CN115996444A - Method, device, equipment and medium for controlling access of diffuse access user to visited network - Google Patents

Method, device, equipment and medium for controlling access of diffuse access user to visited network Download PDF

Info

Publication number
CN115996444A
CN115996444A CN202111200849.XA CN202111200849A CN115996444A CN 115996444 A CN115996444 A CN 115996444A CN 202111200849 A CN202111200849 A CN 202111200849A CN 115996444 A CN115996444 A CN 115996444A
Authority
CN
China
Prior art keywords
network
slice
access
control
user terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111200849.XA
Other languages
Chinese (zh)
Inventor
聂衡
夏旭
刑燕霞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Telecom Corp Ltd
Original Assignee
China Telecom Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Telecom Corp Ltd filed Critical China Telecom Corp Ltd
Priority to CN202111200849.XA priority Critical patent/CN115996444A/en
Publication of CN115996444A publication Critical patent/CN115996444A/en
Pending legal-status Critical Current

Links

Images

Abstract

The disclosure provides a method, a device, equipment and a medium for controlling a diffuse user to access a visited network, wherein the method comprises the following steps: receiving an access request sent by a diffuse-in user terminal, wherein the access request carries slice selection auxiliary information of a home network of the diffuse-in user terminal; determining slice selection auxiliary information of a visiting network which needs to be subjected to admission control corresponding to the slice selection auxiliary information of the home network which needs to be subjected to admission control according to a pre-stored first mapping relation; inquiring the access control function corresponding to the slice selection auxiliary information of the visiting network from the network storage function instance; and initiating admission control to a slice admission control function instance configured with an admission control function, wherein the admission control is used for realizing the use amount control of slice resources of a home network and the use amount control of slice resources of a visiting network. By the embodiment of the disclosure, the access control of the diffuse access user terminal is realized, and the configuration quantity and the data pressure of the visiting network are reduced.

Description

Method, device, equipment and medium for controlling access of diffuse access user to visited network
Technical Field
The present disclosure relates to the field of communications technologies, and in particular, to a method, an apparatus, a device, and a medium for controlling access to a visited network by a roaming user.
Background
Currently, with the development of communication technologies and the continuous increase of demands of users for communication networks, standardization of 5G communication network technologies (also referred to as fifth generation mobile communication technologies) is in progress rapidly. In 5G communication network technology, the logical concept of network slicing is introduced. The operator may pre-configure a Network Slice Selection Policy (NSSP) for the terminal, and it should be noted that the terminal may also be referred to as a User Equipment (UE). The pre-configured NSSP is comprised of one or more rules (rule), each rule associating a third party application to a single network slice selection information (single network slice selection information, S-NSSAI). When the UE needs to use a certain App, the corresponding S-NSSAI is mapped according to the rule of the NSSP, and a protocol data unit (protocol data unit, PDU) session (session) is established in a network slice corresponding to the S-NSSAI.
In the related art, a large number of diffuse-in user terminals may initiate access to the visited network, which may not only generate a large data pressure on the visited network, but also cause the visited network to need to configure a large number of slice selection auxiliary information of the home network.
However, existing 5G communication network technologies do not support access control by the visited network for use of sliced resources by the roaming user.
It should be noted that the information disclosed in the above background section is only for enhancing understanding of the background of the present disclosure and thus may include information that does not constitute prior art known to those of ordinary skill in the art.
Disclosure of Invention
It is an object of the present disclosure to provide a method, apparatus, device and medium for controlling access to a visited network by a roaming user, which overcome, at least to some extent, the problem of lack of admission control to access to a visited network slice by the roaming user due to limitations and disadvantages of the related art.
According to a first aspect of an embodiment of the present disclosure, there is provided a method for controlling access to a visited network by a roaming user terminal, including: receiving an access request sent by the diffuse-in user terminal, wherein the access request carries slice selection auxiliary information of a home network of the diffuse-in user terminal; determining slice selection auxiliary information of the visiting network which needs to be subjected to admission control corresponding to the slice selection auxiliary information of the home network which needs to be subjected to admission control according to a pre-stored first mapping relation; inquiring an access control function corresponding to the slice selection auxiliary information of the visiting network from a network storage function instance; and initiating admission control to a slice admission control function instance configured with slice usage control data, wherein the admission control is used for realizing usage control of slice resources of the home network and usage control of slice resources of the visiting network.
In an exemplary embodiment of the present disclosure, before receiving the access request sent by the diffuse-in user terminal, the method further includes: determining a first mapping relation between slice selection auxiliary information of a home network needing access control and slice selection auxiliary information of a visiting network needing access control; determining a second mapping relation between the slice selection auxiliary information of the home network which does not need to be subjected to access control and the slice selection auxiliary information of the visiting network which does not need to be subjected to access control; and configuring the first mapping relation and/or the second mapping relation to the network slice selection function instance.
In an exemplary embodiment of the present disclosure, the first mapping relationship includes mapping slice selection assistance information of a plurality of home networks requiring admission control to slice selection assistance information of a visited network requiring admission control.
In an exemplary embodiment of the present disclosure, the second mapping relationship includes mapping the slice selection assistance information of the plurality of home networks that do not require admission control to slice selection assistance information of a visited network that does not require admission control.
In an exemplary embodiment of the present disclosure, further comprising: the usage control is determined according to a pre-agreed service level agreement between the home network and the visited network.
In an exemplary embodiment of the present disclosure, the usage control includes control of the number of the flooded user terminals and/or control of the number of PDU sessions.
In an exemplary embodiment of the present disclosure, the network element of the visited network comprises an access and mobility management function instance and/or a session management function instance.
According to a second aspect of an embodiment of the present disclosure, there is provided an apparatus for controlling access to a visited network by a roaming user terminal, including: the receiving module is configured to receive an access request sent by the diffuse-in user terminal, wherein the access request carries slice selection auxiliary information of a home network of the diffuse-in user terminal; the determining module is used for determining the slice selection auxiliary information of the visiting network which needs to be subjected to the access control and corresponds to the slice selection auxiliary information of the home network which needs to be subjected to the access control according to a pre-stored first mapping relation; the inquiring module is used for inquiring the access control function corresponding to the slice selection auxiliary information of the visiting network from the network storage function instance; and the control module is used for initiating admission control to a slice admission control function instance configured with slice usage control data, wherein the admission control is used for realizing the usage control of slice resources of the home network and the usage control of slice resources of the visiting network.
According to a third aspect of the present disclosure, there is provided an electronic device comprising: a memory; and a processor coupled to the memory, the processor configured to perform the method of any of the above based on instructions stored in the memory.
According to a fourth aspect of the present disclosure there is provided a computer readable storage medium having stored thereon a program which when executed by a processor implements a method of controlling access to a visited network by a roaming user terminal as claimed in any one of the above.
According to the embodiment of the disclosure, the slice access control is initiated according to whether the access control is needed by the visiting network slice, the corresponding slice access control function is selected, and based on the slice access control function, a large amount of home network slice data does not need to be configured by the relevant network element of the visiting network. In addition, by executing the admission control for the diffuse-in user terminal to use the slice resources, the number of users using the slice, the number of established sessions and the like can be controlled, so that the network operation pressure is reduced, and the configuration quantity is also reduced.
Further, only mapped visited network slices are registered with the network storage function of the visited network, and home network slices do not need to be registered, so that the influence on the slice admission control function and the network storage function of the visited network is reduced.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the disclosure and together with the description, serve to explain the principles of the disclosure. It will be apparent to those of ordinary skill in the art that the drawings in the following description are merely examples of the disclosure and that other drawings may be derived from them without undue effort.
Fig. 1 is a flow chart of a method of controlling access to a visited network by a roaming user terminal in one exemplary embodiment of the disclosure;
fig. 2 is a flow chart of a method of controlling access to a visited network by a roaming user terminal in another exemplary embodiment of the disclosure;
fig. 3 is a flow chart of a method of controlling access to a visited network by a roaming user terminal in another exemplary embodiment of the disclosure;
fig. 4 is a schematic diagram of a mapping relationship in a method for controlling access to a visited network by a roaming user terminal in an exemplary embodiment of the disclosure;
fig. 5 is a schematic diagram of a mapping relationship in a method for controlling access to a visited network by a roaming user terminal in another exemplary embodiment of the disclosure;
fig. 6 is an interactive schematic diagram of a method of controlling access to a visited network by a roaming user terminal in another exemplary embodiment of the disclosure;
fig. 7 is a block diagram of an apparatus for controlling access to a visited network by a roaming user terminal in an exemplary embodiment of the present disclosure;
fig. 8 is a block diagram of an electronic device in an exemplary embodiment of the present disclosure.
Detailed Description
Example embodiments will now be described more fully with reference to the accompanying drawings. However, the exemplary embodiments may be embodied in many forms and should not be construed as limited to the examples set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of the example embodiments to those skilled in the art. The described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. In the following description, numerous specific details are provided to give a thorough understanding of embodiments of the present disclosure. One skilled in the relevant art will recognize, however, that the aspects of the disclosure may be practiced without one or more of the specific details, or with other methods, components, devices, steps, etc. In other instances, well-known technical solutions have not been shown or described in detail to avoid obscuring aspects of the present disclosure.
Furthermore, the drawings are only schematic illustrations of the present disclosure, in which the same reference numerals denote the same or similar parts, and thus a repetitive description thereof will be omitted. Some of the block diagrams shown in the figures are functional entities and do not necessarily correspond to physically or logically separate entities. These functional entities may be implemented in software or in one or more hardware modules or integrated circuits or in different networks and/or processor devices and/or microcontroller devices.
The third generation partnership project (the third generation partnership project,3 GPP) supports a network framework diagram of multiple network slices, and the 3GPP classifies the main types of network slices of 5G into three main categories: enhanced mobile broadband services (enhanced mobile broadband, emmbb) type network slices, mass internet of things services (massive internet o thing, mhiot) type network slices, and ultra-reliability delay services (ultra-reliable and low latency communications, URLLC) type network slices, multimedia devices, and the like. The network slice of the mIoT type is mainly oriented towards terminals of the internet of things, which have the requirements of large scale, low mobility and lower rate. The network slice of the URLLC type is mainly oriented to terminals of the Internet of vehicles, and the terminals have high requirements on time delay and reliability. For example, the mobile phone can access to an eMBB type network slice for high-speed downloading or watching 4K high-definition video, and the sensor device can access to an emtc type network slice for transmitting small data packets and updating system configuration.
In order to meet the requirement that the same terminal can support multiple communication services, improve user experience and allow the same terminal to access one or more network slices, the technical scheme of the embodiment of the application can be applied to a scene that one terminal accesses one or more network slices.
That is, each network slice provides a specific service for a specific terminal. In this embodiment of the present application, a terminal (terminal) may also be referred to as a User Equipment (UE), and may be a device that provides voice and/or data connectivity to a user, a handheld device with a wireless connection function, or other processing device connected to a wireless modem. The wireless terminal may communicate with one or more core networks via the RAN, and may be mobile terminals such as mobile telephones (or "cellular" telephones) and computers with mobile terminal devices, e.g., portable, pocket, hand-held, computer-built-in, or vehicle-mounted mobile devices that exchange voice and/or data with the radio access network. Such as personal communication services (personal communication service, PCS) phones, cordless phones, session initiation protocol (session initiated protocol, SIP) phones, wireless local loop (wireless local loop, WLL) stations, personal digital assistants (personal digital assistant, PDAs), and the like. A wireless terminal may also be referred to as a system, subscriber unit (subscriber unit), subscriber station (subscriber station), mobile station (mobile), remote station (remote station), access point (access point), remote terminal (remote terminal), access terminal (access terminal), user terminal (user terminal), user agent (user agent), user device (user equipment), or user equipment (user equipment), as described herein, without limitation. According to the service type division, the UE related to the embodiment of the present invention may be a terminal device with higher requirements on rate and mobility, for example, a mobile phone, a multimedia device, etc., or may be a terminal of the internet of things, or may be a terminal of the internet of vehicles.
One network slice implementation into the network deployment is one network slice instance (network slice instance, NSI). One network slice may implement multiple network slice instances. Network slicing refers to a collection of logical network function entities supporting specific communication traffic requirements, and mainly implements services customizable by means of software defined network (software defined netwoek, SND) technology and network function virtualization (network function virtualization, NFV) technology.
One UE may use multiple NSIs at the same time, which may share RAN equipment and AMF entities, while session management function (session management control function, SMF) and user plane function (user plane function, UPF) entities are network elements specific to NSIs.
In the embodiment of the present application, the AMF entity, the SMF entity, and the UPF entity may be one or more servers in the core network.
The AMF entity has functions of mobility management, registration management, connection management, lawful interception of the UE, support of transmitting session management (session management, SM) information between the UE and the SMF entity, access authentication, access authorization, and the like.
The SMF entity has session management, roaming, etc. functions. Session management functions, such as session establishment, modification and release, include, among other things, the maintenance of tunnels for UPF and Access Network (AN) nodes. Roaming functions may include charging data collection, supporting signaling for authentication/authorization with an external (external) Data Network (DN).
The UPF entity has the functions of data packet routing, legal interception and the like.
The following describes example embodiments of the present disclosure in detail with reference to the accompanying drawings.
Fig. 1 is a flow chart of a method of controlling access to a visited network by a roaming user terminal in an exemplary embodiment of the disclosure.
Referring to fig. 1, a method of controlling access to a visited network by a roaming user terminal may include:
step S102, receiving an access request sent by the diffuse-in user terminal, wherein the access request carries slice selection auxiliary information of a home network of the diffuse-in user terminal.
Step S104, determining the slice selection auxiliary information of the visiting network which needs to be subjected to the admission control corresponding to the slice selection auxiliary information of the home network which needs to be subjected to the admission control according to a pre-stored first mapping relation.
Step S106, inquiring the access control function corresponding to the slice selection auxiliary information of the visiting network from the network storage function instance.
Step S108, initiating admission control to a slice admission control function instance configured with slice usage control data, wherein the admission control is used for realizing usage control of slice resources of the home network and usage control of slice resources of the visit network.
According to the embodiment of the disclosure, the slice access control is initiated according to whether the access control is needed by the visiting network slice, the corresponding slice access control function is selected, and based on the slice access control function, a large amount of home network slice data does not need to be configured by the relevant network element of the visiting network. In addition, by executing the admission control for the diffuse-in user terminal to use the slice resources, the number of users using the slice, the number of established sessions and the like can be controlled, so that the network operation pressure is reduced, and the configuration quantity is also reduced.
Further, only mapped visited network slices are registered with the network storage function of the visited network, and home network slices do not need to be registered, so that the influence on the slice admission control function and the network storage function of the visited network is reduced.
The following describes in detail the steps of the method for controlling the access to the visited network by the roaming user terminal.
In an exemplary embodiment of the present disclosure, as shown in fig. 2, before receiving the access request sent by the diffuse-in user terminal, the method further includes:
step S202, determining a first mapping relationship between the slice selection assistance information of the home network requiring admission control and the slice selection assistance information of the visited network requiring admission control.
Step S204, determining a second mapping relationship between the slice selection assistance information of the home network not requiring admission control and the slice selection assistance information of the visited network not requiring admission control.
Step S206, configuring the first mapping relationship and/or the second mapping relationship to the network slice selection function instance.
In an exemplary embodiment of the present disclosure, the first mapping relationship includes mapping slice selection assistance information of a plurality of home networks requiring admission control to slice selection assistance information of a visited network requiring admission control.
In an exemplary embodiment of the present disclosure, the second mapping relationship includes mapping the slice selection assistance information of the plurality of home networks that do not require admission control to slice selection assistance information of a visited network that does not require admission control.
In an exemplary embodiment of the present disclosure, as shown in fig. 3, the method for controlling the roaming user terminal to access the visited network further includes:
step S302, the usage control is determined according to a service level agreement pre-reached between the home network and the visiting network.
In one exemplary embodiment of the present disclosure, the visited network performs admission control for use of a slice (HPLMN S-NSSAI) that is roaming into a certain home network of the user according to an SLA (Service-Level agent) achieved with the home network.
In an exemplary embodiment of the present disclosure, the usage control includes control of the number of the flooded user terminals and/or control of the number of PDU sessions.
In an exemplary embodiment of the present disclosure, the network element of the visited network comprises an access and mobility management function instance and/or a session management function instance.
In one exemplary embodiment of the present disclosure, there are many home network slices (HPLMN S-NSSAI) that visit the visited network (VPLMN). The visited network classifies these home network slices into two classes, slices requiring admission control and slices not requiring admission control.
Wherein, HPLMN: local public land mobile network, home Public Land Mobile Network. VPLMN: visiting a public land mobile network Visited Public Land Mobile Network.
In addition, to identify end-to-end network slices, each network slice is uniquely identified by a single network slice selection assistance information (Single Network Slice Selection Assistance Information, abbreviated as S-NSSAI).
In one exemplary embodiment of the present disclosure, home network slices of a roaming user that require admission control and that do not require admission control are mapped to different visited network slices in a visited mobile network. How to map specifically depends on the local policy of the visited network, e.g. multiple different HPLMN S-nsais may be mapped to a single VPLMN S-nsai. Such a mapping relationship may be centrally configured to the network slice selection function of the visited network.
In one exemplary embodiment of the present disclosure, as shown in fig. 4, in a visited mobile network, a home slice HPLMN S-nsai for a roaming user requiring admission control is mapped to a corresponding visited network slice VPLMN S-nsai requiring admission control of the visited network by a network slice selection function 400.
In one exemplary embodiment of the present disclosure, as shown in fig. 5, in a visited mobile network, for a home slice HPLMN S-nsai of a roaming user that does not require admission control, a network slice selection function 500 maps to a corresponding visited network slice VPLMN S-nsai of the visited network that does not require admission control.
In an exemplary embodiment of the present disclosure, as shown in fig. 6, the scheme for controlling access to the visited network by the roaming user terminal mainly includes a network function 602 (access and mobility management function, session management function), a network storage function 604, and a slice admission control function 606, and is implemented specifically according to the following flow:
1. the network function 602 is used to configure the VPLMN S-NSSAI that requires admission control.
2. The slice admission control function 606 is used to configure resource usage control of VPLMN S-NSSAI and HPLMN S-NSSAI and to register supported VPLMN S-NSSAI for storage in the network storage function 604.
3. The network function 602 queries the network storage function 604 for a slice admission control function according to the VPLMN S-nsai.
4. The slice admission control function operates (VPLMN S-NSSAI and HPLMN S-NSSAI).
5. When the roaming user requests the slice resources of the visited network, the relevant network element of the visited network function 602 initiates the slice admission control according to whether the visited network slice VPLMN S-nsai needs admission control or not, and selects the corresponding slice admission control function 606. The corresponding slice admission control function 606 may be obtained based on a local configuration or the corresponding slice admission control function 606 may be obtained by accessing a network storage function.
6. The relevant network element of the visited network initiates a slice admission control operation to the slice admission control function 606, comprising a roaming user requesting to use the visited network slice information VPLMN S-nsai and the mapped home network slice information HPLMN S-nsai, based on which the slice admission control function 606 performs a slice admission control on the VPLMN S-nsai and the HPLMN S-nsai.
Corresponding to the above method embodiment, the present disclosure further provides an apparatus for controlling access to a visited network by a roaming user terminal, which may be configured to perform the above method embodiment.
Fig. 7 is a block diagram of an apparatus for controlling access to a visited network by a roaming user terminal in an exemplary embodiment of the present disclosure.
Referring to fig. 7, an apparatus 700 for controlling access to a visited network by a roaming user terminal may comprise:
the receiving module 702 is configured to receive an access request sent by the roaming user terminal, where the access request carries slice selection auxiliary information of a home network of the roaming user terminal.
In one exemplary embodiment of the present disclosure, the access request carries slice selection assistance information of the visited network and slice selection assistance information of the mapped home network.
A determining module 704, configured to determine, according to a pre-stored first mapping relationship, slice selection auxiliary information of the visited network that needs to perform admission control corresponding to slice selection auxiliary information of the home network that needs to perform admission control.
And the inquiring module 706 is configured to inquire the network storage function instance about the admission control function corresponding to the slice selection auxiliary information of the visited network.
A control module 708 arranged to initiate admission control to a slice admission control function instance configured with slice usage control data, the admission control being for effecting usage control of slice resources of the home network and usage control of slice resources of the visited network.
In one exemplary embodiment of the present disclosure, the determining module 704 is further configured to: determining a first mapping relation between slice selection auxiliary information of a home network needing access control and slice selection auxiliary information of a visiting network needing access control; determining a second mapping relation between the slice selection auxiliary information of the home network which does not need to be subjected to access control and the slice selection auxiliary information of the visiting network which does not need to be subjected to access control; and configuring the first mapping relation and/or the second mapping relation to the network slice selection function instance.
In an exemplary embodiment of the present disclosure, the first mapping relationship includes mapping slice selection assistance information of a plurality of home networks requiring admission control to slice selection assistance information of a visited network requiring admission control.
In an exemplary embodiment of the present disclosure, the second mapping relationship includes mapping the slice selection assistance information of the plurality of home networks that do not require admission control to slice selection assistance information of a visited network that does not require admission control.
In one exemplary embodiment of the present disclosure, the determining module 704 is further configured to: the usage control is determined according to a pre-agreed service level agreement between the home network and the visited network.
In an exemplary embodiment of the present disclosure, the usage control includes control of the number of the flooded user terminals and/or control of the number of PDU sessions.
In an exemplary embodiment of the present disclosure, the network element of the visited network comprises an access and mobility management function instance and/or a session management function instance.
Since the functions of the apparatus 700 for controlling access to a visited network by a roaming user terminal have been described in detail in the corresponding method embodiments, the disclosure is not repeated here.
It should be noted that although in the above detailed description several modules or units of a device for action execution are mentioned, such a division is not mandatory. Indeed, the features and functionality of two or more modules or units described above may be embodied in one module or unit in accordance with embodiments of the present disclosure. Conversely, the features and functions of one module or unit described above may be further divided into a plurality of modules or units to be embodied.
In an exemplary embodiment of the present disclosure, an electronic device capable of implementing the above method is also provided.
Those skilled in the art will appreciate that the various aspects of the invention may be implemented as a system, method, or program product. Accordingly, aspects of the invention may be embodied in the following forms, namely: an entirely hardware embodiment, an entirely software embodiment (including firmware, micro-code, etc.) or an embodiment combining hardware and software aspects may be referred to herein as a "circuit," module "or" system.
An electronic device 800 according to such an embodiment of the invention is described below with reference to fig. 8. The electronic device 800 shown in fig. 8 is merely an example and should not be construed as limiting the functionality and scope of use of embodiments of the present invention.
As shown in fig. 8, the electronic device 800 is embodied in the form of a general purpose computing device. Components of electronic device 800 may include, but are not limited to: the at least one processing unit 810, the at least one memory unit 820, and a bus 830 connecting the various system components, including the memory unit 820 and the processing unit 810.
Wherein the storage unit stores program code that is executable by the processing unit 810 such that the processing unit 810 performs steps according to various exemplary embodiments of the present invention described in the above section of the "exemplary method" of the present specification. For example, the processing unit 810 may perform the methods as shown in the embodiments of the present disclosure.
The storage unit 820 may include readable media in the form of volatile storage units, such as Random Access Memory (RAM) 8201 and/or cache memory 8202, and may further include Read Only Memory (ROM) 8203.
Storage unit 820 may also include a program/utility 8204 having a set (at least one) of program modules 8205, such program modules 8205 including, but not limited to: an operating system, one or more application programs, other program modules, and program data, each or some combination of which may include an implementation of a network environment.
Bus 830 may be one or more of several types of bus structures including a memory unit bus or memory unit controller, a peripheral bus, an accelerated graphics port, a processing unit, or a local bus using any of a variety of bus architectures.
The electronic device 800 may also communicate with one or more external devices 840 (e.g., keyboard, pointing device, bluetooth device, etc.), one or more devices that enable a user to interact with the electronic device 800, and/or any device (e.g., router, modem, etc.) that enables the electronic device 800 to communicate with one or more other computing devices. Such communication may occur through an input/output (I/O) interface 850. Also, electronic device 800 may communicate with one or more networks such as a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network, such as the Internet, through network adapter 860. As shown, network adapter 860 communicates with other modules of electronic device 800 over bus 830. It should be appreciated that although not shown, other hardware and/or software modules may be used in connection with electronic device 800, including, but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, data backup storage systems, and the like.
From the above description of embodiments, those skilled in the art will readily appreciate that the example embodiments described herein may be implemented in software, or may be implemented in software in combination with the necessary hardware. Thus, the technical solution according to the embodiments of the present disclosure may be embodied in the form of a software product, which may be stored in a non-volatile storage medium (may be a CD-ROM, a U-disk, a mobile hard disk, etc.) or on a network, including several instructions to cause a computing device (may be a personal computer, a server, a terminal device, or a network device, etc.) to perform the method according to the embodiments of the present disclosure.
In an exemplary embodiment of the present disclosure, a computer-readable storage medium having stored thereon a program product capable of implementing the method described above in the present specification is also provided. In some possible embodiments, the various aspects of the invention may also be implemented in the form of a program product comprising program code for causing a terminal device to carry out the steps according to the various exemplary embodiments of the invention as described in the "exemplary methods" section of this specification, when said program product is run on the terminal device.
The program product for implementing the above-described method according to an embodiment of the present invention may employ a portable compact disc read-only memory (CD-ROM) and include program code, and may be run on a terminal device such as a personal computer. However, the program product of the present invention is not limited thereto, and in this document, a readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
The program product may employ any combination of one or more readable media. The readable medium may be a readable signal medium or a readable storage medium. The readable storage medium can be, for example, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples (a non-exhaustive list) of the readable storage medium would include the following: an electrical connection having one or more wires, a portable disk, a hard disk, random Access Memory (RAM), read-only memory (ROM), erasable programmable read-only memory (EPROM or flash memory), optical fiber, portable compact disk read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
The computer readable signal medium may include a data signal propagated in baseband or as part of a carrier wave with readable program code embodied therein. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination of the foregoing. A readable signal medium may also be any readable medium that is not a readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Program code for carrying out operations of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, C++ or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device, partly on a remote computing device, or entirely on the remote computing device or server. In the case of remote computing devices, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., connected via the Internet using an Internet service provider).
Furthermore, the above-described drawings are only schematic illustrations of processes included in the method according to the exemplary embodiment of the present invention, and are not intended to be limiting. It will be readily appreciated that the processes shown in the above figures do not indicate or limit the temporal order of these processes. In addition, it is also readily understood that these processes may be performed synchronously or asynchronously, for example, among a plurality of modules.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This application is intended to cover any adaptations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.

Claims (10)

1. The method for controlling the roaming user terminal to access the visiting network is characterized by being applicable to network elements of the visiting network, and the method for controlling the roaming user to use the business in the visiting network comprises the following steps:
receiving an access request sent by the diffuse-in user terminal, wherein the access request carries slice selection auxiliary information of a home network of the diffuse-in user terminal;
determining slice selection auxiliary information of the visiting network which needs to be subjected to admission control corresponding to the slice selection auxiliary information of the home network which needs to be subjected to admission control according to a pre-stored first mapping relation;
inquiring an access control function corresponding to the slice selection auxiliary information of the visiting network from a network storage function instance;
and initiating admission control to a slice admission control function instance configured with slice usage control data, wherein the admission control is used for realizing usage control of slice resources of the home network and usage control of slice resources of the visiting network.
2. The method for controlling access to a visited network by a roaming user terminal as claimed in claim 1, further comprising, before receiving the access request sent by the roaming user terminal:
determining a first mapping relation between slice selection auxiliary information of a home network needing access control and slice selection auxiliary information of a visiting network needing access control;
determining a second mapping relation between the slice selection auxiliary information of the home network which does not need to be subjected to access control and the slice selection auxiliary information of the visiting network which does not need to be subjected to access control;
and configuring the first mapping relation and/or the second mapping relation to the network slice selection function instance.
3. The method of controlling access to a visited network by a roaming user terminal as claimed in claim 2, wherein the first mapping relation comprises mapping the slice selection assistance information of a plurality of home networks requiring admission control to slice selection assistance information of a visited network requiring admission control.
4. The method of controlling access to a visited network for a roaming user terminal as claimed in claim 2, wherein the second mapping relation comprises mapping the slice selection assistance information of a plurality of home networks not requiring admission control to slice selection assistance information of a visited network not requiring admission control.
5. The method of controlling access to a visited network by a roaming user terminal according to any one of claims 1-4, further comprising:
the usage control is determined according to a pre-agreed service level agreement between the home network and the visited network.
6. A method of controlling access to a visited network by a roaming user terminal according to any of the claims 1-4, characterised in that the usage amount control comprises a control of the number of roaming user terminals and/or a control of the number of PDU sessions.
7. A method of controlling access to a visited network by a roaming user terminal according to any of the claims 1-4, c h a r a c t e r i z e d i n that the network element of the visited network comprises access and mobility management function instances/or session management function instances.
8. An apparatus for controlling access to a visited network by a roaming user terminal, comprising:
the receiving module is configured to receive an access request sent by the diffuse-in user terminal, wherein the access request carries slice selection auxiliary information of a home network of the diffuse-in user terminal;
the determining module is used for determining the slice selection auxiliary information of the visiting network which needs to be subjected to the access control and corresponds to the slice selection auxiliary information of the home network which needs to be subjected to the access control according to a pre-stored first mapping relation;
the inquiring module is used for inquiring the slice admission control function corresponding to the slice selection auxiliary information of the visiting network from the network storage function instance;
and the control module is used for initiating admission control to a slice admission control function instance configured with slice usage control data, wherein the admission control is used for realizing the usage control of slice resources of the home network and the usage control of slice resources of the visiting network.
9. An electronic device, comprising:
a memory; and
a processor coupled to the memory, the processor configured to perform the method of controlling access to a visited network by a roaming user terminal as claimed in any one of claims 1 to 7, based on instructions stored in the memory.
10. A computer readable storage medium having stored thereon a program which when executed by a processor implements a method of controlling access to a visited network by a roaming user terminal as claimed in any one of claims 1 to 7.
CN202111200849.XA 2021-10-13 2021-10-13 Method, device, equipment and medium for controlling access of diffuse access user to visited network Pending CN115996444A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111200849.XA CN115996444A (en) 2021-10-13 2021-10-13 Method, device, equipment and medium for controlling access of diffuse access user to visited network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111200849.XA CN115996444A (en) 2021-10-13 2021-10-13 Method, device, equipment and medium for controlling access of diffuse access user to visited network

Publications (1)

Publication Number Publication Date
CN115996444A true CN115996444A (en) 2023-04-21

Family

ID=85988968

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111200849.XA Pending CN115996444A (en) 2021-10-13 2021-10-13 Method, device, equipment and medium for controlling access of diffuse access user to visited network

Country Status (1)

Country Link
CN (1) CN115996444A (en)

Similar Documents

Publication Publication Date Title
US11523465B2 (en) Registration method, session establishment method, terminal, and AMF entity
EP3764696A1 (en) Method and apparatus for transmitting data
CN108347748B (en) Method, device and system for acquiring quality of service parameters
US11659621B2 (en) Selection of IP version
CN111641989B (en) Protocol data unit session establishing method and related device
CN114302426B (en) Method, device, medium and electronic equipment for controlling service quality in heterogeneous network
US8023484B1 (en) Method for obtaining a mobile internet protocol address
CN114302464B (en) QoS mapping method and device, storage medium and electronic equipment
US9807819B1 (en) Cross-technology session continuity
EP4185010A1 (en) Method and device for accessing local network
EP4152829A1 (en) Communication method and related communication apparatus, and medium and chip
US9204483B1 (en) Methods for obtaining a mobile internet protocol address
US20230018378A1 (en) Parameter configuration method, apparatus and system, device and storage medium
CN113841372A (en) Method and apparatus for obtaining and managing location information of mobile terminal in edge computing system
WO2023087965A1 (en) Communication method and apparatus
JP2022512444A (en) Data transmission method and device
CN115175117A (en) Data redundancy transmission method under multi-access and related equipment thereof
CN115996444A (en) Method, device, equipment and medium for controlling access of diffuse access user to visited network
CN114514764B (en) Apparatus, method and computer program
WO2024008157A1 (en) Information transmission method and apparatus, network device, and communication system
WO2023011107A1 (en) Session policy control method, network element, storage medium, and electronic device
WO2023098704A1 (en) Device-to-device communication method and apparatus, device, medium, and program product
CN114040470A (en) Terminal route control method, device, equipment and storage medium
CN117255131A (en) Method, device, equipment and readable medium for carrying out service request based on slice
CN115996470A (en) Access control method and device for 5G network slice, electronic equipment and readable medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination