CN110691384A - Network slice using method and device - Google Patents

Network slice using method and device Download PDF

Info

Publication number
CN110691384A
CN110691384A CN201911013691.8A CN201911013691A CN110691384A CN 110691384 A CN110691384 A CN 110691384A CN 201911013691 A CN201911013691 A CN 201911013691A CN 110691384 A CN110691384 A CN 110691384A
Authority
CN
China
Prior art keywords
network
value
visited network
message
amf
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201911013691.8A
Other languages
Chinese (zh)
Other versions
CN110691384B (en
Inventor
吴琼
任驰
马瑞涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN201911013691.8A priority Critical patent/CN110691384B/en
Publication of CN110691384A publication Critical patent/CN110691384A/en
Application granted granted Critical
Publication of CN110691384B publication Critical patent/CN110691384B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/16Central resource management; Negotiation of resources or communication parameters, e.g. negotiating bandwidth or QoS [Quality of Service]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0893Assignment of logical groups to network elements

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Quality & Reliability (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application discloses a network slice using method and device, relates to the technical field of communication, and is used for realizing that UE (user equipment) can be routed to a matched network slice under a special application scene so as to ensure that a user can carry out normal service. In a roaming scenario, when a network slice selection function NSSF of a visited network cannot inquire an S-NSSAis value in the visited network corresponding to a target SubscribeS-NSSAis value, an access and mobility management function AMF of the visited network analyzes the target SubscribeS-NSSAis value to obtain a target identification field value in the target SubscribeS-NSSAis value, and then a first AMF matched with User Equipment (UE) in the visited network is determined according to the target identification field value. The embodiment of the application is applied to network slice selection of the UE in a roaming scene.

