CN110380887A - Communication means and device - Google Patents
Communication means and device Download PDFInfo
- Publication number
- CN110380887A CN110380887A CN201810333894.4A CN201810333894A CN110380887A CN 110380887 A CN110380887 A CN 110380887A CN 201810333894 A CN201810333894 A CN 201810333894A CN 110380887 A CN110380887 A CN 110380887A
- Authority
- CN
- China
- Prior art keywords
- network
- parameter
- access
- network slice
- equipment
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/50—Network service management, e.g. ensuring proper service fulfilment according to agreements
- H04L41/5003—Managing SLA; Interaction between SLA and QoS
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0893—Assignment of logical groups to network elements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/50—Network service management, e.g. ensuring proper service fulfilment according to agreements
- H04L41/5003—Managing SLA; Interaction between SLA and QoS
- H04L41/5009—Determining service level performance parameters or violations of service level contracts, e.g. violations of agreed response time or mean time between failures [MTBF]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W72/00—Local resource management
- H04W72/04—Wireless resource allocation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W72/00—Local resource management
- H04W72/12—Wireless traffic scheduling
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W72/00—Local resource management
- H04W72/50—Allocation or scheduling criteria for wireless resources
- H04W72/53—Allocation or scheduling criteria for wireless resources based on regulatory allocation policies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W72/00—Local resource management
- H04W72/50—Allocation or scheduling criteria for wireless resources
- H04W72/535—Allocation or scheduling criteria for wireless resources based on resource usage policies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W72/00—Local resource management
- H04W72/50—Allocation or scheduling criteria for wireless resources
- H04W72/54—Allocation or scheduling criteria for wireless resources based on quality criteria
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Quality & Reliability (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The application provides a kind of communication means and device, this method comprises: equipment of the core network obtains the policing parameter of network slice, the policing parameter of network slice includes at least one of following parameter: Access Control Policy parameter, scheduling controlling policing parameter and bandwidth controlling strategy parameter;The equipment of the core network to the network be sliced corresponding access network equipment send the network be sliced policing parameter, so as to the access network equipment according to the policing parameter that the network be sliced determine the network be sliced corresponding strategies.The application by setting network be sliced policing parameter, and according to network be sliced policing parameter determine network slice corresponding strategies, can to a certain extent Logistics networks slice service quality.
Description
Technical field
This application involves the communications fields, and in particular it relates to a kind of communication means and device.
Background technique
With continuing to bring out for diversified communication service, demand of the different communication services to network performance exists aobvious
The difference of work, the 5th Generation Mobile Communication System (the fifth generation, 5G) introduce network slice (network
Slice, NS) concept, to cope with the difference of demand of the different communication business to network performance.
Network slice refers to the set for supporting the logical network functional entity of specific communication service demand, mainly by means of soft
Part defines network (software defined network, SDN) technology and network function virtualizes (network function
Virtualization, NFV) technology, realize the service of communication service customizable.One network slice meets certain one kind or one
The connection communication demand for services of a use-case, whole network system are sliced by a large amount of networks for meeting different concatenation abilities and are formed.
Network slice is end-to-end, including wireless access network, transmission network and core net etc..Wireless access network, transmission
Net and core net carry out Slice processing, therefore it is user that the network slice of multiple portions, which is concatenated together into an energy,
The whole network slice of one complete service is provided.It is logic isolation, infrastructure between the network slice of different piece
Internet resources are shared.When the business model of operator turns to vertical industry sales network and cuts from selling connection to single user
After piece, originally by user QoS ensure need be converted to by service-level agreement (Service-Level Agreement,
SLA) require carry out slice-level guarantee, for example, how Logistics networks slice service quality, how Logistics networks slice meet
How the demand of client ensures the Internet resources etc. between reasonable disposition network slice.
Currently, still without the guarantee plan for network slice.
Summary of the invention
The application provides a kind of communication means and device, can be to a certain degree by being sliced setting priority to network
The service quality of upper Logistics networks slice.
In a first aspect, a kind of communication means is provided, this method comprises: equipment of the core network obtains the strategy ginseng of network slice
The policing parameter of number, network slice includes at least one of following parameter: Access Control Policy parameter, scheduling controlling strategy ginseng
Several and bandwidth controlling strategy parameter;The equipment of the core network is sliced corresponding access network equipment to the network and sends what the network was sliced
Policing parameter, so as to the access network equipment according to the policing parameter that the network is sliced determine the network slice corresponding strategies.
Optionally, which obtains the policing parameter of network slice by NWDAF.
Optionally, which obtains the policing parameter of network slice according to predefined algorithm.
Specifically, which sends a notification message to the access network equipment, and the network is carried in the notification message
The slice mark of the policing parameter of slice and network slice.Correspondingly, which receives from the equipment of the core network
The notification message, by parsing the notification message, the slice mark for obtaining network slice is sliced access network equipment with the network
Policing parameter.The slice mark of network slice refers to the information for capableing of unique identification network slice.Access network equipment
It can identify that the network is sliced according to slice.
Then the policing parameter that the embodiment of the present application is sliced by setting network is handled according to the policing parameter of network slice
Network slice may be implemented the differentiation processing of network slice, be conducive to the service quality for improving network slice.
With reference to first aspect, in a kind of possible implementation of first aspect, the network slice priority be with
The related access category priority of Access Control Policy, wherein higher access category priority is relative to lower access class
Other priority priority access network.
Therefore, the access category priority that the present embodiment is sliced by setting network, the access being then sliced according to network
The Access Control Policy of category preferences Configuration network slice, so as to control the number of users that network slice allows to access,
Can to a certain extent Logistics networks slice service quality.
With reference to first aspect, in a kind of possible implementation of first aspect, the policing parameter of network slice is
Access category priority;The equipment of the core network obtains the policing parameter of network slice, comprising: the equipment of the core network will be in system
All-network slice is divided at least two access categories, and preferential according at least two access category setting access category
Grade;The equipment of the core network obtains the policing parameter of network slice, and the policing parameter of network slice is belonging to network slice
Access category corresponding to access category priority.
With reference to first aspect, in a kind of possible implementation of first aspect, this method further include: the core net is set
The standby access category for notifying the network to be sliced to terminal device, the terminal device are the end that contract signing relationship is established with network slice
End equipment.
With reference to first aspect, in a kind of possible implementation of first aspect, the policing parameter of network slice is
Allow to access control parameter or forbids accessing control parameter.
With reference to first aspect, in a kind of possible implementation of first aspect, this method further include: the core net is set
The standby access category for notifying the network to be sliced to terminal device, the terminal device are the end that contract signing relationship is established with network slice
End equipment.
Optionally, the policing parameter of network slice is scheduling controlling policing parameter.For example, the scheduling controlling policing parameter
For dispatching priority, wherein higher dispatching priority preferentially carries out scheduling of resource relative to lower dispatching priority.
The scheduling controlling policing parameter that the present embodiment is sliced by setting network, the scheduling controlling being then sliced according to network
Policing parameter control network slice scheduling of resource, can to a certain extent Logistics networks slice service quality.
Optionally, the policing parameter of network slice is bandwidth controlling strategy parameter.
Therefore, the bandwidth controlling strategy parameter that the present embodiment is sliced by setting network, can be sliced with flexible configuration network
Amount of bandwidth, can to a certain extent Logistics networks slice service quality.
With reference to first aspect, in a kind of possible implementation of first aspect, which cuts to the network
The corresponding access network equipment of piece sends the policing parameter of network slice, comprising: the equipment of the core network passes through user face or control
The policing parameter of network slice is sent towards the access network equipment.
With reference to first aspect, in a kind of possible implementation of first aspect, which cuts to the network
The corresponding access network equipment of piece sends the policing parameter of network slice, comprising: the equipment of the core network passes through access and mobility
Management function AMF sends the policing parameter that the network is sliced to the access network equipment.
With reference to first aspect, in a kind of possible implementation of first aspect, which cuts to the network
The corresponding access network equipment of piece sends the policing parameter of network slice, comprising: when the policing parameter of network slice becomes
When more, which sends the policing parameter after network slice change to the access network equipment.
The embodiment of the present application is in the policing parameter of the policing parameter or change network slice that determine network slice for the first time,
Access network equipment is notified that, in order to which access network device is configured according to the policing parameter that network is sliced, with Logistics networks
The service quality of slice.
Second aspect provides a kind of communication means, cuts this method comprises: access network equipment receives network from equipment of the core network
The policing parameter of the policing parameter of piece, network slice includes at least one of following parameter: Access Control Policy parameter, scheduling
Controlling strategy parameter and bandwidth controlling strategy parameter;The access network equipment determines the network according to the policing parameter that the network is sliced
The corresponding strategies of slice.
In conjunction with second aspect, in a kind of possible implementation of second aspect, the policing parameter of network slice is
Access Control Policy parameter;Wherein, which determines the phase of network slice according to the policing parameter that the network is sliced
Close strategy, comprising: the Access Control Policy parameter that the access network equipment is sliced according to the network determines the access of network slice
Control parameter.
In conjunction with second aspect, in a kind of possible implementation of second aspect, the policing parameter of network slice is
Allow to access control parameter or forbids accessing control parameter.
In conjunction with second aspect, in a kind of possible implementation of second aspect, this method further include: the access net is set
The standby Access Control Policy parameter being sliced according to the network, generates the access control parameter of network slice;The access network equipment
Send and broadcast the message to terminal device, carry the access control parameter of network slice in the broadcast message, the terminal device with
Network slice, which is established, contract signing relationship.
In conjunction with second aspect, in a kind of possible implementation of second aspect, the policing parameter of network slice is
Scheduling controlling policing parameter;Wherein, which determines the phase of network slice according to the policing parameter that the network is sliced
Close strategy, comprising: the scheduling controlling policing parameter that the access network equipment is sliced according to the network is determined as accessing network slice
Terminal device scheduling resource strategy.
In conjunction with second aspect, in a kind of possible implementation of second aspect, the network slice policing parameter with
Bandwidth controlling strategy parameter;Wherein, which determines the phase of network slice according to the policing parameter that the network is sliced
Close strategy, comprising: the access network equipment is joined according to the bandwidth control strategy that the network is sliced, and is determined as accessing network slice
The strategy of terminal device bandwidth allocation.
In conjunction with second aspect, in a kind of possible implementation of second aspect, which sets from core net
The standby policing parameter for receiving network slice, comprising: the access network equipment passes through access and mobile management function to ps domain AMF from the core
Net equipment receives the policing parameter of network slice.
In conjunction with second aspect, in a kind of possible implementation of second aspect, which sets from core net
The standby policing parameter for receiving network slice, comprising: when the policing parameter of network slice changes, the access network equipment from
The equipment of the core network receives the policing parameter after network slice change.
In conjunction with second aspect, in a kind of possible implementation of second aspect, which sets from core net
The standby policing parameter for receiving network slice, comprising: the access network equipment receives notification message from the equipment of the core network, which disappears
The policing parameter of network slice and the slice mark of network slice are carried in breath.
The third aspect provides a kind of communication means, this method comprises: terminal device receives the network that equipment of the core network is sent
The access category of slice;Terminal device receives the access control parameter that access network equipment is sent, and includes in the access control parameter
The access control parameter for the network slice that the Access Control Policy parameter of the network slice sent according to core net determines;It should
The access style that terminal device is sliced according to the network is determining connecing for network slice from the received parameter of access network equipment
Enter control parameter;The access control parameter that the terminal device is sliced according to the network, carries out the access procedure of the network slice.
In conjunction with the third aspect, in a kind of possible implementation of the third aspect, the access of network slice controls plan
Slightly parameter is the access category priority that the network is sliced.
In conjunction with the third aspect, in a kind of possible implementation of the third aspect, the access of network slice controls plan
Slightly parameter for permission access strategy parameter or forbids access strategy parameter.
Fourth aspect provides a kind of communication device, which is used to execute above-mentioned first aspect or first aspect
Method in any possible implementation.Specifically, which may include for executing first aspect or first party
The module of method in any possible implementation in face.
5th aspect, provides a kind of communication device, which is used to execute above-mentioned second aspect or second aspect
Method in any possible implementation.Specifically, which may include for executing second aspect or second party
The module of method in any possible implementation in face.
6th aspect, provides a kind of communication device, which is used to execute the above-mentioned third aspect or the third aspect
Method in any possible implementation.Specifically, which may include for executing the third aspect or third party
The module of method in any possible implementation in face.
7th aspect provides a kind of communication device, and the communication device includes memory and processor, and the memory is used
In store instruction, the processor is used to execute the instruction of the memory storage, and to the finger stored in the memory
The execution of order is so that the processor executes the method in any possible implementation of first aspect or first aspect.
Eighth aspect provides a kind of communication device, and the communication device includes memory and processor, and the memory is used
In store instruction, the processor is used to execute the instruction of the memory storage, and to the finger stored in the memory
The execution of order is so that the processor executes the method in any possible implementation of second aspect or second aspect.
9th aspect provides a kind of communication device, and the communication device includes memory and processor, and the memory is used
In store instruction, the processor is used to execute the instruction of the memory storage, and to the finger stored in the memory
The execution of order is so that the processor executes the method in any possible implementation of the third aspect or the third aspect.
Tenth aspect, provides a kind of chip, the chip includes processing module and communication interface, and the processing module is used for
It controls the communication interface to be communicated with outside, the processing module is also used to realize first aspect or second aspect or third
The method that aspect provides.
On the one hand tenth, provides a kind of computer readable storage medium, is stored thereon with computer program, the computer
The computer is made to realize the method that first aspect or second aspect or the third aspect provide when program is computer-executed.
12nd aspect, provides a kind of computer program product comprising instruction, makes when described instruction is computer-executed
Obtain the method that the computer realizes that first aspect or second aspect or the third aspect provide.
Detailed description of the invention
Fig. 1 is the schematic diagram of the system architecture of the embodiment of the present application application.
Fig. 2 is the schematic flow chart of communication means provided by the embodiments of the present application.
Fig. 3 is another schematic flow chart of communication means provided by the embodiments of the present application.
Fig. 4 is another schematic flow chart of communication means provided by the embodiments of the present application.
Fig. 5 is another schematic flow chart of communication means provided by the embodiments of the present application.
Fig. 6 is another schematic flow chart of communication means provided by the embodiments of the present application.
Fig. 7 is another schematic flow chart of communication means provided by the embodiments of the present application.
Fig. 8 is the schematic block diagram of communication device provided by the embodiments of the present application.
Fig. 9 is the schematic block diagram of another communication device provided by the embodiments of the present application.
Figure 10 is the schematic block diagram of another communication device provided by the embodiments of the present application.
Figure 11 is another schematic block diagram of another communication device provided by the embodiments of the present application.
Figure 12 is the schematic block diagram of another communication device provided by the embodiments of the present application.
Specific embodiment
Below in conjunction with attached drawing, the technical solution in the application is described.
Fig. 1 is the schematic diagram of the system architecture of the embodiment of the present application application.The system architecture includes terminal device (in Fig. 1
The UE of signal), access net (Radio Access Network, RAN) equipment (RAN illustrated in Fig. 1) and core net (Core
Network, CN) equipment.
Wherein, the terminal device can for user equipment (user equipment, UE), handheld terminal, laptop,
It is subscriber unit (subscriber unit), cellular phone (cellular phone), smart phone (smart phone), wireless
Data card, personal digital assistant (personal digital assistant, PDA) computer, plate computer, wireless-modulated solution
Adjust device (modem), handheld device (handheld), laptop computer (laptop computer), wireless phone (cordless
) or wireless local loop (wireless local loop, WLL) platform, machine type communication (machine type phone
Communication, MTC) terminal or other equipment that can access network.Terminal device (UE as shown in figure 1) and access
It is in communication with each other between net equipment (RAN illustrated in Fig. 1) using certain technology of eating dishes without rice or wine.
The access network equipment (RAN) is mainly responsible for the wireless resource management for side of eating dishes without rice or wine, service quality (quality of
Service, QoS) management, the functions such as data compression and encryption.The access network equipment may include various forms of base stations, example
Such as: macro base station, micro-base station (also referred to as small station), relay station, access point etc..In the system using different radio access technologies,
The title for having the equipment of base station functions may be different, for example, in the 5th generation (5th generation, 5G) system
In, referred to as gNB;In LTE system, the node B (evolved NodeB, eNB or eNodeB) of referred to as evolution;In the third generation
In (3rd generation, 3G) system, referred to as node B (Node B) etc..
As shown in Figure 1, equipment of the core network includes following network function (Network Function, NF).
Access and mobile management function to ps domain (access and mobility management function, AMF).
AMF is mainly responsible for signaling processing part, such as: access control, mobile management, attachment and attachment removal and gateway
The functions such as selection.In the case where AMF provides service for the session in terminal device, AMF can provide control plane for the session
Storage resource, storage session identification and the associated SMF mark of session identification etc..
Conversation management functional (Session Management Function, SMF).
SMF is responsible for following function: the selection of user's veil member, user's veil member redirect, Internet Protocol (internet
Protocol, IP) address distribution, foundation, modification and the release of carrying and service quality (Quality of Service,
QoS it) controls.
Policy control functions (policy control function, PCF).
PCF mainly supports to provide unified policy framework to provide policing rule to control network behavior and give control layer network
Function, while being responsible for obtaining user signing contract information relevant to strategic decision-making.
Network data analysis function (Network Data Analytics Function, NWDAF).
NWDAF mainly supports collecting and analyzing for big data, provides analysis result to other related network elements.
As shown in Figure 1, the system architecture further includes user plane functions (User Plane Function, UPF).UPF is responsible for
The forwarding and reception of user data in terminal device.UPF can receive user data from data network (i.e. core net), by connecing
Log equipment is transferred to terminal device;UPF can also receive user data from terminal device by access network equipment, be forwarded to number
According to network.The transfer resource of service is provided for terminal device in UPF and scheduling feature is managed by SMF and controlled.
As shown in Figure 1, each network function in above-mentioned core net communicates with each other connection.Wherein, AMF can also respectively with
Terminal device (UE) and access network device (RAN) communication connection;SMF can also be communicated to connect with UPF.
Although also showing other network functions in core net in Fig. 1, such as network is sliced selection function (Network
Slice Selection Function, NSSF), network opening function (Network Exposure Function, NEF), NF
Store function (NF Repository Function, NRF), same data management (Unified Data Management,
UDM), application function (Application Function, AF) and authentication server function (Authentication Server
Function, AUSF), data network (Data Network, DN) is also shown in Fig. 1, but it is understood that these network elements are simultaneously
Being construed as limiting property of the present embodiment is not illustrated, is only illustrative.
Fig. 2 is the schematic flow chart of communication means provided by the embodiments of the present application.This method includes following process.
S201, equipment of the core network obtain the policing parameter of network slice, and the policing parameter of network slice includes following ginseng
At least one of number: Access Control Policy parameter, scheduling controlling policing parameter and bandwidth controlling strategy parameter.
Equipment of the core network obtains the policing parameter of network slice, can indicate, equipment of the core network generates network slice
Policing parameter can also indicate that equipment of the core network gets the policing parameter of network slice by other equipment.
Optionally, which obtains the policing parameter of network slice by NWDAF.
Specifically, the policing parameter that equipment of the core network is subscribed to NWDAF or the requirement analysis network is sliced, equipment of the core network
According to the analysis of NWDAF feedback as a result, determining the policing parameter of network slice.
Optionally, which obtains the policing parameter of network slice according to predefined algorithm.
For example, the predefined algorithm is the policing parameter for determining network slice according to the type that network is sliced, alternatively, root
The policing parameter of network slice is determined according to the SLA index request that network slice is signed, then alternatively, is according to managed network element
The network is sliced the slicing parameter of configuration to determine the policing parameter for determining network slice.
The policing parameter of network slice includes at least one of following parameter: Access Control Policy parameter, scheduling controlling
Policing parameter and bandwidth controlling strategy parameter.Wherein, Access Control Policy parameter indicates to access network for controlling terminal equipment
Parameter;Scheduling controlling policing parameter indicates the parameter for dispatching resource for the terminal device of access network;Bandwidth controls plan
Slightly parameter indicates the parameter for the terminal device bandwidth allocation for access network.For example, the bandwidth controlling strategy parameter indicates
For the maximum bandwidth of network slice distribution, then it is less than or is equal to access the bandwidth of the terminal device distribution of network slice
The network is sliced distributed maximum bandwidth.
The policing parameter of network slice can be specially the priority of network slice.For example, the access control of network slice
Policing parameter is the access category priority of network slice;The scheduling controlling policing parameter of network slice is the scheduling of network slice
Priority.
S202, the equipment of the core network are sliced corresponding access network equipment to the network and send the strategy ginseng that the network is sliced
Number.Correspondingly, access network equipment receives the policing parameter that network is sliced from equipment of the core network.
Specifically, which sends a notification message to the access network equipment, and the network is carried in the notification message
The slice mark of the policing parameter of slice and network slice.Correspondingly, which receives from the equipment of the core network
The notification message, by parsing the notification message, the slice mark for obtaining network slice is sliced access network equipment with the network
Policing parameter.The slice mark of network slice refers to the information for capableing of unique identification network slice.Access network equipment
It can identify that the network is sliced according to slice.
S203, the access network equipment determine the corresponding strategies that the network is sliced according to the policing parameter that the network is sliced.
When the policing parameter of network slice is Access Control Policy parameter, which is sliced according to the network
Access Control Policy parameter generate the network slice access control parameter.
When the policing parameter of network slice is scheduling controlling policing parameter, which is sliced according to the network
Scheduling controlling policing parameter, determine for for access the network slice terminal device scheduling transmission resources strategy.
When the policing parameter of network slice is bandwidth controlling strategy parameter, which is sliced according to the network
Bandwidth controlling strategy parameter, determine for for access the network slice terminal device distribute network bandwidth strategy.
In order to facilitate understanding with description, the present embodiment is described so that a network is sliced as an example, but the embodiment of the present application
It is not limited to this, the all-network in network slice systems is sliced, side provided by the embodiments of the present application can be passed through
Method is handled.
Then the policing parameter that the embodiment of the present application is sliced by setting network is handled according to the policing parameter of network slice
Network slice may be implemented the differentiation processing of network slice, be conducive to the service quality for improving network slice.
It should be noted that the equipment of the core network in the present embodiment can be certain network function (NF) in core net.
Optionally, which is NWDA, PCF, NSSF or AMF in Fig. 1.Optionally, which can also be
Another network function except current defined network function, for example, this network function is known as to be sliced control function
Energy (slice control function, SCF).
Optionally, when the equipment of the core network is a network function in addition to AMF, S202 is specifically included: the core
Net equipment sends the policing parameter that the network is sliced to the access network equipment by AMF.Correspondingly, access network equipment passes through AMF
The policing parameter that the network is sliced is received from the equipment of the core network.
Optionally, in some embodiments, the policing parameter of network slice is Access Control Policy parameter, specifically,
For access category priority.Accordingly, in S203, the access category priority which is sliced according to the network,
Determine the access control parameter of network slice.Access network equipment can send the network to terminal device by broadcast message and cut
The access control parameter of piece, in order to which terminal device carries out network insertion.
Specifically, Access Control Policy parameter includes but is not limited to: allow to access, forbid accessing, forbid accessing duration,
Forbid the probability etc. of access.Forbid arriving the duration between access next time after accessing duration expression access failure.
For example, access category priority includes high and low two grades, wherein high priority expression allows to access, low preferential
Grade indicates to forbid accessing.Assuming that when the access category priority expression of network slice allows to access, what access network equipment determined
Access control parameter also indicates that terminal device can access network.When the access category priority expression of network slice is forbidden connecing
Fashionable, the access control parameter that access network equipment determines also indicates that terminal device is forbidden accessing network.
For another example access category priority includes multiple grades, it may for example comprise priority 1, priority 2, priority 3,
The middle expression of priority 1 allows to access, and the waiting time after access failure is T1;The expression of priority 2 allows to access, and accesses and lose
Waiting time after losing is T2, T2 > T1;Priority 3 expression is forbidden accessing.Priority are as follows: 1 > priority of priority, 2 > are excellent
First grade 3.Assuming that the access category priority expression of network slice allows to access, and the waiting time after access failure is T2,
The access control parameter that then access network equipment determines also indicates that terminal device accesses the access network according to this strategy.
As a kind of implementation, S201 is specifically included: all-network slice in system is divided by the equipment of the core network
At least two access categories, and access category priority is set according at least two access category;The equipment of the core network obtains
The access category priority of network slice, the access category priority of network slice are access class belonging to network slice
Not corresponding access category priority.
Optionally, the policing parameter of network slice is to allow to access control parameter or forbid accessing control parameter.
If there are many quantity that network is sliced in system, all-network slice is divided into several access classes of negligible amounts
Not, access category priority then is set according to access category, configures access control parameter according to access category priority, in this way
The signaling overheads that access control parameter is issued to terminal device can be reduced.
It should be understood that access category priority is arranged as unit of can also being sliced by network in the equipment of the core network.The application is real
It applies example and this is not construed as limiting.
In the present embodiment, access network equipment generates access control parameter according to the access category priority that network is sliced.
For example, connecing category preferences and access control parameter one-to-one correspondence.Access network equipment is into the system message of end-point device broadcast
It may include the access control parameter of the network slice of multiple access category priority, what terminal device needed to be sliced according to network
Access category finds the access control parameter of corresponding network slice from system message.Therefore, in the access being sliced according to network
In the case that the access category priority that network is sliced is arranged in classification, the access being sliced in advance to terminal device notice network is needed
Classification, the terminal device and network slice, which are established, contract signing relationship.
Optionally, by way of static configuration, terminal device is allowed to know the access category of network slice.
For example, user is when establishing contract signing relationship with network slice, static state saves the access category of network slice.Example
Such as, the access category which is sliced is stored in the memory space in SIM card or terminal device by user.Network side is corresponding
Also the access category of network slice can be saved in user-subscribed database (such as UDM).
The operation of the static configuration of the access category of network slice is fairly simple, is easier to dispose, it is not necessary to modify current networks
Signaling.
Optionally, by way of dynamic configuration, terminal device is allowed to know the access category of network slice.
The equipment of the core network by AMF to terminal device notify the network be sliced access category, the terminal device be with
The network is sliced the terminal device for establishing contract signing relationship.
It should be understood that the access category priority being sliced by setting network, the access category being then sliced according to network are excellent
The Access Control Policy of first grade Configuration network slice, so as to realize the differentiation access control of network slice.
For example, it is assumed that the load of network slice is smaller, it is excellent higher access category can be set for network slice
First grade, for example, network slice is allowed to access more user.When the load of network slice has been expired or already close to completely negative
When load, the access category priority of network slice is at this moment reduced, for example, reducing the number of users for allowing to access network slice
Amount, or forbid accessing network slice.The service quality of network slice can be ensured in this way.
Therefore, the access category priority that the present embodiment is sliced by setting network, the access being then sliced according to network
The Access Control Policy of category preferences Configuration network slice, so as to control the number of users that network slice allows to access,
Can to a certain extent Logistics networks slice service quality.
Optionally, in some embodiments, the policing parameter of network slice is scheduling controlling policing parameter.
Specifically, the type of equipment of the core network is sliced according to the network SLA index or network slice, determines the network
The scheduling controlling policing parameter of slice.
Specifically, scheduling controlling policing parameter is dispatching priority.Wherein, higher dispatching priority is relative to lower
Dispatching priority preferentially carries out scheduling of resource.
For example, higher dispatching priority, the scheduling can be arranged for it when the SLA index of network slice is relatively low
Priority indication is preferably the user's scheduling transmission resources accessed in network slice, so that the SLA for promoting network slice refers to
Mark.
In the present embodiment, S202 is specifically included: the equipment of the core network is set by user face or control towards the access net
The scheduling controlling policing parameter that preparation gives the network to be sliced.Correspondingly, the access network equipment by user face or control plane from this
Equipment of the core network receives the scheduling controlling policing parameter of network slice.
Then the dispatching priority that the present embodiment is sliced by setting network is controlled according to the dispatching priority of network slice
Network slice scheduling of resource, can to a certain extent Logistics networks slice service quality.
Optionally, in some embodiments, the policing parameter of network slice is bandwidth controlling strategy parameter.
Specifically, the maximum bandwidth that equipment of the core network is sliced based on the network determines the bandwidth control plan of network slice
Slightly parameter.For example, the bandwidth controlling strategy parameter that the maximum bandwidth that the network is sliced is sliced as the network.Access net is set
After the standby bandwidth controlling strategy parameter for receiving network slice, in the terminal device bandwidth allocation to access network slice
When, it is less than or is equal to the maximum bandwidth.
In the present embodiment, S202 is specifically included: the equipment of the core network is set by user face or control towards the access net
The bandwidth controlling strategy parameter that preparation gives the network to be sliced.
The size of the bandwidth controlling strategy parameter instruction bandwidth of network slice.
Therefore, the bandwidth controlling strategy parameter that the present embodiment is sliced by setting network, can be sliced with flexible configuration network
Amount of bandwidth, can to a certain extent Logistics networks slice service quality.
Optionally, equipment of the core network, should to access network equipment notice when determining the policing parameter of network slice for the first time
The policing parameter of network slice.
Optionally, equipment of the core network is logical to access network equipment in the policing parameter of change (or adjustment) network slice
Know that the network is sliced updated policing parameter.
For example, equipment of the core network is notified to access network equipment when the access category priority being sliced to the network degrades
Access category priority after network slice reduction.For another example when the access category priority upgrading being sliced to the network,
Equipment of the core network to access network equipment notify the network slice rise it is low after access category priority.
The embodiment of the present application can in the policing parameter of the priority or change network slice that determine network slice for the first time
Notice access network equipment is cut in order to which access network device is configured according to the policing parameter that network is sliced with Logistics networks
The service quality of piece.
It is above-mentioned it is found that scheme provided by the embodiments of the present application can be applied to access control scene, under this scene,
The differentiation access of network slice may be implemented by the scheme of the application.Scheme provided by the embodiments of the present application can also be applied
The scene that scheduling of resource control is carried out after terminal equipment access network can by the scheme of the application under this scene
To realize the differentiation scheduling of network slice, differentiation band width configuration can also be realized.
The embodiment of the present application in order to better understand specifically describes provided by the embodiments of the present application below in conjunction with Fig. 3 to Fig. 7
Specific implementation of the scheme in access control scene and scheduling controlling scene.
It is in the following embodiments, preferential as access category using Access Control Policy parameter in order to facilitate understanding with description
For grade, it is described so that scheduling controlling policing parameter is dispatching priority as an example.
(1) access control scene.
The process of terminal equipment access network is substantially are as follows: terminal device obtains access control ginseng from access network equipment (RAN)
Number;Then, network is accessed according to the access control parameter.
For example, access control parameter includes but is not limited to: access barred inspection instruction, Boolean type parameter can be set to
Allow to access or does not allow to access;It is also possible to access barred coefficient (BarringFactor), indicates the probability of access barred,
With access barred time (BarringTime), average disable time is indicated, etc..
In this scene, method provided by the embodiments of the present application includes the following steps:
1) equipment of the core network determines the access category of network slice.
Optionally, equipment of the core network obtains the access category of network slice by predefined algorithm.
Specifically, predefined algorithm is to determine access category according to the type that network is sliced, and is signed according to network slice
SLA index request is signed, or sets access category according to the slicing parameter of managed network element configuration.
Optionally, equipment of the core network obtains the access category of network slice according to the analysis of big data algoritic module.
For example, equipment of the core network to NWDAF subscribe to or requirement analysis network be sliced access category, equipment of the core network according to
The analysis result of NWDAF feedback determines the access category of network slice.
2) equipment of the core network determines the access category priority of network slice according to the access category that network is sliced.
Optionally, equipment of the core network determines the access category priority of network slice by predefined algorithm.
Specifically, predefined algorithm is the access category that network slice is determined according at least one of following factor factor
Priority: the type of network slice, the SLA index request that network slice is signed, managed network element are cutting for network slice configuration
Piece parameter.
Optionally, it is preferential to obtain the access category that network is sliced according to the analysis of big data algoritic module for equipment of the core network
Grade.
For example, the access category priority that equipment of the core network is subscribed to NWDAF or requirement analysis network is sliced, core net are set
The standby analysis result according to NWDAF feedback determines the access category priority of network slice.
The access category priority of the network slice of different access categories is not exactly the same.For example, different access categories
Corresponding different access category priority.For another example two or more access categories correspond to the same priority.
The complexity of the user access network of the network slice of different access category priority is different.For example, access class
The user of the other lower network slice of priority forbids accessing network slice, the use of the higher network slice of access category priority
Family allows to access network slice.For another example the user of the higher network slice of access category priority is excellent relative to access category
User's priority access network slice of the first higher network slice of grade.
3) the access category priority that equipment of the core network notifies the network to be sliced to access network equipment.
4) the access category priority that access network equipment is sliced according to the network generates the access control ginseng of network slice
Number.
The access control parameter that access network equipment is sliced to the end-point device broadcast network, in order to which terminal device is according to connecing
Enter the process that control parameter carries out access network.
In this scene, needing to be configured to the access category that network is sliced to establish with network slice in advance has signing
On the terminal device of relationship.
Optionally, the access category of network slice is in static configuration to terminal device.
For example, user is when establishing contract signing relationship with network slice, static state saves the access category of network slice.Example
Such as, the access category which is sliced is stored in the memory space in SIM card or terminal device by user.Network side is corresponding
Also the access category of network slice can be saved in user-subscribed database (such as UDM).
The operation of the static configuration of the access category of network slice is fairly simple, is easier to dispose, it is not necessary to modify current networks
Signaling.
Optionally, the access category of network slice is in dynamic configuration to terminal device.
Specifically, Fig. 3 is the schematic diagram on the access style to terminal device of dynamic configuration network slice.It will in Fig. 3
Equipment of the core network is denoted as SCF, and access network equipment is denoted as RAN, and terminal device is denoted as UE.As shown in figure 3, this method includes such as
Lower process.
S301, SCF determine the access category of network slice.
Optionally, SCF obtains the access category of network slice by predefined algorithm.
Specifically, predefined algorithm is to determine access category according to the type that network is sliced, and is signed according to network slice
SLA index request is signed, or sets access category according to the slicing parameter of managed network element configuration.
Optionally, SCF obtains the access category of network slice according to the analysis of big data algoritic module.
As shown in figure 3, the access category that SCF is subscribed to NWDAF or requirement analysis network is sliced, SCF are fed back according to NWDAF
Analysis result determine network slice access category.
For example, NWDAF can directly feed back the access category of specified slice, either the specified slice of feedback need to increase or
Reduce the instruction information of access priority.
The access category that network is sliced is sent to UE by AMF by S302, SCF.
Firstly, AMF obtains the access category that network is sliced from SCF, the access category that then network is sliced by AMF is sent
Give the UE that network slice establishes contract signing relationship.
Optionally, as a kind of implementation, AMF subscribes to network to SCF and is sliced access category (slice access
Category it) configures.If a network slice access style change, SCF be notified that the AMF network slice newly
Access category.
In this implementation, AMF can send the access that the network got from SCF is sliced to UE in several ways
Classification.
The UE network is notified to be sliced for example, AMF updates (UE configuration update) process by the configuration of UE
Access category.
For another example AMF is registered (registration) or register update (registration in UE next time
Update during), the access category that network is sliced is sent to the UE.For example, in the login request message for receiving UE transmission
Afterwards, the access category of network slice is carried in registration reply message.
It should be understood that AMF is sent out to the UE for establishing contract signing relationship with network slice for the access category of network slice
The access category for giving the network to be sliced.It should also be understood that can also send this while sending the access category that network is sliced to UE
The mark of network slice, i.e., the information being sliced in systems for the unique identification network.
It is the network function newly defined that the first above-mentioned implementation, which is suitable for SCF, alternatively, SCF for NSSF, NWDA or
Scene.
Optionally, as second of implementation, AMF does not actively obtain the access category that network is sliced from SCF, does in UE
During registering (registration) or register update (registration update), when AMF will be replied to UE
When registration response (registration accept) message, SCF is first accessed, during accessing SCF, acquisition allows the UE
The network of access is sliced corresponding access category, and then AMF sends registration response (registration accept) to UE and disappears
Breath, the registration respond the access category that the network slice obtained from SCF is carried in (registration accept) message.
It should be understood that second of implementation is suitable for the scene that SCF is PCF.Because in the registration of UE
(registration) or during register update (registration update), AMF natively needs logical to PCF
Cross Npcf_AMPolicyControl get request registration corresponding strategies, in the second implementation, the access of network slice
Classification carries in the registration policy that PCF replys AMF.
Fig. 4 is the schematic flow chart that communication means provided by the embodiments of the present application is applied in access control scene.?
Equipment of the core network is denoted as SCF in Fig. 4, access network equipment is denoted as RAN, terminal device is denoted as UE.This method includes as follows
Process.
S401, SCF determine access category (Access category, AC) priority of network slice.
Firstly, SCF determines the access category of network slice.Specifically, net is determined according to the method described above in association with Fig. 3
The access category of network slice, which is not described herein again.
The access category that SCF is sliced according to network obtains the access category grade of network slice.
Optionally, SCF can obtain the access category priority of network slice by predefined algorithm.
For example, predefined algorithm refers to determining that the access category of network slice is excellent according at least one of following factor
First grade: the type of network slice, the SLA index request that network slice is signed, managed network element are the slice of network slice configuration
Parameter.
Optionally, SCF can obtain the access category priority of network slice according to the analysis of big data algoritic module.
As shown in figure 4, SCF from NWDAF subscribe to or requirement analysis network be sliced access category priority, SCF according to
The analysis result that NWDAF is provided determines the access category priority of network slice.
Specifically, SCF network can determine the access category of network slice according to the real-time status that a network is sliced
Priority.
For example, when the load of network slice expire or when already close to full load, SCF reduces the network and is sliced pair
The access category priority answered, so that accessing the number of users growth rate of network slice reduces.
For another example needing big flow when a network slice has temporal events in certain geographic area or facing big
When measuring user's access, SCF temporarily can improve the network in the geographic area and be sliced corresponding access category priority.
Optionally, in some embodiments, the access category priority of network slice includes two priority: high priority
With low priority, wherein high priority expression allows to access, and low priority expression is forbidden accessing.
Optionally, in some embodiments, the access category priority of network slice includes N number of priority, and priority is high
Low sequence is that 1 > priority of priority 2 > ... > priority N-1 > priority N, N are positive integer.
For example, the user that access category priority is the network slice of priority 1 relative to access category priority is excellent
The user of the network slice of first grade 2 is easier to access network.Such as smaller access barred coefficient, when shorter access barred
Between.
S402, SCF send the access category priority that network is sliced to AMF.
SCF sends configuration message to AMF, which is used to indicate the access category of the network slice determined in S401
Priority includes the slice mark and the access category priority of network slice of network slice in the configuration message.
For example, the slice of network slice is identified as S-NSSAI or NSI.
Optionally, it can also include the access category configuration relevant information of network slice in the configuration message, such as access class
Other priority, access category ID, the corresponding slice mark of access category, corresponding access request type, or it is DN corresponding
Claim, QoS, App ID wait one or several combinations of the above parameter.
It optionally, can also include that the network is sliced corresponding tracking area list (Tracking Area in the configuration message
List, TA list) and corresponding public land mobile network (the Public Land Mobile of network slice
Network, PLMN) ID.
Optionally, in some embodiments, if the access category priority of network slice X changes, SCF to
AMF sends configuration message, which indicates the access category priority after the update of network slice X, the configuration message
The access category priority of middle the slice mark (slice ID) for carrying network slice X and network slice X.
For example, the slice of network slice X is identified as S-NSSAI or NSI.It optionally, can be in the configuration message
Access category including network slice X configures relevant information.It optionally, can also include that the network is sliced X in the configuration message
The corresponding TA list and corresponding PLMN ID of network slice X.
Optionally, in some embodiments, AMF can subscribe to network with SCF and be sliced access category priority (slice
Access category priority) event.In this way, the access category that SCF can be sliced to AMF notice network in real time is preferential
Grade.For example, after determining the access category priority that a network is sliced for the first time, alternatively, in the access category of network slice
After priority changes, SCF sends the newest access category priority that the network is sliced to AMF.
S403, AMF send the access category priority that network is sliced to access network equipment (RAN).
Specifically, AMF is configured by AMF updates (AMF configuration update) message to RAN transmission network
The access category priority of slice carries the slice mark and network slice of network slice in the AMF configuration update message
Access category priority.
Optionally, access style configuration relevant information can also be carried in the AMF configuration update message, can also include should
Network is sliced corresponding TA list and PLMN ID.
Specifically, AMF network is identified according to the slice that the network is sliced, and selection has been set up the RAN of NG interface, then
The AMF configuration update message is sent to the RAN.
The interface that NG interface is communicated between access network equipment (RAN) and AMF.
It optionally, in some embodiments, should when AMF is intended to send the access category priority that network is sliced to RAN
RAN not yet establishes NG interface, that is, at this moment AMF can not be communicated with RAN, and in this case, AMF is established subsequent with RAN
The access category priority that network is sliced is sent to RAN during NG interface, for example, AMF connects in the NG for receiving RAN transmission
Mouth is established after request (NG setup request) message, is responded (NG setup response) to RAN transmission NG foundation and is disappeared
Breath, the NG establish in response message the access category priority for carrying network slice.Correspondingly, RAN is established by parsing NG and is rung
Message is answered, the access category priority of network slice can be obtained.
The access control parameter of network slice is arranged in the access category priority that S404, RAN are sliced according to network.
RAN configures the access control parameter of network slice based on the access category that network is sliced.Correspondingly, terminal is set
Alternative one network to be accessed slice determines the access control ginseng of network slice according to the access category that the network is sliced
Number accesses network slice then according to the access control parameter.
RAN broadcasts the access control parameter by broadcast message (system information).Correspondingly, terminal device
(UE) broadcast message of RAN transmission is received.When UE needs to initiate the connection request, according to the network for having built up contract signing relationship
The access category of slice searches the corresponding access control parameter of the access category, then from the access control parameter received
According to the access control parameter, decide whether to access network slice, and how to access.UE connects according to access control parameter
The process for entering network slice is the prior art, and repeats no more herein.
Optionally, in some embodiments, AMF can also reconfigure the access strategy of UE, such as according to the instruction of SCF
Network Slice Selection Policy (NSSP), instruction need the network accessed slice to be prohibited to access when UE discovery
When, another network slice can choose for application accordingly, if default network is sliced, avoiding UE from being in can not be serviced
State.
It should be understood that conventional mobile network is accessing control parameter (access barring config) by broadcast of eating dishes without rice or wine,
According to the configuration of access control parameter after terminal device reception, accessed.In the prior art, network side is by configuring access control
Parameter processed can permit or refuse user's access, to avoid network congestion generation.
And scheme provided by the present application can also realize the difference of network slice other than user's differentiation may be implemented
Alienation processing.Assuming that the load of network slice X1 is larger, the load that network is sliced X2 is smaller, then by the access class of network slice X1
Other priority is set as low priority, high priority will be set by the access category priority of network slice X2, thus at end
During terminating network, so that the user of access network slice X1 is less, the user of access network slice X2 is more, in this way may be used
To effectively improve the service quality of network slice.
Network side can adjust the corresponding priority of access category of network slice by dynamic, i.e., what network was sliced connects
Enter category preferences, differentiation control is carried out to the quantity of different network slice access terminal equipments.
Therefore, the present embodiment carries out the access control of differentiation by being sliced to heterogeneous networks, to control heterogeneous networks
It is sliced the number of users that can be accessed, and then the service quality of network slice can be improved to a certain extent.
Communication means provided by the embodiments of the present application is applied to the specific implementation in the scene of access control by above description,
The specific implementation being applied to communication means provided by the embodiments of the present application in the scene of scheduling controlling is described below.
(2) scene of scheduling controlling.
After the scene of scheduling controlling refers to terminal equipment access network, network side is that terminal device dispatches uplink and downlink money
Source scene.
The present embodiment carries out the scheduling controlling of differentiation by being sliced to heterogeneous networks, to influence heterogeneous networks slice to working as
The scheduling of resource of the preceding UE in connected state.
Equipment of the core network determines the dispatching priority of network slice, then by way of user face or control plane to connecing
Log equipment notifies the dispatching priority of network slice.
Fig. 5 is the schematic diagram provided by the embodiments of the present application for being sliced to network and carrying out the method for differentiation scheduling controlling.?
Equipment of the core network is denoted as SCF in Fig. 5, access network equipment is denoted as RAN, terminal device is denoted as UE.In the present embodiment, core
The dispatching priority that heart net equipment is sliced by way of user face to access network equipment notice network.This method includes as flowed down
Journey.
S501, SCF determine the dispatching priority of network slice.
Optionally, SCF obtains the dispatching priority between multiple network slices by predefined algorithm.
Optionally, SCF obtains the dispatching priority between multiple network slices according to the analysis of big data algoritic module.
As shown in figure 5, the dispatching priority that SCF is subscribed to NWDAF or requirement analysis network is sliced, SCF are anti-according to NWDAF
The analysis of feedback is as a result, determine the dispatching priority of network slice.
For example, service-level agreement (Service-Level Agreement, SLA) index of network slice is relatively low
When, it should the dispatching priority of network slice is improved, so that the user for accessing network slice is easier to obtain scheduling money
Source, to promote the SLA of network slice.Vice versa.
S502, SCF send the dispatching priority that network is sliced to SMF.
The dispatching priority that SCF can be sliced using the following two kinds mode to SMF notice network.
First way: the dispatching priority that SCF notifies SMF network to be sliced by PCF.
For example, PCF, which is sliced priority by the network of SCF, subscribes to (slice priority subscribe) interface,
The notification message of the dispatching priority variation of network slice is subscribed on SCF, can provide the mark of network slice in subscribing interface
(slice ID).It optionally, can also include that network is sliced corresponding TA list and PLMN ID in subscribing interface.
For another example SCF can send notice to PCF and disappear when the dispatching priority for the network slice that PCF is subscribed to needs to adjust
It ceases, the dispatching priority of network slice adjusted and the mark of network slice is carried in the notification message.Optionally,
The network can also be carried in the notification message is sliced corresponding TA list.
After PCF receives the notification message of SCF transmission, being sent by Npcf_SMPolicyControl interface to SMF should
Notification message.For example, the notification message notifies SMF, the corresponding session of one or more UE adjusted under specified TA is needed
The priority to be adjusted such as adjusts corresponding qos parameter.
It should be understood that tracking area (TrackingArea) is the concept that the location management that LTE system is UE is newly set up.At UE
When idle state, core network is able to know that the tracking area where UE, while when the UE needs being in idle condition are paged
When, it is necessary to it is paged in all cells for the tracking area that UE is registered.TA is the configuration of cell-level, and multiple cells can configure
Identical TA, and a cell can only belong to a TA.
The second way: the dispatching priority that SCF directly notifies SMF network to be sliced.
For example, SMF, which is sliced priority by the network of SCF, subscribes to (slice priority subscribe) interface,
The notification message of the dispatching priority variation of network slice is subscribed on SCF, can provide the mark of network slice in subscribing interface
(slice ID).It optionally, can also include that network is sliced corresponding TA list and PLMN ID in subscribing interface.
For another example SCF can send notice to SMF and disappear when the dispatching priority for the network slice that SMF is subscribed to needs to adjust
It ceases, the dispatching priority of network slice adjusted and the mark of network slice is carried in the notification message.Optionally,
The network can also be carried in the notification message is sliced corresponding TA list.
By taking a network is sliced as an example, when SCF determines the dispatching priority of network slice for the first time, alternatively, working as SCF pairs
After the dispatching priority of network slice is adjusted, all the dispatching priority that network is sliced can be sent to SMF.
S503, SMF send N4 conversation informing (N4session modification) message, the N4session to UPF
The dispatching priority of network slice is carried in modification message.
If SMF is notification message (the slice priority for directly getting the dispatching priority that network is sliced from SCF
When notification), then needs to select the specified session of the specified UE under specified TA, pass through N4session
The corresponding UPF of modification message informing, modifies the priority of corresponding session, for example, notify new qos parameter,
Or notice UPF promotes QoS.It should be understood that SMF is managed by session (session) granularity of user.At this moment N4 session
What is carried in notification message is qos parameter, which determined according to the dispatching priority of network slice.Priority is high
Slice, the high qos parameter of use priority.
If SMF is when getting the notification message of the dispatching priority of network slice from PCF, with PCF in the prior art
It is similar to trigger PDU session motification, it is logical to UPF by N4session modification according to its instruction
The dispatching priority of Hownet network slice.
S504, UPF send message to RAN, and the dispatching priority of network slice is carried in the message.
UPF adjusts the scheduling of the correspondence session of corresponding UE according to the N4session modification message of SMF
Priority.
For example, downlink data can be indicated by carrying the 5QI of high priority QoS in data packet head, Lai Tongzhi RAN.It is right
In upstream data, can be changed according to reflective QoS mechanism by the 5QI of the 5QI variation instruction uplink of downlink.
S504, RAN are eating dishes without rice or wine correspondingly to be dispatched according to the dispatching priority of the network slice got.
For example, RAN is indicated according to the 5QI in data packet head, corresponding qos parameter can be obtained, is joined according to corresponding QoS
Number is eating dishes without rice or wine to be dispatched accordingly.
Fig. 6 is another signal provided by the embodiments of the present application for being sliced to network and carrying out the method for differentiation scheduling controlling
Figure.Equipment of the core network is denoted as SCF in Fig. 6, access network equipment is denoted as RAN, terminal device is denoted as UE.In the present embodiment
In, equipment of the core network is by way of control plane to the dispatching priority of access network equipment notice network slice.This method includes
Following process.
S601, SCF determine the dispatching priority of network slice.
S601 is identical as S501, specifically describes the description in part S501, which is not described herein again.
The dispatching priority that S602, SCF are sliced to AMF notice network.
The dispatching priority that SCF can notify network to be sliced by the following two kinds mode to AMF.
First way: the dispatching priority that SCF notifies network to be sliced by PCF to AMF.
PCF can subscribe to the variation of slice priority by the slice priority subscribe interface of SCF on SCF
Notification message, slice ID can be provided in subscribing interface, can also include optionally corresponding TA list, and corresponding
PLMN ID.
When the dispatching priority adjustment that the network of subscription is sliced, SCF can send a notification message to PCF, in notification message
Carry the mark of network slice and the dispatching priority of network slice.
It optionally, further include that network is sliced corresponding TA list in notification message.
PCF is sent a notification message by Npcf_AMpolicy_control interface to AMF, carries net in the notification message
The dispatching priority of network slice.Optionally, network can also be carried in the notification message is sliced corresponding TA list.
The second way: the dispatching priority that SCF is directly sliced to AMF notice network.
For example, AMF subscribes to Nscf_AMpolicy_control notice on SCF.When the scheduling that the network of subscription is sliced is excellent
When first grade adjusts, SCF can send a notification message to PCF, and the mark of network slice and the tune of network slice are carried in notification message
Spend priority.It optionally, further include that network is sliced corresponding TA list in notification message.
By taking network is sliced as an example, when SCF determines the dispatching priority of network slice for the first time, or the network is cut
After the dispatching priority adjustment of piece, SCF sends the dispatching priority for being used to indicate network and being sliced to PCF or AMF.
S603, AMF send the message of dispatching priority to RAN network element.
AMF is sent after receiving the notification message of dispatching priority of network slice by the NG interface between RAN
AMF configuration updates (AMF configuration update) message, which carries the scheduling of network slice
Priority.
If the slice ID that AMF is received is NSI, need to be converted into the corresponding S-NSSAI of slice.It should be understood that
Slice ID has different identification means in different places, can be by NSI or S-NSSAI, between CN and RAN in CN
It is indicated using S-NSSAI.
S604, RAN carry out scheduling of resource according to the AMF configuration update message received from AMF.
RAN obtains the dispatching priority of network slice, then, RAN is according to network by parsing AMF configuration update message
The dispatching priority of slice and session (session) qos parameter of UE, determine resource dispatching strategy.
For example, the UE of the higher network slice of dispatching priority is preferential in the identical situation of session qos parameter
It is scheduled.
The dispatching priority that the embodiment of the present application is sliced by setting network realizes the higher network slice of dispatching priority
User preferentially be assigned scheduling resource.
It should be understood that the dispatching priority being sliced by setting network, can execute network to the UE for having accessed network and cut
Differentiation processing between piece.
CN can be by controlling RAN to the resource allocation of different slices come the SLA of the different slices of management of differentiation.CN is not
Properly directly manage the wireless frequency spectrum distribution of RAN, it is possible to be provided indirectly by the limitation of control slice-level bandwidth/rate
Source control.
Fig. 7 is another signal provided by the embodiments of the present application for being sliced to network and carrying out the method for differentiation scheduling controlling
Figure.This method includes following process.
S701, SCF determine the bandwidth controlling strategy parameter of network slice.
Optionally, SCF determines the bandwidth controlling strategy parameter of network slice by predefined algorithm.
Optionally, SCF obtains bandwidth controlling strategy parameter according to the analysis of big data algoritic module.
As shown in Figure 7, the bandwidth controlling strategy parameter that SCF is subscribed to from NWDAF or requirement analysis network is sliced, SCF root
According to the analysis of NWDAF feedback as a result, determining the bandwidth controlling strategy parameter of network slice.
For example, can determine bandwidth controlling strategy parameter according to following rule:, can be with when the SLA of network slice X is relatively low
Increase the network bandwidth of network slice X, alternatively, limiting the network bandwidth of other networks slice.Such bandwidth control strategy
Parameter can ensure that network slice X can obtain Internet resources, to improve the SLA of network slice X.
Specifically, SCF or NWDAF can be reported by the bandwidth statistics that UPF or network are sliced, to determine that network is cut
The bandwidth controlling strategy parameter of piece.
S702, SCF send a notification message to AMF, and the bandwidth controlling strategy parameter of network slice is carried in the notification message.
Specifically, SCF can send the notification message to AMF by the following two kinds mode.
First way: SCF sends the notification message to AMF by PCF.
SCF sends the notification message to PCF, and PCF sends the notification message to AMF.
The second way: SCF directly sends the notification message to AMF.
Specifically, SCF needs to select corresponding AMF, by the slice BW change interface notification of AMF, specifies and corresponds to
Slice ID, optionally can also include corresponding TA list and corresponding PLMN ID.
By taking network is sliced as an example, when SCF determines the bandwidth controlling strategy parameter of network slice for the first time, or to this
After the bandwidth controlling strategy parameter adjustment of network slice, SCF sends the bandwidth control for being used to indicate network and being sliced to PCF or AMF
The notification message of policing parameter processed.
S703, AMF send the bandwidth controlling strategy parameter that network is sliced to RAN.
When AMF receives the message that PCF or SCF is sent, according to the slice ID carried in the information, optionally may be used also
To determine corresponding RAN comprising corresponding TA list, the bandwidth controlling strategy parameter that network is sliced then is sent to the RAN.
Optionally, update (AMF configuration update) message is configured by AMF to cut to RAN transmission network
The bandwidth controlling strategy parameter of piece.
Optionally, the bandwidth controlling strategy parameter that network is sliced is sent to the RAN by over load message.
Specifically, can carry slice ID in AMF configuration update message or over load message (is S- here
NSSAI) available total bandwidth, is also possible to relative value, as the bandwidth of slice can become the percent how many of current bandwidth
(120% is to increase bandwidth dosage, and 80% is to reduce bandwidth dosage)
The bandwidth controlling strategy parameter that RAN is sliced according to the network received, for the terminal device for accessing network slice
Bandwidth allocation.
RAN is in the terminal device bandwidth allocation to access network slice, it is ensured that all under corresponding network slice
The summation for the bandwidth that terminal device is distributed is no more than the total bandwidth of the network fragment.
Total bandwidth is also possible to the relative scale value between slice, is such as expressed as the bandwidth accounting in entire base station.
The bandwidth controlling strategy parameter that the embodiment of the present application is sliced by setting network, the bandwidth being then sliced according to network
Controlling strategy parameter handles network slice, and the differentiation processing of network slice may be implemented, be conducive to the clothes for improving network slice
Business quality.
Described above is communication means provided by the embodiments of the present application, and communication provided by the embodiments of the present application is described below
Equipment.
Fig. 8 is the schematic block diagram of communication device 800 provided by the embodiments of the present application.The communication device 800 includes as follows
Unit.
Processing unit 810, for obtaining the policing parameter of network slice, the policing parameter of network slice includes following ginseng
At least one of number: Access Control Policy parameter, scheduling controlling policing parameter and bandwidth controlling strategy parameter;
Transmission unit 820 sends the policing parameter that the network is sliced for being sliced corresponding access network equipment to the network,
So as to the access network equipment according to the policing parameter that the network is sliced determine the network slice corresponding strategies.
Optionally, in some embodiments, which is used for, by system all-network slice be divided into
Few two access categories, and access category priority is set according at least two access category;Obtain the plan of network slice
Slightly parameter, the policing parameter of network slice are access category priority corresponding to access category belonging to network slice.
Optionally, in some embodiments, transmission unit 820 is also used to, and notifies connecing for network slice to terminal device
Enter classification, which is the terminal device that contract signing relationship is established with network slice.
Optionally, in some embodiments, the policing parameter of network slice is to allow to access control parameter or forbid connecing
Enter control parameter.
Optionally, in some embodiments, which is used for, by access and mobile management function to ps domain AMF to
The access network equipment sends the policing parameter of network slice.
Optionally, in some embodiments, which is used for, when the policing parameter of network slice becomes
When more, the policing parameter after network slice change is notified to the access network equipment.
Optionally, in some embodiments, which is used for, and is obtained by network data analysis function NWDAF
The policing parameter of network slice.
Optionally, in some embodiments, which is used for, and sends a notification message to the access network equipment, should
The policing parameter of network slice and the slice mark of network slice are carried in notification message.
Optionally, which further includes receiving unit 830, such as receiving analysis result from NWDAF.
It should be understood that can correspond to the core in above method embodiment according to communication device 800 provided by the embodiments of the present application
Heart net equipment, and above and other operation and/or function of each unit in communication device 800 is respectively in order to realize Fig. 2
The corresponding process of each method into Fig. 7, for sake of simplicity, details are not described herein.
Fig. 9 is the schematic block diagram of another communication device 900 provided by the embodiments of the present application.The communication device 900 includes
Processor 910, memory 920 and transceiver 930, for storing instruction, processor 910 is for reading memory for memory 920
The instruction of 920 storages, the execution to the instruction stored in memory 920 is so that processor 910 is used to execute in foregoing embodiments
The movement that processing unit 810 executes, so that transceiver 930 is used to execute the movement that transmission unit 820 executes in foregoing embodiments.
Figure 10 is the schematic block diagram of another communication device 1000 provided by the embodiments of the present application.The communication device 1000 packet
It includes such as lower unit.
Receiving unit 1010, for receiving the policing parameter that network is sliced, the strategy of network slice from equipment of the core network
Parameter includes at least one of following parameter: Access Control Policy parameter, scheduling controlling policing parameter and bandwidth control strategy ginseng
Number;
Processing unit 1020, the policing parameter for being sliced according to the network determine the corresponding strategies of network slice.
Optionally, in some embodiments, the policing parameter of network slice is Access Control Policy parameter;
Processing unit 1020 is used for, and according to the Access Control Policy parameter that the network is sliced, determines connecing for network slice
Enter control parameter.
Optionally, in some embodiments, the policing parameter of network slice is to allow to access control parameter or forbid connecing
Enter control parameter.
Optionally, in some embodiments, processing unit 1020 is used for, and is joined according to the Access Control Policy of network slice
Number generates the access control parameter of network slice;
Further include: transmission unit 1030 broadcasts the message for sending to terminal device, carries the network in the broadcast message
The access control parameter of slice, the terminal device and network slice, which are established, contract signing relationship.
Optionally, in some embodiments, the policing parameter of network slice is scheduling controlling policing parameter;Processing unit
1020 are used for, and according to the scheduling controlling policing parameter that the network is sliced, are determined as accessing the terminal device scheduling of network slice
The strategy of resource.
Optionally, in some embodiments, the policing parameter and bandwidth controlling strategy parameter of network slice;Processing unit
1020 are used for, and join according to the bandwidth control strategy of network slice, are determined as accessing the terminal device distribution band of network slice
Wide strategy.
Optionally, in some embodiments, receiving unit 1010 is used for, by access and mobile management function to ps domain AMF from
The equipment of the core network receives the policing parameter of network slice.
Optionally, in some embodiments, receiving unit 1010 is used for, when the policing parameter of network slice changes
When, the policing parameter after network slice change is received from the equipment of the core network.
Optionally, in some embodiments, receiving unit 1010 is used for, and receives notification message from the equipment of the core network, should
The policing parameter of network slice and the slice mark of network slice are carried in notification message.
It should be understood that can correspond to connecing in above method embodiment according to communication device 1000 provided by the embodiments of the present application
Log equipment, and above and other operation and/or function of each unit in communication device 1000 is respectively in order to realize Fig. 2
The corresponding process of each method into Fig. 7, for sake of simplicity, details are not described herein.
Figure 11 is the schematic block diagram of another communication device 1100 provided by the embodiments of the present application.The communication device 1100 packet
Processor 1110, memory 1120 and transceiver 1130 are included, for storing instruction, processor 1110 is for reading for memory 1120
The instruction that memory 1120 stores, the execution to the instruction stored in memory 1120 is so that processor 1110 is above for executing
The movement that processing unit 1020 executes in embodiment, so that transceiver 1130 is for executing receiving unit 1010 in foregoing embodiments
The movement executed with transmission unit 1030.
The embodiment of the present application also provides a kind of communication device 1200, which can be terminal device can also be with
It is chip.The communication device 1200 can be used for executing the movement as performed by terminal device in above method embodiment.
When the communication device 1200 is terminal device, Figure 12 shows a kind of structural representation of the terminal device of simplification
Figure.It is convenient to be easy to understand and illustrate, Tu12Zhong, terminal device with mobile phone as an example.As shown in figure 12, terminal device includes place
Manage device, memory, radio circuit, antenna and input/output unit.Processor is mainly used for communication protocol and communication number
According to being handled, and terminal device is controlled, executes software program, the data etc. of processing software program.Memory master
It is used to store software program and data.Radio circuit is mainly used for the conversion of baseband signal and radiofrequency signal and believes radio frequency
Number processing.Antenna is mainly used for the radiofrequency signal of transceiving electromagnetic waveshape.Input/output unit, such as touch screen, display screen,
Keyboard etc. is mainly used for receiving the data of user's input and to user's output data.It should be noted that the end of some types
End equipment can not have input/output unit.
When needing to send data, after processor carries out Base-Band Processing to sent data, output baseband signal is to penetrating
Radiofrequency signal will be passed through antenna in the form of an electromagnetic wave to outgoing after baseband signal progress radio frequency processing by frequency circuit, radio circuit
It send.When there is data to be sent to terminal device, radio circuit receives radiofrequency signal by antenna, and radiofrequency signal is converted to base
Band signal, and baseband signal is exported to processor, baseband signal is converted to data and handled the data by processor.
For purposes of illustration only, illustrating only a memory and processor in Figure 12.In actual terminal device product, may exist one
A or multiple processors and one or more memories.Memory is referred to as storage medium or storage equipment etc..Storage
Device can be to be arranged independently of processor, is also possible to be integral to the processor together, the embodiment of the present application is without limitation.
In the embodiment of the present application, can by with transmission-receiving function antenna and radio circuit be considered as the transmitting-receiving of terminal device
Processor with processing function is considered as the processing unit of terminal device by unit.As shown in figure 12, terminal device includes transmitting-receiving
Unit 1201 and processing unit 1202.Transmit-Receive Unit is referred to as transceiver, transceiver, R-T unit etc..Processing unit
It is properly termed as processor, handles veneer, processing module, processing unit etc..Optionally, reality will can be used in Transmit-Receive Unit 1201
The device of existing receive capabilities is considered as receiving unit, and it is single that the device in Transmit-Receive Unit 1201 for realizing sending function is considered as transmission
Member, i.e. Transmit-Receive Unit 1201 include receiving unit and transmission unit.Transmit-Receive Unit be referred to as sometimes transceiver, transceiver,
Or transmission circuit etc..Receiving unit is referred to as receiver, receiver or reception circuit etc. sometimes.Transmission unit is sometimes
It is properly termed as transmitter, transmitter or transmit circuit etc..
For example, in one implementation, Transmit-Receive Unit 1201 is used to execute terminal equipment side in the step 302 in Fig. 3
Reception operation and/or Transmit-Receive Unit 1201 be also used to execute other transceiving steps of terminal equipment side in the embodiment of the present application.
For another example in another implementation, Transmit-Receive Unit 1201 is used to execute in Fig. 4 terminal equipment side in S404
It receives operation and/or Transmit-Receive Unit 1202 is also used to execute other transceiving steps of terminal equipment side in the embodiment of the present application.
When the communication device 1200 is chip, which includes Transmit-Receive Unit and processing unit.Wherein, Transmit-Receive Unit can
To be imput output circuit, communication interface;Processing unit is the processor integrated on the chip or microprocessor or integrates
Circuit.
The embodiment of the present application also provides a kind of computer readable storage medium, is stored thereon with computer program, the calculating
Machine program makes the computer realize equipment of the core network side in embodiment of the method above method when being computer-executed, or connect
The method of the method or terminal equipment side of log equipment side.
The embodiment of the present application also provides a kind of computer program product comprising instruction, which makes when being computer-executed
It obtains the computer and realizes the method for equipment of the core network side or the method for access network equipment side in embodiment of the method above, or eventually
The method of end equipment side.
The explanation of related content and beneficial effect can refer to provided above in any communication device of above-mentioned offer
Corresponding embodiment of the method, details are not described herein again.
It should be understood that processor as mentioned in the embodiments of the present invention can be central processing unit (Central
Processing Unit, CPU), it can also be other general processors, digital signal processor (Digital Signal
Processor, DSP), it is specific integrated circuit (Application Specific Integrated Circuit, ASIC), existing
At programmable gate array (Field Programmable Gate Array, FPGA) or other programmable logic device, discrete
Door or transistor logic, discrete hardware components etc..General processor can be microprocessor or the processor can also
To be any conventional processor etc..
It should also be understood that memory as mentioned in the embodiments of the present invention can be volatile memory or non-volatile memories
Device, or may include both volatile and non-volatile memories.Wherein, nonvolatile memory can be read-only memory
(Read-Only Memory, ROM), programmable read only memory (Programmable ROM, PROM), erasable programmable are only
Read memory (Erasable PROM, EPROM), electrically erasable programmable read-only memory (Electrically EPROM,
) or flash memory EEPROM.Volatile memory can be random access memory (Random Access Memory, RAM), use
Make External Cache.By exemplary but be not restricted explanation, the RAM of many forms is available, such as static random-access
Memory (Static RAM, SRAM), dynamic random access memory (Dynamic RAM, DRAM), synchronous dynamic random-access
Memory (Synchronous DRAM, SDRAM), double data speed synchronous dynamic RAM (Double Data
Rate SDRAM, DDR SDRAM), it is enhanced Synchronous Dynamic Random Access Memory (Enhanced SDRAM, ESDRAM), same
Step connection dynamic random access memory (Synchlink DRAM, SLDRAM) and direct rambus random access memory
(Direct Rambus RAM, DR RAM).
It should be noted that when processor is general processor, DSP, ASIC, FPGA or other programmable logic devices
When part, discrete gate or transistor logic, discrete hardware components, memory (memory module) is integrated in the processor.
It should be noted that memory described herein is intended to include but is not limited to the storage of these and any other suitable type
Device.
Those of ordinary skill in the art may be aware that list described in conjunction with the examples disclosed in the embodiments of the present disclosure
Member and algorithm steps can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are actually
It is implemented in hardware or software, the specific application and design constraint depending on technical solution.Professional technician
Each specific application can be used different methods to achieve the described function, but this realization is it is not considered that exceed
Scope of the present application.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description,
The specific work process of device and unit, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In several embodiments provided herein, it should be understood that disclosed systems, devices and methods, it can be with
It realizes by another way.For example, the apparatus embodiments described above are merely exemplary, for example, the unit
It divides, only a kind of logical function partition, there may be another division manner in actual implementation, such as multiple units or components
It can be combined or can be integrated into another system, or some features can be ignored or not executed.Another point, it is shown or
The mutual coupling, direct-coupling or communication connection discussed can be through some interfaces, the indirect coupling of device or unit
It closes or communicates to connect, can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit
The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple
In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme
's.
It, can also be in addition, each functional unit in each embodiment of the application can integrate in one processing unit
It is that each unit physically exists alone, can also be integrated in one unit with two or more units.
It, can be with if the function is realized in the form of SFU software functional unit and when sold or used as an independent product
It is stored in a computer readable storage medium.Based on this understanding, the technical solution of the application is substantially in other words
The part of the part that contributes to existing technology or the technical solution can be embodied in the form of software products, the meter
Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be a
People's computer, server or network equipment etc.) execute each embodiment the method for the application all or part of the steps.
And storage medium above-mentioned includes: that USB flash disk, mobile hard disk, read-only memory (Read-Only Memory, ROM), arbitrary access are deposited
The various media that can store program code such as reservoir (Random Access Memory, RAM), magnetic or disk.
It above are only the specific embodiment of the application, but the protection scope of the application is not limited thereto, it is any to be familiar with
Those skilled in the art within the technical scope of the present application, can easily think of the change or the replacement, and should all cover
Within the protection scope of the application.Therefore, the protection scope of the application should be based on the protection scope of the described claims.
Claims (36)
1. a kind of communication means characterized by comprising
Equipment of the core network obtains the policing parameter of network slice, the policing parameter of network slice include in following parameter at least
It is a kind of: Access Control Policy parameter, scheduling controlling policing parameter and bandwidth controlling strategy parameter;
The equipment of the core network is sliced corresponding access network equipment to the network and sends the policing parameter that the network is sliced, with
Toilet states the corresponding strategies that access network equipment determines the network slice according to the policing parameter that the network is sliced.
2. the method according to claim 1, wherein the policing parameter of network slice is that access category is preferential
Grade;
The equipment of the core network obtains the policing parameter of the network slice, comprising:
All-network slice in system is divided at least two access categories by the equipment of the core network, and according to described at least two
Access category priority is arranged in a access category;
The equipment of the core network obtains the policing parameter of the network slice, and the policing parameter of the network slice is the network
Access category priority corresponding to access category belonging to slice.
3. according to the method described in claim 2, it is characterized in that, the method also includes:
The access category that the equipment of the core network notifies the network to be sliced to terminal device, the terminal device are and the net
Network is sliced the terminal device for establishing contract signing relationship.
4. the method according to claim 1, wherein the policing parameter of network slice is to allow to access control
Parameter forbids accessing control parameter.
5. method according to claim 1 to 4, which is characterized in that the equipment of the core network is to the network
It is sliced the policing parameter that corresponding access network equipment sends the network slice, comprising:
The equipment of the core network sends the network slice to the access network equipment by access and mobile management function to ps domain AMF
Policing parameter.
6. the method according to any one of claims 1 to 5, which is characterized in that the equipment of the core network is to the network
It is sliced the policing parameter that corresponding access network equipment sends the network slice, comprising:
When the policing parameter of network slice changes, the equipment of the core network is to described in access network equipment notice
Policing parameter after network slice change.
7. method according to any one of claim 1 to 6, which is characterized in that the equipment of the core network obtains network and cuts
The policing parameter of piece, comprising:
The equipment of the core network obtains the policing parameter of the network slice by network data analysis function NWDAF.
8. method according to any one of claim 1 to 7, which is characterized in that the equipment of the core network is to the network
It is sliced the policing parameter that corresponding access network equipment sends the network slice, comprising:
The equipment of the core network sends a notification message to the access network equipment, and the network slice is carried in the notification message
Policing parameter and the network slice slice mark.
9. a kind of communication means characterized by comprising
Access network equipment receives the policing parameter that network is sliced from equipment of the core network, and the policing parameter of the network slice includes such as
At least one of lower parameter: Access Control Policy parameter, scheduling controlling policing parameter and bandwidth controlling strategy parameter;
The access network equipment determines the corresponding strategies of the network slice according to the policing parameter that the network is sliced.
10. according to the method described in claim 9, it is characterized in that, the policing parameter of network slice is access control plan
Slightly parameter;
Wherein, the access network equipment determines the corresponding strategies of the network slice according to the policing parameter that the network is sliced,
Include:
The Access Control Policy parameter that the access network equipment is sliced according to the network determines the access control of the network slice
Parameter processed.
11. according to the method described in claim 9, it is characterized in that, the policing parameter of network slice is to allow to access to control
Parameter processed forbids accessing control parameter.
12. according to the method described in claim 10, it is characterized in that, the method also includes:
The Access Control Policy parameter that the access network equipment is sliced according to the network generates the access control of the network slice
Parameter processed;
The access network equipment sends to terminal device and broadcasts the message, and the access of the network slice is carried in the broadcast message
Control parameter, the terminal device and network slice, which are established, contract signing relationship.
13. according to the method described in claim 9, it is characterized in that, the policing parameter of network slice is scheduling controlling plan
Slightly parameter;
Wherein, the access network equipment determines the corresponding strategies of the network slice according to the policing parameter that the network is sliced,
Include:
The scheduling controlling policing parameter that the access network equipment is sliced according to the network is determined as accessing the network slice
The strategy of terminal device scheduling resource.
14. according to the method described in claim 9, it is characterized in that, the policing parameter and bandwidth of network slice control plan
Slightly parameter;
Wherein, the access network equipment determines the corresponding strategies of the network slice according to the policing parameter that the network is sliced,
Include:
The access network equipment is joined according to the bandwidth control strategy that the network is sliced, and is determined as accessing the end of the network slice
The strategy of end equipment bandwidth allocation.
15. the method according to any one of claim 9 to 14, which is characterized in that the access network equipment is from core net
Equipment receives the policing parameter of network slice, comprising:
The access network equipment receives the network slice from the equipment of the core network by access and mobile management function to ps domain AMF
Policing parameter.
16. method according to any one of claims 9 to 15, which is characterized in that the access network equipment is from core net
Equipment receives the policing parameter of network slice, comprising:
When the policing parameter of network slice changes, the access network equipment is from described in equipment of the core network reception
Policing parameter after network slice change.
17. the method according to any one of claim 9 to 16, which is characterized in that the access network equipment is from core net
Equipment receives the policing parameter of network slice, comprising:
The access network equipment receives notification message from the equipment of the core network, and the network slice is carried in the notification message
Policing parameter and the network slice slice mark.
18. a kind of communication device, which is characterized in that including memory and processor, the memory is for storing instruction, described
Processor is used to execute the instruction of the memory storage, and to the execution of the instruction stored in the memory so that described
Processor is used for:
The policing parameter of network slice is obtained, the policing parameter of the network slice includes at least one of following parameter: access
Controlling strategy parameter, scheduling controlling policing parameter and bandwidth controlling strategy parameter;
Corresponding access network equipment is sliced to the network and sends the policing parameter that the network is sliced, so that the access net is set
The standby policing parameter according to network slice determines the corresponding strategies of the network slice.
19. device according to claim 18, which is characterized in that the policing parameter of the network slice is that access category is excellent
First grade;
The processor is specifically used for: all-network slice in system being divided at least two access categories, and according to described
Access category priority is arranged at least two access categories;The policing parameter of the network slice is obtained, the network slice
Policing parameter is access category priority corresponding to access category belonging to network slice.
20. device according to claim 19, which is characterized in that the processor is also used to, and notifies institute to terminal device
The access category of network slice is stated, the terminal device is the terminal device that contract signing relationship is established with network slice.
21. device according to claim 18, which is characterized in that the policing parameter of the network slice is to allow to access to control
Parameter processed forbids accessing control parameter.
22. device described in any one of 8 to 21 according to claim 1, which is characterized in that the processor is used for, by connecing
Enter and sends the policing parameter that the network is sliced to the access network equipment with mobile management function to ps domain AMF.
23. device described in any one of 8 to 22 according to claim 1, which is characterized in that the processor is used for, when described
When the policing parameter of network slice changes, Xiang Suoshu access network equipment notifies the strategy ginseng after the network slice change
Number.
24. device described in any one of 8 to 23 according to claim 1, which is characterized in that the processor is used for, and passes through net
Network data analysis function NWDAF obtains the policing parameter of the network slice.
25. device described in any one of 8 to 24 according to claim 1, which is characterized in that the processor is used for, Xiang Suoshu
Access network equipment sends a notification message, and the policing parameter and the network that the network slice is carried in the notification message are cut
The slice of piece identifies.
26. a kind of communication device, which is characterized in that including memory and processor, the memory is for storing instruction, described
Processor is used to execute the instruction of the memory storage, and to the execution of the instruction stored in the memory so that described
Processor is used for:
Receive the policing parameter that network is sliced from equipment of the core network, the policing parameter of network slice include in following parameter extremely
Few one kind: Access Control Policy parameter, scheduling controlling policing parameter and bandwidth controlling strategy parameter;
The corresponding strategies of the network slice are determined according to the policing parameter that the network is sliced.
27. device according to claim 26, which is characterized in that the policing parameter of the network slice is access control plan
Slightly parameter;
The processor is specifically used for, and according to the Access Control Policy parameter that the network is sliced, determines the network slice
Access control parameter.
28. device according to claim 26, which is characterized in that the policing parameter of the network slice is to allow to access to control
Parameter processed forbids accessing control parameter.
29. device according to claim 27, which is characterized in that the processor is also used to:
According to the Access Control Policy parameter that the network is sliced, the access control parameter of the network slice is generated;
It sends and broadcasts the message to terminal device, the access control parameter of the network slice is carried in the broadcast message, it is described
Terminal device and network slice, which are established, contract signing relationship.
30. device according to claim 26, which is characterized in that the policing parameter of the network slice is scheduling controlling plan
Slightly parameter;
The processor is specifically used for, and according to the scheduling controlling policing parameter that the network is sliced, is determined as accessing the network
The strategy of the terminal device scheduling resource of slice.
31. device according to claim 26, which is characterized in that the policing parameter and bandwidth of the network slice control plan
Slightly parameter;
The processor is specifically used for, and joins according to the bandwidth control strategy of network slice, is determined as accessing the network and cut
The strategy of the terminal device bandwidth allocation of piece.
32. the device according to any one of claim 26 to 31, which is characterized in that the processor is used for, by connecing
Enter and receives the policing parameter that the network is sliced from the equipment of the core network with mobile management function to ps domain AMF.
33. the device according to any one of claim 26 to 32, which is characterized in that the processor is used for, when described
When the policing parameter of network slice changes, the access network equipment receives the network slice from the equipment of the core network and becomes
Policing parameter after more.
34. the device according to any one of claim 26 to 33, which is characterized in that the processor is used for, from described
Equipment of the core network receives notification message, and the policing parameter and the network that the network slice is carried in the notification message are cut
The slice of piece identifies.
35. a kind of computer storage medium, which is characterized in that be stored thereon with computer program, the computer program is counted
Calculation machine makes when executing, and the computer executes such as method described in any item of the claim 1 to 8.
36. a kind of computer storage medium, which is characterized in that be stored thereon with computer program, the computer program is counted
Calculation machine makes when executing, and the computer executes the method as described in any one of claim 9 to 17.
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810333894.4A CN110380887B (en) | 2018-04-13 | 2018-04-13 | Communication method and device |
CN202110363703.0A CN113225206A (en) | 2018-04-13 | 2018-04-13 | Communication method and device |
PCT/CN2019/081750 WO2019196796A1 (en) | 2018-04-13 | 2019-04-08 | Communication method and apparatus |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810333894.4A CN110380887B (en) | 2018-04-13 | 2018-04-13 | Communication method and device |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110363703.0A Division CN113225206A (en) | 2018-04-13 | 2018-04-13 | Communication method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110380887A true CN110380887A (en) | 2019-10-25 |
CN110380887B CN110380887B (en) | 2021-04-09 |
Family
ID=68162753
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110363703.0A Pending CN113225206A (en) | 2018-04-13 | 2018-04-13 | Communication method and device |
CN201810333894.4A Active CN110380887B (en) | 2018-04-13 | 2018-04-13 | Communication method and device |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110363703.0A Pending CN113225206A (en) | 2018-04-13 | 2018-04-13 | Communication method and device |
Country Status (2)
Country | Link |
---|---|
CN (2) | CN113225206A (en) |
WO (1) | WO2019196796A1 (en) |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111242232A (en) * | 2020-01-17 | 2020-06-05 | 广州欧赛斯信息科技有限公司 | Data fragment processing method and device and credit bank server |
CN112383928A (en) * | 2020-10-20 | 2021-02-19 | Oppo(重庆)智能科技有限公司 | Cell reselection method, terminal equipment and storage medium |
CN112737808A (en) * | 2019-10-28 | 2021-04-30 | 中兴通讯股份有限公司 | Network slice instance configuration method and device |
CN112737817A (en) * | 2020-12-15 | 2021-04-30 | 云南电网有限责任公司 | Network slice resource dynamic partitioning method and device based on multi-parameter determination |
WO2021164428A1 (en) * | 2020-02-17 | 2021-08-26 | 华为技术有限公司 | Communication method, apparatus and system |
CN113573368A (en) * | 2020-04-29 | 2021-10-29 | 大唐移动通信设备有限公司 | Information processing method, device, equipment and computer readable storage medium |
WO2021217654A1 (en) * | 2020-04-30 | 2021-11-04 | Oppo广东移动通信有限公司 | Network access control method and apparatus, device and storage medium |
CN113746649A (en) * | 2020-05-14 | 2021-12-03 | 华为技术有限公司 | Network slice control method and communication device |
CN114125882A (en) * | 2020-08-31 | 2022-03-01 | 华为技术有限公司 | Resource transmission guaranteeing method, device and system |
CN114143217A (en) * | 2020-08-14 | 2022-03-04 | 中兴通讯股份有限公司 | Method for determining allowed NSSAI, network equipment and storage medium |
WO2023010979A1 (en) * | 2021-08-06 | 2023-02-09 | 华为技术有限公司 | Communication method and apparatus |
CN116074202A (en) * | 2021-11-04 | 2023-05-05 | 中移物联网有限公司 | Slice information processing method, equipment and computer readable storage medium |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113364604A (en) * | 2020-03-04 | 2021-09-07 | 华为技术有限公司 | Communication method, device and system |
US11483218B2 (en) | 2020-03-27 | 2022-10-25 | EXFO Solutions SAS | Automating 5G slices using real-time analytics |
GB2594107A (en) | 2020-04-15 | 2021-10-20 | EXFO Solutions SAS | Network analytics |
WO2022101920A1 (en) * | 2020-11-10 | 2022-05-19 | Telefonaktiebolaget Lm Ericsson (Publ) | First node, third node, and methods performed thereby, for handling quality of service in a communications network |
CN113453285B (en) * | 2021-06-23 | 2023-02-24 | 中国联合网络通信集团有限公司 | Resource adjusting method, device and storage medium |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20180054765A1 (en) * | 2016-08-22 | 2018-02-22 | Samsung Electronics Co., Ltd. | Method and apparatus for providing services of network to terminal by using slice |
CN107734708A (en) * | 2016-08-12 | 2018-02-23 | 华为技术有限公司 | The connection control method and device of wireless network |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20170119296A (en) * | 2016-04-18 | 2017-10-26 | 한국전자통신연구원 | Method and apparatus for communicating based on network slicing |
CN107580360A (en) * | 2016-07-04 | 2018-01-12 | 中国移动通信有限公司研究院 | A kind of network is cut into slices method, equipment and the network architecture of selection |
CN107708109A (en) * | 2016-08-08 | 2018-02-16 | 中兴通讯股份有限公司 | Method for processing business, device, system, base station, terminal and core network element |
CN107770818B (en) * | 2016-08-15 | 2020-09-11 | 华为技术有限公司 | Method, device and system for controlling network slice bandwidth |
CN109257827B (en) * | 2016-09-30 | 2020-09-18 | 华为技术有限公司 | Communication method, device, system, terminal and access network equipment |
-
2018
- 2018-04-13 CN CN202110363703.0A patent/CN113225206A/en active Pending
- 2018-04-13 CN CN201810333894.4A patent/CN110380887B/en active Active
-
2019
- 2019-04-08 WO PCT/CN2019/081750 patent/WO2019196796A1/en active Application Filing
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107734708A (en) * | 2016-08-12 | 2018-02-23 | 华为技术有限公司 | The connection control method and device of wireless network |
US20180054765A1 (en) * | 2016-08-22 | 2018-02-22 | Samsung Electronics Co., Ltd. | Method and apparatus for providing services of network to terminal by using slice |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112737808A (en) * | 2019-10-28 | 2021-04-30 | 中兴通讯股份有限公司 | Network slice instance configuration method and device |
CN111242232A (en) * | 2020-01-17 | 2020-06-05 | 广州欧赛斯信息科技有限公司 | Data fragment processing method and device and credit bank server |
CN111242232B (en) * | 2020-01-17 | 2023-11-14 | 广州欧赛斯信息科技有限公司 | Data slicing processing method and device and credit bank server |
WO2021164428A1 (en) * | 2020-02-17 | 2021-08-26 | 华为技术有限公司 | Communication method, apparatus and system |
CN113573368A (en) * | 2020-04-29 | 2021-10-29 | 大唐移动通信设备有限公司 | Information processing method, device, equipment and computer readable storage medium |
WO2021217654A1 (en) * | 2020-04-30 | 2021-11-04 | Oppo广东移动通信有限公司 | Network access control method and apparatus, device and storage medium |
CN113746649A (en) * | 2020-05-14 | 2021-12-03 | 华为技术有限公司 | Network slice control method and communication device |
CN114143217A (en) * | 2020-08-14 | 2022-03-04 | 中兴通讯股份有限公司 | Method for determining allowed NSSAI, network equipment and storage medium |
WO2022042480A1 (en) * | 2020-08-31 | 2022-03-03 | 华为技术有限公司 | Resource transmission guarantee method, apparatus and system |
CN114125882A (en) * | 2020-08-31 | 2022-03-01 | 华为技术有限公司 | Resource transmission guaranteeing method, device and system |
CN112383928A (en) * | 2020-10-20 | 2021-02-19 | Oppo(重庆)智能科技有限公司 | Cell reselection method, terminal equipment and storage medium |
CN112737817A (en) * | 2020-12-15 | 2021-04-30 | 云南电网有限责任公司 | Network slice resource dynamic partitioning method and device based on multi-parameter determination |
CN112737817B (en) * | 2020-12-15 | 2023-01-31 | 云南电网有限责任公司 | Network slice resource dynamic partitioning method and device based on multi-parameter determination |
WO2023010979A1 (en) * | 2021-08-06 | 2023-02-09 | 华为技术有限公司 | Communication method and apparatus |
CN116074202A (en) * | 2021-11-04 | 2023-05-05 | 中移物联网有限公司 | Slice information processing method, equipment and computer readable storage medium |
Also Published As
Publication number | Publication date |
---|---|
WO2019196796A1 (en) | 2019-10-17 |
CN113225206A (en) | 2021-08-06 |
CN110380887B (en) | 2021-04-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110380887A (en) | Communication means and device | |
CN111165021B (en) | Network slice-specific access restriction for wireless networks | |
US11825332B2 (en) | Network slice service level agreement, SLA, fulfilment | |
US11350315B2 (en) | Communication method and network device | |
US10425830B2 (en) | Mobile communication network system and method for composing network component configurations | |
CN107770794B (en) | Network slice configuration method and device | |
US20240056509A1 (en) | Access network with service-based interfaces | |
US20220338106A1 (en) | Slice control method and apparatus | |
US20220405153A1 (en) | Report application programming interface (api) capability change based on api filter | |
CN111225013A (en) | Transmission strategy determination method, strategy control method and device | |
CN114731604A (en) | Method and apparatus for improving network slice control accuracy in a wireless communication system | |
US9986535B2 (en) | Method and system for managing mobile management entity (MME) in a telecommunication network | |
US20230388909A1 (en) | Ensuring network control of simultaneous access to network slices with application awareness | |
CN116634410A (en) | Method and equipment for reporting and acquiring target surface capacity of network function instance or network element | |
CN115379535A (en) | Method and device for determining network selection strategy | |
US20240073802A1 (en) | Reporting a network slice parameter for admission control | |
US11929907B2 (en) | Endpoint assisted selection of routing paths over multiple networks | |
WO2024099016A1 (en) | Communication method and apparatus | |
WO2023030328A1 (en) | Method for configuring wireless network service, terminal, and network-side device | |
US20230199570A1 (en) | Communication method and device in wireless communication system supporting network slicing | |
US12004254B2 (en) | Core network node and method | |
US20240179647A1 (en) | Timing Service Type for Timing Resiliency Service | |
US20220070963A1 (en) | Core network node and method | |
CN115515157A (en) | Communication method and device | |
WO2022130365A1 (en) | Managing a network slice parameter for admission control |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |