol configuration according to the first protocol configuration information so as to access the target network slice. The terminal device can generate a network slice processing request according to the self requirement, the network manager determines first protocol configuration information according to the network slice processing request, and the terminal device can configure according to the first protocol configuration information, so that the terminal device can configure a protocol according to the first protocol configuration information corresponding to a target network slice, and therefore the terminal device can be correctly accessed into the target network slice, and the success rate of switching the terminal device to the target network slice or accessing the target network slice at the same time is improved.
With reference to the first aspect, in a first possible implementation manner of the first aspect, the target identifier is an identifier of a target network slice, and the network slice processing request further includes an identifier of the terminal device. At this time, the network manager acquires subscription information corresponding to the identifier of the terminal device from the HSS or the PCRF according to the identifier of the terminal device, and performs target network slice access authorization corresponding to the identifier of the target network slice on the terminal device if the network manager determines that the terminal device can access the target network slice according to the subscription information and the identifier of the target network slice. The success rate of switching the terminal equipment to the target network slice or simultaneously accessing the target network slice is further improved through the access authorization.
With reference to the first aspect, in a second possible implementation manner of the first aspect, the target identifier is an identifier of a target service type, and the network slice processing request further includes an identifier of the terminal device. At this time, the network manager acquires subscription information corresponding to the identifier of the terminal device from the HSS or the PCRF according to the identifier of the terminal device, and performs target network slice access authorization corresponding to the identifier of the target service type on the terminal device if the network manager determines that the terminal device can access the target network slice according to the subscription information and the identifier of the target service type. The success rate of switching the terminal equipment to the target network slice or simultaneously accessing the target network slice is further improved through the access authorization.
With reference to the first aspect, or the first possible implementation manner of the first aspect, or the second possible implementation manner of the first aspect, in a third possible implementation manner of the first aspect, the network slice processing request further includes protocol configuration capability information of the terminal device. And if the network manager determines that the terminal equipment supports protocol reconfiguration according to the protocol configuration capability information of the terminal equipment, determining to execute the operation of performing target network slice access authorization corresponding to the target identifier on the terminal equipment according to the network slice processing request. And only when the terminal equipment supports the protocol reconfiguration, the authorization step is executed, so that the success rate of switching the terminal equipment to the target network slice or simultaneously accessing the target network slice is further improved.
With reference to the first aspect, or the first possible implementation manner of the first aspect, or the second possible implementation manner of the first aspect, in a fourth possible implementation manner of the first aspect, initial access to a default network slice by a terminal device is described. The source network slice is a default network slice. The network manager receives a first network slice access request which is sent by the terminal equipment and comprises the identification of the terminal equipment. The network manager acquires a default network slice corresponding to the identifier of the terminal device according to the first network slice access request, and performs default network slice access authorization on the terminal device, the network manager acquires second protocol configuration information corresponding to the default network slice, and the network manager sends the second protocol configuration information to the terminal device so that the terminal device performs protocol configuration according to the second protocol configuration information to access the default network slice. The network manager may send second protocol configuration information to the terminal device, where the second protocol configuration information is used to instruct the terminal device to perform protocol configuration according to the second protocol configuration information corresponding to the default network slice, so that a success rate of the terminal device when initially accessing the default network slice is improved.
With reference to the first aspect, or the first possible implementation manner of the first aspect, or the second possible implementation manner of the first aspect, in a fifth possible implementation manner of the first aspect, initial access of a terminal device to a slice of a network to be accessed is described. The source network slice is a to-be-accessed network slice. The network manager receives a second network slice access request which is sent by the terminal equipment and comprises an identifier to be accessed, the network manager performs network slice access authorization to the terminal equipment to be accessed corresponding to the identifier to be accessed according to the second network slice access request, and acquires third protocol configuration information corresponding to the network slice to be accessed, and the network manager sends the third protocol configuration information to the terminal equipment so that the terminal equipment performs protocol configuration according to the third protocol configuration information to access the network slice to be accessed. The network manager can send third protocol configuration information to the terminal device, and the third protocol configuration information is used for indicating the terminal device to perform protocol configuration according to the third protocol configuration information corresponding to the network slice to be accessed, so that the success rate of the terminal device when accessing the network slice to be accessed is improved.
With reference to the fifth possible implementation manner of the first aspect, in a sixth possible implementation manner of the first aspect, the identifier to be accessed is an identifier of a network slice to be accessed, and the second network slice access request further includes an identifier of the terminal device. And the network manager acquires subscription information corresponding to the identifier of the terminal equipment from the HSS or the PCRF according to the identifier of the terminal equipment, and if the network manager determines that the terminal equipment can be accessed into the network slice to be accessed according to the subscription information and the identifier of the network slice to be accessed, the network manager performs network slice to be accessed access authorization corresponding to the identifier of the network slice to be accessed on the terminal equipment. The success rate of the terminal equipment accessing the network slice to be accessed is further improved through the access authorization.
With reference to the sixth possible implementation manner of the first aspect, in a seventh possible implementation manner of the first aspect, if the network manager determines that the terminal device cannot access the to-be-accessed network slice according to the subscription information and the identifier of the to-be-accessed network slice, the network manager obtains a default network slice corresponding to the identifier of the terminal device, performs access authorization on the default network slice on the terminal device, obtains fourth protocol configuration information corresponding to the default network slice, and sends the fourth protocol configuration information to the terminal device, where the fourth protocol configuration information is used to instruct the terminal device to perform protocol configuration according to the fourth protocol configuration information to access the default network slice. When the second network slice access request comprises the identification of the network slice to be accessed, the network manager performs network slice access authorization to be accessed corresponding to the identification of the network slice to be accessed on the terminal equipment when the terminal equipment can access the network slice to be accessed, acquires third protocol configuration information corresponding to the network slice to be accessed, acquires default network slice corresponding to the identification of the terminal equipment when the terminal equipment cannot access the network slice to be accessed, performs default network slice access authorization on the terminal equipment, acquires fourth protocol configuration information corresponding to the default network slice, realizes that network slice access authorization to be accessed or default network slice access authorization can be selected on the terminal equipment according to the second network slice access request, and further determines whether third protocol configuration information corresponding to the network slice to be accessed is sent to the terminal equipment or fourth protocol configuration information corresponding to the network slice to be accessed is sent to the terminal equipment, therefore, the success rate of the terminal equipment in the initial access of the network slice is improved.
With reference to the first aspect, in an eighth possible implementation manner of the first aspect, the network slice processing request further includes an identifier of a type of the processing request; if the processing request type corresponding to the identifier of the processing request type is a network slice switching request, the method further comprises: and the network manager removes the bearing and connection between the terminal equipment and the network slice to be accessed. When the terminal device needs to be switched to the target network slice, the network manager may remove the bearer and the connection between the terminal device and the initially accessed network slice to be accessed, so as to save air interface resources.
With reference to the first aspect, in a ninth possible implementation manner of the first aspect, the network manager includes a slice manager and an SDPC, which are connected to each other. The slice manager receives a network slice processing request sent by the terminal device. The network slice processing request comprises a target identifier, and the terminal equipment has access to the source network slice. And the slice manager performs target network slice access authorization corresponding to the target identification on the terminal equipment according to the network slice processing request. And the slice manager sends the network slice processing request to the SDPC, and the SDPC determines first protocol configuration information corresponding to the target identifier according to the network slice processing request and sends the first protocol configuration information to the slice manager. The slice manager receives first protocol configuration information sent by the SDPC and sends the first protocol configuration information to the terminal equipment, and the first protocol configuration information is used for indicating the terminal equipment to carry out protocol configuration according to the first protocol configuration information so as to access the target network slice. The slice manager and the SDPC are separately arranged, so that access authorization of the slice manager is realized, the SDPC determines the first protocol configuration information, and compared with a mode that the slice manager and the SDPC are integrally arranged, the slice manager and the SDPC in the realization mode respectively realize different functions, and the efficiency is higher.
In a second aspect, an embodiment of the present invention provides a network slice processing method. Wherein, the method comprises the following steps: the terminal device accesses the source network slice. The terminal device sends a network slice processing request to the network manager. The network slice processing request includes an identification of the target network slice. The terminal equipment receives first protocol configuration information which is obtained by the network manager according to the network slice processing request and corresponds to the target network slice, and the terminal equipment carries out protocol configuration according to the first protocol configuration information so as to access the target network slice. The terminal device can generate a network slice processing request according to the self requirement, the network manager determines first protocol configuration information according to the network slice processing request, the terminal device can be configured according to the first protocol configuration information, and protocol configuration can be performed by the terminal device according to the first protocol configuration information corresponding to the target network slice, so that the terminal device can be correctly accessed into the target network slice, and the success rate of switching the terminal device from a source network slice to the target network slice or accessing the target network slice at the same time is improved.
With reference to the second aspect, in a first possible implementation manner of the second aspect, the target identifier is an identifier of a target network slice, the network slice processing request further includes an identifier of a terminal device, the network slice processing request is used to instruct the network manager to obtain, from the HSS or the PCRF, subscription information corresponding to the identifier of the terminal device according to the identifier of the terminal device, and if the network manager determines that the terminal device can access the target network slice according to the subscription information and the identifier of the target network slice, the network manager performs target network slice access authorization corresponding to the identifier of the target network slice on the terminal device. The success rate of switching the terminal equipment to the target network slice or simultaneously accessing the target network slice is further improved through the access authorization.
With reference to the second aspect, in a second possible implementation manner of the second aspect, the target identifier is an identifier of a target service type, the network slice processing request further includes an identifier of the terminal device, the network slice processing request is used to instruct the network manager to obtain, from the HSS or the PCRF, subscription information corresponding to the identifier of the terminal device according to the identifier of the terminal device, and if the network manager determines that the terminal device can access the target network slice according to the subscription information and the identifier of the target service type, the network manager performs target network slice access authorization corresponding to the identifier of the target service type on the terminal device. The success rate of switching the terminal equipment to the target network slice or simultaneously accessing the target network slice is further improved through the access authorization.
With reference to the second aspect or the first possible implementation manner of the second aspect or the second possible implementation manner of the second aspect, in a third possible implementation manner of the second aspect, the network slice processing request further includes protocol configuration capability information of the terminal device, where the protocol configuration capability information is used to indicate that, if the network manager determines that the terminal device supports protocol reconfiguration according to the protocol configuration capability information of the terminal device, the network slice manager determines to execute an operation of performing, on the terminal device, target network slice access authorization corresponding to an identifier of a target network slice according to the network slice processing request. And only when the terminal equipment supports the protocol reconfiguration, the access authorization step is executed, so that the success rate of switching the terminal equipment to the target network slice or simultaneously accessing the target network slice is further improved.
With reference to the second aspect, or the first possible implementation manner of the second aspect, or the second possible implementation manner of the second aspect, in a fourth possible implementation manner of the second aspect, initial access to a default network slice by a terminal device is described. The source network slice is a default network slice. The method comprises the steps that a terminal device sends a first network slice access request including an identifier of the terminal device to a network manager, the first network slice access request is used for indicating the network manager to obtain a default network slice corresponding to the identifier of the terminal device according to the first network slice access request, access authorization of the default network slice is conducted on the terminal device, second protocol configuration information corresponding to the default network slice is obtained, the terminal device receives second protocol configuration information sent by the network manager, and the terminal device conducts protocol configuration according to the second protocol configuration information to access the default network slice. The terminal equipment can carry out protocol configuration according to the second protocol configuration information corresponding to the default network slice, thereby improving the success rate of the terminal equipment when the terminal equipment is initially accessed into the network slice.
With reference to the second aspect, or the first possible implementation manner of the second aspect, or the second possible implementation manner of the second aspect, in a fifth possible implementation manner of the second aspect, the source network slice is a to-be-accessed network slice. And the terminal equipment sends a second network slice access request to the network manager, wherein the second network slice access request comprises an identifier to be accessed, and the second network slice access request is used for indicating the network manager to perform network slice access authorization to be accessed corresponding to the identifier to be accessed on the terminal equipment according to the second network slice access request and acquiring third protocol configuration information corresponding to the network slice to be accessed. And the terminal equipment receives the third protocol configuration information sent by the network manager. And the terminal equipment performs protocol configuration according to the third protocol configuration information to access the network slice to be accessed, so that the success rate of the terminal equipment when accessing the network slice to be accessed is improved.
With reference to the fifth possible implementation manner of the second aspect, in a sixth possible implementation manner of the second aspect, the identifier to be accessed is an identifier of a network slice to be accessed, and the second network slice access request further includes an identifier of the terminal device. And the second network slice access request is used for indicating the network manager to acquire subscription information corresponding to the identifier of the terminal equipment from the HSS or the PCRF according to the identifier of the terminal equipment, and if the network manager determines that the terminal equipment can be accessed into the network slice to be accessed according to the subscription information and the identifier of the network slice to be accessed, the network manager performs network slice to be accessed access authorization corresponding to the identifier of the network slice to be accessed on the terminal equipment. The success rate of the terminal equipment accessing the network slice to be accessed is further improved through the access authorization.
With reference to the sixth possible implementation manner of the second aspect, in a seventh possible implementation manner of the second aspect, if the network manager determines that the terminal device cannot access the to-be-accessed network slice according to the subscription information and the identifier of the to-be-accessed network slice, the method further includes: and the terminal equipment receives the fourth protocol configuration information sent by the network manager. The fourth protocol configuration information is protocol configuration information which is acquired by the network manager and corresponds to a default network slice, and the default network slice is a network slice which is acquired by the slice manager and corresponds to the identifier of the terminal device. And the terminal equipment carries out protocol configuration according to the fourth protocol configuration information so as to access the default network slice. When the terminal equipment can not access the network slice to be accessed, the network manager acquires the default network slice corresponding to the identifier of the terminal equipment, performs access authorization on the default network slice to the terminal equipment, acquires fourth protocol configuration information corresponding to the default network slice, and configures the terminal equipment according to the fourth protocol configuration information corresponding to the network slice to be defaulted to access the default network slice, so that the success rate of the terminal equipment in initially accessing the network slice is improved.
In a third aspect, the present invention provides a network manager, comprising: a transceiver, a memory, and a processor. The memory is to store instructions. The processor is connected with the memory and the transceiver respectively and used for executing the instructions so as to execute the following steps when the instructions are executed: receiving a network slice processing request sent by terminal equipment through a transceiver, wherein the network slice processing request comprises a target identifier, and the terminal equipment has access to a source network slice; according to the network slice processing request, performing target network slice access authorization corresponding to the target identification on the terminal equipment, and acquiring first protocol configuration information corresponding to the target network slice; and sending first protocol configuration information to the terminal equipment through the transceiver, wherein the first protocol configuration information is used for indicating the terminal equipment to carry out protocol configuration according to the first protocol configuration information so as to access the target network slice.