Description

Network slice using method and device
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a method and an apparatus for using a network slice.
Background
With the development of mobile communication technology, 5G network technology has come up. The 5G network not only means faster network speed and stronger network capacity. For a series of applications such as virtual reality, internet of things, artificial intelligence, smart cities and high-definition videos, the 5G network technology is utilized, and then wide application space is provided. With the popularization of various intelligent terminals, after 2020, mobile data traffic will show explosive growth. Application scenarios of 5G networks are divided into three categories: eMBBs (enhanced Mobile Broadband), mMTC (massive Internet of things communication), uRLLCs (ultra-Reliable Low latency communication). In the face of the upcoming 5G era, the international telecommunication union committee, 3GPP, etc. have reached consensus, and the major 5G applications can be incorporated into the category of these three major scenarios.
The 5G network slicing is one of the key technologies of 5G, namely, the 5G network is cut into multiple virtual networks, so as to support more services. The method is responsible for converting the requirements of user service levels into network requirements of a wireless network, a transmission network, a core network, an edge network and the like, and realizes the functions of end-to-end slicing overall design, openness, life cycle, monitoring, quality guarantee and the like. The network slice can provide network services with different levels, mutual isolation and customizable functions for different vertical industries, and realizes customized service design, deployment, operation and maintenance. The advantage of network slicing is that it enables the network operator to self-select the characteristics required for each slice, such as low latency, high throughput, connection density, spectral efficiency, traffic capacity and network efficiency, which helps to improve the efficiency in creating products and services, enhancing the customer experience. Moreover, the operator can change and add slices without considering the influence of the rest of the network, which not only saves time but also reduces cost expenditure, that is, network slices can bring better cost benefit.
At present, the provision of a scenario implementation manner for network slice roaming in the 3GPP standard is not particularly clear, and particularly, the provision of the network slice usage and the allocation of network resources for a user in a urrllc scenario in a roaming network may affect the normal occurrence of a service, and at the same time, the user may also cause complaints that the user has subscribed to the network slice service and does not actually enjoy the corresponding network resource service.
Disclosure of Invention
Embodiments of the present application provide a method and an apparatus for using a network slice, so that a UE (User Equipment) can route to a matched network slice in a special application scenario.
In order to achieve the above purpose, the embodiment of the present application adopts the following technical solutions:
in a first aspect, a method for using a network slice is provided, which is applied to an access and Mobility Management Function (AMF) of a visited network. The method comprises the following steps: the AMF of the visited Network sends a first message to an NSSF (Network Slice Selection Function) of the visited Network. A first message for causing the NSSF of the visited network to query, in response to the first message, values of S-NSSAIs in the visited network corresponding to the target Subscribed S-NSSAIs value. The target SubscribeS-NSSAis value is the SubscribeS-NSSAis value of the UE in the home network. And the AMF of the visit network receives a second message sent by the NSSF of the visit network. The second message is a return message of the NSSF of the visited network to the AMF of the visited network when the NSSF of the visited network cannot inquire the S-NSSAis value in the visited network corresponding to the target Subscribed S-NSSAis value. And after receiving the second message, the AMF of the visited network analyzes the target Subscribed S-NSSAIs value to obtain the value of a target identification field in the target Subscribed S-NSSAIs value, and determines a first AMF matched with the UE in the visited network according to the value of the target identification field.
In a second aspect, a method for using a network slice is provided, which is applied to NSSF of a visited network. The method comprises the following steps: and after receiving a first message sent by the AMF of the visited network, responding to the first message, and inquiring the S-NSSAIs value in the visited network corresponding to the target Subscribed S-NSSAIs value. And sending a second message to the AMF of the visited network, wherein the second message is a message returned from the NSSF of the visited network to the AMF of the visited network when the S-NSSAis value in the visited network corresponding to the target Subscribed S-NSSAis value cannot be inquired.
In a third aspect, an apparatus for using network slices is provided, which is applied to an AMF of a visited network, and includes: the device comprises a first sending unit, a first processing unit and a first receiving unit. And the first sending unit is used for sending a first message to the NSSF of the visited network, wherein the first message is used for enabling the NSSF of the visited network to respond to the first message and inquire the S-NSSAIs value in the visited network corresponding to the target Subscribed S-NSSAIs value. The target SubscribeS-NSSAis value is the SubscribeS-NSSAis value of the UE in the home network. And the first receiving unit is used for receiving a second message sent by the NSSF of the visited network, wherein the second message is a return message sent by the NSSF of the visited network to the AMF of the visited network when the NSSF of the visited network cannot inquire the S-NSSAIs value in the visited network corresponding to the target Subscribed S-NSSAIs value. And the first processing unit is used for analyzing the target Subscribed S-NSSAIs after receiving the second message to obtain the value of the target identification field in the target Subscribed S-NSSAIs, and determining a first AMF (advanced resource configuration) matched with the UE in the visited network according to the value of the target identification field.
In a fourth aspect, an apparatus for using network slice is provided, which is applied to NSSF of visited network, and includes: the device comprises a second receiving unit, a second processing unit and a second sending unit. And the second receiving unit is used for receiving the first message sent by the AMF of the visited network. And the second processing unit is used for inquiring the S-NSSAIs value in the visited network corresponding to the target Subscribed S-NSSAIs value after the second receiving unit receives the first message. And the second sending unit is used for sending a second message to the AMF of the visited network, wherein the second message is a message returned by the NSSF of the visited network to the AMF of the visited network when the S-NSSAIs value in the visited network corresponding to the target Subscribed S-NSSAIs value cannot be inquired.
In a fifth aspect, an apparatus for using a network slice is provided, which is applied to an AMF of a visited network, and includes: a processor, a memory, a communication interface, and a bus. Wherein, the communication interface is used for the AMF of the visiting network to communicate with other equipment or networks. The memory is used for storing one or more programs, the one or more programs include computer-executable instructions, and when the network slice using device runs, the processor executes the computer-executable instructions stored in the memory, so that the network slice using device executes the network slice using method of the first aspect.
In a sixth aspect, an apparatus for using network slice is provided, which is applied to NSSF of visited network, and includes: a processor, a memory, a communication interface, and a bus. Wherein the communication interface is used for NSSF of the visiting network to communicate with other equipment or networks. The memory is used for storing one or more programs, the one or more programs include computer-executable instructions, and when the network slice using device runs, the processor executes the computer-executable instructions stored in the memory, so that the network slice using device executes the network slice using method of the second aspect.
In a seventh aspect, a computer-readable storage medium storing one or more programs corresponding to the network slice using apparatus is provided, where the one or more programs include instructions that, when executed by a computer, cause the computer to perform the network slice using method of the first aspect.
In an eighth aspect, there is provided a computer readable storage medium storing one or more programs corresponding to the network slice using apparatus, wherein the one or more programs include instructions which, when executed by a computer, cause the computer to execute the network slice using method of the second aspect.
In the method and the device for using the network slice, provided by the embodiment of the application, in a roaming scene, when the mapping of the network slice fails, the value of a target identification field in the value of the home network Subscribed S-nsais is obtained by analyzing the value of the home network Subscribed S-nsais, and then the target AMF available to the UE is selected according to the value of the target identification field. Therefore, the UE can be routed to the matched network slice under the special application scene, so that the normal service of the user is ensured.
Drawings
Fig. 1 is a schematic diagram of a network architecture for user roaming according to an embodiment of the present application;
fig. 2 is a schematic diagram illustrating an S-NSSAI selection process for user roaming according to an embodiment of the present application;
fig. 3 is a schematic diagram illustrating an S-NSSAI selection process for user roaming according to an embodiment of the present application;
FIG. 4 is a block diagram of an S-NSSAI provided by an embodiment of the present application;
fig. 5 is a signaling interaction diagram of user roaming according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of a network slice using apparatus according to an embodiment of the present application;
fig. 7 is a schematic structural diagram of another network slice using apparatus provided in an embodiment of the present application;
fig. 8 is a schematic structural diagram of another network slice using apparatus provided in an embodiment of the present application;
fig. 9 is a schematic structural diagram of another network slice using apparatus provided in an embodiment of the present application.
Detailed Description
The following briefly introduces some concepts related to embodiments of the present application.
The network slice is a networking mode according to needs, namely, a 5G network is cut into a plurality of virtual networks, so that more services are supported. The method is responsible for converting the requirements of user service levels into network requirements of a wireless network, a transmission network, a core network, an edge network and the like, and realizes the functions of end-to-end slicing overall design, openness, life cycle, monitoring, quality guarantee and the like. The network slice can provide network services with different levels, mutual isolation and customizable functions for different vertical industries, and realizes customized service design, deployment, operation and maintenance.
NSSAI (Network Slice Selection Assistance Information), which is a set of S-NSSAIs (Single-Network Slice Selection Assistance Information), each NSSAI contains n S-NSSAIs. In a network, S-NSSAI uniquely identifies a network slice. Currently, there are four NSSAIs used in networks:
a) configurable NSSAI: the configured slice selection auxiliary information and NSSAI used by the UE are configured by the network, and after the configured NSSAI is received, the UE can know which S-NSSAIs are available in the network. The network will bring the configured NSSAI IE of the registration receiving message to the UE, if the configuration of the registered UE is changed, the network can inform the UE of updating through configuration update command. The UE will save the configured NSSAI for each network in non-volatile storage. Each PLMN (Public Land Mobile Network) can only be configured with a configurable NSSAI at most.
b) requested NSSAI: and the requested slice selection auxiliary information is allowed NSSAI carried by the UE in the registration request message.
c) allowed NSSAI: the allowed slice selection assistance information, which S-NSSAIs of the UE-requested NSSAIs are allowed by the network, the network will bring the rejected NSSAI IE of the registration receipt message to the UE.
d) Subscribed S-NSSAIs: the signed slice selects auxiliary information and subscription data of the user.
The NSSF needs to support querying of the S-NSSAIs value in the visited network corresponding to the target Subscribed S-NSSAIs value in the visited network, and the NSSF needs to assist the NF in selecting a suitable network slice according to the S-NSSAI. The S-NSSAI may be a standard value, that is, an SST (Slice/Service type) value is a standard value, and an SD (Slice difference discriminator) does not exist; it may also be a non-standard value, i.e. SST and SD are present simultaneously or SST alone but takes on a value other than the standard value.
The technical solutions in the embodiments of the present application will be described below with reference to the drawings in the embodiments of the present application.
In the description of this application, "/" means "or" unless otherwise stated, for example, A/B may mean A or B. "and/or" herein is merely an association describing an associated object, and means that there may be three relationships, e.g., a and/or B, which may mean: a exists alone, A and B exist simultaneously, and B exists alone. Further, "at least one" means one or more, "a plurality" means two or more. The terms "first", "second", and the like do not necessarily limit the number and execution order, and the terms "first", "second", and the like do not necessarily limit the difference.
The technical solution provided in the embodiment of the present application may be applied to various communication systems, for example, an NR (New Radio) communication system that adopts a fifth generation (5G) communication technology, a future evolution system, or a multiple communication convergence system, and the like. The technical scheme provided by the application can be applied to various application scenarios, for example, scenarios such as enhanced mobile broadband (eMBB), ultra-reliable and ultra-low latency communication (uRLLC), and mass internet of things communication (mMTC).
The UE is used to provide voice and/or data connectivity services to the user. The UE may have different names, for example: an access terminal, terminal unit, mobile station, remote terminal, mobile device, wireless communication device, vehicle, terminal agent, or terminal device, etc. Optionally, the terminal may be various handheld devices, vehicle-mounted devices, wearable devices, and computers with communication functions, which is not limited in this embodiment of the present application. For example, the handheld device may be a smartphone. The in-vehicle device may be an in-vehicle navigation system. The wearable device may be a smart bracelet. The computer may be a Personal Digital Assistant (PDA) computer, a tablet computer, and a laptop computer.
As shown in fig. 1, a schematic diagram of a network architecture for user roaming provided in an embodiment of the present application is shown, where the network architecture mainly includes two parts: home network elements and visited network elements. The home network element mainly comprises: AMF of home network, UDM of home network, NSSF of home network. The visited place network element mainly comprises: AMF of the visited network, SMF of the visited network, UPF of the visited network, second AMF, second SMF and second UPF.
When the UE needs to roam from the home network to the visited network as shown in fig. 1, as shown in fig. 2, a schematic diagram of an S-NSSAI selection process for user roaming provided in the embodiment of the present application is shown, and the process can be implemented by the network architecture shown in fig. 1. The work flow of each network element in the home network element and the visited network element in fig. 1 includes:
s201, the UE is connected to the AMF of the visit network through the GNB.
S202, the AMF of the visited network obtains a target Subscribed S-NSSAIs value through the UDM of the home network.
S203, the AMF of the visited network can judge whether the AMF of the visited network can provide service for the UE or not through the target Subscribed S-NSSAIs value.
S204, when the AMF of the visited network can not provide service for the UE, the NSSF of the visited network inquires the S-NSSAIs value in the visited network corresponding to the target Subscribed S-NSSAIs value, and the second AMF is found.
S205, when the NSSF of the visited network does not inquire the S-NSSAIs value in the visited network corresponding to the target Subscribed S-NSSAIs value, the UE uses the AMF of the visited network to finish roaming.
In the schematic diagram of the S-NSSAI selection process for user roaming shown in fig. 2, when the NSSF of the visited network cannot query the S-NSSAIs value in the visited network corresponding to the target Subscribed S-NSSAIs value, the UE can only connect to the AMF of the visited network to complete roaming, which may affect normal use of the UE service.
The scenario for network slice roaming in 3GPP TS23.501 is described as follows:
if the UE uses only the standard S-NSSAI value, the UDM should provide the roaming network with the S-NSSAI according to the subscription S-NSSAI of the home network, and the same S-NSSAI value as the home network is used in the visited network.
If there is an SLA supporting non-standard S-NSSAI values at the visited and home networks, the NSSF of the visited network maps the subscribed S-NSSAI values to the S-NSSAI values used in the visited network.
The NSSF of a VPLMN (Visited Public Land Mobile Network) does not need to inform the home of the allowed NSSAI values used in the Visited place.
For a user who signs a 5G network slicing service, if the user does not use the value of standard S-NSSAI, the user roams to other regions to initiate the service, and if the user does not carry Requested NSSAI or carries AMF which is matched with the capability of the user but cannot find the AMF, the user who signs the network slicing service is directly routed to the AMF of the default visit network by the access network side to initiate the service. Then the user is routed to the AMF of the default visited network and initiates service for the case where the S-NSSAI mapping fails as mentioned earlier.
The AMF of the default visited network does not support the network slice function of URLLC, so this processing mode has a great impact on the deployment and charging of 5G new services. In some application fields of 5G, higher requirements are put on end-to-end time delay, safety and reliability. Particularly the uRLLC service, comprises: industrial control systems, electronic medical, mobile medical, remote monitoring, diagnostics and therapy, internet of vehicles (real-time vehicle control, flow control, accident prevention, etc.), distributed management smart grid systems, public safety, MPS services, etc.
Therefore, for the urrllc service, if the roaming scenario does not provide the corresponding slice resource, the normal occurrence of the service is affected, and meanwhile, the user may also be complained if the user subscribes to the network slice service and does not actually enjoy the corresponding network resource service.
The patent provides a solution for using slices when the mapping of network slice identifiers fails in a roaming scene, especially for users in a 5G application scene.
Fig. 3 is a schematic diagram illustrating an S-NSSAI selection process for roaming of another user according to an embodiment of the present application. The method specifically comprises the following steps:
s301, the UE connects to the AMF of the visited network through the GNB.
S302, the AMF of the visited network obtains a target Subscribed S-NSSAIs value through the home UDM.
S303, the AMF of the visited network can judge whether the AMF of the visited network can provide service for the UE or not through the target Subscribed S-NSSAIs value.
The AMF of the visited network sends a first message to the network slice selection function NSSF of the visited network.
A first message for causing the NSSF of the visited network to query, in response to the first message, values of S-NSSAIs in the visited network corresponding to the target Subscribed S-NSSAIs value. The target SubscribeS-NSSAis value is the SubscribeS-NSSAis value of the UE in the home network.
In one implementation, the AMF of the visited network queries the NSSF of the visited network through the NRF, and sends an NSSF _ NSSelection _ Get Request message to the NSSF of the visited network. And after receiving the Nnssf _ NSSelection _ Get Request message, the NSSF of the visited network inquires the S-NSSAIs value in the visited network corresponding to the target Subscribed S-NSSAIs value. Then, the NSSF of the visited network returns an Nnssf _ NSSelection _ Get Response message to the AMF of the visited network, and the Nnssf _ NSSelection _ Get Response message carries information such as AMF Set or Candidate AMF, Allowed S-NSSAIs and the like.
S304, when the AMF of the visited network can not provide service for the UE, the NSSF of the visited network inquires the S-NSSAIs value in the visited network corresponding to the target Subscribed S-NSSAIs value to obtain a second AMF.
S305, when the NSSF of the visited network does not inquire the S-NSSAIs value in the visited network corresponding to the target Subscribed S-NSSAIs value, the UE is connected to the AMF of the visited network.
And the AMF of the visit network receives a second message sent by the NSSF of the visit network.
The second message is a return message of the NSSF of the visited network to the AMF of the visited network when the NSSF of the visited network cannot inquire the S-NSSAis value in the visited network corresponding to the target Subscribed S-NSSAis value.
In one implementation, when the NSSF of the visited network receives the NSSF _ NSSelection _ Get Request message and cannot query the S-NSSAIs value in the visited network corresponding to the target Subscribed S-NSSAIs value, the NSSF of the visited network returns an NSSF _ NSSelection _ Get Response message to the AMF of the visited network, wherein the message carries the unavailable S-NSSAIs and AMF.
S306, the AMF of the visited network analyzes the target Subscribed S-NSSAIs value to obtain the value of the target identification field in the target Subscribed S-NSSAIs value, and determines the first AMF matched with the UE in the visited network according to the value of the target identification field.
And after receiving the second message, the AMF of the visited network analyzes the target Subscribed S-NSSAIs value to obtain the value of a target identification field in the target Subscribed S-NSSAIs value, and determines a first AMF matched with the UE in the visited network according to the value of the target identification field.
Analyzing the target Subscribed S-NSSAIs value to obtain a value of a target identification field in the target Subscribed S-NSSAIs value, which specifically includes: and analyzing to obtain the value of the SST field of the slice/service type in the target Subscribed S-NSSAIs value.
In one implementation, the AMF of the visited network analyzes the target Subscribed S-nsais value to obtain an SST value in the target Subscribed S-nsais value, and obtains a first AMF matched with the UE by determining the SST value. For example: when SST is 1, judging that the UE is an eMBB user; when SST is 2, judging that the UE is a URLLC user; and when the SST is 3, judging the UE to be a MioT user.
Specifically, as shown in FIG. 4, the structure of S-NSSAI is shown, and S-NSSAI includes two parts:
1) SST (Slice/Service type): slice/service type, mandatory information.
2) Sd (slice differential): a slice differentiation discriminator, optional information, for supplementing slice/service types to distinguish between multiple network slices.
SST values of 0-127 remain defined by the standard, and are customizable by the 128-255 operator. The test point stage adopts SST standard definition, and the commercial stage is planned uniformly according to the service requirement. SST current standards are defined in the following table:
Slice/Service type SST value
eMBB(enhanced Mobile Broadband) 1
URLLC(ultra-reliable low latency communications) 2
MIoT(massive IoT) 3
TABLE 1
Currently, in the international standard, the value of SD is not uniformly defined and configured by the operator, so that there are different operators or different HPLMNs (Home Public Land Mobile Network) that have different meanings defined for the value of SD. For example, in a, SD may be ordered by slice priority, while B may be ordered by subscription time. Therefore, when the user roams from the place A to the place B, the mapping failure occurs. Step S306 is a proposed solution to this problem.
Before the AMF of the visited network sends the first message to the NSSF of the visited network, the AMF of the visited network sends a third message to the unified data management UDM of the home network.
A third message for causing the UDM to return a fourth message in response to the third message. The fourth message carries subscription data, and the subscription data comprises a Subscribed S-NSSAIs value.
And the AMF of the visited network receives the fourth message, judges that the service cannot be provided for the UE according to the Subscribed S-NSSAIs value, and inquires and connects the NSSF of the visited network through a network storage function (NRF).
In one implementation, before the AMF of the visited network sends the first message to the NSSF, the AMF of the visited network sends a numm _ SDM _ Get Request message to the UDM of the home network, and the UDM returns a numm _ SDM _ Get Response message to the AMF of the visited network after receiving the numm _ SDM _ Get Request message. The Nudm _ SDM _ Get Response message carries subscription data, and the subscription data comprises a Subscribed S-NSSAIs value. And the AMF of the visited network judges whether the AMF is the second AMF matched with the UE in advance according to the SubscribeS-NSSAIs value. And if the AMF of the visit network is not the second AMF matched with the UE, the AMF of the visit network inquires and connects the NSSF of the visit network through a network storage function (NRF).
Fig. 5 is a signaling interaction diagram for roaming of a user according to an embodiment of the present disclosure.
Specifically, when the S-NSSAI selection procedure for user roaming shown in fig. 3 is applied to an actual scene, specific implementation steps are shown in fig. 5, and specifically include:
s501, the UE sends a registration request message to the NR to initiate a registration process, wherein the registration request message carries Requested S-NSSAIs.
S502, NR selects the Initial AMF according to the Requested S-NSSAIs, and sends an Initial UE message to the Initial AMF.
S503, the Initial AMF completes the authentication/security process for the UE.
S504, the Initial AMF sends a Nudm _ SDM _ Get Request message to the UDM of the home network.
S505, after receiving the Nudm _ SDM _ Get Request message, the UDM of the home network returns the Nudm _ SDM _ GetResponse message to the Initial AMF, the message carries subscription data, including information such as Subscribed S-NSSAIs, and the Initial AMF judges that the service cannot be provided for the UE.
S506, the Initial AMF queries and selects NSSF through NRF, sends a NSsf _ NSSection _ Get _ Request message to the selected visited network NSSF, and the NSSF of the visited network queries the S-NSSAIs value in the visited network corresponding to the target Subscribed S-NSSAIs value.
S507, NSSF returns the message of Nnssf _ NSSelection _ Get _ Response, and the message carries the information of AMF Set, Candidate AMF, Allowed S-NSSAIs and the like. And when the NSSF of the visited network does not inquire the S-NSSAis value in the visited network corresponding to the target SubscribeS-NSSAis value, the NSSF of the visited network returns an NSsf _ NSSelection _ Get _ Response message to inform that the Initial AMF has no available S-NSSAis and AMF.
And S508, after receiving the NSSF failure message, the Initial AMF judges that SST in the Subscribed S-NSSAIs of the UE is 2. And the Initial AMF judges that the user signs the uRLLC service according to the SST being 2, selects a Target AMF special for the uRLLC user according to the configuration information, and sends an Nnrf _ NFdiscovery _ Request message to the NRF, wherein the message carries AMF Set ID information.
S509, the NRF returns a message of Nnrf _ NFdiscovery _ Request _ Response to the Initial AMF.
S510, the Initial AMF sends a Namf _ Communication _ N1MessageNotify message to the Target AMF, and the Target AMF returns a Namf _ Communication _ N1MessageNotify Ack message to the Initial AMF.
The AMF routes the message to the uRLLC user-specific SMF based on the UE' S Subscribed S-NSSAIs information.
S511, the UE completes the initial registration process.
The embodiment of the present application further provides a device for using a network slice, which is applied to an AMF of a visited network, and is used to implement the function related to the AMF of the visited network in the method for using a network slice provided by the foregoing embodiment. Specifically, as shown in fig. 6, a schematic structural diagram of a network slice using apparatus provided in the embodiment of the present application is shown. Wherein the AMF of the visited network includes: a first sending unit 601, a first processing unit 602, and a first receiving unit 603. Wherein:
a first sending unit 601, configured to send a first message to the NSSF of the visited network, where the first message is used to enable the NSSF of the visited network to query, in response to the first message, the S-nsais value in the visited network corresponding to the target Subscribed S-nsais value. The target SubscribeS-NSSAis value is the SubscribeS-NSSAis value of the UE in the home network.
The first receiving unit 603 is configured to receive a second message sent by the NSSF of the visited network, where the second message is a return message sent by the NSSF to the AMF of the visited network when the NSSF of the visited network cannot query the S-nsais value in the visited network corresponding to the target Subscribed S-nsais value.
The first processing unit 602 is configured to, after the first receiving unit 603 receives the second message, analyze the target Subscribed S-NSSAIs value to obtain a value of a target identifier field in the target Subscribed S-NSSAIs value, and determine, according to the value of the target identifier field, the first AMF in the visited network that matches the UE.
It is clear to those skilled in the art from the foregoing description of the embodiments that, for convenience and simplicity of description, the foregoing division of the functional units is merely used as an example, and in practical applications, the above function distribution may be performed by different functional units according to needs, that is, the internal structure of the device may be divided into different functional units to perform all or part of the above described functions. For the specific working processes of the above-described method, apparatus and unit, reference may be made to the corresponding processes in the foregoing method embodiments, and details are not described here again.
In another embodiment, as shown in fig. 7, a schematic structural diagram of another network slice using apparatus provided in the embodiment of the present application is shown. Wherein, network section operative installations includes: a processor 702, a memory 701, a communication interface 703, and a bus 704. Among other things, the communications interface 703 is used for the AMF of the visited network to communicate with other devices or networks. The memory 701 is used for storing one or more programs, the one or more programs include computer executable instructions, and when the network slice using apparatus runs, the processor 702 executes the computer executable instructions stored in the memory 701, so as to cause the network slice using apparatus to execute the network slice using method in the above-mentioned embodiment.
The processor 702 may implement or execute various illustrative logical blocks, units and circuits described in connection with the disclosure herein. The processor 702 may be a central processing unit, general purpose processor, digital signal processor, application specific integrated circuit, field programmable gate array or other programmable logic device, transistor logic device, hardware component, or any combination thereof. Which may implement or perform the various illustrative logical blocks, units, and circuits described in connection with the disclosure. The processor 702 may also be a combination of computing functions, e.g., comprising one or more microprocessors, DSPs, and microprocessors, among others.
Memory 701 may include volatile memory, such as random access memory. The memory 701 may also include non-volatile memory, such as read-only memory, flash memory, a hard disk, or a solid state disk. The memory comprises a combination of the above kinds of memories.
The bus 704 may be an Extended Industry Standard Architecture (EISA) bus or the like. The bus may be divided into an address bus, a data bus, a control bus, etc. Fig. 7 is shown with only one thick line for ease of illustration, but does not show only one bus or one type of bus.
It is clear to those skilled in the art from the foregoing description of the embodiments that, for convenience and simplicity of description, the foregoing division of the functional units is merely used as an example, and in practical applications, the above function distribution may be performed by different functional units according to needs, that is, the internal structure of the device may be divided into different functional units to perform all or part of the above described functions. For the specific working processes of the above-described method, apparatus and unit, reference may be made to the corresponding processes in the foregoing method embodiments, and details are not described here again.
In another embodiment, the present application further provides a computer readable storage medium storing one or more programs corresponding to the network slice using apparatus, wherein the one or more programs include instructions which, when executed by a computer, cause the computer to perform the steps performed by the AMF of the visited network in the network slice using method as shown in the above method embodiment.
The computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination thereof. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, and a hard disk. Random Access Memory (RAM), Read-Only Memory (ROM), Erasable Programmable Read-Only Memory (EPROM), registers, a hard disk, an optical fiber, a portable Compact disk Read-Only Memory (CD-ROM), an optical storage device, a magnetic storage device, or any other form of computer-readable storage medium, in any suitable combination, or as appropriate in the art. An exemplary storage medium is coupled to the processor such the processor can read information from, and write information to, the storage medium. Of course, the storage medium may also be integral to the processor. The processor and the storage medium may reside in an Application Specific Integrated Circuit (ASIC). In embodiments of the present application, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
In another embodiment, the present application further provides a computer program product that, when run on a network slice using apparatus, causes the network slice using apparatus to perform the steps performed by the AMF visiting the network in the network slice using method.
The computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination thereof. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, and a hard disk. Random Access Memory (RAM), Read-Only Memory (ROM), Erasable Programmable Read-Only Memory (EPROM), registers, a hard disk, an optical fiber, a portable Compact disk Read-Only Memory (CD-ROM), an optical storage device, a magnetic storage device, or any other form of computer-readable storage medium, in any suitable combination, or as appropriate in the art. An exemplary storage medium is coupled to the processor such the processor can read information from, and write information to, the storage medium. Of course, the storage medium may also be integral to the processor. The processor and the storage medium may reside in an Application Specific Integrated Circuit (ASIC). In embodiments of the present application, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
The embodiment of the present application further provides a device for using a network slice, which is applied to an NSSF of a visited network, and is used to implement the function related to the NSSF of the visited network in the method for using a network slice provided in the foregoing embodiment. Specifically, as shown in fig. 8, a schematic structural diagram of a network slice using apparatus provided in the embodiment of the present application is shown. Wherein, this network section use device includes: a second receiving unit 801, a second processing unit 802, and a second transmitting unit 803. Wherein:
the second receiving unit 801 is configured to receive a first message sent by the AMF of the visited network.
The second processing unit 802 is configured to, after the second receiving unit 801 receives the first message, query the S-nsais value in the visited network corresponding to the target Subscribed S-nsais value.
A second sending unit 803, configured to send a second message to the AMF of the visited network, where the second message is a return message from the NSSF of the visited network to the AMF of the visited network when the value of S-nsais in the visited network corresponding to the target Subscribed S-nsais value is not queried.
It is clear to those skilled in the art from the foregoing description of the embodiments that, for convenience and simplicity of description, the foregoing division of the functional units is merely used as an example, and in practical applications, the above function distribution may be performed by different functional units according to needs, that is, the internal structure of the device may be divided into different functional units to perform all or part of the above described functions. For the specific working processes of the above-described method, apparatus and unit, reference may be made to the corresponding processes in the foregoing method embodiments, and details are not described here again.
In another embodiment, as shown in fig. 9, a schematic structural diagram of another network slice using apparatus provided in the embodiments of the present application is shown. Wherein, network section operative installations includes: a processor 902, a memory 901, a communication interface 903, and a bus 904. Wherein, the communication interface 903 is used for NSSF of the visited network to communicate with other devices or networks; the memory 901 is used for storing one or more programs, the one or more programs including computer executable instructions, when the network slice using apparatus is running, the processor 902 executes the computer executable instructions stored in the memory 901, so as to make the network slice using apparatus execute the network slice using method in the above-mentioned embodiment.
The processor 902 described above may implement or execute various exemplary logical blocks, units and circuits described in connection with the present disclosure. The processor 902 may be a central processing unit, general purpose processor, digital signal processor, application specific integrated circuit, field programmable gate array or other programmable logic device, transistor logic device, hardware component, or any combination thereof. Which may implement or perform the various illustrative logical blocks, units, and circuits described in connection with the disclosure. The processor 902 may also be a combination of computing functions, e.g., comprising one or more microprocessors, DSPs and microprocessors, and the like.
Memory 901 may include volatile memory, such as random access memory. The memory 901 may also include a non-volatile memory, such as a read-only memory, a flash memory, a hard disk, or a solid state disk. The memory 901 comprises a combination of the above kinds of memories.
The bus 904 may be an Extended Industry Standard Architecture (EISA) bus or the like. The bus may be divided into an address bus, a data bus, a control bus, etc. Fig. 9 is represented by a single thick line for ease of illustration, but does not represent only one bus or one type of bus.
It is clear to those skilled in the art from the foregoing description of the embodiments that, for convenience and simplicity of description, the foregoing division of the functional units is merely used as an example, and in practical applications, the above function distribution may be performed by different functional units according to needs, that is, the internal structure of the device may be divided into different functional units to perform all or part of the above described functions. For the specific working processes of the above-described method, apparatus and unit, reference may be made to the corresponding processes in the foregoing method embodiments, and details are not described here again.
In another embodiment, the present application further provides a computer readable storage medium storing one or more programs corresponding to the network slice using apparatus, where the one or more programs include instructions, which when executed by a computer, cause the computer to perform the steps performed by the NSSF of the visited network in the network slice using method as shown in the above method embodiment.
The computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination thereof. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, and a hard disk. Random Access Memory (RAM), Read-Only Memory (ROM), Erasable Programmable Read-Only Memory (EPROM), registers, a hard disk, an optical fiber, a portable Compact disk Read-Only Memory (CD-ROM), an optical storage device, a magnetic storage device, or any other form of computer-readable storage medium, in any suitable combination, or as appropriate in the art. An exemplary storage medium is coupled to the processor such the processor can read information from, and write information to, the storage medium. Of course, the storage medium may also be integral to the processor. The processor and the storage medium may reside in an Application Specific Integrated Circuit (ASIC). In embodiments of the present application, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
In another embodiment, the present application also provides a computer program product that, when run on a network slice using apparatus, causes the network slice using apparatus to perform the steps performed by the NSSF that visited the network in the network slice using method.
The computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination thereof. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, and a hard disk. Random Access Memory (RAM), Read-Only Memory (ROM), Erasable Programmable Read-Only Memory (EPROM), registers, a hard disk, an optical fiber, a portable Compact disk Read-Only Memory (CD-ROM), an optical storage device, a magnetic storage device, or any other form of computer-readable storage medium, in any suitable combination, or as appropriate in the art. An exemplary storage medium is coupled to the processor such the processor can read information from, and write information to, the storage medium. Of course, the storage medium may also be integral to the processor. The processor and the storage medium may reside in an Application Specific Integrated Circuit (ASIC). In embodiments of the present application, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
Since the method and apparatus for using network slices, the computer-readable storage medium, and the computer program product in the embodiments of the present invention may be applied to the above method, the technical effects obtained by the method may also refer to the above method embodiments, and the details of the embodiments of the present invention are not repeated herein.
The above description is only an embodiment of the present application, but the scope of the present application is not limited thereto, and any changes or substitutions within the technical scope of the present disclosure should be covered by the scope of the present application.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus, and method may be implemented in other ways. For example, the above-described device embodiments are merely illustrative, and for example, the division of the units is only one logical functional division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
In the above embodiments, the implementation may be wholly or partially realized by software, hardware, firmware, or any combination thereof. When implemented using a software program, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. The procedures or functions described in accordance with the embodiments of the present application are all or partially generated upon loading and execution of computer program instructions on a computer. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored on a computer readable storage medium or transmitted from one computer readable storage medium to another, for example, from one website, computer, server, or data center to another website, computer, server, or data center via wire (e.g., coaxial cable, fiber optic, Digital Subscriber Line (DSL)) or wireless (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or can comprise one or more data storage devices, such as a server, a data center, etc., that can be integrated with the medium. The usable medium may be a magnetic medium (e.g., floppy Disk, hard Disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., Solid State Disk (SSD)), among others.
The above description is only for the specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present application, and shall be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (10)

1. A network slice using method is applied to an access and mobility management function (AMF) of a visited network, and is characterized in that the method comprises the following steps:
the AMF of the visit network sends a first message to a network slice selection function NSSF of the visit network; the first message, configured to cause the NSSF to query, in response to the first message, a value of S-nsais in the visited network corresponding to a target Subscribed S-nsais value; the target SubscribeS-NSSAIs value is the SubscribeS-NSSAIs value of the user equipment UE in the home network;
the AMF of the visit network receives a second message sent by the NSSF of the visit network; the second message is a return message of the visited network from the NSSF to the AMF of the visited network when the NSSF of the visited network cannot inquire the S-NSSAis value in the visited network corresponding to the target Subscribed S-NSSAis value;
and after receiving the second message, the AMF of the visited network analyzes the target Subscribed S-NSSAIs value to obtain a value of a target identification field in the target Subscribed S-NSSAIs value, and determines a first AMF matched with the UE in the visited network according to the value of the target identification field.
2. The method of using network slices of claim 1, further comprising:
before the AMF of the visited network sends a first message to the NSSF of the visited network, the AMF of the visited network sends a third message to a Unified Data Management (UDM) of a home network; the third message is used for enabling the UDM of the home network to respond to the third message and return a fourth message; the fourth message carries subscription data, and the subscription data comprises a Subscribed S-NSSAIs value;
and the AMF of the visited network receives the fourth message, judges that the UE cannot be provided with service according to the Subscribed S-NSSAIs value, and queries and connects NSSF of the visited network through a network storage function (NRF).
3. The method of using network slices of claim 1, further comprising:
the analyzing the target Subscribed S-nsais value to obtain a value of a target identification field in the target Subscribed S-nsais value specifically includes: and analyzing to obtain the value of the SST field of the slice/service type in the target Subscribed S-NSSAIs.
4. A network slice using method, applied to a network slice selection function NSSF of a visited network, the method comprising:
after receiving a first message sent by an access and mobile management function (AMF) of a visited network, responding to the first message, and inquiring S-NSSAIs values in the visited network corresponding to target Subscribed S-NSSAIs values;
and sending a second message to the AMF of the visited network, wherein the second message is a return message of the NSSF of the visited network to the AMF of the visited network when the S-NSSAIs value in the visited network corresponding to the target Subscribed S-NSSAIs value cannot be inquired.
5. A network slice using apparatus, applied to an access and mobility management function AMF of a visited network, the apparatus comprising: the device comprises a first sending unit, a first processing unit and a first receiving unit;
the first sending unit is configured to send a first message to a network slice selection function NSSF of a visited network, where the first message is used to enable the NSSF of the visited network to respond to the first message and query a value of S-nsais in the visited network corresponding to a target Subscribed S-nsais value; the target SubscribeS-NSSAis value is the SubscribeS-NSSAis value of the UE in the home network;
the first receiving unit is configured to receive a second message sent by the NSSF of the visited network, where the second message is a return message sent by the NSSF of the visited network to the AMF of the visited network when the NSSF of the visited network cannot query the S-NSSAIs value in the visited network corresponding to the target Subscribed S-NSSAIs value;
the first processing unit is configured to, after receiving the second message, analyze the target Subscribed S-nsais value to obtain a value of a target identification field in the target Subscribed S-nsais value, and determine, according to the value of the target identification field, a first AMF in the visited network, where the first AMF is matched with the UE.
6. A network slice using apparatus, applied to a network slice selecting function NSSF of a visited network, the apparatus comprising: the second receiving unit, the second processing unit and the second sending unit;
the second receiving unit is used for receiving a first message sent by an access and mobility management function (AMF) of a visited network;
the second processing unit is configured to query, after the second receiving unit receives the first message, a value of S-nsais in the visited network corresponding to the target Subscribed S-nsais value;
the second sending unit is configured to send a second message to the AMF of the visited network, where the second message is a return message from the NSSF of the visited network to the AMF of the visited network when the S-nsais value in the visited network corresponding to the target Subscribed S-nsais value is not queried.
7. A network slice using device is applied to access of a visiting network and a mobile management function (AMF), and is characterized by comprising: a processor, a memory, a communication interface, and a bus; wherein, the communication interface is used for the AMF of the visit network to communicate with other equipment or networks; the memory is used for storing one or more programs, the one or more programs comprising computer executable instructions, which when executed by the network slice using apparatus, the processor executes the computer executable instructions stored by the memory to cause the network slice using apparatus to perform the network slice using method of any one of claims 1-3.
8. A network slice using apparatus, applied to a network slice selection function NSSF of a visited network, comprising: a processor, a memory, a communication interface, and a bus; the communication interface is used for NSSF of the visit network to communicate with other equipment or networks; the memory is used for storing one or more programs, the one or more programs comprising computer executable instructions, which when executed by the network slice using apparatus, the processor executes the computer executable instructions stored by the memory to cause the network slice using apparatus to perform the network slice using method of claim 4.
9. A computer-readable storage medium corresponding to a network slice using apparatus and storing one or more programs, the one or more programs comprising instructions which, when executed by a computer, cause the computer to perform the network slice using method of any one of claims 1-3.
10. A computer-readable storage medium corresponding to a network slice using apparatus and storing one or more programs, wherein the one or more programs include instructions which, when executed by a computer, cause the computer to perform the network slice using method of claim 4.
CN201911013691.8A 2019-10-23 2019-10-23 Network slice using method and device Active CN110691384B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911013691.8A CN110691384B (en) 2019-10-23 2019-10-23 Network slice using method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911013691.8A CN110691384B (en) 2019-10-23 2019-10-23 Network slice using method and device

Publications (2)

Publication Number Publication Date
CN110691384A true CN110691384A (en) 2020-01-14
CN110691384B CN110691384B (en) 2022-09-27

Family

ID=69113753

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911013691.8A Active CN110691384B (en) 2019-10-23 2019-10-23 Network slice using method and device

Country Status (1)

Country Link
CN (1) CN110691384B (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111490899A (en) * 2020-03-27 2020-08-04 腾讯科技(深圳)有限公司 Network access method, device, computer readable medium and electronic equipment
CN113762978A (en) * 2020-06-03 2021-12-07 中国移动通信集团浙江有限公司 Complaint delimiting method and device for 5G slice user and computing equipment
CN113810212A (en) * 2020-06-15 2021-12-17 中国移动通信集团浙江有限公司 Root cause positioning method and device for 5G slice user complaints
CN113822454A (en) * 2020-06-18 2021-12-21 中国移动通信集团浙江有限公司 Prediction method and device for slice complaint processing resources
CN113822453A (en) * 2020-06-15 2021-12-21 中国移动通信集团浙江有限公司 Method and device for determining multi-user complaint commonality of 5G slices
CN114143217A (en) * 2020-08-14 2022-03-04 中兴通讯股份有限公司 Method for determining allowed NSSAI, network equipment and storage medium
CN114391279A (en) * 2020-08-17 2022-04-22 华为技术有限公司 Method and device for discovering target AMF
WO2022126631A1 (en) * 2020-12-18 2022-06-23 华为技术有限公司 Method, apparatus and system for registering to multiple networks
WO2022262170A1 (en) * 2021-06-15 2022-12-22 中国电信股份有限公司 Discovery request processing method, apparatus and system
WO2023014170A1 (en) * 2021-08-05 2023-02-09 삼성전자 주식회사 Method and device for transmitting data of roaming terminal in wireless communication system
WO2023160298A1 (en) * 2022-02-22 2023-08-31 大唐移动通信设备有限公司 Network analysis method, network function, and storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10172009B1 (en) * 2018-04-05 2019-01-01 Netsia, Inc. System and method for a vehicular network service over a 5G network
CN109699072A (en) * 2018-04-09 2019-04-30 华为技术有限公司 Communication means, device and system
US20190150081A1 (en) * 2017-11-14 2019-05-16 Weihua QIAO AMF Selection for Isolated Network Slice
US20190174449A1 (en) * 2018-02-09 2019-06-06 Intel Corporation Technologies to authorize user equipment use of local area data network features and control the size of local area data network information in access and mobility management function
CN109964509A (en) * 2016-11-18 2019-07-02 Lg 电子株式会社 The method and its equipment of network node are selected in a wireless communication system
CN110278096A (en) * 2018-03-14 2019-09-24 华为技术有限公司 A kind of communication means and device based on network slice
CN110324813A (en) * 2019-07-03 2019-10-11 中国联合网络通信集团有限公司 Network slice register method and device under roaming scence based on non-standard S-NSSAI

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109964509A (en) * 2016-11-18 2019-07-02 Lg 电子株式会社 The method and its equipment of network node are selected in a wireless communication system
US20190150081A1 (en) * 2017-11-14 2019-05-16 Weihua QIAO AMF Selection for Isolated Network Slice
US20190174449A1 (en) * 2018-02-09 2019-06-06 Intel Corporation Technologies to authorize user equipment use of local area data network features and control the size of local area data network information in access and mobility management function
CN110278096A (en) * 2018-03-14 2019-09-24 华为技术有限公司 A kind of communication means and device based on network slice
US10172009B1 (en) * 2018-04-05 2019-01-01 Netsia, Inc. System and method for a vehicular network service over a 5G network
CN109699072A (en) * 2018-04-09 2019-04-30 华为技术有限公司 Communication means, device and system
CN110324813A (en) * 2019-07-03 2019-10-11 中国联合网络通信集团有限公司 Network slice register method and device under roaming scence based on non-standard S-NSSAI

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111490899A (en) * 2020-03-27 2020-08-04 腾讯科技(深圳)有限公司 Network access method, device, computer readable medium and electronic equipment
CN113762978A (en) * 2020-06-03 2021-12-07 中国移动通信集团浙江有限公司 Complaint delimiting method and device for 5G slice user and computing equipment
CN113762978B (en) * 2020-06-03 2023-08-18 中国移动通信集团浙江有限公司 Complaint delimiting method and device for 5G slicing user and computing equipment
CN113822453B (en) * 2020-06-15 2023-08-18 中国移动通信集团浙江有限公司 Multi-user complaint commonality determining method and device for 5G slices
CN113810212A (en) * 2020-06-15 2021-12-17 中国移动通信集团浙江有限公司 Root cause positioning method and device for 5G slice user complaints
CN113822453A (en) * 2020-06-15 2021-12-21 中国移动通信集团浙江有限公司 Method and device for determining multi-user complaint commonality of 5G slices
CN113822454A (en) * 2020-06-18 2021-12-21 中国移动通信集团浙江有限公司 Prediction method and device for slice complaint processing resources
CN113822454B (en) * 2020-06-18 2023-08-18 中国移动通信集团浙江有限公司 Method and device for predicting slice complaint processing resources
CN114143217A (en) * 2020-08-14 2022-03-04 中兴通讯股份有限公司 Method for determining allowed NSSAI, network equipment and storage medium
CN114391279A (en) * 2020-08-17 2022-04-22 华为技术有限公司 Method and device for discovering target AMF
CN114391279B (en) * 2020-08-17 2024-04-12 华为技术有限公司 Method and device for discovering target AMF
WO2022126631A1 (en) * 2020-12-18 2022-06-23 华为技术有限公司 Method, apparatus and system for registering to multiple networks
WO2022262170A1 (en) * 2021-06-15 2022-12-22 中国电信股份有限公司 Discovery request processing method, apparatus and system
WO2023014170A1 (en) * 2021-08-05 2023-02-09 삼성전자 주식회사 Method and device for transmitting data of roaming terminal in wireless communication system
WO2023160298A1 (en) * 2022-02-22 2023-08-31 大唐移动通信设备有限公司 Network analysis method, network function, and storage medium

Also Published As

Publication number Publication date
CN110691384B (en) 2022-09-27

Similar Documents

Publication Publication Date Title
CN110691384B (en) Network slice using method and device
CN110267327B (en) Service transmission method and device
CN107295609B (en) Network slice processing method and device, terminal and base station
US11032858B2 (en) Network access method, terminal, access network, and core network
CN109845360B (en) Communication method and device
CN114125808A (en) Discovery method and device of edge application server
CN105139641A (en) WiFi relay station-based vehicle scheduling method and system
CN111225348A (en) Application instance migration method and multi-access edge computing host
US20240073768A1 (en) Information transmission method and device thereof
CN103841625A (en) WLAN access method and WLAN access device
CN112019378A (en) Troubleshooting method and device
CN115278639A (en) Perception data acquisition method, device, equipment and storage medium
CN113453312B (en) Roaming guiding method, device, equipment, storage medium and system
WO2018115041A1 (en) Control of remote ue to access network via a relay ue based on access level and access restriction configuration
CN110650474B (en) Method and device for storing, acquiring and reporting UE (user equipment) capability
CN114786166B (en) Communication method, device, equipment and computer storage medium
CN114025400B (en) Session state holding method and session state holding device
CN104052527B (en) The method and system of a kind of network merging and website
CN111885583B (en) Network sharing method and device
CN114071453B (en) Information processing method, device, equipment and readable storage medium
CN114691734A (en) Cache control method and device, computer readable medium and electronic device
CN114189893A (en) O-RAN capability opening method, communication system, device and storage medium
CN114095986B (en) Communication method, device, equipment and storage medium
CN110972204A (en) Resource allocation method, device, storage medium, network equipment and terminal
CN107852579B (en) Network connection method and related equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant