CN109151950A - A kind of method, the network equipment and the terminal device of access control - Google Patents
A kind of method, the network equipment and the terminal device of access control Download PDFInfo
- Publication number
- CN109151950A CN109151950A CN201710459461.9A CN201710459461A CN109151950A CN 109151950 A CN109151950 A CN 109151950A CN 201710459461 A CN201710459461 A CN 201710459461A CN 109151950 A CN109151950 A CN 109151950A
- Authority
- CN
- China
- Prior art keywords
- network
- information
- ran
- network slice
- mapping ruler
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/02—Access restriction performed under specific conditions
- H04W48/04—Access restriction performed under specific conditions based on user or terminal location or mobility data, e.g. moving direction, speed
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/02—Access restriction performed under specific conditions
- H04W48/06—Access restriction performed under specific conditions based on traffic conditions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/08—Access restriction or access information delivery, e.g. discovery data delivery
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/18—Selecting a network or a communication service
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The embodiment of the present application discloses a kind of method of access control, and the complexity of access control is sliced for reducing network.Application embodiment method includes: first network equipment to terminal device transmission first message, and the first message includes the first mapping ruler, and first mapping ruler includes the information of at least one wireless access network network slice;The first network equipment sends access control information to the terminal device.The embodiment of the present application also provides a kind of network equipment and terminal device.
Description
Technical field
This application involves the communications field more particularly to a kind of method, the network equipment and the terminal devices of access control.
Background technique
In order to cope with the various user's use-case that is occurring or will occur, different user's use-cases is to network performance
There are significant difference, the 5th Generation Mobile Communication System (the fifth generation, 5G), such as (new that newly eats dishes without rice or wine for demand
Radio, NR) notable feature be to propose the network architecture of network slice (network slice, NS).Software defined network
Network (software defined network, SDN) and network function virtualize (network function
Virtualization, NFV) technology be network slice framework core technology, bottom physical resource may be implemented in NFV technology
Virtualization, loads virtual network function (network function, NF) to general-purpose platform, such as virtual machine, and SDN technology is then real
Logical connection between existing virtual machine, constructs the access of carrier signaling and data flow.By accessing net (radio access
Network, RAN) and the NF of core net (core network, CN) between Dynamic link library, configuration business chain end to end, from
And construct network slice.Operator can be according to each specific business use-case to capacity, covering, rate, time delay and reliability
The demand of equal Key Performance Indicators (key performance indicator, KPI), forms a particular network functions set
And comprising Internet resources needed for running these network functions, so as to provide required telecommunications service business and network energy
Power service meets specialized market's scene and demand.
As shown in Figure 1, supporting the schematic diagram of multiple network slices for 3GPP.Third generation partner program (the third
Generation partnership project, 3GPP) main Types that the network of 5G is sliced have been divided into following three categories:
Mobile broadband service (enhanced mobile broadband, eMBB), the magnanimity machine type of enhancing connect business
(massive machine type communication, mMTC) and super reliable low time delay business (ultra-reliable
And low latency communications, URLLC).Wherein eMBB be mainly directed towards to rate and mobility have it is higher
The terminal of demand, such as mobile phone, multimedia equipment, mMTC mainly for internet of things equipment, have extensive, Hypomobility and
Lower rate requirement.URLLC then refer mainly to car networking, security information etc. to time delay and reliability have rigors business and
Device type.For example, mobile phone user can access the network slice of eMBB type, high-speed downloads or viewing 4K high definition view are carried out
Frequently, sensor device can access mMTC network slice and carry out the transmission of small data packets and the update of system configuration.User sets
It is standby to access one or more or overall network slice simultaneously, meet business demand and reaches preferable user experience.
It, can be by access control come restricting user equipment (user if congestion condition occurs in current network
Equipment, UE) access connection or service request reach and alleviate network congestion to carry out the management of network load
Purpose, long term evolution (Long Term Evolution, LTE) system use access restriction inspection (Access Barring
Check, ABC) mode.The scheme for being currently accessed control is bigger etc. in the presence of access control complexity, poor compatibility, overhead
Problem.
Summary of the invention
The embodiment of the present application provides method, the network equipment and the terminal device of a kind of access control, for reducing net
The complexity of network slice access control.
Wireless communication system applied by the embodiment of the present application may include first network equipment, terminal device and the second net
Network equipment, terminal device are illustrated by taking CN as an example by UE, first network equipment by RAN, second network equipment.I.e. this is wireless
Communication system may include access net (Radio Access Network, RAN) equipment, core net (Core Network, CN)
Equipment and user equipment (User Equipment, UE).The communication system of the embodiment of the present application supports network to be sliced framework, this is logical
Core net network slice in letter system can share core web network equipment and/or core net Internet resources, can also monopolize
Core web network equipment and/or core net Internet resources.In the wireless communication system, UE by RAN equipment access one or
Multiple RAN network slices or CN network slice.Specifically, the information that RAN equipment is provided according to UE, and configure or obtain
Access and mobile management function to ps domain (Access and Mobility Management Function, AMF) information are selected for UE
Select AMF.
The embodiment of the present application first aspect provides a kind of method of access control, may include: first network equipment to end
End equipment sends first message, and the first message includes the first mapping ruler, and first mapping ruler includes at least one
The information of wireless access network RAN network slice;The first network equipment sends access control information to the terminal device.?
In the embodiment of the present application, because RAN network slice is usually one-to-many mapping relations with core net CN network slice,
What RAN included into the first mapping ruler that UE is sent be at least one RAN network slice information, compared with the existing technology and
It says, the configuration content of the first mapping ruler is smaller in the embodiment of the present application, and complexity is relatively low.
In conjunction with the embodiment of the present application in a first aspect, in the first implementation of the embodiment of the present application first aspect,
First mapping ruler and access control information are for carrying out access control to the terminal device.Implement in the application
In example, the first mapping ruler and access control information that RAN is sent to UE can be used for UE and carry out access control, initiate network
The access of slice.And include in the first mapping ruler be at least one RAN network slice information because RAN network be sliced
Information of the information generally with CN network slice be one-to-many relationship, so, the configuration content of the second mapping ruler is less than existing
Some configuration contents, complexity are lower.
In conjunction with the embodiment of the present application in a first aspect, the first implementation of first aspect, in the embodiment of the present application
In second of implementation of one side, the method can also include: that the first network equipment is received from the second net
The second message of network equipment, the second message include the second mapping ruler, and second mapping ruler includes at least one CN
Access category, first mapping ruler further include the information and at least one described CN that at least one described RAN network is sliced
The mapping relations of access category.In the embodiment of the present application, at least one CN access category can be understood as searching mapping ruler
In include at least one factor (such as the access grade of UE, the information of at least one CN network slice, application, class of service
Deng) it is corresponding access control information index.The information of at least one RAN network slice is true according at least one access category
Fixed, because RAN preserves the mapping relations of the information of preset RAN network slice and the information of CN network slice.RAN can be with
The information of at least one CN network slice, at least one CN network slice are determined according to the information that currently available CN network is sliced
Information it is corresponding at least one CN classification, so, the second mapping ruler may include at least one RAN network slice information
With the mapping relations of at least one CN access category.A kind of optional implementation of second mapping ruler is provided, it is described
First mapping ruler can also include the information and at least one CN access category that at least one described RAN network is sliced
Mapping relations increase the flexibility of application scheme.
In conjunction with the embodiment of the present application in a first aspect, the first implementation of first aspect, in the embodiment of the present application
In the third implementation of one side, the method can also include: that the first network equipment is received from the second net
The third message of network equipment, the third message include the network slice selection auxiliary information Allowed that CN network allows
NSSAI list, first mapping ruler further include the information and the CN Allowed that at least one described RAN network is sliced
The mapping relations of NSSAI list.In the embodiment of the present application, the information of at least one CN network slice is according to CN Allowed
What NSSAI list determined, RAN preserves the mapping relations of the information of preset RAN network slice and the information of CN network slice,
So can determine the information of at least one RAN network slice according to the information that at least one CN network is sliced.Provide one kind
The optional implementation of second mapping ruler, the first mapping ruler can also include the letter of at least one RAN network slice
The mapping relations of breath and the CN Allowed NSSAI list, increase the flexibility of application scheme.
In conjunction with the embodiment of the present application in a first aspect, the first implementation of first aspect, in the embodiment of the present application
In 4th kind of implementation of one side, the method can also include: that the first network equipment is received from the second net
4th message of network equipment, the 4th message include the network slice selection auxiliary letter that the second mapping ruler and CN network allow
Allowed NSSAI list is ceased, second mapping ruler includes at least one CN access category, and first mapping ruler is also
Information, at least one described CN access category and the CN Allowed including at least one described RAN network slice
The mapping relations of NSSAI list.In the embodiment of the present application, the information of at least one CN network slice is according to CN Allowed
What NSSAI list determined, RAN preserves the mapping relations of the information of preset RAN network slice and the information of CN network slice,
So the information of at least one RAN network slice can be determined according to the information that at least one CN network is sliced, and at least one
CN access category is again corresponding with CN Allowed NSSAI list.A kind of optional implementation of second mapping ruler is provided,
First mapping ruler can also include the information of at least one RAN network slice, the CN Allowed NSSAI list
With the mapping relations of at least one CN access category, the flexibility of application scheme is increased.
Wherein, the network that CN can allow according to the CN that UE is reported is sliced the label of selection auxiliary information (CN NSSAI), UE
The about factors selection such as information, availability of local policy, network slice agrees to that UE allows to access at least in current Acceditation Area
The information of the information of one CN network slice, at least one CN network slice can be presented in the form of a list, can be described as CN
NSSAI (CN Allowed NSSAI) list of permission, can also indicate, specifically without limitation in other manners.
In conjunction with the embodiment of the present application in a first aspect, the first of first aspect to second of any implementation, at this
In the 5th kind of implementation for applying for embodiment first aspect, first mapping ruler further includes at least one described RAN net
The mapping relations for the information that the information of network slice and currently available CN network are sliced.In the embodiment of the present application, at least one
The information of CN network slice is that RAN is determined according to the information that currently available CN network is sliced, and provides another kind second and reflects
The optional implementation of rule is penetrated, the flexibility of application scheme is increased.
In conjunction with the 4th kind of implementation of the first aspect of the embodiment of the present application, the of the embodiment of the present application first aspect
In five kinds of implementations, first mapping ruler further includes the information, currently available of at least one RAN network slice
The information of CN network slice and the mapping relations of at least one CN access category.In the embodiment of the present application, at least one CN net
The information of network slice is that RAN is determined according to the information that currently available CN network is sliced, and provides another kind the second mapping rule
Then optional implementation increases the flexibility of application scheme.
In conjunction with the embodiment of the present application in a first aspect, the first of first aspect to the 5th kind of any implementation, at this
In the 6th kind of implementation for applying for embodiment first aspect, first mapping ruler further includes at least one described RAN net
The information of network slice and the mapping relations of at least one RAN access category.In the embodiment of the present application, at least one RAN is accessed
Classification is the access category that RAN is reconfigured, it can be understood as search the second mapping ruler in include at least one because
The index of the corresponding access control information of element (information etc. of for example, at least RAN network slice).Provide another kind second
The optional implementation of mapping ruler, increases the flexibility of application scheme.
In conjunction with the embodiment of the present application in a first aspect, the first of first aspect to the 6th kind of any implementation, at this
In the 7th kind of implementation for applying for embodiment first aspect, first mapping ruler further includes at least one described RAN net
Information, the mapping relations of CN Allowed NSSAI list and RAN access category of network slice.In the embodiment of the present application, until
The information of few CN network slice is that RAN is determined according to CN Allowed NSSAI list, provides another kind second and reflects
The optional implementation of rule is penetrated, the flexibility of application scheme is increased.
In conjunction with the embodiment of the present application in a first aspect, the first of first aspect to the 7th kind of any implementation, at this
In the 8th kind of implementation for applying for embodiment first aspect, first mapping ruler further includes at least one described RAN net
The mapping relations of the information of network slice, the information of currently available CN network slice and RAN access category.In the embodiment of the present application
In, the information of at least one CN network slice is that RAN is determined according to the information that currently available CN network is sliced, and is provided another
A kind of optional implementation of second mapping ruler, increases the flexibility of application scheme.
It should be noted that it is above-mentioned the first into the 8th kind of any possible implementation, the second mapping ruler packet
The information of at least one the RAN network slice included can be at least one RAN access category, alternatively, CN Allowed NSSAI
List, alternatively, CN Allowed NSSAI list is at least one RAN access category, there are mapping relations, alternatively, currently available
CN network slice information, alternatively, at least one CN access category.But it can also not include in the second mapping ruler
At least one RAN access category, alternatively, CN Allowed NSSAI list, alternatively, CN Allowed NSSAI list and at least
One RAN access category, alternatively, the information that currently available CN network is sliced, alternatively, at least one CN access category, RAN is only
Need to know that they have mapping relations just, specifically without limitation.
The embodiment of the present application second aspect provides a kind of method of access control, may include: that terminal device reception comes from
In the first message of first network equipment, the first message includes the first mapping ruler, and first mapping ruler includes extremely
The information of few wireless access network RAN network slice;The terminal device receives connecing from the first network equipment
Enter to control information.In the embodiment of the present application, because the information of RAN network slice and the information of CN network slice are usually a pair
More mapping relations, so, what RAN included into the first mapping ruler that UE is sent is the letter of at least one RAN network slice
Breath, in terms of existing technologies, the configuration content of the first mapping ruler is smaller in the embodiment of the present application, and complexity compares
It is low.
In conjunction with the second aspect of the embodiment of the present application, in the first implementation of the embodiment of the present application second aspect,
The method also includes: the terminal device carries out access control according to first mapping ruler and access control information
System.In the embodiment of the present application, UE can carry out access control inspection according to the information that at least one RAN network is sliced, because
Information of the information of RAN network slice generally with CN network slice is one-to-many relationship, so, the configuration of the second mapping ruler
Content is less than existing configuration content, and complexity is lower.Also achieve the control of RAN network slice granularity.UE is also solved to ask
The inconsistent situation of the information of the CN network slice of the information and CN distribution for the CN network slice asked, because identical services type
The information MAP of different CN network slices is identical in the information majority of case that the RAN network of RAN is sliced.
In conjunction with the second aspect of the embodiment of the present application, the first implementation of second aspect, in the embodiment of the present application
In second of implementation of two aspects, first mapping ruler further includes the information of at least one RAN network slice
With the mapping relations of at least one RAN access category.In the embodiment of the present application, UE can be cut according at least one RAN network
The information of piece or at least one RAN access category carry out access control and check, improve the washability of technical scheme
And flexibility, because information of the information of RAN network slice generally with CN network slice is one-to-many relationship, second
The configuration content of mapping ruler is less than existing configuration content, and complexity is lower.Also achieve the control of RAN network slice granularity
System.The inconsistent situation of the information that the CN network of the information and CN distribution that also solve the CN network slice of UE request is sliced, because
It is in the information majority of case that the RAN network of RAN is sliced for the information MAP that the different CN networks of identical services type are sliced
It is identical.
In conjunction with the second aspect of the embodiment of the present application, the first implementation of second aspect, in the embodiment of the present application
In the third implementation of two aspects, first mapping ruler further includes the information of at least one RAN network slice
With the mapping relations of at least one CN access category.In the embodiment of the present application, UE can be sliced according at least one RAN network
Information or at least one CN access category carry out access control check, improve the washability and spirit of technical scheme
Activity, because information of the information of RAN network slice generally with CN network slice is one-to-many relationship, the second mapping
The configuration content of rule is less than existing configuration content, and complexity is lower.Also achieve the control of RAN network slice granularity.Also
The inconsistent situation of the information that the CN network of the information and CN distribution that solve the CN network slice of UE request is sliced, because identical
The information MAP of the different CN networks slice of type of service is identical in the information majority of case that the RAN network of RAN is sliced.
In conjunction with the second aspect of the embodiment of the present application, the first implementation of second aspect, in the embodiment of the present application
In 4th kind of implementation of two aspects, first mapping ruler further includes the information of at least one RAN network slice
With the mapping relations of the information of at least one CN network slice.In the embodiment of the present application, UE can be according at least one RAN net
The information of network slice or the information of at least one CN network slice carry out access control and check, improve technical scheme
Washability and flexibility because RAN network slice information generally with CN network slice information be one-to-many relationship, institute
With the configuration content of the second mapping ruler is less than existing configuration content, and complexity is lower.Also achieve RAN network slice grain
The control of degree.The inconsistent feelings of the information that the CN network of the information and CN distribution that also solve the CN network slice of UE request is sliced
Condition, because of the most of feelings of information that the information MAP that the different CN networks of identical services type are sliced is sliced in the RAN network of RAN
Condition is identical.
In conjunction with the second aspect of the embodiment of the present application, the first implementation of second aspect, in the embodiment of the present application
In 5th kind of implementation of two aspects, first mapping ruler further include at least one RAN network slice information,
The information of at least one CN network slice and the mapping relations of at least one RAN access category.In the embodiment of the present application,
In, at least one network CN slice information is that RAN can be according to CN Allowed NSSAI list or currently available CN net
Network slice determination.The information that UE can be sliced according at least one RAN network, alternatively, can be accessed according at least one RAN
The access that classification carries out RAN network slice, which controls, to be checked, alternatively, can carry out RAN network according at least one CN access category
The access of slice, which controls, to be checked.Because information of the information of RAN network slice generally with CN network slice is one-to-many relationship,
The control of RAN network slice granularity is also achieved, solves the information of the CN network slice of UE request and the CN network of CN distribution
The inconsistent situation of the information of slice, because the information MAP that is sliced of the different CN networks of identical services type is in the RAN net of RAN
The information majority of case of network slice is identical.
In conjunction with the second aspect of the embodiment of the present application, the first implementation of second aspect, in the embodiment of the present application
In 6th kind of implementation of two aspects, first mapping ruler further include at least one RAN network slice information,
The information of at least one CN network slice and the mapping relations of at least one CN access category.In the embodiment of the present application, UE can
It is checked with the access control that the information being sliced according at least one RAN network carries out RAN network slice, alternatively, can be according to extremely
The access that the information of few CN network slice carries out CN network slice, which controls, to be checked, the optional of technical scheme is improved
Property and flexibility.The control of RAN network slice granularity is also achieved, the information and CN for solving the CN network slice of UE request are divided
The inconsistent situation of the information for the CN network slice matched, because the information MAP that the different CN networks of identical services type are sliced exists
The information majority of case of the RAN network slice of RAN is identical.
The embodiment of the present application third aspect provides a kind of method of access control, may include: second network equipment to the
One network equipment sends second message, and the second message includes the second mapping ruler, and second mapping ruler includes at least
One CN access category.In the embodiment of the present application, include at least one CN access category in the second mapping ruler, can be used for
It is identified by RAN, according to the mapping relations of the information of preset RAN network slice and the information of CN network slice, determines at least
The information of one CN network slice, provides a kind of achievable mode.
In conjunction with the third aspect of the embodiment of the present application, in the first possible realization side of the embodiment of the present application third aspect
In formula, the second message includes the slice selection auxiliary information Allowed NSSAI list of CN network.In the embodiment of the present application
In, if second message includes the slice selection auxiliary information Allowed NSSAI list of CN network, then, RAN can direct basis
CN Allowed NSSAI list determines the information of at least one CN network slice, thus, it determines in the second mapping ruler extremely
The information of few RAN network slice, provides a kind of achievable mode.
In conjunction with the first possible implementation of the embodiment of the present application third aspect, in the embodiment of the present application third aspect
Second of possible implementation in, second mapping ruler includes at least one described CN access category and the CN
The mapping relations of Allowed NSSAI list.
The embodiment of the present application fourth aspect provides a kind of network equipment, has the complexity for reducing network slice access control
Function.The function can also execute corresponding software realization by hardware realization by hardware.The hardware or software package
Include one or more modules corresponding with above-mentioned function.
The 5th aspect of the embodiment of the present application provides a kind of terminal device, has the complexity for reducing network slice access control
Function.The function can also execute corresponding software realization by hardware realization by hardware.The hardware or software package
Include one or more modules corresponding with above-mentioned function.
The 6th aspect of the embodiment of the present application provides a kind of network equipment, has the complexity for reducing network slice access control
Function.The function can also execute corresponding software realization by hardware realization by hardware.The hardware or software package
Include one or more modules corresponding with above-mentioned function.
The 7th aspect of the embodiment of the present application provides a kind of network equipment, may include:
Memory, transceiver, the memory and the transceiver are connected by bus;
The memory, for storing operational order;
The transceiver, for sending first message to terminal device, described first disappears by calling the operational order
Breath includes the first mapping ruler, and first mapping ruler includes the information of at least one RAN network slice;It is set to the terminal
Preparation send access control information.
The embodiment of the present application eighth aspect provides a kind of wireless communication device, may include:
At least one processor, memory, transmission circuit and bus system, the processor, the memory, the receipts
Power Generation Road is coupled by the bus system, and the wireless communication device is communicated by the transmission circuit with terminal device,
The memory is for storing program instruction, at least one described processor is for executing the journey stored in the memory
Sequence instruction, so that the wireless communication device executes first described in the method as described in the embodiment of the present application first aspect is any
The part of network device operation.The wireless communication device is also possible to apply in network side equipment either the network equipment
The middle System on Chip/SoC for executing corresponding function.
The 9th aspect of the embodiment of the present application provides a kind of wireless communication device, may include:
At least one processor, memory, transmission circuit and bus system, the processor, the memory, the receipts
Power Generation Road is coupled by the bus system, and the wireless communication device is communicated by the transmission circuit with network side equipment
Letter, the memory is for storing program instruction, at least one described processor is for executing the institute stored in the memory
Program instruction is stated, so that the wireless communication device executes described in the method as described in the embodiment of the present application second aspect is any
The part of terminal device operation.The wireless communication device is also possible to apply in terminal device either terminal device
Execute the System on Chip/SoC of corresponding function.
The tenth aspect of the embodiment of the present application provides a kind of communication system, which includes first network equipment, terminal
Equipment and second network equipment, the first network equipment are to execute the application first aspect or any optional realization side of first aspect
The first network equipment being somebody's turn to do in formula;The terminal device is to execute the application second aspect or any optional implementation of second aspect
In the terminal device that is somebody's turn to do;Second network equipment is to execute in the application third aspect or any optional implementation of the third aspect
This second network equipment.
The tenth one side of the embodiment of the present application provides a kind of storage medium, it should be noted that the technical solution sheet of this hair
The all or part of the part that contributes to existing technology or the technical solution can produce mouth with software in other words in matter
Form embodies, which is stored in a storage medium, by being stored as based on used in above equipment
Calculation machine software instruction, it includes be first network equipment, terminal for executing above-mentioned first aspect, second aspect or the third aspect
Program designed by equipment or second network equipment.
The storage medium includes: USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), arbitrary access
The various media that can store program code such as memory (RAM, Random Access Memory), magnetic or disk.
The aspect of the embodiment of the present application the 12nd provides a kind of computer program product comprising instruction, when its on computers
When operation, so that computer executes the method as described in the application first aspect or first aspect any optional implementation.
The aspect of the embodiment of the present application the 13rd provides a kind of computer program product comprising instruction, when its on computers
When operation, so that computer executes the method as described in the application second aspect or second aspect any optional implementation.
The embodiment of the present application fourteenth aspect provides a kind of computer program product comprising instruction, when its on computers
When operation, so that computer executes the method as described in the application third aspect or the third aspect any optional implementation.
As can be seen from the above technical solutions, the embodiment of the present application has the advantage that
The embodiment of the present application sends first message to terminal device by first network equipment, and the first message includes the
One mapping ruler, first mapping ruler include the information of at least one RAN network slice;The first network equipment is to institute
It states terminal device and sends access control information.Because the information of RAN network slice and the information of CN network slice are usually a pair
More mapping relations, so, what RAN included into the first mapping ruler that UE is sent is the letter of at least one RAN network slice
Breath, in terms of existing technologies, the configuration content of the first mapping ruler is smaller in the embodiment of the present application, and complexity compares
It is low.
Detailed description of the invention
Technical solution in ord to more clearly illustrate embodiments of the present application, below will be to institute in embodiment and description of the prior art
Attached drawing to be used is needed to be briefly described, it should be apparent that, the accompanying drawings in the following description is only some implementations of the application
Example, can also be obtained according to these attached drawings other attached drawings.
Fig. 1 is the schematic diagram that 3GPP supports multiple network slices in the embodiment of the present application;
Fig. 2A is a schematic diagram of a scenario applied in the embodiment of the present application;
Fig. 2 B is a configuration diagram of wireless communication system applied in the embodiment of the present application;
Fig. 3 is one embodiment schematic diagram that the method for control is accessed in the embodiment of the present application;
Fig. 4 is another embodiment schematic diagram that the method for control is accessed in the embodiment of the present application;
Fig. 5 A is one embodiment schematic diagram of the network equipment in the embodiment of the present application;
Fig. 5 B is another embodiment schematic diagram of the network equipment in the embodiment of the present application;
Fig. 6 A is one embodiment schematic diagram of terminal device in the embodiment of the present application;
Fig. 6 B is another embodiment schematic diagram of terminal device in the embodiment of the present application;
Fig. 7 is another embodiment schematic diagram of the network equipment in the embodiment of the present application;
Fig. 8 is another embodiment schematic diagram of terminal device in the embodiment of the present application.
Specific embodiment
The embodiment of the present application provides method, the network equipment and the terminal device of a kind of access control, for reducing net
The complexity of network slice access control.
In order to make those skilled in the art more fully understand application scheme, below in conjunction in the embodiment of the present application
Attached drawing, technical solutions in the embodiments of the present application are described, it is clear that described embodiment is only the application a part
Embodiment, instead of all the embodiments.Based on the embodiment in the application, it shall fall within the protection scope of the present application.
The invention relates to wireless access network equipment, terminal device and equipment of the core network.
Wherein, access network equipment is also referred to as base station, is that one kind is deployed in wireless access network to mention for terminal device
For the device of wireless communication function, including but not limited to: various forms of macro base stations, micro-base station (also referred to as small station), relay station,
It transmits and receives point (Transmission Reception Point, TRP), evolved node B (evolved Node B, eNB),
Radio network controller (radio network controller, RNC), node B (Node B, NB), base station controller (Base
Station Controller, BSC), base transceiver station (Base Transceiver Station, BTS), Home eNodeB (example
Such as, Home evolved NodeB or Home Node B, HNB) and processing communication data Base Band Unit (BaseBand
Unit, BBU) etc..In the system using different wireless access technologys, has the wireless access of similar wireless communication function
The title of net equipment may be different.Only describe for convenience, it is above-mentioned to be provided for terminal device in all embodiments of the application
The device of wireless communication function is referred to as wireless access network equipment.
Wherein, terminal device is also referred to as user equipment (user equipment, UE) or is moved in wireless communication standard
Dynamic platform (mobile station, MS) etc., involved terminal device is a kind of with wireless receiving and dispatching in the embodiment of the present application
The equipment of function, can be deployed in land, including indoor or outdoors, hand-held or vehicle-mounted;It can also be deployed on the water surface (as taken turns
Ship etc.);It can also dispose in the sky (such as on aircraft, balloon and satellite etc.).The terminal device may include various types
Mobile phone (mobile phone), tablet computer (Pad), the computer with radio transmission-receiving function, wireless data card, virtual reality
(Virtual Reality, VR) terminal device, augmented reality (Augmented Reality, AR) terminal device, machine type
The terminal device for communicating (machine type communication, MTC), in Industry Control (industrial control)
Terminal device, the terminal device in unmanned (self driving), the end in tele-medicine (remote medical)
End equipment, the terminal device in smart grid (smart grid), the end in transportation safety (transportation safety)
End equipment, the terminal device in smart city (smart city), smart home (with wireless communication function home equipment,
Such as refrigerator, TV, washing machine or furniture) and wearable device (such as smartwatch, Intelligent bracelet, pedometer etc.) etc.
Deng.The so-called terminal device of the application is also configured to fixed position, has channel radio similar with aforementioned terminals equipment
The equipment of telecommunication function.In the system using different wireless access technologys, the terminal for having similar wireless communication function is set
Standby title may be different, only for convenience of description, in the embodiment of the present application, the above-mentioned device with wireless communication function
It is referred to as terminal device.
Wherein, equipment of the core network, can be has the function of access and mobility management network, session management network function
(Session Management NF, SMF), user's torus network function, the equipment of authentication management network function, AMF.
The term "and/or" occurred in the present patent application, only a kind of incidence relation for describing affiliated partner, indicates
There may be three kinds of relationships, for example, A and/or B, can indicate: individualism A, exist simultaneously A and B, individualism B these three
Situation.In addition, character "/" in the application, typicallys represent the relationship that forward-backward correlation object is a kind of "or".
Be likely to occur in the present patent application to various messages/information/equipment/network element/systems/devices/movement/behaviour
All kinds of objects such as work/process/concept have carried out tax name, but these specific titles do not constitute the restriction to related object, institute
Assign title can with scene, the factors such as context or use habit and change, the understanding to the art-recognized meanings of related object, should lead
Will from its embodied in the technical solution/function that executes and technical effect determine.
With continuing to bring out for diversified communication system traffic, demand of the different communication services to network performance is deposited
In significant difference, 5G introduces the concept of network slice, to cope with different communication business to the difference of network performance demand.
One complete network slice is sliced including but not limited to RAN network slice and CN network, and the common end that constructs is arrived
The network at end is sliced framework, and CN network slice passes through the NF of one group of customization, includes access and mobile management function to ps domain
(Access and Mobility Management Function, AMF), conversation management functional (Session Management
Function, SMF), user plane functions (User Plane Function, UPF) etc..RAN network slice passes through scheduling and one
The first different protocol layer 1 (such as physical layer) of group, second protocol layer 2 (such as media access control layer, wireless chain control layer, number
According to packet aggregation layer etc.) etc. configuration realize different RAN network slices.Here the reality of unlimited fixture body RAN network slice
Existing form, can also be realized by atomization, modularization by way of software implementation, instantiation etc..
In general, CN network slice is according to differences such as tenant and types of service, number is more, and RAN network is sliced
Since interface-free resources are limited etc., factors number is less, and CN network slice is the pass of many-one or multi-to-multi with RAN network slice
System, extreme case can achieve one-to-one ratio.
3GPP is concentrated mainly on network slice selection about the discussion of the network architecture at present, and the purpose that network is sliced selection is
Suitable network slice is selected for UE, and UE and specific network slice are associated, thus with network slice foundation pair
The connection of the control plane CP (control plane, CP) and/or user face UP (user plane, UP) that answer.
A brief description is done to the access control being sliced based on network below, as follows:
Network slice can regard logically independent virtual network as, and different network slices needs to guarantee the demand of isolation,
Therefore it when the overload of network slice, needs to avoid being sliced other networks and causes negative impact, therefore base
The isolation of network slice can be effectively ensured in the access control of network slice, to meet operator and network slice client's label
The demand of the business demand or service-level agreement (Service Level Agreement, SLA) of administration.
Access control specifically, can pass through the ratio of limitation UE access network, such as design access restriction parameter, packet
The factor containing access, access backoff time (back-off) etc., limit the network insertion of UE in proportion, to reach access control
Different access restriction parameters can also be arranged for different business in purpose, to realize the distinctive access control of business, also
It can be according to the access of different user access level restriction certain users.
LTE system supports the technology of a variety of access controls at present, it is known to following several implementations:
1) common access restriction inspection (Access Barring Check, ABC), according to signaling, urgency traffic, data
Etc. types carry out access control, can also be according to different public land mobile network (Public Land Mobile
Network, PLMN) carry out access control;
2) access restriction (Extended Access Barring, EAB) is extended, common ABC is extended, thus
Limit the access of the UE of low access priority;
3) it is used for the distinctive congestion control of business (the Application specific Congestion of data communication
Control for Data Communication, ACDC), it can will apply and classify, according to different classes of
(category) different access control parameters is set;
4) the distinctive access control (Service Specific Access Control, SSAC) of business, can be adapted for
Multimedia telephony services (Multi Media Telephony), it is shared comprising voice, video call, messaging service, video image
Deng.
In a kind of technology, the existing ABC scheme of LTE is sliced applied to network, i.e. RAN is by the CN network of network support
It is sliced the classification as individual ABC, the applicable access control information of each CN network slice is broadcasted, is based on CN net to realize
The access control of network slice;RAN broadcasts the applicable access of CN network slice and controls information, such as the access control of CN network slice 1
The access of information processed, CN network slice 2 controls information;The access of each CN network slice controls letter in UE read system message
Breath saves corresponding access and controls information in conjunction with the CN network to be initiated the connection slice;UE carries out access control again and checks, from
And it decides whether to initiate wireless heterogeneous networks (Radio Resource Control, RRC) connection request.
But above-mentioned technology only increases the classification of CN network slice on the basis of LTE is existing, since CN network is sliced
Number is excessive, causes the technology overhead big, backwards compatibility is poor.
It attempts to propose a kind of unified access control mechanism (unified access in 5G system standard formulation process
Barring), a common framework can be designed, to simplify the access control mechanism of 5G.
In the program, CN can configure the applicable access category of UE, this configuration includes a mapping ruler, such as comprising
The access grade of UE, the information of CN network slice, application, class of service etc. are mapped to a specific access category
(Access category), is properly termed as CN access category.Wherein, CN access category can be understood as searching in mapping ruler
At least one factor (such as access grade of UE, information, application, the class of service of at least one CN network slice etc.) for including
The index of corresponding access control information.Further, which can pass through Non-Access Stratum (non-access by CN
Stratum, NAS) message is sent to UE, it is transmitted during registration or registration area update.The mapping ruler can be with
The form of table is presented, as described in Table 1.
Table 1
UE can trigger network insertion, and further according to the configuration information of acquisition, which may include mapping ruler, certainly
It is fixed specifically to access corresponding CN access category.RAN indicates the corresponding CN access control information of CN access category by system message,
Access restriction ratio and limitation time or bit map can be used for example to indicate whether to need to limit UE access etc..
UE carries out access restriction inspection again, i.e., before initiation access attempts, UE uses determining CN access category first, judges whether energy
Initiate access;If UE determines that this time access is not limited, and initiates access attempts.
The program is uniformly controlled by CN, but CN network slice numbers are too big, it is ensured that different EAB/ACDC and CN nets
The various combination of network slice can be mapped to suitable access category, and it is excessive to will result in NAS grade configuration forms, answer
Miscellaneous degree is higher;And the CN network slice of UE request may be different from the CN network slice that network distributes.Such as certain of UE request
The CN network slice of one tenant is unavailable in current region, and CN distributes the identical CN net of another tenant that can be substituted
Network slice or the identical CN network slice of type of service.The granularity of RAN access control is sliced different from CN network, causes RAN
Access control flexibility based on network slice is poor.
It as shown in Figure 2 A, is a schematic diagram of a scenario applied by the embodiment of the present application.The embodiment of the present application is with LTE system
For, UE is located in the coverage area of one or more cells (carrier wave) of macro base station or the offer of small base station, for the small of UE service
Area can be one or more.When having multiple for the serving cell of UE, UE can polymerize (carrier according to carrier wave
Aggregation, CA) or dual link (Dual connectivity, DC) or cooperative multipoint transmission (CoMP, coordinated
Multiple point transmission) mode works, and wherein at least one cell provides more than one technology lattice of eating dishes without rice or wine
Formula, such as more than one Transmission Time Interval (transmission time interval, TTI), more than one son carry
Wave spacing width, the eat dishes without rice or wine format or transmission characteristic of more than one circulating prefix-length etc., while wireless money is provided for UE
Source.The application be also applied for Universal Mobile Communication System (Universal Mobile Telecommunications System,
UMTS) system, CDMA (Code Division Multiple Access, CDMA) system, WLAN
(wireless local area network, WLAN) or future 5G (the fifth generation) wireless communication system
Deng.
It as shown in Figure 2 B, is a configuration diagram of wireless communication system applied by the embodiment of the present application.It can wrap
First network equipment, terminal device and second network equipment are included, terminal device is with UE, first network equipment with RAN, the second network
Equipment is illustrated by taking CN as an example.I.e. the wireless communication system may include access net (Radio Access Network,
RAN) equipment 110, core net (Core Network, CN) equipment 120 and user equipment (User Equipment, UE) 130.This
Apply for that the communication system of embodiment supports network to be sliced framework, the core net network slice in the communication system can share core
Web network equipment and/or core net Internet resources can also monopolize core web network equipment and/or core net Internet resources.Such as
Shown in Fig. 2 B, in the wireless communication system, UE 130 by RAN equipment 110 access one or more RAN networks slice or
CN network slice.Specifically, the information that RAN equipment 110 is provided according to UE 130, and configuration or the access and mobility that obtain
Management function (Access and Mobility Management Function, AMF) information selects AMF for UE 130.
In the embodiment of the present application, first network equipment sends first message to terminal device, and the first message includes the
One mapping ruler, first mapping ruler include the information of at least one RAN network slice;The first network equipment is to institute
It states terminal device and sends access control information.Terminal device can with the first mapping ruler based on the received and access control information into
Row access control checks.Because the information of RAN network slice and the information of CN network slice are usually one-to-many mapping relations,
So RAN include into the first mapping ruler that UE is sent be at least one RAN network slice information, relative to existing
For technology, the configuration content of the first mapping ruler is smaller in the embodiment of the present application, and complexity is relatively low.Solves CN net
Network slice is more, and NAS level form is caused to configure excessive, the excessively high problem of complexity.Further, the first mapping ruler may be used also
To include the information of at least one RAN network slice and the mapping relations of at least one RAN access category, alternatively, described
First mapping ruler further includes the information of at least one RAN network slice and the mapping of at least one CN access category
Relationship, alternatively, first mapping ruler can also include the information of at least one RAN network slice, at least one RAN
The mapping relations of access category and at least one CN access category.The information and CN for solving the CN network slice of UE request are distributed
CN network slice the inconsistent situation of information because the information or type of service of identical CN network slice are mapped in
The information majority of case of the RAN network slice of RAN is identical.Also achieve access of the RAN based on RAN network slice granularity
Control.
In following embodiments, terminal device by UE, first network equipment by RAN, second network equipment by taking CN as an example
To be illustrated.
Technical scheme is described further by way of examples below, as shown in figure 3, real for the application
Apply one embodiment schematic diagram for the method that control is accessed in example, comprising:
301, upstream message is sent to CN by UE.
In the embodiment of the present application, UE sends upstream message to CN by RAN.The upstream message can be registration request or
Person's registration area updates Non-Access Stratums (Non-access stratum, the NAS) message such as request.That is UE by RAN to CN (such as
CN can be access management function, access and mobile management function to ps domain etc.) registration management request is initiated, request UE and CN are infused
Volume completes the functions such as identification, authentication or registration area update.
It should be understood that the NAS message can be the relevant any upstream message of registration management, it is not limited to above-mentioned registration and asks
It asks or registration area updates the NAS messages such as request.In one possible implementation, which can carry at least
The slice that one CN network allows selects auxiliary information (network slice selection assistance
Information, NSSAI), it is the information for the CN network slice that UE selection is suitble to access for assisting CN.
302, CN obtains the first mapping ruler, and the first mapping ruler includes at least one CN access category.
In the embodiment of the present application, after CN receives upstream message, CN configures the applicable CN access category of UE, available
First mapping ruler, the first mapping ruler include at least one CN access category.For example, the first mapping ruler may include UE's
The factors such as information, application, the class of service of access grade, at least one CN network slice are mapped to a specific access category
(Access category), is properly termed as CN access category here, and CN access category can be understood as searching the first mapping ruler
In include at least one factor (such as the access grade of UE, the information of at least one CN network slice, application, class of service
Deng) it is corresponding access control information index.Further, CN access category can be indicated with number, letter, byte etc.,
It is not specifically limited in the embodiment of the present application.
Optionally, the first mapping ruler can be presented in table form, and the first mapping ruler does not include at least one
The information of CN network slice, as shown in table 2 below:
Table 2
It optionally, may include the information of at least one CN network slice in the first mapping ruler, as shown in table 3 below:
Table 3
It should be noted that table 2 and table 3 are an example of the first mapping ruler, the first mapping ruler includes at least
One CN access category, other factors for including can be more than or less than shown in above-mentioned table 2 and table 3.
Optionally, if the first mapping ruler includes the information of at least one CN network slice, which is cut
The network that the information of piece can be allowed by least one CN network is sliced selection auxiliary information (network slice
Selection assistance information, NSSAI) it indicates, specifically, the network that the CN network allows is sliced
Select auxiliary information including but not limited to following relevant information:
Network slice type: the mobile broadband service (enhanced Mobile Broadband, eMBB) of such as enhancing,
Super reliable low time delay communicates (Ultra-Reliable Low lactecncy Communications, URLLC), magnanimity machine
Class communicates the information of the instruction such as (Massive Machine Type Communication, mMTC) network slice type.Into one
Step ground, the network slice type can refer to end to end network slice type, be sliced comprising RAN network slice type and CN network
Type can also refer to RAN network slice type or CN network slice type.
Type of service: it is related to specific business, such as the instruction business such as video traffic, car networking business, voice service
The information of feature or specific business.
Network slice distinguishes (differentiator): auxiliary network slice type, type of service, for further discriminating between
The information of network slice can be used for distinguishing the network slice under the same network slice type or type of service.
Tenant (Tenant) information: being used to indicate creation or rents the customer information of network slice, such as Tencent, country
Power grid etc..
Subscriber group information: being used to indicate according to certain feature, such as the rank grouping that is grouped user of user is believed
Breath.
Network is sliced example information: being used to indicate the instance identification and characteristic information for network slice creation.For example,
It is sliced example allocation one mark for network, is used to indicate network slice example, instance identification can also be sliced in network
On the basis of map a new mark, be associated with network slice example, recipient can identify the tool of representative according to the mark
Volume grid is sliced example.
Proprietary core net (Dedicated Core Network, DCN) mark: the mark is for uniquely indicating proprietary core
Net, such as the core net that Internet of Things is proprietary.Optionally, DCN mark can be sliced mark and do and map with network, be identified by DCN
Network slice mark can be mapped out, DCN mark can also be mapped out by network slice mark.
It should be noted that the method for determination of CN Allowed NSSAI list are as follows: CN can permit according to the CN that UE is reported
Perhaps network slice selection auxiliary information (CN NSSAI), the signing information of UE, local policy, network slice availability etc. because
The information at least one CN network slice that UE allows to access in current Acceditation Area, at least one CN network are agreed in element selection
The information of slice can be presented in the form of a list, can be described as NSSAI (CN Allowed NSSAI) list of CN permission, can also
To indicate in other manners, specifically without limitation.
303, the first downstream message is sent to RAN by CN.
In the embodiment of the present application, CN sends the first downstream message to RAN, and RAN reception disappears from the first downlink of CN
Breath.First downstream message may include the first mapping ruler and CN Allowed NSSAI list, and the first mapping ruler includes extremely
A few CN access category;Alternatively, the first downstream message may include the first mapping ruler, the first mapping ruler includes at least one
A CN access category;Alternatively, the first downstream message may include CN Allowed NSSAI list.
Optionally, when the first mapping ruler and CN Allowed NSSAI list require to issue RAN, under first
Row message may include the first mapping ruler, and CN Allowed NSSAI list can also be sent to by another downstream message
RAN.First mapping ruler can be with reference to shown in above-mentioned table 2 and table 3, and details are not described herein again.Wherein, the first downstream message can be
NAS message is sent by CN and RAN interface to RAN, such as: CN sends the first downstream message to RAN by N2 interface.
304, RAN obtains the second mapping ruler, and second mapping ruler includes the letter of at least one RAN network slice
Breath.
In the embodiment of the present application, RAN receives the first downstream message that CN is sent.First downstream message may include first
Mapping ruler and CN Allowed NSSAI list, the first mapping ruler include at least one CN access category;Alternatively, under first
Row message may include the first mapping ruler, and the first mapping ruler includes at least one CN access category;Alternatively, the first downlink disappears
Breath may include CN Allowed NSSAI list.Further, RAN obtains the second mapping ruler, second mapping ruler
Information including at least one RAN network slice.It optionally, may include the first mapping in received first downstream message of RAN
Rule may include CN Allowed NSSAI list in another received downstream message.
If should be understood that includes CN Allowed NSSAI list in the received downstream message of RAN, it is described at least one
There are mapping relations, the second mapping ruler may include for the information of RAN network slice and the CN Allowed NSSAI list
The information and the CN Allowed NSSAI list of at least one RAN network slice;If in the received downstream message of RAN
It does not include CN Allowed NSSAI list, then the information and currently available CN network that at least one described RAN network is sliced
The information of slice there are mapping relations, the second mapping ruler may include described at least one RAN network slice information with work as
The information of preceding available CN network slice.
Illustratively, RAN preserves the information of preset RAN network slice and the mapping of the information of CN network slice is closed
System for example, the mapping relations can be pre-configured with by network management, or is believed by CN equipment by the interface between CN and RAN
Breath is pre-configured with.The information of one or more CN network slices can correspond to the information of RAN network slice, such as the following table 4 institute
Show:
RAN Network slice, the information of access net network slice | CN Network slice, the information of core net network slice |
1 | 1,2 |
2 | 3,4 |
3 | 5,6,7,8 |
4 | 9,10,11,12 |
5 | 13,14 |
6 | 15,16 |
7 | 17,18,19 |
8 | 20,21,22 |
9 | 23,24 |
10 | 25,26 |
Table 4
(1) if including CN Allowed NSSAI list in the received downstream message of RAN, the second mapping ruler can root
It is found out as shown in Table 4 above according to the mapping relations of the information of the information and CN network slice of preset RAN network slice
The information of corresponding at least one the RAN network slice of CN Allowed NSSAI list is as the second mapping ruler.Further,
By the information MAP of at least one RAN network slice to a specific access category (Access category), this access
Classification is properly termed as RAN access category.For example, the access category can use RAN network slice mark (RAN network
Slice ID), a new access category also can be used, determine the second mapping ruler.Wherein, RAN access category can be managed
Solution is corresponding to search at least one factor (information etc. of for example, at least RAN network slice) for including in the second mapping ruler
Access control information index.
It should be understood that according to the explanation in step 302 it is found that CN Allowed NSSAI list is the Acceditation Area current in UE
A kind of form of expression of information at least one the CN network slice for allowing to access, so, CN Allowed NSSAI list is also
It is the information of at least one CN network slice, such as: CN Allowed NSSAI list is as shown in table 5:
CN Allowed NSSAI list |
3 |
9 |
17 |
20 |
Table 5
In table 5, it 3,9,17 and 20 can be the mark that CN network is sliced, be also possible to network slice type, service class
The instructions such as type, the differentiation of network slice, tenant's information, subscriber group information, network slice example information, proprietary core network identifier, are used
It is sliced to distinguish different CN networks, specifically without limitation.
Such as: as shown in table 6, the second mapping ruler may include the information of at least one RAN network slice, this at least one
The information of a RAN network slice is found out in above-mentioned table 4 by list shown in table 5, because of CN Allowed
NSSAI list is the information of at least one CN network slice, it is possible to the information and CN net being sliced by preset RAN network
The mapping relationship searching of the information of network slice.Wherein, the information of RAN network slice can be sliced with RAN network identifies to indicate,
It is as follows:
The information of at least one RAN network slice corresponding with CN Allowed NSSAI list |
2 |
4 |
7 |
8 |
Table 6
In the scheme shown in table 6, UE can carry out access control inspection according to the information that at least one RAN network is sliced
It looks into, because information of the information of RAN network slice generally with CN network slice is one-to-many relationship, the second mapping rule
Configuration content then is less than existing configuration content, and complexity is lower.Also achieve the control of RAN network slice granularity.Also solve
The inconsistent situation of the information of the CN network slice of the information and CN distribution of the CN network slice of the UE that determined request, because of the mutually same trade
The information MAP of the different CN networks slice of service type is identical in the information majority of case that the RAN network of RAN is sliced.
Such as: as shown in table 7, the second mapping ruler may include the information and at least one of at least one RAN network slice
The mapping relations of a RAN access category, as follows:
Table 7
In the scheme shown in table 7, UE can be according to the information or at least one RAN that at least one RAN network is sliced
Access category carries out access control and checks, improves the washability and flexibility of technical scheme.Because RAN network is sliced
Information of the information generally with CN network slice be one-to-many relationship, so, the configuration content of the second mapping ruler is less than existing
Some configuration contents, complexity are lower.Realize the control of RAN network slice granularity.The CN network for also solving UE request is cut
The inconsistent situation of the information of the CN network slice of information and the CN distribution of piece, because the different CN networks of identical services type are cut
The information MAP of piece is identical in the information majority of case that the RAN network of RAN is sliced.
Such as: as shown in table 8, the second mapping ruler may include the information and at least one of at least one RAN network slice
The mapping relations of the information of a CN network slice, as follows:
Table 8
In the scheme shown in table 8, the information that UE can be sliced according at least one RAN network carries out RAN network slice
Access control check, alternatively, can according at least one CN network be sliced information carry out CN network slice access control
It checks, improves the washability and flexibility of technical scheme.Because the information of RAN network slice is generally cut with CN network
The information of piece is one-to-many relationship, so, the configuration content of the second mapping ruler is less than existing configuration content, complexity compared with
It is low.Realize the control of RAN network slice granularity.Also solve the information of the CN network slice of UE request and the CN net of CN distribution
The inconsistent situation of information of network slice, because the information MAP that is sliced of the different CN networks of identical services type is in the RAN of RAN
The information majority of case of network slice is identical.
Such as: as shown in table 9, the second mapping ruler may include at least one RAN network slice information, at least one
The information of CN network slice and the mapping relations of at least one RAN access category, as follows:
Table 9
In the scheme shown in table 9, the information that UE can be sliced according at least one RAN network carries out RAN network slice
Access control check, alternatively, can according at least one CN network be sliced information carry out CN network slice access control
It checks, alternatively, the access that can also carry out RAN network slice according at least one RAN access category is controlled and checked, improves this
Apply for the washability and flexibility of technical solution.Because information of the information of RAN network slice generally with CN network slice is one
To more relationships, so, the configuration content of the second mapping ruler is less than existing configuration content, and complexity is lower.Realize RAN
The control of network slice granularity.Also solve the information of the information of the CN network slice of UE request and the CN network slice of CN distribution
Inconsistent situation, because of the letter that the information MAP that the different CN networks of identical services type are sliced is sliced in the RAN network of RAN
It is identical for ceasing majority of case.
It should be noted that in the second mapping ruler described in above-mentioned table 7-9, the letter of at least one RAN network slice
Breath can be at least one RAN access category, alternatively, CN Allowed NSSAI list, alternatively, CN Allowed NSSAI is arranged
There are mapping relations at least one RAN access category for table, still, can also not include at least one in the second mapping ruler
RAN access category, alternatively, CN Allowed NSSAI list, alternatively, CN Allowed NSSAI list and at least one RAN
Access category, RAN know their mapping relations just, specifically without limitation.
(2) if not comprising CN Allowed NSSAI list in the received downstream message of RAN, the second mapping ruler can be with
It is searched as shown in Table 4 above according to the information of preset RAN network slice and the mapping relations of the information of CN network slice
Currently available CN network, i.e., be sliced by the information that at least one CN network that current RAN or whole network allow out is sliced
Information corresponding at least one RAN network slice information as the second mapping ruler.Further, by least one RAN
To a specific access category (Access category), this access category is properly termed as the information MAP of network slice
RAN access category.For example, the access category can use RAN network slice mark (Network RAN part ID, NSRPI),
Also a new access category can be used, determine the second mapping ruler.RAN access category can be understood as searching the second mapping
At least one the corresponding access control information of factor (information etc. of for example, at least RAN network slice) for including in rule
Index.
Such as: can be any shown with reference to above-mentioned table 6, table 7, table 8 and table 9, the second mapping ruler may include at least one
The information of a RAN network slice, alternatively, may include that the information of at least one RAN network slice and at least one RAN access class
Other mapping relations, alternatively, may include the information of at least one RAN network slice and the information of at least one CN network slice
Mapping relations, alternatively, may include at least one RAN network slice information, at least one CN network slice information and
The mapping relations of at least one RAN access category.It should be understood that in the implementation of (2), at least one identified CN network
The information of slice is that RAN is determined according to the information that currently available CN network is sliced, at least one identified CN network
The quantity of the information of slice is likely larger than the number of the information of the slice of at least one CN network determined by the mode equal to above-mentioned (1)
Amount.
It should be noted that without CN Allowed NSSAI list, RAN is according to current in the implementation of (2)
The information at least one CN network slice that the information of available CN network slice determines.So with reference to described in above-mentioned table 7-9
The second mapping ruler in, at least one RAN network slice information can at least one RAN access category, alternatively, currently
The information of available CN network slice, alternatively, information and at least one RAN access category that currently available CN network is sliced are deposited
In mapping relations, still, at least one RAN access category, currently available CN can also not be included in the second mapping ruler
The information of network slice, alternatively, information that currently available CN network is sliced and at least one RAN access category, do not do specifically
It limits.
It optionally, can also include except above-mentioned at least one mentioned RAN network is sliced in the second mapping ruler
It can also include other factors, specifically except information, the information of at least one CN network slice, at least one CN access category
Without limitation.
It should be noted that in the embodiment of the present application, the information of at least one RAN network slice can use self-defining
With at least one CN network slice there is the mark of mapping relations to indicate, RAN network slice mark, RAN net can also be used
Network slice type information, RAN type of service, the differentiation of RAN network slice, RAN tenant's information, RAN network slice example information etc.
It indicates, for distinguishing different RAN network slices, specifically without limitation.
Further, in the embodiment of the present application, if in the first downstream message including the first mapping ruler, RAN
Only play the role of forwarding, i.e., the first mapping ruler is transmitted to UE.It should be understood that RAN access category can use number, word
Mother, byte etc. indicate, are not specifically limited in the embodiment of the present application.
305, the second downstream message is sent to UE by RAN, and the second downstream message includes the second mapping ruler.
In the embodiment of the present application, after RAN obtains the second mapping ruler, the second downlink information, institute can be sent to UE
Stating the second downlink information includes the second mapping ruler, and second mapping ruler includes the information of at least one RAN network slice;
UE receives the second downstream message from RAN.Wherein, second downstream message can be wireless heterogeneous networks (Radio
Resource Control, RRC) etc. AS message.Second mapping ruler can refer to above-mentioned table 6, table 7, table 8 and any institute of table 9
Show, details are not described herein again.
Optionally, the second downstream message can also include the first mapping ruler, and the first mapping ruler includes at least one CN
Access category, alternatively, the first mapping ruler is sent to UE by another downstream message by RAN, the first mapping ruler can join
It is admitted to and states shown in table 2 and table 3, details are not described herein again.
306, UE determines the information of at least one RAN network slice according to the second mapping ruler.
In the embodiment of the present application, UE receives the second downstream message that RAN is sent, and reflects in the second downstream message including second
Rule is penetrated, second mapping ruler includes the information of at least one RAN network slice.Second mapping ruler can refer to above-mentioned
Table 6, table 7, table 8 and table 9 are any shown, and details are not described herein again.
It optionally, include the first mapping ruler in second mapping ruler, alternatively, UE receives another downstream message,
It include the first mapping ruler in another downstream message, the first mapping ruler includes at least one CN access category.
307, access control information is sent to UE by RAN.
In the embodiment of the present application, RAN sends RAN access control information to UE, and UE is received to be accessed from the RAN of RAN
Control information.It should be understood that RAN access control information can be the access control information of the information of all RAN network slices, it can also
Access to be the information that at least one above-mentioned RAN network is sliced controls information.
Optionally, RAN sends CN access control information to UE, and UE receives the CN access control information from RAN.Ying Li
Solution, CN access control information can be the access control information of the information of all CN network slices, is also possible to above-mentioned at least one
The access of the information of a CN network slice controls information.
308, UE carries out access control according to the second mapping ruler and access control information.
In the embodiment of the present application, UE can carry out access restriction according to the second mapping ruler and RAN access control information
It checks.Before initiating access attempts, UE can be accessed according to the information or at least one RAN that at least one network RAN is sliced
The corresponding access control information of classification executes ABC, to judge whether that access or service request can be initiated.
A kind of possible mode are as follows: corresponding access control information has access restriction timer.If RAN network slice is set
The access restriction timer set is currently running, then terminal device determines that the secondary network insertion request or service request cannot be sent out
It rises.Otherwise, terminal device selects an equally distributed random number between 0 and 1 using random number algorithm;If should be with
Machine number is less than the corresponding access restriction factor in access control information, then terminal device determines that RAN network slice can access;
If the random number is greater than or equal to the corresponding access restriction factor, terminal device determines that RAN network slice cannot connect
Enter, and terminal device starts the RAN network and is sliced corresponding access restriction timer, illustratively, access restriction timing
The timed length of device can be (0.7+0.6* random number) * access restriction time.
Alternatively possible mode are as follows: RAN access control information include a bit map, the bit map not on year-on-year basis
Special position corresponds to the information or different RAN access categories that different RAN networks is sliced.Such as corresponding bit numerical value is
" 0 " indicates that this network slice access request or service request can be initiated, otherwise cannot initiate.Specific ABC mechanism can also
With any ABC applicable with reference to LTE system or 5G system, here without limitation.If do not limited, UE is to first
RAN network slice initiates access attempts or service request.
Optionally, UE can carry out access restriction inspection according to the first mapping ruler and CN access control information.Initiation connects
Before entering trial, UE can according to the information that at least one network RAN is sliced or at least one RAN access category is corresponding connects
Enter to control information and execute ABC, to judge whether that access or service request can be initiated.Specific ABC mechanism can refer to LTE system
Any ABC that system or 5G system are applicable in, here without limitation.If do not limited, UE can be cut to the first CN network
Piece initiates access attempts or service request.
It should be noted that RAN according to the second mapping ruler and access control information carry out access control check include but
Above-mentioned two kinds of mentioned possible implementations are not limited to, other are connect according to the second mapping ruler and access control information
Enter mode that control checks also within the scope of protection of this application.
In the embodiment of the present application, RAN sends the second downstream message to UE, and second downstream message includes the second mapping rule
Then, second mapping ruler includes the information of at least one RAN network slice;The RAN sends RAN access control to the UE
Information processed.It should be noted that the second mapping ruler that RAN is determined, receives the first mapping ruler that CN is sent with RAN and does not close
System.The first RAN network that UE can be accessed in the information that control information is sliced at least one described RAN network according to RAN is cut
The information of piece initiates access request.Because the information of RAN network slice and the information that CN network is sliced are usually one-to-many reflect
Relationship is penetrated, so, what RAN included into the second mapping ruler that UE is sent is the information of at least one RAN network slice, relatively
For the prior art, the configuration of the second mapping ruler is smaller in the embodiment of the present application, and complexity is relatively low.Solves CN
The information of network slice is more, and NAS level form is caused to configure excessive, the excessively high problem of complexity.Further, UE is solved
The inconsistent situation of the information of the CN network slice of the information and CN distribution of the CN network slice of request, because of identical services type
Different CN networks slice information MAP RAN RAN network be sliced information majority of case be identical.It also achieves
Access control of the RAN based on RAN network slice granularity.
As shown in figure 4, for another embodiment schematic diagram of connection control method in the embodiment of the present application, comprising:
401, upstream message is sent to CN by UE.
402, CN obtains the first mapping ruler.
In the embodiment of the present application, step 401 and 402 similar with above-mentioned step 301 shown in Fig. 3 and 302, herein no longer
It repeats.
403, the first downstream message is sent to RAN by CN, and the first downstream message includes the first mapping ruler.
In the embodiment of the present application, CN sends the first downstream message to RAN, and RAN reception disappears from the first downlink of CN
Breath.It include the first mapping ruler in first downstream message, the first mapping ruler includes at least one CN access category, can be referred to
Shown in above-mentioned table 2 and table 3, details are not described herein again.
It optionally, can also include CN Allowed NSSAI list in the first downstream message, alternatively, CN passes through another
CN Allowed NSSAI list is sent to RAN by downstream message.It should be understood that the first downstream message can be NAS message, pass through
CN and RAN interface is sent to RAN, such as: CN sends the first downstream message to RAN by N2 interface.
It should be noted that the method for determination of CN Allowed NSSAI list are as follows: CN can permit according to the CN that UE is reported
Perhaps network slice selection auxiliary information (CN NSSAI), the signing information of UE, local policy, network slice availability etc. because
The information at least one CN network slice that UE allows to access in current Acceditation Area, at least one CN network are agreed in element selection
The information of slice can be presented in the form of a list, can be described as NSSAI (CN Allowed NSSAI) list of CN permission, can also
To indicate in other manners, specifically without limitation.
404, RAN obtains the second mapping ruler, and second mapping ruler includes the letter of at least one RAN network slice
Breath.
In the embodiment of the present application, RAN receives the first downstream message that CN is sent.First downstream message includes the first mapping
Rule, the first mapping ruler include at least one CN access category.Optionally, the first downstream message can also include CN
Allowed NSSAI list, alternatively, it includes CN Allowed NSSAI list in another downstream message that RAN, which is received,.Further
, RAN obtains the second mapping ruler, and second mapping ruler includes the information of at least one RAN network slice.
If should be understood that includes CN Allowed NSSAI list in the received downstream message of RAN, it is described at least one
There are mapping relations, the second mapping ruler may include for the information of RAN network slice and the CN Allowed NSSAI list
The information and the CN Allowed NSSAI list of at least one RAN network slice;If in the received downstream message of RAN
It does not include CN Allowed NSSAI list, then the information and currently available CN network that at least one described RAN network is sliced
The information of slice there are mapping relations, the second mapping ruler may include described at least one RAN network slice information with work as
The information of preceding available CN network slice.
It should be noted that the second mapping ruler can add at least one RAN network slice on the first mapping ruler
Information generate, determined alternatively, the second mapping ruler is RAN according to the first mapping ruler and CN Allowed NSSAI list
, alternatively, the second mapping ruler is that RAN is determined according to the information of the first mapping ruler and currently available CN network slice.
Illustratively, RAN preserves the information of preset RAN network slice and the mapping of the information of CN network slice is closed
System for example, the mapping relations can be pre-configured with by network management, or is believed by CN equipment by the interface between CN and RAN
Breath is pre-configured with.The information of one or more CN network slices can correspond to the information of RAN network slice, such as the following table 10 institute
Show:
RAN Network slice, the information of access net network slice | CN Network slice, the information of core net network slice |
1 | 1,2 |
2 | 3,4 |
3 | 5,6,7,8 |
4 | 9,10,11,12 |
5 | 13,14 |
6 | 15,16 |
7 | 17,18,19 |
8 | 20,21,22 |
9 | 23,24 |
10 | 25,26 |
Table 10
It should be understood that according to the explanation in above-mentioned steps it is found that CN Allowed NSSAI list is the registration current in UE
A kind of form of expression of the information at least one CN network slice that area allows to access, so, CN Allowed NSSAI list
The namely information of at least one CN network slice, such as: CN Allowed NSSAI list is as shown in table 11:
CN Allowed NSSAI list |
3 |
9 |
17 |
20 |
Table 11
In table 11,3,9,17 and 20 can be the mark of CN network slice, be also possible to network slice type, service class
The instructions such as type, the differentiation of network slice, tenant's information, subscriber group information, network slice example information, proprietary core network identifier, are used
It is sliced to distinguish different CN networks, specifically without limitation.
(1) if, include the first mapping ruler and CN Allowed NSSAI list, RAN in the received downstream message of RAN
The letter of corresponding at least one RAN network slice can be found in above-mentioned table 10 according to CN Allowed NSSAI list
Breath, the information that the second mapping ruler adds at least one RAN network slice on above-mentioned first mapping ruler generate.It is exemplary
, the second mapping ruler can include but is not limited to following several forms, as follows:
If 1) the first mapping ruler is above-mentioned table 2, the second mapping ruler is added on the basis of the first mapping ruler
The information of few RAN network slice generates, then the second mapping ruler can be as shown in table 12 below:
Table 12
In the scheme shown in table 12, the information that UE can be sliced according at least one RAN network, alternatively, at least one
CN access category carries out access control and checks, because the information of RAN network slice is generally a pair of with the information of CN network slice
More relationships also achieves the control of RAN network slice granularity, and the information and CN for solving the CN network slice of UE request are distributed
CN network slice the inconsistent situation of information because the information MAP that the different CN networks of identical services type are sliced exists
The information majority of case of the RAN network slice of RAN is identical.
If 2) the first mapping ruler is above-mentioned table 2, the second mapping ruler is added on the basis of the first mapping ruler
The information of few RAN network slice and at least one RAN access category generate.Wherein, RAN access category can be understood as looking into
Look at least one the corresponding access of factor (information etc. of for example, at least RAN network slice) for including in the second mapping ruler
Control the index of information.To a specific access category, this connects the information MAP that at least one RAN network can be sliced
Enter classification and is properly termed as RAN access category.So the second mapping ruler can be as shown in table 13 below:
Table 13
In the scheme shown in table 13, the information that UE can be sliced according at least one RAN network, alternatively, can basis
The access that at least one RAN access category carries out RAN network slice, which controls, to be checked, alternatively, can be accessed according at least one CN
The access that classification carries out RAN network slice, which controls, to be checked.Because of information of the information of RAN network slice generally with CN network slice
One-to-many relationship, also achieve RAN network slice granularity control, solve UE request CN network slice information with
The inconsistent situation of the information of the CN network slice of CN distribution, because the information that the different CN networks of identical services type are sliced is reflected
Penetrate RAN RAN network slice information majority of case be identical.
If 3) the first mapping ruler is above-mentioned table 2, the second mapping ruler is added on the basis of the first mapping ruler
The information of few RAN network slice and corresponding at least one the CN network slice of CN NSSAI list generate.So second reflects
Penetrating rule can be as shown in table 14 below:
Table 14
In the scheme shown in table 14, the information that UE can be sliced according at least one RAN network carries out RAN network slice
Access control check, alternatively, can according at least one CN network be sliced information carry out CN network slice access control
It checks, improves the washability and flexibility of technical scheme.The control of RAN network slice granularity is also achieved, is solved
The inconsistent situation of the information of the CN network slice of the information and CN distribution of the CN network slice of UE request, because of identical services
The information MAP of the different CN networks slice of type is identical in the information majority of case that the RAN network of RAN is sliced.
If 4) the first mapping ruler is above-mentioned table 2, the second mapping ruler is added on the basis of the first mapping ruler
Information, at least one RAN access category and at least one corresponding CN network of CN NSSAI list of few RAN network slice
The information of slice generates.Wherein, RAN access category can be understood as searching at least one factor for including in the second mapping ruler
The index of (information etc. of for example, at least RAN network slice) corresponding access control information.It can be by least one RAN net
For the information MAP of network slice to a specific access category, this access category is properly termed as RAN access category.So second
Mapping ruler can be as shown in table 15 below:
Table 15
In the scheme shown in table 15, the information that UE can be sliced according at least one RAN network carries out RAN network slice
Access control check, alternatively, can according at least one CN network be sliced information carry out CN network slice access control
It checks, alternatively, the access that RAN network slice can also be carried out according at least one RAN access category is controlled and is checked, alternatively, can
It is controlled with to carry out the access of CN network slice according at least one CN access category and is checked, improve technical scheme can
The property selected and flexibility.The control of RAN network slice granularity is also achieved, solves the information and CN of the CN network slice of UE request
The inconsistent situation of the information of the CN network slice of distribution, because of the information MAP that the different CN networks of identical services type are sliced
It is identical in the information majority of case that the RAN network of RAN is sliced.
If 5) the first mapping ruler is above-mentioned table 3, the second mapping ruler is added on the basis of the first mapping ruler
The information of few RAN network slice generates, then the second mapping ruler can be as shown in table 16 below:
Table 16
In the scheme shown in table 16, the information that UE can be sliced according at least one RAN network carries out RAN network slice
Access control check, alternatively, can according at least one CN network be sliced information or at least one CN network slice information
The access for carrying out CN network slice, which controls, to be checked, the washability and flexibility of technical scheme are improved.Also achieve RAN
Network is sliced the control of granularity, and the information for the CN network slice that the information and CN for solving the CN network slice of UE request are distributed is not
Unanimous circumstances, because of the information that the information MAP that the different CN networks of identical services type are sliced is sliced in the RAN network of RAN
Majority of case is identical.
If 6) the first mapping ruler is above-mentioned table 3, the second mapping ruler is added on the basis of the first mapping ruler
The information of few RAN network slice and at least one RAN access category generate.Wherein, RAN access category can be understood as looking into
Look at least one the corresponding access of factor (information etc. of for example, at least RAN network slice) for including in the second mapping ruler
Control the index of information.To a specific access category, this connects the information MAP that at least one RAN network can be sliced
Enter classification and is properly termed as RAN access category.So the second mapping ruler can be as shown in table 17 below:
Table 17
In the scheme shown in table 17, the information that UE can be sliced according at least one RAN network carries out RAN network slice
Access control check, alternatively, can according at least one CN network be sliced information carry out CN network slice access control
It checks, alternatively, the access that can also carry out RAN network slice according at least one RAN access category is controlled and checked, alternatively, also
The access that CN network slice can be carried out according at least one CN access category, which controls, to be checked, technical scheme is improved
Washability and flexibility.Also achieve RAN network slice granularity control, solve UE request CN network slice information with
The inconsistent situation of the information of the CN network slice of CN distribution, because the information that the different CN networks of identical services type are sliced is reflected
Penetrate RAN RAN network slice information majority of case be identical.
(2) if, include the first mapping ruler in the received downstream message of RNA, do not include CN NSSAI list, then RAN can
To find corresponding at least one RAN network slice in above-mentioned table 10 according to the information of currently available CN network slice
Information, the information that the second mapping ruler adds at least one RAN network slice on above-mentioned first mapping ruler generate.So,
The second obtained mapping ruler can be with reference to shown in any implementation of above-mentioned table 12-17, and details are not described herein again.
(3) if, include the first mapping ruler and CN Allowed NSSAI list in the received downstream message of RAN, the
Two mapping rulers are that RAN is determined according to the first mapping ruler and CN Allowed NSSAI list.Illustratively, the second mapping
Rule may include any implementation of above-mentioned 12-17, but be not limited to above-mentioned several implementations, can also include others
Implementation, as follows:
1) as shown in table 18 below, the second mapping ruler may include the information of at least one RAN network slice.
The information of at least one RAN network slice corresponding with CN Allowed NSSAI list |
2 |
4 |
7 |
8 |
Table 18
In the scheme shown in table 18, UE can carry out access control inspection according to the information that at least one RAN network is sliced
It looks into, because information of the information of RAN network slice generally with CN network slice is one-to-many relationship, the second mapping rule
Configuration content then is less than existing configuration content, and complexity is lower.Also achieve the control of RAN network slice granularity.
2) as shown in table 19 below, the second mapping ruler may include the information and at least one of at least one RAN network slice
The mapping relations of a RAN access category.
Table 19
In the scheme shown in table 19, UE can be according to the information or at least one RAN that at least one RAN network is sliced
Access category carries out access control and checks, improves the washability and flexibility of technical scheme, because RAN network is sliced
Information of the information generally with CN network slice be one-to-many relationship, so, the configuration content of the second mapping ruler is less than existing
Some configuration contents, complexity are lower.Also achieve the control of RAN network slice granularity.
3) as shown in table 20 below, the second mapping ruler may include the information and at least one of at least one RAN network slice
The mapping relations of the information of a CN network slice.
Table 20
In the scheme shown in table 19, the information that UE can be sliced according at least one RAN network carries out RAN network slice
Access control check, alternatively, can according at least one CN network be sliced information carry out CN network slice access control
It checks, improves the washability and flexibility of technical scheme, because the information of RAN network slice is generally cut with CN network
The information of piece is one-to-many relationship, so, the configuration content of the second mapping ruler is less than existing configuration content, complexity compared with
It is low.Also achieve the control of RAN network slice granularity.
4) as shown in table 21 below, the second mapping ruler may include at least one RAN network slice information, at least one
The information of CN network slice and the mapping relations of at least one RAN access category.
Table 21
In the scheme shown in table 21, the information that UE can be sliced according at least one RAN network carries out RAN network slice
Access control check, alternatively, can according at least one CN network be sliced information carry out CN network slice access control
It checks, alternatively, the access that can also carry out RAN network slice according at least one RAN access category is controlled and checked, improves this
Apply for the washability and flexibility of technical solution, because information of the information of RAN network slice generally with CN network slice is one
To more relationships, so, the configuration content of the second mapping ruler is less than existing configuration content, and complexity is lower.It also achieves
The control of RAN network slice granularity.
It should be noted that in the second mapping ruler described in above-mentioned table 18-21, at least one RAN network slice
Information can be at least one RAN access category, alternatively, CN Allowed NSSAI list, alternatively, CN Allowed NSSAI
List and at least one RAN access category, alternatively, at least one CN access category, alternatively, at least one CN access category and extremely
A few RAN access category, alternatively, at least one CN access category and CN Allowed NSSAI list, there are mapping relations,
But at least one RAN access category can also not included in the second mapping ruler, alternatively, CN Allowed NSSAI is arranged
Table, alternatively, CN Allowed NSSAI list and at least one RAN access category, alternatively, at least one CN access category, or
Person, at least one CN access category and at least one RAN access category, alternatively, at least one CN access category and CN
Allowed NSSAI list, RAN know their mapping relations just, specifically without limitation.
(4) if, include the first mapping ruler in the received downstream message of RAN, do not include CN Allowed NSSAI list,
Then the second mapping ruler is that RAN is determined according to the information of the first mapping ruler and currently available CN network slice.It is exemplary
, the second mapping ruler can be with reference to the implementation any including above-mentioned 12-21, but is not limited to above-mentioned several implementations,
Only in the implementation of above-mentioned 12-21, the information of at least one CN network slice is by CN Allowed NSSAI list
Determining, and in the case that RAN does not receive CN Allowed NSSAI list, it is to be sliced according to currently available CN network
What information determined.
It should be noted that in the embodiment of the present application, the information of at least one RAN network slice can use self-defining
With at least one CN network slice there is the mark of mapping relations to indicate, RAN network slice mark, RAN net can also be used
Network slice type information, RAN type of service, the differentiation of RAN network slice, RAN tenant's information, RAN network slice example information etc.
It indicates, for distinguishing different RAN network slices, specifically without limitation.
It further, in the embodiment of the present application, include the first mapping ruler in the first downstream message, RAN can read the
Second mapping ruler after generating the second mapping ruler, then is transmitted to UE by the content of one mapping ruler.It should be understood that RAN accesses class
It can not indicated with number, letter, byte etc., be not specifically limited in the embodiment of the present application.
405, the second downstream message is sent to UE by RAN.
In the embodiment of the present application, after RAN obtains the second mapping ruler, the second downlink information, institute can be sent to UE
Stating the second downlink information includes the second mapping ruler, and second mapping ruler includes the information of at least one RAN network slice;
UE receives the second downstream message from RAN.Wherein, second downstream message can be wireless heterogeneous networks (Radio
Resource Control, RRC) etc. AS message.Second mapping ruler can be any shown with reference to above-mentioned table 12-20, herein not
It repeats again.
Optionally, the second downstream message can also include the first mapping ruler, and the first mapping ruler includes at least one CN
Access category, alternatively, the first mapping ruler is sent to UE by another downstream message by RAN, the first mapping ruler can join
It is admitted to and states shown in table 2 and table 3, details are not described herein again.
406, UE determines the information of at least one RAN network slice according to the second mapping ruler.
In the embodiment of the present application, UE receives the second downstream message that RAN is sent, and reflects in the second downstream message including second
Rule is penetrated, second mapping ruler includes the information of at least one RAN network slice.Second mapping ruler can refer to above-mentioned
Shown in table 12-20 is any, details are not described herein again.
It optionally, include the first mapping ruler in second mapping ruler, alternatively, UE receives another downstream message,
It include the first mapping ruler in another downstream message, the first mapping ruler includes at least one CN access category.
407, access control information is sent to UE by RAN.
In the embodiment of the present application, RAN sends RAN access control information to UE, and UE is received to be accessed from the RAN of RAN
Control information.It should be understood that RAN access control information can be the access control information of the information of all RAN network slices, it can also
Access to be the information that at least one above-mentioned RAN network is sliced controls information.
Optionally, RAN sends CN access control information to UE, and UE receives the CN access control information from RAN.Ying Li
Solution, CN access control information can be the access control information of the information of all CN network slices, is also possible to above-mentioned at least one
The access of the information of a CN network slice controls information.
408, UE carries out access control according to the second mapping ruler and access control information.
In the embodiment of the present application, UE can carry out access restriction according to the second mapping ruler and RAN access control information
It checks.Before initiating access attempts, UE can be accessed according to the information or at least one RAN that at least one network RAN is sliced
The corresponding access control information of classification executes ABC, to judge whether that access or service request can be initiated.
A kind of possible mode are as follows: corresponding access control information has access restriction timer.If RAN network slice is set
The access restriction timer set is currently running, then terminal device determines that the secondary network insertion request or service request cannot be sent out
It rises.Otherwise, terminal device selects an equally distributed random number between 0 and 1 using random number algorithm;If should be with
Machine number is less than the corresponding access restriction factor in access control information, then terminal device determines that RAN network slice can access;
If the random number is greater than or equal to the corresponding access restriction factor, terminal device determines that RAN network slice cannot connect
Enter, and terminal device starts the RAN network and is sliced corresponding access restriction timer, illustratively, access restriction timing
The timed length of device can be (0.7+0.6* random number) * access restriction time.
Alternatively possible mode are as follows: RAN access control information include a bit map, the bit map not on year-on-year basis
Special position corresponds to the information or different RAN access categories that different RAN networks is sliced.Such as corresponding bit numerical value is
" 0 " indicates that this network slice access request or service request can be initiated, otherwise cannot initiate.Specific ABC mechanism can also
With any ABC applicable with reference to LTE system or 5G system, here without limitation.If do not limited, UE is to first
RAN network slice initiates access attempts or service request.
Optionally, UE can carry out access restriction inspection according to the first mapping ruler and CN access control information.Initiation connects
Before entering trial, UE can according to the information that at least one network RAN is sliced or at least one RAN access category is corresponding connects
Enter to control information and execute ABC, to judge whether that access or service request can be initiated.Specific ABC mechanism can refer to LTE system
Any ABC that system or 5G system are applicable in, here without limitation.If do not limited, UE can be cut to the first CN network
Piece initiates access attempts or service request.
It should be noted that RAN according to the second mapping ruler and access control information carry out access control check include but
Above-mentioned two kinds of mentioned possible implementations are not limited to, other are connect according to the second mapping ruler and access control information
Enter mode that control checks also within the scope of protection of this application.
In the embodiment of the present application, RAN sends the second downstream message to UE, and second downstream message includes the second mapping rule
Then, second mapping ruler includes the information of at least one RAN network slice;The RAN sends RAN access control to the UE
Information processed.It should be noted that the second mapping ruler that RAN is determined, it is related to receive the first mapping ruler that CN is sent with RAN
System.The first RAN network that UE can be accessed in the information that control information is sliced at least one described RAN network according to RAN is cut
The information of piece initiates access request.Because the information of RAN network slice and the information that CN network is sliced are usually one-to-many reflect
Relationship is penetrated, so, what RAN included into the second mapping ruler that UE is sent is the information of at least one RAN network slice, relatively
For the prior art, the configuration of the second mapping ruler is smaller in the embodiment of the present application, and complexity is relatively low.Solves CN
The information of network slice is more, and NAS level form is caused to configure excessive, the excessively high problem of complexity.Further, UE is solved
The inconsistent situation of the information of the CN network slice of the information and CN distribution of the CN network slice of request, because of identical services type
Different CN networks slice information MAP RAN RAN network be sliced information majority of case be identical.It also achieves
Access control of the RAN based on RAN network slice granularity.
The method that control is accessed in the embodiment of the present application is illustrated above, below to the net in the embodiment of the present application
Network equipment and terminal device are illustrated, and are one embodiment signal of the network equipment in the embodiment of the present application as shown in Figure 5A
Scheme, may include:
First sending module 501, for sending first message to terminal device, the first message includes the first mapping rule
Then, first mapping ruler includes the information of at least one wireless access network network slice;
Second sending module 502, for sending access control information to the terminal device.
It should be understood that first sending module and second sending module can be provided separately in logic, it can also
Being realized with the same module.
Optionally, in some embodiments of the present application, first mapping ruler and access control information are used for
Access control is carried out to the terminal device.
It optionally, is the another of the network equipment in the embodiment of the present application as shown in Figure 5 B in some embodiments of the present application
One embodiment schematic diagram, the network equipment can also include:
Receiving module 503, for receiving the second message from second network equipment, the second message includes second
Mapping ruler, second mapping ruler include at least one core net access category, and first mapping ruler further includes institute
State the information of at least one wireless access network network slice and the mapping relations of at least one core net access category;
Alternatively,
Receiving module 502, for receiving the second message from second network equipment, the second message includes core
The network that net network allows is sliced selection auxiliary information Allowed NSSAI list, and first mapping ruler further includes described
The information of at least one wireless access network network slice and the mapping relations of the core net Allowed NSSAI list;
Alternatively,
Receiving module 502, for receiving the second message from second network equipment, the second message includes second
The network that mapping ruler and core net network allow is sliced selection auxiliary information Allowed NSSAI list, second mapping
Rule includes at least one core net access category, and first mapping ruler further includes at least one described wireless access network net
Information, at least one described core net access category and the mapping of the core net Allowed NSSAI list of network slice are closed
System.
Optionally, in some embodiments of the present application, first mapping ruler further includes that described at least one is wireless
The mapping relations for the information that the information and currently available core net network for accessing net network slice are sliced.
Optionally, in some embodiments of the present application, first mapping ruler further includes that described at least one is wireless
Access the information of net network slice and the mapping relations of at least one wireless access network access category.
As shown in Figure 6A, it is one embodiment schematic diagram of terminal device in the embodiment of the present application, may include:
Receiving module 601, for receiving the first message from first network equipment, the first message includes first
Mapping ruler, first mapping ruler include the information of at least one wireless access network network slice;
Second receiving module, 602 receive the access control information from the first network equipment.
It should be understood that first receiving module and second receiving module can be provided separately in logic, it can also
Being realized with the same module.
It optionally, is the another of terminal device in the embodiment of the present application as shown in Figure 6B in some embodiments of the present application
One embodiment schematic diagram, the terminal device further include:
Processing module 603, for carrying out access control according to first mapping ruler and access control information.
Optionally, in some embodiments of the present application, first mapping ruler further includes that described at least one is wireless
Access the information of net network slice and the mapping relations of at least one wireless access network access category.
Optionally, in some embodiments of the present application, first mapping ruler further includes that described at least one is wireless
Access the information of net network slice and the mapping relations of at least one core net access category.
As shown in fig. 7, for another embodiment schematic diagram of the network equipment in the embodiment of the present application, comprising:
The network equipment can generate bigger difference because configuration or performance are different, may include one or more
Central processing unit (central processing units, CPU) 722 (for example, one or more processors) and storage
Device 732, one or more storage application programs 742 or data 744 storage medium 730 (such as one or more
Mass memory unit).Wherein, memory 732 and storage medium 730 can be of short duration storage or persistent storage.It is stored in storage
The program of medium 730 may include one or more modules (diagram does not mark), and each module may include setting to network
Series of instructions operation in standby.Further, central processing unit 722 can be set to communicate with storage medium 730, in net
The series of instructions operation in storage medium 730 is executed in network equipment.
The network equipment can also include one or more power supplys 726, one or more wired or wireless networks
Interface 750, one or more input/output interfaces 758, and/or, one or more operating systems 741, such as
Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM etc..
The step as performed by the network equipment can be based on the network equipment infrastructure shown in Fig. 7 in above-described embodiment.
As shown in figure 8, for another embodiment schematic diagram of the network equipment in the embodiment of the present application.
For ease of description, part relevant to the embodiment of the present application is illustrated only, it is disclosed by specific technical details, it asks
Referring to the embodiment of the present application method part.The terminal device can be include mobile phone, tablet computer, PDA (Personal
Digital Assistant, personal digital assistant), POS (Point of Sales, point-of-sale terminal), vehicle-mounted computer etc. it is any eventually
End equipment, by taking terminal device is mobile phone as an example:
Fig. 8 shows the block diagram of the part-structure of mobile phone relevant to terminal device provided by the embodiments of the present application.Ginseng
Fig. 8 is examined, mobile phone includes: radio frequency (Radio Frequency, RF) circuit 810, memory 820, input unit 830, display unit
840, sensor 850, voicefrequency circuit 860, Wireless Fidelity (wireless fidelity, WiFi) module 870, processor 880,
And the equal components of power supply 890.It will be understood by those skilled in the art that handset structure shown in Fig. 8 is not constituted to mobile phone
It limits, may include perhaps combining certain components or different component layouts than illustrating more or fewer components.
It is specifically introduced below with reference to each component parts of the Fig. 8 to mobile phone:
RF circuit 810 can be used for receiving and sending messages or communication process in, signal sends and receivees, particularly, by base station
After downlink information receives, handled to processor 880;In addition, the data for designing uplink are sent to base station.In general, RF circuit 810
Including but not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier (Low Noise
Amplifier, LNA), duplexer etc..In addition, RF circuit 810 can also be communicated with network and other equipment by wireless communication.
Any communication standard or agreement, including but not limited to global system for mobile communications (Global can be used in above-mentioned wireless communication
System of Mobile communication, GSM), general packet radio service (General Packet Radio
Service, GPRS), CDMA (Code Division Multiple Access, CDMA), wideband code division multiple access
(Wideband Code Division Multiple Access, WCDMA), long term evolution (Long Term Evolution,
LTE), Email, short message service (Short Messaging Service, SMS) etc..
Memory 820 can be used for storing software program and module, and processor 880 is stored in memory 820 by operation
Software program and module, thereby executing the various function application and data processing of mobile phone.Memory 820 can mainly include
Storing program area and storage data area, wherein storing program area can application journey needed for storage program area, at least one function
Sequence (such as sound-playing function, image player function etc.) etc.;Storage data area can be stored to be created according to using for mobile phone
Data (such as audio data, phone directory etc.) etc..It, can be in addition, memory 820 may include high-speed random access memory
Including nonvolatile memory, for example, at least a disk memory, flush memory device or other volatile solid-states
Part.
Input unit 830 can be used for receiving the number or character information of input, and generate with the user setting of mobile phone with
And the related key signals input of function control.Specifically, input unit 830 may include that touch panel 831 and other inputs are set
Standby 832.Touch panel 831, also referred to as touch screen, collect user on it or nearby touch operation (such as user use
The operation of any suitable object or attachment such as finger, stylus on touch panel 831 or near touch panel 831), and root
Corresponding attachment device is driven according to preset formula.Optionally, touch panel 831 may include touch detecting apparatus and touch
Two parts of controller.Wherein, the touch orientation of touch detecting apparatus detection user, and touch operation bring signal is detected,
Transmit a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and is converted into touching
Point coordinate, then gives processor 880, and can receive order that processor 880 is sent and be executed.Furthermore, it is possible to using electricity
The multiple types such as resistive, condenser type, infrared ray and surface acoustic wave realize touch panel 831.In addition to touch panel 831, input
Unit 830 can also include other input equipments 832.Specifically, other input equipments 832 can include but is not limited to secondary or physical bond
One of disk, function key (such as volume control button, switch key etc.), trace ball, mouse, operating stick etc. are a variety of.
Display unit 840 can be used for showing information input by user or be supplied to user information and mobile phone it is various
Menu.Display unit 840 may include display panel 841, optionally, can use liquid crystal display (Liquid Crystal
Display, LCD), the forms such as Organic Light Emitting Diode (Organic Light-Emitting Diode, OLED) it is aobvious to configure
Show panel 841.Further, touch panel 831 can cover display panel 841, when touch panel 831 detect it is on it or attached
After close touch operation, processor 880 is sent to determine the type of touch event, is followed by subsequent processing device 880 according to touch event
Type corresponding visual output is provided on display panel 841.Although in fig. 8, touch panel 831 and display panel 841
It is that the input and input function of mobile phone are realized as two independent components, but in some embodiments it is possible to by touch-control
Panel 831 and display panel 841 are integrated and that realizes mobile phone output and input function.
Mobile phone may also include at least one sensor 850, such as optical sensor, motion sensor and other sensors.
Specifically, optical sensor may include ambient light sensor and proximity sensor, wherein ambient light sensor can be according to ambient light
Light and shade adjust the brightness of display panel 841, proximity sensor can close display panel 841 when mobile phone is moved in one's ear
And/or backlight.As a kind of motion sensor, accelerometer sensor can detect (generally three axis) acceleration in all directions
Size, can detect that size and the direction of gravity when static, can be used to identify the application of mobile phone posture, (for example horizontal/vertical screen is cut
Change, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;May be used also as mobile phone
The other sensors such as gyroscope, barometer, hygrometer, thermometer, the infrared sensor of configuration, details are not described herein.
Voicefrequency circuit 860, loudspeaker 861, microphone 862 can provide the audio interface between user and mobile phone.Audio-frequency electric
Electric signal after the audio data received conversion can be transferred to loudspeaker 861, be converted to sound by loudspeaker 861 by road 860
Signal output;On the other hand, the voice signal of collection is converted to electric signal by microphone 862, is turned after being received by voicefrequency circuit 860
It is changed to audio data, then by after the processing of audio data output processor 880, such as another mobile phone is sent to through RF circuit 810,
Or audio data is exported to memory 820 to be further processed.
WiFi belongs to short range wireless transmission technology, and mobile phone can help user's transceiver electronics postal by WiFi module 870
Part, browsing webpage and access streaming video etc., it provides wireless broadband internet access for user.Although Fig. 8 is shown
WiFi module 870, but it is understood that, and it is not belonging to must be configured into for mobile phone, it can according to need do not changing completely
Become in the range of the essence of invention and omits.
Processor 880 is the control centre of mobile phone, using the various pieces of various interfaces and connection whole mobile phone, is led to
It crosses operation or executes the software program and/or module being stored in memory 820, and call and be stored in memory 820
Data execute the various functions and processing data of mobile phone, to carry out integral monitoring to mobile phone.Optionally, processor 880 can wrap
Include one or more processing units;Preferably, processor 880 can integrate application processor and modem processor, wherein answer
With the main processing operation system of processor, user interface and application program etc., modem processor mainly handles wireless communication.
It is understood that above-mentioned modem processor can not also be integrated into processor 880.
Mobile phone further includes the power supply 890 (such as battery) powered to all parts, it is preferred that power supply can pass through power supply pipe
Reason system and processor 880 are logically contiguous, to realize management charging, electric discharge and power managed by power-supply management system
Etc. functions.
Although being not shown, mobile phone can also include camera, bluetooth module etc., and details are not described herein.
The step as performed by terminal device can be based on the terminal device knot shown in Fig. 8 in above method embodiment
Structure, details are not described herein again.
The embodiment of the present application provides a kind of wireless communication device, and the composition component of the communication device can refer to 7 institute of earlier figures
The network equipment shown.In a kind of feasible design, the hardware configuration of the communication device is necessary according to the embodiment of the present application institute
Important document, may include:
At least one processor, memory, transmission circuit and bus system, the processor, the memory, the receipts
Power Generation Road is coupled by the bus system, and the wireless communication device is communicated by the transmission circuit with terminal device,
The memory is for storing program instruction, at least one described processor is for executing the journey stored in the memory
Sequence instruction, so that first network equipment is (that is, wireless access network is set in wireless communication device execution the various embodiments described above
It is standby) execute various feasible operations (for example, operation performed by Fig. 3 or wireless access network equipment illustrated in fig. 4).It is described
Wireless communication device is also possible to apply the execution in wireless access network side apparatus corresponding either the wireless access network equipment
The System on Chip/SoC of function.
The embodiment of the present application also provides a kind of wireless communication device, may include:
At least one processor, memory, transmission circuit and bus system, the processor, the memory, the receipts
Power Generation Road is coupled by the bus system, and the wireless communication device is communicated by the transmission circuit with network side equipment
Letter, the memory is for storing program instruction, at least one described processor is for executing the institute stored in the memory
Program instruction is stated, so that the wireless communication device executes the various feasible operations that terminal device executes in the various embodiments described above
(for example, operation performed by Fig. 3 or terminal device illustrated in fig. 4).The wireless communication device either terminal device,
It is also possible to apply the System on Chip/SoC that corresponding function is executed in terminal device.
In the above-described embodiments, can come wholly or partly by software, hardware, firmware or any combination thereof real
It is existing.When implemented in software, it can entirely or partly realize in the form of a computer program product.The computer program
Product includes one or more computer instructions.When loading on computers and executing the computer program instructions, all or
It partly generates according to process or function described in the embodiment of the present application.The computer can be general purpose computer, dedicated meter
Calculation machine, computer network or other programmable devices.The computer instruction can store in computer readable storage medium
In, or from a computer readable storage medium to the transmission of another computer readable storage medium, for example, the computer
Instruction can pass through wired (such as coaxial cable, optical fiber, number from a web-site, computer, server or data center
User's line (DSL)) or wireless (such as infrared, wireless, microwave etc.) mode to another web-site, computer, server or
Data center is transmitted.The computer readable storage medium can be any usable medium that computer can access or
It is comprising data storage devices such as one or more usable mediums integrated server, data centers.The usable medium can be with
It is magnetic medium, (for example, floppy disk, hard disk, tape), optical medium (for example, DVD) or semiconductor medium (such as solid state hard disk
Solid State Disk (SSD)) etc..
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description,
The specific work process of device and unit, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In several embodiments provided herein, it should be understood that disclosed system, device and method can be with
It realizes by another way.For example, the apparatus embodiments described above are merely exemplary, for example, the unit
It divides, only a kind of logical function partition, there may be another division manner in actual implementation, such as multiple units or components
It can be combined or can be integrated into another system, or some features can be ignored or not executed.Another point, it is shown or
The mutual coupling, direct-coupling or communication connection discussed can be through some interfaces, the indirect coupling of device or unit
It closes or communicates to connect, can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit
The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple
In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme
's.
It, can also be in addition, each functional unit in each embodiment of the application can integrate in one processing unit
It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list
Member both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated unit is realized in the form of SFU software functional unit and sells or use as independent product
When, it can store in a computer readable storage medium.Based on this understanding, the technical solution of the application is substantially
The all or part of the part that contributes to existing technology or the technical solution can be in the form of software products in other words
It embodies, which is stored in a storage medium, including some instructions are used so that a computer
Equipment (can be personal computer, server or the network equipment etc.) executes the complete of each embodiment the method for the application
Portion or part steps.And storage medium above-mentioned includes: USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only
Memory), random access memory (RAM, Random Access Memory), magnetic or disk etc. are various can store journey
The medium of sequence code.