With reference to the third aspect, in a first possible implementation manner of the third aspect, the target identifier is an identifier of a target network slice. The network slice processing request further comprises an identification of the terminal device. In terms of performing target network slice access authorization corresponding to the target identifier for the terminal device according to the network slice processing request, the processor is configured to: acquiring subscription information corresponding to the identifier of the terminal equipment from a Home Subscriber Server (HSS) or a policy and charging rule functional unit (PCRF) according to the identifier of the terminal equipment; and if the terminal equipment can be accessed into the target network slice according to the subscription information and the identification of the target network slice, performing target network slice access authorization corresponding to the identification of the target network slice on the terminal equipment.
With reference to the third aspect, in a second possible implementation manner of the third aspect, the target identifier is an identifier of a target service type. The network slice processing request further comprises an identification of the terminal device. In terms of performing target network slice access authorization corresponding to the target identifier for the terminal device according to the network slice processing request, the processor is configured to: acquiring subscription information corresponding to the identifier of the terminal equipment from the HSS or the PCRF according to the identifier of the terminal equipment; and if the terminal equipment can be accessed into the target network slice according to the subscription information and the identification of the target service type, performing target network slice access authorization corresponding to the identification of the target service type on the terminal equipment.
With reference to the third aspect, or the first possible implementation manner of the third aspect, or the second possible implementation manner of the third aspect, in a third possible implementation manner of the third aspect, the network slice processing request further includes protocol configuration capability information of the terminal device. Before performing target network slice access authorization corresponding to the target identifier on the terminal device according to the network slice processing request, the processor is further configured to: and if the terminal equipment supports protocol reconfiguration according to the protocol configuration capability information of the terminal equipment, determining to execute the operation of performing target network slice access authorization corresponding to the target identifier on the terminal equipment according to the network slice processing request.
With reference to the third aspect or the first possible implementation manner of the third aspect or the second possible implementation manner of the third aspect, in a fourth possible implementation manner of the third aspect, the source network slice is a default network slice. Before receiving, by the transceiver, a network slice processing request transmitted by the terminal device, the processor is further configured to: receiving a first network slice access request sent by terminal equipment through a transceiver, wherein the first network slice access request comprises an identifier of the terminal equipment; acquiring a default network slice corresponding to the identifier of the terminal equipment according to the first network slice access request, and performing default network slice access authorization on the terminal equipment; acquiring second protocol configuration information corresponding to the default network slice; and sending second protocol configuration information to the terminal equipment through the transceiver, wherein the second protocol configuration information is used for indicating the terminal equipment to carry out protocol configuration according to the second protocol configuration information so as to access the default network slice.
With reference to the third aspect or the first possible implementation manner of the third aspect or the second possible implementation manner of the third aspect, in a fifth possible implementation manner of the third aspect, the source network slice is a to-be-accessed network slice. Before receiving, by the transceiver, a network slice processing request transmitted by the terminal device, the processor is further configured to: receiving a second network slice access request sent by the terminal equipment through the transceiver, wherein the second network slice access request comprises an identifier to be accessed; according to the second network slice access request, performing to-be-accessed network slice access authorization corresponding to the to-be-accessed identifier on the terminal equipment, and acquiring third protocol configuration information corresponding to the to-be-accessed network slice; and sending third protocol configuration information to the terminal equipment through the transceiver, wherein the third protocol configuration information is used for indicating the terminal equipment to carry out protocol configuration according to the third protocol configuration information so as to access the network slice to be accessed.
With reference to the fifth possible implementation manner of the third aspect, in a sixth possible implementation manner of the third aspect, the identifier to be accessed is an identifier of a network slice to be accessed, and the second network slice access request further includes an identifier of the terminal device. In the aspect of performing to-be-accessed network slice access authorization corresponding to the to-be-accessed identifier on the terminal device according to the second network slice access request, the processor is configured to: acquiring subscription information corresponding to the identifier of the terminal equipment from the HSS or the PCRF according to the identifier of the terminal equipment; and if the terminal equipment can be accessed into the network slice to be accessed according to the subscription information and the identifier of the network slice to be accessed, performing access authorization on the network slice to be accessed corresponding to the identifier of the network slice to be accessed on the terminal equipment.
With reference to the sixth possible implementation manner of the third aspect, in a seventh possible implementation manner of the third aspect, the processor is further configured to: if the terminal equipment cannot be accessed into the network slice to be accessed according to the subscription information and the identifier of the network slice to be accessed, acquiring a default network slice corresponding to the identifier of the terminal equipment, and performing default network slice access authorization on the terminal equipment; acquiring fourth protocol configuration information corresponding to the default network slice; and sending fourth protocol configuration information to the terminal equipment through the transceiver, wherein the fourth protocol configuration information is used for indicating the terminal equipment to carry out protocol configuration according to the fourth protocol configuration information so as to access the default network slice.
With reference to the third aspect, in an eighth possible implementation manner of the third aspect, the network slice processing request further includes an identifier of a type of the processing request. If the processing request type corresponding to the identifier of the processing request type is a network slice switching request, the processor is further configured to: and removing the bearing and the connection between the terminal equipment and the source network slice.
In a fourth aspect, an embodiment of the present invention provides a terminal device. The method comprises the following steps: a transceiver, a memory, and a processor. The memory is to store instructions. The processor is connected with the memory and the transceiver respectively and used for executing the instructions so as to execute the following steps when the instructions are executed: accessing a source network slice; sending a network slice processing request to a network manager through a transceiver, wherein the network slice processing request comprises a target identifier, and the network slice processing request is used for instructing the network manager to perform target network slice access authorization corresponding to the target identifier on terminal equipment according to the network slice processing request and acquiring first protocol configuration information corresponding to the target network slice; receiving first protocol configuration information sent by a network manager through a transceiver; and carrying out protocol configuration according to the first protocol configuration information to access the target network slice.
With reference to the fourth aspect, in a first possible implementation manner of the fourth aspect, the target identifier is an identifier of the target network slice. The network slice processing request further comprises an identification of the terminal device. And the network slice processing request is used for indicating the network manager to acquire subscription information corresponding to the identifier of the terminal equipment from a Home Subscriber Server (HSS) or a Policy and Charging Rule Function (PCRF) unit according to the identifier of the terminal equipment, and if the network manager determines that the terminal equipment can be accessed into the target network slice according to the subscription information and the identifier of the target network slice, performing target network slice access authorization corresponding to the identifier of the target network slice on the terminal equipment.
With reference to the fourth aspect, in a second possible implementation manner of the fourth aspect, the target identifier is an identifier of a target service type. The network slice processing request further comprises an identification of the terminal device. And the network slice processing request is used for indicating the network manager to acquire subscription information corresponding to the identifier of the terminal equipment from the HSS or the PCRF according to the identifier of the terminal equipment, and if the network manager determines that the terminal equipment can be accessed into the target network slice according to the subscription information and the identifier of the target service type, performing target network slice access authorization corresponding to the identifier of the target service type on the terminal equipment.
With reference to the fourth aspect, or the first possible implementation manner of the fourth aspect, or the second possible implementation manner of the fourth aspect, in a third possible implementation manner of the fourth aspect, the network slice processing request further includes protocol configuration capability information of the terminal device. And the protocol configuration capability information is used for indicating that if the network manager determines that the terminal equipment supports protocol reconfiguration according to the protocol configuration capability information of the terminal equipment, the network manager determines to execute the operation of performing target network slice access authorization corresponding to the target identifier on the terminal equipment according to the network slice processing request.
With reference to the fourth aspect or the first possible implementation manner of the fourth aspect or the second possible implementation manner of the fourth aspect, in a fourth possible implementation manner of the fourth aspect, the source network slice is a default network slice. In an aspect of the access source network slice, the processor is to: sending a first network slice access request to a network manager through a transceiver, wherein the first network slice access request comprises an identifier of a terminal device, and the first network slice access request is used for indicating the network manager to acquire a default network slice corresponding to the identifier of the terminal device according to the first network slice access request, perform default network slice access authorization on the terminal device, and acquire second protocol configuration information corresponding to the default network slice; receiving second protocol configuration information sent by a network manager through a transceiver; and carrying out protocol configuration according to the second protocol configuration information to access the default network slice.
With reference to the fourth aspect or the first possible implementation manner of the fourth aspect or the second possible implementation manner of the fourth aspect, in a fifth possible implementation manner of the fourth aspect, the source network slice is a to-be-accessed network slice. In an aspect of the access source network slice, the processor is to: sending a second network slice access request to the network manager through the transceiver, wherein the second network slice access request comprises a to-be-accessed identifier, and the second network slice access request is used for indicating the network manager to perform to-be-accessed network slice access authorization corresponding to the to-be-accessed identifier on the terminal equipment according to the second network slice access request, and acquiring third protocol configuration information corresponding to the to-be-accessed network slice; receiving, by the transceiver, third protocol configuration information sent by the network manager; and carrying out protocol configuration according to the third protocol configuration information to access the network slice to be accessed.
With reference to the fifth possible implementation manner of the fourth aspect, in a sixth possible implementation manner of the fourth aspect, the identifier to be accessed is an identifier of a network slice to be accessed. The second network slice access request further comprises an identifier of the terminal device, the second network slice access request is used for indicating the network manager to acquire subscription information corresponding to the identifier of the terminal device from the HSS or the PCRF according to the identifier of the terminal device, and if the network manager determines that the terminal device can be accessed into the network slice to be accessed according to the subscription information and the identifier of the network slice to be accessed, the network manager performs network slice access authorization to the terminal device, corresponding to the identifier of the network slice to be accessed.
With reference to the sixth possible implementation manner of the fourth aspect, in a seventh possible implementation manner of the fourth aspect, when the network manager determines that the terminal device cannot access the network slice to be accessed according to the subscription information and the identifier of the network slice to be accessed, the processor is further configured to: receiving, by the transceiver, fourth protocol configuration information sent by the network manager; the fourth protocol configuration information is protocol configuration information which is acquired by a network manager and corresponds to a default network slice, and the default network slice is a network slice which is acquired by a slice manager and corresponds to the identifier of the terminal device; and carrying out protocol configuration according to the fourth protocol configuration information to access the default network slice.
In a fifth aspect, the present invention provides a network manager, comprising: the device comprises a receiving module, an authorization module and a sending module. The receiving module is used for receiving a network slice processing request sent by the terminal device, wherein the network slice processing request comprises a target identifier, and the terminal device has access to a source network slice. And the authorization module is used for performing target network slice access authorization corresponding to the target identification on the terminal equipment according to the network slice processing request and acquiring first protocol configuration information corresponding to the target network slice. The sending module is used for sending first protocol configuration information to the terminal equipment, and the first protocol configuration information is used for indicating the terminal equipment to carry out protocol configuration according to the first protocol configuration information so as to access the target network slice.
With reference to the fifth aspect, in a first possible implementation manner of the fifth aspect, the target identifier is an identifier of a target network slice. The network slice processing request further comprises an identification of the terminal device. The authorization module is specifically configured to: acquiring subscription information corresponding to the identifier of the terminal equipment from a Home Subscriber Server (HSS) or a policy and charging rule functional unit (PCRF) according to the identifier of the terminal equipment; and if the terminal equipment can be accessed into the target network slice according to the subscription information and the identification of the target network slice, performing target network slice access authorization corresponding to the identification of the target network slice on the terminal equipment.
With reference to the fifth aspect, in a second possible implementation manner of the fifth aspect, the target identifier is an identifier of a target service type. The network slice processing request further comprises an identification of the terminal device. The authorization module is specifically configured to: acquiring subscription information corresponding to the identifier of the terminal equipment from the HSS or the PCRF according to the identifier of the terminal equipment; and if the terminal equipment can be accessed into the target network slice according to the subscription information and the identification of the target service type, performing target network slice access authorization corresponding to the identification of the target service type on the terminal equipment.
With reference to the fifth aspect or the first possible implementation manner of the fifth aspect or the second possible implementation manner of the fifth aspect, in a third possible implementation manner of the fifth aspect, the network slice processing request further includes protocol configuration capability information of the terminal device. The network manager further comprises: and the determining module is used for determining to execute the operation of performing target network slice access authorization corresponding to the target identifier on the terminal equipment according to the network slice processing request when the terminal equipment is determined to support protocol reconfiguration according to the protocol configuration capability information of the terminal equipment.
With reference to the fifth aspect or the first possible implementation manner of the fifth aspect or the second possible implementation manner of the fifth aspect, in a fourth possible implementation manner of the fifth aspect, the source network slice is a default network slice. The receiving module is further configured to receive a first network slice access request sent by the terminal device, where the first network slice access request includes an identifier of the terminal device; the authorization module is further used for obtaining a default network slice corresponding to the identifier of the terminal device according to the first network slice access request, and performing default network slice access authorization on the terminal device. The network manager further comprises: and the acquisition module is used for acquiring second protocol configuration information corresponding to the default network slice. The sending module is further configured to send second protocol configuration information to the terminal device, where the second protocol configuration information is used to instruct the terminal device to perform protocol configuration according to the second protocol configuration information to access the default network slice.
With reference to the fifth aspect or the first possible implementation manner of the fifth aspect or the second possible implementation manner of the fifth aspect, in a fifth possible implementation manner of the fifth aspect, the source network slice is a to-be-accessed network slice. The receiving module is further configured to receive a second network slice access request sent by the terminal device. And the second network slice access request comprises the identifier to be accessed. The authorization module is further used for authorizing access to the network slice to be accessed corresponding to the identifier to be accessed to the terminal device according to the second network slice access request, and acquiring third protocol configuration information corresponding to the network slice to be accessed. The sending module is further configured to send third protocol configuration information to the terminal device, where the third protocol configuration information is used to instruct the terminal device to perform protocol configuration according to the third protocol configuration information to access the to-be-accessed network slice.
With reference to the fifth possible implementation manner of the fifth aspect, in a sixth possible implementation manner of the fifth aspect, the identifier to be accessed is an identifier of a network slice to be accessed. The second network slice access request further comprises an identification of the terminal device. The authorization module is specifically configured to: acquiring subscription information corresponding to the identifier of the terminal equipment from the HSS or the PCRF according to the identifier of the terminal equipment; and if the terminal equipment can be accessed into the network slice to be accessed according to the subscription information and the identifier of the network slice to be accessed, the network manager performs access authorization on the network slice to be accessed corresponding to the identifier of the network slice to be accessed to the terminal equipment.
With reference to the sixth possible implementation manner of the fifth aspect, in a seventh possible implementation manner of the fifth aspect, the obtaining module is further configured to, when it is determined that the terminal device cannot access the to-be-accessed network slice according to the subscription information and the identifier of the to-be-accessed network slice, obtain a default network slice corresponding to the identifier of the terminal device, perform default network slice access authorization on the terminal device, and obtain fourth protocol configuration information corresponding to the default network slice. The sending module is further configured to send fourth protocol configuration information to the terminal device, where the fourth protocol configuration information is used to instruct the terminal device to perform protocol configuration according to the fourth protocol configuration information to access the default network slice.
With reference to the fifth aspect, in an eighth possible implementation manner of the fifth aspect, the network slice processing request further includes an identifier of a type of the processing request. And the processing request type corresponding to the identifier of the processing request type is a network slice switching request. The network manager further comprises: and the dismantling module is used for dismantling the bearing and the connection between the terminal equipment and the source network slice.
In a sixth aspect, an embodiment of the present invention provides a terminal device. The terminal device includes: the device comprises an access module, a sending module, a receiving module and a configuration module. The access module is used for accessing the source network slice. The sending module is used for sending a network slice processing request to the network manager, wherein the network slice processing request comprises a target identifier, and the network slice processing request is used for indicating the network manager to perform target network slice access authorization corresponding to the target identifier on the terminal device according to the network slice processing request and acquiring first protocol configuration information corresponding to the target network slice. The receiving module is used for receiving the first protocol configuration information sent by the network manager. And the configuration module is used for carrying out protocol configuration according to the first protocol configuration information so as to access the target network slice.
With reference to the sixth aspect, in a first possible implementation manner of the sixth aspect, the target identifier is an identifier of the target network slice. The network slice processing request further comprises an identification of the terminal device. And the network slice processing request is used for indicating the network manager to acquire subscription information corresponding to the identifier of the terminal equipment from a Home Subscriber Server (HSS) or a Policy and Charging Rule Function (PCRF) unit according to the identifier of the terminal equipment, and if the network manager determines that the terminal equipment can be accessed into the target network slice according to the subscription information and the identifier of the target network slice, performing target network slice access authorization corresponding to the identifier of the target network slice on the terminal equipment.
With reference to the sixth aspect, in a second possible implementation manner of the sixth aspect, the target identifier is an identifier of a target service type. The network slice processing request further comprises an identification of the terminal device. And the network slice processing request is used for indicating the network manager to acquire subscription information corresponding to the identifier of the terminal equipment from the HSS or the PCRF according to the identifier of the terminal equipment, and if the network manager determines that the terminal equipment can be accessed into the target network slice according to the subscription information and the identifier of the target service type, performing target network slice access authorization corresponding to the identifier of the target service type on the terminal equipment.
With reference to the sixth aspect or the first possible implementation manner of the sixth aspect or the second possible implementation manner of the fourth aspect, in a third possible implementation manner of the sixth aspect, the network slice processing request further includes protocol configuration capability information of the terminal device. And the protocol configuration capability information is used for indicating that if the network manager determines that the terminal equipment supports protocol reconfiguration according to the protocol configuration capability information of the terminal equipment, the network manager determines to execute the operation of performing target network slice access authorization corresponding to the target identifier on the terminal equipment according to the network slice processing request.
With reference to the sixth aspect or the first possible implementation manner of the sixth aspect or the second possible implementation manner of the sixth aspect, in a fourth possible implementation manner of the sixth aspect, the source network slice is a default network slice. The access module is specifically configured to: sending a first network slice access request to a network manager, wherein the first network slice access request comprises an identifier of a terminal device, and the first network slice access request is used for instructing the network manager to acquire a default network slice corresponding to the identifier of the terminal device according to the first network slice access request, perform default network slice access authorization on the terminal device, and acquire second protocol configuration information corresponding to the default network slice; receiving second protocol configuration information sent by a network manager; and carrying out protocol configuration according to the second protocol configuration information to access the default network slice.
With reference to the sixth aspect or the first possible implementation manner of the sixth aspect or the second possible implementation manner of the sixth aspect, in a fifth possible implementation manner of the sixth aspect, the source network slice is a to-be-accessed network slice. The access module is specifically configured to: sending a second network slice access request to the network manager, wherein the second network slice access request comprises an identifier to be accessed, and the second network slice access request is used for instructing the network manager to perform network slice access authorization to be accessed corresponding to the identifier to be accessed on the terminal equipment according to the second network slice access request, and acquiring third protocol configuration information corresponding to the network slice to be accessed; receiving third protocol configuration information sent by a network manager; and carrying out protocol configuration according to the third protocol configuration information to access the network slice to be accessed.
With reference to the fifth possible implementation manner of the sixth aspect, in a sixth possible implementation manner of the sixth aspect, the identifier to be accessed is an identifier of a network slice to be accessed. The second network slice access request further comprises an identification of the terminal device. And the second network slice access request is used for indicating the network manager to acquire subscription information corresponding to the identifier of the terminal equipment from the HSS or the PCRF according to the identifier of the terminal equipment, and if the network manager determines that the terminal equipment can be accessed into the network slice to be accessed according to the subscription information and the identifier of the network slice to be accessed, the network manager performs network slice to be accessed access authorization corresponding to the identifier of the network slice to be accessed on the terminal equipment.
With reference to the sixth possible implementation manner of the sixth aspect, in a seventh possible implementation manner of the sixth aspect, when the network manager determines that the terminal device cannot access the network slice to be accessed according to the subscription information and the identifier of the network slice to be accessed, the access module is further configured to receive fourth protocol configuration information sent by the network manager, where the fourth protocol configuration information is protocol configuration information corresponding to a default network slice acquired by the network manager, and the default network slice is a network slice acquired by the slice manager and corresponding to the identifier of the terminal device; and the access module is used for carrying out protocol configuration according to the fourth protocol configuration information so as to access the default network slice.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
Fig. 1 is a system structure diagram of a first embodiment of a network slice processing method according to the present invention;
fig. 2 is a signaling interaction diagram of a network slice processing method according to a first embodiment of the present invention;
fig. 3 is a signaling interaction diagram of a second embodiment of a network slice processing method according to the present invention;
fig. 4 is a signaling interaction diagram of a third embodiment of a network slice processing method according to the present invention;
fig. 5 is a schematic structural diagram of a first embodiment of a network manager according to the present invention;
fig. 6 is a schematic structural diagram of a first terminal device according to an embodiment of the present invention;
fig. 7 is a schematic structural diagram of a second embodiment of a network manager according to the present invention;
fig. 8 is a schematic structural diagram of a second terminal device according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The terms "first," "second," "third," "fourth," and the like in the description and in the claims, as well as in the drawings, if any, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the invention described herein are, for example, capable of operation in sequences other than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
Fig. 1 is a diagram illustrating a network system structure according to an embodiment of the present invention. As shown in fig. 1, the network slices are divided in the data plane, and all network slices share common control plane functions. A network slice consists of a set of one or more network functions and resources capable of running those network functions. Wherein the network functions can provide the required telecommunication services and network capabilities. A network function is a processing unit in a network that has a defined functional behavior and a defined interface. The Network slice includes an evolved Node B (eNB), a Serving Gateway (SGW) and a Packet Data Network Gateway (PGW) connected in sequence. The control plane includes a Mobility Management Entity (MME), a Home Subscriber Server (HSS), a Policy and Charging Rules Function (PCRF), a slice manager, and a Software Defined Protocol Controller (SDPC). MME, slice manager and SDPC connect gradually, and be connected with HSS and PCRF respectively. Solid line in FIG. 1 "
Figure BDA0000975427380000163
"indicates the connection of the data planes, dotted line"
Figure BDA0000975427380000162
"denotes the connection of the control plane. The terminal device and the network slice are connected by a data plane and a control plane.
The network manager in the embodiment of the invention comprises a slice manager and an SDPC. The slice manager and the SDPC may be located in the same entity or in different entities, with the two being interfaced. The network manager may be located in an entity in the existing network that logically functionally implements the functionality of the network manager. The slice manager is responsible for generation of network slices, resource allocation, access selection, access authorization and the like. The slice manager completes the generation of the network slices by establishing the connection and the bearing of each network slice. And according to the logic function corresponding to the network slice, completing the mapping of the logic function and the physical resource to realize the resource allocation. And selecting a default network slice for the terminal equipment according to the subscription information of the terminal equipment to realize access selection. When the terminal device needs to switch or simultaneously access the network slice, the terminal device is authorized to realize access authorization when the terminal device can switch to the target network slice or access the network slice. The SDPC is used for carrying out protocol configuration on the network entity function on the network slice according to the service type supported on the network slice and selecting the protocol configuration information corresponding to the network slice which needs to be accessed by the terminal equipment. Different types of traffic may be carried on different network slices. The terminal device may access different network slices to perform different services.
When a first type of traffic is in progress on the terminal device, it may access the network slice 11. The network slice processing method provided by the embodiment of the invention can be applied to the following scenes: when the terminal device needs to perform a second type of service, the performance of the network slice 11 cannot meet the requirement of the second type of service, and the terminal device needs to be switched to the network slice 12; and when the terminal device needs to perform the second type of service while performing the first type of service, the terminal device needs to access the network slice 12 at the same time.
The terminal device in the embodiment of the invention can be a handheld device, a vehicle-mounted device, a wearable device, a computing device, various forms of User Equipment (UE), a Mobile Station (MS), a terminal (terminal) and the like.
Fig. 2 is a signaling interaction diagram of a network slice processing method according to a first embodiment of the present invention. As shown in fig. 2, the network slice processing method provided in the embodiment of the present invention includes the following steps:
s201: the terminal device accesses the source network slice.
Specifically, the terminal device may send an access request to the network manager, the network manager performs access authorization on the terminal device according to the access request, and sends configuration information, and the terminal device performs configuration according to the configuration information to access the source network slice.
The source network slice in the embodiment of the invention is a network slice which is currently accessed by the terminal equipment.
In one implementation, the access request may include only the identity of the terminal device when accessing the source network slice. At this time, the network slice manager acquires a default network slice corresponding to the identifier of the terminal device, performs access authorization on the default network slice to the terminal device, acquires protocol configuration information corresponding to the default network slice, and sends the protocol configuration information to the terminal device. And the terminal equipment is configured according to the protocol configuration information corresponding to the default network slice so as to access the default network slice. It should be noted that the default network slice is a network slice determined by the terminal device when signing a contract and capable of meeting the most basic service requirement of the terminal device.
In another implementation manner, when accessing the source network slice, the access request includes an identifier of the source network slice that needs to be accessed, which is determined by the terminal device according to a service that needs to be performed by the terminal device. Since the terminal device does not access the source network slice at this time, the identifier is referred to as an identifier to be accessed, and the corresponding source network slice is referred to as a network slice to be accessed. At this time, the network slice manager performs to-be-accessed network slice access authorization on the terminal device according to the to-be-accessed identifier, acquires protocol configuration information corresponding to the to-be-accessed network slice, and sends the protocol configuration information to the terminal device, and the terminal device performs configuration according to the protocol configuration information corresponding to the to-be-accessed network slice so as to access the to-be-accessed network slice.
S202: the terminal equipment sends a network slice processing request to the network manager, and the network manager receives the network slice processing request sent by the terminal equipment.
Wherein the network slice processing request includes a target identification. The terminal device has access to the source network slice. The terminal equipment sends a network slice processing request to the network manager, wherein the network slice processing request is used for indicating the network manager to perform target network slice access authorization corresponding to a target identifier on the terminal equipment according to the network slice processing request, and acquiring first protocol configuration information corresponding to the target network slice.
An identification of the type of processing request may be included in the network slicing processing request to indicate what type of network slicing processing request is. In the embodiment of the present invention, the network slice processing request may be a network slice switching request or a network slice accessing request. In the network slice processing method provided by the embodiment of the invention, the terminal device has access to a source network slice to run a service, and the connection between a target network slice and a control plane is established. For example, in the first case: the terminal device has access to a source network slice to operate the voice service, at this time, if the terminal device needs to end the voice service to perform the service of connecting the number of degrees of electricity read by the intelligent ammeter, because the current source network slice is suitable for operating the voice service, the source network slice has the characteristics of small delay, low safety and low reliability, and when the terminal device is connected with the number of degrees of electricity read by the intelligent ammeter, the service has high requirements on safety and reliability, so the terminal device needs to be switched from the current source network slice to a target network slice capable of operating and reading the number of degrees of electricity on the intelligent ammeter. In the second case, the terminal device needs to connect the degree of the reading electricity of the smart meter under the condition of not ending the voice service, and the terminal device needs to be accessed into a target network slice which can meet the degree service requirement of the reading electricity and simultaneously is also accessed into a source network slice which runs the voice service. In the first case, the network slice processing request is a network slice handover request. In the second case, the network slice processing request is a network slice access request. The terminal device and the network manager may agree on a rule in advance so that the network manager recognizes the type of the network slicing processing request.
When the terminal equipment needs to operate a new service and the current source network slice cannot meet the requirement of the new service, the terminal equipment sends a network slice processing request to a network manager. The target network slice is a network slice to be accessed or switched to by the terminal equipment.
The target identification may be an identification of the target network slice. The terminal device can inquire the mapping relation between the self-stored service and the network slice, and determine the target network slice according to the type of the target service to be operated, so as to obtain the identifier of the target network slice. Or the terminal equipment inquires the mapping relation between the service type identifier stored in the terminal equipment and the network slice identifier, and determines the target network slice identifier according to the target service type to be operated.
The target identification may also be an identification of the target traffic type. The terminal device can query the mapping relationship between the target service type stored in the terminal device and the identifier of the target service type, and determine the identifier of the target service type according to the target service type to be operated.
It should be noted that the terminal device may first send a network slice processing request to the eNB in the source network slice. And the eNB in the source network slice sends the network slice processing request to the MME of the control plane. And the MME sends the network slice processing request to the network manager. The network manager receives a network slice processing request sent by the MME.
S203: and the network manager performs target network slice access authorization corresponding to the target identifier on the terminal equipment according to the network slice processing request, and acquires first protocol configuration information corresponding to the target network slice.
In particular, in one implementation, the target identification is an identification of the target network slice. The network manager stores the subscription information of the terminal equipment, and performs target network slice access authorization corresponding to the identifier of the target network slice on the terminal equipment according to the subscription information of the terminal equipment and the identifier of the target network slice.
In another implementation manner, the target identifier is an identifier of the target network slice, and the network slice processing request sent by the terminal device further includes the identifier of the terminal device. For example, the identifier of the terminal device may be an International Mobile Subscriber identity (International Mobile Subscriber identity Number; IMSI) or the like. After receiving the network slicing processing request, the network manager acquires the subscription information corresponding to the identifier of the terminal device from the HSS or the PCRF according to the identifier of the terminal device in the network slicing processing request. And if the network manager determines that the terminal equipment can be accessed into the target network slice according to the subscription information and the identification of the target network slice, performing target network slice access authorization corresponding to the identification of the target network slice on the terminal equipment. The subscription information may be information such as a type, a data transmission rate, a bandwidth, a delay, a packet error rate, and the like of an initiated service subscribed by the terminal device when accessing the network.
In yet another implementation, the target identifier is an identifier of a target service type, and the network slice processing request further includes an identifier of the terminal device. After receiving the network slicing processing request, the network manager acquires the subscription information corresponding to the identifier of the terminal device from the HSS or the PCRF according to the identifier of the terminal device in the network slicing processing request. And if the network manager determines that the terminal equipment can access the target network slice according to the subscription information and the identifier of the target service type, performing target network slice access authorization corresponding to the identifier of the target service type on the terminal equipment.
It should be noted that, when the slice manager and the SDPC in the network manager are located in the same entity, that is, integrated together, the network manager may obtain the first protocol configuration information corresponding to the target network slice from the network manager after performing access authorization on the terminal device. When a slice manager and an SDPC in a network manager are separately arranged at different entities, the slice manager performs access authorization on terminal equipment according to a network slice processing request, then the slice manager sends the network slice processing request to the SDPC, the SDPC determines first protocol configuration information corresponding to a target network slice, and then sends the first protocol configuration information to the slice manager.
When the network manager determines that the terminal device can access the target network slice according to the subscription information and the identifier of the target network slice, the network manager may determine in the following manner: and if the subscription information of the terminal equipment comprises the service corresponding to the target network slice, the network manager determines that the terminal equipment can access the target network slice. Of course, the network manager may also perform the determination in other manners, for example, when the bandwidth of the subscription information may satisfy the service corresponding to the target network slice, the network manager determines that the terminal device can access the target network slice. The present embodiment does not limit this.
When the network manager determines that the terminal device can access the target network slice according to the subscription information and the identifier of the target service type, the network manager may determine in the following manner: and if the subscription information of the terminal equipment comprises the target service type corresponding to the identification of the target service type, the network manager determines that the terminal equipment can be accessed into the target network slice.
The first protocol configuration information may include protocol stack configuration information corresponding to the target network slice that the terminal device needs to adopt.
S204: the network manager sends first protocol configuration information to the terminal equipment, and the terminal equipment receives the first protocol configuration information sent by the network manager.
The network manager sends first protocol configuration information to the terminal equipment, wherein the first protocol configuration information is used for indicating the terminal equipment to carry out protocol configuration according to the first protocol configuration information so as to access the target network slice.
Specifically, the network manager may first send the first protocol configuration information to the MME. And the MME sends the first protocol configuration information to the eNB in the source network slice. And the eNB in the source network slice sends the first protocol configuration information to the terminal equipment. The terminal equipment receives first protocol configuration information sent by the eNB in the source network slice.
S205: and the terminal equipment carries out protocol configuration according to the first protocol configuration information so as to access the target network slice.
Specifically, the terminal device in the embodiment of the present invention is a terminal device having a protocol configuration function.
When the terminal device performs protocol configuration according to the first protocol configuration information, there are two implementation manners:
the first implementation mode comprises the following steps: the terminal equipment only stores one kind of basic protocol configuration information, and after receiving the first protocol configuration information, the terminal equipment performs configuration on the basis of the basic protocol configuration information so as to ensure that the protocol stack of the terminal equipment can be matched with the target network slice.
The second implementation mode comprises the following steps: the terminal equipment stores a plurality of different protocol configuration information, and after receiving the first protocol configuration information, the terminal equipment selects the protocol configuration information which is the same as the first protocol configuration information to complete configuration.
And after the terminal equipment is configured according to the first protocol configuration information, triggering the established connection between the terminal equipment and the target network slice and bearing access to the target network slice through the MME or the network manager.
The network slice processing method provided by the embodiment of the invention comprises the steps that a terminal device is accessed into a source network slice, the terminal device sends a network slice processing request to a network manager, the network manager receives the network slice processing request sent by the terminal device, the network manager performs target network slice access authorization corresponding to a target identifier on the terminal device according to the network slice processing request and acquires first protocol configuration information corresponding to a target network slice, the network manager sends the first protocol configuration information to the terminal device for indicating the terminal device to perform protocol configuration according to the first protocol configuration information so as to access the target network slice, the terminal device receives the first protocol configuration information sent by the network manager, the terminal device performs protocol configuration according to the first protocol configuration information, and when the terminal device needs to switch or simultaneously run a new service, the network slice processing request can be generated according to the self requirement, the network manager can determine the first protocol configuration information according to the network slice processing request, the terminal equipment can be configured according to the first protocol configuration information, and the protocol configuration of the terminal equipment according to the first protocol configuration information corresponding to the target network slice is realized, so that the terminal equipment can be correctly accessed into the target network slice, and the success rate of switching the terminal equipment to the target network slice or accessing the target network slice at the same time is improved.
Fig. 3 is a signaling interaction diagram of a second embodiment of a network slice processing method according to the present invention. As shown in fig. 3, the network slice processing method according to the embodiment of the present invention is based on the embodiment shown in fig. 2, and when the source network slice is the default network slice, the step of S201 is described in detail:
s301: the terminal equipment sends a first network slice access request to the network manager, and the network manager receives the first network slice access request sent by the terminal equipment.
Wherein the first network slice access request comprises an identification of the terminal device. The terminal equipment sends a first network slice access request to the network manager, wherein the first network slice access request is used for indicating the network manager to acquire a default network slice corresponding to the identifier of the terminal equipment according to the first network slice access request, and performs default network slice access authorization on the terminal equipment to acquire second protocol configuration information corresponding to the default network slice.
Optionally, the terminal device sends the first network slice access request to the network manager after being powered on.
Similar to S202, the terminal device may first send a first network slice access request to the eNB of the default network slice. And the eNB of the default network slice sends the first network slice access request to the MME. And the MME sends the first network slice access request to the network manager. The first network slice access request includes an identification of the terminal device.
S302: and the network manager acquires a default network slice corresponding to the identifier of the terminal equipment according to the first network slice access request, and performs default network slice access authorization on the terminal equipment.
Specifically, in this case, since the first network slice access request does not include the identifier of the network slice to be accessed, the network manager may obtain, according to the identifier of the terminal device, the default network slice corresponding to the identifier of the terminal device, and perform default network slice access authorization on the terminal device. In this implementation manner, the network manager may also obtain subscription information of the terminal device from the HSS or the PCRF according to the identifier of the terminal device, and then determine the default network slice of the terminal device according to the subscription information. Or, the network manager stores default network slices corresponding to the identifiers of different terminal devices.
S303: the network manager obtains second protocol configuration information corresponding to the default network slice.
Specifically, when the slice manager and the SDPC are located in the same entity, i.e., integrated together, the network manager may obtain second protocol configuration information corresponding to the default network slice from the network manager after performing access authorization on the terminal device; when a slice manager and an SDPC in the network manager are separately arranged at different entities, the slice manager performs default network slice access authorization on the terminal equipment, then the slice manager sends a network slice processing request to the SDPC, the SDPC determines second protocol configuration information corresponding to the default network slice, and then sends the second protocol configuration information to the slice manager.
S304: and the network manager sends the second protocol configuration information to the terminal equipment, and the terminal equipment receives the second protocol configuration information sent by the network manager.
And the network manager sends second protocol configuration information to the terminal equipment, so that the terminal equipment carries out protocol configuration according to the second protocol configuration information to access the default network slice.
S305: and the terminal equipment carries out protocol configuration according to the second protocol configuration information so as to access the default network slice.
Specifically, when the terminal device performs protocol configuration according to the second protocol configuration information, the implementation process is similar to S205, and is not described herein again.
And after the terminal equipment performs protocol configuration according to the second protocol configuration, triggering the established connection between the terminal equipment and the default network slice and bearing access to the default network slice through the MME or the network manager.
Optionally, after S305, the method further includes: s306: and establishing the bearing and connection between the terminal equipment and the default network slice. In particular, it may be that the network manager triggers the establishment of bearers and connections between the terminal device and the default network slice. And after acquiring the second protocol configuration information corresponding to the default network slice, the network manager triggers the establishment of the bearer and the connection. The network manager establishes the bearer and the connection between the terminal equipment and the source network slice by generating the identifier, the Quality of Service (QoS) and the maintenance quantity related to the bearer. After S305, the terminal device may also send a configuration complete message to the network manager, and the network manager triggers, after receiving the configuration complete message, establishment of a bearer and a connection between the terminal device and the source network slice.
S307: the terminal equipment sends a network slice processing request to the network manager, and the network manager receives the network slice processing request sent by the terminal equipment.
S308: and the network manager performs target network slice access authorization corresponding to the target identifier on the terminal equipment according to the network slice processing request, and acquires first protocol configuration information corresponding to the target network slice.
S309: the network manager sends first protocol configuration information to the terminal equipment, and the terminal equipment receives the first protocol configuration information sent by the network manager.
The network manager sends first protocol configuration information to the terminal equipment so that the terminal equipment can access the target network slice, and carries out protocol configuration according to the first protocol configuration information.
S310: and the terminal equipment carries out protocol configuration according to the first protocol configuration information so as to access the target network slice.
The implementation process of S307-S310 is similar to that of S202-S205, and is not described herein again.
Optionally, after S310, the method further includes S311: and establishing bearing and connection between the terminal equipment and the target network slice.
In particular, it may be that the network manager triggers the establishment of bearers and connections between the terminal device and the target network slice. And after acquiring the first protocol configuration information corresponding to the target network slice, the network manager triggers the establishment of the load and the connection. The network manager establishes bearers and connections between the terminal device and the target network slice by generating bearer-related identifiers, QoS, and maintenance volumes. Or after S310, the terminal device sends a configuration completion message to the network manager, and after receiving the configuration completion message, the network manager triggers establishment of bearers and connections between the terminal device and the target network slice.
The network slice processing method provided by the embodiment of the invention comprises the steps that a terminal device sends a first network slice access request to a network manager, the network manager receives the first network slice access request sent by the terminal device, the network manager acquires a default network slice corresponding to an identifier of the terminal device according to the first network slice access request and authorizes the terminal device to access the default network slice, the network manager acquires second protocol configuration information corresponding to the default network slice, the network manager sends the second protocol configuration information to the terminal device so that the terminal device can access the default network slice according to the access and carry out protocol configuration according to the second protocol configuration information, the terminal device receives the second protocol configuration information sent by the network manager, the terminal device accesses the default network slice and carries out protocol configuration according to the second protocol configuration information, when the terminal equipment needs to be accessed into the network slice for the first time, when the first network slice access request comprises the identification of the terminal equipment, the default network slice is determined according to the identification of the terminal equipment in the first network slice access request, the second protocol configuration information corresponding to the default network slice is obtained, and the terminal equipment can carry out protocol configuration according to the second protocol configuration information corresponding to the default network slice, so that the success rate of the terminal equipment when the terminal equipment is initially accessed into the network slice is improved.
Further, on the basis of the embodiment shown in fig. 3, when the processing request type corresponding to the identifier of the processing request type is a network slice handover request, after the terminal device accesses the target network slice, the method further includes:
and the network manager removes the load bearing and connection between the terminal equipment and the source network slice.
Specifically, in the present embodiment, the source network slice is a default network slice. The network manager tears down bearers and connections between the terminal device and the eNB, SGW and PGW of the default network slice.
And after the terminal equipment is accessed into the target network slice, the bearing and the connection between the terminal equipment and the default network slice are removed, so that air interface resources can be saved.
Further, on the basis of the embodiments shown in fig. 2 and 3, when the network slice processing request further includes protocol configuration capability information of the terminal device, S203 and S308 further include:
and if the network manager determines that the terminal equipment supports protocol reconfiguration according to the protocol configuration capability information of the terminal equipment, determining to execute S203 or S308.
Specifically, the protocol configuration capability information of the terminal device is used to indicate whether the terminal device supports the protocol reconfiguration and the protocol type of the configuration supported by the terminal device. Which includes the programmability capabilities of the terminal device and the type of protocol that supports the configuration. The programmable capability of the terminal device is used to indicate whether the terminal device supports protocol reconfiguration. The programmability of the terminal device may be represented by a 1-bit binary number, e.g., by "1" indicating that the terminal device supports protocol reconfiguration and "0" indicating that the terminal device does not support protocol reconfiguration. The network manager and the terminal device may agree on the determination rule in advance. After receiving the network slice processing request, the network manager may perform the determination according to an agreed determination rule.
And if the network manager judges that the terminal equipment supports the protocol reconfiguration, determining to execute S203 or S308.
And if the network manager determines that the terminal equipment does not support the protocol reconfiguration, the network manager does not authorize the terminal equipment and terminates the operation. The terminal device fails to access.
The network slice processing request comprises the protocol configuration capability information of the terminal equipment, the network manager judges whether the terminal equipment supports protocol reconfiguration according to the protocol configuration capability information of the terminal equipment, and the authorization step is executed only when the terminal equipment supports the protocol reconfiguration, so that the success rate of switching the terminal equipment to the target network slice or simultaneously accessing the target network slice is further improved.
When the source network slice is a network slice to be accessed, in another embodiment of the network slice processing method provided by the embodiment of the present invention:
and the terminal equipment sends a second network slice access request to the network manager, wherein the second network slice access request comprises an identifier to be accessed, so that the network manager performs network slice access authorization to the terminal equipment, corresponding to the identifier to be accessed, according to the second network slice access request, and acquires third protocol configuration information corresponding to the network slice to be accessed.
The second network slice access request in this step includes the identifier to be accessed. The to-be-accessed identifier may be an identifier of a to-be-accessed network slice. The identifier of the network slice to be accessed may be an identifier of the network slice determined by the terminal device according to the service to be performed.
And the network manager receives a second network slice access request sent by the terminal equipment, performs to-be-accessed network slice access authorization corresponding to the to-be-accessed identifier on the terminal equipment according to the second network slice access request, and acquires third protocol configuration information corresponding to the to-be-accessed network slice.
Specifically, the identifier to be accessed may be an identifier of a network slice to be accessed, and the second network slice access request may further include an identifier of the terminal device. And the network manager acquires the subscription information corresponding to the identifier of the terminal equipment from the HSS or the PCRF according to the identifier of the terminal equipment. If the network manager determines that the terminal equipment can be accessed into the network slice to be accessed according to the subscription information and the identifier of the network slice to be accessed, the network manager performs access authorization on the network slice to be accessed corresponding to the identifier of the network slice to be accessed to the terminal equipment.
And the network manager sends the third protocol configuration information to the terminal equipment so that the terminal equipment can carry out protocol configuration according to the third protocol configuration information.
And the terminal equipment receives the third protocol configuration information sent by the network manager and performs protocol configuration according to the third protocol configuration information.
In this embodiment, if the network manager determines that the terminal device cannot access the to-be-accessed network slice, the network manager acquires a default network slice corresponding to the identifier of the terminal device, and performs default network slice access authorization on the terminal device.
The network manager obtains fourth protocol configuration information corresponding to the default network slice.
And the network manager sends fourth protocol configuration information to the terminal equipment so that the terminal equipment can access the default network slice, and carries out protocol configuration according to the fourth protocol configuration information.
And the network manager receives the fourth protocol configuration information, accesses the default network slice and performs protocol configuration according to the fourth protocol configuration information.
The scheme for performing network slice switching or accessing a new network slice in the embodiment of the present invention is the same as the scheme for performing network slice switching or accessing a new network slice in the embodiment shown in fig. 3, and is not described herein again.
It should be noted that, in this implementation manner, when performing network slice switching or accessing a new network slice, and when a processing request type corresponding to an identifier of a processing request type in a network slice processing request is a network slice switching request, after a terminal device accesses a target network slice, the method further includes:
and the network manager removes the bearing and connection between the terminal equipment and the network slice to be accessed.
In the network slice processing method provided by the embodiment of the invention, when the second network slice access request comprises the identifier to be accessed, if the network manager determines that the terminal equipment can be accessed into the network slice to be accessed, the network slice to be accessed corresponding to the identifier to be accessed is authorized for the terminal equipment, and the third protocol configuration information corresponding to the network slice to be accessed is obtained, when the network slice judges that the terminal equipment can not be accessed into the network slice to be accessed, the default network slice corresponding to the identifier of the terminal equipment is obtained, the default network slice access authorization is carried out on the terminal equipment, the fourth protocol configuration information corresponding to the default network slice is obtained, the network slice to be accessed or the default network slice access authorization can be selected for the terminal equipment according to the second network slice access request, and then the third protocol configuration information corresponding to the network slice to be accessed is determined to be sent to the terminal equipment or the third protocol configuration information corresponding to the network slice to be accessed is sent to the terminal equipment or the network slice to be accessed is determined to be sent to the terminal equipment And the fourth protocol configuration information corresponding to the network slice is defaulted, so that the success rate of the terminal equipment when the terminal equipment is initially accessed into the network slice is improved.
It should be noted that, in the solution of the embodiment of the present invention, the second network slice access request may also include protocol configuration capability information of the terminal device. Correspondingly, before the network manager performs the to-be-accessed network slice access authorization corresponding to the identifier of the to-be-accessed network slice on the terminal device according to the second network slice access request, if the network manager can also determine whether the terminal device supports protocol reconfiguration according to the protocol configuration capability information of the terminal device, the network manager determines to perform the to-be-accessed network slice access authorization corresponding to the to-be-accessed identifier on the terminal device.
It should be noted that the first protocol configuration information includes protocol stack configuration information corresponding to the target network slice that the terminal device needs to adopt. The second protocol configuration information includes protocol stack configuration information corresponding to a default network slice that the terminal device needs to adopt. The third protocol configuration information includes protocol stack configuration information corresponding to the network slice to be accessed, which is required to be adopted by the terminal device. The fourth protocol configuration information includes protocol stack configuration information corresponding to a default network slice that the terminal device needs to adopt. The first protocol configuration information, the second protocol configuration information, and the third protocol configuration information are distinguished by corresponding to different network slices. The second protocol configuration information and the fourth protocol configuration information are protocol stack configuration information corresponding to a default network slice, which is required to be adopted by the terminal device, and the difference is that the second protocol configuration information and the fourth protocol configuration information are protocol stack configuration information corresponding to the default network slice in different technical schemes.
Fig. 4 is a signaling interaction diagram of a network slice processing method according to a third embodiment of the present invention. As shown in fig. 4, the network slice processing method according to the embodiment of the present invention is explained in detail based on the embodiment shown in fig. 3:
in an embodiment of the invention, the source network slice is a default network slice. The default network slice and the target network slice comprise an eNB, an SGW and a PGW, and the control plane comprises: MME, slice manager and SDPC.
S401: and establishing the network slice.
Specifically, S401 may include: s401a default network slice setup and S401b target network slice setup. There is no timing relationship between S401a and S401 b. The default network slice and the target network slice are respectively connected with a slice manager in the control plane.
Different network slices are used to carry different types of traffic, using different control/signaling protocol processing architectures. In this process, resource mapping and protocol configuration on different network slices has been completed.
S402: the terminal equipment sends a first network slice access request to the slice manager, and the slice manager receives the first network slice access request sent by the terminal equipment.
In the embodiment of the present invention, the terminal device may first send the first network slice access request to the eNB of the default network slice. And the eNB of the default network slice sends the first network slice access request to the MME. And the MME sends the first network slice access request to the slice manager.
The first network slice access request comprises the identification of the terminal equipment.
S403: and the slice manager acquires a default network slice corresponding to the identifier of the terminal equipment according to the first network slice access request, and performs default network slice access authorization on the terminal equipment.
The default network slice here is the source network slice.
S404: the slice manager sends a first network slice access request to the SDPC.
S405: the SDPC determines second protocol configuration information according to the first network slice access request.
Specifically, the second protocol configuration information includes protocol stack configuration information corresponding to a default network slice that the terminal device needs to adopt.
The SDPC stores the mapping relation between the identification of the terminal equipment and the default network slice corresponding to the identification of the terminal equipment, and also stores the default network slice and the protocol configuration information corresponding to the default network slice. And the SDPC determines a default network slice corresponding to the SDPC according to the identifier of the terminal equipment in the first network slice access request, and then determines protocol configuration information corresponding to the default network slice according to the default network slice.
S406: the SDPC sends the second protocol configuration information to the slice manager, and the slice manager receives the second protocol configuration information.
S407: and the slice manager sends the second protocol configuration information to the terminal equipment, and the terminal equipment receives the second protocol configuration information.
Specifically, the slice manager may send the second protocol configuration information to the terminal device through the MME and the source network slice.
S408: and the terminal equipment performs protocol configuration according to the second protocol configuration information.
Specifically, similar to S205, the terminal device performs protocol configuration according to the second protocol configuration information, and there are two implementation manners:
the first implementation mode comprises the following steps: the terminal equipment only stores one kind of basic protocol configuration information, and after receiving the second protocol configuration information, the terminal equipment performs configuration on the basis of the basic protocol configuration information so as to ensure that the protocol stack of the terminal equipment can be matched with the default network slice.
The second implementation mode comprises the following steps: the terminal equipment stores a plurality of different protocol configuration information, and after receiving the second protocol configuration information, the terminal equipment selects the protocol configuration information which is the same as the second protocol configuration information to complete the configuration.
S409: and establishing the bearing and connection between the terminal equipment and the source network slice.
Specifically, it may be that the MME triggers establishment of bearers and connections between the terminal device and the source network slice. Or the slice manager triggers the establishment of bearers and connections between the terminal device and the source network slice.
If the MME triggers the establishment, after the MME receives the second protocol configuration information sent by the slice manager, the bearer and the connection are triggered to be established. The MME establishes the load and connection between the terminal equipment and the source network slice by generating load-related identification, QoS and maintenance quantity.
If the slice manager triggers the establishment, the slice manager triggers the establishment of the bearer and the connection after receiving the second protocol configuration information sent by the SDPC. The slice manager establishes bearers and connections between the terminal device and the source network slices by generating bearer-related identities, QoS and maintenance volumes.
Or after S408, the terminal device sends a configuration completion message to the slice manager, and after receiving the configuration completion message, the slice manager triggers establishment of a bearer and a connection between the terminal device and the source network slice.
S410: the terminal equipment sends a network slice processing request to the slice manager, and the slice manager receives the network slice processing request sent by the terminal equipment.
Wherein the network slice processing request includes a target identification. Similar to S202, the target identifier may be an identifier of the target network slice, or may be an identifier of the target traffic type.
Optionally, the network slice processing request may further include an identifier of the terminal device and protocol configuration capability information, for example, "1" indicates that the terminal device supports the protocol configuration, and "0" indicates that the terminal device does not support the protocol configuration.
S411: and the slice manager performs target network slice access authorization corresponding to the target identification on the terminal equipment according to the network slice processing request.
When the protocol configuration capability information of the terminal device is included in the network slice processing request, before S411, the method further includes: the slice manager may also determine whether the terminal device supports protocol reconfiguration from the protocol configuration capability information of the terminal device. S411 is performed only when the terminal device supports the protocol reconfiguration.
S412: the slice manager sends a network slice processing request to the SDPC.
S413: the SDPC determines first protocol configuration information from the network slice processing request.
Specifically, the first protocol configuration information may include protocol stack configuration information corresponding to the target network slice, which is required to be adopted by the terminal device.
In one possible implementation manner, when the target identifier in the network slice processing request is the identifier of the target network slice, the SDPC stores a mapping relationship between the identifier of the target network slice and the protocol configuration information corresponding to the identifier. And the SDPC determines protocol configuration information corresponding to the identification according to the identification of the target network slice in the network slice processing request.
In another possible implementation manner, when the target identifier in the network slice processing request is an identifier of a target service type, the SDPC stores a mapping relationship between the identifier of the target service type and an identifier of a target network slice corresponding to the identifier of the target service type, and the identifier of the target network slice and protocol configuration information corresponding to the identifier. And the SDPC determines the identifier of the target network slice corresponding to the identifier of the target service type according to the identifier of the target service type in the network slice processing request, and then determines the protocol configuration information corresponding to the identifier according to the identifier of the target network slice.
S414: the SDPC sends first protocol configuration information to the slice manager, which receives the first protocol configuration information.
S415: the slice manager sends the first protocol configuration information to the terminal equipment, and the terminal equipment receives the first protocol configuration information.
S416: and the terminal equipment performs protocol configuration according to the first protocol configuration information.
Specifically, the first implementation manner: the terminal equipment only stores one kind of basic protocol configuration information, and after receiving the first protocol configuration information, the terminal equipment performs configuration on the basis of the basic protocol configuration information so as to ensure that the protocol stack of the terminal equipment can be matched with the target network slice.
The second implementation mode comprises the following steps: the terminal equipment stores a plurality of different protocol configuration information, and after receiving the first protocol configuration information, the terminal equipment selects the protocol configuration information which is the same as the first protocol configuration information to complete configuration.
S417: and establishing bearing and connection between the terminal equipment and the target network slice.
The implementation principle is similar to S409, and is not described herein again.
Optionally, when the processing request type corresponding to the identifier of the processing request type is a network slice switching request, then:
s418: and the slice manager removes the load bearing and connection between the terminal equipment and the source network slice.
Optionally, S417 and S418 have a timing relationship, that is, the bearer and the connection between the terminal device and the target network slice are established first, and then the bearer between the terminal device and the source network slice is removed. This ensures that the service on the terminal device is not interrupted.
The difference between the network slicing method provided by the embodiment of the present invention and the network slicing method shown in fig. 3 is that: the slice manager and the SDPC in the network manager are separately arranged, when the first protocol configuration information is determined, if the slice manager performs target network slice access authorization corresponding to a target identifier on the terminal equipment, the slice manager sends a network slice processing request to the SDPC, the SDPC determines the protocol configuration information according to the network slice processing request, and the slice manager receives the protocol configuration information sent by the SDPC and determines the protocol configuration information as the first protocol configuration information. While the slice manager and the SDPC in the network manager in the embodiment of the present invention provided in fig. 2 and 3 are integrated, the first protocol configuration information can be directly obtained according to the network slice processing request.
In the network slice processing method provided by the embodiment of the invention, the terminal device sends a network slice processing request to the slice manager, the slice manager receives the network slice processing request sent by the terminal device, and the slice manager processes the network slice processing request, performing target network slice access authorization corresponding to a target identifier on a terminal device, sending a network slice processing request to an SDPC (software development processor) by a slice manager, determining first protocol configuration information by the SDPC according to the network slice processing request, sending the first protocol configuration information to the slice manager by the SDPC, receiving the first protocol configuration information by the slice manager, realizing that the first protocol configuration information is determined by the SDPC, authorizing access of the terminal device by the slice manager, determining the first protocol configuration information by the SDPC after the authorization is passed, therefore, the terminal equipment can be switched to the target network slice or simultaneously accessed to the target network slice with high efficiency.
Fig. 5 is a schematic structural diagram of a first embodiment of a network manager according to the present invention. As shown in fig. 5, the network manager 50 according to an embodiment of the present invention includes:
a transceiver 501. A memory 502 for storing instructions. A processor 503, coupled to the memory 502 and the transceiver 501, respectively, for executing instructions, such that when the instructions are executed, the following steps are performed:
a network slice processing request sent by a terminal device is received through the transceiver 501. The network slice processing request comprises a target identifier, and the terminal equipment has access to the source network slice. And according to the network slice processing request, performing target network slice access authorization corresponding to the target identifier on the terminal equipment, and acquiring first protocol configuration information corresponding to the target network slice. First protocol configuration information is sent to the terminal device through the transceiver 501, and the first protocol configuration information is used for instructing the terminal device to perform protocol configuration according to the first protocol configuration information to access the target network slice.
Optionally, the target identifier is an identifier of the target network slice. The network slice processing request further comprises an identification of the terminal device. In terms of performing target network slice access authorization corresponding to the target identifier for the terminal device according to the network slice processing request, the processor 503 is configured to:
and acquiring subscription information corresponding to the identifier of the terminal equipment from the HSS or the PCRF according to the identifier of the terminal equipment. And if the terminal equipment can be accessed into the target network slice according to the subscription information and the identification of the target network slice, performing target network slice access authorization corresponding to the identification of the target network slice on the terminal equipment.
Optionally, the target identifier is an identifier of a target service type, and the network slice processing request further includes an identifier of the terminal device. In terms of performing target network slice access authorization corresponding to the target identifier for the terminal device according to the network slice processing request, the processor 503 is configured to:
and acquiring subscription information corresponding to the identifier of the terminal equipment from the HSS or the PCRF according to the identifier of the terminal equipment. And if the terminal equipment can be accessed into the target network slice according to the subscription information and the identification of the target service type, performing target network slice access authorization corresponding to the identification of the target service type on the terminal equipment.
Optionally, the network slice processing request further includes protocol configuration capability information of the terminal device. Before performing target network slice access authorization corresponding to the target identifier on the terminal device according to the network slice processing request, the processor 503 is further configured to:
and if the terminal equipment supports protocol reconfiguration according to the protocol configuration capability information of the terminal equipment, determining to execute the operation of performing target network slice access authorization corresponding to the target identifier on the terminal equipment according to the network slice processing request.
Optionally, the source network slice is a default network slice. Before receiving, through the transceiver 501, a network slice processing request sent by a terminal device, the processor 503 is further configured to:
a first network slice access request sent by a terminal device is received through transceiver 501. Wherein the first network slice access request comprises an identification of the terminal device. And acquiring a default network slice corresponding to the identifier of the terminal equipment according to the first network slice access request, and performing default network slice access authorization on the terminal equipment. Second protocol configuration information corresponding to the default network slice is obtained. And sending second protocol configuration information to the terminal device through the transceiver 501, where the second protocol configuration information is used to instruct the terminal device to perform protocol configuration according to the second protocol configuration information to access the default network slice.
Optionally, the source network slice is a to-be-accessed network slice. Before receiving, through the transceiver 501, a network slice processing request sent by a terminal device, the processor 503 is further configured to:
a second network slice access request sent by the terminal device is received through transceiver 501. And the second network slice access request comprises the identifier to be accessed. And according to the second network slice access request, performing access authorization on the network slice to be accessed corresponding to the identifier to be accessed to the terminal equipment, and acquiring third protocol configuration information corresponding to the network slice to be accessed. And sending third protocol configuration information to the terminal device through the transceiver 501, where the third protocol configuration information is used to instruct the terminal device to perform protocol configuration according to the third protocol configuration information to access the to-be-accessed network slice.
Optionally, the identifier to be accessed is an identifier of a network slice to be accessed. The second network slice access request further comprises an identification of the terminal device. In terms of performing to-be-accessed network slice access authorization corresponding to the to-be-accessed identifier on the terminal device according to the second network slice access request, the processor 503 is configured to:
and acquiring subscription information corresponding to the identifier of the terminal equipment from the HSS or the PCRF according to the identifier of the terminal equipment. And if the terminal equipment can be accessed into the network slice to be accessed according to the subscription information and the identifier of the network slice to be accessed, performing access authorization on the network slice to be accessed corresponding to the identifier of the network slice to be accessed on the terminal equipment.
Optionally, the processor 503 is further configured to:
and if the terminal equipment cannot be accessed into the network slice to be accessed according to the subscription information and the identifier of the network slice to be accessed, acquiring a default network slice corresponding to the identifier of the terminal equipment, and performing default network slice access authorization on the terminal equipment. And acquiring fourth protocol configuration information corresponding to the default network slice. And sending fourth protocol configuration information to the terminal device through the transceiver 501, where the fourth protocol configuration information is used to instruct the terminal device to perform protocol configuration according to the fourth protocol configuration information to access the default network slice.
Optionally, the network slice processing request further includes an identifier of a type of the processing request. If the processing request type corresponding to the identifier of the processing request type is a network slice switching request, the processor 503 is further configured to:
and removing the bearing and connection between the terminal equipment and the network slice to be accessed.
The network manager provided in this embodiment is used to execute the operations executed by the network manager in the method embodiments shown in fig. 2 to fig. 4, and the technical principle and the technical effect are similar, which are not described herein again.
Fig. 6 is a schematic structural diagram of a first terminal device according to an embodiment of the present invention. As shown in fig. 6, a terminal device 60 provided in the embodiment of the present invention includes:
a transceiver 601. A memory 602 to store instructions. The processor 603, coupled to the memory 602 and the transceiver 601, respectively, is configured to execute the instructions, so as to perform the following steps when the instructions are executed:
and accessing the source network slice. A network slice processing request is sent to the network manager through the transceiver 601. Wherein the network slice processing request includes a target identification. The network slice processing request is used for indicating the network manager to perform target network slice access authorization corresponding to the target identification on the terminal equipment according to the network slice processing request, and acquiring first protocol configuration information corresponding to the target network slice. The first protocol configuration information transmitted by the network manager is received through the transceiver 601. And carrying out protocol configuration according to the first protocol configuration information to access the target network slice.
Optionally, the target identifier is an identifier of the target network slice. The network slice processing request further comprises an identification of the terminal device. And the network slice processing request is used for indicating the network manager to acquire subscription information corresponding to the identifier of the terminal equipment from the HSS or the PCRF according to the identifier of the terminal equipment, and if the network manager determines that the terminal equipment can be accessed into the target network slice according to the subscription information and the identifier of the target network slice, performing target network slice access authorization corresponding to the identifier of the target network slice on the terminal equipment.
Optionally, the target identifier is an identifier of a target service type. The network slice processing request further comprises an identification of the terminal device. And the network slice processing request is used for indicating the network manager to acquire subscription information corresponding to the identifier of the terminal equipment from the HSS or the PCRF according to the identifier of the terminal equipment, and if the network manager determines that the terminal equipment can be accessed into the target network slice according to the subscription information and the identifier of the target service type, performing target network slice access authorization corresponding to the identifier of the target service type on the terminal equipment.
Optionally, the network slice processing request further includes protocol configuration capability information of the terminal device. And the protocol configuration capability information is used for indicating that if the network manager determines that the terminal equipment supports protocol reconfiguration according to the protocol configuration capability information of the terminal equipment, the network manager determines to execute the operation of performing target network slice access authorization corresponding to the target identifier on the terminal equipment according to the network slice processing request.
Optionally, the source network slice is a default network slice. In terms of access source network slicing, the processor 603 is configured to:
a first network slice access request is sent to the network manager through transceiver 601. Wherein the first network slice access request comprises an identification of the terminal device. The first network slice access request is used for indicating the network manager to acquire a default network slice corresponding to the identifier of the terminal device according to the first network slice access request, perform default network slice access authorization on the terminal device, and acquire second protocol configuration information corresponding to the default network slice. The second protocol configuration information transmitted by the network manager is received through the transceiver 601. And carrying out protocol configuration according to the second protocol configuration information to access the default network slice.
Optionally, the source network slice is a to-be-accessed network slice. In terms of access source network slicing, the processor 603 is configured to:
a second network slice access request is sent to the network manager through transceiver 601. And the second network slice access request comprises the identifier to be accessed. And the second network slice access request is used for indicating the network manager to perform to-be-accessed network slice access authorization corresponding to the to-be-accessed identifier on the terminal equipment according to the second network slice access request, and acquiring third protocol configuration information corresponding to the to-be-accessed network slice. The third protocol configuration information transmitted by the network manager is received through the transceiver 601. And carrying out protocol configuration according to the third protocol configuration information to access the network slice to be accessed.
Optionally, the identifier to be accessed is an identifier of a network slice to be accessed. The second network slice access request further comprises an identification of the terminal device. And the second network slice access request is used for indicating the network manager to acquire subscription information corresponding to the identifier of the terminal equipment from the HSS or the PCRF according to the identifier of the terminal equipment, and if the network manager determines that the terminal equipment can be accessed into the network slice to be accessed according to the subscription information and the identifier of the network slice to be accessed, the network manager performs network slice to be accessed access authorization corresponding to the identifier of the network slice to be accessed on the terminal equipment.
Optionally, if the network manager determines that the terminal device cannot access the network slice to be accessed according to the subscription information and the identifier of the network slice to be accessed, the processor 603 is further configured to:
the fourth protocol configuration information transmitted by the network manager is received through the transceiver 601. The fourth protocol configuration information is protocol configuration information corresponding to the default network slice, which is acquired by the network manager. And the default network slice is the network slice which is acquired by the slice manager and corresponds to the identifier of the terminal equipment. And carrying out protocol configuration according to the fourth protocol configuration information to access the default network slice.
The terminal device provided in this embodiment is used for executing the operations executed by the terminal device in the method embodiments shown in fig. 2 to fig. 4, and the technical principle and the technical effect are similar, which are not described herein again.
Fig. 7 is a schematic structural diagram of a second embodiment of a network manager according to the present invention. As shown in fig. 7, the network manager 70 provided in the present embodiment includes:
a receiving module 701, configured to receive a network slice processing request sent by a terminal device. The network slice processing request comprises a target identifier, and the terminal equipment has access to the source network slice.
The authorization module 702 is configured to perform target network slice access authorization corresponding to the target identifier for the terminal device according to the network slice processing request, and acquire first protocol configuration information corresponding to the target network slice.
A sending module 703 is configured to send first protocol configuration information to the terminal device, where the first protocol configuration information is used to instruct the terminal device to perform protocol configuration according to the first protocol configuration information to access the target network slice.
Specifically, the target identifier is an identifier of the target network slice, and the network slice processing request further includes an identifier of the terminal device. The authorization module 702 is specifically configured to:
and acquiring subscription information corresponding to the identifier of the terminal equipment from the HSS or the PCRF according to the identifier of the terminal equipment. And if the terminal equipment can be accessed into the target network slice according to the subscription information and the identification of the target network slice, performing target network slice access authorization corresponding to the identification of the target network slice on the terminal equipment.
Specifically, the target identifier is an identifier of a target service type, and the network slice processing request further includes an identifier of the terminal device. The authorization module 702 is specifically configured to:
and acquiring subscription information corresponding to the identifier of the terminal equipment from the HSS or the PCRF according to the identifier of the terminal equipment. And if the terminal equipment can be accessed into the target network slice according to the subscription information and the identification of the target service type, performing target network slice access authorization corresponding to the identification of the target service type on the terminal equipment.
Optionally, the network slice processing request further includes protocol configuration capability information of the terminal device. The network manager further comprises: and the determining module is used for determining to execute the operation of performing target network slice access authorization corresponding to the target identifier on the terminal equipment according to the network slice processing request when the terminal equipment is determined to support protocol reconfiguration according to the protocol configuration capability information of the terminal equipment.
Specifically, the source network slice is a default network slice. The receiving module 701 is further configured to receive a first network slice access request sent by the terminal device. Wherein the first network slice access request comprises an identification of the terminal device. The authorization module 702 is further configured to obtain a default network slice corresponding to the identifier of the terminal device according to the first network slice access request, and perform default network slice access authorization on the terminal device.
The network manager further comprises: and the acquisition module is used for acquiring second protocol configuration information corresponding to the default network slice.
The sending module 703 is further configured to send the second protocol configuration information to the terminal device. The second protocol configuration information is used for instructing the terminal device to perform protocol configuration according to the second protocol configuration information so as to access the default network slice.
Specifically, the source network slice is a to-be-accessed network slice. The receiving module 701 is further configured to receive a second network slice access request sent by the terminal device. And the second network slice access request comprises the identifier to be accessed. The authorization module 702 is further configured to perform, according to the second network slice access request, to-be-accessed network slice access authorization corresponding to the to-be-accessed identifier for the terminal device, and acquire third protocol configuration information corresponding to the to-be-accessed network slice. The sending module 703 is further configured to send third protocol configuration information to the terminal device, where the third protocol configuration information is used to instruct the terminal device to perform protocol configuration according to the third protocol configuration information to access the to-be-accessed network slice.
Optionally, the identifier to be accessed is an identifier of a network slice to be accessed, and the second network slice access request further includes an identifier of the terminal device. The authorization module 702 is specifically configured to:
and acquiring subscription information corresponding to the identifier of the terminal equipment from the HSS or the PCRF according to the identifier of the terminal equipment. And if the terminal equipment can be accessed into the network slice to be accessed according to the subscription information and the identifier of the network slice to be accessed, the network manager performs access authorization on the network slice to be accessed corresponding to the identifier of the network slice to be accessed to the terminal equipment.
Optionally, the obtaining module is further configured to, when it is determined that the terminal device cannot access the to-be-accessed network slice according to the subscription information and the identifier of the to-be-accessed network slice, obtain a default network slice corresponding to the identifier of the terminal device, and perform default network slice access authorization on the terminal device. And also for obtaining fourth protocol configuration information corresponding to the default network slice.
The sending module 703 is further configured to send fourth protocol configuration information to the terminal device. The fourth protocol configuration information is used for instructing the terminal device to perform protocol configuration according to the fourth protocol configuration information so as to access the default network slice.
Optionally, the network slice processing request further includes an identifier of a type of the processing request. If the processing request type corresponding to the identifier of the processing request type is a network slice switching request, the network manager further includes:
and the dismantling module is used for dismantling the bearing and the connection between the terminal equipment and the network slice to be accessed.
The network manager provided in this embodiment is used to execute the operations executed by the network manager in the method embodiments shown in fig. 2 to fig. 4, and the technical principle and the technical effect are similar, which are not described herein again.
Fig. 8 is a schematic structural diagram of a second terminal device according to an embodiment of the present invention. As shown in fig. 8, the terminal device 80 provided in the present embodiment includes:
an access module 801, configured to access the source network slice.
A sending module 802, configured to send a network slice processing request to a network manager. The network slice processing request comprises a target identifier, and the network slice processing request is used for instructing a network manager to perform target network slice access authorization corresponding to the target identifier on the terminal equipment according to the network slice processing request and acquiring first protocol configuration information corresponding to the target network slice.
A receiving module 803, configured to receive the first protocol configuration information sent by the network manager.
A configuration module 804, configured to perform protocol configuration according to the first protocol configuration information to access the target network slice.
Specifically, the target identification is an identification of the target network slice. The network slice processing request further comprises an identification of the terminal device. And the network slice processing request is used for indicating the network manager to acquire subscription information corresponding to the identifier of the terminal equipment from the HSS or the PCRF according to the identifier of the terminal equipment, and if the network manager determines that the terminal equipment can be accessed into the target network slice according to the subscription information and the identifier of the target network slice, performing target network slice access authorization corresponding to the identifier of the target network slice on the terminal equipment.
Specifically, the target identifier is an identifier of a target service type. The network slice processing request further comprises an identification of the terminal device. And the network slice processing request is used for indicating the network manager to acquire subscription information corresponding to the identifier of the terminal equipment from the HSS or the PCRF according to the identifier of the terminal equipment, and if the network manager determines that the terminal equipment can be accessed into the target network slice according to the subscription information and the identifier of the target service type, performing target network slice access authorization corresponding to the identifier of the target service type on the terminal equipment.
Optionally, the network slice processing request further includes protocol configuration capability information of the terminal device. And the protocol configuration capability information is used for indicating that if the network manager determines that the terminal equipment supports protocol reconfiguration according to the protocol configuration capability information of the terminal equipment, the network manager determines to execute the operation of performing target network slice access authorization corresponding to the target identifier on the terminal equipment according to the network slice processing request.
Specifically, the source network slice is a default network slice. The access module 801 is specifically configured to:
a first network slice access request is sent to a network manager. Wherein the first network slice access request comprises an identification of the terminal device. The first network slice access request is used for indicating the network manager to acquire a default network slice corresponding to the identifier of the terminal device according to the first network slice access request, perform default network slice access authorization on the terminal device, and acquire second protocol configuration information corresponding to the default network slice. And receiving second protocol configuration information sent by the network manager. And carrying out protocol configuration according to the second protocol configuration information to access the default network slice.
Specifically, the source network slice is a to-be-accessed network slice. The access module 801 is specifically configured to:
and sending a second network slice access request to the network manager. And the second network slice access request comprises the identifier to be accessed. And the second network slice access request is used for indicating the network manager to perform to-be-accessed network slice access authorization corresponding to the to-be-accessed identifier on the terminal equipment according to the second network slice access request, and acquiring third protocol configuration information corresponding to the to-be-accessed network slice. And receiving third protocol configuration information sent by the network manager. And carrying out protocol configuration according to the third protocol configuration information to access the network slice to be accessed.
Optionally, the identifier to be accessed is an identifier of a network slice to be accessed, and the second network slice access request further includes an identifier of the terminal device. And the second network slice access request is used for indicating the network manager to acquire subscription information corresponding to the identifier of the terminal equipment from the HSS or the PCRF according to the identifier of the terminal equipment, and if the network manager determines that the terminal equipment can be accessed into the network slice to be accessed according to the subscription information and the identifier of the network slice to be accessed, the network manager performs network slice to be accessed access authorization corresponding to the identifier of the network slice to be accessed on the terminal equipment.
Optionally, when the network manager determines that the terminal device cannot access the network slice to be accessed according to the subscription information and the identifier of the network slice to be accessed, the access module is further configured to receive fourth protocol configuration information sent by the network manager. The fourth protocol configuration information is protocol configuration information corresponding to the default network slice, which is acquired by the network manager. And the default network slice is the network slice which is acquired by the slice manager and corresponds to the identifier of the terminal equipment. The access module 801 is configured to perform protocol configuration according to the fourth protocol configuration information to access the default network slice.
The terminal device provided in this embodiment is used for executing the operations executed by the terminal device in the method embodiments shown in fig. 2 to fig. 4, and the technical principle and the technical effect are similar, which are not described herein again.
Those of ordinary skill in the art will understand that: all or a portion of the steps of implementing the above-described method embodiments may be performed by hardware associated with program instructions. The program may be stored in a computer-readable storage medium. When executed, the program performs steps comprising the method embodiments described above; and the aforementioned storage medium includes: various media that can store program codes, such as ROM, RAM, magnetic or optical disks.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.

Claims (18)

1. A method for network slice processing, comprising:
a network manager receives a network slice processing request sent by terminal equipment; the network slice processing request comprises an identifier of a target network slice and an identifier of the terminal equipment, and the terminal equipment has access to a source network slice;
the network manager performs target network slice access authorization corresponding to the target identifier on the terminal equipment according to the network slice processing request, and acquires first protocol configuration information corresponding to the target network slice;
the network manager sends the first protocol configuration information to the terminal equipment, wherein the first protocol configuration information is used for indicating the terminal equipment to carry out protocol configuration according to the first protocol configuration information so as to access the target network slice;
the network manager performs target network slice access authorization corresponding to the target identifier on the terminal device according to the network slice processing request, and the method includes:
the network manager acquires subscription information corresponding to the identifier of the terminal equipment from a Home Subscriber Server (HSS) or a Policy and Charging Rule Function (PCRF) unit according to the identifier of the terminal equipment;
and if the network manager determines that the terminal equipment can access the target network slice according to the subscription information and the identifier of the target network slice, the network manager performs target network slice access authorization corresponding to the identifier of the target network slice on the terminal equipment.
2. The method of claim 1, wherein the network slice processing request further comprises protocol configuration capability information of the terminal device;
before the network manager performs target network slice access authorization corresponding to the target identifier on the terminal device according to the network slice processing request, the method further includes:
and if the network manager determines that the terminal equipment supports protocol reconfiguration according to the protocol configuration capability information of the terminal equipment, the network manager determines to execute the operation of performing target network slice access authorization corresponding to the target identifier on the terminal equipment according to the network slice processing request.
3. The method of claim 1, wherein the source network slice is a default network slice;
before the network manager receives a network slice processing request sent by a terminal device, the method further includes:
the network manager receives a first network slice access request sent by the terminal equipment; wherein the first network slice access request comprises an identification of the terminal device;
the network manager acquires a default network slice corresponding to the identifier of the terminal equipment according to the first network slice access request, and performs access authorization on the default network slice on the terminal equipment;
the network manager acquires second protocol configuration information corresponding to the default network slice;
and the network manager sends the second protocol configuration information to the terminal equipment, wherein the second protocol configuration information is used for indicating the terminal equipment to carry out protocol configuration according to the second protocol configuration information so as to access the default network slice.
4. The method of claim 1, wherein the source network slice is a to-be-accessed network slice;
before the network manager receives the network slice processing request sent by the terminal device, the method further includes:
the network manager receives a second network slice access request sent by the terminal equipment; the second network slice access request comprises an identifier to be accessed;
the network manager performs access authorization on the network slice to be accessed corresponding to the identifier to be accessed to the terminal equipment according to the second network slice access request, and acquires third protocol configuration information corresponding to the network slice to be accessed;
and the network manager sends the third protocol configuration information to the terminal equipment, wherein the third protocol configuration information is used for indicating the terminal equipment to carry out protocol configuration according to the third protocol configuration information so as to access the network slice to be accessed.
5. The method of claim 1, wherein the network slice processing request further comprises an identification of a type of processing request;
if the processing request type corresponding to the identifier of the processing request type is a network slice switching request, the method further comprises:
and the network manager removes the load bearing and connection between the terminal equipment and the source network slice.
6. A method for network slice processing, comprising:
terminal equipment accesses a source network slice;
the terminal equipment sends a network slice processing request to a network manager; the network slice processing request comprises a target network slice identifier and a terminal device identifier, and is used for indicating the network manager to perform target network slice access authorization corresponding to the target identifier on the terminal device according to the network slice processing request and acquiring first protocol configuration information corresponding to the target network slice;
the terminal equipment receives first protocol configuration information sent by the network manager;
the terminal equipment carries out protocol configuration according to the first protocol configuration information so as to access the target network slice;
and the network slice processing request is used for indicating the network manager to acquire subscription information corresponding to the identifier of the terminal equipment from a Home Subscriber Server (HSS) or a Policy and Charging Rule Function (PCRF) unit according to the identifier of the terminal equipment, and if the network manager determines that the terminal equipment can be accessed into the target network slice according to the subscription information and the identifier of the target network slice, performing target network slice access authorization corresponding to the identifier of the target network slice on the terminal equipment.
7. The method according to claim 6, wherein the network slice processing request further includes protocol configuration capability information of the terminal device, and the protocol configuration capability information is used to indicate that, if the network manager determines that the terminal device supports protocol reconfiguration according to the protocol configuration capability information of the terminal device, the network manager determines to execute an operation of performing, according to the network slice processing request, target network slice access authorization corresponding to the target identifier on the terminal device.
8. The method of claim 6, wherein the source network slice is a default network slice;
the terminal device accesses the source network slice, including:
the terminal device sends a first network slice access request to the network manager, wherein the first network slice access request comprises an identifier of the terminal device, and the first network slice access request is used for indicating the network manager to acquire a default network slice corresponding to the identifier of the terminal device according to the first network slice access request, and to perform access authorization on the default network slice for the terminal device to acquire second protocol configuration information corresponding to the default network slice;
the terminal equipment receives second protocol configuration information sent by the network manager;
and the terminal equipment carries out protocol configuration according to the second protocol configuration information so as to access the default network slice.
9. The method of claim 6, wherein the source network slice is a to-be-accessed network slice;
the terminal device accesses the source network slice, including:
the terminal equipment sends a second network slice access request to the network manager, wherein the second network slice access request comprises a to-be-accessed identifier, and the second network slice access request is used for indicating the network manager to perform to-be-accessed network slice access authorization corresponding to the to-be-accessed identifier on the terminal equipment according to the second network slice access request and acquiring third protocol configuration information corresponding to the to-be-accessed network slice;
the terminal equipment receives the third protocol configuration information sent by the network manager;
and the terminal equipment carries out protocol configuration according to the third protocol configuration information so as to access the network slice to be accessed.
10. A network manager, comprising:
a transceiver;
a memory to store instructions;
a processor, coupled to the memory and the transceiver, respectively, for executing the instructions to perform the following steps when executing the instructions:
receiving a network slice processing request sent by terminal equipment through the transceiver; the network slice processing request comprises an identifier of a target network slice and an identifier of the terminal equipment, and the terminal equipment has access to a source network slice;
according to the network slice processing request, performing target network slice access authorization corresponding to the target identifier on the terminal equipment, and acquiring first protocol configuration information corresponding to the target network slice;
sending the first protocol configuration information to the terminal device through the transceiver, wherein the first protocol configuration information is used for instructing the terminal device to perform protocol configuration according to the first protocol configuration information so as to access the target network slice;
in terms of performing, according to the network slice processing request, target network slice access authorization corresponding to the target identifier on the terminal device, the processor is configured to:
acquiring subscription information corresponding to the identifier of the terminal equipment from a Home Subscriber Server (HSS) or a policy and charging rule functional unit (PCRF) according to the identifier of the terminal equipment;
and if the terminal equipment can be accessed to the target network slice according to the subscription information and the identification of the target network slice, performing target network slice access authorization corresponding to the identification of the target network slice on the terminal equipment.
11. The network manager according to claim 10, wherein the network slice processing request further includes protocol configuration capability information of the terminal device;
before performing, according to the network slice processing request, target network slice access authorization corresponding to the target identifier on the terminal device, the processor is further configured to:
and if the terminal equipment supports protocol reconfiguration according to the protocol configuration capability information of the terminal equipment, determining to execute the operation of performing target network slice access authorization corresponding to the target identifier on the terminal equipment according to the network slice processing request.
12. The network manager of claim 10, wherein the source network slice is a default network slice;
before receiving, by the transceiver, a network slice processing request transmitted by a terminal device, the processor is further configured to:
receiving a first network slice access request sent by the terminal equipment through the transceiver; wherein the first network slice access request comprises an identification of the terminal device;
acquiring a default network slice corresponding to the identifier of the terminal equipment according to the first network slice access request, and performing the default network slice access authorization on the terminal equipment;
acquiring second protocol configuration information corresponding to the default network slice;
and sending the second protocol configuration information to the terminal equipment through the transceiver, wherein the second protocol configuration information is used for indicating the terminal equipment to carry out protocol configuration according to the second protocol configuration information so as to access the default network slice.
13. The network manager of claim 10, wherein the source network slice is a to-be-accessed network slice;
before receiving, by the transceiver, a network slice processing request transmitted by a terminal device, the processor is further configured to:
receiving a second network slice access request sent by the terminal equipment through the transceiver; the second network slice access request comprises an identifier to be accessed;
according to the second network slice access request, performing access authorization on the network slice to be accessed corresponding to the identifier to be accessed on the terminal equipment, and acquiring third protocol configuration information corresponding to the network slice to be accessed;
and sending the third protocol configuration information to the terminal equipment through the transceiver, wherein the third protocol configuration information is used for indicating the terminal equipment to carry out protocol configuration according to the third protocol configuration information so as to access the network slice to be accessed.
14. The network manager of claim 10, wherein the network slice processing request further includes an identification of a type of processing request;
if the processing request type corresponding to the identifier of the processing request type is a network slice switching request, the processor is further configured to:
and removing the bearing and the connection between the terminal equipment and the source network slice.
15. A terminal device, comprising:
a transceiver;
a memory to store instructions;
a processor, coupled to the memory and the transceiver, respectively, for executing the instructions to perform the following steps when executing the instructions:
accessing a source network slice;
sending, by the transceiver, a network slice processing request to a network manager; the network slice processing request comprises a target network slice identifier and a terminal device identifier, and is used for indicating the network manager to perform target network slice access authorization corresponding to the target identifier on the terminal device according to the network slice processing request and acquiring first protocol configuration information corresponding to the target network slice;
receiving, by the transceiver, first protocol configuration information sent by the network manager;
performing protocol configuration according to the first protocol configuration information to access the target network slice;
and the network slice processing request is used for indicating the network manager to acquire subscription information corresponding to the identifier of the terminal equipment from a Home Subscriber Server (HSS) or a Policy and Charging Rule Function (PCRF) unit according to the identifier of the terminal equipment, and if the network manager determines that the terminal equipment can be accessed into the target network slice according to the subscription information and the identifier of the target network slice, performing target network slice access authorization corresponding to the identifier of the target network slice on the terminal equipment.
16. The terminal device according to claim 15, wherein the network slice processing request further includes protocol configuration capability information of the terminal device, and the protocol configuration capability information is used to indicate that, if the network manager determines that the terminal device supports protocol reconfiguration according to the protocol configuration capability information of the terminal device, the network manager determines to execute an operation of performing, according to the network slice processing request, target network slice access authorization corresponding to the target identifier on the terminal device.
17. The terminal device of claim 15, wherein the source network slice is a default network slice;
in an aspect of access source network slicing, the processor is to:
sending a first network slice access request to the network manager through the transceiver, wherein the first network slice access request includes an identifier of the terminal device, and the first network slice access request is used for instructing the network manager to acquire a default network slice corresponding to the identifier of the terminal device according to the first network slice access request, and perform access authorization on the default network slice for the terminal device to acquire second protocol configuration information corresponding to the default network slice;
receiving, by the transceiver, second protocol configuration information sent by the network manager;
and carrying out protocol configuration according to the second protocol configuration information so as to access the default network slice.
18. The terminal device of claim 15, wherein the source network slice is a to-be-accessed network slice;
in an aspect of access source network slicing, the processor is to:
sending a second network slice access request to the network manager through the transceiver, wherein the second network slice access request comprises a to-be-accessed identifier, and the second network slice access request is used for indicating the network manager to perform to-be-accessed network slice access authorization corresponding to the to-be-accessed identifier on the terminal equipment according to the second network slice access request, and acquiring third protocol configuration information corresponding to the to-be-accessed network slice;
receiving, by the transceiver, the third protocol configuration information sent by the network manager;
and carrying out protocol configuration according to the third protocol configuration information so as to access the network slice to be accessed.
CN201610267844.1A 2016-04-27 2016-04-27 Network slice processing method and device Active CN107318113B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201610267844.1A CN107318113B (en) 2016-04-27 2016-04-27 Network slice processing method and device
PCT/CN2017/077376 WO2017185909A1 (en) 2016-04-27 2017-03-20 Network slice processing method and apparatus

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610267844.1A CN107318113B (en) 2016-04-27 2016-04-27 Network slice processing method and device

Publications (2)

Publication Number Publication Date
CN107318113A CN107318113A (en) 2017-11-03
CN107318113B true CN107318113B (en) 2021-09-21

Family

ID=60161831

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610267844.1A Active CN107318113B (en) 2016-04-27 2016-04-27 Network slice processing method and device

Country Status (2)

Country Link
CN (1) CN107318113B (en)
WO (1) WO2017185909A1 (en)

Families Citing this family (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109768875B (en) * 2017-11-10 2021-10-15 华为技术有限公司 Network slice policy management method, device, equipment and system
CN109787796B (en) * 2017-11-13 2022-08-09 华为技术有限公司 Method and device for authorizing network function service
EP3713308B1 (en) * 2017-11-20 2021-10-06 Guangdong Oppo Mobile Telecommunications Corp., Ltd. Network slice configuration method and device and computer storage medium
WO2019105552A1 (en) * 2017-11-30 2019-06-06 Telefonaktiebolaget Lm Ericsson (Publ) Core network allocation handling
CN109996307B (en) * 2017-12-29 2021-06-01 华为技术有限公司 Data routing method and terminal
CN108770016B (en) * 2018-06-04 2019-07-05 北京邮电大学 5G end to end network slice generation method and device based on template
US10917800B2 (en) 2018-06-22 2021-02-09 Huawei Technologies Co., Ltd. Data analytics management (DAM), configuration specification and procedures, provisioning, and service based architecture (SBA)
WO2020035000A1 (en) * 2018-08-14 2020-02-20 华为技术有限公司 Method for acquiring network configuration information, and related device
CN111148165B (en) * 2018-11-06 2021-06-01 华为技术有限公司 Method and device for processing user access in network slice
CN111436029B (en) * 2019-01-11 2022-03-29 华为技术有限公司 Method, system and related equipment for carrying out charging processing on network slice example
WO2020156488A1 (en) * 2019-01-31 2020-08-06 华为技术有限公司 Communication method, apparatus, and system
CN113301586B (en) * 2020-02-24 2023-04-18 华为技术有限公司 Network selection method and electronic equipment
CN112600693B (en) * 2020-12-02 2023-11-07 腾讯科技(深圳)有限公司 Service request processing method, system, electronic equipment and computer storage medium
CN114679720A (en) * 2022-03-28 2022-06-28 Oppo广东移动通信有限公司 Network slice requesting method and device, electronic equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103236945A (en) * 2013-04-08 2013-08-07 北京天地互连信息技术有限公司 OpenFlow-based FlowVisor network system
CN103650437A (en) * 2013-06-28 2014-03-19 华为技术有限公司 Anycast service registration, method and apparatus, switching equipment and systems
CN104639653A (en) * 2015-03-05 2015-05-20 北京掌中经纬技术有限公司 Self-adaptive method and system based on cloud architecture
WO2015117129A2 (en) * 2014-02-03 2015-08-06 The United States Of America, As Represented By The Secretary, Department Of Health And Human Services System and apparatus for real-time processing of medical imaging raw data using cloud computing
CN105391568A (en) * 2014-09-05 2016-03-09 华为技术有限公司 SDN (Software Defined Network) implementation method, device and system

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102123477B (en) * 2010-01-08 2015-06-10 中兴通讯股份有限公司 Access realization method and device of M2M (Machine to Machine) core network
EP2905926B1 (en) * 2012-10-05 2017-11-22 Nec Corporation Communication system, virtual network management apparatus, virtual network management method and program
US9756361B2 (en) * 2014-07-25 2017-09-05 Verizon Patent And Licensing Inc. On-demand load balancer and virtual live slicer server farm for program ingest
CN104159240B (en) * 2014-08-15 2018-12-25 宇龙计算机通信科技(深圳)有限公司 Communication means and terminal based on terminal
CN105516312B (en) * 2015-12-09 2019-02-22 重庆邮电大学 A kind of software defined network load balancing apparatus and method
CN106060900B (en) * 2016-05-13 2019-12-10 宇龙计算机通信科技(深圳)有限公司 Access control method and device for network slice, terminal cell and SDN controller
CN106412905A (en) * 2016-12-12 2017-02-15 中国联合网络通信集团有限公司 Network slice selection method, UE, MME and system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103236945A (en) * 2013-04-08 2013-08-07 北京天地互连信息技术有限公司 OpenFlow-based FlowVisor network system
CN103650437A (en) * 2013-06-28 2014-03-19 华为技术有限公司 Anycast service registration, method and apparatus, switching equipment and systems
WO2015117129A2 (en) * 2014-02-03 2015-08-06 The United States Of America, As Represented By The Secretary, Department Of Health And Human Services System and apparatus for real-time processing of medical imaging raw data using cloud computing
CN105391568A (en) * 2014-09-05 2016-03-09 华为技术有限公司 SDN (Software Defined Network) implementation method, device and system
CN104639653A (en) * 2015-03-05 2015-05-20 北京掌中经纬技术有限公司 Self-adaptive method and system based on cloud architecture

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"New solution for Key Issue 1: Network slice selection based on rules provided by the network";Orange;《3GPP TSG SA WG2 Meeting #114,S2-161453》;20160415 *

Also Published As

Publication number Publication date
WO2017185909A1 (en) 2017-11-02
CN107318113A (en) 2017-11-03

Similar Documents

Publication Publication Date Title
CN107318113B (en) Network slice processing method and device
CN110035461B (en) Communication method, access network equipment and terminal equipment
CN108713327B (en) Network node for enabling communication in a communication network and method performed in a network node
CN110167082B (en) Network switching method, device and system, and switching determination method and device
US9955339B2 (en) Method, apparatus, and system for online subscription data configuration
CN110278619B (en) PDU session establishment method and device
CN105379354B (en) MME reselection method and MME
TWI629908B (en) Method, device and base station for switching terminal equipment to target cell
WO2013082984A1 (en) Method for attaching e-utran and mobility management entity
JP2019525629A (en) QoS parameter processing method and device in switching scenario
US10568001B2 (en) Method and apparatus for controlling traffic offloading in a communication system
KR20220051848A (en) Mode switching method of broadcast service and related devices
KR102006839B1 (en) MTC service management using NFV
CN109246772B (en) Data transmission method, related equipment and system
CN105338614A (en) Network registration method and device
WO2018135992A1 (en) Systems and methods of mapping a network slice
CN112154708A (en) User device, control device, and communication control method
CN108924926B (en) Communication method and communication device
CN107124744B (en) Network switching method and wireless access point
KR20210018831A (en) Method and apparatus for acquiring terminal capabilities, computer storage medium
CN103813395A (en) Method for moving seamlessly among different networks by terminal user, and wireless local area network optimization gateway (WOG)
CN101521921B (en) Base station switch method
CN111132256B (en) User terminal access method, initial mobile management entity and base station
WO2019139141A1 (en) User equipment
CN111213409B (en) Method for enabling a wireless communication device to access a plurality of communication networks

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant