WO2018228517A1 - Method for controlling access, network device, and terminal device - Google Patents

Method for controlling access, network device, and terminal device Download PDF

Info

Publication number
WO2018228517A1
WO2018228517A1 PCT/CN2018/091436 CN2018091436W WO2018228517A1 WO 2018228517 A1 WO2018228517 A1 WO 2018228517A1 CN 2018091436 W CN2018091436 W CN 2018091436W WO 2018228517 A1 WO2018228517 A1 WO 2018228517A1
Authority
WO
WIPO (PCT)
Prior art keywords
network
information
network slice
ran
mapping rule
Prior art date
Application number
PCT/CN2018/091436
Other languages
French (fr)
Chinese (zh)
Inventor
娄崇
毕皓
韩锋
晋英豪
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2018228517A1 publication Critical patent/WO2018228517A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions
    • H04W48/04Access restriction performed under specific conditions based on user or terminal location or mobility data, e.g. moving direction, speed
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions
    • H04W48/06Access restriction performed under specific conditions based on traffic conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/18Selecting a network or a communication service

Definitions

  • the present application relates to the field of communications, and in particular, to a method for access control, a network device, and a terminal device.
  • the fifth generation mobile communication system such as new radio (NR)
  • 5G new radio
  • NR new radio
  • SDN software defined network
  • NFV network function virtualization
  • NFV technology can realize the virtualization of the underlying physical resources and load the virtual network function (network function).
  • NF network function
  • the end-to-end service chain is configured through a dynamic connection between the radio access network (RAN) and the NF of the core network (CN) to construct a network slice.
  • Operators can form a specific set of network functions and the network resources needed to run these network functions according to the requirements of key performance indicators (KPIs) such as capacity, coverage, rate, delay, and reliability for each specific business use case.
  • KPIs key performance indicators
  • the third generation partnership project (3GPP) divides the main types of 5G network slicing into the following three categories: enhanced mobile broadband (eMBB), massive machine type connection service (massive) Machine type communication (mMTC) and ultra-reliable and low latency communications (URLLC).
  • eMBB is mainly for terminals with high demand for speed and mobility, such as mobile phones and multimedia devices.
  • mMTC is mainly for IoT devices, with large-scale, low mobility and low speed requirements.
  • URLLC mainly refers to the types of services and equipment that have strict requirements on delay and reliability, such as car networking and security information.
  • a mobile phone user can access an eMBB type network slice for high-speed download or watch 4K high-definition video, and the sensor device can access the mMTC network slice for small data packet transmission and system configuration update.
  • User equipment can simultaneously access one or more or all network slices to meet business needs and achieve a better user experience.
  • the access control or user service (UE) access connection or service request can be restricted by access control, thereby managing network load and alleviating network congestion.
  • LTE Long Term Evolution
  • the LTE system adopts the Access Barring Check (ABC) method.
  • ABSC Access Barring Check
  • the current access control scheme has problems such as complex access control, poor compatibility, and relatively large system overhead.
  • the embodiment of the present application provides a method for access control, a network device, and a terminal device, which are used to reduce the complexity of network slice access control.
  • the wireless communication system to which the embodiment of the present application is applied may include a first network device, a terminal device, and a second network device.
  • the terminal device is described by using the UE, the first network device in the RAN, and the second network device as the CN.
  • the wireless communication system may include a Radio Access Network (RAN) device, a Core Network (CN) device, and a User Equipment (UE).
  • the communication system of the embodiment of the present application supports a network slicing architecture.
  • the core network network slice in the communication system may share the core network device and/or the core network resource, or may monopolize the core network device and/or the core network resource.
  • the UE accesses one or more RAN network slices or CN network slices through the RAN device.
  • the RAN device selects the AMF for the UE according to the information provided by the UE and the Access and Mobility Management Function (AMF) information configured or acquired.
  • AMF Access and Mobility Management Function
  • a first aspect of the present application provides a method for access control, which may include: a first network device sends a first message to a terminal device, where the first message includes a first mapping rule, where the first mapping rule includes at least Information of a radio access network RAN network slice; the first network device sends access control information to the terminal device.
  • the first mapping rule sent by the RAN to the UE includes at least one RAN network slice information, and
  • the configuration content of the first mapping rule in the embodiment of the present application is smaller, and the complexity is relatively low.
  • the first mapping rule and the access control information are used to perform access control on the terminal device.
  • the first mapping rule and the access control information that are sent by the RAN to the UE may be used for the UE to perform access control and initiate access of the network slice.
  • the first mapping rule includes information about at least one RAN network slice, because the information of the RAN network slice is generally one-to-many relationship with the CN network slice information, so the configuration content of the second mapping rule is smaller than the existing one. Configuration content, low complexity.
  • the method may further include: receiving, by the first network device a second message from the second network device, the second message includes a second mapping rule, the second mapping rule includes at least one CN access category, and the first mapping rule further includes the at least one RAN network A mapping relationship between the sliced information and the at least one CN access category.
  • at least one CN access category may be understood as a corresponding connection of at least one factor (such as an access level of the UE, information of at least one CN network slice, an application, a service category, and the like) included in the mapping rule. The index into the control information.
  • the information of the at least one RAN network slice is determined according to at least one access category, because the RAN holds a mapping relationship between the information of the preset RAN network slice and the information of the CN network slice.
  • the RAN may determine information of the at least one CN network slice according to information of the currently available CN network slice, where the information of the at least one CN network slice corresponds to the at least one CN category, so the second mapping rule may include information of at least one RAN network slice.
  • the mapping relationship of the at least one CN access category An optional implementation manner of the second mapping rule is provided, where the first mapping rule further includes a mapping relationship between the information of the at least one RAN network slice and the at least one CN access category, which is added to the solution. Flexibility.
  • the method may further include: receiving, by the first network device a third message from the second network device, the third message including a network slice selection assistance information Allowed NSSAI list allowed by the CN network, the first mapping rule further including information of the at least one RAN network slice and the CN Allowed The mapping relationship of NSSAI lists.
  • the information of the at least one CN network slice is determined according to the CN Allowed NSSAI list, and the RAN saves the mapping relationship between the preset RAN network slice information and the CN network slice information, so that at least one may be
  • the information of the CN network slice determines information for at least one RAN network slice.
  • An optional implementation manner of the second mapping rule is provided.
  • the first mapping rule may further include a mapping relationship between the information of the at least one RAN network slice and the CN Allowed NSSAI list, which increases the flexibility of the solution.
  • the method may further include: receiving, by the first network device a fourth message from the second network device, the fourth message including a second mapping rule and a network slice selection assistance information Allowed NSSAI list allowed by the CN network, the second mapping rule including at least one CN access category, The first mapping rule further includes information of the at least one RAN network slice, a mapping relationship between the at least one CN access category and the CN Allowed NSSAI list.
  • the information of the at least one CN network slice is determined according to the CN Allowed NSSAI list, and the RAN saves the mapping relationship between the preset RAN network slice information and the CN network slice information, so that at least one may be
  • the CN network slice information determines information for at least one RAN network slice, and at least one CN access class corresponds to the CN Allowed NSSAI list.
  • An optional implementation manner of the second mapping rule is provided, where the first mapping rule further includes information about the at least one RAN network slice, a mapping relationship between the CN Allowed NSSAI list and at least one CN access category, and The flexibility of the solution of the present application.
  • the CN may select at least one CN that the UE is allowed to access in the current registration area according to the network slice selection assistance information (CN NSSAI) allowed by the UE, the subscription information of the UE, the local policy, the availability of the network slice, and the like.
  • the information of the network slice, the information of the at least one CN network slice may be presented in the form of a list, and may be referred to as a CN allowed NSSAI (CN Allowed NSSAI) list, and may also be represented in other manners, which is not limited.
  • the first mapping rule further includes A mapping relationship between information of the at least one RAN network slice and information of currently available CN network slices.
  • the information of the at least one CN network slice is determined by the RAN according to the currently available information of the CN network slice, and another implementation manner of the second mapping rule is provided, which increases the flexibility of the solution. Sex.
  • the first mapping rule further includes information about the at least one RAN network slice, A mapping relationship between currently available CN network slice information and at least one CN access category.
  • the information of the at least one CN network slice is determined by the RAN according to the currently available information of the CN network slice, and another implementation manner of the second mapping rule is provided, which increases the flexibility of the solution. Sex.
  • the first mapping rule further includes A mapping relationship between the information of the at least one RAN network slice and the at least one RAN access category.
  • the at least one RAN access category is an access category of the RAN reconfiguration, which may be understood as searching for at least one factor (for example, information of at least one RAN network slice, etc.) included in the second mapping rule. Index of access control information.
  • Another alternative implementation of the second mapping rule is provided, which increases the flexibility of the solution of the present application.
  • the first mapping rule further includes The information of the at least one RAN network slice, the mapping relationship between the CN Allowed NSSAI list and the RAN access category.
  • the information of the at least one CN network slice is determined by the RAN according to the CN Allowed NSSAI list, and another implementation manner of the second mapping rule is provided, which increases the flexibility of the solution.
  • the first mapping rule further includes The information of the at least one RAN network slice, the information of the currently available CN network slice, and the mapping relationship of the RAN access category.
  • the information of the at least one CN network slice is determined by the RAN according to the currently available information of the CN network slice, and another implementation manner of the second mapping rule is provided, which increases the flexibility of the solution. Sex.
  • the information of the at least one RAN network slice included in the second mapping rule may be related to the at least one RAN access category, or the CN Allowed NSSAI list.
  • the CN Allowed NSSAI list has a mapping relationship with at least one RAN access category, or information of currently available CN network slices, or at least one CN access category.
  • the second mapping rule may also not include at least one RAN access category, or a CN Allowed NSSAI list, or a CN Allowed NSSAI list and at least one RAN access category, or information of currently available CN network slices.
  • at least one CN access category the RAN only needs to know that they have a mapping relationship, and is not limited.
  • a second aspect of the present application provides a method for access control, which may include: receiving, by a terminal device, a first message from a first network device, where the first message includes a first mapping rule, and the first mapping rule Information including at least one radio access network RAN network slice; the terminal device receiving access control information from the first network device.
  • the first mapping rule sent by the RAN to the UE includes at least one RAN network slice information.
  • the configuration content of the first mapping rule in the embodiment of the present application is smaller, and the complexity is relatively low.
  • the method further includes: the terminal device according to the first mapping rule and the access control information Perform access control.
  • the UE may perform an access control check according to information of at least one RAN network slice, because the information of the RAN network slice is generally one-to-many relationship with the information of the CN network slice, so the second mapping rule
  • the configuration content is smaller than the existing configuration content, and the complexity is low. Control of the RAN network slice granularity is also achieved.
  • the case where the information of the CN network slice requested by the UE is inconsistent with the information of the allocated CN network slice is also solved, because the information of the different CN network slices of the same service type is mostly the same in the RAN network slice information of the RAN.
  • the first mapping rule further includes the at least one RAN network The mapping relationship between the sliced information and at least one RAN access category.
  • the UE may perform access control check according to information of at least one RAN network slice or at least one RAN access category, which improves the selectivity and flexibility of the technical solution of the present application, because the RAN network slice information Generally, the information of the CN network slice is a one-to-many relationship. Therefore, the configuration content of the second mapping rule is smaller than the existing configuration content, and the complexity is low. Control of the RAN network slice granularity is also achieved.
  • the situation that the information of the CN network slice requested by the UE is inconsistent with the information of the CN network slice allocated by the CN is also solved, because the information of the different CN network slices of the same service type is mapped in the RAN network, and the information of the RAN network slice is the same in most cases. .
  • the first mapping rule further includes the at least one RAN network The mapping relationship between the sliced information and at least one CN access category.
  • the UE may perform access control check according to information of at least one RAN network slice or at least one CN access category, which improves the selectivity and flexibility of the technical solution of the present application, because the RAN network slice information Generally, the information of the CN network slice is a one-to-many relationship. Therefore, the configuration content of the second mapping rule is smaller than the existing configuration content, and the complexity is low. Control of the RAN network slice granularity is also achieved.
  • the situation that the information of the CN network slice requested by the UE is inconsistent with the information of the CN network slice allocated by the CN is also solved, because the information of the different CN network slices of the same service type is mapped in the RAN network, and the information of the RAN network slice is the same in most cases. .
  • the first mapping rule further includes the at least one RAN network The mapping relationship between the sliced information and the information of at least one CN network slice.
  • the UE may perform an access control check according to the information of the at least one RAN network slice or the information of the at least one CN network slice, which improves the selectivity and flexibility of the technical solution of the present application, because the RAN network is sliced.
  • the information is generally one-to-many relationship with the CN network slice information. Therefore, the configuration content of the second mapping rule is smaller than the existing configuration content, and the complexity is low.
  • Control of the RAN network slice granularity is also achieved.
  • the situation that the information of the CN network slice requested by the UE is inconsistent with the information of the CN network slice allocated by the CN is also solved, because the information of the different CN network slices of the same service type is mapped in the RAN network, and the information of the RAN network slice is the same in most cases. .
  • the first mapping rule further includes the at least one RAN network The sliced information, the mapping of the information of the at least one CN network slice to the at least one RAN access category.
  • at least one CN network slice information is determined by the RAN according to a CN Allowed NSSAI list or a currently available CN network slice.
  • the UE may perform the access control check of the RAN network slice according to the at least one RAN network slice, or may perform the access control check of the RAN network slice according to the at least one CN access category. .
  • the information of the RAN network slice is generally one-to-many relationship with the information of the CN network slice, the control of the RAN network slice granularity is implemented, and the information of the CN network slice requested by the UE is inconsistent with the information of the CN network slice allocated by the CN. In the case, since the information of different CN network slices of the same service type is mapped in the RAN, the information of the RAN network slice is the same in most cases.
  • the first mapping rule further includes the at least one RAN network The information of the slice, the mapping of the information of the at least one CN network slice to the at least one CN access category.
  • the UE may perform an access control check of the RAN network slice according to the information of the at least one RAN network slice, or may perform an access control check of the CN network slice according to the information of the at least one CN network slice, and improve the The selectivity and flexibility of the technical solution of the present application.
  • the control of the RAN network slice granularity is also implemented, and the information of the CN network slice requested by the UE is inconsistent with the information of the CN network slice allocated by the CN, because the information of different CN network slices of the same service type is mapped in the RAN RAN network.
  • the sliced information is mostly the same.
  • a third aspect of the present application provides a method for access control, which may include: the second network device sends a second message to the first network device, where the second message includes a second mapping rule, and the second mapping rule Includes at least one CN access category.
  • the second mapping rule includes at least one CN access category, which may be used by the RAN to identify at least one according to a mapping relationship between the preset RAN network slice information and the CN network slice information.
  • CN network slice information provides an achievable way.
  • the second message includes a CN network slice selection auxiliary information Allowed NSSAI list.
  • the RAN may directly determine the information of the at least one CN network slice according to the CN Allowed NSSAI list, thereby determining the second mapping rule.
  • the information of at least one RAN network slice provides an achievable way.
  • the second mapping rule includes the at least one CN access category.
  • a fourth aspect of the embodiments of the present application provides a network device, which has the function of reducing the complexity of network slice access control. This function can be implemented in hardware or in hardware by executing the corresponding software.
  • the hardware or software includes one or more modules corresponding to the functions described above.
  • a fifth aspect of the embodiments of the present application provides a terminal device, which has the function of reducing the complexity of network slice access control.
  • This function can be implemented in hardware or in hardware by executing the corresponding software.
  • the hardware or software includes one or more modules corresponding to the functions described above.
  • a sixth aspect of the embodiments of the present application provides a network device, which has the function of reducing the complexity of network slice access control. This function can be implemented in hardware or in hardware by executing the corresponding software.
  • the hardware or software includes one or more modules corresponding to the functions described above.
  • a seventh aspect of the present application provides a network device, which may include:
  • a memory, a transceiver, the memory and the transceiver are connected by a bus;
  • the memory is configured to store an operation instruction
  • the transceiver is configured to send, by using the operation instruction, a first message to a terminal device, where the first message includes a first mapping rule, where the first mapping rule includes information of at least one RAN network slice;
  • the terminal device sends access control information.
  • the eighth aspect of the embodiments of the present application provides a wireless communication apparatus, which may include:
  • At least one processor a memory, a transceiver circuit and a bus system, the processor, the memory, the transceiver circuit coupled by the bus system, the wireless communication device communicating with the terminal device through the transceiver circuit,
  • the memory is for storing program instructions
  • the at least one processor is configured to execute the program instructions stored in the memory, such that the wireless communication device performs the method according to any one of the first aspects of the embodiments of the present application The portion of the operation of the first network device.
  • the wireless communication device may be a network device or a system chip that applies a corresponding function in a network side device.
  • a ninth aspect of the present application provides a wireless communication apparatus, which may include:
  • At least one processor a memory, a transceiver circuit and a bus system, the processor, the memory, the transceiver circuit coupled by the bus system, the wireless communication device communicating with a network side device through the transceiver circuit,
  • the memory is for storing program instructions
  • the at least one processor is configured to execute the program instructions stored in the memory, such that the wireless communication device performs the method according to any one of the second aspects of the embodiments of the present application The part of the terminal device operation.
  • the wireless communication device can be either a terminal device or a system chip that applies a corresponding function in the terminal device.
  • a tenth aspect of the present application provides a communication system, where the communication system includes a first network device, a terminal device, and a second network device, where the first network device is optional to perform the first aspect or the first aspect of the present application.
  • the first network device in the implementation manner; the terminal device is the terminal device in the optional implementation manner of the second aspect or the second aspect of the application; the second network device is configured to perform the third aspect or the The second network device of any of the alternative implementations of the three aspects.
  • the eleventh aspect of the present application provides a storage medium. It should be noted that the technical solution of the present invention may contribute to the prior art or all or part of the technical solution may be implemented by software.
  • the computer software product is stored in a storage medium for storing computer software instructions for use in the above apparatus, comprising: the first network device for performing the first aspect, the second aspect or the third aspect A program designed by a terminal device or a second network device.
  • the storage medium includes: a U disk, a mobile hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disk, and the like, which can store program codes.
  • a twelfth aspect of the embodiments of the present application provides a computer program product comprising instructions, when executed on a computer, causing a computer to perform the method as described in the first aspect of the present application or any of the alternative implementations of the first aspect .
  • a thirteenth aspect of the embodiments of the present application provides a computer program product comprising instructions, when executed on a computer, causing the computer to perform the method as described in the second aspect or any alternative implementation of the second aspect of the present application .
  • a fourteenth aspect of the embodiments of the present application provides a computer program product comprising instructions, when executed on a computer, causing the computer to perform the method as described in any of the optional implementations of the third aspect or the third aspect of the present application. .
  • the embodiments of the present application have the following advantages:
  • An embodiment of the present application sends a first message to a terminal device by using a first network device, where the first message includes a first mapping rule, where the first mapping rule includes information of at least one RAN network slice; the first network device sends The terminal device sends access control information. Because the information of the RAN network slice and the information of the CN network slice are usually one-to-many mapping relationship, the first mapping rule sent by the RAN to the UE includes information of at least one RAN network slice, which is compared with the prior art.
  • the configuration content of the first mapping rule in the embodiment of the present application is smaller and the complexity is relatively low.
  • FIG. 1 is a schematic diagram of 3GPP supporting multiple network slices in the embodiment of the present application
  • FIG. 2A is a schematic diagram of a scenario applied in an embodiment of the present application.
  • 2B is a schematic structural diagram of a wireless communication system applied in an embodiment of the present application.
  • FIG. 3 is a schematic diagram of an embodiment of a method for access control according to an embodiment of the present application.
  • FIG. 4 is a schematic diagram of another embodiment of a method for access control in an embodiment of the present application.
  • FIG. 5A is a schematic diagram of an embodiment of a network device according to an embodiment of the present application.
  • FIG. 5B is a schematic diagram of another embodiment of a network device according to an embodiment of the present application.
  • 6A is a schematic diagram of an embodiment of a terminal device according to an embodiment of the present application.
  • 6B is a schematic diagram of another embodiment of a terminal device according to an embodiment of the present application.
  • FIG. 7 is a schematic diagram of another embodiment of a network device according to an embodiment of the present application.
  • FIG. 8 is a schematic diagram of another embodiment of a terminal device according to an embodiment of the present application.
  • the embodiment of the present application provides a method for access control, a network device, and a terminal device, which are used to reduce the complexity of network slice access control.
  • the embodiments of the present application relate to a radio access network device, a terminal device, and a core network device.
  • the access network device which may also be referred to as a base station, is a device deployed in the radio access network to provide wireless communication functions for the terminal device, including but not limited to: various forms of macro base stations, micro base stations (also It is called a small station, a relay station, a Transmission Reception Point (TRP), an evolved Node B (eNB), a radio network controller (RNC), and a Node B (Node B, NB).
  • the names of wireless access network devices with similar wireless communication capabilities may vary.
  • the foregoing apparatus for providing a wireless communication function for a terminal device is collectively referred to as a radio access network device.
  • the terminal device is also referred to as a user equipment (UE) or a mobile station (MS) in the wireless communication standard.
  • the terminal device involved in the embodiment of the present application is a wireless transceiver function.
  • the equipment can be deployed on land, indoors or outdoors, hand-held or on-board; it can also be deployed on the water (such as ships); it can also be deployed in the air (such as airplanes, balloons, satellites, etc.).
  • the terminal device may include various types of mobile phones, tablets, computers with wireless transceiver functions, wireless data cards, virtual reality (VR) terminal devices, and augmented reality (Augmented Reality, AR) terminal equipment, terminal equipment of machine type communication (MTC), terminal equipment in industrial control, terminal equipment in self driving, and remote medical Terminal equipment, terminal equipment in smart grid, terminal equipment in transportation safety, terminal equipment in smart city, smart home (home equipment with wireless communication function, such as refrigerator, TV, washing machine or furniture, etc., as well as wearable devices (such as smart watches, smart bracelets, pedometers, etc.) and so on.
  • the terminal device referred to in the present application can also be set to a fixed position, and has a device similar to the wireless communication function of the foregoing terminal device. In a system using a different wireless access technology, the name of the terminal device having a similar wireless communication function may be different.
  • the device having the wireless communication function is collectively referred to as a terminal. device.
  • the core network device may be a device having an access and mobility management network function, a session management network function (SMF), a user plane network function, an authentication management network function, and an AMF.
  • SMF session management network function
  • AMF authentication management network function
  • 5G introduces the concept of network slicing to cope with the difference in network performance requirements of different communication services.
  • a complete network slice includes but is not limited to RAN network slices and CN network slices to jointly build an end-to-end network slice architecture.
  • CN network slices pass through a set of customized NFs, including access and mobility management functions (Access and Mobility Management). Function, AMF), Session Management Function (SMF), User Plane Function (UPF), etc.
  • the RAN network slice is configured by scheduling and a set of different first protocol layer 1 (such as physical layer), second protocol layer 2 (such as media access control layer, radio link control layer, data packet aggregation layer, etc.) Implement different RAN network slices.
  • the implementation form of the specific RAN network slice is not limited herein, and may be implemented by atomization, modularization, or by software, instantiation, or the like.
  • the CN network slice is different according to the tenant and the service type, and the number of RAN network slices is small due to factors such as limited air interface resources.
  • the CN network slice and the RAN network slice are many-to-one or many-to-many. Relationships, extreme situations can reach a one-to-one ratio.
  • network slice selection is to select a suitable network slice for the UE, and associate the UE with a specific network slice, thereby establishing a control plane CP corresponding to the network slice. (control plane, CP) and / or user plane UP (user plane, UP) connection.
  • control plane, CP control plane
  • UP user plane
  • Network slicing can be regarded as a logically independent virtual network. Different network slicing needs to ensure the isolation requirement. Therefore, when the load of one network slice is too heavy, it is necessary to avoid negative impact on other network slicing, so the network slice based connection Incoming control can effectively ensure the isolation of network slices, so as to meet the business requirements signed by operators and network slicing customers, or the requirements of Service Level Agreement (SLA).
  • SLA Service Level Agreement
  • the access control may limit the proportion of the UE accessing the network, for example, designing an access restriction parameter, including an access factor, an access back-off, and the like, thereby limiting the network access of the UE proportionally.
  • an access restriction parameter including an access factor, an access back-off, and the like.
  • different access restriction parameters can be set for different services, thereby implementing service-specific access control, and restricting access of certain users according to different user access levels.
  • the LTE system supports multiple access control technologies, and the following implementation methods are known:
  • ABS Ordinary Access Barring Check
  • PLMN Public Land Mobile Network
  • EAB Extended Access Barring
  • ACDC Application Specific Congestion Control for Data Communication
  • SBC Service Specific Access Control
  • Multimedia Telephony Multimedia Telephony
  • the existing ABC scheme of LTE is applied to network slicing, that is, the RAN uses the CN network slice supported by the network as a separate ABC category, and broadcasts access control information applicable to each CN network slice, thereby implementing CN network slice access control; RAN broadcast CN network slice applicable access control information, such as CN network slice 1 access control information, CN network slice 2 access control information; UE reads system information in each CN network The slice access control information is combined with the CN network slice to initiate the connection, and the corresponding access control information is saved; the UE performs an access control check to determine whether a Radio Resource Control (RRC) connection request needs to be initiated.
  • RRC Radio Resource Control
  • the above technology only adds the category of the CN network slice based on the existing LTE.
  • the excessive number of CN network slices causes the technical overhead and the backward compatibility to be poor.
  • the CN may configure an access category applicable to the UE, and the configuration includes a mapping rule, for example, mapping the access level of the UE, the information of the CN network slice, the application, the service category, and the like to a specific access category ( Access category), which can be called the CN access category.
  • the CN access category may be understood as an index of the access control information corresponding to at least one factor (for example, an access level of the UE, information of at least one CN network slice, an application, a service category, and the like) included in the mapping rule.
  • the mapping rule may be sent by the CN to the UE through a non-access stratum (NAS) message, and is transmitted during registration or registration area update.
  • NAS non-access stratum
  • the mapping rules can be presented in the form of a table, as shown in Table 1 below.
  • the UE may trigger the network access, and according to the obtained configuration information, the configuration information may include a mapping rule, and determine the CN access category corresponding to the access.
  • the RAN indicates the CN access control information corresponding to the CN access category through the system message, for example, the access restriction ratio and the restricted time, or the bit map may be used to indicate whether the UE access needs to be restricted or the like.
  • the UE performs the access restriction check again, that is, before initiating the access attempt, the UE first uses the determined CN access category to determine whether the access can be initiated; if the UE determines that the access is not restricted, the access attempt is initiated.
  • the scheme is controlled by the CN, but the number of CN network slices is too large.
  • the NAS configuration table is too large and complex. High; and the CN network slice requested by the UE may be different from the CN network slice allocated by the network. For example, the CN network slice of a tenant requested by the UE is unavailable in the current area, and the CN allocates an identical CN network slice of another tenant that can be replaced or a CN network slice of the same service type.
  • the granularity of the RAN access control is different from that of the CN network slice, resulting in poor access control flexibility of the RAN based on the network slice.
  • FIG. 2A is a schematic diagram of a scenario applied to an embodiment of the present application.
  • the LTE system is used as an example.
  • the UE is located in the coverage of one or more cells (carriers) provided by the macro base station or the small base station, and the number of cells serving the UE may be one or more.
  • the UE may work according to carrier aggregation (CA) or dual connectivity (DC) or coordinated multiple point transmission (CoMP), at least one of which
  • the cell provides more than one air interface technology format, such as more than one transmission time interval (TTI), more than one subcarrier spacing width, more than one cyclic prefix length, etc. Transmission characteristics while providing wireless resources to the UE.
  • the present application is also applicable to a Universal Mobile Telecommunications System (UMTS) system, a Code Division Multiple Access (CDMA) system, a wireless local area network (WLAN), or a future 5G (the fifth generation). ) Wireless communication systems, etc.
  • UMTS Universal Mobile Telecommunications System
  • CDMA
  • FIG. 2B is a schematic structural diagram of a wireless communication system applied to an embodiment of the present application.
  • the first network device, the terminal device, and the second network device may be included.
  • the terminal device is described by using the UE, the first network device in the RAN, and the second network device as the CN.
  • the wireless communication system may include a Radio Access Network (RAN) device 110, a Core Network (CN) device 120, and a User Equipment (UE) 130.
  • RAN Radio Access Network
  • CN Core Network
  • UE User Equipment
  • the communication system of the embodiment of the present application supports a network slicing architecture in which core network network slices can share core network equipment and/or core network resources, and can also monopolize core network equipment and/or core network resources. As shown in FIG.
  • the UE 130 accesses one or more RAN network slices or CN network slices through the RAN device 110. Specifically, the RAN device 110 selects the AMF for the UE 130 according to the information provided by the UE 130 and the Access and Mobility Management Function (AMF) information configured or acquired.
  • AMF Access and Mobility Management Function
  • the first network device sends a first message to the terminal device, where the first message includes a first mapping rule, where the first mapping rule includes information of at least one RAN network slice; the first network device Sending access control information to the terminal device.
  • the terminal device may perform an access control check according to the received first mapping rule and the access control information.
  • the first mapping rule sent by the RAN to the UE includes information of at least one RAN network slice, which is compared with the prior art.
  • the configuration content of the first mapping rule in the embodiment of the present application is smaller and the complexity is relatively low. The problem that the CN network slice is more, which causes the NAS level table configuration to be too large and the complexity is too high.
  • the first mapping rule may further include a mapping relationship between the information of the at least one RAN network slice and the at least one RAN access category, or the first mapping rule further includes information about the at least one RAN network slice.
  • the mapping relationship of the at least one CN access category, or the first mapping rule may further include information of the at least one RAN network slice, a mapping relationship between the at least one RAN access category and the at least one CN access category.
  • the terminal device is described by using the UE, the first network device in the RAN, and the second network device as the CN.
  • FIG. 3 it is a schematic diagram of an embodiment of the method for access control in the embodiment of the present application, including:
  • the UE sends an uplink message to the CN.
  • the UE sends an uplink message to the CN through the RAN.
  • the uplink message may be a non-access stratum (NAS) message such as a registration request or a registration area update request. That is, the UE initiates a registration management request to the CN through the RAN (for example, the CN may be an access management function, an access, and a mobility management function, etc.), requesting the UE to register with the CN, and completing functions such as identity recognition, authentication, or registration area update.
  • NAS non-access stratum
  • the NAS message may be any uplink message related to registration management, and is not limited to NAS messages such as the above-mentioned registration request or registration area update request.
  • the uplink message may carry at least one network slice selection assistance information (NSSAI) allowed by the CN network, and is used to assist the CN to select, for the UE, information about the CN network slice suitable for accessing. .
  • NSSAI network slice selection assistance information
  • the CN acquires a first mapping rule, where the first mapping rule includes at least one CN access category.
  • the CN configures the CN access category applicable to the UE, and the first mapping rule is obtained, where the first mapping rule includes at least one CN access category.
  • the first mapping rule may include an access level of the UE, information of at least one CN network slice, an application, a service category, and the like, mapped to a specific access category, which may be referred to herein as a CN access category.
  • the CN access category may be understood as an index for finding access control information corresponding to at least one factor (eg, access level of the UE, information of at least one CN network slice, application, service category, etc.) included in the first mapping rule.
  • the CN access category may be indicated by a number, a letter, a byte, or the like, and is not specifically limited in the embodiment of the present application.
  • the first mapping rule may be presented in the form of a table, where the first mapping rule does not include information about at least one CN network slice, as shown in Table 2 below:
  • information about at least one CN network slice may be included, as shown in Table 3 below:
  • the first mapping rule includes at least one CN access category, and other factors may be greater or smaller than those shown in Tables 2 and 3 above.
  • the information of the at least one CN network slice may be represented by at least one network slice selection assistance information (NSSAI) allowed by the CN network.
  • NSSAI network slice selection assistance information
  • the network slice selection auxiliary information allowed by the CN network includes but is not limited to the following related information:
  • Network slice type for example, enhanced mobile broadband service (eMBB), ultra-reliable low-latency communication (URLLC), massive machine type communication (mMTC), etc.
  • eMBB enhanced mobile broadband service
  • URLLC ultra-reliable low-latency communication
  • mMTC massive machine type communication
  • the network slice type may refer to an end-to-end network slice type, including a RAN network slice type and a CN network slice type, and may also refer to a RAN network slice type, or a CN network slice type.
  • Service type related to a specific service, such as video service, car network service, voice service, etc., indicating service characteristics or specific service information.
  • Network slice differentiation The auxiliary network slice type and service type are used to further distinguish network slice information. It can be used to distinguish network slices under the same network slice type or service type.
  • Tenant information Used to indicate the customer information for creating or renting the network slice, such as Tencent, State Grid, etc.
  • User group information Group information for indicating that users are grouped according to certain characteristics, such as the level of the user.
  • Network slice instance information used to indicate the instance ID and feature information created for the network slice.
  • the network slice instance is assigned an identifier for indicating the network slice instance, and a new identifier may be mapped on the basis of the network slice instance identifier, and the network slice instance is associated with the identifier, and the receiver may identify the representative according to the identifier. Specific network slice instance.
  • DCN Dedicated Core Network identification
  • This identifier is used to uniquely indicate a proprietary core network, such as the core network of the Internet of Things.
  • the DCN identifier may be mapped to the network slice identifier, and the network slice identifier may be mapped by the DCN identifier, and the DCN identifier may also be mapped by using the network slice identifier.
  • the CN Allowed NSSAI list is determined in such a manner that the CN can select the UE according to factors such as the network slice selection assistance information (CN NSSAI) allowed by the UE, the UE subscription information, the local policy, and the availability of the network slice.
  • CN NSSAI network slice selection assistance information
  • Information of at least one CN network slice that is allowed to be accessed in the current registration area, the information of the at least one CN network slice may be presented in the form of a list, which may be referred to as a CN allowed NSSAI (CN Allowed NSSAI) list, or may be other The way is expressed, the specific is not limited.
  • the CN sends the first downlink message to the RAN.
  • the CN sends a first downlink message to the RAN, and the RAN receives the first downlink message from the CN.
  • the first downlink message may include a first mapping rule and a CN Allowed NSSAI list, where the first mapping rule includes at least one CN access category; or the first downlink message may include a first mapping rule, where the first mapping rule includes at least one The CN access category; or the first downlink message may include a CN Allowed NSSAI list.
  • the first downlink message may include the first mapping rule, and the CN Allowed NSSAI list may also be sent to the RAN by another downlink message.
  • the first downlink message may be a NAS message, and is sent to the RAN through the CN and the RAN interface.
  • the CN sends the first downlink message to the RAN through the N2 interface.
  • the RAN acquires a second mapping rule, where the second mapping rule includes information of at least one RAN network slice.
  • the RAN receives the first downlink message sent by the CN.
  • the first downlink message may include a first mapping rule and a CN Allowed NSSAI list, where the first mapping rule includes at least one CN access category; or the first downlink message may include a first mapping rule, where the first mapping rule includes at least one The CN access category; or the first downlink message may include a CN Allowed NSSAI list.
  • the RAN acquires a second mapping rule, where the second mapping rule includes information of at least one RAN network slice.
  • the first downlink message received by the RAN may include a first mapping rule, and another received downlink message may include a CN Allowed NSSAI list.
  • the information of the at least one RAN network slice has a mapping relationship with the CN Allowed NSSAI list
  • the second mapping rule may include the at least one RAN network slice.
  • the information is related to the CN Allowed NSSAI list; if the CN Allowed NSSAI list is not included in the downlink message received by the RAN, the information of the at least one RAN network slice is mapped to the currently available CN network slice information, and the second mapping is performed.
  • the rules may include information of the at least one RAN network slice and information of currently available CN network slices.
  • the RAN saves the mapping relationship between the information of the preset RAN network slice and the information of the CN network slice.
  • the mapping relationship may be pre-configured by the network management or through the CN device through the interface information between the CN and the RAN. Configuration.
  • the information of one or more CN network slices may correspond to information of a RAN network slice, as shown in Table 4 below:
  • RAN Network slice access network network slice information CN Network slice, core network network slice information 1 1,2 2 3,4 3 5,6,7,8 4 9,10,11,12 5 13,14 6 15,16 7 17,18,19 8 20, 21, 22 9 23,24 10 25,26
  • the second mapping rule may be found according to the mapping relationship between the preset RAN network slice information and the CN network slice information, as shown in Table 4 above.
  • the information of the at least one RAN network slice corresponding to the allowed NSSAI list is used as the second mapping rule.
  • the information of the at least one RAN network slice is mapped to a specific access category, which may be referred to as a RAN access category.
  • the access category may use a RAN network slice ID or a new access category to determine a second mapping rule.
  • the RAN access category may be understood as an index for finding access control information corresponding to at least one factor (for example, information of at least one RAN network slice, etc.) included in the second mapping rule.
  • the CN Allowed NSSAI list is a representation of information of at least one CN network slice allowed to be accessed in the current registration area of the UE, so the CN Allowed NSSAI list is at least one CN network.
  • the sliced information for example: CN Allowed NSSAI list is shown in Table 5:
  • 9, 17, and 20 may be identifiers of CN network slices, or may be network slice type, service type, network slice division, tenant information, user group information, network slice instance information, and proprietary core network. Indicators and other indications are used to distinguish different CN network slices, which are not limited.
  • the second mapping rule may include information of at least one RAN network slice, and the information of the at least one RAN network slice is found through the list shown in Table 5 in the above Table 4, because CN
  • the Allowed NSSAI list is information of at least one CN network slice, so it can be searched by the mapping relationship between the preset RAN network slice information and the CN network slice information.
  • the information of the RAN network slice may be indicated by the RAN network slice identifier, as follows:
  • the UE may perform an access control check according to information of at least one RAN network slice, because the information of the RAN network slice is generally one-to-many relationship with the CN network slice information, so the second mapping
  • the configuration content of the rule is smaller than the existing configuration content, and the complexity is low. Control of the RAN network slice granularity is also achieved.
  • the situation that the information of the CN network slice requested by the UE is inconsistent with the information of the CN network slice allocated by the CN is also solved, because the information of the different CN network slices of the same service type is mapped in the RAN network, and the information of the RAN network slice is the same in most cases. .
  • the second mapping rule may include a mapping relationship between information of at least one RAN network slice and at least one RAN access category, as follows:
  • the UE may perform access control check according to information of at least one RAN network slice or at least one RAN access category, which improves the selectivity and flexibility of the technical solution of the present application. Because the information of the RAN network slice is generally one-to-many relationship with the information of the CN network slice, the configuration content of the second mapping rule is smaller than the existing configuration content, and the complexity is low. The control of the RAN network slice granularity is realized.
  • the situation that the information of the CN network slice requested by the UE is inconsistent with the information of the CN network slice allocated by the CN is also solved, because the information of the different CN network slices of the same service type is mapped in the RAN network, and the information of the RAN network slice is the same in most cases. .
  • the second mapping rule may include a mapping relationship between information of at least one RAN network slice and information of at least one CN network slice, as follows:
  • the UE may perform an access control check of the RAN network slice according to the information of the at least one RAN network slice, or may perform an access control check of the CN network slice according to the information of the at least one CN network slice.
  • the selectivity and flexibility of the technical solution of the present application are improved. Because the information of the RAN network slice is generally one-to-many relationship with the information of the CN network slice, the configuration content of the second mapping rule is smaller than the existing configuration content, and the complexity is low. The control of the RAN network slice granularity is realized.
  • the situation that the information of the CN network slice requested by the UE is inconsistent with the information of the CN network slice allocated by the CN is also solved, because the information of the different CN network slices of the same service type is mapped in the RAN network, and the information of the RAN network slice is the same in most cases. .
  • the second mapping rule may include information of at least one RAN network slice, information of at least one CN network slice, and a mapping relationship of at least one RAN access category, as follows:
  • the UE may perform an access control check of the RAN network slice according to the information of the at least one RAN network slice, or may perform an access control check of the CN network slice according to the information of the at least one CN network slice.
  • the access control check of the RAN network slice may be performed according to the at least one RAN access category, which improves the selectivity and flexibility of the technical solution of the present application. Because the information of the RAN network slice is generally one-to-many relationship with the information of the CN network slice, the configuration content of the second mapping rule is smaller than the existing configuration content, and the complexity is low. The control of the RAN network slice granularity is realized.
  • the situation that the information of the CN network slice requested by the UE is inconsistent with the information of the CN network slice allocated by the CN is also solved, because the information of the different CN network slices of the same service type is mapped in the RAN network, and the information of the RAN network slice is the same in most cases. .
  • At least one RAN network slice information may be associated with at least one RAN access category, or a CN Allowed NSSAI list, or a CN Allowed NSSAI list and At least one RAN access category has a mapping relationship, but the second mapping rule may also not include at least one RAN access category, or a CN Allowed NSSAI list, or a CN Allowed NSSAI list and at least one RAN access category, The RAN knows their mapping relationship, which is not limited.
  • the second mapping rule may be found according to the mapping relationship between the preset RAN network slice information and the CN network slice information, as shown in Table 4 above.
  • the current RAN or the information of the at least one CN network slice allowed by the entire network that is, the information of the at least one RAN network slice corresponding to the currently available CN network slice information is used as the second mapping rule.
  • the information of the at least one RAN network slice is mapped to a specific access category, which may be referred to as a RAN access category.
  • the access category may use a RAN network slice identifier (NSRPI), or a new access category may be used to determine the second mapping rule.
  • the RAN access category may be understood as an index that searches for access control information corresponding to at least one factor (eg, information of at least one RAN network slice, etc.) included in the second mapping rule.
  • the second mapping rule may include information of at least one RAN network slice, or may include information of at least one RAN network slice and at least one RAN.
  • a mapping relationship of the access category or may include a mapping relationship between information of the at least one RAN network slice and information of the at least one CN network slice, or may include information of at least one RAN network slice, information of at least one CN network slice, and A mapping relationship of at least one RAN access category.
  • the determined information of the at least one CN network slice is determined by the RAN according to information of the currently available CN network slice, and the determined quantity of information of the at least one CN network slice may be The number of pieces of information of at least one CN network slice determined by the manner of (1) above.
  • the RAN is information of at least one CN network slice determined according to information of currently available CN network slices.
  • the information of the at least one RAN network slice may be related to at least one RAN access category, or the information of the currently available CN network slice, or the currently available CN.
  • the information of the network slice has a mapping relationship with the at least one RAN access category, but the second mapping rule may also not include at least one RAN access category, information of the currently available CN network slice, or the currently available CN network.
  • the sliced information, and at least one RAN access category are not specifically limited.
  • the information of the at least one RAN network slice mentioned above, the information of the at least one CN network slice, the at least one CN access category, and other factors may also be included.
  • the specific is not limited.
  • the information of at least one RAN network slice may be represented by a self-defined identifier that has a mapping relationship with at least one CN network slice, and may also use a RAN network slice identifier and a RAN network slice type.
  • Information, RAN service type, RAN network slice classification, RAN tenant information, RAN network slice instance information, etc. are used to distinguish different RAN network slices, which are not limited.
  • the RAN only plays the role of forwarding, that is, the first mapping rule is forwarded to the UE.
  • the RAN access category may be indicated by a number, a letter, a byte, etc., and is not specifically limited in the embodiment of the present application.
  • the RAN sends the second downlink message to the UE, where the second downlink message includes a second mapping rule.
  • the RAN may send second downlink information to the UE, where the second downlink information includes a second mapping rule, where the second mapping rule includes information of at least one RAN network slice.
  • the UE receives the second downlink message from the RAN.
  • the second downlink message may be an AS message such as a radio resource control (RRC).
  • RRC radio resource control
  • the second downlink message may further include a first mapping rule, where the first mapping rule includes at least one CN access category, or the RAN sends the first mapping rule to the UE by using another downlink message, where the first mapping rule may be Refer to Table 2 and Table 3 above for details, and details are not described here.
  • the UE determines information about at least one RAN network slice according to the second mapping rule.
  • the UE receives the second downlink message sent by the RAN, where the second downlink message includes a second mapping rule, where the second mapping rule includes information of at least one RAN network slice.
  • the second mapping rule reference may be made to any of the foregoing Table 6, Table 7, Table 8, and Table 9, and details are not described herein again.
  • the second mapping rule includes a first mapping rule, or the UE receives another downlink message, and the other downlink message includes a first mapping rule, where the first mapping rule includes at least one CN access category.
  • the RAN sends the access control information to the UE.
  • the RAN sends RAN access control information to the UE, and the UE receives RAN access control information from the RAN.
  • the RAN access control information may be access control information of information of all RAN network slices, or may be access control information of information of at least one RAN network slice.
  • the RAN sends CN access control information to the UE, and the UE receives CN access control information from the RAN.
  • the CN access control information may be access control information of information of all CN network slices, or may be access control information of information of at least one CN network slice.
  • the UE performs access control according to the second mapping rule and the access control information.
  • the UE may perform an access restriction check according to the second mapping rule and the RAN access control information. Before initiating an access attempt, the UE may perform ABC according to information of at least one RAN network slice or access control information corresponding to at least one RAN access category, thereby determining whether an access or service request can be initiated.
  • the corresponding access control information has an access restriction timer. If the access restriction timer set by the RAN network slice is running, the terminal device determines that the network access request or the service request cannot be initiated. Otherwise, the terminal device uses a random number algorithm to select a uniformly distributed random number between 0 and 1. If the random number is smaller than the corresponding access restriction factor in the access control information, the terminal device determines that the RAN network slice can be If the random number is greater than or equal to the corresponding access restriction factor, the terminal device determines that the RAN network slice is not accessible, and the terminal device starts an access restriction timer corresponding to the RAN network slice, for example, The timing of the access restriction timer may be (0.7+0.6* random number)* access restriction time.
  • the RAN access control information includes a bit map, and different bits of the bit map correspond to different RAN network slice information or different RAN access categories. For example, the corresponding bit number value is “0”, indicating that the network slice access request or service request can be initiated, otherwise it cannot be initiated.
  • the specific ABC mechanism can also refer to any ABC applicable to the LTE system or the 5G system, which is not limited herein. If not, the UE initiates an access attempt or service request to the first RAN network slice.
  • the UE may perform an access restriction check according to the first mapping rule and the CN access control information.
  • the UE may perform ABC according to information of at least one RAN network slice or access control information corresponding to at least one RAN access category, thereby determining whether an access or service request can be initiated.
  • the specific ABC mechanism can refer to any ABC applicable to the LTE system or the 5G system, which is not limited herein. If not restricted, the UE may initiate an access attempt or service request to the first CN network slice.
  • the access control check performed by the RAN according to the second mapping rule and the access control information includes, but is not limited to, the two possible implementation manners mentioned above, and the other is performed according to the second mapping rule and the access control information.
  • the manner in which the control check is entered is also within the scope of protection of the present application.
  • the RAN sends a second downlink message to the UE, where the second downlink message includes a second mapping rule, where the second mapping rule includes information of at least one RAN network slice; and the RAN sends the information to the UE.
  • the RAN accesses control information. It should be noted that the second mapping rule determined by the RAN has nothing to do with the first mapping rule sent by the RAN to receive the CN.
  • the UE may initiate an access request to the information of the first RAN network slice in the information of the at least one RAN network slice according to the RAN access control information.
  • the second mapping rule sent by the RAN to the UE includes information of at least one RAN network slice, which is compared with the prior art.
  • the configuration of the second mapping rule in the embodiment of the present application is smaller and the complexity is relatively low.
  • the problem of CN network slicing is solved, which causes the NAS level table configuration to be too large and the complexity is too high.
  • the information of the CN network slice requested by the UE is inconsistent with the information of the CN network slice allocated by the CN, because information of different CN network slices of the same service type is mapped to the RAN network slice information of the RAN. identical.
  • the access control of the RAN based on the RAN network slice granularity is also implemented.
  • FIG. 4 is a schematic diagram of another embodiment of an access control method according to an embodiment of the present application, including:
  • the UE sends an uplink message to the CN.
  • the CN acquires a first mapping rule.
  • steps 401 and 402 are similar to steps 301 and 302 shown in FIG. 3 above, and details are not described herein again.
  • the CN sends the first downlink message to the RAN, where the first downlink message includes a first mapping rule.
  • the CN sends a first downlink message to the RAN, and the RAN receives the first downlink message from the CN.
  • the first downlink message includes a first mapping rule, and the first mapping rule includes at least one CN access category, which can be referred to the foregoing Table 2 and Table 3, and details are not described herein again.
  • the first downlink message may further include a CN Allowed NSSAI list, or the CN sends the CN Allowed NSSAI list to the RAN by using another downlink message.
  • the first downlink message may be a NAS message, and is sent to the RAN through the CN and the RAN interface.
  • the CN sends the first downlink message to the RAN through the N2 interface.
  • the CN Allowed NSSAI list is determined in such a manner that the CN can select the UE according to factors such as the network slice selection assistance information (CN NSSAI) allowed by the UE, the UE subscription information, the local policy, and the availability of the network slice.
  • CN NSSAI network slice selection assistance information
  • Information of at least one CN network slice that is allowed to be accessed in the current registration area, the information of the at least one CN network slice may be presented in the form of a list, which may be referred to as a CN allowed NSSAI (CN Allowed NSSAI) list, or may be other The way is expressed, the specific is not limited.
  • the RAN acquires a second mapping rule, where the second mapping rule includes information of at least one RAN network slice.
  • the RAN receives the first downlink message sent by the CN.
  • the first downlink message includes a first mapping rule, and the first mapping rule includes at least one CN access category.
  • the first downlink message may further include a CN Allowed NSSAI list, or the RAN receives another CN downlinked NSSAI list.
  • the RAN acquires a second mapping rule, where the second mapping rule includes information of at least one RAN network slice.
  • the information of the at least one RAN network slice has a mapping relationship with the CN Allowed NSSAI list
  • the second mapping rule may include the at least one RAN network slice.
  • the information is related to the CN Allowed NSSAI list; if the CN Allowed NSSAI list is not included in the downlink message received by the RAN, the information of the at least one RAN network slice is mapped to the currently available CN network slice information, and the second mapping is performed.
  • the rules may include information of the at least one RAN network slice and information of currently available CN network slices.
  • the second mapping rule may add information of at least one RAN network slice to the first mapping rule, or the second mapping rule is determined by the RAN according to the first mapping rule and the CN Allowed NSSAI list, or The second mapping rule is determined by the RAN according to the first mapping rule and the information of the currently available CN network slice.
  • the RAN saves the mapping relationship between the information of the preset RAN network slice and the information of the CN network slice.
  • the mapping relationship may be pre-configured by the network management or through the CN device through the interface information between the CN and the RAN. Configuration.
  • the information of one or more CN network slices may correspond to information of one RAN network slice, as shown in Table 10 below:
  • RAN Network slice access network network slice information CN Network slice, core network network slice information 1 1,2 2 3,4 3 5,6,7,8 4 9,10,11,12 5 13,14 6 15,16 7 17,18,19 8 20, 21, 22 9 23,24 10 25,26
  • the CN Allowed NSSAI list is a representation of information of at least one CN network slice allowed to be accessed in the current registration area of the UE, so the CN Allowed NSSAI list is at least one CN.
  • the network slice information for example: CN Allowed NSSAI list is shown in Table 11:
  • 9, 17, and 20 may be identifiers of CN network slices, or may be network slice type, service type, network slice division, tenant information, user group information, network slice instance information, and proprietary core network. Indicators and other indications are used to distinguish different CN network slices, which are not limited.
  • the RAN may find the information of the corresponding at least one RAN network slice in the foregoing table 10 according to the CN Allowed NSSAI list, and the second mapping
  • the rule adds information of at least one RAN network slice to the first mapping rule.
  • the second mapping rule may include but is not limited to the following forms, as follows:
  • the second mapping rule adds information of at least one RAN network slice based on the first mapping rule
  • the second mapping rule may be as shown in Table 12 below:
  • the UE may perform an access control check according to information of at least one RAN network slice or at least one CN access category, because the information of the RAN network slice is generally paired with the information of the CN network slice.
  • the relationship between the RAN network slice granularity and the information of the CN network slice requested by the UE is inconsistent with the information of the CN network slice allocated by the CN, because the information mapping of different CN network slices of the same service type is The information of the RAN's RAN network slice is mostly the same.
  • the second mapping rule adds at least one RAN network slice information and at least one RAN access class generation based on the first mapping rule.
  • the RAN access category may be understood as an index for finding access control information corresponding to at least one factor (for example, information of at least one RAN network slice, etc.) included in the second mapping rule.
  • the information of at least one RAN network slice may be mapped to a specific access category, which may be referred to as a RAN access category.
  • the second mapping rule can be as shown in Table 13 below:
  • the UE may perform access control check of the RAN network slice according to at least one RAN network slice, or may perform RAN network slice access control check according to at least one RAN access category, or may be according to at least one CN access category. Perform an access control check of the RAN network slice. Because the information of the RAN network slice is generally one-to-many relationship with the information of the CN network slice, the control of the RAN network slice granularity is implemented, and the information of the CN network slice requested by the UE is inconsistent with the information of the CN network slice allocated by the CN. In the case, since the information of different CN network slices of the same service type is mapped in the RAN, the information of the RAN network slice is the same in most cases.
  • the second mapping rule adds at least one RAN network slice information and at least one CN network slice corresponding to the CN NSSAI list on the basis of the first mapping rule. Then the second mapping rule can be as shown in Table 14 below:
  • the UE may perform an access control check of the RAN network slice according to the information of the at least one RAN network slice, or may perform an access control check of the CN network slice according to the information of the at least one CN network slice.
  • the selectivity and flexibility of the technical solution of the present application are improved.
  • the control of the RAN network slice granularity is also implemented, and the information of the CN network slice requested by the UE is inconsistent with the information of the CN network slice allocated by the CN, because the information of different CN network slices of the same service type is mapped in the RAN RAN network.
  • the sliced information is mostly the same.
  • the second mapping rule adds at least one RAN network slice information, at least one RAN access category, and at least one CN network slice corresponding to the CN NSSAI list on the basis of the first mapping rule.
  • the RAN access category may be understood as an index for finding access control information corresponding to at least one factor (for example, information of at least one RAN network slice, etc.) included in the second mapping rule.
  • the information of at least one RAN network slice may be mapped to a specific access category, which may be referred to as a RAN access category.
  • the second mapping rule can be as shown in Table 15 below:
  • the UE may perform an access control check of the RAN network slice according to the information of the at least one RAN network slice, or may perform an access control check of the CN network slice according to the information of the at least one CN network slice.
  • the access control check of the RAN network slice may be performed according to the at least one RAN access category, or the access control check of the CN network slice may be performed according to the at least one CN access category, which improves the technical solution of the present application.
  • Optional and flexible are examples of the access control check of the RAN network slice according to the information of the at least one RAN network slice.
  • the control of the RAN network slice granularity is also implemented, and the information of the CN network slice requested by the UE is inconsistent with the information of the CN network slice allocated by the CN, because the information of different CN network slices of the same service type is mapped in the RAN RAN network.
  • the sliced information is mostly the same.
  • the second mapping rule adds information of at least one RAN network slice based on the first mapping rule
  • the second mapping rule may be as shown in Table 16 below:
  • the UE may perform an access control check of the RAN network slice according to the information of the at least one RAN network slice, or may perform the CN network according to the information of the at least one CN network slice or the at least one CN network slice information.
  • the access control check of the slice improves the selectivity and flexibility of the technical solution of the present application.
  • the control of the RAN network slice granularity is also implemented, and the information of the CN network slice requested by the UE is inconsistent with the information of the CN network slice allocated by the CN, because the information of different CN network slices of the same service type is mapped in the RAN RAN network.
  • the sliced information is mostly the same.
  • the second mapping rule adds at least one RAN network slice information and at least one RAN access class generation based on the first mapping rule.
  • the RAN access category may be understood as an index for finding access control information corresponding to at least one factor (for example, information of at least one RAN network slice, etc.) included in the second mapping rule.
  • the information of at least one RAN network slice may be mapped to a specific access category, which may be referred to as a RAN access category.
  • the second mapping rule can be as shown in Table 17 below:
  • the UE may perform an access control check of the RAN network slice according to the information of the at least one RAN network slice, or may perform an access control check of the CN network slice according to the information of the at least one CN network slice.
  • the access control check of the RAN network slice may be performed according to the at least one RAN access category, or the access control check of the CN network slice may be performed according to the at least one CN access category, which improves the technical solution of the present application.
  • Optional and flexible are examples of the access control check of the RAN network slice according to the information of the at least one RAN network slice.
  • the control of the RAN network slice granularity is also implemented, and the information of the CN network slice requested by the UE is inconsistent with the information of the CN network slice allocated by the CN, because the information of different CN network slices of the same service type is mapped in the RAN RAN network.
  • the sliced information is mostly the same.
  • the RAN may find the corresponding at least one RAN network slice in the foregoing table 10 according to the information of the currently available CN network slice.
  • the second mapping rule adds information of at least one RAN network slice to the first mapping rule. Then, the obtained second mapping rule can be referred to any one of the foregoing implementations of Table 12-17, and details are not described herein again.
  • the second mapping rule is determined by the RAN according to the first mapping rule and the CN Allowed NSSAI list.
  • the second mapping rule may include the implementation manner of any of the foregoing 12-17, but is not limited to the foregoing implementation manners, and may also include other implementation manners, as follows:
  • the second mapping rule may include information of at least one RAN network slice.
  • the UE may perform an access control check according to information of at least one RAN network slice, because the information of the RAN network slice is generally one-to-many relationship with the CN network slice information, so the second mapping
  • the configuration content of the rule is smaller than the existing configuration content, and the complexity is low. Control of the RAN network slice granularity is also achieved.
  • the second mapping rule may include a mapping relationship between information of at least one RAN network slice and at least one RAN access category.
  • the UE may perform access control check according to information of at least one RAN network slice or at least one RAN access category, which improves the selectivity and flexibility of the technical solution of the present application, because the RAN network slice
  • the information is generally one-to-many relationship with the CN network slice information. Therefore, the configuration content of the second mapping rule is smaller than the existing configuration content, and the complexity is low. Control of the RAN network slice granularity is also achieved.
  • the second mapping rule may include a mapping relationship between information of at least one RAN network slice and information of at least one CN network slice.
  • the UE may perform an access control check of the RAN network slice according to the information of the at least one RAN network slice, or may perform an access control check of the CN network slice according to the information of the at least one CN network slice.
  • the optionalness and flexibility of the technical solution of the present application are improved, because the information of the RAN network slice is generally one-to-many relationship with the information of the CN network slice, so the configuration content of the second mapping rule is smaller than the existing configuration content.
  • the complexity is low. Control of the RAN network slice granularity is also achieved.
  • the second mapping rule may include information of at least one RAN network slice, information of at least one CN network slice, and a mapping relationship of at least one RAN access category.
  • the UE may perform an access control check of the RAN network slice according to the information of the at least one RAN network slice, or may perform an access control check of the CN network slice according to the information of the at least one CN network slice.
  • the access control check of the RAN network slice may be performed according to the at least one RAN access category, which improves the selectivity and flexibility of the technical solution of the present application, because the information of the RAN network slice is generally one of the information of the CN network slice.
  • the configuration content of the second mapping rule is smaller than the existing configuration content, and the complexity is low. Control of the RAN network slice granularity is also achieved.
  • At least one RAN network slice information may be associated with at least one RAN access category, or a CN Allowed NSSAI list, or a CN Allowed NSSAI list and At least one RAN access category, or at least one CN access category, or at least one CN access category and at least one RAN access category, or at least one CN access category and a CN Allowed NSSAI list, a mapping relationship exists
  • the second mapping rule may also not include at least one RAN access category, or a CN Allowed NSSAI list, or a CN Allowed NSSAI list and at least one RAN access category, or at least one CN access category,
  • the at least one CN access category and the at least one RAN access category, or at least one CN access category and the CN Allowed NSSAI list the RAN knows their mapping relationship, which is not limited.
  • the second mapping rule is determined by the RAN according to the first mapping rule and the information of the currently available CN network slice.
  • the second mapping rule may refer to the implementation manner of any of the foregoing 12-21, but is not limited to the foregoing implementation manners.
  • at least one information of the CN network slice is determined by The CN Allowed NSSAI list is determined, and if the RAN does not receive the CN Allowed NSSAI list, it is determined based on the currently available CN network slice information.
  • the information of at least one RAN network slice may be represented by a self-defined identifier that has a mapping relationship with at least one CN network slice, and may also use a RAN network slice identifier and a RAN network slice type.
  • Information, RAN service type, RAN network slice classification, RAN tenant information, RAN network slice instance information, etc. are used to distinguish different RAN network slices, which are not limited.
  • the first downlink message includes the first mapping rule
  • the RAN reads the content of the first mapping rule, and then generates the second mapping rule, and then forwards the second mapping rule to the UE.
  • the RAN access category may be indicated by a number, a letter, a byte, etc., and is not specifically limited in the embodiment of the present application.
  • the RAN sends the second downlink message to the UE.
  • the RAN may send second downlink information to the UE, where the second downlink information includes a second mapping rule, where the second mapping rule includes information of at least one RAN network slice.
  • the UE receives the second downlink message from the RAN.
  • the second downlink message may be an AS message such as a radio resource control (RRC).
  • RRC radio resource control
  • the second downlink message may further include a first mapping rule, where the first mapping rule includes at least one CN access category, or the RAN sends the first mapping rule to the UE by using another downlink message, where the first mapping rule may be Refer to Table 2 and Table 3 above for details, and details are not described here.
  • the UE determines information about at least one RAN network slice according to the second mapping rule.
  • the UE receives the second downlink message sent by the RAN, where the second downlink message includes a second mapping rule, where the second mapping rule includes information of at least one RAN network slice.
  • the second mapping rule refer to any of the foregoing Tables 12-20, and details are not described herein again.
  • the second mapping rule includes a first mapping rule, or the UE receives another downlink message, and the other downlink message includes a first mapping rule, where the first mapping rule includes at least one CN access category.
  • the RAN sends the access control information to the UE.
  • the RAN sends RAN access control information to the UE, and the UE receives RAN access control information from the RAN.
  • the RAN access control information may be access control information of information of all RAN network slices, or may be access control information of information of at least one RAN network slice.
  • the RAN sends CN access control information to the UE, and the UE receives CN access control information from the RAN.
  • the CN access control information may be access control information of information of all CN network slices, or may be access control information of information of at least one CN network slice.
  • the UE performs access control according to the second mapping rule and the access control information.
  • the UE may perform an access restriction check according to the second mapping rule and the RAN access control information. Before initiating an access attempt, the UE may perform ABC according to information of at least one RAN network slice or access control information corresponding to at least one RAN access category, thereby determining whether an access or service request can be initiated.
  • the corresponding access control information has an access restriction timer. If the access restriction timer set by the RAN network slice is running, the terminal device determines that the network access request or the service request cannot be initiated. Otherwise, the terminal device uses a random number algorithm to select a uniformly distributed random number between 0 and 1. If the random number is smaller than the corresponding access restriction factor in the access control information, the terminal device determines that the RAN network slice can be If the random number is greater than or equal to the corresponding access restriction factor, the terminal device determines that the RAN network slice is not accessible, and the terminal device starts an access restriction timer corresponding to the RAN network slice, for example, The timing of the access restriction timer may be (0.7+0.6* random number)* access restriction time.
  • the RAN access control information includes a bit map, and different bits of the bit map correspond to different RAN network slice information or different RAN access categories. For example, the corresponding bit number value is “0”, indicating that the network slice access request or service request can be initiated, otherwise it cannot be initiated.
  • the specific ABC mechanism can also refer to any ABC applicable to the LTE system or the 5G system, which is not limited herein. If not, the UE initiates an access attempt or service request to the first RAN network slice.
  • the UE may perform an access restriction check according to the first mapping rule and the CN access control information.
  • the UE may perform ABC according to information of at least one RAN network slice or access control information corresponding to at least one RAN access category, thereby determining whether an access or service request can be initiated.
  • the specific ABC mechanism can refer to any ABC applicable to the LTE system or the 5G system, which is not limited herein. If not restricted, the UE may initiate an access attempt or service request to the first CN network slice.
  • the access control check performed by the RAN according to the second mapping rule and the access control information includes, but is not limited to, the two possible implementation manners mentioned above, and the other is performed according to the second mapping rule and the access control information.
  • the manner in which the control check is entered is also within the scope of protection of the present application.
  • the RAN sends a second downlink message to the UE, where the second downlink message includes a second mapping rule, where the second mapping rule includes information of at least one RAN network slice; and the RAN sends the information to the UE.
  • the RAN accesses control information.
  • the second mapping rule determined by the RAN is related to the first mapping rule sent by the RAN to the CN.
  • the UE may initiate an access request to the information of the first RAN network slice in the information of the at least one RAN network slice according to the RAN access control information.
  • the second mapping rule sent by the RAN to the UE includes information of at least one RAN network slice, which is compared with the prior art.
  • the configuration of the second mapping rule in the embodiment of the present application is smaller and the complexity is relatively low.
  • the problem of CN network slicing is solved, which causes the NAS level table configuration to be too large and the complexity is too high.
  • the information of the CN network slice requested by the UE is inconsistent with the information of the CN network slice allocated by the CN, because information of different CN network slices of the same service type is mapped to the RAN network slice information of the RAN. identical.
  • the access control of the RAN based on the RAN network slice granularity is also implemented.
  • FIG. 5A is a schematic diagram of an embodiment of the network device in the embodiment of the present application.
  • Can include:
  • the first sending module 501 is configured to send a first message to the terminal device, where the first message includes a first mapping rule, where the first mapping rule includes information of at least one radio access network network slice;
  • the second sending module 502 is configured to send access control information to the terminal device.
  • first sending module and the second sending module may be logically disposed separately or in the same module.
  • the first mapping rule and the access control information are used to perform access control on the terminal device.
  • the network device may further include:
  • the receiving module 503 is configured to receive a second message from the second network device, where the second message includes a second mapping rule, where the second mapping rule includes an access category applicable to the terminal configured by the at least one core network, where The first mapping rule further includes a mapping relationship between information of the at least one radio access network network slice and an access category applicable to the terminal configured by the at least one core network;
  • the receiving module 503 is configured to receive a second message from the second network device, where the second message includes a network-selected network slice selection assistance information Allowed NSSAI list configured by the core network, where the first mapping rule further includes the a mapping relationship between information of at least one radio access network network slice and an Allowed NSSAI list configured by the core network;
  • the receiving module 503 is configured to receive a second message from the second network device, where the second message includes a second mapping rule and a network-selected network slice selection assistance information Allowed NSSAI list configured by the core network, the second mapping The rule includes an access category applicable to the terminal configured by the at least one core network, where the first mapping rule further includes information of the at least one radio access network network slice, and an access category applicable to the terminal configured by the at least one core network. A mapping relationship with the Allowed NSSAI list of the core network configuration.
  • the first mapping rule further includes a mapping relationship between information of the at least one radio access network network slice and currently available network slice selection assistance information.
  • the first mapping rule further includes a mapping relationship between information of the at least one radio access network network slice and at least one radio access network access category.
  • a schematic diagram of an embodiment of a terminal device in the embodiment of the present application may include:
  • the first receiving module 601 is configured to receive a first message from the first network device, where the first message includes a first mapping rule, where the first mapping rule includes information of at least one radio access network network slice;
  • the second receiving module 602 receives the access control information from the first network device.
  • first receiving module and the second receiving module may be logically disposed separately or in the same module.
  • FIG. 6B which is a schematic diagram of another embodiment of the terminal device in the embodiment of the present application, the terminal device further includes:
  • the processing module 603 is configured to perform access control according to the first mapping rule and the access control information.
  • the first mapping rule further includes a mapping relationship between information of the at least one radio access network network slice and at least one radio access network access category.
  • the first mapping rule further includes a mapping relationship between information of the at least one radio access network network slice and an access category applicable to the terminal configured by the at least one core network.
  • FIG. 7 is a schematic diagram of another embodiment of a network device according to an embodiment of the present application, including:
  • the network device may vary considerably depending on configuration or performance, and may include one or more central processing units (CPU) 722 (eg, one or more processors) and memory 732, one or one
  • the storage medium 730 (for example, one or one of the Shanghai quantity storage devices) storing the application 742 or the data 744 above.
  • the memory 732 and the storage medium 730 may be short-term storage or persistent storage.
  • the program stored on storage medium 730 may include one or more modules (not shown), each of which may include a series of instruction operations in the network device.
  • central processor 722 can be configured to communicate with storage medium 730, executing a series of instruction operations in storage medium 730 on the network device.
  • the network device may also include one or more power sources 726, one or more wired or wireless network interfaces 750, one or more input and output interfaces 758, and/or one or more operating systems 741, such as Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM and more.
  • operating systems 741 such as Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM and more.
  • the steps performed by the network device in the above embodiments may be based on the network device structure shown in FIG.
  • FIG. 8 is a schematic diagram of another embodiment of a network device in an embodiment of the present application.
  • the terminal device may be any terminal device including a mobile phone, a tablet computer, a PDA (Personal Digital Assistant), a POS (Point of Sales), an in-vehicle computer, and the terminal device is used as a mobile phone as an example:
  • FIG. 8 is a block diagram showing a partial structure of a mobile phone related to a terminal device provided by an embodiment of the present application.
  • the mobile phone includes: a radio frequency (RF) circuit 810, a memory 820, an input unit 830, a display unit 840, a sensor 850, an audio circuit 860, a wireless fidelity (WiFi) module 870, and a processor 880. And power supply 890 and other components.
  • RF radio frequency
  • the RF circuit 810 can be used for receiving and transmitting signals during the transmission or reception of information or during a call. Specifically, after receiving the downlink information of the base station, it is processed by the processor 880. In addition, the uplink data is designed to be sent to the base station. Generally, RF circuit 810 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a Low Noise Amplifier (LNA), a duplexer, and the like. In addition, RF circuitry 810 can also communicate with the network and other devices via wireless communication. The above wireless communication may use any communication standard or protocol, including but not limited to Global System of Mobile communication (GSM), General Packet Radio Service (GPRS), Code Division Multiple Access (Code Division). Multiple Access (CDMA), Wideband Code Division Multiple Access (WCDMA), Long Term Evolution (LTE), E-mail, Short Messaging Service (SMS), and the like.
  • GSM Global System of Mobile communication
  • GPRS General Packet Radio Service
  • the memory 820 can be used to store software programs and modules, and the processor 880 executes various functional applications and data processing of the mobile phone by running software programs and modules stored in the memory 820.
  • the memory 820 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application required for at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may be stored according to Data created by the use of the mobile phone (such as audio data, phone book, etc.).
  • memory 820 can include high speed random access memory, and can also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
  • the input unit 830 can be configured to receive input numeric or character information and to generate key signal inputs related to user settings and function controls of the handset.
  • the input unit 830 may include a touch panel 831 and other input devices 832.
  • the touch panel 831 also referred to as a touch screen, can collect touch operations on or near the user (such as the user using a finger, a stylus, or the like on the touch panel 831 or near the touch panel 831. Operation), and drive the corresponding connecting device according to a preset program.
  • the touch panel 831 can include two parts: a touch detection device and a touch controller.
  • the touch detection device detects the touch orientation of the user, and detects a signal brought by the touch operation, and transmits the signal to the touch controller; the touch controller receives the touch information from the touch detection device, converts the touch information into contact coordinates, and sends the touch information.
  • the processor 880 is provided and can receive commands from the processor 880 and execute them.
  • the touch panel 831 can be implemented in various types such as resistive, capacitive, infrared, and surface acoustic waves.
  • the input unit 830 may also include other input devices 832.
  • other input devices 832 may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control buttons, switch buttons, etc.), trackballs, mice, joysticks, and the like.
  • the display unit 840 can be used to display information input by the user or information provided to the user as well as various menus of the mobile phone.
  • the display unit 840 can include a display panel 841.
  • the display panel 841 can be configured in the form of a liquid crystal display (LCD), an organic light-emitting diode (OLED), or the like.
  • the touch panel 831 can cover the display panel 841. When the touch panel 831 detects a touch operation thereon or nearby, the touch panel 831 transmits to the processor 880 to determine the type of the touch event, and then the processor 880 according to the touch event. The type provides a corresponding visual output on display panel 841.
  • the touch panel 831 and the display panel 841 are two independent components to implement the input and input functions of the mobile phone, in some embodiments, the touch panel 831 can be integrated with the display panel 841. Realize the input and output functions of the phone.
  • the handset can also include at least one type of sensor 850, such as a light sensor, motion sensor, and other sensors.
  • the light sensor may include an ambient light sensor and a proximity sensor, wherein the ambient light sensor may adjust the brightness of the display panel 841 according to the brightness of the ambient light, and the proximity sensor may close the display panel 841 and/or when the mobile phone moves to the ear. Or backlight.
  • the accelerometer sensor can detect the magnitude of acceleration in all directions (usually three axes). When it is stationary, it can detect the magnitude and direction of gravity.
  • the mobile phone can be used to identify the gesture of the mobile phone (such as horizontal and vertical screen switching, related Game, magnetometer attitude calibration), vibration recognition related functions (such as pedometer, tapping), etc.; as for the mobile phone can also be configured with gyroscopes, barometers, hygrometers, thermometers, infrared sensors and other sensors, no longer Narration.
  • the gesture of the mobile phone such as horizontal and vertical screen switching, related Game, magnetometer attitude calibration
  • vibration recognition related functions such as pedometer, tapping
  • the mobile phone can also be configured with gyroscopes, barometers, hygrometers, thermometers, infrared sensors and other sensors, no longer Narration.
  • An audio circuit 860, a speaker 861, and a microphone 862 can provide an audio interface between the user and the handset.
  • the audio circuit 860 can transmit the converted electrical data of the received audio data to the speaker 861 for conversion to the sound signal output by the speaker 861; on the other hand, the microphone 862 converts the collected sound signal into an electrical signal by the audio circuit 860. After receiving, it is converted into audio data, and then processed by the audio data output processor 880, sent to the other mobile phone via the RF circuit 810, or outputted to the memory 820 for further processing.
  • WiFi is a short-range wireless transmission technology
  • the mobile phone can help users to send and receive emails, browse web pages, and access streaming media through the WiFi module 870, which provides users with wireless broadband Internet access.
  • FIG. 8 shows the WiFi module 870, it can be understood that it does not belong to the essential configuration of the mobile phone, and can be omitted as needed within the scope of not changing the essence of the invention.
  • the processor 880 is the control center of the handset, and connects various portions of the entire handset using various interfaces and lines, by executing or executing software programs and/or modules stored in the memory 820, and invoking data stored in the memory 820, executing The phone's various functions and processing data, so that the overall monitoring of the phone.
  • the processor 880 may include one or more processing units; preferably, the processor 880 may integrate an application processor and a modem processor, where the application processor mainly processes an operating system, a user interface, an application, and the like.
  • the modem processor primarily handles wireless communications. It will be appreciated that the above described modem processor may also not be integrated into the processor 880.
  • the handset also includes a power source 890 (such as a battery) that supplies power to the various components.
  • a power source 890 such as a battery
  • the power source can be logically coupled to the processor 880 through a power management system to manage functions such as charging, discharging, and power management through the power management system.
  • the mobile phone may further include a camera, a Bluetooth module, and the like, and details are not described herein again.
  • the steps performed by the terminal device in the foregoing method embodiments may be based on the terminal device structure shown in FIG. 8, and details are not described herein again.
  • the embodiment of the present application provides a wireless communication device.
  • the components of the communication device reference may be made to the network device shown in FIG. 7 .
  • the hardware structure of the communication device is required according to the embodiment of the present application, and may include:
  • At least one processor a memory, a transceiver circuit and a bus system, the processor, the memory, the transceiver circuit coupled by the bus system, the wireless communication device communicating with the terminal device through the transceiver circuit,
  • the memory is for storing program instructions
  • the at least one processor is configured to execute the program instructions stored in the memory, such that the wireless communication device performs the first network device (ie, wireless access) in the foregoing embodiments.
  • the wireless communication device may be either the wireless access network device or a system chip that performs corresponding functions in the wireless access network side device.
  • the embodiment of the present application further provides a wireless communication device, which may include:
  • At least one processor a memory, a transceiver circuit and a bus system, the processor, the memory, the transceiver circuit coupled by the bus system, the wireless communication device communicating with a network side device through the transceiver circuit,
  • the memory is for storing program instructions
  • the at least one processor is configured to execute the program instructions stored in the memory, such that the wireless communication device performs various feasible operations performed by the terminal device in the above embodiments ( For example, the operation performed by the terminal device shown in FIG. 3 or FIG. 4).
  • the wireless communication device can be either a terminal device or a system chip that applies a corresponding function in the terminal device.
  • the computer program product includes one or more computer instructions.
  • the computer can be a general purpose computer, a special purpose computer, a computer network, or other programmable device.
  • the computer instructions can be stored in a computer readable storage medium or transferred from one computer readable storage medium to another computer readable storage medium, for example, the computer instructions can be from a website site, computer, server or data center Transfer to another website site, computer, server, or data center by wire (eg, coaxial cable, fiber optic, digital subscriber line (DSL), or wireless (eg, infrared, wireless, microwave, etc.).
  • the computer readable storage medium can be any available media that can be accessed by a computer or a data storage device such as a server, data center, or the like that includes one or more available media.
  • the usable medium may be a magnetic medium (eg, a floppy disk, a hard disk, a magnetic tape), an optical medium (eg, a DVD), or a semiconductor medium (such as a solid state disk (SSD)).
  • the disclosed system, apparatus, and method may be implemented in other manners.
  • the device embodiments described above are merely illustrative.
  • the division of the unit is only a logical function division.
  • there may be another division manner for example, multiple units or components may be combined or Can be integrated into another system, or some features can be ignored or not executed.
  • the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, and may be in an electrical, mechanical or other form.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
  • each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
  • the above integrated unit can be implemented in the form of hardware or in the form of a software functional unit.
  • the integrated unit if implemented in the form of a software functional unit and sold or used as a standalone product, may be stored in a computer readable storage medium.
  • a computer readable storage medium A number of instructions are included to cause a computer device (which may be a personal computer, server, or network device, etc.) to perform all or part of the steps of the methods described in various embodiments of the present application.
  • the foregoing storage medium includes: a U disk, a mobile hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disk, and the like. .

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Disclosed in an embodiment of the present application is a method for controlling access, which is used for reducing the complexity of controlling network slice access. The method of the embodiment of the present application comprises: a first network device sending a first message to a terminal device, the first message comprising a first mapping rule, and the first mapping rule comprising the information of at least one network slice of a radio access network; and the first network device sending access control information to the terminal device. Further provided in the embodiments of the present application are a network device and a terminal device.

Description

一种接入控制的方法、网络设备以及终端设备Access control method, network device and terminal device
本申请要求于2017年6月16日提交中国专利局、申请号为201710459461.9、发明名称为“一种接入控制的方法、网络设备以及终端设备”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。This application claims the priority of the Chinese patent application filed on June 16, 2017, the Chinese Patent Office, the application number is 201710459461.9, and the invention is entitled "A method of access control, network equipment and terminal equipment". The citations are incorporated herein by reference.
技术领域Technical field
本申请涉及通信领域,尤其涉及一种接入控制的方法、网络设备以及终端设备。The present application relates to the field of communications, and in particular, to a method for access control, a network device, and a terminal device.
背景技术Background technique
为了应对正在出现或者即将出现的各式用户用例,不同的用户用例对网络性能的需求存在显著的区别,第五代移动通信系统(the fifth generation,5G),例如新空口(new radio,NR)的显著特征在于提出了网络切片(network slice,NS)的网络架构。软件定义网络(software defined network,SDN)与网络功能虚拟化(network function virtualization,NFV)技术是网络切片架构的核心技术,NFV技术可以实现底层物理资源的虚拟化,加载虚拟的网络功能(network function,NF)到通用平台,如虚拟机,SDN技术则实现虚拟机之间的逻辑连接,构建承载信令和数据流的通路。通过接入网(radio access network,RAN)以及核心网(core network,CN)的NF之间动态连接,配置端到端的业务链,从而构建网络切片。运营商可以根据各个具体商业用例对容量、覆盖、速率、时延以及可靠性等关键性能指标(key performance indicator,KPI)的需求,组成一个特定网络功能集合以及包含运行这些网络功能所需网络资源,从而可以提供所需的电信服务业务以及网络能力服务,满足特定的市场场景以及需求。In order to cope with various user cases that are emerging or imminent, different user use cases have significant differences in network performance requirements. The fifth generation mobile communication system (5G), such as new radio (NR) A significant feature is the proposed network architecture for network slices (NS). Software defined network (SDN) and network function virtualization (NFV) technology are the core technologies of the network slicing architecture. NFV technology can realize the virtualization of the underlying physical resources and load the virtual network function (network function). , NF) to a common platform, such as a virtual machine, SDN technology to achieve a logical connection between virtual machines, to build a path to carry signaling and data flow. The end-to-end service chain is configured through a dynamic connection between the radio access network (RAN) and the NF of the core network (CN) to construct a network slice. Operators can form a specific set of network functions and the network resources needed to run these network functions according to the requirements of key performance indicators (KPIs) such as capacity, coverage, rate, delay, and reliability for each specific business use case. In order to provide the required telecommunications services and network capability services to meet specific market scenarios and needs.
如图1所示,为3GPP支持多个网络切片的示意图。第三代合作伙伴计划(the third generation partnership project,3GPP)将5G的网络切片的主要类型分为了以下三大类:增强的移动宽带业务(enhanced mobile broadband,eMBB)、海量机器类型连接业务(massive machine type communication,mMTC)以及超可靠低时延业务(ultra-reliable and low latency communications,URLLC)。其中eMBB主要面向对速率以及移动性有较高需求的终端,如手机、多媒体设备等,mMTC主要针对物联网设备,具有大规模、低移动性以及较低的速率需求。URLLC则主要指车联网、安全信息等对时延和可靠性有苛刻要求的业务和设备类型。例如,手机用户可以接入eMBB类型的网络切片,进行高速下载或者观看4K高清视频,传感器设备可以接入mMTC网络切片进行小数据包的传输以及系统配置的更新。用户设备可以同时接入一个或者多个或者全部网络切片,满足业务需求并达成较好的用户体验。As shown in FIG. 1, a schematic diagram of supporting multiple network slices for 3GPP. The third generation partnership project (3GPP) divides the main types of 5G network slicing into the following three categories: enhanced mobile broadband (eMBB), massive machine type connection service (massive) Machine type communication (mMTC) and ultra-reliable and low latency communications (URLLC). Among them, eMBB is mainly for terminals with high demand for speed and mobility, such as mobile phones and multimedia devices. mMTC is mainly for IoT devices, with large-scale, low mobility and low speed requirements. URLLC mainly refers to the types of services and equipment that have strict requirements on delay and reliability, such as car networking and security information. For example, a mobile phone user can access an eMBB type network slice for high-speed download or watch 4K high-definition video, and the sensor device can access the mMTC network slice for small data packet transmission and system configuration update. User equipment can simultaneously access one or more or all network slices to meet business needs and achieve a better user experience.
如果当前网络出现拥塞状况,可以通过接入控制来限制用户设备(user equipment,UE)的接入连接或者业务请求,从而进行网络负载的管理,达到缓解网络拥塞的目的,长期演进(Long Term Evolution,LTE)系统采用了接入限制检查(Access Barring Check,ABC)的方式。当前接入控制的方案存在接入控制复杂、兼容性差、系统开销比较大等问题。If the current network is congested, the access control or user service (UE) access connection or service request can be restricted by access control, thereby managing network load and alleviating network congestion. Long Term Evolution The LTE system adopts the Access Barring Check (ABC) method. The current access control scheme has problems such as complex access control, poor compatibility, and relatively large system overhead.
发明内容Summary of the invention
本申请实施例提供了一种接入控制的方法、网络设备以及终端设备,用于降低网络切片接入控制的复杂度。The embodiment of the present application provides a method for access control, a network device, and a terminal device, which are used to reduce the complexity of network slice access control.
本申请实施例所应用的无线通信系统可以包括第一网络设备、终端设备和第二网络设备,终端设备以UE、第一网络设备以RAN、第二网络设备以CN为例来进行说明。即该无线通信系统可以包括接入网(Radio Access Network,RAN)设备、核心网(Core Network,CN)设备和用户设备(User Equipment,UE)。本申请实施例的通信系统支持网络切片架构,该通信系统中的核心网网络切片可以共享核心网网络设备和/或核心网网络资源,也可以独占核心网网络设备和/或核心网网络资源。在该无线通信系统中,UE通过RAN设备接入一个或多个RAN网络切片或者CN网络切片。具体地,RAN设备根据UE提供的信息,以及配置或获取的接入和移动性管理功能(Access and Mobility Management Function,AMF)信息,为UE选择AMF。The wireless communication system to which the embodiment of the present application is applied may include a first network device, a terminal device, and a second network device. The terminal device is described by using the UE, the first network device in the RAN, and the second network device as the CN. That is, the wireless communication system may include a Radio Access Network (RAN) device, a Core Network (CN) device, and a User Equipment (UE). The communication system of the embodiment of the present application supports a network slicing architecture. The core network network slice in the communication system may share the core network device and/or the core network resource, or may monopolize the core network device and/or the core network resource. In the wireless communication system, the UE accesses one or more RAN network slices or CN network slices through the RAN device. Specifically, the RAN device selects the AMF for the UE according to the information provided by the UE and the Access and Mobility Management Function (AMF) information configured or acquired.
本申请实施例第一方面提供一种接入控制的方法,可以包括:第一网络设备向终端设备发送第一消息,所述第一消息包括第一映射规则,所述第一映射规则包括至少一个无线接入网RAN网络切片的信息;所述第一网络设备向所述终端设备发送接入控制信息。在本申请实施例中,因为RAN网络切片与核心网CN网络切片通常是一对多的映射关系,所以,RAN向UE发送的第一映射规则中包括的是至少一个RAN网络切片的信息,相对于现有技术而言,本申请实施例中第一映射规则的配置内容要小一些,复杂度比较低。A first aspect of the present application provides a method for access control, which may include: a first network device sends a first message to a terminal device, where the first message includes a first mapping rule, where the first mapping rule includes at least Information of a radio access network RAN network slice; the first network device sends access control information to the terminal device. In the embodiment of the present application, because the RAN network slice and the core network CN network slice are usually one-to-many mapping relationship, the first mapping rule sent by the RAN to the UE includes at least one RAN network slice information, and In the prior art, the configuration content of the first mapping rule in the embodiment of the present application is smaller, and the complexity is relatively low.
结合本申请实施例的第一方面,在本申请实施例第一方面的第一种实现方式中,所述第一映射规则和所述接入控制信息用于对所述终端设备进行接入控制。在本申请实施例中,RAN向UE发送的第一映射规则和接入控制信息,可以用于UE进行接入控制,发起网络切片的接入。而第一映射规则中包括的是至少一个RAN网络切片的信息,因为RAN网络切片的信息一般与CN网络切片的信息是一对多的关系,所以,第二映射规则的配置内容小于现有的配置内容,复杂度较低。With reference to the first aspect of the embodiments of the present application, in a first implementation manner of the first aspect of the embodiments, the first mapping rule and the access control information are used to perform access control on the terminal device. . In the embodiment of the present application, the first mapping rule and the access control information that are sent by the RAN to the UE may be used for the UE to perform access control and initiate access of the network slice. The first mapping rule includes information about at least one RAN network slice, because the information of the RAN network slice is generally one-to-many relationship with the CN network slice information, so the configuration content of the second mapping rule is smaller than the existing one. Configuration content, low complexity.
结合本申请实施例的第一方面,第一方面的第一种实现方式,在本申请实施例第一方面的第二种实现方式中,所述方法还可以包括:所述第一网络设备接收来自于第二网络设备的第二消息,所述第二消息包括第二映射规则,所述第二映射规则包括至少一个CN接入类别,所述第一映射规则还包括所述至少一个RAN网络切片的信息与所述至少一个CN接入类别的映射关系。在本申请实施例中,至少一个CN接入类别可以理解为查找映射规则中包含的至少一个因素(例如UE的接入等级、至少一个CN网络切片的信息、应用、业务类别等)对应的接入控制信息的索引。至少一个RAN网络切片的信息是根据至少一个接入类别确定的,因为RAN保存有预设的RAN网络切片的信息和CN网络切片的信息的映射关系。RAN可以根据当前可用的CN网络切片的信息确定至少一个CN网络切片的信息,至少一个CN网络切片的信息与至少一个CN类别对应,所以,第二映射规则可以包括至少一个RAN网络切片的信息与所述至少一个CN接入类别的映射关系。提供了一种第二映射规则可选的实现方式,所述第一映射规则还可以包括所述至少一个RAN网络切片的信息与所述至少一个CN接入类别的映射关系,增加了本申请方案的灵活性。With reference to the first aspect of the embodiments of the present application, the first implementation manner of the first aspect, in a second implementation manner of the first aspect of the embodiments, the method may further include: receiving, by the first network device a second message from the second network device, the second message includes a second mapping rule, the second mapping rule includes at least one CN access category, and the first mapping rule further includes the at least one RAN network A mapping relationship between the sliced information and the at least one CN access category. In this embodiment of the present application, at least one CN access category may be understood as a corresponding connection of at least one factor (such as an access level of the UE, information of at least one CN network slice, an application, a service category, and the like) included in the mapping rule. The index into the control information. The information of the at least one RAN network slice is determined according to at least one access category, because the RAN holds a mapping relationship between the information of the preset RAN network slice and the information of the CN network slice. The RAN may determine information of the at least one CN network slice according to information of the currently available CN network slice, where the information of the at least one CN network slice corresponds to the at least one CN category, so the second mapping rule may include information of at least one RAN network slice. The mapping relationship of the at least one CN access category. An optional implementation manner of the second mapping rule is provided, where the first mapping rule further includes a mapping relationship between the information of the at least one RAN network slice and the at least one CN access category, which is added to the solution. Flexibility.
结合本申请实施例的第一方面,第一方面的第一种实现方式,在本申请实施例第一方面的第三种实现方式中,所述方法还可以包括:所述第一网络设备接收来自于第二网络设备的第三消息,所述第三消息包括CN网络允许的网络切片选择辅助信息Allowed NSSAI列表,所述第一映射规则还包括所述至少一个RAN网络切片的信息与所述CN Allowed NSSAI列表的映射关系。在本申请实施例中,至少一个CN网络切片的信息是根据CN Allowed NSSAI列表确定的,RAN保存有预设的RAN网络切片的信息和CN网络切片的信息的映射关系,所以,可以根据至少一个CN网络切片的信息确定至少一个RAN网络切片的信息。提供了一种第二映射规则可选的实现方式,第一映射规则还可以包括所述至少一个RAN网络切片的信息与所述CN Allowed NSSAI列表的映射关系,增加了本申请方案的灵活性。With reference to the first aspect of the embodiments of the present application, the first implementation manner of the first aspect, in a third implementation manner of the first aspect of the embodiments, the method may further include: receiving, by the first network device a third message from the second network device, the third message including a network slice selection assistance information Allowed NSSAI list allowed by the CN network, the first mapping rule further including information of the at least one RAN network slice and the CN Allowed The mapping relationship of NSSAI lists. In the embodiment of the present application, the information of the at least one CN network slice is determined according to the CN Allowed NSSAI list, and the RAN saves the mapping relationship between the preset RAN network slice information and the CN network slice information, so that at least one may be The information of the CN network slice determines information for at least one RAN network slice. An optional implementation manner of the second mapping rule is provided. The first mapping rule may further include a mapping relationship between the information of the at least one RAN network slice and the CN Allowed NSSAI list, which increases the flexibility of the solution.
结合本申请实施例的第一方面,第一方面的第一种实现方式,在本申请实施例第一方面的第四种实现方式中,所述方法还可以包括:所述第一网络设备接收来自于第二网络设备的第四消息,所述第四消息包括第二映射规则和CN网络允许的网络切片选择辅助信息Allowed NSSAI列表,所述第二映射规则包括至少一个CN接入类别,所述第一映射规则还包括所述至少一个RAN网络切片的信息、所述至少一个CN接入类别与所述CN Allowed NSSAI列表的映射关系。在本申请实施例中,至少一个CN网络切片的信息是根据CN Allowed NSSAI列表确定的,RAN保存有预设的RAN网络切片的信息和CN网络切片的信息的映射关系,所以,可以根据至少一个CN网络切片的信息确定至少一个RAN网络切片的信息,而至少一个CN接入类别又与CN Allowed NSSAI列表对应。提供了一种第二映射规则可选的实现方式,第一映射规则还可以包括所述至少一个RAN网络切片的信息、所述CN Allowed NSSAI列表与至少一个CN接入类别的映射关系,增加了本申请方案的灵活性。With reference to the first aspect of the embodiments of the present application, the first implementation manner of the first aspect, in a fourth implementation manner of the first aspect of the embodiments, the method may further include: receiving, by the first network device a fourth message from the second network device, the fourth message including a second mapping rule and a network slice selection assistance information Allowed NSSAI list allowed by the CN network, the second mapping rule including at least one CN access category, The first mapping rule further includes information of the at least one RAN network slice, a mapping relationship between the at least one CN access category and the CN Allowed NSSAI list. In the embodiment of the present application, the information of the at least one CN network slice is determined according to the CN Allowed NSSAI list, and the RAN saves the mapping relationship between the preset RAN network slice information and the CN network slice information, so that at least one may be The CN network slice information determines information for at least one RAN network slice, and at least one CN access class corresponds to the CN Allowed NSSAI list. An optional implementation manner of the second mapping rule is provided, where the first mapping rule further includes information about the at least one RAN network slice, a mapping relationship between the CN Allowed NSSAI list and at least one CN access category, and The flexibility of the solution of the present application.
其中,CN可以根据UE上报的CN允许的网络切片选择辅助信息(CN NSSAI)、UE的签约信息、本地策略、网络切片的可用性等因素选择同意UE在当前的注册区允许接入的至少一个CN网络切片的信息,该至少一个CN网络切片的信息可以以列表的形式呈现,可称为CN允许的NSSAI(CN Allowed NSSAI)列表,也可以以其他的方式表示,具体不做限定。The CN may select at least one CN that the UE is allowed to access in the current registration area according to the network slice selection assistance information (CN NSSAI) allowed by the UE, the subscription information of the UE, the local policy, the availability of the network slice, and the like. The information of the network slice, the information of the at least one CN network slice may be presented in the form of a list, and may be referred to as a CN allowed NSSAI (CN Allowed NSSAI) list, and may also be represented in other manners, which is not limited.
结合本申请实施例的第一方面,第一方面的第一种至第二种任一实现方式,在本申请实施例第一方面的第五种实现方式中,所述第一映射规则还包括所述至少一个RAN网络切片的信息与当前可用的CN网络切片的信息的映射关系。在本申请实施例中,至少一个CN网络切片的信息是RAN根据当前可用的CN网络切片的信息确定的,提供了另一种第二映射规则可选的实现方式,增加了本申请方案的灵活性。With reference to the first aspect of the embodiments of the present application, any one of the first to the second implementation manners of the first aspect, in the fifth implementation manner of the first aspect of the embodiments, the first mapping rule further includes A mapping relationship between information of the at least one RAN network slice and information of currently available CN network slices. In the embodiment of the present application, the information of the at least one CN network slice is determined by the RAN according to the currently available information of the CN network slice, and another implementation manner of the second mapping rule is provided, which increases the flexibility of the solution. Sex.
结合本申请实施例的第一方面的第四种实现方式,在本申请实施例第一方面的第五种实现方式中,所述第一映射规则还包括所述至少一个RAN网络切片的信息、当前可用的CN网络切片的信息与至少一个CN接入类别的映射关系。在本申请实施例中,至少一个CN网络切片的信息是RAN根据当前可用的CN网络切片的信息确定的,提供了另一种第二映射规则可选的实现方式,增加了本申请方案的灵活性。With reference to the fourth implementation manner of the first aspect of the embodiments of the present application, in a fifth implementation manner of the first aspect of the embodiments, the first mapping rule further includes information about the at least one RAN network slice, A mapping relationship between currently available CN network slice information and at least one CN access category. In the embodiment of the present application, the information of the at least one CN network slice is determined by the RAN according to the currently available information of the CN network slice, and another implementation manner of the second mapping rule is provided, which increases the flexibility of the solution. Sex.
结合本申请实施例的第一方面,第一方面的第一种至第五种任一实现方式,在本申请实施例第一方面的第六种实现方式中,所述第一映射规则还包括所述至少一个RAN网络切片的信息与至少一个RAN接入类别的映射关系。在本申请实施例中,至少一个RAN接入类 别是RAN重新配置的一个接入类别,可以理解为查找第二映射规则中包含的至少一个因素(例如至少一个RAN网络切片的信息等)对应的接入控制信息的索引。提供了另一种第二映射规则可选的实现方式,增加了本申请方案的灵活性。With reference to the first aspect of the embodiments of the present application, any one of the first to fifth implementation manners of the first aspect, in the sixth implementation manner of the first aspect of the embodiments, the first mapping rule further includes A mapping relationship between the information of the at least one RAN network slice and the at least one RAN access category. In the embodiment of the present application, the at least one RAN access category is an access category of the RAN reconfiguration, which may be understood as searching for at least one factor (for example, information of at least one RAN network slice, etc.) included in the second mapping rule. Index of access control information. Another alternative implementation of the second mapping rule is provided, which increases the flexibility of the solution of the present application.
结合本申请实施例的第一方面,第一方面的第一种至第六种任一实现方式,在本申请实施例第一方面的第七种实现方式中,所述第一映射规则还包括所述至少一个RAN网络切片的信息、CN Allowed NSSAI列表与RAN接入类别的映射关系。在本申请实施例中,至少一个CN网络切片的信息是RAN根据CN Allowed NSSAI列表确定的,提供了另一种第二映射规则可选的实现方式,增加了本申请方案的灵活性。With reference to the first aspect of the embodiments of the present application, any one of the first to sixth implementation manners of the first aspect, in the seventh implementation manner of the first aspect of the embodiments, the first mapping rule further includes The information of the at least one RAN network slice, the mapping relationship between the CN Allowed NSSAI list and the RAN access category. In the embodiment of the present application, the information of the at least one CN network slice is determined by the RAN according to the CN Allowed NSSAI list, and another implementation manner of the second mapping rule is provided, which increases the flexibility of the solution.
结合本申请实施例的第一方面,第一方面的第一种至第七种任一实现方式,在本申请实施例第一方面的第八种实现方式中,所述第一映射规则还包括所述至少一个RAN网络切片的信息、当前可用的CN网络切片的信息与RAN接入类别的映射关系。在本申请实施例中,至少一个CN网络切片的信息是RAN根据当前可用的CN网络切片的信息确定的,提供了另一种第二映射规则可选的实现方式,增加了本申请方案的灵活性。With reference to the first aspect of the embodiments of the present application, any one of the first to seventh implementation manners of the first aspect, in the eighth implementation manner of the first aspect of the embodiments, the first mapping rule further includes The information of the at least one RAN network slice, the information of the currently available CN network slice, and the mapping relationship of the RAN access category. In the embodiment of the present application, the information of the at least one CN network slice is determined by the RAN according to the currently available information of the CN network slice, and another implementation manner of the second mapping rule is provided, which increases the flexibility of the solution. Sex.
需要说明的是,在上述第一种至第八种任一可能的实现方式中,第二映射规则包括的至少一个RAN网络切片的信息可以与至少一个RAN接入类别,或者,CN Allowed NSSAI列表,或者,CN Allowed NSSAI列表和至少一个RAN接入类别存在映射关系,或者,当前可用的CN网络切片的信息,或者,至少一个CN接入类别。但是,在第二映射规则中也可以不包含至少一个RAN接入类别,或者,CN Allowed NSSAI列表,或者,CN Allowed NSSAI列表和至少一个RAN接入类别,或者,当前可用的CN网络切片的信息,或者,至少一个CN接入类别,RAN只需要知道它们具有映射关系就行,具体不做限定。It should be noted that, in any one of the foregoing first to eighth implementation manners, the information of the at least one RAN network slice included in the second mapping rule may be related to the at least one RAN access category, or the CN Allowed NSSAI list. Or, the CN Allowed NSSAI list has a mapping relationship with at least one RAN access category, or information of currently available CN network slices, or at least one CN access category. However, the second mapping rule may also not include at least one RAN access category, or a CN Allowed NSSAI list, or a CN Allowed NSSAI list and at least one RAN access category, or information of currently available CN network slices. Or, at least one CN access category, the RAN only needs to know that they have a mapping relationship, and is not limited.
本申请实施例第二方面提供一种接入控制的方法,可以包括:终端设备接收来自于第一网络设备的第一消息,所述第一消息包括第一映射规则,所述第一映射规则包括至少一个无线接入网RAN网络切片的信息;所述终端设备接收来自于所述第一网络设备的接入控制信息。在本申请实施例中,因为RAN网络切片的信息与CN网络切片的信息通常是一对多的映射关系,所以,RAN向UE发送的第一映射规则中包括的是至少一个RAN网络切片的信息,相对于现有技术而言,本申请实施例中第一映射规则的配置内容要小一些,复杂度比较低。A second aspect of the present application provides a method for access control, which may include: receiving, by a terminal device, a first message from a first network device, where the first message includes a first mapping rule, and the first mapping rule Information including at least one radio access network RAN network slice; the terminal device receiving access control information from the first network device. In the embodiment of the present application, because the information of the RAN network slice and the CN network slice information are usually one-to-many mapping relationship, the first mapping rule sent by the RAN to the UE includes at least one RAN network slice information. Compared with the prior art, the configuration content of the first mapping rule in the embodiment of the present application is smaller, and the complexity is relatively low.
结合本申请实施例的第二方面,在本申请实施例第二方面的第一种实现方式中,所述方法还包括:所述终端设备根据所述第一映射规则和所述接入控制信息进行接入控制。在本申请实施例中,UE可以根据至少一个RAN网络切片的信息进行接入控制检查,因为RAN网络切片的信息一般与CN网络切片的信息是一对多的关系,所以,第二映射规则的配置内容小于现有的配置内容,复杂度较低。还实现了RAN网络切片粒度的控制。还解决了UE请求的CN网络切片的信息与分配的CN网络切片的信息不一致的情况,因为相同业务类型的不同CN网络切片的信息映射在RAN的RAN网络切片的信息大多数情况是相同的。With reference to the second aspect of the embodiments of the present application, in a first implementation manner of the second aspect of the embodiments, the method further includes: the terminal device according to the first mapping rule and the access control information Perform access control. In the embodiment of the present application, the UE may perform an access control check according to information of at least one RAN network slice, because the information of the RAN network slice is generally one-to-many relationship with the information of the CN network slice, so the second mapping rule The configuration content is smaller than the existing configuration content, and the complexity is low. Control of the RAN network slice granularity is also achieved. The case where the information of the CN network slice requested by the UE is inconsistent with the information of the allocated CN network slice is also solved, because the information of the different CN network slices of the same service type is mostly the same in the RAN network slice information of the RAN.
结合本申请实施例的第二方面,第二方面的第一种实现方式,在本申请实施例第二方面的第二种实现方式中,所述第一映射规则还包括所述至少一个RAN网络切片的信息与至少一个RAN接入类别的映射关系。在本申请实施例中,UE可以根据至少一个RAN网络切片 的信息或者至少一个RAN接入类别进行接入控制检查,提高了本申请技术方案的可选性和灵活性,因为RAN网络切片的信息一般与CN网络切片的信息是一对多的关系,所以,第二映射规则的配置内容小于现有的配置内容,复杂度较低。还实现了RAN网络切片粒度的控制。还解决了UE请求的CN网络切片的信息与CN分配的CN网络切片的信息不一致的情况,因为相同业务类型的不同CN网络切片的信息映射在RAN的RAN网络切片的信息大多数情况是相同的。With reference to the second aspect of the embodiments of the present application, the first implementation manner of the second aspect, in the second implementation manner of the second aspect of the embodiments, the first mapping rule further includes the at least one RAN network The mapping relationship between the sliced information and at least one RAN access category. In the embodiment of the present application, the UE may perform access control check according to information of at least one RAN network slice or at least one RAN access category, which improves the selectivity and flexibility of the technical solution of the present application, because the RAN network slice information Generally, the information of the CN network slice is a one-to-many relationship. Therefore, the configuration content of the second mapping rule is smaller than the existing configuration content, and the complexity is low. Control of the RAN network slice granularity is also achieved. The situation that the information of the CN network slice requested by the UE is inconsistent with the information of the CN network slice allocated by the CN is also solved, because the information of the different CN network slices of the same service type is mapped in the RAN network, and the information of the RAN network slice is the same in most cases. .
结合本申请实施例的第二方面,第二方面的第一种实现方式,在本申请实施例第二方面的第三种实现方式中,所述第一映射规则还包括所述至少一个RAN网络切片的信息与至少一个CN接入类别的映射关系。在本申请实施例中,UE可以根据至少一个RAN网络切片的信息或者至少一个CN接入类别进行接入控制检查,提高了本申请技术方案的可选性和灵活性,因为RAN网络切片的信息一般与CN网络切片的信息是一对多的关系,所以,第二映射规则的配置内容小于现有的配置内容,复杂度较低。还实现了RAN网络切片粒度的控制。还解决了UE请求的CN网络切片的信息与CN分配的CN网络切片的信息不一致的情况,因为相同业务类型的不同CN网络切片的信息映射在RAN的RAN网络切片的信息大多数情况是相同的。With reference to the second aspect of the embodiments of the present application, the first implementation manner of the second aspect, in the third implementation manner of the second aspect of the embodiments, the first mapping rule further includes the at least one RAN network The mapping relationship between the sliced information and at least one CN access category. In the embodiment of the present application, the UE may perform access control check according to information of at least one RAN network slice or at least one CN access category, which improves the selectivity and flexibility of the technical solution of the present application, because the RAN network slice information Generally, the information of the CN network slice is a one-to-many relationship. Therefore, the configuration content of the second mapping rule is smaller than the existing configuration content, and the complexity is low. Control of the RAN network slice granularity is also achieved. The situation that the information of the CN network slice requested by the UE is inconsistent with the information of the CN network slice allocated by the CN is also solved, because the information of the different CN network slices of the same service type is mapped in the RAN network, and the information of the RAN network slice is the same in most cases. .
结合本申请实施例的第二方面,第二方面的第一种实现方式,在本申请实施例第二方面的第四种实现方式中,所述第一映射规则还包括所述至少一个RAN网络切片的信息与至少一个CN网络切片的信息的映射关系。在本申请实施例中,UE可以根据至少一个RAN网络切片的信息或者至少一个CN网络切片的信息进行接入控制检查,提高了本申请技术方案的可选性和灵活性,因为RAN网络切片的信息一般与CN网络切片的信息是一对多的关系,所以,第二映射规则的配置内容小于现有的配置内容,复杂度较低。还实现了RAN网络切片粒度的控制。还解决了UE请求的CN网络切片的信息与CN分配的CN网络切片的信息不一致的情况,因为相同业务类型的不同CN网络切片的信息映射在RAN的RAN网络切片的信息大多数情况是相同的。With reference to the second aspect of the embodiments of the present application, the first implementation manner of the second aspect, in the fourth implementation manner of the second aspect of the embodiments, the first mapping rule further includes the at least one RAN network The mapping relationship between the sliced information and the information of at least one CN network slice. In the embodiment of the present application, the UE may perform an access control check according to the information of the at least one RAN network slice or the information of the at least one CN network slice, which improves the selectivity and flexibility of the technical solution of the present application, because the RAN network is sliced. The information is generally one-to-many relationship with the CN network slice information. Therefore, the configuration content of the second mapping rule is smaller than the existing configuration content, and the complexity is low. Control of the RAN network slice granularity is also achieved. The situation that the information of the CN network slice requested by the UE is inconsistent with the information of the CN network slice allocated by the CN is also solved, because the information of the different CN network slices of the same service type is mapped in the RAN network, and the information of the RAN network slice is the same in most cases. .
结合本申请实施例的第二方面,第二方面的第一种实现方式,在本申请实施例第二方面的第五种实现方式中,所述第一映射规则还包括所述至少一个RAN网络切片的信息、至少一个CN网络切片的信息与至少一个RAN接入类别的映射关系。在本申请实施例中,其中,至少一个CN网路切片信息是RAN可以根据CN Allowed NSSAI列表或者当前可用的CN网络切片确定的。UE可以根据至少一个RAN网络切片的信息,或者,可以根据至少一个RAN接入类别进行RAN网络切片的接入控制检查,或者,可以根据至少一个CN接入类别进行RAN网络切片的接入控制检查。因为RAN网络切片的信息一般与CN网络切片的信息是一对多的关系,还实现了RAN网络切片粒度的控制,解决了UE请求的CN网络切片的信息与CN分配的CN网络切片的信息不一致的情况,因为相同业务类型的不同CN网络切片的信息映射在RAN的RAN网络切片的信息大多数情况是相同的。With reference to the second aspect of the embodiments of the present application, the first implementation manner of the second aspect, in the fifth implementation manner of the second aspect of the embodiments, the first mapping rule further includes the at least one RAN network The sliced information, the mapping of the information of the at least one CN network slice to the at least one RAN access category. In this embodiment of the present application, wherein at least one CN network slice information is determined by the RAN according to a CN Allowed NSSAI list or a currently available CN network slice. The UE may perform the access control check of the RAN network slice according to the at least one RAN network slice, or may perform the access control check of the RAN network slice according to the at least one CN access category. . Because the information of the RAN network slice is generally one-to-many relationship with the information of the CN network slice, the control of the RAN network slice granularity is implemented, and the information of the CN network slice requested by the UE is inconsistent with the information of the CN network slice allocated by the CN. In the case, since the information of different CN network slices of the same service type is mapped in the RAN, the information of the RAN network slice is the same in most cases.
结合本申请实施例的第二方面,第二方面的第一种实现方式,在本申请实施例第二方面的第六种实现方式中,所述第一映射规则还包括所述至少一个RAN网络切片的信息、至少一个CN网络切片的信息与至少一个CN接入类别的映射关系。在本申请实施例中,UE可 以根据至少一个RAN网络切片的信息进行RAN网络切片的接入控制检查,或者,可以根据至少一个CN网络切片的信息进行CN网络切片的接入控制检查,提高了本申请技术方案的可选性和灵活性。还实现了RAN网络切片粒度的控制,解决了UE请求的CN网络切片的信息与CN分配的CN网络切片的信息不一致的情况,因为相同业务类型的不同CN网络切片的信息映射在RAN的RAN网络切片的信息大多数情况是相同的。With reference to the second aspect of the embodiments of the present application, the first implementation manner of the second aspect, in the sixth implementation manner of the second aspect of the embodiments, the first mapping rule further includes the at least one RAN network The information of the slice, the mapping of the information of the at least one CN network slice to the at least one CN access category. In the embodiment of the present application, the UE may perform an access control check of the RAN network slice according to the information of the at least one RAN network slice, or may perform an access control check of the CN network slice according to the information of the at least one CN network slice, and improve the The selectivity and flexibility of the technical solution of the present application. The control of the RAN network slice granularity is also implemented, and the information of the CN network slice requested by the UE is inconsistent with the information of the CN network slice allocated by the CN, because the information of different CN network slices of the same service type is mapped in the RAN RAN network. The sliced information is mostly the same.
本申请实施例第三方面提供一种接入控制的方法,可以包括:第二网络设备向第一网络设备发送第二消息,所述第二消息包括第二映射规则,所述第二映射规则包括至少一个CN接入类别。在本申请实施例中,第二映射规则中包括至少一个CN接入类别,可以用于被RAN识别,根据预设的RAN网络切片的信息与CN网络切片的信息的映射关系,确定出至少一个CN网络切片的信息,提供了一种可实现的方式。A third aspect of the present application provides a method for access control, which may include: the second network device sends a second message to the first network device, where the second message includes a second mapping rule, and the second mapping rule Includes at least one CN access category. In the embodiment of the present application, the second mapping rule includes at least one CN access category, which may be used by the RAN to identify at least one according to a mapping relationship between the preset RAN network slice information and the CN network slice information. CN network slice information provides an achievable way.
结合本申请实施例的第三方面,在本申请实施例第三方面的第一种可能的实现方式中,所述第二消息包括CN网络切片选择辅助信息Allowed NSSAI列表。在本申请实施例中,若第二消息包括CN网络切片选择辅助信息Allowed NSSAI列表,那么,RAN可以直接根据CN Allowed NSSAI列表确定至少一个CN网络切片的信息,从而,确定第二映射规则中的至少一个RAN网络切片的信息,提供了一种可实现的方式。With reference to the third aspect of the embodiments of the present application, in a first possible implementation manner of the third aspect of the embodiments, the second message includes a CN network slice selection auxiliary information Allowed NSSAI list. In the embodiment of the present application, if the second message includes the CN network slice selection auxiliary information Allowed NSSAI list, the RAN may directly determine the information of the at least one CN network slice according to the CN Allowed NSSAI list, thereby determining the second mapping rule. The information of at least one RAN network slice provides an achievable way.
结合本申请实施例第三方面的第一种可能的实现方式,在本申请实施例第三方面的第二种可能的实现方式中,所述第二映射规则包括所述至少一个CN接入类别与所述CN Allowed NSSAI列表的映射关系。With reference to the first possible implementation manner of the third aspect of the embodiments of the present application, in a second possible implementation manner of the third aspect of the embodiments, the second mapping rule includes the at least one CN access category. A mapping relationship with the CN Allowed NSSAI list.
本申请实施例第四方面提供一种网络设备,具有降低网络切片接入控制的复杂度的功能。该功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的模块。A fourth aspect of the embodiments of the present application provides a network device, which has the function of reducing the complexity of network slice access control. This function can be implemented in hardware or in hardware by executing the corresponding software. The hardware or software includes one or more modules corresponding to the functions described above.
本申请实施例第五方面提供一种终端设备,具有降低网络切片接入控制的复杂度的功能。该功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的模块。A fifth aspect of the embodiments of the present application provides a terminal device, which has the function of reducing the complexity of network slice access control. This function can be implemented in hardware or in hardware by executing the corresponding software. The hardware or software includes one or more modules corresponding to the functions described above.
本申请实施例第六方面提供一种网络设备,具有降低网络切片接入控制的复杂度的功能。该功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的模块。A sixth aspect of the embodiments of the present application provides a network device, which has the function of reducing the complexity of network slice access control. This function can be implemented in hardware or in hardware by executing the corresponding software. The hardware or software includes one or more modules corresponding to the functions described above.
本申请实施例第七方面提供一种网络设备,可以包括:A seventh aspect of the present application provides a network device, which may include:
存储器,收发器,所述存储器和所述收发器通过总线连接;a memory, a transceiver, the memory and the transceiver are connected by a bus;
所述存储器,用于存储操作指令;The memory is configured to store an operation instruction;
所述收发器,用于通过调用所述操作指令,向终端设备发送第一消息,所述第一消息包括第一映射规则,所述第一映射规则包括至少一个RAN网络切片的信息;向所述终端设备发送接入控制信息。The transceiver is configured to send, by using the operation instruction, a first message to a terminal device, where the first message includes a first mapping rule, where the first mapping rule includes information of at least one RAN network slice; The terminal device sends access control information.
本申请实施例第八方面提供一种无线通信装置,可以包括:The eighth aspect of the embodiments of the present application provides a wireless communication apparatus, which may include:
至少一个处理器,存储器,收发电路和总线系统,所述处理器,所述存储器,所述收发电路通过所述总线系统耦合,所述无线通信装置通过所述收发电路与终端设备相通信,所述存储器用于存储程序指令,所述至少一个处理器用于执行所述存储器中存储的所述程 序指令,使得所述无线通信装置执行如本申请实施例第一方面任一所述的方法中所述第一网络设备操作的部分。所述无线通信装置既可以是网络设备,也可以是应用在网络侧设备中执行相应功能的系统芯片。At least one processor, a memory, a transceiver circuit and a bus system, the processor, the memory, the transceiver circuit coupled by the bus system, the wireless communication device communicating with the terminal device through the transceiver circuit, The memory is for storing program instructions, the at least one processor is configured to execute the program instructions stored in the memory, such that the wireless communication device performs the method according to any one of the first aspects of the embodiments of the present application The portion of the operation of the first network device. The wireless communication device may be a network device or a system chip that applies a corresponding function in a network side device.
本申请实施例第九方面提供一种无线通信装置,可以包括:A ninth aspect of the present application provides a wireless communication apparatus, which may include:
至少一个处理器,存储器,收发电路和总线系统,所述处理器,所述存储器,所述收发电路通过所述总线系统耦合,所述无线通信装置通过所述收发电路与网络侧设备相通信,所述存储器用于存储程序指令,所述至少一个处理器用于执行所述存储器中存储的所述程序指令,使得所述无线通信装置执行如本申请实施例第二方面任一所述的方法中所述终端设备操作的部分。所述无线通信装置既可以是终端设备,也可以是应用在终端设备中执行相应功能的系统芯片。At least one processor, a memory, a transceiver circuit and a bus system, the processor, the memory, the transceiver circuit coupled by the bus system, the wireless communication device communicating with a network side device through the transceiver circuit, The memory is for storing program instructions, the at least one processor is configured to execute the program instructions stored in the memory, such that the wireless communication device performs the method according to any one of the second aspects of the embodiments of the present application The part of the terminal device operation. The wireless communication device can be either a terminal device or a system chip that applies a corresponding function in the terminal device.
本申请实施例第十方面提供一种通信系统,该通信系统包括第一网络设备、终端设备和第二网络设备,该第一网络设备为执行本申请第一方面或第一方面任一可选实现方式中该的第一网络设备;该终端设备为执行本申请第二方面或第二方面任一可选实现方式中该的终端设备;该第二网络设备为执行本申请第三方面或第三方面任一可选实现方式中该的第二网络设备。A tenth aspect of the present application provides a communication system, where the communication system includes a first network device, a terminal device, and a second network device, where the first network device is optional to perform the first aspect or the first aspect of the present application. The first network device in the implementation manner; the terminal device is the terminal device in the optional implementation manner of the second aspect or the second aspect of the application; the second network device is configured to perform the third aspect or the The second network device of any of the alternative implementations of the three aspects.
本申请实施例第十一方面提供一种存储介质,需要说明的是,本发的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产口的形式体现出来,该计算机软件产品存储在一个存储介质中,用于储存为上述设备所用的计算机软件指令,其包含用于执行上述第一方面、第二方面或第三方面为第一网络设备、终端设备或者第二网络设备所设计的程序。The eleventh aspect of the present application provides a storage medium. It should be noted that the technical solution of the present invention may contribute to the prior art or all or part of the technical solution may be implemented by software. The computer software product is stored in a storage medium for storing computer software instructions for use in the above apparatus, comprising: the first network device for performing the first aspect, the second aspect or the third aspect A program designed by a terminal device or a second network device.
该存储介质包括:U盘、移动硬盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、磁碟或者光盘等各种可以存储程序代码的介质。The storage medium includes: a U disk, a mobile hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disk, and the like, which can store program codes.
本申请实施例第十二方面提供一种包含指令的计算机程序产品,当其在计算机上运行时,使得计算机执行如本申请第一方面或第一方面任一可选实现方式中所述的方法。A twelfth aspect of the embodiments of the present application provides a computer program product comprising instructions, when executed on a computer, causing a computer to perform the method as described in the first aspect of the present application or any of the alternative implementations of the first aspect .
本申请实施例第十三方面提供一种包含指令的计算机程序产品,当其在计算机上运行时,使得计算机执行如本申请第二方面或第二方面任一可选实现方式中所述的方法。A thirteenth aspect of the embodiments of the present application provides a computer program product comprising instructions, when executed on a computer, causing the computer to perform the method as described in the second aspect or any alternative implementation of the second aspect of the present application .
本申请实施例第十四方面提供一种包含指令的计算机程序产品,当其在计算机上运行时,使得计算机执行如本申请第三方面或第三方面任一可选实现方式中所述的方法。A fourteenth aspect of the embodiments of the present application provides a computer program product comprising instructions, when executed on a computer, causing the computer to perform the method as described in any of the optional implementations of the third aspect or the third aspect of the present application. .
从以上技术方案可以看出,本申请实施例具有以下优点:As can be seen from the above technical solutions, the embodiments of the present application have the following advantages:
本申请实施例通过第一网络设备向终端设备发送第一消息,所述第一消息包括第一映射规则,所述第一映射规则包括至少一个RAN网络切片的信息;所述第一网络设备向所述终端设备发送接入控制信息。因为RAN网络切片的信息与CN网络切片的信息通常是一对多的映射关系,所以,RAN向UE发送的第一映射规则中包括的是至少一个RAN网络切片的信息,相对于现有技术而言,本申请实施例中第一映射规则的配置内容要小一些,复杂度比较低。An embodiment of the present application sends a first message to a terminal device by using a first network device, where the first message includes a first mapping rule, where the first mapping rule includes information of at least one RAN network slice; the first network device sends The terminal device sends access control information. Because the information of the RAN network slice and the information of the CN network slice are usually one-to-many mapping relationship, the first mapping rule sent by the RAN to the UE includes information of at least one RAN network slice, which is compared with the prior art. The configuration content of the first mapping rule in the embodiment of the present application is smaller and the complexity is relatively low.
附图说明DRAWINGS
为了更清楚地说明本申请实施例技术方案,下面将对实施例和现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的一些实施例,还可以根据这些附图获得其它的附图。In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings used in the embodiments and the prior art description will be briefly described below. Obviously, the drawings in the following description are only some implementations of the present application. For example, other drawings can also be obtained from these drawings.
图1为本申请实施例中3GPP支持多个网络切片的示意图;FIG. 1 is a schematic diagram of 3GPP supporting multiple network slices in the embodiment of the present application;
图2A为本申请实施例中所应用的一个场景示意图;2A is a schematic diagram of a scenario applied in an embodiment of the present application;
图2B为本申请实施例中所应用的无线通信系统的一个架构示意图;2B is a schematic structural diagram of a wireless communication system applied in an embodiment of the present application;
图3为本申请实施例中接入控制的方法的一个实施例示意图;FIG. 3 is a schematic diagram of an embodiment of a method for access control according to an embodiment of the present application;
图4为本申请实施例中接入控制的方法的另一个实施例示意图;4 is a schematic diagram of another embodiment of a method for access control in an embodiment of the present application;
图5A为本申请实施例中网络设备的一个实施例示意图;FIG. 5A is a schematic diagram of an embodiment of a network device according to an embodiment of the present application;
图5B为本申请实施例中网络设备的另一个实施例示意图;FIG. 5B is a schematic diagram of another embodiment of a network device according to an embodiment of the present application;
图6A为本申请实施例中终端设备的一个实施例示意图;6A is a schematic diagram of an embodiment of a terminal device according to an embodiment of the present application;
图6B为本申请实施例中终端设备的另一个实施例示意图;6B is a schematic diagram of another embodiment of a terminal device according to an embodiment of the present application;
图7为本申请实施例中网络设备的另一个实施例示意图;FIG. 7 is a schematic diagram of another embodiment of a network device according to an embodiment of the present application;
图8为本申请实施例中终端设备的另一个实施例示意图。FIG. 8 is a schematic diagram of another embodiment of a terminal device according to an embodiment of the present application.
具体实施方式detailed description
本申请实施例提供了一种接入控制的方法、网络设备以及终端设备,用于降低网络切片接入控制的复杂度。The embodiment of the present application provides a method for access control, a network device, and a terminal device, which are used to reduce the complexity of network slice access control.
为了使本技术领域的人员更好地理解本申请方案,下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行描述,显然,所描述的实施例仅仅是本申请一部分的实施例,而不是全部的实施例。基于本申请中的实施例,都应当属于本申请保护的范围。In the following, the technical solutions in the embodiments of the present application are described in conjunction with the accompanying drawings in the embodiments of the present application. It is obvious that the described embodiments are only a part of the present application. Embodiments, rather than all of the embodiments. Based on the embodiments in the present application, they should all fall within the scope of protection of the present application.
本申请实施例涉及无线接入网设备,终端设备以及核心网设备。The embodiments of the present application relate to a radio access network device, a terminal device, and a core network device.
其中,接入网设备,还可称为基站,是一种部署在无线接入网中用以为终端设备提供无线通信功能的装置,包括但不限于:各种形式的宏基站,微基站(也称为小站),中继站,发送接收点(Transmission Reception Point,TRP),演进型节点B(evolved Node B,eNB)、无线网络控制器(radio network controller,RNC)、节点B(Node B,NB)、基站控制器(Base Station Controller,BSC)、基站收发台(Base Transceiver Station,BTS)、家庭基站(例如,Home evolved NodeB,或Home Node B,HNB)、以及处理通信数据的基带单元(BaseBand Unit,BBU)等。在采用不同的无线接入技术的系统中,具备相类似无线通信功能的无线接入网设备的名称可能会有所不同。仅为方便描述,本申请所有实施例中,上述为终端设备提供无线通信功能的装置统称为无线接入网设备。The access network device, which may also be referred to as a base station, is a device deployed in the radio access network to provide wireless communication functions for the terminal device, including but not limited to: various forms of macro base stations, micro base stations (also It is called a small station, a relay station, a Transmission Reception Point (TRP), an evolved Node B (eNB), a radio network controller (RNC), and a Node B (Node B, NB). Base Station Controller (BSC), Base Transceiver Station (BTS), home base station (for example, Home evolved NodeB, or Home Node B, HNB), and baseband unit for processing communication data (BaseBand) Unit, BBU), etc. In systems employing different wireless access technologies, the names of wireless access network devices with similar wireless communication capabilities may vary. For convenience of description, in all embodiments of the present application, the foregoing apparatus for providing a wireless communication function for a terminal device is collectively referred to as a radio access network device.
其中,终端设备,在无线通信标准中也称为用户设备(user equipment,UE)或者移动台(mobile station,MS)等,本申请实施例中所涉及到的终端设备是一种具有无线收发功能的设备,可以部署在陆地上,包括室内或室外、手持或车载;也可以部署在水面上(如轮船等);还可以部署在空中(例如飞机、气球和卫星上等)。所述终端设备可以包括各种类型的手机(mobile phone)、平板电脑(Pad)、带无线收发功能的电脑、无线数据卡、虚拟现实(Virtual Reality,VR)终端设备、增强现实(Augmented Reality,AR)终端 设备、机器类型通信(machine type communication,MTC)的终端设备,工业控制(industrial control)中的终端设备、无人驾驶(self driving)中的终端设备、远程医疗(remote medical)中的终端设备、智能电网(smart grid)中的终端设备、运输安全(transportation safety)中的终端设备、智慧城市(smart city)中的终端设备、智能家居(具有无线通信功能的家居设备,如冰箱、电视、洗衣机或者家具等),以及可穿戴设备(如智能手表,智能手环,计步器等)等等。本申请所称的终端设备,还可以被设置成固定位置,具有和前述终端设备相类似无线通信功能的设备。在采用不同的无线接入技术的系统中,具备相类似无线通信功能的终端设备的名称可能会有所不同,仅为描述方便,本申请实施例中,上述具有无线通信功能的装置统称为终端设备。The terminal device is also referred to as a user equipment (UE) or a mobile station (MS) in the wireless communication standard. The terminal device involved in the embodiment of the present application is a wireless transceiver function. The equipment can be deployed on land, indoors or outdoors, hand-held or on-board; it can also be deployed on the water (such as ships); it can also be deployed in the air (such as airplanes, balloons, satellites, etc.). The terminal device may include various types of mobile phones, tablets, computers with wireless transceiver functions, wireless data cards, virtual reality (VR) terminal devices, and augmented reality (Augmented Reality, AR) terminal equipment, terminal equipment of machine type communication (MTC), terminal equipment in industrial control, terminal equipment in self driving, and remote medical Terminal equipment, terminal equipment in smart grid, terminal equipment in transportation safety, terminal equipment in smart city, smart home (home equipment with wireless communication function, such as refrigerator, TV, washing machine or furniture, etc., as well as wearable devices (such as smart watches, smart bracelets, pedometers, etc.) and so on. The terminal device referred to in the present application can also be set to a fixed position, and has a device similar to the wireless communication function of the foregoing terminal device. In a system using a different wireless access technology, the name of the terminal device having a similar wireless communication function may be different. For the convenience of description, in the embodiment of the present application, the device having the wireless communication function is collectively referred to as a terminal. device.
其中,核心网设备,可以是具有接入以及移动性管理网络功能、会话管理网络功能(Session Management NF,SMF)、用户面网络功能、鉴权管理网络功能、AMF的设备。The core network device may be a device having an access and mobility management network function, a session management network function (SMF), a user plane network function, an authentication management network function, and an AMF.
在本专利申请中出现的术语“和/或”,仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。另外,本申请中字符“/”,一般表示前后关联对象是一种“或”的关系。The term "and/or" appearing in this patent application is merely an association describing the associated object, indicating that there may be three relationships, for example, A and/or B, which may indicate that A exists separately, while A exists. And B, there are three cases of B alone. In addition, the character "/" in the present application generally indicates that the context of the context is an "or" relationship.
在本专利申请中可能出现的对各种消息/信息/设备/网元/系统/装置/动作/操作/流程/概念等各类客体进行了赋名,但这些具体的名称并不构成对相关客体的限定,所赋名称可随着场景,语境或者使用习惯等因素而变更,对相关客体的技术含义的理解,应主要从其在技术方案中所体现/执行的功能和技术效果来确定。Various objects such as various messages/information/devices/network elements/systems/devices/actions/operations/processes/concepts may be named in this patent application, but these specific names do not constitute relevant The definition of the object may be changed according to factors such as scene, context or usage habits. The understanding of the technical meaning of the relevant object shall be determined mainly from the functions and technical effects embodied/executed in the technical solution. .
随着多种多样的通信系统业务的不断涌现,不同的通信业务对网络性能的需求存在显著的区别,5G引入了网络切片的概念,以应对不同通信业务对网络性能需求的差异。With the emergence of a variety of communication system services, there is a significant difference in the network performance requirements of different communication services. 5G introduces the concept of network slicing to cope with the difference in network performance requirements of different communication services.
一个完整的网络切片包含但不限于RAN网络切片以及CN网络切片,共同构建端到端的网络切片架构,CN网络切片通过一组定制化的NF,包含接入以及移动性管理功能(Access and Mobility Management Function,AMF)、会话管理功能(Session Management Function,SMF)、用户面功能(User Plane Function,UPF)等。RAN网络切片通过调度以及一组不同的第一协议层1(如物理层)、第二协议层2(如媒体接入控制层,无线链路控制层,数据分组聚合层等)等的配置来实现不同的RAN网络切片。这里不限制具体RAN网络切片的实现形式,可以通过原子化、模块化,也可以通过软件化、实例化等的方式来实现。A complete network slice includes but is not limited to RAN network slices and CN network slices to jointly build an end-to-end network slice architecture. CN network slices pass through a set of customized NFs, including access and mobility management functions (Access and Mobility Management). Function, AMF), Session Management Function (SMF), User Plane Function (UPF), etc. The RAN network slice is configured by scheduling and a set of different first protocol layer 1 (such as physical layer), second protocol layer 2 (such as media access control layer, radio link control layer, data packet aggregation layer, etc.) Implement different RAN network slices. The implementation form of the specific RAN network slice is not limited herein, and may be implemented by atomization, modularization, or by software, instantiation, or the like.
一般而言,CN网络切片根据租户以及业务类型等不同,数目较多,而RAN网络切片由于空口资源受限等因素数目较少,CN网络切片与RAN网络切片为多对一或者多对多的关系,极端情况可以达到一对一的比例。In general, the CN network slice is different according to the tenant and the service type, and the number of RAN network slices is small due to factors such as limited air interface resources. The CN network slice and the RAN network slice are many-to-one or many-to-many. Relationships, extreme situations can reach a one-to-one ratio.
目前3GPP关于网络架构的讨论主要集中在网络切片选择,网络切片选择的目的是为UE选择合适的网络切片,并将UE与特定的网络切片进行关联,从而与该网络切片建立对应的控制面CP(control plane,CP)和/或用户面UP(user plane,UP)的连接。At present, the discussion of network architecture in 3GPP mainly focuses on network slice selection. The purpose of network slice selection is to select a suitable network slice for the UE, and associate the UE with a specific network slice, thereby establishing a control plane CP corresponding to the network slice. (control plane, CP) and / or user plane UP (user plane, UP) connection.
下面对基于网络切片的接入控制做一个简要的说明,如下所示:The following is a brief description of network slice based access control, as follows:
网络切片可以看成逻辑独立的虚拟网络,不同的网络切片需要保证隔离的需求,因此当一个网络切片的负载过重时,需要避免对其他的网络切片造成负面的影响,因此基于网络切片的接入控制可以有效保证网络切片的隔离,从而满足运营商与网络切片客户签署的 业务需求,或者服务等级协议(Service Level Agreement,SLA)的需求。Network slicing can be regarded as a logically independent virtual network. Different network slicing needs to ensure the isolation requirement. Therefore, when the load of one network slice is too heavy, it is necessary to avoid negative impact on other network slicing, so the network slice based connection Incoming control can effectively ensure the isolation of network slices, so as to meet the business requirements signed by operators and network slicing customers, or the requirements of Service Level Agreement (SLA).
接入控制具体来说,可以通过限制UE接入网络的比例,例如设计接入限制参数,包含接入因子、接入后退时间(back-off)等,按比例限制UE的网络接入,从而达到接入控制的目的,还可以针对不同的业务设置不同的接入限制参数,从而实现业务特有的接入控制,还可以根据不同的用户接入等级限制某些用户的接入。Specifically, the access control may limit the proportion of the UE accessing the network, for example, designing an access restriction parameter, including an access factor, an access back-off, and the like, thereby limiting the network access of the UE proportionally. To achieve the purpose of access control, different access restriction parameters can be set for different services, thereby implementing service-specific access control, and restricting access of certain users according to different user access levels.
目前LTE系统支持多种接入控制的技术,已知有以下几种实现方式:Currently, the LTE system supports multiple access control technologies, and the following implementation methods are known:
1)普通的接入限制检查(Access Barring Check,ABC),按照信令、紧急业务、数据等类型进行接入控制,也可以按照不同的公共陆地移动网络(Public Land Mobile Network,PLMN)进行接入控制;1) Ordinary Access Barring Check (ABC), which performs access control according to signaling, emergency services, data, etc., and can also be connected according to different Public Land Mobile Network (PLMN). Into control
2)扩展接入限制(Extended Access Barring,EAB),对普通的ABC进行扩展,从而限制低接入优先级的UE的接入;2) Extended Access Barring (EAB), which extends the normal ABC to limit access of UEs with low access priority;
3)用于数据通信的业务特有的拥塞控制(Application specific Congestion control for Data Communication,ACDC),可以将应用进行分类,按照不同类别(category)设置不同的接入控制参数;3) Application Specific Congestion Control for Data Communication (ACDC) for data communication, which can classify applications and set different access control parameters according to different categories (category);
4)业务特有的接入控制(Service Specific Access Control,SSAC),可以适用于多媒体电话业务(Multi Media Telephony),包含语音、视频呼叫、消息业务、视频图像共享等。4) Service Specific Access Control (SSAC), which can be applied to Multimedia Telephony (Multi Media Telephony), including voice, video call, message service, video image sharing, and the like.
在一种技术中,将LTE已有的ABC方案应用于网络切片,即RAN将网络支持的CN网络切片作为单独的ABC的类别,广播每个CN网络切片适用的接入控制信息,从而实现基于CN网络切片的接入控制;RAN广播CN网络切片适用的接入控制信息,例如CN网络切片1的接入控制信息,CN网络切片2的接入控制信息;UE读取系统消息中各个CN网络切片的接入控制信息,结合要发起连接的CN网络切片,保存对应的接入控制信息;UE再进行接入控制检查,从而决定是否需要发起无线资源控制(Radio Resource Control,RRC)连接请求。In one technology, the existing ABC scheme of LTE is applied to network slicing, that is, the RAN uses the CN network slice supported by the network as a separate ABC category, and broadcasts access control information applicable to each CN network slice, thereby implementing CN network slice access control; RAN broadcast CN network slice applicable access control information, such as CN network slice 1 access control information, CN network slice 2 access control information; UE reads system information in each CN network The slice access control information is combined with the CN network slice to initiate the connection, and the corresponding access control information is saved; the UE performs an access control check to determine whether a Radio Resource Control (RRC) connection request needs to be initiated.
但是上述技术仅在LTE现有的基础上增加了CN网络切片的类别,由于CN网络切片数目过多,造成该技术开销大,后向兼容性差。However, the above technology only adds the category of the CN network slice based on the existing LTE. The excessive number of CN network slices causes the technical overhead and the backward compatibility to be poor.
5G系统标准制定过程中尝试提出一种统一的接入控制机制(unified access barring),可以设计一个公用的架构,从而简化5G的接入控制机制。In the 5G system standard setting process, a unified access barring is proposed, and a common architecture can be designed to simplify the 5G access control mechanism.
该方案中,CN可以配置UE适用的接入类别,这个配置包含一个映射规则,例如包含UE的接入等级、CN网络切片的信息、应用、业务类别等方面映射到一个具体的接入类别(Access category),可以称为CN接入类别。其中,CN接入类别可以理解为查找映射规则中包含的至少一个因素(例如UE的接入等级、至少一个CN网络切片的信息、应用、业务类别等)对应的接入控制信息的索引。进一步地,该映射规则可以由CN通过非接入层(non-access stratum,NAS)消息发送给UE,在注册或者注册区域更新的过程中传递。该映射规则可以以表格的形式呈现,如下述表1所示。In this solution, the CN may configure an access category applicable to the UE, and the configuration includes a mapping rule, for example, mapping the access level of the UE, the information of the CN network slice, the application, the service category, and the like to a specific access category ( Access category), which can be called the CN access category. The CN access category may be understood as an index of the access control information corresponding to at least one factor (for example, an access level of the UE, information of at least one CN network slice, an application, a service category, and the like) included in the mapping rule. Further, the mapping rule may be sent by the CN to the UE through a non-access stratum (NAS) message, and is transmitted during registration or registration area update. The mapping rules can be presented in the form of a table, as shown in Table 1 below.
Figure PCTCN2018091436-appb-000001
Figure PCTCN2018091436-appb-000001
表1Table 1
UE可以触发网络接入,再根据获取的配置信息,该配置信息可以包括映射规则,决定这次接入对应的CN接入类别。RAN通过系统消息指示CN接入类别对应的CN接入控制信息,例如可以使用接入限制比例以及限制时间,或者比特地图来指示是否需要限制UE接入等。UE再进行接入限制检查,即发起接入尝试之前,UE首先使用确定的CN接入类别,判断是否能发起接入;如果UE决定此次接入没有被限制,发起接入尝试。The UE may trigger the network access, and according to the obtained configuration information, the configuration information may include a mapping rule, and determine the CN access category corresponding to the access. The RAN indicates the CN access control information corresponding to the CN access category through the system message, for example, the access restriction ratio and the restricted time, or the bit map may be used to indicate whether the UE access needs to be restricted or the like. The UE performs the access restriction check again, that is, before initiating the access attempt, the UE first uses the determined CN access category to determine whether the access can be initiated; if the UE determines that the access is not restricted, the access attempt is initiated.
该方案由CN统一控制,但CN网络切片数目太大,要保证不同的EAB/ACDC以及CN网络切片的不同组合能够映射到合适的access category,就会造成NAS级配置表格过大,复杂度较高;而且UE请求的CN网络切片可能与网络分配的CN网络切片不同。比如UE请求的某一个租户的CN网络切片在当前区域不可用,CN分配一个可以替代的另一个租户的相同CN网络切片或者业务类型相同的CN网络切片。RAN接入控制的粒度不同于CN网络切片,造成RAN基于网络切片的接入控制灵活性差。The scheme is controlled by the CN, but the number of CN network slices is too large. To ensure that different combinations of EAB/ACDC and CN network slices can be mapped to the appropriate access category, the NAS configuration table is too large and complex. High; and the CN network slice requested by the UE may be different from the CN network slice allocated by the network. For example, the CN network slice of a tenant requested by the UE is unavailable in the current area, and the CN allocates an identical CN network slice of another tenant that can be replaced or a CN network slice of the same service type. The granularity of the RAN access control is different from that of the CN network slice, resulting in poor access control flexibility of the RAN based on the network slice.
如图2A所示,为本申请实施例所应用的一个场景示意图。本申请实施例以LTE系统为例,UE位于宏基站或小基站提供的一个或多个小区(载波)的覆盖范围内,为UE服务的小区可以为一个或多个。当为UE的服务小区有多个时,UE可以按照载波聚合(carrier aggregation,CA)或双连接(Dual connectivity,DC)或协作多点传输(CoMP,coordinated multiple point transmission)方式工作,其中至少一个小区提供多于一种空口技术格式,例如多于一种的传输时间间隔(transmission time interval,TTI),多于一种的子载波间隔宽度,多于一种的循环前缀长度等的空口格式或者传输特性,同时为UE提供无线资源。本申请也适用于通用移动通信系统(Universal Mobile Telecommunications System,UMTS)系统、码分多址(Code Division Multiple Access,CDMA)系统、无线局域网(wireless local area network,WLAN)或未来5G(the fifth generation)无线通信系统等。FIG. 2A is a schematic diagram of a scenario applied to an embodiment of the present application. The LTE system is used as an example. The UE is located in the coverage of one or more cells (carriers) provided by the macro base station or the small base station, and the number of cells serving the UE may be one or more. When there are multiple serving cells of the UE, the UE may work according to carrier aggregation (CA) or dual connectivity (DC) or coordinated multiple point transmission (CoMP), at least one of which The cell provides more than one air interface technology format, such as more than one transmission time interval (TTI), more than one subcarrier spacing width, more than one cyclic prefix length, etc. Transmission characteristics while providing wireless resources to the UE. The present application is also applicable to a Universal Mobile Telecommunications System (UMTS) system, a Code Division Multiple Access (CDMA) system, a wireless local area network (WLAN), or a future 5G (the fifth generation). ) Wireless communication systems, etc.
如图2B所示,为本申请实施例所应用的无线通信系统的一个架构示意图。可以包括第一网络设备、终端设备和第二网络设备,终端设备以UE、第一网络设备以RAN、第二网络设备以CN为例来进行说明。即该无线通信系统可以包括接入网(Radio Access Network,RAN)设备110、核心网(Core Network,CN)设备120和用户设备(User Equipment,UE)130。本申请实施例的通信系统支持网络切片架构,该通信系统中的核心网网络切片可以共 享核心网网络设备和/或核心网网络资源,也可以独占核心网网络设备和/或核心网网络资源。如图2B所示,在该无线通信系统中,UE 130通过RAN设备110接入一个或多个RAN网络切片或者CN网络切片。具体地,RAN设备110根据UE 130提供的信息,以及配置或获取的接入和移动性管理功能(Access and Mobility Management Function,AMF)信息,为UE 130选择AMF。FIG. 2B is a schematic structural diagram of a wireless communication system applied to an embodiment of the present application. The first network device, the terminal device, and the second network device may be included. The terminal device is described by using the UE, the first network device in the RAN, and the second network device as the CN. That is, the wireless communication system may include a Radio Access Network (RAN) device 110, a Core Network (CN) device 120, and a User Equipment (UE) 130. The communication system of the embodiment of the present application supports a network slicing architecture in which core network network slices can share core network equipment and/or core network resources, and can also monopolize core network equipment and/or core network resources. As shown in FIG. 2B, in the wireless communication system, the UE 130 accesses one or more RAN network slices or CN network slices through the RAN device 110. Specifically, the RAN device 110 selects the AMF for the UE 130 according to the information provided by the UE 130 and the Access and Mobility Management Function (AMF) information configured or acquired.
本申请实施例中,第一网络设备向终端设备发送第一消息,所述第一消息包括第一映射规则,所述第一映射规则包括至少一个RAN网络切片的信息;所述第一网络设备向所述终端设备发送接入控制信息。终端设备可以根据接收的第一映射规则和接入控制信息进行接入控制检查。因为RAN网络切片的信息与CN网络切片的信息通常是一对多的映射关系,所以,RAN向UE发送的第一映射规则中包括的是至少一个RAN网络切片的信息,相对于现有技术而言,本申请实施例中第一映射规则的配置内容要小一些,复杂度比较低。解决了CN网络切片较多,造成NAS级别表格配置过大,复杂度过高的问题。In the embodiment of the present application, the first network device sends a first message to the terminal device, where the first message includes a first mapping rule, where the first mapping rule includes information of at least one RAN network slice; the first network device Sending access control information to the terminal device. The terminal device may perform an access control check according to the received first mapping rule and the access control information. Because the information of the RAN network slice and the information of the CN network slice are usually one-to-many mapping relationship, the first mapping rule sent by the RAN to the UE includes information of at least one RAN network slice, which is compared with the prior art. The configuration content of the first mapping rule in the embodiment of the present application is smaller and the complexity is relatively low. The problem that the CN network slice is more, which causes the NAS level table configuration to be too large and the complexity is too high.
进一步的,第一映射规则还可以包括所述至少一个RAN网络切片的信息与至少一个RAN接入类别的映射关系,或者,所述第一映射规则还包括所述至少一个RAN网络切片的信息与所述至少一个CN接入类别的映射关系,或者,所述第一映射规则还可以包括所述至少一个RAN网络切片的信息、至少一个RAN接入类别与至少一个CN接入类别的映射关系。解决了UE请求的CN网络切片的信息与CN分配的CN网络切片的信息不一致的情况,因为相同的CN网络切片的信息或者业务类型映射在RAN的RAN网络切片的信息大多数情况是相同的。还实现了RAN基于RAN网络切片粒度的接入控制。Further, the first mapping rule may further include a mapping relationship between the information of the at least one RAN network slice and the at least one RAN access category, or the first mapping rule further includes information about the at least one RAN network slice. The mapping relationship of the at least one CN access category, or the first mapping rule may further include information of the at least one RAN network slice, a mapping relationship between the at least one RAN access category and the at least one CN access category. The situation that the information of the CN network slice requested by the UE is inconsistent with the information of the CN network slice allocated by the CN is solved, because the information of the same CN network slice or the information of the service type mapped on the RAN network slice of the RAN is mostly the same. The access control of the RAN based on the RAN network slice granularity is also implemented.
在下述的实施例中,终端设备以UE、第一网络设备以RAN、第二网络设备以CN为例来进行说明。In the following embodiments, the terminal device is described by using the UE, the first network device in the RAN, and the second network device as the CN.
下面以实施例的方式对本申请技术方案做进一步的说明,如图3所示,为本申请实施例中接入控制的方法的一个实施例示意图,包括:The technical solution of the present application is further described in the following embodiments. As shown in FIG. 3, it is a schematic diagram of an embodiment of the method for access control in the embodiment of the present application, including:
301、UE将上行消息发送给CN。301. The UE sends an uplink message to the CN.
在本申请实施例中,UE通过RAN向CN发送上行消息。该上行消息可以是注册请求或者注册区域更新请求等非接入层(Non-access stratum,NAS)消息。即UE通过RAN向CN(例如CN可以是接入管理功能、接入以及移动性管理功能等)发起注册管理请求,请求UE与CN注册,完成身份识别、鉴权、或者注册区域更新等功能。In this embodiment of the present application, the UE sends an uplink message to the CN through the RAN. The uplink message may be a non-access stratum (NAS) message such as a registration request or a registration area update request. That is, the UE initiates a registration management request to the CN through the RAN (for example, the CN may be an access management function, an access, and a mobility management function, etc.), requesting the UE to register with the CN, and completing functions such as identity recognition, authentication, or registration area update.
应理解,该NAS消息可以是注册管理相关的任意上行消息,不局限于上述的注册请求或者注册区域更新请求等NAS消息。在一种可能的实现方式中,该上行消息可以携带至少一个CN网络允许的切片选择辅助信息(network slice selection assistance information,NSSAI),用于辅助CN为UE选择适合接入的CN网络切片的信息。It should be understood that the NAS message may be any uplink message related to registration management, and is not limited to NAS messages such as the above-mentioned registration request or registration area update request. In a possible implementation manner, the uplink message may carry at least one network slice selection assistance information (NSSAI) allowed by the CN network, and is used to assist the CN to select, for the UE, information about the CN network slice suitable for accessing. .
302、CN获取第一映射规则,第一映射规则包括至少一个CN接入类别。302. The CN acquires a first mapping rule, where the first mapping rule includes at least one CN access category.
在本申请实施例中,CN收到上行消息之后,CN配置UE适用的CN接入类别,可以得到第一映射规则,第一映射规则包括至少一个CN接入类别。例如,第一映射规则可以包含UE的接入等级、至少一个CN网络切片的信息、应用、业务类别等因素映射到一个具体的接入类别(Access category),这里可以称为CN接入类别,CN接入类别可以理解为查找 第一映射规则中包含的至少一个因素(例如UE的接入等级、至少一个CN网络切片的信息、应用、业务类别等)对应的接入控制信息的索引。进一步的,CN接入类别可以用数字、字母、字节等来指示,在本申请实施例中不做具体限定。In the embodiment of the present application, after the CN receives the uplink message, the CN configures the CN access category applicable to the UE, and the first mapping rule is obtained, where the first mapping rule includes at least one CN access category. For example, the first mapping rule may include an access level of the UE, information of at least one CN network slice, an application, a service category, and the like, mapped to a specific access category, which may be referred to herein as a CN access category. The CN access category may be understood as an index for finding access control information corresponding to at least one factor (eg, access level of the UE, information of at least one CN network slice, application, service category, etc.) included in the first mapping rule. Further, the CN access category may be indicated by a number, a letter, a byte, or the like, and is not specifically limited in the embodiment of the present application.
可选的,第一映射规则可以以表格的形式呈现,第一映射规则没有包括至少一个CN网络切片的信息,如下表2所示:Optionally, the first mapping rule may be presented in the form of a table, where the first mapping rule does not include information about at least one CN network slice, as shown in Table 2 below:
Figure PCTCN2018091436-appb-000002
Figure PCTCN2018091436-appb-000002
表2Table 2
可选的,在第一映射规则中,可以包括至少一个CN网络切片的信息,如下表3所示:Optionally, in the first mapping rule, information about at least one CN network slice may be included, as shown in Table 3 below:
Figure PCTCN2018091436-appb-000003
Figure PCTCN2018091436-appb-000003
表3table 3
需要说明的是,表2和表3只是第一映射规则的一个示例,第一映射规则包括至少一个CN接入类别,其他包括的因素可以大于或小于上述表2和表3所示。It should be noted that Tables 2 and 3 are only one example of the first mapping rule. The first mapping rule includes at least one CN access category, and other factors may be greater or smaller than those shown in Tables 2 and 3 above.
可选的,若第一映射规则包括至少一个CN网络切片的信息,该至少一个CN网络切片的信息可以通过至少一个CN网络允许的网络切片选择辅助信息(network slice selection assistance information,NSSAI)来表示,具体而言,该CN网络允许的网络切片选择辅助信息包含但不限于以下相关信息:Optionally, if the first mapping rule includes information about at least one CN network slice, the information of the at least one CN network slice may be represented by at least one network slice selection assistance information (NSSAI) allowed by the CN network. Specifically, the network slice selection auxiliary information allowed by the CN network includes but is not limited to the following related information:
网络切片类型:例如增强的移动宽带业务(enhanced Mobile Broadband,eMBB)、超可靠低时延通信(Ultra-Reliable Low lactecncy Communications,URLLC)、海量机器类通信(Massive Machine Type Communication,mMTC)等指示网络切片类型的信息。进一步地,该网络切片类型可以指端到端网络切片类型,包含RAN网络切片类型以及CN网络切片类型,也可以指RAN网络切片类型,或者CN网络切片类型。Network slice type: for example, enhanced mobile broadband service (eMBB), ultra-reliable low-latency communication (URLLC), massive machine type communication (mMTC), etc. Slice type information. Further, the network slice type may refer to an end-to-end network slice type, including a RAN network slice type and a CN network slice type, and may also refer to a RAN network slice type, or a CN network slice type.
业务类型:与具体的业务相关,例如视频业务、车联网业务、语音业务等指示业务特征或者具体业务的信息。Service type: related to a specific service, such as video service, car network service, voice service, etc., indicating service characteristics or specific service information.
网络切片区分(differentiator):辅助网络切片类型、业务类型,用于进一步区分网络切片的信息,可以用于区分在同一个网络切片类型或者业务类型下的网络切片。Network slice differentiation: The auxiliary network slice type and service type are used to further distinguish network slice information. It can be used to distinguish network slices under the same network slice type or service type.
租户(Tenant)信息:用于指示创建或者租用该网络切片的客户信息,如腾讯、国家电网等。Tenant information: Used to indicate the customer information for creating or renting the network slice, such as Tencent, State Grid, etc.
用户组信息:用于指示按照某种特征,如用户的级别等将用户进行分组的分组信息。User group information: Group information for indicating that users are grouped according to certain characteristics, such as the level of the user.
网络切片实例信息:用于指示为该网络切片创建的实例标识以及特征信息。例如,为网络切片实例分配一个标识,用于指示该网络切片实例,也可以在网络切片实例标识的基础上映射一个新的标识,关联该网络切片实例,接收方可以根据该标识识别出代表的具体网络切片实例。Network slice instance information: used to indicate the instance ID and feature information created for the network slice. For example, the network slice instance is assigned an identifier for indicating the network slice instance, and a new identifier may be mapped on the basis of the network slice instance identifier, and the network slice instance is associated with the identifier, and the receiver may identify the representative according to the identifier. Specific network slice instance.
专有核心网(Dedicated Core Network,DCN)标识:该标识用于唯一指示专有核心网,例如物联网专有的核心网。可选的,该DCN标识可以与网络切片标识做映射,由DCN标识可以映射出网络切片标识,通过网络切片标识也可以映射出DCN标识。Dedicated Core Network (DCN) identification: This identifier is used to uniquely indicate a proprietary core network, such as the core network of the Internet of Things. Optionally, the DCN identifier may be mapped to the network slice identifier, and the network slice identifier may be mapped by the DCN identifier, and the DCN identifier may also be mapped by using the network slice identifier.
需要说明的是,CN Allowed NSSAI列表的确定方式为:CN可以根据UE上报的CN允许的网络切片选择辅助信息(CN NSSAI)、UE的签约信息、本地策略、网络切片的可用性等因素选择同意UE在当前的注册区允许接入的至少一个CN网络切片的信息,该至少一个CN网络切片的信息可以以列表的形式呈现,可称为CN允许的NSSAI(CN Allowed NSSAI)列表,也可以以其他的方式表示,具体不做限定。It should be noted that the CN Allowed NSSAI list is determined in such a manner that the CN can select the UE according to factors such as the network slice selection assistance information (CN NSSAI) allowed by the UE, the UE subscription information, the local policy, and the availability of the network slice. Information of at least one CN network slice that is allowed to be accessed in the current registration area, the information of the at least one CN network slice may be presented in the form of a list, which may be referred to as a CN allowed NSSAI (CN Allowed NSSAI) list, or may be other The way is expressed, the specific is not limited.
303、CN将第一下行消息发送给RAN。303. The CN sends the first downlink message to the RAN.
在本申请实施例中,CN向RAN发送第一下行消息,RAN接收来自于CN的第一下行消息。第一下行消息可以包括第一映射规则和CN Allowed NSSAI列表,第一映射规则包括至少一个CN接入类别;或者,第一下行消息可以包括第一映射规则,第一映射规则包括至少一个CN接入类别;或者,第一下行消息可以包括CN Allowed NSSAI列表。In this embodiment, the CN sends a first downlink message to the RAN, and the RAN receives the first downlink message from the CN. The first downlink message may include a first mapping rule and a CN Allowed NSSAI list, where the first mapping rule includes at least one CN access category; or the first downlink message may include a first mapping rule, where the first mapping rule includes at least one The CN access category; or the first downlink message may include a CN Allowed NSSAI list.
可选的,当第一映射规则和CN Allowed NSSAI列表都需要发给RAN的时候,第一下行消息可以包括第一映射规则,CN Allowed NSSAI列表也可以通过另一个下行消息发送给RAN。第一映射规则可以参考上述表2和表3所示,此处不再赘述。其中,第一下行消息可以为NAS消息,通过CN和RAN接口向RAN发送,例如:CN通过N2接口向RAN发送第一下行消息。Optionally, when both the first mapping rule and the CN Allowed NSSAI list need to be sent to the RAN, the first downlink message may include the first mapping rule, and the CN Allowed NSSAI list may also be sent to the RAN by another downlink message. For the first mapping rule, refer to Table 2 and Table 3 above, and details are not described herein again. The first downlink message may be a NAS message, and is sent to the RAN through the CN and the RAN interface. For example, the CN sends the first downlink message to the RAN through the N2 interface.
304、RAN获取第二映射规则,所述第二映射规则包括至少一个RAN网络切片的信息。304. The RAN acquires a second mapping rule, where the second mapping rule includes information of at least one RAN network slice.
在本申请实施例中,RAN接收CN发送的第一下行消息。第一下行消息可以包括第一映射规则和CN Allowed NSSAI列表,第一映射规则包括至少一个CN接入类别;或者,第一下行消息可以包括第一映射规则,第一映射规则包括至少一个CN接入类别;或者,第一下行消息可以包括CN Allowed NSSAI列表。进一步的,RAN获取第二映射规则,所述第二映射规则包括至少一个RAN网络切片的信息。可选的,RAN接收的第一下行消息中可以包括第一映射规则,接收的另一个下行消息中可以包括CN Allowed NSSAI列表。In this embodiment of the present application, the RAN receives the first downlink message sent by the CN. The first downlink message may include a first mapping rule and a CN Allowed NSSAI list, where the first mapping rule includes at least one CN access category; or the first downlink message may include a first mapping rule, where the first mapping rule includes at least one The CN access category; or the first downlink message may include a CN Allowed NSSAI list. Further, the RAN acquires a second mapping rule, where the second mapping rule includes information of at least one RAN network slice. Optionally, the first downlink message received by the RAN may include a first mapping rule, and another received downlink message may include a CN Allowed NSSAI list.
应理解,若RAN接收的下行消息中包括CN Allowed NSSAI列表,则所述至少一个RAN 网络切片的信息与所述CN Allowed NSSAI列表存在映射关系,第二映射规则可以包括所述至少一个RAN网络切片的信息与所述CN Allowed NSSAI列表;若RAN接收的下行消息中未包括CN Allowed NSSAI列表,则所述至少一个RAN网络切片的信息与当前可用的CN网络切片的信息存在映射关系,第二映射规则可以包括所述至少一个RAN网络切片的信息与当前可用的CN网络切片的信息。示例性的,RAN保存有预设的RAN网络切片的信息与CN网络切片的信息的映射关系,例如,该映射关系可以通过网管预先配置,或者通过CN设备通过CN与RAN之间的接口信息预先配置。一个或多个CN网络切片的信息可以对应一个RAN网络切片的信息,如下表4所示:It should be understood that if the downlink message received by the RAN includes a CN Allowed NSSAI list, the information of the at least one RAN network slice has a mapping relationship with the CN Allowed NSSAI list, and the second mapping rule may include the at least one RAN network slice. The information is related to the CN Allowed NSSAI list; if the CN Allowed NSSAI list is not included in the downlink message received by the RAN, the information of the at least one RAN network slice is mapped to the currently available CN network slice information, and the second mapping is performed. The rules may include information of the at least one RAN network slice and information of currently available CN network slices. Exemplarily, the RAN saves the mapping relationship between the information of the preset RAN network slice and the information of the CN network slice. For example, the mapping relationship may be pre-configured by the network management or through the CN device through the interface information between the CN and the RAN. Configuration. The information of one or more CN network slices may correspond to information of a RAN network slice, as shown in Table 4 below:
RAN Network slice,接入网网络切片的信息RAN Network slice, access network network slice information CN Network slice,核心网网络切片的信息CN Network slice, core network network slice information
11 1,21,2
22 3,43,4
33 5,6,7,85,6,7,8
44 9,10,11,129,10,11,12
55 13,1413,14
66 15,1615,16
77 17,18,1917,18,19
88 20,21,2220, 21, 22
99 23,2423,24
1010 25,2625,26
表4Table 4
(1)若RAN接收的下行消息中包含CN Allowed NSSAI列表,则第二映射规则可以根据预设的RAN网络切片的信息以及CN网络切片的信息的映射关系,如上述表4所示,查找出CN Allowed NSSAI列表对应的至少一个RAN网络切片的信息作为第二映射规则。进一步的,将至少一个RAN网络切片的信息映射到一个具体的接入类别(Access category),这个接入类别可以称为RAN接入类别。例如,该接入类别可以用RAN网络切片标识(RAN network slice ID),也可以使用一个新的接入类别,确定第二映射规则。其中,RAN接入类别可以理解为查找第二映射规则中包含的至少一个因素(例如至少一个RAN网络切片的信息等)对应的接入控制信息的索引。(1) If the downlink message received by the RAN includes the CN Allowed NSSAI list, the second mapping rule may be found according to the mapping relationship between the preset RAN network slice information and the CN network slice information, as shown in Table 4 above. The information of the at least one RAN network slice corresponding to the allowed NSSAI list is used as the second mapping rule. Further, the information of the at least one RAN network slice is mapped to a specific access category, which may be referred to as a RAN access category. For example, the access category may use a RAN network slice ID or a new access category to determine a second mapping rule. The RAN access category may be understood as an index for finding access control information corresponding to at least one factor (for example, information of at least one RAN network slice, etc.) included in the second mapping rule.
应理解,根据步骤302中的说明可知,CN Allowed NSSAI列表是在UE当前的注册区允许接入的至少一个CN网络切片的信息一种表现形式,所以,CN Allowed NSSAI列表也就是至少一个CN网络切片的信息,例如:CN Allowed NSSAI列表如表5所示:It should be understood that, according to the description in step 302, the CN Allowed NSSAI list is a representation of information of at least one CN network slice allowed to be accessed in the current registration area of the UE, so the CN Allowed NSSAI list is at least one CN network. The sliced information, for example: CN Allowed NSSAI list is shown in Table 5:
CN Allowed NSSAI列表CN Allowed NSSAI list
33
99
1717
2020
表5table 5
在表5中,3、9、17和20可以是CN网络切片的标识,也可以是网络切片类型、业务类型、网络切片区分、租户信息、用户组信息、网络切片实例信息、专有核心网标识等指示,用来区分不同的CN网络切片,具体不做限定。In Table 5, 3, 9, 17, and 20 may be identifiers of CN network slices, or may be network slice type, service type, network slice division, tenant information, user group information, network slice instance information, and proprietary core network. Indicators and other indications are used to distinguish different CN network slices, which are not limited.
例如:如表6所示,第二映射规则可以包括至少一个RAN网络切片的信息,该至少一个RAN网络切片的信息是通过表5所示的列表,在上述表4中查找出来的,因为CN Allowed NSSAI列表是至少一个CN网络切片的信息,所以可以通过预设的RAN网络切片的信息和CN网络切片的信息的映射关系查找。其中,RAN网络切片的信息可以以RAN网络切片标识来指示,如下所示:For example, as shown in Table 6, the second mapping rule may include information of at least one RAN network slice, and the information of the at least one RAN network slice is found through the list shown in Table 5 in the above Table 4, because CN The Allowed NSSAI list is information of at least one CN network slice, so it can be searched by the mapping relationship between the preset RAN network slice information and the CN network slice information. The information of the RAN network slice may be indicated by the RAN network slice identifier, as follows:
与CN Allowed NSSAI列表对应的至少一个RAN网络切片的信息Information of at least one RAN network slice corresponding to the CN Allowed NSSAI list
22
44
77
88
表6Table 6
在表6所示的方案中,UE可以根据至少一个RAN网络切片的信息进行接入控制检查,因为RAN网络切片的信息一般与CN网络切片的信息是一对多的关系,所以,第二映射规则的配置内容小于现有的配置内容,复杂度较低。还实现了RAN网络切片粒度的控制。还解决了UE请求的CN网络切片的信息与CN分配的CN网络切片的信息不一致的情况,因为相同业务类型的不同CN网络切片的信息映射在RAN的RAN网络切片的信息大多数情况是相同的。In the solution shown in Table 6, the UE may perform an access control check according to information of at least one RAN network slice, because the information of the RAN network slice is generally one-to-many relationship with the CN network slice information, so the second mapping The configuration content of the rule is smaller than the existing configuration content, and the complexity is low. Control of the RAN network slice granularity is also achieved. The situation that the information of the CN network slice requested by the UE is inconsistent with the information of the CN network slice allocated by the CN is also solved, because the information of the different CN network slices of the same service type is mapped in the RAN network, and the information of the RAN network slice is the same in most cases. .
例如:如表7所示,第二映射规则可以包括至少一个RAN网络切片的信息与至少一个RAN接入类别的映射关系,如下所示:For example, as shown in Table 7, the second mapping rule may include a mapping relationship between information of at least one RAN network slice and at least one RAN access category, as follows:
Figure PCTCN2018091436-appb-000004
Figure PCTCN2018091436-appb-000004
表7Table 7
在表7所示的方案中,UE可以根据至少一个RAN网络切片的信息或者至少一个RAN接入类别进行接入控制检查,提高了本申请技术方案的可选性和灵活性。因为RAN网络切片的信息一般与CN网络切片的信息是一对多的关系,所以,第二映射规则的配置内容小于现有的配置内容,复杂度较低。实现了RAN网络切片粒度的控制。还解决了UE请求的CN网络切片的信息与CN分配的CN网络切片的信息不一致的情况,因为相同业务类型的不同CN网络切片的信息映射在RAN的RAN网络切片的信息大多数情况是相同的。In the solution shown in Table 7, the UE may perform access control check according to information of at least one RAN network slice or at least one RAN access category, which improves the selectivity and flexibility of the technical solution of the present application. Because the information of the RAN network slice is generally one-to-many relationship with the information of the CN network slice, the configuration content of the second mapping rule is smaller than the existing configuration content, and the complexity is low. The control of the RAN network slice granularity is realized. The situation that the information of the CN network slice requested by the UE is inconsistent with the information of the CN network slice allocated by the CN is also solved, because the information of the different CN network slices of the same service type is mapped in the RAN network, and the information of the RAN network slice is the same in most cases. .
例如:如表8所示,第二映射规则可以包括至少一个RAN网络切片的信息与至少一个CN网络切片的信息的映射关系,如下所示:For example, as shown in Table 8, the second mapping rule may include a mapping relationship between information of at least one RAN network slice and information of at least one CN network slice, as follows:
Figure PCTCN2018091436-appb-000005
Figure PCTCN2018091436-appb-000005
表8Table 8
在表8所示的方案中,UE可以根据至少一个RAN网络切片的信息进行RAN网络切片的接入控制检查,或者,可以根据至少一个CN网络切片的信息进行CN网络切片的接入控制检查,提高了本申请技术方案的可选性和灵活性。因为RAN网络切片的信息一般与CN网络切片的信息是一对多的关系,所以,第二映射规则的配置内容小于现有的配置内容,复杂度较低。实现了RAN网络切片粒度的控制。还解决了UE请求的CN网络切片的信息与CN分配的CN网络切片的信息不一致的情况,因为相同业务类型的不同CN网络切片的信息映射在RAN的RAN网络切片的信息大多数情况是相同的。In the solution shown in Table 8, the UE may perform an access control check of the RAN network slice according to the information of the at least one RAN network slice, or may perform an access control check of the CN network slice according to the information of the at least one CN network slice. The selectivity and flexibility of the technical solution of the present application are improved. Because the information of the RAN network slice is generally one-to-many relationship with the information of the CN network slice, the configuration content of the second mapping rule is smaller than the existing configuration content, and the complexity is low. The control of the RAN network slice granularity is realized. The situation that the information of the CN network slice requested by the UE is inconsistent with the information of the CN network slice allocated by the CN is also solved, because the information of the different CN network slices of the same service type is mapped in the RAN network, and the information of the RAN network slice is the same in most cases. .
例如:如表9所示,第二映射规则可以包括至少一个RAN网络切片的信息、至少一个CN网络切片的信息和至少一个RAN接入类别的映射关系,如下所示:For example, as shown in Table 9, the second mapping rule may include information of at least one RAN network slice, information of at least one CN network slice, and a mapping relationship of at least one RAN access category, as follows:
Figure PCTCN2018091436-appb-000006
Figure PCTCN2018091436-appb-000006
表9Table 9
在表9所示的方案中,UE可以根据至少一个RAN网络切片的信息进行RAN网络切片的接入控制检查,或者,可以根据至少一个CN网络切片的信息进行CN网络切片的接入控制检查,或者,还可以根据至少一个RAN接入类别进行RAN网络切片的接入控制检查,提高了本申请技术方案的可选性和灵活性。因为RAN网络切片的信息一般与CN网络切片的信息是一对多的关系,所以,第二映射规则的配置内容小于现有的配置内容,复杂度较低。实现了RAN网络切片粒度的控制。还解决了UE请求的CN网络切片的信息与CN分配的CN网络切片的信息不一致的情况,因为相同业务类型的不同CN网络切片的信息映射在RAN的RAN网络切片的信息大多数情况是相同的。In the solution shown in Table 9, the UE may perform an access control check of the RAN network slice according to the information of the at least one RAN network slice, or may perform an access control check of the CN network slice according to the information of the at least one CN network slice. Alternatively, the access control check of the RAN network slice may be performed according to the at least one RAN access category, which improves the selectivity and flexibility of the technical solution of the present application. Because the information of the RAN network slice is generally one-to-many relationship with the information of the CN network slice, the configuration content of the second mapping rule is smaller than the existing configuration content, and the complexity is low. The control of the RAN network slice granularity is realized. The situation that the information of the CN network slice requested by the UE is inconsistent with the information of the CN network slice allocated by the CN is also solved, because the information of the different CN network slices of the same service type is mapped in the RAN network, and the information of the RAN network slice is the same in most cases. .
需要说明的是,在上述表7-9所述的第二映射规则中,至少一个RAN网络切片的信息可以与至少一个RAN接入类别,或者,CN Allowed NSSAI列表,或者,CN Allowed NSSAI列表和至少一个RAN接入类别存在映射关系,但是,在第二映射规则中也可以不包含至少一个RAN接入类别,或者,CN Allowed NSSAI列表,或者,CN Allowed NSSAI列表和至少一个RAN接入类别,RAN知道它们的映射关系就行,具体不做限定。It should be noted that, in the second mapping rule described in the foregoing Table 7-9, at least one RAN network slice information may be associated with at least one RAN access category, or a CN Allowed NSSAI list, or a CN Allowed NSSAI list and At least one RAN access category has a mapping relationship, but the second mapping rule may also not include at least one RAN access category, or a CN Allowed NSSAI list, or a CN Allowed NSSAI list and at least one RAN access category, The RAN knows their mapping relationship, which is not limited.
(2)若RAN接收的下行消息中没有包含CN Allowed NSSAI列表,第二映射规则可以 根据预设的RAN网络切片的信息以及CN网络切片的信息的映射关系,如上述表4所示,查找出当前RAN或者整个网络允许的至少一个CN网络切片的信息,即将当前可用的CN网络切片的信息对应的至少一个RAN网络切片的信息作为第二映射规则。进一步的,将至少一个RAN网络切片的信息映射到一个具体的接入类别(Access category),这个接入类别可以称为RAN接入类别。例如,该接入类别可以用RAN网络切片标识(Network RAN part ID,NSRPI),也可以使用一个新的接入类别,确定第二映射规则。RAN接入类别可以理解为查找第二映射规则中包含的至少一个因素(例如至少一个RAN网络切片的信息等)对应的接入控制信息的索引。(2) If the downlink message received by the RAN does not include the CN Allowed NSSAI list, the second mapping rule may be found according to the mapping relationship between the preset RAN network slice information and the CN network slice information, as shown in Table 4 above. The current RAN or the information of the at least one CN network slice allowed by the entire network, that is, the information of the at least one RAN network slice corresponding to the currently available CN network slice information is used as the second mapping rule. Further, the information of the at least one RAN network slice is mapped to a specific access category, which may be referred to as a RAN access category. For example, the access category may use a RAN network slice identifier (NSRPI), or a new access category may be used to determine the second mapping rule. The RAN access category may be understood as an index that searches for access control information corresponding to at least one factor (eg, information of at least one RAN network slice, etc.) included in the second mapping rule.
例如:可以参考上述表6、表7、表8和表9任一所示,第二映射规则可以包括至少一个RAN网络切片的信息,或者,可以包括至少一个RAN网络切片的信息与至少一个RAN接入类别的映射关系,或者,可以包括至少一个RAN网络切片的信息与至少一个CN网络切片的信息的映射关系,或者,可以包括至少一个RAN网络切片的信息、至少一个CN网络切片的信息和至少一个RAN接入类别的映射关系。应理解,在(2)的实现方式中,所确定的至少一个CN网络切片的信息是RAN根据当前可用的CN网络切片的信息来确定的,所确定的至少一个CN网络切片的信息的数量可能大于等于上述(1)的方式所确定的至少一个CN网络切片的信息的数量。For example, referring to any of the foregoing Table 6, Table 7, Table 8, and Table 9, the second mapping rule may include information of at least one RAN network slice, or may include information of at least one RAN network slice and at least one RAN. a mapping relationship of the access category, or may include a mapping relationship between information of the at least one RAN network slice and information of the at least one CN network slice, or may include information of at least one RAN network slice, information of at least one CN network slice, and A mapping relationship of at least one RAN access category. It should be understood that, in the implementation of (2), the determined information of the at least one CN network slice is determined by the RAN according to information of the currently available CN network slice, and the determined quantity of information of the at least one CN network slice may be The number of pieces of information of at least one CN network slice determined by the manner of (1) above.
需要说明的是,在(2)的实现方式中,没有CN Allowed NSSAI列表,RAN是根据当前可用的CN网络切片的信息确定的至少一个CN网络切片的信息。那么在参考上述表7-9所述的第二映射规则中,至少一个RAN网络切片的信息可以与至少一个RAN接入类别,或者,当前可用的CN网络切片的信息,或者,当前可用的CN网络切片的信息和至少一个RAN接入类别存在映射关系,但是,在第二映射规则中也可以不包含至少一个RAN接入类别,当前可用的CN网络切片的信息,或者,当前可用的CN网络切片的信息,和至少一个RAN接入类别,具体不做限定。It should be noted that, in the implementation of (2), there is no CN Allowed NSSAI list, and the RAN is information of at least one CN network slice determined according to information of currently available CN network slices. Then, referring to the second mapping rule described in Table 7-9 above, the information of the at least one RAN network slice may be related to at least one RAN access category, or the information of the currently available CN network slice, or the currently available CN. The information of the network slice has a mapping relationship with the at least one RAN access category, but the second mapping rule may also not include at least one RAN access category, information of the currently available CN network slice, or the currently available CN network. The sliced information, and at least one RAN access category, are not specifically limited.
可选的,在第二映射规则中,还可以包括除上述所提及的至少一个RAN网络切片的信息、至少一个CN网络切片的信息、至少一个CN接入类别之外,还可以包括其他因素,具体不做限定。Optionally, in the second mapping rule, the information of the at least one RAN network slice mentioned above, the information of the at least one CN network slice, the at least one CN access category, and other factors may also be included. The specific is not limited.
需要说明的是,在本申请实施例中,至少一个RAN网络切片的信息可以用自行定义的与至少一个CN网络切片具有映射关系的标识来表示,也可以用RAN网络切片标识、RAN网络切片类型信息、RAN业务类型、RAN网络切片区分、RAN租户信息、RAN网络切片实例信息等来表示,用来区分不同的RAN网络切片,具体不做限定。It should be noted that, in the embodiment of the present application, the information of at least one RAN network slice may be represented by a self-defined identifier that has a mapping relationship with at least one CN network slice, and may also use a RAN network slice identifier and a RAN network slice type. Information, RAN service type, RAN network slice classification, RAN tenant information, RAN network slice instance information, etc. are used to distinguish different RAN network slices, which are not limited.
进一步的,在本申请实施例中,如果第一下行消息中包括第一映射规则,那么RAN只是起到转发的作用,即将第一映射规则转发给UE。应理解,RAN接入类别可以用数字、字母、字节等来指示,在本申请实施例中不做具体限定。Further, in the embodiment of the present application, if the first mapping rule is included in the first downlink message, the RAN only plays the role of forwarding, that is, the first mapping rule is forwarded to the UE. It should be understood that the RAN access category may be indicated by a number, a letter, a byte, etc., and is not specifically limited in the embodiment of the present application.
305、RAN将第二下行消息发送给UE,第二下行消息包括第二映射规则。305. The RAN sends the second downlink message to the UE, where the second downlink message includes a second mapping rule.
在本申请实施例中,RAN获取第二映射规则之后,可以向UE发送第二下行信息,所述第二下行信息包括第二映射规则,所述第二映射规则包括至少一个RAN网络切片的信息;UE接收来自于RAN的第二下行消息。其中,所述第二下行消息可以是无线资源控制(Radio  Resource Control,RRC)等AS消息。第二映射规则可以参考上述表6、表7、表8和表9任一所示,此处不再赘述。In the embodiment of the present application, after acquiring the second mapping rule, the RAN may send second downlink information to the UE, where the second downlink information includes a second mapping rule, where the second mapping rule includes information of at least one RAN network slice. The UE receives the second downlink message from the RAN. The second downlink message may be an AS message such as a radio resource control (RRC). For the second mapping rule, reference may be made to any of the foregoing Table 6, Table 7, Table 8, and Table 9, and details are not described herein again.
可选的,第二下行消息还可以包括第一映射规则,第一映射规则包括至少一个CN接入类别,或者,RAN通过另一个下行消息将第一映射规则发送给UE,第一映射规则可以参考上述表2和表3所示,此处不再赘述。Optionally, the second downlink message may further include a first mapping rule, where the first mapping rule includes at least one CN access category, or the RAN sends the first mapping rule to the UE by using another downlink message, where the first mapping rule may be Refer to Table 2 and Table 3 above for details, and details are not described here.
306、UE根据第二映射规则确定至少一个RAN网络切片的信息。306. The UE determines information about at least one RAN network slice according to the second mapping rule.
在本申请实施例中,UE接收RAN发送的第二下行消息,第二下行消息中包括第二映射规则,所述第二映射规则包括至少一个RAN网络切片的信息。第二映射规则可以参考上述表6、表7、表8和表9任一所示,此处不再赘述。In this embodiment, the UE receives the second downlink message sent by the RAN, where the second downlink message includes a second mapping rule, where the second mapping rule includes information of at least one RAN network slice. For the second mapping rule, reference may be made to any of the foregoing Table 6, Table 7, Table 8, and Table 9, and details are not described herein again.
可选的,所述第二映射规则中包括第一映射规则,或者,UE接收另一个下行消息,另一个下行消息中包括第一映射规则,第一映射规则包括至少一个CN接入类别。Optionally, the second mapping rule includes a first mapping rule, or the UE receives another downlink message, and the other downlink message includes a first mapping rule, where the first mapping rule includes at least one CN access category.
307、RAN将接入控制信息发送给UE。307. The RAN sends the access control information to the UE.
在本申请实施例中,RAN向UE发送RAN接入控制信息,UE接收来自于RAN的RAN接入控制信息。应理解,RAN接入控制信息可以是所有RAN网络切片的信息的接入控制信息,也可以是上述至少一个RAN网络切片的信息的接入控制信息。In this embodiment of the present application, the RAN sends RAN access control information to the UE, and the UE receives RAN access control information from the RAN. It should be understood that the RAN access control information may be access control information of information of all RAN network slices, or may be access control information of information of at least one RAN network slice.
可选的,RAN向UE发送CN接入控制信息,UE接收来自于RAN的CN接入控制信息。应理解,CN接入控制信息可以是所有CN网络切片的信息的接入控制信息,也可以是上述至少一个CN网络切片的信息的接入控制信息。Optionally, the RAN sends CN access control information to the UE, and the UE receives CN access control information from the RAN. It should be understood that the CN access control information may be access control information of information of all CN network slices, or may be access control information of information of at least one CN network slice.
308、UE根据第二映射规则和接入控制信息进行接入控制。308. The UE performs access control according to the second mapping rule and the access control information.
在本申请实施例中,UE可以根据第二映射规则和RAN接入控制信息进行接入限制检查。发起接入尝试之前,UE可以根据至少一个RAN网路切片的信息或者至少一个RAN接入类别对应的接入控制信息执行ABC,从而判断是否能发起接入或者业务请求。In this embodiment of the present application, the UE may perform an access restriction check according to the second mapping rule and the RAN access control information. Before initiating an access attempt, the UE may perform ABC according to information of at least one RAN network slice or access control information corresponding to at least one RAN access category, thereby determining whether an access or service request can be initiated.
一种可能的方式为:对应的接入控制信息有接入限制定时器。若该RAN网络切片设置的接入限制定时器正在运行,则终端设备确定该次网络接入请求或者业务请求不能发起。否则,终端设备采用随机数算法选择一个介于0与1之间的均匀分布的随机数;如果该随机数小于接入控制信息中对应的接入限制因子,则终端设备确定该RAN网络切片可以接入;如果该随机数大于或等于对应的接入限制因子,则终端设备确定该RAN网络切片不可以接入,并且终端设备启动该RAN网络切片对应的接入限制定时器,示例性的,该接入限制定时器的定时长度可以为(0.7+0.6*随机数)*接入限制时间。One possible way is that the corresponding access control information has an access restriction timer. If the access restriction timer set by the RAN network slice is running, the terminal device determines that the network access request or the service request cannot be initiated. Otherwise, the terminal device uses a random number algorithm to select a uniformly distributed random number between 0 and 1. If the random number is smaller than the corresponding access restriction factor in the access control information, the terminal device determines that the RAN network slice can be If the random number is greater than or equal to the corresponding access restriction factor, the terminal device determines that the RAN network slice is not accessible, and the terminal device starts an access restriction timer corresponding to the RAN network slice, for example, The timing of the access restriction timer may be (0.7+0.6* random number)* access restriction time.
另一种可能的方式为:RAN接入控制信息包含一个比特地图,该比特地图的不同比特位对应不同的RAN网络切片的信息或者不同的RAN接入类别。例如对应的比特位数值为“0”,表示此次网络切片接入请求或者业务请求可以发起,否则不能发起。具体ABC机制也可以参考LTE系统或者5G系统适用的任何ABC,这里不做限定。如果没有被限制,则UE向第一RAN网络切片发起接入尝试或者业务请求。Another possible way is that the RAN access control information includes a bit map, and different bits of the bit map correspond to different RAN network slice information or different RAN access categories. For example, the corresponding bit number value is “0”, indicating that the network slice access request or service request can be initiated, otherwise it cannot be initiated. The specific ABC mechanism can also refer to any ABC applicable to the LTE system or the 5G system, which is not limited herein. If not, the UE initiates an access attempt or service request to the first RAN network slice.
可选的,UE可以根据第一映射规则和CN接入控制信息进行接入限制检查。发起接入尝试之前,UE可以根据至少一个RAN网路切片的信息或者至少一个RAN接入类别对应的接入控制信息执行ABC,从而判断是否能发起接入或者业务请求。具体ABC机制可以参考LTE 系统或者5G系统适用的任何ABC,这里不做限定。如果没有被限制,则UE可以向第一CN网络切片发起接入尝试或者业务请求。Optionally, the UE may perform an access restriction check according to the first mapping rule and the CN access control information. Before initiating an access attempt, the UE may perform ABC according to information of at least one RAN network slice or access control information corresponding to at least one RAN access category, thereby determining whether an access or service request can be initiated. The specific ABC mechanism can refer to any ABC applicable to the LTE system or the 5G system, which is not limited herein. If not restricted, the UE may initiate an access attempt or service request to the first CN network slice.
需要说明的是,RAN根据第二映射规则和接入控制信息进行接入控制检查包括但不限于上述所提及的两种可能的实现方式,其他根据第二映射规则和接入控制信息进行接入控制检查的方式也在本申请的保护范围内。It should be noted that the access control check performed by the RAN according to the second mapping rule and the access control information includes, but is not limited to, the two possible implementation manners mentioned above, and the other is performed according to the second mapping rule and the access control information. The manner in which the control check is entered is also within the scope of protection of the present application.
本申请实施例中,RAN向UE发送第二下行消息,所述第二下行消息包括第二映射规则,所述第二映射规则包括至少一个RAN网络切片的信息;所述RAN向所述UE发送RAN接入控制信息。需要说明的是,RAN确定的第二映射规则,与RAN接收CN发送的第一映射规则没关系。UE可以根据RAN接入控制信息向所述至少一个RAN网络切片的信息中的第一RAN网络切片的信息发起接入请求。因为RAN网络切片的信息与CN网络切片的信息通常是一对多的映射关系,所以,RAN向UE发送的第二映射规则中包括的是至少一个RAN网络切片的信息,相对于现有技术而言,本申请实施例中第二映射规则的配置要小一些,复杂度比较低。解决了CN网络切片的信息较多,造成NAS级别表格配置过大,复杂度过高的问题。进一步的,解决了UE请求的CN网络切片的信息与CN分配的CN网络切片的信息不一致的情况,因为相同业务类型的不同CN网络切片的信息映射在RAN的RAN网络切片的信息大多数情况是相同的。还实现了RAN基于RAN网络切片粒度的接入控制。In this embodiment, the RAN sends a second downlink message to the UE, where the second downlink message includes a second mapping rule, where the second mapping rule includes information of at least one RAN network slice; and the RAN sends the information to the UE. The RAN accesses control information. It should be noted that the second mapping rule determined by the RAN has nothing to do with the first mapping rule sent by the RAN to receive the CN. The UE may initiate an access request to the information of the first RAN network slice in the information of the at least one RAN network slice according to the RAN access control information. Because the information of the RAN network slice and the information of the CN network slice are usually one-to-many mapping relationship, the second mapping rule sent by the RAN to the UE includes information of at least one RAN network slice, which is compared with the prior art. The configuration of the second mapping rule in the embodiment of the present application is smaller and the complexity is relatively low. The problem of CN network slicing is solved, which causes the NAS level table configuration to be too large and the complexity is too high. Further, the information of the CN network slice requested by the UE is inconsistent with the information of the CN network slice allocated by the CN, because information of different CN network slices of the same service type is mapped to the RAN network slice information of the RAN. identical. The access control of the RAN based on the RAN network slice granularity is also implemented.
如图4所示,为本申请实施例中接入控制方法的另一个实施例示意图,包括:FIG. 4 is a schematic diagram of another embodiment of an access control method according to an embodiment of the present application, including:
401、UE将上行消息发送给CN。401. The UE sends an uplink message to the CN.
402、CN获取第一映射规则。402. The CN acquires a first mapping rule.
在本申请实施例中,步骤401和402与上述图3所示的步骤301和302类似,此处不再赘述。In the embodiment of the present application, steps 401 and 402 are similar to steps 301 and 302 shown in FIG. 3 above, and details are not described herein again.
403、CN将第一下行消息发送给RAN,第一下行消息包括第一映射规则。403. The CN sends the first downlink message to the RAN, where the first downlink message includes a first mapping rule.
在本申请实施例中,CN向RAN发送第一下行消息,RAN接收来自于CN的第一下行消息。第一下行消息中包括第一映射规则,第一映射规则包括至少一个CN接入类别,可以参考上述表2和表3所示,此处不再赘述。In this embodiment, the CN sends a first downlink message to the RAN, and the RAN receives the first downlink message from the CN. The first downlink message includes a first mapping rule, and the first mapping rule includes at least one CN access category, which can be referred to the foregoing Table 2 and Table 3, and details are not described herein again.
可选的,第一下行消息中还可以包括CN Allowed NSSAI列表,或者,CN通过另一个下行消息将CN Allowed NSSAI列表发送给RAN。应理解,第一下行消息可以为NAS消息,通过CN和RAN接口向RAN发送,例如:CN通过N2接口向RAN发送第一下行消息。Optionally, the first downlink message may further include a CN Allowed NSSAI list, or the CN sends the CN Allowed NSSAI list to the RAN by using another downlink message. It should be understood that the first downlink message may be a NAS message, and is sent to the RAN through the CN and the RAN interface. For example, the CN sends the first downlink message to the RAN through the N2 interface.
需要说明的是,CN Allowed NSSAI列表的确定方式为:CN可以根据UE上报的CN允许的网络切片选择辅助信息(CN NSSAI)、UE的签约信息、本地策略、网络切片的可用性等因素选择同意UE在当前的注册区允许接入的至少一个CN网络切片的信息,该至少一个CN网络切片的信息可以以列表的形式呈现,可称为CN允许的NSSAI(CN Allowed NSSAI)列表,也可以以其他的方式表示,具体不做限定。It should be noted that the CN Allowed NSSAI list is determined in such a manner that the CN can select the UE according to factors such as the network slice selection assistance information (CN NSSAI) allowed by the UE, the UE subscription information, the local policy, and the availability of the network slice. Information of at least one CN network slice that is allowed to be accessed in the current registration area, the information of the at least one CN network slice may be presented in the form of a list, which may be referred to as a CN allowed NSSAI (CN Allowed NSSAI) list, or may be other The way is expressed, the specific is not limited.
404、RAN获取第二映射规则,所述第二映射规则包括至少一个RAN网络切片的信息。404. The RAN acquires a second mapping rule, where the second mapping rule includes information of at least one RAN network slice.
在本申请实施例中,RAN接收CN发送的第一下行消息。第一下行消息包括第一映射规则,第一映射规则包括至少一个CN接入类别。可选的,第一下行消息还可以包括CN Allowed NSSAI列表,或者,RAN接收另一个下行消息中包括CN Allowed NSSAI列表。进一步的, RAN获取第二映射规则,所述第二映射规则包括至少一个RAN网络切片的信息。In this embodiment of the present application, the RAN receives the first downlink message sent by the CN. The first downlink message includes a first mapping rule, and the first mapping rule includes at least one CN access category. Optionally, the first downlink message may further include a CN Allowed NSSAI list, or the RAN receives another CN downlinked NSSAI list. Further, the RAN acquires a second mapping rule, where the second mapping rule includes information of at least one RAN network slice.
应理解,若RAN接收的下行消息中包括CN Allowed NSSAI列表,则所述至少一个RAN网络切片的信息与所述CN Allowed NSSAI列表存在映射关系,第二映射规则可以包括所述至少一个RAN网络切片的信息与所述CN Allowed NSSAI列表;若RAN接收的下行消息中未包括CN Allowed NSSAI列表,则所述至少一个RAN网络切片的信息与当前可用的CN网络切片的信息存在映射关系,第二映射规则可以包括所述至少一个RAN网络切片的信息与当前可用的CN网络切片的信息。It should be understood that if the downlink message received by the RAN includes a CN Allowed NSSAI list, the information of the at least one RAN network slice has a mapping relationship with the CN Allowed NSSAI list, and the second mapping rule may include the at least one RAN network slice. The information is related to the CN Allowed NSSAI list; if the CN Allowed NSSAI list is not included in the downlink message received by the RAN, the information of the at least one RAN network slice is mapped to the currently available CN network slice information, and the second mapping is performed. The rules may include information of the at least one RAN network slice and information of currently available CN network slices.
需要说明的是,第二映射规则可以在第一映射规则上添加至少一个RAN网络切片的信息生成,或者,第二映射规则是RAN根据第一映射规则和CN Allowed NSSAI列表确定的,或者,第二映射规则是RAN根据第一映射规则和当前可用的CN网络切片的信息确定的。It should be noted that the second mapping rule may add information of at least one RAN network slice to the first mapping rule, or the second mapping rule is determined by the RAN according to the first mapping rule and the CN Allowed NSSAI list, or The second mapping rule is determined by the RAN according to the first mapping rule and the information of the currently available CN network slice.
示例性的,RAN保存有预设的RAN网络切片的信息与CN网络切片的信息的映射关系,例如,该映射关系可以通过网管预先配置,或者通过CN设备通过CN与RAN之间的接口信息预先配置。一个或多个CN网络切片的信息可以对应一个RAN网络切片的信息,如下表10所示:Exemplarily, the RAN saves the mapping relationship between the information of the preset RAN network slice and the information of the CN network slice. For example, the mapping relationship may be pre-configured by the network management or through the CN device through the interface information between the CN and the RAN. Configuration. The information of one or more CN network slices may correspond to information of one RAN network slice, as shown in Table 10 below:
RAN Network slice,接入网网络切片的信息RAN Network slice, access network network slice information CN Network slice,核心网网络切片的信息CN Network slice, core network network slice information
11 1,21,2
22 3,43,4
33 5,6,7,85,6,7,8
44 9,10,11,129,10,11,12
55 13,1413,14
66 15,1615,16
77 17,18,1917,18,19
88 20,21,2220, 21, 22
99 23,2423,24
1010 25,2625,26
表10Table 10
应理解,根据上述步骤中的说明可知,CN Allowed NSSAI列表是在UE当前的注册区允许接入的至少一个CN网络切片的信息的一种表现形式,所以,CN Allowed NSSAI列表也就是至少一个CN网络切片的信息,例如:CN Allowed NSSAI列表如表11所示:It should be understood that, according to the description in the above steps, the CN Allowed NSSAI list is a representation of information of at least one CN network slice allowed to be accessed in the current registration area of the UE, so the CN Allowed NSSAI list is at least one CN. The network slice information, for example: CN Allowed NSSAI list is shown in Table 11:
CN Allowed NSSAI列表CN Allowed NSSAI list
33
99
1717
2020
表11Table 11
在表11中,3、9、17和20可以是CN网络切片的标识,也可以是网络切片类型、业务类型、网络切片区分、租户信息、用户组信息、网络切片实例信息、专有核心网标识等 指示,用来区分不同的CN网络切片,具体不做限定。In Table 11, 3, 9, 17, and 20 may be identifiers of CN network slices, or may be network slice type, service type, network slice division, tenant information, user group information, network slice instance information, and proprietary core network. Indicators and other indications are used to distinguish different CN network slices, which are not limited.
(1)、若RAN接收的下行消息中包括第一映射规则和CN Allowed NSSAI列表,则RAN可以根据CN Allowed NSSAI列表在上述表10中查找到对应的至少一个RAN网络切片的信息,第二映射规则在上述第一映射规则上添加至少一个RAN网络切片的信息生成。示例性的,第二映射规则可以包括但不限于以下几种形式,如下所示:(1) If the downlink message received by the RAN includes the first mapping rule and the CN Allowed NSSAI list, the RAN may find the information of the corresponding at least one RAN network slice in the foregoing table 10 according to the CN Allowed NSSAI list, and the second mapping The rule adds information of at least one RAN network slice to the first mapping rule. Exemplarily, the second mapping rule may include but is not limited to the following forms, as follows:
1)如果第一映射规则为上述表2,第二映射规则在第一映射规则的基础上添加至少一个RAN网络切片的信息生成,那么第二映射规则可以如下表12所示:1) If the first mapping rule is the above table 2, and the second mapping rule adds information of at least one RAN network slice based on the first mapping rule, the second mapping rule may be as shown in Table 12 below:
Figure PCTCN2018091436-appb-000007
Figure PCTCN2018091436-appb-000007
表12Table 12
在表12所示的方案中,UE可以根据至少一个RAN网络切片的信息,或者,至少一个CN接入类别进行接入控制检查,因为RAN网络切片的信息一般与CN网络切片的信息是一对多的关系,还实现了RAN网络切片粒度的控制,解决了UE请求的CN网络切片的信息与CN分配的CN网络切片的信息不一致的情况,因为相同业务类型的不同CN网络切片的信息映射在RAN的RAN网络切片的信息大多数情况是相同的。In the scheme shown in Table 12, the UE may perform an access control check according to information of at least one RAN network slice or at least one CN access category, because the information of the RAN network slice is generally paired with the information of the CN network slice. The relationship between the RAN network slice granularity and the information of the CN network slice requested by the UE is inconsistent with the information of the CN network slice allocated by the CN, because the information mapping of different CN network slices of the same service type is The information of the RAN's RAN network slice is mostly the same.
2)如果第一映射规则为上述表2,第二映射规则在第一映射规则的基础上添加至少一个RAN网络切片的信息和至少一个RAN接入类别生成。其中,RAN接入类别可以理解为查找第二映射规则中包含的至少一个因素(例如至少一个RAN网络切片的信息等)对应的接入控制信息的索引。可以将至少一个RAN网络切片的信息映射到一个具体的接入类别,这个接入类别可以称为RAN接入类别。那么第二映射规则可以如下表13所示:2) If the first mapping rule is the above table 2, the second mapping rule adds at least one RAN network slice information and at least one RAN access class generation based on the first mapping rule. The RAN access category may be understood as an index for finding access control information corresponding to at least one factor (for example, information of at least one RAN network slice, etc.) included in the second mapping rule. The information of at least one RAN network slice may be mapped to a specific access category, which may be referred to as a RAN access category. Then the second mapping rule can be as shown in Table 13 below:
Figure PCTCN2018091436-appb-000008
Figure PCTCN2018091436-appb-000008
表13Table 13
在表13所示的方案中,UE可以根据至少一个RAN网络切片的信息,或者,可以根据至少一个RAN接入类别进行RAN网络切片的接入控制检查,或者,可以根据至少一个CN接入类别进行RAN网络切片的接入控制检查。因为RAN网络切片的信息一般与CN网络切片的信息是一对多的关系,还实现了RAN网络切片粒度的控制,解决了UE请求的CN网络切片的信息与CN分配的CN网络切片的信息不一致的情况,因为相同业务类型的不同CN网络切片的信息映射在RAN的RAN网络切片的信息大多数情况是相同的。In the solution shown in Table 13, the UE may perform access control check of the RAN network slice according to at least one RAN network slice, or may perform RAN network slice access control check according to at least one RAN access category, or may be according to at least one CN access category. Perform an access control check of the RAN network slice. Because the information of the RAN network slice is generally one-to-many relationship with the information of the CN network slice, the control of the RAN network slice granularity is implemented, and the information of the CN network slice requested by the UE is inconsistent with the information of the CN network slice allocated by the CN. In the case, since the information of different CN network slices of the same service type is mapped in the RAN, the information of the RAN network slice is the same in most cases.
3)如果第一映射规则为上述表2,第二映射规则在第一映射规则的基础上添加至少一个RAN网络切片的信息和CN NSSAI列表对应的至少一个CN网络切片生成。那么第二映射规则可以如下表14所示:3) If the first mapping rule is the above table 2, the second mapping rule adds at least one RAN network slice information and at least one CN network slice corresponding to the CN NSSAI list on the basis of the first mapping rule. Then the second mapping rule can be as shown in Table 14 below:
Figure PCTCN2018091436-appb-000009
Figure PCTCN2018091436-appb-000009
表14Table 14
在表14所示的方案中,UE可以根据至少一个RAN网络切片的信息进行RAN网络切片的接入控制检查,或者,可以根据至少一个CN网络切片的信息进行CN网络切片的接入控制检查,提高了本申请技术方案的可选性和灵活性。还实现了RAN网络切片粒度的控制,解决了UE请求的CN网络切片的信息与CN分配的CN网络切片的信息不一致的情况,因为相同业务类型的不同CN网络切片的信息映射在RAN的RAN网络切片的信息大多数情况是相同的。In the solution shown in Table 14, the UE may perform an access control check of the RAN network slice according to the information of the at least one RAN network slice, or may perform an access control check of the CN network slice according to the information of the at least one CN network slice. The selectivity and flexibility of the technical solution of the present application are improved. The control of the RAN network slice granularity is also implemented, and the information of the CN network slice requested by the UE is inconsistent with the information of the CN network slice allocated by the CN, because the information of different CN network slices of the same service type is mapped in the RAN RAN network. The sliced information is mostly the same.
4)如果第一映射规则为上述表2,第二映射规则在第一映射规则的基础上添加至少一个RAN网络切片的信息、至少一个RAN接入类别和CN NSSAI列表对应的至少一个CN网络切片的信息生成。其中,RAN接入类别可以理解为查找第二映射规则中包含的至少一个因素(例如至少一个RAN网络切片的信息等)对应的接入控制信息的索引。可以将至少一个RAN网络切片的信息映射到一个具体的接入类别,这个接入类别可以称为RAN接入类别。那么第二映射规则可以如下表15所示:4) If the first mapping rule is the above table 2, the second mapping rule adds at least one RAN network slice information, at least one RAN access category, and at least one CN network slice corresponding to the CN NSSAI list on the basis of the first mapping rule. Information generated. The RAN access category may be understood as an index for finding access control information corresponding to at least one factor (for example, information of at least one RAN network slice, etc.) included in the second mapping rule. The information of at least one RAN network slice may be mapped to a specific access category, which may be referred to as a RAN access category. Then the second mapping rule can be as shown in Table 15 below:
Figure PCTCN2018091436-appb-000010
Figure PCTCN2018091436-appb-000010
表15Table 15
在表15所示的方案中,UE可以根据至少一个RAN网络切片的信息进行RAN网络切片的接入控制检查,或者,可以根据至少一个CN网络切片的信息进行CN网络切片的接入控制检查,或者,还可以根据至少一个RAN接入类别进行RAN网络切片的接入控制检查,,或者,可以根据至少一个CN接入类别进行CN网络切片的接入控制检查,提高了本申请技术方案的可选性和灵活性。还实现了RAN网络切片粒度的控制,解决了UE请求的CN网络切片的信息与CN分配的CN网络切片的信息不一致的情况,因为相同业务类型的不同CN网络切片的信息映射在RAN的RAN网络切片的信息大多数情况是相同的。In the solution shown in Table 15, the UE may perform an access control check of the RAN network slice according to the information of the at least one RAN network slice, or may perform an access control check of the CN network slice according to the information of the at least one CN network slice. Alternatively, the access control check of the RAN network slice may be performed according to the at least one RAN access category, or the access control check of the CN network slice may be performed according to the at least one CN access category, which improves the technical solution of the present application. Optional and flexible. The control of the RAN network slice granularity is also implemented, and the information of the CN network slice requested by the UE is inconsistent with the information of the CN network slice allocated by the CN, because the information of different CN network slices of the same service type is mapped in the RAN RAN network. The sliced information is mostly the same.
5)如果第一映射规则为上述表3,第二映射规则在第一映射规则的基础上添加至少一个RAN网络切片的信息生成,那么第二映射规则可以如下表16所示:5) If the first mapping rule is the above table 3, and the second mapping rule adds information of at least one RAN network slice based on the first mapping rule, the second mapping rule may be as shown in Table 16 below:
Figure PCTCN2018091436-appb-000011
Figure PCTCN2018091436-appb-000011
Figure PCTCN2018091436-appb-000012
Figure PCTCN2018091436-appb-000012
表16Table 16
在表16所示的方案中,UE可以根据至少一个RAN网络切片的信息进行RAN网络切片的接入控制检查,或者,可以根据至少一个CN网络切片的信息或至少一个CN网络切片信息进行CN网络切片的接入控制检查,提高了本申请技术方案的可选性和灵活性。还实现了RAN网络切片粒度的控制,解决了UE请求的CN网络切片的信息与CN分配的CN网络切片的信息不一致的情况,因为相同业务类型的不同CN网络切片的信息映射在RAN的RAN网络切片的信息大多数情况是相同的。In the solution shown in Table 16, the UE may perform an access control check of the RAN network slice according to the information of the at least one RAN network slice, or may perform the CN network according to the information of the at least one CN network slice or the at least one CN network slice information. The access control check of the slice improves the selectivity and flexibility of the technical solution of the present application. The control of the RAN network slice granularity is also implemented, and the information of the CN network slice requested by the UE is inconsistent with the information of the CN network slice allocated by the CN, because the information of different CN network slices of the same service type is mapped in the RAN RAN network. The sliced information is mostly the same.
6)如果第一映射规则为上述表3,第二映射规则在第一映射规则的基础上添加至少一个RAN网络切片的信息和至少一个RAN接入类别生成。其中,RAN接入类别可以理解为查找第二映射规则中包含的至少一个因素(例如至少一个RAN网络切片的信息等)对应的接入控制信息的索引。可以将至少一个RAN网络切片的信息映射到一个具体的接入类别,这个接入类别可以称为RAN接入类别。那么第二映射规则可以如下表17所示:6) If the first mapping rule is the above table 3, the second mapping rule adds at least one RAN network slice information and at least one RAN access class generation based on the first mapping rule. The RAN access category may be understood as an index for finding access control information corresponding to at least one factor (for example, information of at least one RAN network slice, etc.) included in the second mapping rule. The information of at least one RAN network slice may be mapped to a specific access category, which may be referred to as a RAN access category. Then the second mapping rule can be as shown in Table 17 below:
Figure PCTCN2018091436-appb-000013
Figure PCTCN2018091436-appb-000013
表17Table 17
在表17所示的方案中,UE可以根据至少一个RAN网络切片的信息进行RAN网络切片的接入控制检查,或者,可以根据至少一个CN网络切片的信息进行CN网络切片的接入控制检查,或者,还可以根据至少一个RAN接入类别进行RAN网络切片的接入控制检查,或者,还可以根据至少一个CN接入类别进行CN网络切片的接入控制检查,提高了本申请技术方案的可选性和灵活性。还实现了RAN网络切片粒度的控制,解决了UE请求的CN网络切片的信息与CN分配的CN网络切片的信息不一致的情况,因为相同业务类型的不同CN网络切片的信息映射在RAN的RAN网络切片的信息大多数情况是相同的。In the solution shown in Table 17, the UE may perform an access control check of the RAN network slice according to the information of the at least one RAN network slice, or may perform an access control check of the CN network slice according to the information of the at least one CN network slice. Alternatively, the access control check of the RAN network slice may be performed according to the at least one RAN access category, or the access control check of the CN network slice may be performed according to the at least one CN access category, which improves the technical solution of the present application. Optional and flexible. The control of the RAN network slice granularity is also implemented, and the information of the CN network slice requested by the UE is inconsistent with the information of the CN network slice allocated by the CN, because the information of different CN network slices of the same service type is mapped in the RAN RAN network. The sliced information is mostly the same.
(2)、若RNA接收的下行消息中包括第一映射规则,未包括CN NSSAI列表,则RAN可 以根据当前可用的CN网络切片的信息在上述表10中查找到对应的至少一个RAN网络切片的信息,第二映射规则在上述第一映射规则上添加至少一个RAN网络切片的信息生成。那么,得到的第二映射规则可以参考上述表12-17任一一个实现方式所示,此处不再赘述。(2) If the downlink message received by the RNA includes the first mapping rule and does not include the CN NSSAI list, the RAN may find the corresponding at least one RAN network slice in the foregoing table 10 according to the information of the currently available CN network slice. The second mapping rule adds information of at least one RAN network slice to the first mapping rule. Then, the obtained second mapping rule can be referred to any one of the foregoing implementations of Table 12-17, and details are not described herein again.
(3)、若RAN接收的下行消息中包括第一映射规则和CN Allowed NSSAI列表,则第二映射规则是RAN根据第一映射规则和CN Allowed NSSAI列表确定的。示例性的,第二映射规则可以包括上述12-17任一的实现方式,但不限于上述几种实现方式,还可以包括其他的实现方式,如下所示:(3) If the downlink message received by the RAN includes the first mapping rule and the CN Allowed NSSAI list, the second mapping rule is determined by the RAN according to the first mapping rule and the CN Allowed NSSAI list. Exemplarily, the second mapping rule may include the implementation manner of any of the foregoing 12-17, but is not limited to the foregoing implementation manners, and may also include other implementation manners, as follows:
1)如下表18所示,第二映射规则可以包括至少一个RAN网络切片的信息。1) As shown in Table 18 below, the second mapping rule may include information of at least one RAN network slice.
与CN Allowed NSSAI列表对应的至少一个RAN网络切片的信息Information of at least one RAN network slice corresponding to the CN Allowed NSSAI list
22
44
77
88
表18Table 18
在表18所示的方案中,UE可以根据至少一个RAN网络切片的信息进行接入控制检查,因为RAN网络切片的信息一般与CN网络切片的信息是一对多的关系,所以,第二映射规则的配置内容小于现有的配置内容,复杂度较低。还实现了RAN网络切片粒度的控制。In the solution shown in Table 18, the UE may perform an access control check according to information of at least one RAN network slice, because the information of the RAN network slice is generally one-to-many relationship with the CN network slice information, so the second mapping The configuration content of the rule is smaller than the existing configuration content, and the complexity is low. Control of the RAN network slice granularity is also achieved.
2)如下表19所示,第二映射规则可以包括至少一个RAN网络切片的信息和至少一个RAN接入类别的映射关系。2) As shown in Table 19 below, the second mapping rule may include a mapping relationship between information of at least one RAN network slice and at least one RAN access category.
Figure PCTCN2018091436-appb-000014
Figure PCTCN2018091436-appb-000014
表19Table 19
在表19所示的方案中,UE可以根据至少一个RAN网络切片的信息或者至少一个RAN接入类别进行接入控制检查,提高了本申请技术方案的可选性和灵活性,因为RAN网络切片的信息一般与CN网络切片的信息是一对多的关系,所以,第二映射规则的配置内容小于现有的配置内容,复杂度较低。还实现了RAN网络切片粒度的控制。In the solution shown in Table 19, the UE may perform access control check according to information of at least one RAN network slice or at least one RAN access category, which improves the selectivity and flexibility of the technical solution of the present application, because the RAN network slice The information is generally one-to-many relationship with the CN network slice information. Therefore, the configuration content of the second mapping rule is smaller than the existing configuration content, and the complexity is low. Control of the RAN network slice granularity is also achieved.
3)如下表20所示,第二映射规则可以包括至少一个RAN网络切片的信息和至少一个CN网络切片的信息的映射关系。3) As shown in Table 20 below, the second mapping rule may include a mapping relationship between information of at least one RAN network slice and information of at least one CN network slice.
Figure PCTCN2018091436-appb-000015
Figure PCTCN2018091436-appb-000015
表20Table 20
在表19所示的方案中,UE可以根据至少一个RAN网络切片的信息进行RAN网络切片的接入控制检查,或者,可以根据至少一个CN网络切片的信息进行CN网络切片的接入控制检查,提高了本申请技术方案的可选性和灵活性,因为RAN网络切片的信息一般与CN网络切片的信息是一对多的关系,所以,第二映射规则的配置内容小于现有的配置内容,复杂度较低。还实现了RAN网络切片粒度的控制。In the solution shown in Table 19, the UE may perform an access control check of the RAN network slice according to the information of the at least one RAN network slice, or may perform an access control check of the CN network slice according to the information of the at least one CN network slice. The optionalness and flexibility of the technical solution of the present application are improved, because the information of the RAN network slice is generally one-to-many relationship with the information of the CN network slice, so the configuration content of the second mapping rule is smaller than the existing configuration content. The complexity is low. Control of the RAN network slice granularity is also achieved.
4)如下表21所示,第二映射规则可以包括至少一个RAN网络切片的信息、至少一个CN网络切片的信息和至少一个RAN接入类别的映射关系。4) As shown in Table 21 below, the second mapping rule may include information of at least one RAN network slice, information of at least one CN network slice, and a mapping relationship of at least one RAN access category.
Figure PCTCN2018091436-appb-000016
Figure PCTCN2018091436-appb-000016
表21Table 21
在表21所示的方案中,UE可以根据至少一个RAN网络切片的信息进行RAN网络切片的接入控制检查,或者,可以根据至少一个CN网络切片的信息进行CN网络切片的接入控制检查,或者,还可以根据至少一个RAN接入类别进行RAN网络切片的接入控制检查,提高了本申请技术方案的可选性和灵活性,因为RAN网络切片的信息一般与CN网络切片的信息是一对多的关系,所以,第二映射规则的配置内容小于现有的配置内容,复杂度较低。还实现了RAN网络切片粒度的控制。In the solution shown in Table 21, the UE may perform an access control check of the RAN network slice according to the information of the at least one RAN network slice, or may perform an access control check of the CN network slice according to the information of the at least one CN network slice. Alternatively, the access control check of the RAN network slice may be performed according to the at least one RAN access category, which improves the selectivity and flexibility of the technical solution of the present application, because the information of the RAN network slice is generally one of the information of the CN network slice. For many relationships, the configuration content of the second mapping rule is smaller than the existing configuration content, and the complexity is low. Control of the RAN network slice granularity is also achieved.
需要说明的是,在上述表18-21所述的第二映射规则中,至少一个RAN网络切片的信息可以与至少一个RAN接入类别,或者,CN Allowed NSSAI列表,或者,CN Allowed NSSAI列表和至少一个RAN接入类别,或者,至少一个CN接入类别,或者,至少一个CN接入类别和至少一个RAN接入类别,或者,至少一个CN接入类别和CN Allowed NSSAI列表,存在映射关系,但是,在第二映射规则中也可以不包含至少一个RAN接入类别,或者,CN Allowed NSSAI列表,或者,CN Allowed NSSAI列表和至少一个RAN接入类别,,或者,至少一个CN接入类别,或者,至少一个CN接入类别和至少一个RAN接入类别,或者,至少一个CN接入类别和CN Allowed NSSAI列表,RAN知道它们的映射关系就行,具体不做限定。It should be noted that, in the second mapping rule described in the foregoing Table 18-21, at least one RAN network slice information may be associated with at least one RAN access category, or a CN Allowed NSSAI list, or a CN Allowed NSSAI list and At least one RAN access category, or at least one CN access category, or at least one CN access category and at least one RAN access category, or at least one CN access category and a CN Allowed NSSAI list, a mapping relationship exists, However, the second mapping rule may also not include at least one RAN access category, or a CN Allowed NSSAI list, or a CN Allowed NSSAI list and at least one RAN access category, or at least one CN access category, Alternatively, the at least one CN access category and the at least one RAN access category, or at least one CN access category and the CN Allowed NSSAI list, the RAN knows their mapping relationship, which is not limited.
(4)、若RAN接收的下行消息中包括第一映射规则,未包括CN Allowed NSSAI列表,则第二映射规则是RAN根据第一映射规则和当前可用的CN网络切片的信息确定的。示例性的,第二映射规则可以参考包括上述12-21任一的实现方式,但不限于上述几种实现方式,只是在上述12-21的实现方式中,至少一个CN网络切片的信息是由CN Allowed NSSAI列表确定的,而RAN没有接收CN Allowed NSSAI列表的情况下,是根据当前可用的CN网络切片的信息确定的。(4) If the downlink message received by the RAN includes the first mapping rule and does not include the CN Allowed NSSAI list, the second mapping rule is determined by the RAN according to the first mapping rule and the information of the currently available CN network slice. For example, the second mapping rule may refer to the implementation manner of any of the foregoing 12-21, but is not limited to the foregoing implementation manners. However, in the foregoing implementation manner of 12-21, at least one information of the CN network slice is determined by The CN Allowed NSSAI list is determined, and if the RAN does not receive the CN Allowed NSSAI list, it is determined based on the currently available CN network slice information.
需要说明的是,在本申请实施例中,至少一个RAN网络切片的信息可以用自行定义的与至少一个CN网络切片具有映射关系的标识来表示,也可以用RAN网络切片标识、RAN网络切片类型信息、RAN业务类型、RAN网络切片区分、RAN租户信息、RAN网络切片实例信息等来表示,用来区分不同的RAN网络切片,具体不做限定。It should be noted that, in the embodiment of the present application, the information of at least one RAN network slice may be represented by a self-defined identifier that has a mapping relationship with at least one CN network slice, and may also use a RAN network slice identifier and a RAN network slice type. Information, RAN service type, RAN network slice classification, RAN tenant information, RAN network slice instance information, etc. are used to distinguish different RAN network slices, which are not limited.
进一步的,在本申请实施例中,第一下行消息中包括第一映射规则,RAN会读取第一映射规则的内容,生成第二映射规则后,再将第二映射规则转发给UE。应理解,RAN接入类别可以用数字、字母、字节等来指示,在本申请实施例中不做具体限定。Further, in the embodiment of the present application, the first downlink message includes the first mapping rule, and the RAN reads the content of the first mapping rule, and then generates the second mapping rule, and then forwards the second mapping rule to the UE. It should be understood that the RAN access category may be indicated by a number, a letter, a byte, etc., and is not specifically limited in the embodiment of the present application.
405、RAN将第二下行消息发送给UE。405. The RAN sends the second downlink message to the UE.
在本申请实施例中,RAN获取第二映射规则之后,可以向UE发送第二下行信息,所述第二下行信息包括第二映射规则,所述第二映射规则包括至少一个RAN网络切片的信息;UE接收来自于RAN的第二下行消息。其中,所述第二下行消息可以是无线资源控制(Radio Resource Control,RRC)等AS消息。第二映射规则可以参考上述表12-20任一所示,此处不再赘述。In the embodiment of the present application, after acquiring the second mapping rule, the RAN may send second downlink information to the UE, where the second downlink information includes a second mapping rule, where the second mapping rule includes information of at least one RAN network slice. The UE receives the second downlink message from the RAN. The second downlink message may be an AS message such as a radio resource control (RRC). For the second mapping rule, refer to any of the foregoing Tables 12-20, and details are not described herein again.
可选的,第二下行消息还可以包括第一映射规则,第一映射规则包括至少一个CN接入类别,或者,RAN通过另一个下行消息将第一映射规则发送给UE,第一映射规则可以参考上述表2和表3所示,此处不再赘述。Optionally, the second downlink message may further include a first mapping rule, where the first mapping rule includes at least one CN access category, or the RAN sends the first mapping rule to the UE by using another downlink message, where the first mapping rule may be Refer to Table 2 and Table 3 above for details, and details are not described here.
406、UE根据第二映射规则确定至少一个RAN网络切片的信息。406. The UE determines information about at least one RAN network slice according to the second mapping rule.
在本申请实施例中,UE接收RAN发送的第二下行消息,第二下行消息中包括第二映射规则,所述第二映射规则包括至少一个RAN网络切片的信息。第二映射规则可以参考上述表12-20任一所示,此处不再赘述。In this embodiment, the UE receives the second downlink message sent by the RAN, where the second downlink message includes a second mapping rule, where the second mapping rule includes information of at least one RAN network slice. For the second mapping rule, refer to any of the foregoing Tables 12-20, and details are not described herein again.
可选的,所述第二映射规则中包括第一映射规则,或者,UE接收另一个下行消息,另一个下行消息中包括第一映射规则,第一映射规则包括至少一个CN接入类别。Optionally, the second mapping rule includes a first mapping rule, or the UE receives another downlink message, and the other downlink message includes a first mapping rule, where the first mapping rule includes at least one CN access category.
407、RAN将接入控制信息发送给UE。407. The RAN sends the access control information to the UE.
在本申请实施例中,RAN向UE发送RAN接入控制信息,UE接收来自于RAN的RAN接入控制信息。应理解,RAN接入控制信息可以是所有RAN网络切片的信息的接入控制信息,也可以是上述至少一个RAN网络切片的信息的接入控制信息。In this embodiment of the present application, the RAN sends RAN access control information to the UE, and the UE receives RAN access control information from the RAN. It should be understood that the RAN access control information may be access control information of information of all RAN network slices, or may be access control information of information of at least one RAN network slice.
可选的,RAN向UE发送CN接入控制信息,UE接收来自于RAN的CN接入控制信息。应理解,CN接入控制信息可以是所有CN网络切片的信息的接入控制信息,也可以是上述至少一个CN网络切片的信息的接入控制信息。Optionally, the RAN sends CN access control information to the UE, and the UE receives CN access control information from the RAN. It should be understood that the CN access control information may be access control information of information of all CN network slices, or may be access control information of information of at least one CN network slice.
408、UE根据第二映射规则和接入控制信息进行接入控制。408. The UE performs access control according to the second mapping rule and the access control information.
在本申请实施例中,UE可以根据第二映射规则和RAN接入控制信息进行接入限制检查。 发起接入尝试之前,UE可以根据至少一个RAN网路切片的信息或者至少一个RAN接入类别对应的接入控制信息执行ABC,从而判断是否能发起接入或者业务请求。In this embodiment of the present application, the UE may perform an access restriction check according to the second mapping rule and the RAN access control information. Before initiating an access attempt, the UE may perform ABC according to information of at least one RAN network slice or access control information corresponding to at least one RAN access category, thereby determining whether an access or service request can be initiated.
一种可能的方式为:对应的接入控制信息有接入限制定时器。若该RAN网络切片设置的接入限制定时器正在运行,则终端设备确定该次网络接入请求或者业务请求不能发起。否则,终端设备采用随机数算法选择一个介于0与1之间的均匀分布的随机数;如果该随机数小于接入控制信息中对应的接入限制因子,则终端设备确定该RAN网络切片可以接入;如果该随机数大于或等于对应的接入限制因子,则终端设备确定该RAN网络切片不可以接入,并且终端设备启动该RAN网络切片对应的接入限制定时器,示例性的,该接入限制定时器的定时长度可以为(0.7+0.6*随机数)*接入限制时间。One possible way is that the corresponding access control information has an access restriction timer. If the access restriction timer set by the RAN network slice is running, the terminal device determines that the network access request or the service request cannot be initiated. Otherwise, the terminal device uses a random number algorithm to select a uniformly distributed random number between 0 and 1. If the random number is smaller than the corresponding access restriction factor in the access control information, the terminal device determines that the RAN network slice can be If the random number is greater than or equal to the corresponding access restriction factor, the terminal device determines that the RAN network slice is not accessible, and the terminal device starts an access restriction timer corresponding to the RAN network slice, for example, The timing of the access restriction timer may be (0.7+0.6* random number)* access restriction time.
另一种可能的方式为:RAN接入控制信息包含一个比特地图,该比特地图的不同比特位对应不同的RAN网络切片的信息或者不同的RAN接入类别。例如对应的比特位数值为“0”,表示此次网络切片接入请求或者业务请求可以发起,否则不能发起。具体ABC机制也可以参考LTE系统或者5G系统适用的任何ABC,这里不做限定。如果没有被限制,则UE向第一RAN网络切片发起接入尝试或者业务请求。Another possible way is that the RAN access control information includes a bit map, and different bits of the bit map correspond to different RAN network slice information or different RAN access categories. For example, the corresponding bit number value is “0”, indicating that the network slice access request or service request can be initiated, otherwise it cannot be initiated. The specific ABC mechanism can also refer to any ABC applicable to the LTE system or the 5G system, which is not limited herein. If not, the UE initiates an access attempt or service request to the first RAN network slice.
可选的,UE可以根据第一映射规则和CN接入控制信息进行接入限制检查。发起接入尝试之前,UE可以根据至少一个RAN网路切片的信息或者至少一个RAN接入类别对应的接入控制信息执行ABC,从而判断是否能发起接入或者业务请求。具体ABC机制可以参考LTE系统或者5G系统适用的任何ABC,这里不做限定。如果没有被限制,则UE可以向第一CN网络切片发起接入尝试或者业务请求。Optionally, the UE may perform an access restriction check according to the first mapping rule and the CN access control information. Before initiating an access attempt, the UE may perform ABC according to information of at least one RAN network slice or access control information corresponding to at least one RAN access category, thereby determining whether an access or service request can be initiated. The specific ABC mechanism can refer to any ABC applicable to the LTE system or the 5G system, which is not limited herein. If not restricted, the UE may initiate an access attempt or service request to the first CN network slice.
需要说明的是,RAN根据第二映射规则和接入控制信息进行接入控制检查包括但不限于上述所提及的两种可能的实现方式,其他根据第二映射规则和接入控制信息进行接入控制检查的方式也在本申请的保护范围内。It should be noted that the access control check performed by the RAN according to the second mapping rule and the access control information includes, but is not limited to, the two possible implementation manners mentioned above, and the other is performed according to the second mapping rule and the access control information. The manner in which the control check is entered is also within the scope of protection of the present application.
本申请实施例中,RAN向UE发送第二下行消息,所述第二下行消息包括第二映射规则,所述第二映射规则包括至少一个RAN网络切片的信息;所述RAN向所述UE发送RAN接入控制信息。需要说明的是,RAN确定的第二映射规则,与RAN接收CN发送的第一映射规则有关系。UE可以根据RAN接入控制信息向所述至少一个RAN网络切片的信息中的第一RAN网络切片的信息发起接入请求。因为RAN网络切片的信息与CN网络切片的信息通常是一对多的映射关系,所以,RAN向UE发送的第二映射规则中包括的是至少一个RAN网络切片的信息,相对于现有技术而言,本申请实施例中第二映射规则的配置要小一些,复杂度比较低。解决了CN网络切片的信息较多,造成NAS级别表格配置过大,复杂度过高的问题。进一步的,解决了UE请求的CN网络切片的信息与CN分配的CN网络切片的信息不一致的情况,因为相同业务类型的不同CN网络切片的信息映射在RAN的RAN网络切片的信息大多数情况是相同的。还实现了RAN基于RAN网络切片粒度的接入控制。In this embodiment, the RAN sends a second downlink message to the UE, where the second downlink message includes a second mapping rule, where the second mapping rule includes information of at least one RAN network slice; and the RAN sends the information to the UE. The RAN accesses control information. It should be noted that the second mapping rule determined by the RAN is related to the first mapping rule sent by the RAN to the CN. The UE may initiate an access request to the information of the first RAN network slice in the information of the at least one RAN network slice according to the RAN access control information. Because the information of the RAN network slice and the information of the CN network slice are usually one-to-many mapping relationship, the second mapping rule sent by the RAN to the UE includes information of at least one RAN network slice, which is compared with the prior art. The configuration of the second mapping rule in the embodiment of the present application is smaller and the complexity is relatively low. The problem of CN network slicing is solved, which causes the NAS level table configuration to be too large and the complexity is too high. Further, the information of the CN network slice requested by the UE is inconsistent with the information of the CN network slice allocated by the CN, because information of different CN network slices of the same service type is mapped to the RAN network slice information of the RAN. identical. The access control of the RAN based on the RAN network slice granularity is also implemented.
上面对本申请实施例中接入控制的方法进行了说明,下面对本申请实施例中的网络设备和终端设备进行说明,如图5A所示,为本申请实施例中网络设备的一个实施例示意图,可以包括:The method for access control in the embodiment of the present application is described above. The following describes the network device and the terminal device in the embodiment of the present application, as shown in FIG. 5A, which is a schematic diagram of an embodiment of the network device in the embodiment of the present application. Can include:
第一发送模块501,用于向终端设备发送第一消息,所述第一消息包括第一映射规则, 所述第一映射规则包括至少一个无线接入网网络切片的信息;The first sending module 501 is configured to send a first message to the terminal device, where the first message includes a first mapping rule, where the first mapping rule includes information of at least one radio access network network slice;
第二发送模块502,用于向所述终端设备发送接入控制信息。The second sending module 502 is configured to send access control information to the terminal device.
应理解,所述第一发送模块和所述第二发送模块逻辑上可以是分开设置的,也可以是用同一个模块来实现。It should be understood that the first sending module and the second sending module may be logically disposed separately or in the same module.
可选的,在本申请的一些实施例中,所述第一映射规则和所述接入控制信息用于对所述终端设备进行接入控制。Optionally, in some embodiments of the present application, the first mapping rule and the access control information are used to perform access control on the terminal device.
可选的,在本申请的一些实施例中,如图5B所示,为本申请实施例中网络设备的另一个实施例示意图,所述网络设备还可以包括:Optionally, in some embodiments of the present application, as shown in FIG. 5B, which is a schematic diagram of another embodiment of the network device in the embodiment of the present application, the network device may further include:
接收模块503,用于接收来自于第二网络设备的第二消息,所述第二消息包括第二映射规则,所述第二映射规则包括至少一个核心网配置的终端适用的接入类别,所述第一映射规则还包括所述至少一个无线接入网网络切片的信息与所述至少一个核心网配置的终端适用的接入类别的映射关系;The receiving module 503 is configured to receive a second message from the second network device, where the second message includes a second mapping rule, where the second mapping rule includes an access category applicable to the terminal configured by the at least one core network, where The first mapping rule further includes a mapping relationship between information of the at least one radio access network network slice and an access category applicable to the terminal configured by the at least one core network;
或者,or,
接收模块503,用于接收来自于第二网络设备的第二消息,所述第二消息包括核心网配置的网络允许的网络切片选择辅助信息Allowed NSSAI列表,所述第一映射规则还包括所述至少一个无线接入网网络切片的信息与所述核心网配置的Allowed NSSAI列表的映射关系;The receiving module 503 is configured to receive a second message from the second network device, where the second message includes a network-selected network slice selection assistance information Allowed NSSAI list configured by the core network, where the first mapping rule further includes the a mapping relationship between information of at least one radio access network network slice and an Allowed NSSAI list configured by the core network;
或者,or,
接收模块503,用于接收来自于第二网络设备的第二消息,所述第二消息包括第二映射规则和核心网配置的网络允许的网络切片选择辅助信息Allowed NSSAI列表,所述第二映射规则包括至少一个核心网配置的终端适用的接入类别,所述第一映射规则还包括所述至少一个无线接入网网络切片的信息、所述至少一个核心网配置的终端适用的接入类别与所述核心网配置的Allowed NSSAI列表的映射关系。The receiving module 503 is configured to receive a second message from the second network device, where the second message includes a second mapping rule and a network-selected network slice selection assistance information Allowed NSSAI list configured by the core network, the second mapping The rule includes an access category applicable to the terminal configured by the at least one core network, where the first mapping rule further includes information of the at least one radio access network network slice, and an access category applicable to the terminal configured by the at least one core network. A mapping relationship with the Allowed NSSAI list of the core network configuration.
可选的,在本申请的一些实施例中,所述第一映射规则还包括所述至少一个无线接入网网络切片的信息与当前可用的网络切片选择辅助信息的映射关系。Optionally, in some embodiments of the present application, the first mapping rule further includes a mapping relationship between information of the at least one radio access network network slice and currently available network slice selection assistance information.
可选的,在本申请的一些实施例中,所述第一映射规则还包括所述至少一个无线接入网网络切片的信息与至少一个无线接入网接入类别的映射关系。Optionally, in some embodiments of the present application, the first mapping rule further includes a mapping relationship between information of the at least one radio access network network slice and at least one radio access network access category.
如图6A所示,为本申请实施例中终端设备的一个实施例示意图,可以包括:As shown in FIG. 6A, a schematic diagram of an embodiment of a terminal device in the embodiment of the present application may include:
第一接收模块601,用于接收来自于第一网络设备的第一消息,所述第一消息包括第一映射规则,所述第一映射规则包括至少一个无线接入网网络切片的信息;The first receiving module 601 is configured to receive a first message from the first network device, where the first message includes a first mapping rule, where the first mapping rule includes information of at least one radio access network network slice;
第二接收模块602,接收来自于所述第一网络设备的接入控制信息。The second receiving module 602 receives the access control information from the first network device.
应理解,所述第一接收模块和所述第二接收模块逻辑上可以是分开设置的,也可以是用同一个模块来实现。It should be understood that the first receiving module and the second receiving module may be logically disposed separately or in the same module.
可选的,在本申请的一些实施例中,如图6B所示,为本申请实施例中终端设备的另一个实施例示意图,所述终端设备还包括:Optionally, in some embodiments of the present application, as shown in FIG. 6B, which is a schematic diagram of another embodiment of the terminal device in the embodiment of the present application, the terminal device further includes:
处理模块603,用于根据所述第一映射规则和所述接入控制信息进行接入控制。The processing module 603 is configured to perform access control according to the first mapping rule and the access control information.
可选的,在本申请的一些实施例中,所述第一映射规则还包括所述至少一个无线接入 网网络切片的信息与至少一个无线接入网接入类别的映射关系。Optionally, in some embodiments of the present application, the first mapping rule further includes a mapping relationship between information of the at least one radio access network network slice and at least one radio access network access category.
可选的,在本申请的一些实施例中,所述第一映射规则还包括所述至少一个无线接入网网络切片的信息与至少一个核心网配置的终端适用的接入类别的映射关系。Optionally, in some embodiments of the present application, the first mapping rule further includes a mapping relationship between information of the at least one radio access network network slice and an access category applicable to the terminal configured by the at least one core network.
如图7所示,为本申请实施例中网络设备的另一个实施例示意图,包括:FIG. 7 is a schematic diagram of another embodiment of a network device according to an embodiment of the present application, including:
该网络设备可因配置或性能不同而产生比较大的差异,可以包括一个或一个以上中央处理器(central processing units,CPU)722(例如,一个或一个以上处理器)和存储器732,一个或一个以上存储应用程序742或数据744的存储介质730(例如一个或一个以上海量存储设备)。其中,存储器732和存储介质730可以是短暂存储或持久存储。存储在存储介质730的程序可以包括一个或一个以上模块(图示没标出),每个模块可以包括对网络设备中的一系列指令操作。更进一步地,中央处理器722可以设置为与存储介质730通信,在网络设备上执行存储介质730中的一系列指令操作。The network device may vary considerably depending on configuration or performance, and may include one or more central processing units (CPU) 722 (eg, one or more processors) and memory 732, one or one The storage medium 730 (for example, one or one of the Shanghai quantity storage devices) storing the application 742 or the data 744 above. Among them, the memory 732 and the storage medium 730 may be short-term storage or persistent storage. The program stored on storage medium 730 may include one or more modules (not shown), each of which may include a series of instruction operations in the network device. Still further, central processor 722 can be configured to communicate with storage medium 730, executing a series of instruction operations in storage medium 730 on the network device.
网络设备还可以包括一个或一个以上电源726,一个或一个以上有线或无线网络接口750,一个或一个以上输入输出接口758,和/或,一个或一个以上操作系统741,例如Windows ServerTM,Mac OS XTM,UnixTM,LinuxTM,FreeBSDTM等等。The network device may also include one or more power sources 726, one or more wired or wireless network interfaces 750, one or more input and output interfaces 758, and/or one or more operating systems 741, such as Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM and more.
上述实施例中由网络设备所执行的步骤可以基于该图7所示的网络设备结构。The steps performed by the network device in the above embodiments may be based on the network device structure shown in FIG.
如图8所示,为本申请实施例中网络设备的另一个实施例示意图。FIG. 8 is a schematic diagram of another embodiment of a network device in an embodiment of the present application.
为了便于说明,仅示出了与本申请实施例相关的部分,具体技术细节未揭示的,请参照本申请实施例方法部分。该终端设备可以为包括手机、平板电脑、PDA(Personal Digital Assistant,个人数字助理)、POS(Point of Sales,销售终端)、车载电脑等任意终端设备,以终端设备为手机为例:For the convenience of description, only the parts related to the embodiments of the present application are shown. If the specific technical details are not disclosed, please refer to the method part of the embodiment of the present application. The terminal device may be any terminal device including a mobile phone, a tablet computer, a PDA (Personal Digital Assistant), a POS (Point of Sales), an in-vehicle computer, and the terminal device is used as a mobile phone as an example:
图8示出的是与本申请实施例提供的终端设备相关的手机的部分结构的框图。参考图8,手机包括:射频(Radio Frequency,RF)电路810、存储器820、输入单元830、显示单元840、传感器850、音频电路860、无线保真(wireless fidelity,WiFi)模块870、处理器880、以及电源890等部件。本领域技术人员可以理解,图8中示出的手机结构并不构成对手机的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。FIG. 8 is a block diagram showing a partial structure of a mobile phone related to a terminal device provided by an embodiment of the present application. Referring to FIG. 8, the mobile phone includes: a radio frequency (RF) circuit 810, a memory 820, an input unit 830, a display unit 840, a sensor 850, an audio circuit 860, a wireless fidelity (WiFi) module 870, and a processor 880. And power supply 890 and other components. It will be understood by those skilled in the art that the structure of the handset shown in FIG. 8 does not constitute a limitation to the handset, and may include more or less components than those illustrated, or some components may be combined, or different component arrangements.
下面结合图8对手机的各个构成部件进行具体的介绍:The following describes the components of the mobile phone in detail with reference to FIG. 8:
RF电路810可用于收发信息或通话过程中,信号的接收和发送,特别地,将基站的下行信息接收后,给处理器880处理;另外,将设计上行的数据发送给基站。通常,RF电路810包括但不限于天线、至少一个放大器、收发信机、耦合器、低噪声放大器(Low Noise Amplifier,LNA)、双工器等。此外,RF电路810还可以通过无线通信与网络和其他设备通信。上述无线通信可以使用任一通信标准或协议,包括但不限于全球移动通讯系统(Global System of Mobile communication,GSM)、通用分组无线服务(General Packet Radio Service,GPRS)、码分多址(Code Division Multiple Access,CDMA)、宽带码分多址(Wideband Code Division Multiple Access,WCDMA)、长期演进(Long Term Evolution,LTE)、电子邮件、短消息服务(Short Messaging Service,SMS)等。The RF circuit 810 can be used for receiving and transmitting signals during the transmission or reception of information or during a call. Specifically, after receiving the downlink information of the base station, it is processed by the processor 880. In addition, the uplink data is designed to be sent to the base station. Generally, RF circuit 810 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a Low Noise Amplifier (LNA), a duplexer, and the like. In addition, RF circuitry 810 can also communicate with the network and other devices via wireless communication. The above wireless communication may use any communication standard or protocol, including but not limited to Global System of Mobile communication (GSM), General Packet Radio Service (GPRS), Code Division Multiple Access (Code Division). Multiple Access (CDMA), Wideband Code Division Multiple Access (WCDMA), Long Term Evolution (LTE), E-mail, Short Messaging Service (SMS), and the like.
存储器820可用于存储软件程序以及模块,处理器880通过运行存储在存储器820的 软件程序以及模块,从而执行手机的各种功能应用以及数据处理。存储器820可主要包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、至少一个功能所需的应用程序(比如声音播放功能、图像播放功能等)等;存储数据区可存储根据手机的使用所创建的数据(比如音频数据、电话本等)等。此外,存储器820可以包括高速随机存取存储器,还可以包括非易失性存储器,例如至少一个磁盘存储器件、闪存器件、或其他易失性固态存储器件。The memory 820 can be used to store software programs and modules, and the processor 880 executes various functional applications and data processing of the mobile phone by running software programs and modules stored in the memory 820. The memory 820 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application required for at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may be stored according to Data created by the use of the mobile phone (such as audio data, phone book, etc.). Moreover, memory 820 can include high speed random access memory, and can also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
输入单元830可用于接收输入的数字或字符信息,以及产生与手机的用户设置以及功能控制有关的键信号输入。具体地,输入单元830可包括触控面板831以及其他输入设备832。触控面板831,也称为触摸屏,可收集用户在其上或附近的触摸操作(比如用户使用手指、触笔等任何适合的物体或附件在触控面板831上或在触控面板831附近的操作),并根据预先设定的程式驱动相应的连接装置。可选的,触控面板831可包括触摸检测装置和触摸控制器两个部分。其中,触摸检测装置检测用户的触摸方位,并检测触摸操作带来的信号,将信号传送给触摸控制器;触摸控制器从触摸检测装置上接收触摸信息,并将它转换成触点坐标,再送给处理器880,并能接收处理器880发来的命令并加以执行。此外,可以采用电阻式、电容式、红外线以及表面声波等多种类型实现触控面板831。除了触控面板831,输入单元830还可以包括其他输入设备832。具体地,其他输入设备832可以包括但不限于物理键盘、功能键(比如音量控制按键、开关按键等)、轨迹球、鼠标、操作杆等中的一种或多种。The input unit 830 can be configured to receive input numeric or character information and to generate key signal inputs related to user settings and function controls of the handset. Specifically, the input unit 830 may include a touch panel 831 and other input devices 832. The touch panel 831, also referred to as a touch screen, can collect touch operations on or near the user (such as the user using a finger, a stylus, or the like on the touch panel 831 or near the touch panel 831. Operation), and drive the corresponding connecting device according to a preset program. Optionally, the touch panel 831 can include two parts: a touch detection device and a touch controller. Wherein, the touch detection device detects the touch orientation of the user, and detects a signal brought by the touch operation, and transmits the signal to the touch controller; the touch controller receives the touch information from the touch detection device, converts the touch information into contact coordinates, and sends the touch information. The processor 880 is provided and can receive commands from the processor 880 and execute them. In addition, the touch panel 831 can be implemented in various types such as resistive, capacitive, infrared, and surface acoustic waves. In addition to the touch panel 831, the input unit 830 may also include other input devices 832. In particular, other input devices 832 may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control buttons, switch buttons, etc.), trackballs, mice, joysticks, and the like.
显示单元840可用于显示由用户输入的信息或提供给用户的信息以及手机的各种菜单。显示单元840可包括显示面板841,可选的,可以采用液晶显示器(Liquid Crystal Display,LCD)、有机发光二极管(Organic Light-Emitting Diode,OLED)等形式来配置显示面板841。进一步的,触控面板831可覆盖显示面板841,当触控面板831检测到在其上或附近的触摸操作后,传送给处理器880以确定触摸事件的类型,随后处理器880根据触摸事件的类型在显示面板841上提供相应的视觉输出。虽然在图8中,触控面板831与显示面板841是作为两个独立的部件来实现手机的输入和输入功能,但是在某些实施例中,可以将触控面板831与显示面板841集成而实现手机的输入和输出功能。The display unit 840 can be used to display information input by the user or information provided to the user as well as various menus of the mobile phone. The display unit 840 can include a display panel 841. Alternatively, the display panel 841 can be configured in the form of a liquid crystal display (LCD), an organic light-emitting diode (OLED), or the like. Further, the touch panel 831 can cover the display panel 841. When the touch panel 831 detects a touch operation thereon or nearby, the touch panel 831 transmits to the processor 880 to determine the type of the touch event, and then the processor 880 according to the touch event. The type provides a corresponding visual output on display panel 841. Although in FIG. 8, the touch panel 831 and the display panel 841 are two independent components to implement the input and input functions of the mobile phone, in some embodiments, the touch panel 831 can be integrated with the display panel 841. Realize the input and output functions of the phone.
手机还可包括至少一种传感器850,比如光传感器、运动传感器以及其他传感器。具体地,光传感器可包括环境光传感器及接近传感器,其中,环境光传感器可根据环境光线的明暗来调节显示面板841的亮度,接近传感器可在手机移动到耳边时,关闭显示面板841和/或背光。作为运动传感器的一种,加速计传感器可检测各个方向上(一般为三轴)加速度的大小,静止时可检测出重力的大小及方向,可用于识别手机姿态的应用(比如横竖屏切换、相关游戏、磁力计姿态校准)、振动识别相关功能(比如计步器、敲击)等;至于手机还可配置的陀螺仪、气压计、湿度计、温度计、红外线传感器等其他传感器,在此不再赘述。The handset can also include at least one type of sensor 850, such as a light sensor, motion sensor, and other sensors. Specifically, the light sensor may include an ambient light sensor and a proximity sensor, wherein the ambient light sensor may adjust the brightness of the display panel 841 according to the brightness of the ambient light, and the proximity sensor may close the display panel 841 and/or when the mobile phone moves to the ear. Or backlight. As a kind of motion sensor, the accelerometer sensor can detect the magnitude of acceleration in all directions (usually three axes). When it is stationary, it can detect the magnitude and direction of gravity. It can be used to identify the gesture of the mobile phone (such as horizontal and vertical screen switching, related Game, magnetometer attitude calibration), vibration recognition related functions (such as pedometer, tapping), etc.; as for the mobile phone can also be configured with gyroscopes, barometers, hygrometers, thermometers, infrared sensors and other sensors, no longer Narration.
音频电路860、扬声器861,传声器862可提供用户与手机之间的音频接口。音频电路860可将接收到的音频数据转换后的电信号,传输到扬声器861,由扬声器861转换为声音信号输出;另一方面,传声器862将收集的声音信号转换为电信号,由音频电路860接收 后转换为音频数据,再将音频数据输出处理器880处理后,经RF电路810以发送给比如另一手机,或者将音频数据输出至存储器820以便进一步处理。An audio circuit 860, a speaker 861, and a microphone 862 can provide an audio interface between the user and the handset. The audio circuit 860 can transmit the converted electrical data of the received audio data to the speaker 861 for conversion to the sound signal output by the speaker 861; on the other hand, the microphone 862 converts the collected sound signal into an electrical signal by the audio circuit 860. After receiving, it is converted into audio data, and then processed by the audio data output processor 880, sent to the other mobile phone via the RF circuit 810, or outputted to the memory 820 for further processing.
WiFi属于短距离无线传输技术,手机通过WiFi模块870可以帮助用户收发电子邮件、浏览网页和访问流式媒体等,它为用户提供了无线的宽带互联网访问。虽然图8示出了WiFi模块870,但是可以理解的是,其并不属于手机的必须构成,完全可以根据需要在不改变发明的本质的范围内而省略。WiFi is a short-range wireless transmission technology, and the mobile phone can help users to send and receive emails, browse web pages, and access streaming media through the WiFi module 870, which provides users with wireless broadband Internet access. Although FIG. 8 shows the WiFi module 870, it can be understood that it does not belong to the essential configuration of the mobile phone, and can be omitted as needed within the scope of not changing the essence of the invention.
处理器880是手机的控制中心,利用各种接口和线路连接整个手机的各个部分,通过运行或执行存储在存储器820内的软件程序和/或模块,以及调用存储在存储器820内的数据,执行手机的各种功能和处理数据,从而对手机进行整体监控。可选的,处理器880可包括一个或多个处理单元;优选的,处理器880可集成应用处理器和调制解调处理器,其中,应用处理器主要处理操作系统、用户界面和应用程序等,调制解调处理器主要处理无线通信。可以理解的是,上述调制解调处理器也可以不集成到处理器880中。The processor 880 is the control center of the handset, and connects various portions of the entire handset using various interfaces and lines, by executing or executing software programs and/or modules stored in the memory 820, and invoking data stored in the memory 820, executing The phone's various functions and processing data, so that the overall monitoring of the phone. Optionally, the processor 880 may include one or more processing units; preferably, the processor 880 may integrate an application processor and a modem processor, where the application processor mainly processes an operating system, a user interface, an application, and the like. The modem processor primarily handles wireless communications. It will be appreciated that the above described modem processor may also not be integrated into the processor 880.
手机还包括给各个部件供电的电源890(比如电池),优选的,电源可以通过电源管理系统与处理器880逻辑相连,从而通过电源管理系统实现管理充电、放电、以及功耗管理等功能。The handset also includes a power source 890 (such as a battery) that supplies power to the various components. Preferably, the power source can be logically coupled to the processor 880 through a power management system to manage functions such as charging, discharging, and power management through the power management system.
尽管未示出,手机还可以包括摄像头、蓝牙模块等,在此不再赘述。Although not shown, the mobile phone may further include a camera, a Bluetooth module, and the like, and details are not described herein again.
在上述方法实施例中由终端设备所执行的步骤可以基于该图8所示的终端设备结构,此处不再赘述。The steps performed by the terminal device in the foregoing method embodiments may be based on the terminal device structure shown in FIG. 8, and details are not described herein again.
本申请实施例提供一种无线通信装置,该通信装置的组成构件,可参考前述图7所示出的网络设备。在一种可行的设计中,该通信装置的硬件结构根据本申请实施例所必须的要件,可以包括:The embodiment of the present application provides a wireless communication device. For the components of the communication device, reference may be made to the network device shown in FIG. 7 . In a feasible design, the hardware structure of the communication device is required according to the embodiment of the present application, and may include:
至少一个处理器,存储器,收发电路和总线系统,所述处理器,所述存储器,所述收发电路通过所述总线系统耦合,所述无线通信装置通过所述收发电路与终端设备相通信,所述存储器用于存储程序指令,所述至少一个处理器用于执行所述存储器中存储的所述程序指令,使得所述无线通信装置执行上述各实施例中第一网络设备(也即,无线接入网设备)执行的各种可行的操作(例如,图3或图4所示出的无线接入网设备所执行的操作)。所述无线通信装置既可以是该无线接入网设备,也可以是应用在无线接入网侧设备中执行相应功能的系统芯片。At least one processor, a memory, a transceiver circuit and a bus system, the processor, the memory, the transceiver circuit coupled by the bus system, the wireless communication device communicating with the terminal device through the transceiver circuit, The memory is for storing program instructions, and the at least one processor is configured to execute the program instructions stored in the memory, such that the wireless communication device performs the first network device (ie, wireless access) in the foregoing embodiments. Various possible operations performed by the network device (for example, the operations performed by the radio access network device shown in FIG. 3 or FIG. 4). The wireless communication device may be either the wireless access network device or a system chip that performs corresponding functions in the wireless access network side device.
本申请实施例还提供一种无线通信装置,可以包括:The embodiment of the present application further provides a wireless communication device, which may include:
至少一个处理器,存储器,收发电路和总线系统,所述处理器,所述存储器,所述收发电路通过所述总线系统耦合,所述无线通信装置通过所述收发电路与网络侧设备相通信,所述存储器用于存储程序指令,所述至少一个处理器用于执行所述存储器中存储的所述程序指令,使得所述无线通信装置执行上述各实施例中终端设备执行的各种可行的操作(例如,图3或图4所示出的终端设备所执行的操作)。所述无线通信装置既可以是终端设备,也可以是应用在终端设备中执行相应功能的系统芯片。At least one processor, a memory, a transceiver circuit and a bus system, the processor, the memory, the transceiver circuit coupled by the bus system, the wireless communication device communicating with a network side device through the transceiver circuit, The memory is for storing program instructions, the at least one processor is configured to execute the program instructions stored in the memory, such that the wireless communication device performs various feasible operations performed by the terminal device in the above embodiments ( For example, the operation performed by the terminal device shown in FIG. 3 or FIG. 4). The wireless communication device can be either a terminal device or a system chip that applies a corresponding function in the terminal device.
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产 品包括一个或多个计算机指令。在计算机上加载和执行所述计算机程序指令时,全部或部分地产生按照本申请实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质,(例如,软盘、硬盘、磁带)、光介质(例如,DVD)、或者半导体介质(例如固态硬盘Solid State Disk(SSD))等。In the above embodiments, it may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. When implemented in software, it may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When the computer program instructions are loaded and executed on a computer, the processes or functions described in accordance with embodiments of the present application are generated in whole or in part. The computer can be a general purpose computer, a special purpose computer, a computer network, or other programmable device. The computer instructions can be stored in a computer readable storage medium or transferred from one computer readable storage medium to another computer readable storage medium, for example, the computer instructions can be from a website site, computer, server or data center Transfer to another website site, computer, server, or data center by wire (eg, coaxial cable, fiber optic, digital subscriber line (DSL), or wireless (eg, infrared, wireless, microwave, etc.). The computer readable storage medium can be any available media that can be accessed by a computer or a data storage device such as a server, data center, or the like that includes one or more available media. The usable medium may be a magnetic medium (eg, a floppy disk, a hard disk, a magnetic tape), an optical medium (eg, a DVD), or a semiconductor medium (such as a solid state disk (SSD)).
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统,装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。A person skilled in the art can clearly understand that for the convenience and brevity of the description, the specific working process of the system, the device and the unit described above can refer to the corresponding process in the foregoing method embodiment, and details are not described herein again.
在本申请所提供的几个实施例中,应该理解到,所揭露的系统,装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。In the several embodiments provided by the present application, it should be understood that the disclosed system, apparatus, and method may be implemented in other manners. For example, the device embodiments described above are merely illustrative. For example, the division of the unit is only a logical function division. In actual implementation, there may be another division manner, for example, multiple units or components may be combined or Can be integrated into another system, or some features can be ignored or not executed. In addition, the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, and may be in an electrical, mechanical or other form.
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。The units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。In addition, each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit. The above integrated unit can be implemented in the form of hardware or in the form of a software functional unit.
所述集成的单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、磁碟或者光盘等各种可以存储程序代码的介质。The integrated unit, if implemented in the form of a software functional unit and sold or used as a standalone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application, in essence or the contribution to the prior art, or all or part of the technical solution may be embodied in the form of a software product stored in a storage medium. A number of instructions are included to cause a computer device (which may be a personal computer, server, or network device, etc.) to perform all or part of the steps of the methods described in various embodiments of the present application. The foregoing storage medium includes: a U disk, a mobile hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disk, and the like. .
以上所述,以上实施例仅用以说明本申请的技术方案,而非对其限制;尽管参照前述实施例对本申请进行了详细的说明,本领域的普通技术人员应当理解:其依然可以对前述各实施例所记载的技术方案进行修改,或者对其中部分技术特征进行等同替换;而这些修改或者替换,并不使相应技术方案的本质脱离本申请各实施例技术方案的精神和范围。The above embodiments are only used to explain the technical solutions of the present application, and are not limited thereto; although the present application has been described in detail with reference to the foregoing embodiments, those skilled in the art should understand that they can still The technical solutions described in the embodiments are modified, or the equivalents of the technical features are replaced by the equivalents. The modifications and substitutions of the embodiments do not depart from the spirit and scope of the technical solutions of the embodiments of the present application.

Claims (26)

  1. 一种接入控制的方法,其特征在于,包括:A method for access control, comprising:
    第一网络设备向终端设备发送第一消息,所述第一消息包括第一映射规则,所述第一映射规则包括至少一个无线接入网网络切片的信息;The first network device sends a first message to the terminal device, where the first message includes a first mapping rule, where the first mapping rule includes information of at least one radio access network network slice;
    所述第一网络设备向所述终端设备发送接入控制信息。The first network device sends access control information to the terminal device.
  2. 根据权利要求的1所示的方法,其特征在于,所述第一映射规则和所述接入控制信息被用于对所述终端设备进行接入控制。The method according to claim 1, wherein the first mapping rule and the access control information are used for performing access control on the terminal device.
  3. 根据权利要求1或2所述的方法,其特征在于,所述方法还包括:The method according to claim 1 or 2, wherein the method further comprises:
    所述第一网络设备接收来自于第二网络设备的第二消息,所述第二消息包括第二映射规则,所述第二映射规则包括至少一个核心网配置的终端适用的接入类别,所述第一映射规则还包括所述至少一个无线接入网网络切片的信息与所述至少一个核心网配置的终端适用的接入类别的映射关系。Receiving, by the first network device, a second message from the second network device, where the second message includes a second mapping rule, where the second mapping rule includes an access category applicable to the terminal configured by the at least one core network, where The first mapping rule further includes a mapping relationship between information of the at least one radio access network network slice and an access category applicable to the terminal configured by the at least one core network.
  4. 根据权利要求1或2所述的方法,其特征在于,所述方法还包括:The method according to claim 1 or 2, wherein the method further comprises:
    所述第一网络设备接收来自于第二网络设备的第三消息,所述第三消息包括核心网配置的网络允许的网络切片选择辅助信息列表,所述第一映射规则还包括所述至少一个无线接入网网络切片的信息与所述核心网配置的网络允许的网络切片选择辅助信息列表的映射关系。The first network device receives a third message from the second network device, where the third message includes a network slice selection assistance information list allowed by the network configured by the core network, where the first mapping rule further includes the at least one The mapping relationship between the information of the radio access network network slice and the network slice selection auxiliary information list allowed by the network configured by the core network.
  5. 根据权利要求1或2所述的方法,其特征在于,所述方法还包括:The method according to claim 1 or 2, wherein the method further comprises:
    所述第一网络设备接收来自于第二网络设备的第四消息,所述第四消息包括第二映射规则和核心网配置的网络允许的网络切片选择辅助信息列表,所述第二映射规则包括至少一个核心网配置的终端适用的接入类别,所述第一映射规则还包括所述至少一个无线接入网网络切片的信息、所述至少一个核心网配置的终端适用的接入类别与所述核心网配置的网络允许的网络切片选择辅助信息列表的映射关系。The first network device receives a fourth message from the second network device, where the fourth message includes a second mapping rule and a network slice selection assistance information list allowed by the core network configuration, where the second mapping rule includes An access category applicable to the terminal configured by the at least one core network, where the first mapping rule further includes information of the at least one radio access network network slice, and an access category and a location applicable to the terminal configured by the at least one core network The mapping of the network slice allowed by the network configured by the core network to select the auxiliary information list.
  6. 根据权利要求1-3任一所述的方法,其特征在于,所述第一映射规则还包括所述至少一个无线接入网网络切片的信息与当前可用的网络切片选择辅助信息的映射关系。The method according to any one of claims 1-3, wherein the first mapping rule further comprises a mapping relationship between information of the at least one radio access network network slice and currently available network slice selection assistance information.
  7. 根据权利要求1-6任一所述的方法,其特征在于,所述第一映射规则还包括所述至少一个无线接入网网络切片的信息与至少一个无线接入网接入类别的映射关系。The method according to any one of claims 1-6, wherein the first mapping rule further comprises a mapping relationship between information of the at least one radio access network network slice and at least one radio access network access category. .
  8. 一种接入控制的方法,其特征在于,包括:A method for access control, comprising:
    终端设备接收来自于第一网络设备的第一消息,所述第一消息包括第一映射规则,所述第一映射规则包括至少一个无线接入网网络切片的信息;Receiving, by the terminal device, a first message from the first network device, where the first message includes a first mapping rule, where the first mapping rule includes information of at least one radio access network network slice;
    所述终端设备接收来自于所述第一网络设备的接入控制信息。The terminal device receives access control information from the first network device.
  9. 根据权利要求8所述的方法,其特征在于,所述方法还包括:The method of claim 8 further comprising:
    所述终端设备根据所述第一映射规则和所述接入控制信息进行接入控制。The terminal device performs access control according to the first mapping rule and the access control information.
  10. 根据权利要求8或9所述的方法,其特征在于,所述第一映射规则还包括所述至少一个无线接入网网络切片的信息与至少一个无线接入网接入类别的映射关系。The method according to claim 8 or 9, wherein the first mapping rule further comprises a mapping relationship between information of the at least one radio access network network slice and at least one radio access network access category.
  11. 根据权利要求8-9任一所述的方法,其特征在于,所述第一映射规则还包括所述至少一个无线接入网网络切片的信息与至少一个核心网配置的终端适用的接入类别的映射 关系。The method according to any one of claims 8-9, wherein the first mapping rule further comprises information of the at least one radio access network network slice and an access category applicable to the terminal configured by the at least one core network. Mapping relationship.
  12. 一种网络设备,其特征在于,包括:A network device, comprising:
    第一发送模块,用于向终端设备发送第一消息,所述第一消息包括第一映射规则,所述第一映射规则包括至少一个无线接入网网络切片的信息;a first sending module, configured to send a first message to the terminal device, where the first message includes a first mapping rule, where the first mapping rule includes information of at least one radio access network network slice;
    第二发送模块,用于向所述终端设备发送接入控制信息。The second sending module is configured to send the access control information to the terminal device.
  13. 根据权利要求12所述的网络设备,其特征在于,所述第一映射规则和所述接入控制信息用于对所述终端设备进行接入控制。The network device according to claim 12, wherein the first mapping rule and the access control information are used for performing access control on the terminal device.
  14. 根据权利要求12或13所述的网络设备,其特征在于,所述网络设备还包括:The network device according to claim 12 or 13, wherein the network device further comprises:
    接收模块,用于接收来自于第二网络设备的第二消息,所述第二消息包括第二映射规则,所述第二映射规则包括至少一个核心网配置的终端适用的接入类别,所述第一映射规则还包括所述至少一个无线接入网网络切片的信息与所述至少一个核心网配置的终端适用的接入类别的映射关系。a receiving module, configured to receive a second message from the second network device, where the second message includes a second mapping rule, where the second mapping rule includes an access category applicable to the terminal configured by the at least one core network, The first mapping rule further includes a mapping relationship between the information of the at least one radio access network network slice and the access category applicable to the terminal configured by the at least one core network.
  15. 根据权利要求12或13所述的网络设备,其特征在于,所述网络设备还包括:The network device according to claim 12 or 13, wherein the network device further comprises:
    接收模块,用于接收来自于第二网络设备的第二消息,所述第二消息包括核心网配置的网络允许的网络切片选择辅助信息列表,所述第一映射规则还包括所述至少一个无线接入网网络切片的信息与所述核心网配置的网络允许的网络切片选择辅助信息列表的映射关系。a receiving module, configured to receive a second message from the second network device, where the second message includes a network slice selection auxiliary information list allowed by the network configured by the core network, where the first mapping rule further includes the at least one wireless The mapping relationship between the information of the access network network slice and the network slice selection auxiliary information list allowed by the network configured by the core network.
  16. 根据权利要求12或13所述的网络设备,其特征在于,所述网络设备还包括:The network device according to claim 12 or 13, wherein the network device further comprises:
    接收模块,用于接收来自于第二网络设备的第二消息,所述第二消息包括第二映射规则和核心网配置的网络允许的网络切片选择辅助信息列表,所述第二映射规则包括至少一个核心网配置的终端适用的接入类别,所述第一映射规则还包括所述至少一个无线接入网网络切片的信息、所述至少一个核心网配置的终端适用的接入类别与所述核心网配置的网络允许的网络切片选择辅助信息列表的映射关系。a receiving module, configured to receive a second message from the second network device, where the second message includes a second mapping rule and a network slice selection auxiliary information list allowed by the network configured by the core network, where the second mapping rule includes at least An access category applicable to a terminal configured by a core network, where the first mapping rule further includes information of the at least one radio access network network slice, an access category applicable to the terminal configured by the at least one core network, and the The network slice configuration allowed by the core network selects the mapping relationship of the auxiliary information list.
  17. 根据权利要求12-14任一所述的网络设备,其特征在于,所述第一映射规则还包括所述至少一个无线接入网网络切片的信息与当前可用的网络切片选择辅助信息的映射关系。The network device according to any one of claims 12-14, wherein the first mapping rule further comprises a mapping relationship between information of the at least one radio access network network slice and currently available network slice selection auxiliary information. .
  18. 根据权利要求12-17任一所述的网络设备,其特征在于,所述第一映射规则还包括所述至少一个无线接入网网络切片的信息与至少一个无线接入网接入类别的映射关系。The network device according to any one of claims 12-17, wherein the first mapping rule further comprises mapping of information of the at least one radio access network network slice to at least one radio access network access category relationship.
  19. 一种终端设备,其特征在于,包括:A terminal device, comprising:
    第一接收模块,用于接收来自于第一网络设备的第一消息,所述第一消息包括第一映射规则,所述第一映射规则包括至少一个无线接入网网络切片的信息;a first receiving module, configured to receive a first message from the first network device, where the first message includes a first mapping rule, where the first mapping rule includes information of at least one radio access network network slice;
    第二接收模块,用于接收来自于所述第一网络设备的接入控制信息。The second receiving module is configured to receive access control information from the first network device.
  20. 根据权利要求19所述的终端设备,其特征在于,所述终端设备还包括:The terminal device according to claim 19, wherein the terminal device further comprises:
    处理模块,用于根据所述第一映射规则和所述接入控制信息进行接入控制检查。And a processing module, configured to perform an access control check according to the first mapping rule and the access control information.
  21. 根据权利要求19或20所述的终端设备,其特征在于,所述第一映射规则还包括所述至少一个无线接入网网络切片的信息与至少一个无线接入网接入类别的映射关系。The terminal device according to claim 19 or 20, wherein the first mapping rule further comprises a mapping relationship between information of the at least one radio access network network slice and at least one radio access network access category.
  22. 根据权利要求19-21任一所述的终端设备,其特征在于,所述第一映射规则还包 括所述至少一个无线接入网网络切片的信息与至少一个核心网配置的终端适用的接入类别的映射关系。The terminal device according to any one of claims 19 to 21, wherein the first mapping rule further includes information of the at least one radio access network network slice and access applicable to at least one core network configured terminal. The mapping relationship of categories.
  23. 一种计算机可读存储介质,所述计算机可读存储介质中存储有指令,当其在计算机上运行时,使得计算机执行所述权利要求1至11中任一项所述的方法。A computer readable storage medium having stored therein instructions that, when executed on a computer, cause the computer to perform the method of any one of claims 1 to 11.
  24. 一种包含指令的计算机程序产品,当其在计算机上运行时,使得计算机执行所述权利要求1至11中任一项所述的方法。A computer program product comprising instructions which, when run on a computer, cause the computer to perform the method of any one of claims 1 to 11.
  25. 一种无线通信装置,其特征在于,包括:A wireless communication device, comprising:
    至少一个处理器,存储器,收发电路和总线系统,所述处理器,所述存储器,所述收发电路通过所述总线系统耦合,所述无线通信装置通过所述收发电路与终端设备相通信,所述存储器用于存储程序指令,所述至少一个处理器用于执行所述存储器中存储的所述程序指令,使得所述无线通信装置完成如权利要求1-7任一所述的方法中所述第一网络设备操作的部分。At least one processor, a memory, a transceiver circuit and a bus system, the processor, the memory, the transceiver circuit coupled by the bus system, the wireless communication device communicating with the terminal device through the transceiver circuit, Said memory for storing program instructions, said at least one processor for executing said program instructions stored in said memory, said wireless communication device completing said method according to any of claims 1-7 A part of the operation of a network device.
  26. 一种无线通信装置,其特征在于,包括:A wireless communication device, comprising:
    至少一个处理器,存储器,收发电路和总线系统,所述处理器,所述存储器,所述收发电路通过所述总线系统耦合,所述无线通信装置通过所述收发电路与网络侧设备相通信,所述存储器用于存储程序指令,所述至少一个处理器用于执行所述存储器中存储的所述程序指令,使得所述无线通信装置完成如权利要求8-11任一所述的方法中所述终端设备操作的部分。At least one processor, a memory, a transceiver circuit and a bus system, the processor, the memory, the transceiver circuit coupled by the bus system, the wireless communication device communicating with a network side device through the transceiver circuit, The memory is for storing program instructions, the at least one processor for executing the program instructions stored in the memory, such that the wireless communication device completes the method of any of claims 8-11 The part of the terminal device operation.
PCT/CN2018/091436 2017-06-16 2018-06-15 Method for controlling access, network device, and terminal device WO2018228517A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710459461.9A CN109151950B (en) 2017-06-16 2017-06-16 Access control method, network equipment and terminal equipment
CN201710459461.9 2017-06-16

Publications (1)

Publication Number Publication Date
WO2018228517A1 true WO2018228517A1 (en) 2018-12-20

Family

ID=64659678

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/091436 WO2018228517A1 (en) 2017-06-16 2018-06-15 Method for controlling access, network device, and terminal device

Country Status (2)

Country Link
CN (1) CN109151950B (en)
WO (1) WO2018228517A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020221351A1 (en) * 2019-05-02 2020-11-05 Mediatek Inc. Enhancement for closed access groups

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113228743B (en) * 2019-04-01 2023-04-11 Oppo广东移动通信有限公司 User equipment and method for access control thereof through access classification
CN111866989A (en) * 2019-04-28 2020-10-30 华为技术有限公司 Communication method, device and system
CN112351470B (en) * 2019-08-07 2022-04-05 华为技术有限公司 Access restriction detection method and device
CN113596948B (en) * 2020-04-30 2024-01-16 维沃移动通信有限公司 Information reporting method, sending method, selecting method and related equipment
CN114039738B (en) * 2020-07-21 2023-02-03 华为技术有限公司 Firewall rule configuration method and system, medium and electronic equipment thereof
CN114760663A (en) * 2020-12-28 2022-07-15 中国移动通信有限公司研究院 Information transmission method, device, related equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106412905A (en) * 2016-12-12 2017-02-15 中国联合网络通信集团有限公司 Network slice selection method, UE, MME and system
WO2017059829A2 (en) * 2016-11-04 2017-04-13 Telefonaktiebolaget Lm Ericsson (Publ) Methods, base station and user equipment
CN106851589A (en) * 2016-12-30 2017-06-13 北京小米移动软件有限公司 Wireless network access method, apparatus and system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112996087B (en) * 2016-09-28 2023-03-10 华为技术有限公司 Network slice selection method, terminal equipment and network equipment

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017059829A2 (en) * 2016-11-04 2017-04-13 Telefonaktiebolaget Lm Ericsson (Publ) Methods, base station and user equipment
CN106412905A (en) * 2016-12-12 2017-02-15 中国联合网络通信集团有限公司 Network slice selection method, UE, MME and system
CN106851589A (en) * 2016-12-30 2017-06-13 北京小米移动软件有限公司 Wireless network access method, apparatus and system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
ZTE ET AL.: "Consideration on the Impact of NW Slicing on RAN", 3GPP TSG-RAN WG2 MEETING #95BIS, R2-166344, 14 October 2016 (2016-10-14) *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020221351A1 (en) * 2019-05-02 2020-11-05 Mediatek Inc. Enhancement for closed access groups
CN112243594A (en) * 2019-05-02 2021-01-19 联发科技股份有限公司 Enhanced mechanism for closed access group
US11206602B2 (en) 2019-05-02 2021-12-21 Mediatek Inc. Enhancement for closed access groups
CN112243594B (en) * 2019-05-02 2022-10-28 联发科技股份有限公司 Method and device for processing closed access group

Also Published As

Publication number Publication date
CN109151950B (en) 2021-09-07
CN109151950A (en) 2019-01-04

Similar Documents

Publication Publication Date Title
US11606834B2 (en) Network slice selection in a mobile communication network
WO2018228517A1 (en) Method for controlling access, network device, and terminal device
US10979887B2 (en) Access method, network device, terminal device, and AMF device
US11627486B2 (en) Data sending method and apparatus, and device
US11258708B2 (en) Communication method and communications apparatus
WO2018201938A1 (en) Resource mapping method, network device and terminal device
WO2020025015A1 (en) Capacity indication method, and terminal and network-side network element
EP3852405A1 (en) Communication method and device
US20210289434A1 (en) Method for controlling network access and communications device
CN110679194A (en) Data scheduling method and related equipment
CN111800794A (en) Method and device for determining position of demodulation reference signal
TWI678903B (en) Method for uplink data transmission, and terminal
WO2023221831A1 (en) Processing method, communication device, and storage medium
WO2023051288A1 (en) Tunnel management method, device, and system
WO2022067544A1 (en) Wireless communication method, terminal device, and network device
WO2021109141A1 (en) Communication connection configuration method and apparatus, and communication device and storage medium
WO2022141426A1 (en) Slicing information indication method, and terminal device and network device
WO2022205254A1 (en) Method and device for determining edge configuration server
WO2024109221A1 (en) Network slice matching method and apparatus
CN114946215A (en) Service flow processing method and device

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18817325

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18817325

Country of ref document: EP

Kind code of ref document: A1