The above, above embodiments are only to illustrate the technical solution of the application, rather than its limitations;Although referring to before
Embodiment is stated the application is described in detail, those skilled in the art should understand that: it still can be to preceding
Technical solution documented by each embodiment is stated to modify or equivalent replacement of some of the technical features;And these
It modifies or replaces, the spirit and scope of each embodiment technical solution of the application that it does not separate the essence of the corresponding technical solution.
Claims (26)
1. a kind of method of access control characterized by comprising
First network equipment to terminal device send first message, the first message include the first mapping ruler, described first
Mapping ruler includes the information of at least one wireless access network network slice;
The first network equipment sends access control information to the terminal device.
2. the method according to shown in the 1 of claim, which is characterized in that first mapping ruler and the access control information
It is used to carry out access control to the terminal device.
3. method according to claim 1 or 2, which is characterized in that the method also includes:
The first network equipment receives the second message from second network equipment, and the second message includes the second mapping
Rule, second mapping ruler include at least one core net access category, first mapping ruler further include it is described extremely
The information of few wireless access network network slice and the mapping relations of at least one core net access category.
4. method according to claim 1 or 2, which is characterized in that the method also includes:
The first network equipment receives the third message from second network equipment, and the third message includes core net net
The network that network allows is sliced selection auxiliary information list, and first mapping ruler further includes at least one described wireless access network
The network that the information of network slice and the core net network allow is sliced the mapping relations of selection auxiliary information list.
5. method according to claim 1 or 2, which is characterized in that the method also includes:
The first network equipment receives the 4th message from second network equipment, and the 4th message includes the second mapping
The network that rule and core net network allow is sliced selection auxiliary information list, and second mapping ruler includes at least one core
Heart net access category, first mapping ruler further include the information, described of at least one wireless access network network slice
The mapping that the network that at least one core net access category and the core net network allow is sliced selection auxiliary information list is closed
System.
6. method according to claim 1 to 3, which is characterized in that first mapping ruler further include it is described at least
The mapping relations for the information that the information of one wireless access network network slice and currently available core net network are sliced.
7. -6 any method according to claim 1, which is characterized in that first mapping ruler further include it is described at least
The information of one wireless access network network slice and the mapping relations of at least one wireless access network access category.
8. a kind of method of access control characterized by comprising
Terminal device receives the first message from first network equipment, and the first message includes the first mapping ruler, institute
State the information that the first mapping ruler includes at least one wireless access network network slice;
The terminal device receives the access control information from the first network equipment.
9. according to the method described in claim 8, it is characterized in that, the method also includes:
The terminal device carries out access control according to first mapping ruler and access control information.
10. method according to claim 8 or claim 9, which is characterized in that first mapping ruler further includes described at least one
The information of a wireless access network network slice and the mapping relations of at least one wireless access network access category.
11. according to any method of claim 8-9, which is characterized in that first mapping ruler further include it is described extremely
The information of few wireless access network network slice and the mapping relations of at least one core net access category.
12. a kind of network equipment characterized by comprising
First sending module, for sending first message to terminal device, the first message includes the first mapping ruler, described
First mapping ruler includes the information of at least one wireless access network network slice;
Second sending module, for sending access control information to the terminal device.
13. the network equipment according to claim 12, which is characterized in that first mapping ruler and access control
Information is for carrying out access control to the terminal device.
14. the network equipment according to claim 12 or 13, which is characterized in that the network equipment further include:
Receiving module, for receiving the second message from second network equipment, the second message includes the second mapping rule
Then, second mapping ruler includes at least one core net access category, first mapping ruler further include it is described at least
The information of one wireless access network network slice and the mapping relations of at least one core net access category.
15. the network equipment according to claim 12 or 13, which is characterized in that the network equipment further include:
Receiving module, for receiving the second message from second network equipment, the second message includes core net network
The network slice selection auxiliary information list of permission, first mapping ruler further includes at least one described wireless access network net
The network that the information of network slice and the core net network allow is sliced the mapping relations of selection auxiliary information list.
16. the network equipment according to claim 12 or 13, which is characterized in that the network equipment further include:
Receiving module, for receiving the second message from second network equipment, the second message includes the second mapping rule
The network then allowed with core net network is sliced selection auxiliary information list, and second mapping ruler includes at least one core
Net access category, first mapping ruler further include at least one wireless access network network slice information, it is described extremely
The network that a few core net access category and the core net network allow is sliced the mapping relations of selection auxiliary information list.
17. any network equipment of 2-14 according to claim 1, which is characterized in that first mapping ruler further includes
The mapping for the information that the information of at least one wireless access network network slice and currently available core net network are sliced is closed
System.
18. any network equipment of 2-17 according to claim 1, which is characterized in that first mapping ruler further includes
The information of at least one wireless access network network slice and the mapping relations of at least one wireless access network access category.
19. a kind of terminal device characterized by comprising
First receiving module, for receiving the first message from first network equipment, the first message is reflected including first
Rule is penetrated, first mapping ruler includes the information of at least one wireless access network network slice;
Second receiving module, for receiving the access control information from the first network equipment.
20. terminal device according to claim 19, which is characterized in that the terminal device further include:
Processing module is checked for carrying out access control according to first mapping ruler and access control information.
21. terminal device described in 9 or 20 according to claim 1, which is characterized in that first mapping ruler further includes described
The information of at least one wireless access network network slice and the mapping relations of at least one wireless access network access category.
22. any terminal device of 9-21 according to claim 1, which is characterized in that first mapping ruler further includes
The information of at least one wireless access network network slice and the mapping relations of at least one core net access category.
23. a kind of computer readable storage medium, it is stored with instruction in the computer readable storage medium, when it is in computer
When upper operation, so that computer executes method described in described any one of claims 1 to 11.
24. a kind of computer program product comprising instruction, when run on a computer, so that computer executes the power
Benefit require any one of 1 to 11 described in method.
25. a kind of wireless communication device characterized by comprising
At least one processor, memory, transmission circuit and bus system, the processor, the memory, the transmitting-receiving electricity
Road is coupled by the bus system, and the wireless communication device is communicated by the transmission circuit with terminal device, described
Memory refers to for storing program instruction, at least one described processor for executing the described program stored in the memory
It enables, so that the wireless communication device completes first network equipment operation described in method as claimed in claim 1
Part.
26. a kind of wireless communication device characterized by comprising
At least one processor, memory, transmission circuit and bus system, the processor, the memory, the transmitting-receiving electricity
Road is coupled by the bus system, and the wireless communication device is communicated by the transmission circuit with network side equipment, institute
Memory is stated for storing program instruction, at least one described processor is for executing the described program stored in the memory
Instruction, so that the wireless communication device completes the operation of the terminal device as described in the method as described in claim 8-11 is any
Part.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710459461.9A CN109151950B (en) | 2017-06-16 | 2017-06-16 | Access control method, network equipment and terminal equipment |
PCT/CN2018/091436 WO2018228517A1 (en) | 2017-06-16 | 2018-06-15 | Method for controlling access, network device, and terminal device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710459461.9A CN109151950B (en) | 2017-06-16 | 2017-06-16 | Access control method, network equipment and terminal equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109151950A true CN109151950A (en) | 2019-01-04 |
CN109151950B CN109151950B (en) | 2021-09-07 |
Family
ID=64659678
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710459461.9A Active CN109151950B (en) | 2017-06-16 | 2017-06-16 | Access control method, network equipment and terminal equipment |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN109151950B (en) |
WO (1) | WO2018228517A1 (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2020199106A1 (en) * | 2019-04-01 | 2020-10-08 | Guangdong Oppo Mobile Telecommunications Corp., Ltd. | User equipment and method for access control through access categorization of same |
WO2020220997A1 (en) * | 2019-04-28 | 2020-11-05 | 华为技术有限公司 | Communication method, apparatus and system |
CN112351470A (en) * | 2019-08-07 | 2021-02-09 | 华为技术有限公司 | Access restriction detection method and device |
CN113596948A (en) * | 2020-04-30 | 2021-11-02 | 维沃移动通信有限公司 | Information reporting method, information sending method, information selecting method and related equipment |
CN114039738A (en) * | 2020-07-21 | 2022-02-11 | 华为技术有限公司 | Firewall rule configuration method and system, medium and electronic equipment thereof |
CN114760663A (en) * | 2020-12-28 | 2022-07-15 | 中国移动通信有限公司研究院 | Information transmission method, device, related equipment and storage medium |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11206602B2 (en) * | 2019-05-02 | 2021-12-21 | Mediatek Inc. | Enhancement for closed access groups |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106572516A (en) * | 2016-09-28 | 2017-04-19 | 华为技术有限公司 | Network slice selection method, terminal equipment and network equipment |
CN106851589A (en) * | 2016-12-30 | 2017-06-13 | 北京小米移动软件有限公司 | Wireless network access method, apparatus and system |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2017059829A2 (en) * | 2016-11-04 | 2017-04-13 | Telefonaktiebolaget Lm Ericsson (Publ) | Methods, base station and user equipment |
CN106412905A (en) * | 2016-12-12 | 2017-02-15 | 中国联合网络通信集团有限公司 | Network slice selection method, UE, MME and system |
-
2017
- 2017-06-16 CN CN201710459461.9A patent/CN109151950B/en active Active
-
2018
- 2018-06-15 WO PCT/CN2018/091436 patent/WO2018228517A1/en active Application Filing
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106572516A (en) * | 2016-09-28 | 2017-04-19 | 华为技术有限公司 | Network slice selection method, terminal equipment and network equipment |
CN106851589A (en) * | 2016-12-30 | 2017-06-13 | 北京小米移动软件有限公司 | Wireless network access method, apparatus and system |
Non-Patent Citations (3)
Title |
---|
HUAWEI: "UE Slice Association/Overload control Procedure", 《3GPP TSG SA WG2 MEETING #115,S2-162981》 * |
TELECOM ITALIA, CHINA MOBILE, ZTE: "S-NSSAI and Network Slice instances", 《SA WG2 MEETING #121,S2-173207》 * |
ZTE: "Clarification on Network Slicing in RAN", 《3GPP TSG RAN WG3 MEETING#93 R3-161596》 * |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2020199106A1 (en) * | 2019-04-01 | 2020-10-08 | Guangdong Oppo Mobile Telecommunications Corp., Ltd. | User equipment and method for access control through access categorization of same |
WO2020220997A1 (en) * | 2019-04-28 | 2020-11-05 | 华为技术有限公司 | Communication method, apparatus and system |
CN112351470A (en) * | 2019-08-07 | 2021-02-09 | 华为技术有限公司 | Access restriction detection method and device |
WO2021023185A1 (en) * | 2019-08-07 | 2021-02-11 | 华为技术有限公司 | Method and device for access restriction detection |
CN112351470B (en) * | 2019-08-07 | 2022-04-05 | 华为技术有限公司 | Access restriction detection method and device |
CN113596948A (en) * | 2020-04-30 | 2021-11-02 | 维沃移动通信有限公司 | Information reporting method, information sending method, information selecting method and related equipment |
CN113596948B (en) * | 2020-04-30 | 2024-01-16 | 维沃移动通信有限公司 | Information reporting method, sending method, selecting method and related equipment |
CN114039738A (en) * | 2020-07-21 | 2022-02-11 | 华为技术有限公司 | Firewall rule configuration method and system, medium and electronic equipment thereof |
CN114039738B (en) * | 2020-07-21 | 2023-02-03 | 华为技术有限公司 | Firewall rule configuration method and system, medium and electronic equipment thereof |
CN114760663A (en) * | 2020-12-28 | 2022-07-15 | 中国移动通信有限公司研究院 | Information transmission method, device, related equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
WO2018228517A1 (en) | 2018-12-20 |
CN109151950B (en) | 2021-09-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109151950A (en) | A kind of method, the network equipment and the terminal device of access control | |
US11778493B2 (en) | Data collection method, device, and system | |
US20200374964A1 (en) | Communication Method and Apparatus | |
EP3117586B1 (en) | Cross-layer context management | |
CN110167201A (en) | A kind of method, relevant apparatus and the system of data transmission | |
US20230319601A1 (en) | Communication method, apparatus, and system | |
US20220232445A1 (en) | Communications System Switching Method and Terminal Device | |
CN109217995A (en) | A kind of data processing method, terminal and base station | |
WO2021134496A1 (en) | Communication method and apparatus | |
CN110679194A (en) | Data scheduling method and related equipment | |
CN107608720A (en) | Using the display methods of footmark, device, mobile terminal and storage medium | |
CN114116648A (en) | Method, apparatus and computer program product for enhanced data analysis in multiple NWDAF deployments | |
CN110234172A (en) | Method, the method and device of access category creation of a kind of data transmission | |
CN108811109A (en) | Method for mapping resource, the network equipment and terminal device | |
CN105307139A (en) | Method, mobile terminal and system for transmitting application heartbeat signals | |
CN114189938B (en) | Carrier wave determining method, communication device and storage medium | |
CN106713171A (en) | Server and delay-queue-based current-limiting protection system and method | |
CN107786965B (en) | Team game communication method and related product | |
CN109565826B (en) | Data transmission method and related product | |
CN108432302A (en) | Power information sending method, terminal device and the network equipment | |
CN109462826A (en) | A kind of group paging method, user equipment, the network equipment and computer readable storage medium | |
WO2019214593A9 (en) | Communication method and apparatus | |
CN107820287B (en) | Detect the method and Related product of terminal access | |
WO2023151585A1 (en) | Terminal target surface capability reporting and acquiring methods, terminal, and network device | |
US20220338093A1 (en) | Communication method, device, and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |