CN110691384B - Network slice using method and device - Google Patents

Network slice using method and device Download PDF

Info

Publication number
CN110691384B
CN110691384B CN201911013691.8A CN201911013691A CN110691384B CN 110691384 B CN110691384 B CN 110691384B CN 201911013691 A CN201911013691 A CN 201911013691A CN 110691384 B CN110691384 B CN 110691384B
Authority
CN
China
Prior art keywords
network
value
amf
message
nssais
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911013691.8A
Other languages
Chinese (zh)
Other versions
CN110691384A (en
Inventor
吴琼
任驰
马瑞涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN201911013691.8A priority Critical patent/CN110691384B/en
Publication of CN110691384A publication Critical patent/CN110691384A/en
Application granted granted Critical
Publication of CN110691384B publication Critical patent/CN110691384B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/16Central resource management; Negotiation of resources or communication parameters, e.g. negotiating bandwidth or QoS [Quality of Service]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0893Assignment of logical groups to network elements

Abstract

The application discloses a network slice using method and device, relates to the technical field of communication, and is used for realizing that UE (user equipment) can be routed to a matched network slice under a special application scene so as to ensure that a user can carry out normal service. In a roaming scenario, when a network slice selection function NSSF of a visited network cannot inquire an S-NSSAis value in the visited network corresponding to a target SubscribeS-NSSAis value, an access and mobility management function AMF of the visited network analyzes the target SubscribeS-NSSAis value to obtain a target identification field value in the target SubscribeS-NSSAis value, and then a first AMF matched with User Equipment (UE) in the visited network is determined according to the target identification field value. The embodiment of the application is applied to network slice selection of the UE in a roaming scene.

Description

Network slice using method and device
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a method and an apparatus for using a network slice.
Background
With the development of mobile communication technology, 5G network technology is in force. The 5G network not only means faster network speed and stronger network capacity. For a series of applications such as virtual reality, internet of things, artificial intelligence, smart cities and high-definition videos, the 5G network technology is utilized, and then wide application space is provided. With the popularization of various intelligent terminals, after 2020, mobile data traffic will show explosive growth. Application scenarios of 5G networks are divided into three categories: eMBBs (enhanced Mobile Broadband), mMTC (massive Machine Type Communication), uRLLCs (ultra-Reliable Low Latency Communication). In the face of the upcoming 5G era, the international telecommunication union committee, 3GPP, etc. have reached consensus, and the major 5G applications can be incorporated into the category of these three major scenarios.
The 5G network slicing is one of the key technologies of 5G, namely, the 5G network is cut into multiple virtual networks, so as to support more services. The method is responsible for converting the requirements of user service levels into network requirements of a wireless network, a transmission network, a core network, an edge network and the like, and realizing the functions of end-to-end slicing overall design, openness, life cycle, monitoring, quality guarantee and the like. The network slice can provide network services with different levels, mutual isolation and customizable functions for different vertical industries, and realizes customized service design, deployment, operation and maintenance. The advantage of network slicing is that it enables the network operator to self-select the characteristics required for each slice, such as low latency, high throughput, connection density, spectral efficiency, traffic capacity and network efficiency, which helps to improve the efficiency in creating products and services, enhancing the customer experience. Moreover, the operator can change and add slices without considering the influence of the rest of the network, which not only saves time but also reduces cost expenditure, that is, network slices can bring better cost benefit.
At present, the provision of a scenario implementation manner for network slice roaming in the 3GPP standard is not particularly clear, and particularly, the provision of the network slice usage and the allocation of network resources for a user in a urrllc scenario in a roaming network may affect the normal occurrence of a service, and at the same time, the user may also cause complaints that the user has subscribed to the network slice service and does not actually enjoy the corresponding network resource service.
Disclosure of Invention
Embodiments of the present application provide a method and an apparatus for using a network slice, so that a UE (User Equipment) can route to a matched network slice in a special application scenario.
In order to achieve the above purpose, the embodiment of the present application adopts the following technical solutions:
in a first aspect, a method for using a network slice is provided, which is applied to an access and Mobility Management Function (AMF) of a visited network. The method comprises the following steps: the AMF of the visited Network sends a first message to an NSSF (Network Slice Selection Function) of the visited Network. A first message for causing the NSSF of the visited network to query, in response to the first message, values of S-NSSAIs in the visited network corresponding to the target Subscribed S-NSSAIs value. The target SubscribeS-NSSAis value is the SubscribeS-NSSAis value of the UE in the home network. And the AMF of the visit network receives a second message sent by the NSSF of the visit network. The second message is a return message of the NSSF of the visited network to the AMF of the visited network when the NSSF of the visited network cannot inquire the S-NSSAis value in the visited network corresponding to the target Subscribed S-NSSAis value. And after receiving the second message, the AMF of the visited network analyzes the target Subscribed S-NSSAIs value to obtain the value of a target identification field in the target Subscribed S-NSSAIs value, and determines a first AMF matched with the UE in the visited network according to the value of the target identification field.
In a second aspect, a method for using a network slice is provided, which is applied to NSSF of a visited network. The method comprises the following steps: and after receiving a first message sent by the AMF of the visited network, responding to the first message, and inquiring the S-NSSAIs value in the visited network corresponding to the target Subscribed S-NSSAIs value. And sending a second message to the AMF of the visited network, wherein the second message is a message returned from the NSSF of the visited network to the AMF of the visited network when the S-NSSAis value in the visited network corresponding to the target Subscribed S-NSSAis value cannot be inquired.
In a third aspect, an apparatus for using a network slice is provided, where the apparatus is applied to an AMF in a visited network, and the apparatus includes: the device comprises a first sending unit, a first processing unit and a first receiving unit. And the first sending unit is used for sending a first message to the NSSF of the visited network, wherein the first message is used for enabling the NSSF of the visited network to respond to the first message and inquiring the S-NSSAIs value in the visited network corresponding to the target Subscribed S-NSSAIs value. The target SubscribeS-NSSAis value is the SubscribeS-NSSAis value of the UE in the home network. And the first receiving unit is used for receiving a second message sent by the NSSF of the visited network, wherein the second message is a return message sent by the NSSF of the visited network to the AMF of the visited network when the NSSF of the visited network cannot inquire the S-NSSAIs value in the visited network corresponding to the target Subscribed S-NSSAIs value. And the first processing unit is used for analyzing the target Subscribed S-NSSAIs after receiving the second message to obtain the value of the target identification field in the target Subscribed S-NSSAIs, and determining a first AMF (advanced resource configuration) matched with the UE in the visited network according to the value of the target identification field.
In a fourth aspect, an apparatus for using network slice is provided, which is applied to NSSF of visited network, and includes: the device comprises a second receiving unit, a second processing unit and a second sending unit. And the second receiving unit is used for receiving the first message sent by the AMF of the visited network. And the second processing unit is used for inquiring the S-NSSAIs value in the visited network corresponding to the target Subscribed S-NSSAIs value after the second receiving unit receives the first message. And the second sending unit is used for sending a second message to the AMF of the visited network, wherein the second message is a message returned by the NSSF of the visited network to the AMF of the visited network when the S-NSSAIs value in the visited network corresponding to the target Subscribed S-NSSAIs value cannot be inquired.
In a fifth aspect, an apparatus for using a network slice is provided, which is applied to an AMF of a visited network, and includes: a processor, a memory, a communication interface, and a bus. Wherein, the communication interface is used for the AMF of the visiting network to communicate with other devices or networks. The memory is used for storing one or more programs, the one or more programs include computer-executable instructions, and when the network slice using device runs, the processor executes the computer-executable instructions stored in the memory, so that the network slice using device executes the network slice using method of the first aspect.
In a sixth aspect, an apparatus for using network slice is provided, which is applied to NSSF of visited network, and includes: a processor, a memory, a communication interface, and a bus. Wherein, the communication interface is used for NSSF of the visit network and other equipment or network communication. The memory is used for storing one or more programs, and the one or more programs comprise computer executable instructions, and when the network slice using device runs, the processor executes the computer executable instructions stored by the memory to enable the network slice using device to execute the network slice using method of the second aspect.
In a seventh aspect, a computer-readable storage medium storing one or more programs corresponding to a network slice using apparatus is provided, where the one or more programs include instructions that, when executed by a computer, cause the computer to perform the network slice using method of the first aspect.
In an eighth aspect, there is provided a computer readable storage medium storing one or more programs corresponding to the network slice using apparatus, wherein the one or more programs include instructions which, when executed by a computer, cause the computer to execute the network slice using method of the second aspect.
In a roaming scenario, when a network slice mapping failure occurs, a value of a target identification field in a home network sub S-nsais value is obtained by analyzing the home network sub S-nsais value, and then a target AMF available for a UE is selected according to the value of the target identification field. Therefore, the UE can be routed to the matched network slice under the special application scene, so that the normal service of the user is ensured.
Drawings
Fig. 1 is a schematic diagram of a network architecture for user roaming according to an embodiment of the present application;
fig. 2 is a schematic diagram illustrating an S-NSSAI selection process for user roaming according to an embodiment of the present application;
fig. 3 is a schematic diagram illustrating an S-NSSAI selection process for user roaming according to an embodiment of the present application;
FIG. 4 is a block diagram of an S-NSSAI provided by an embodiment of the present application;
fig. 5 is a signaling interaction diagram of user roaming according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of a network slice using apparatus provided in an embodiment of the present application;
fig. 7 is a schematic structural diagram of another network slice using apparatus provided in an embodiment of the present application;
fig. 8 is a schematic structural diagram of another network slice using apparatus provided in an embodiment of the present application;
fig. 9 is a schematic structural diagram of another network slice using apparatus provided in an embodiment of the present application.
Detailed Description
The following briefly introduces some concepts related to embodiments of the present application.
The network slice is a networking mode according to needs, namely, a 5G network is cut into a plurality of virtual networks, so that more services are supported. The method is responsible for converting the requirements of user service levels into network requirements of a wireless network, a transmission network, a core network, an edge network and the like, and realizes the functions of end-to-end slicing overall design, openness, life cycle, monitoring, quality guarantee and the like. The network slice can provide network services with different levels, mutual isolation and customizable functions for different vertical industries, and realizes customized service design, deployment, operation and maintenance.
NSSAI (Network Slice Selection Assistance Information), which is a set of S-NSSAIs (Single-Network Slice Selection Assistance Information), each NSSAI contains n S-NSSAIs. In a network, S-NSSAI uniquely identifies a network slice. Currently, there are four NSSAIs used in networks:
a) configurable NSSAI: the configured slice selection auxiliary information and NSSAI used by the UE are configured by the network, and after the configured NSSAI is received, the UE can know which S-NSSAIs are available in the network. The network will bring the configured NSSAI IE of the register received message to the UE, if the configuration of the registered UE changes, the network can inform the UE of updating through configuration update command. The UE will save the configured NSSAI for each network in non-volatile memory. Each PLMN (Public Land Mobile Network) can only be configured with a configurable NSSAI at most.
b) requested NSSAI: and the requested slice selection auxiliary information is allowed NSSAI carried by the UE in the registration request message.
c) allowed NSSAI: the allowed slice selection assistance information, which S-NSSAIs of the UE-requested NSSAIs are allowed by the network, the network will bring the rejected NSSAI IE of the registration receipt message to the UE.
d) Subscribed S-NSSAIs: the signed slice selects auxiliary information and subscription data of the user.
The NSSF needs to support querying of the S-NSSAIs value in the visited network corresponding to the target Subscribed S-NSSAIs value in the visited network, and the NSSF needs to assist the NF in selecting a suitable network slice according to the S-NSSAI. The S-NSSAI may be a standard value, that is, an SST (Slice/Service type) value is a standard value, and an SD (Slice Differentiator) does not exist; it may also be a non-standard value, i.e. SST and SD are present simultaneously or SST alone but takes on a value other than the standard value.
The technical solutions in the embodiments of the present application will be described below with reference to the drawings in the embodiments of the present application.
In the description of this application, "/" means "or" unless otherwise stated, for example, A/B may mean A or B. "and/or" herein is merely an association describing an associated object, and means that there may be three relationships, e.g., a and/or B, which may mean: a exists alone, A and B exist simultaneously, and B exists alone. Further, "at least one" means one or more, "a plurality" means two or more. The terms "first", "second", and the like do not necessarily limit the number and execution order, and the terms "first", "second", and the like do not necessarily limit the difference.
The technical solution provided in the embodiment of the present application may be applied to various communication systems, for example, an NR (New Radio) communication system that adopts a fifth generation (5G) communication technology, a future evolution system, or a multiple communication convergence system, and the like. The technical scheme provided by the application can be applied to various application scenarios, such as enhanced mobile broadband (eMBB), ultra-reliable and ultra-low latency communication (uRLLC), and mass internet of things communication (mMTC).
The UE is used to provide voice and/or data connectivity services to the user. The UE may have different names, for example: an access terminal, terminal unit, mobile station, remote terminal, mobile device, wireless communication device, vehicle, terminal agent, or terminal device, etc. Optionally, the terminal may be various handheld devices, vehicle-mounted devices, wearable devices, and computers with communication functions, which is not limited in this embodiment of the present application. For example, the handheld device may be a smartphone. The in-vehicle device may be an in-vehicle navigation system. The wearable device may be a smart bracelet. The computer may be a Personal Digital Assistant (PDA) computer, a tablet computer, and a laptop computer.
As shown in fig. 1, a schematic diagram of a network architecture for user roaming provided in an embodiment of the present application is shown, where the network architecture mainly includes two parts: home network elements and visited network elements. The home network element mainly comprises: AMF of home network, UDM of home network, NSSF of home network. The visited place network element mainly comprises: AMF of the visited network, SMF of the visited network, UPF of the visited network, second AMF, second SMF and second UPF.
When the UE needs to roam from the home network to the visited network as shown in fig. 1, as shown in fig. 2, a schematic diagram of an S-NSSAI selection process for user roaming provided in the embodiment of the present application is shown, and the process can be implemented by the network architecture shown in fig. 1. The work flow of each network element in the home network element and the visited network element in fig. 1 includes:
s201, the UE is connected to the AMF of the visit network through the GNB.
S202, the AMF of the visited network obtains a target Subscribed S-NSSAIs value through the UDM of the home network.
S203, the AMF of the visited network can judge whether the AMF of the visited network can provide service for the UE or not through the target Subscribed S-NSSAIs value.
S204, when the AMF of the visited network can not provide service for the UE, the NSSF of the visited network inquires the S-NSSAIs value in the visited network corresponding to the target Subscribed S-NSSAIs value, and the second AMF is found.
S205, when the NSSF of the visited network does not inquire the S-NSSAIs value in the visited network corresponding to the target Subscribed S-NSSAIs value, the UE uses the AMF of the visited network to finish roaming.
In the schematic diagram of the S-NSSAI selection process for user roaming shown in fig. 2, when the NSSF of the visited network cannot query the S-NSSAIs value in the visited network corresponding to the target Subscribed S-NSSAIs value, the UE can only connect to the AMF of the visited network to complete roaming, which may affect normal use of the UE service.
The scenario for network slice roaming in 3GPP TS23.501 is described as follows:
if the UE uses only the standard S-NSSAI value, the UDM should provide the S-NSSAI to the roaming network based on the home signed S-NSSAI, and the same S-NSSAI value as the home network is used in the visited network.
If there is an SLA supporting non-standard S-NSSAI values at the visited and home networks, the NSSF of the visited network maps the subscribed S-NSSAI values to the S-NSSAI values used in the visited network.
The NSSF of a VPLMN (Visited Public Land Mobile Network) does not need to inform the home of the allowed NSSAI values used in the Visited place.
For the user who signs the 5G network slicing service, if the value of the standard S-NSSAI is not used by the user, the user roams to other regions to initiate the service, and if the user does not carry the Requested NSSAI or carries the AMF which is matched with the capability of the user but cannot find the AMF which is matched with the capability of the user in the establishment of the RRC connection request, the access network side directly routes the user who signs the network slicing service to the AMF of the default visit network and initiates the service. Then the user is routed to the AMF of the default visited network and initiates service for the case where the S-NSSAI mapping fails as mentioned earlier.
The AMF of the default visited network does not support the network slice function of URLLC, so this processing mode has a great impact on 5G new service deployment and charging. In some application fields of 5G, higher requirements are put on end-to-end delay, safety and reliability. Especially the uRLLC service, includes: industrial control systems, electronic medical, mobile medical, remote monitoring, diagnostics and therapy, internet of vehicles (real-time vehicle control, flow control, accident prevention, etc.), distributed management smart grid systems, public safety, MPS services, etc.
Therefore, for the urrllc service, if the roaming scenario does not provide the corresponding slice resource, the normal occurrence of the service is affected, and meanwhile, the user may also be complained if the user subscribes to the network slice service and does not actually enjoy the corresponding network resource service.
The patent provides a solution for using slices when the mapping of network slice identifiers fails in a roaming scenario, especially for users in a 5G application scenario.
Fig. 3 is a schematic diagram illustrating an S-NSSAI selection process for roaming of another user according to an embodiment of the present application. The method specifically comprises the following steps:
s301, the UE is connected to the AMF of the visit network through the GNB.
S302, the AMF of the visited network obtains a target Subscribed S-NSSAIs value through the attribution UDM.
S303, the AMF of the visited network can judge whether the AMF of the visited network can provide service for the UE or not through the target Subscribed S-NSSAIs value.
The AMF of the visited network sends a first message to the network slice selection function NSSF of the visited network.
A first message for causing the NSSF of the visited network to query, in response to the first message, values of S-NSSAIs in the visited network corresponding to the target Subscribed S-NSSAIs value. The target SubscribeS-NSSAis value is the SubscribeS-NSSAis value of the UE in the home network.
In one implementation, the AMF of the visited network queries the NSSF of the visited network through the NRF, and the AMF of the visited network sends an NSSF _ NSSelection _ Get Request message to the NSSF of the visited network. And after receiving the Nnssf _ NSSelection _ Get Request message, the NSSF of the visited network inquires the S-NSSAIs value in the visited network corresponding to the target Subscribed S-NSSAIs value. Then, the NSSF of the visited network returns an Nnssf _ NSSelection _ Get Response message to the AMF of the visited network, and the Nnssf _ NSSelection _ Get Response message carries information such as AMF Set or Candidate AMF, Allowed S-NSSAIs and the like.
S304, when the AMF of the visited network can not provide service for the UE, the NSSF of the visited network inquires the S-NSSAIs value in the visited network corresponding to the target Subscribed S-NSSAIs value to obtain a second AMF.
S305, when the NSSF of the visited network does not inquire the S-NSSAIs value in the visited network corresponding to the target Subscribed S-NSSAIs value, the UE is connected to the AMF of the visited network.
And the AMF of the visit network receives a second message sent by the NSSF of the visit network.
The second message is a return message of the NSSF of the visited network to the AMF of the visited network when the NSSF of the visited network cannot inquire the S-NSSAis value in the visited network corresponding to the target Subscribed S-NSSAis value.
In one implementation, when the NSSF of the visited network receives the NSSF _ NSSelection _ Get Request message and cannot query the S-NSSAIs value in the visited network corresponding to the target Subscribed S-NSSAIs value, the NSSF of the visited network returns an NSSF _ NSSelection _ Get Response message to the AMF of the visited network, wherein the message carries the unavailable S-NSSAIs and AMF.
S306, the AMF of the visited network analyzes the target Subscribed S-NSSAIs value to obtain the value of the target identification field in the target Subscribed S-NSSAIs value, and determines the first AMF matched with the UE in the visited network according to the value of the target identification field.
And after receiving the second message, the AMF of the visited network analyzes the target Subscribed S-NSSAIs value to obtain the value of a target identification field in the target Subscribed S-NSSAIs value, and determines a first AMF matched with the UE in the visited network according to the value of the target identification field.
Analyzing the target Subscrib S-NSSAIs value to obtain the value of the target identification field in the target Subscrib S-NSSAIs value, wherein the value of the target identification field in the target Subscrib S-NSSAIs value specifically comprises the following steps: and analyzing to obtain the value of the SST field of the slice/service type in the target Subscribed S-NSSAIs value.
In one implementation, the AMF of the visited network analyzes the target Subscribed S-nsais value to obtain an SST value in the target Subscribed S-nsais value, and obtains a first AMF matched with the UE by determining the SST value. For example: when SST is 1, judging that the UE is an eMBB user; when SST is 2, judging that the UE is a URLLC user; and when the SST is 3, judging the UE to be a MioT user.
Specifically, as shown in FIG. 4, the structure of S-NSSAI is shown, and S-NSSAI includes two parts:
1) SST (Slice/Service type): slice/service type, mandatory information.
2) Sd (slice differential): a slice differentiation discriminator, optional information, for supplementing slice/service types to distinguish between multiple network slices.
SST values of 0-127 remain defined by the standard, and are customizable by the 128-255 operator. The trial point stage adopts SST standard definition, and the commercial stage is planned uniformly according to the business requirement. SST current standards are defined in the following table:
Slice/Service type SST value
eMBB(enhanced Mobile Broadband) 1
URLLC(ultra-reliable low latency communications) 2
MIoT(massive IoT) 3
TABLE 1
Currently, in the international standard, the value of SD is not uniformly defined and configured by the operator itself, so that there are different operators or different HPLMNs (Home Public Land Mobile Network) that have different meanings defined for the value of SD. For example, in a, SD may be ordered by slice priority, while B may be ordered by subscription time. Therefore, when the user roams from the place A to the place B, the mapping failure occurs. Step S306 is a proposed solution to this problem.
Before the AMF of the visiting network sends the first message to the NSSF of the visiting network, the AMF of the visiting network sends a third message to the Unified Data Management (UDM) of the home network.
A third message for causing the UDM to return a fourth message in response to the third message. The fourth message carries subscription data, and the subscription data comprises a Subscribed S-NSSAIs value.
And the AMF of the visited network receives the fourth message, judges that the service cannot be provided for the UE according to the Subscribed S-NSSAIs value, and inquires and connects the NSSF of the visited network through a network storage function (NRF).
In one implementation, before the AMF of the visited network sends the first message to the NSSF, the AMF of the visited network sends a numm _ SDM _ Get Request message to the UDM of the home network, and the UDM returns a numm _ SDM _ Get Response message to the AMF of the visited network after receiving the numm _ SDM _ Get Request message. The Nudm _ SDM _ Get Response message carries subscription data, and the subscription data comprises a Subscribed S-NSSAIs value. And the AMF of the visited network judges whether the AMF is a second AMF matched with the UE in advance according to the Subscribed S-NSSAIs value. And if the AMF of the visit network is not the second AMF matched with the UE, the AMF of the visit network inquires and connects the NSSF of the visit network through a network storage function (NRF).
Fig. 5 is a signaling interaction diagram for roaming of a user according to an embodiment of the present disclosure.
Specifically, when the S-NSSAI selection procedure for user roaming shown in fig. 3 is applied to an actual scene, specific implementation steps are shown in fig. 5, and specifically include:
s501, the UE sends a registration request message to the NR to initiate a registration process, wherein the registration request message carries Requested S-NSSAIs.
S502, NR selects the Initial AMF according to the Requested S-NSSAIs, and sends an Initial UE message to the Initial AMF.
S503, the Initial AMF completes the authentication/security process for the UE.
S504, the Initial AMF sends a Nudm _ SDM _ Get Request message to the UDM of the home network.
S505, after receiving the Nudm _ SDM _ Get Request message, the UDM of the home network returns a Nudm _ SDM _ Get Response message to the Initial AMF, the message carries subscription data, the subscription data comprises information such as Subscribed S-NSSAIs, and the Initial AMF judges that the service cannot be provided for the UE.
S506, the Initial AMF queries and selects NSSF through NRF, sends a NSsf _ NSSection _ Get _ Request message to the selected visited network NSSF, and the NSSF of the visited network queries the S-NSSAIs value in the visited network corresponding to the target Subscribed S-NSSAIs value.
S507, the NSSF returns an Nnssf _ NSSelection _ Get _ Response message, and the message carries information such as AMF Set, Candidate AMF, Allowed S-NSSAIs and the like. And when the NSSF of the visited network cannot inquire the S-NSSAIs value in the visited network corresponding to the target Subscribed S-NSSAIs value, the NSSF of the visited network returns an NSsf _ NSSelection _ Get _ Response message to inform that the Initial AMF has no available S-NSSAIs and AMF.
And S508, after receiving the NSSF failure message, the Initial AMF judges that SST in the Subscribed S-NSSAIs of the UE is 2. And the Initial AMF judges that the user signs the uRLLC service according to the SST being 2, selects a Target AMF special for the uRLLC user according to the configuration information, and sends an Nnrf _ NFdiscovery _ Request message to the NRF, wherein the message carries AMF Set ID information.
S509, the NRF returns a message of Nnrf _ NFDiscovery _ Request _ Response to the Initial AMF.
S510, the Initial AMF sends Namf _ Communication _ N1MessageNotify information to the Target AMF, and the Target AMF returns Namf _ Communication _ N1MessageNotify Ack information to the Initial AMF.
The AMF routes the message to the uRLLC user-specific SMF based on the UE' S Subscribed S-NSSAIs information.
S511, the UE completes the initial registration process.
The embodiment of the present application further provides a device for using a network slice, which is applied to an AMF of a visited network, and is used to implement the function related to the AMF of the visited network in the method for using a network slice provided in the embodiment. Specifically, as shown in fig. 6, a schematic structural diagram of a network slice using apparatus provided in the embodiment of the present application is shown. Wherein the AMF of the visited network includes: a first sending unit 601, a first processing unit 602, and a first receiving unit 603. Wherein:
a first sending unit 601, configured to send a first message to the NSSF of the visited network, where the first message is used to enable the NSSF of the visited network to query, in response to the first message, the S-nsais value in the visited network corresponding to the target Subscribed S-nsais value. The target SubscribeS-NSSAis value is the SubscribeS-NSSAis value of the UE in the home network.
The first receiving unit 603 is configured to receive a second message sent by the NSSF of the visited network, where the second message is a return message sent by the NSSF to the AMF of the visited network when the NSSF of the visited network cannot query the S-nsais value in the visited network corresponding to the target Subscribed S-nsais value.
The first processing unit 602 is configured to, after the first receiving unit 603 receives the second message, analyze the target Subscribed S-NSSAIs value to obtain a value of a target identifier field in the target Subscribed S-NSSAIs value, and determine, according to the value of the target identifier field, the first AMF in the visited network that matches the UE.
It is clear to those skilled in the art from the foregoing description of the embodiments that, for convenience and simplicity of description, the foregoing division of the functional units is merely used as an example, and in practical applications, the above function distribution may be performed by different functional units according to needs, that is, the internal structure of the device may be divided into different functional units to perform all or part of the above described functions. For the specific working processes of the above-described method, apparatus and unit, reference may be made to the corresponding processes in the foregoing method embodiments, and details are not repeated here.
In another embodiment, as shown in fig. 7, a schematic structural diagram of another network slice using apparatus provided in the embodiment of the present application is shown. Wherein, network section operative installations includes: a processor 702, a memory 701, a communication interface 703, and a bus 704. Among other things, the communications interface 703 is used for the AMF of the visited network to communicate with other devices or networks. The memory 701 is used for storing one or more programs, the one or more programs include computer executable instructions, and when the network slice using apparatus runs, the processor 702 executes the computer executable instructions stored in the memory 701, so as to cause the network slice using apparatus to execute the network slice using method in the above-mentioned embodiment.
The processor 702 may implement or execute various illustrative logical blocks, units, and circuits described in connection with the present disclosure. The processor 702 may be a central processing unit, general purpose processor, digital signal processor, application specific integrated circuit, field programmable gate array or other programmable logic device, transistor logic device, hardware component, or any combination thereof. Which may implement or perform the various illustrative logical blocks, units, and circuits described in connection with the present disclosure. The processor 702 may also be a combination of computing functions, e.g., comprising one or more microprocessors, DSPs, and microprocessors, among others.
Memory 701 may include volatile memory, such as random access memory. The memory 701 may also include non-volatile memory, such as read-only memory, flash memory, a hard disk, or a solid state disk. The memory comprises a combination of the above kinds of memories.
The bus 704 may be an Extended Industry Standard Architecture (EISA) bus or the like. The bus may be divided into an address bus, a data bus, a control bus, etc. Fig. 7 is a diagram showing only one thick line for the sake of convenience of illustration, but does not show only one bus or one type of bus.
It is clear to those skilled in the art from the foregoing description of the embodiments that, for convenience and simplicity of description, the foregoing division of the functional units is merely used as an example, and in practical applications, the above function distribution may be performed by different functional units according to needs, that is, the internal structure of the device may be divided into different functional units to perform all or part of the above described functions. For the specific working processes of the above-described method, apparatus and unit, reference may be made to the corresponding processes in the foregoing method embodiments, and details are not described here again.
In another embodiment, the present application further provides a computer-readable storage medium storing one or more programs corresponding to the network slice using apparatus, where the one or more programs include instructions, which when executed by a computer, cause the computer to perform the steps performed by the AMF of the visited network in the network slice using method as described in the above method embodiment.
The computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination thereof. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, and a hard disk. Random Access Memory (RAM), Read-Only Memory (ROM), Erasable Programmable Read-Only Memory (EPROM), registers, a hard disk, an optical fiber, a portable Compact disk Read-Only Memory (CD-ROM), an optical storage device, a magnetic storage device, or any other form of computer-readable storage medium, in any suitable combination, or as appropriate in the art. An exemplary storage medium is coupled to the processor such the processor can read information from, and write information to, the storage medium. Of course, the storage medium may also be integral to the processor. The processor and the storage medium may reside in an Application Specific Integrated Circuit (ASIC). In embodiments of the present application, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
In another embodiment, the present application further provides a computer program product which, when the instructions are run on a network slice using apparatus, causes the network slice using apparatus to perform the steps performed by the AMF visiting the network in the network slice using method.
The computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, and a hard disk. Random Access Memory (RAM), Read-Only Memory (ROM), Erasable Programmable Read-Only Memory (EPROM), registers, a hard disk, an optical fiber, a portable Compact disk Read-Only Memory (CD-ROM), an optical storage device, a magnetic storage device, or any other form of computer-readable storage medium, in any suitable combination, or as appropriate in the art. An exemplary storage medium is coupled to the processor such the processor can read information from, and write information to, the storage medium. Of course, the storage medium may also be integral to the processor. The processor and the storage medium may reside in an Application Specific Integrated Circuit (ASIC). In embodiments of the present application, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
The embodiment of the present application further provides a device for using a network slice, which is applied to an NSSF of a visited network, and is used to implement the function related to the NSSF of the visited network in the method for using a network slice provided in the foregoing embodiment. Specifically, as shown in fig. 8, a schematic structural diagram of a network slice using apparatus provided in the embodiment of the present application is shown. Wherein, this network section operative installations includes: a second receiving unit 801, a second processing unit 802, and a second transmitting unit 803. Wherein:
a second receiving unit 801, configured to receive a first message sent by an AMF of a visited network.
The second processing unit 802 is configured to, after the second receiving unit 801 receives the first message, query the S-nsais value in the visited network corresponding to the target Subscribed S-nsais value.
A second sending unit 803, configured to send a second message to the AMF of the visited network, where the second message is a return message from the NSSF of the visited network to the AMF of the visited network when the value of S-nsais in the visited network corresponding to the target Subscribed S-nsais value is not queried.
It can be clearly understood by those skilled in the art from the foregoing description of the embodiments that, for convenience and simplicity of description, only the division of each functional unit is illustrated, and in practical applications, the above function allocation may be completed by different functional units according to needs, that is, the internal structure of the device may be divided into different functional units to complete all or part of the above described functions. For the specific working processes of the above-described method, apparatus and unit, reference may be made to the corresponding processes in the foregoing method embodiments, and details are not described here again.
In another embodiment, as shown in fig. 9, a schematic structural diagram of another network slice using apparatus provided in the embodiments of the present application is shown. Wherein, network section operative installations includes: a processor 902, a memory 901, a communication interface 903, and a bus 904. Wherein, the communication interface 903 is used for NSSF of the visited network to communicate with other devices or networks; the memory 901 is used for storing one or more programs, the one or more programs including computer executable instructions, when the network slice using apparatus is running, the processor 902 executes the computer executable instructions stored in the memory 901, so as to make the network slice using apparatus execute the network slice using method in the above-mentioned embodiment.
The processor 902 described above may implement or execute various exemplary logical blocks, units and circuits described in connection with the present disclosure. The processor 902 may be a central processing unit, general purpose processor, digital signal processor, application specific integrated circuit, field programmable gate array or other programmable logic device, transistor logic device, hardware component, or any combination thereof. Which may implement or perform the various illustrative logical blocks, units, and circuits described in connection with the present disclosure. The processor 902 may also be a combination of computing functions, e.g., comprising one or more microprocessors, DSPs and microprocessors, and the like.
Memory 901 may include volatile memory, such as random access memory. The memory 901 may also include a non-volatile memory, such as a read-only memory, a flash memory, a hard disk, or a solid state disk. The memory 901 comprises a combination of the above kinds of memories.
The bus 904 may be an Extended Industry Standard Architecture (EISA) bus or the like. The bus may be divided into an address bus, a data bus, a control bus, etc. Fig. 9 is represented, for ease of illustration, by only one thick line, and is not intended to represent only one bus or type of bus.
It is clear to those skilled in the art from the foregoing description of the embodiments that, for convenience and simplicity of description, the foregoing division of the functional units is merely used as an example, and in practical applications, the above function distribution may be performed by different functional units according to needs, that is, the internal structure of the device may be divided into different functional units to perform all or part of the above described functions. For the specific working processes of the above-described method, apparatus and unit, reference may be made to the corresponding processes in the foregoing method embodiments, and details are not described here again.
In another embodiment, the present application further provides a computer readable storage medium storing one or more programs corresponding to the network slice using apparatus, where the one or more programs include instructions, which when executed by a computer, cause the computer to perform the steps performed by the NSSF of the visited network in the network slice using method as shown in the above method embodiment.
The computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination thereof. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, and a hard disk. Random Access Memory (RAM), Read-Only Memory (ROM), Erasable Programmable Read-Only Memory (EPROM), registers, a hard disk, an optical fiber, a portable Compact disk Read-Only Memory (CD-ROM), an optical storage device, a magnetic storage device, or any other form of computer-readable storage medium, in any suitable combination, or as appropriate in the art. An exemplary storage medium is coupled to the processor such the processor can read information from, and write information to, the storage medium. Of course, the storage medium may also be integral to the processor. The processor and the storage medium may reside in an Application Specific Integrated Circuit (ASIC). In embodiments of the present application, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
In another embodiment, the present application also provides a computer program product that, when run on a network slice using apparatus, causes the network slice using apparatus to perform the steps performed by the NSSF that visited the network in the network slice using method.
The computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, and a hard disk. Random Access Memory (RAM), Read-Only Memory (ROM), Erasable Programmable Read-Only Memory (EPROM), registers, a hard disk, an optical fiber, a portable Compact disk Read-Only Memory (CD-ROM), an optical storage device, a magnetic storage device, or any other form of computer-readable storage medium, in any suitable combination, or as appropriate in the art. An exemplary storage medium is coupled to the processor such the processor can read information from, and write information to, the storage medium. Of course, the storage medium may also be integral to the processor. The processor and the storage medium may reside in an Application Specific Integrated Circuit (ASIC). In embodiments of the present application, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
Since the method and apparatus for using network slices, the computer-readable storage medium, and the computer program product in the embodiments of the present invention may be applied to the above method, reference may also be made to the above method embodiments for obtaining technical effects, and details of the embodiments of the present invention are not repeated herein.
The above description is only an embodiment of the present application, but the scope of the present application is not limited thereto, and any changes or substitutions within the technical scope disclosed in the present application should be covered within the scope of the present application.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus, and method may be implemented in other ways. For example, the above-described device embodiments are merely illustrative, and for example, the division of the units is only one type of logical functional division, and other divisions may be realized in practice, for example, multiple units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one position, or may be distributed on multiple network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
In the above embodiments, all or part of the implementation may be realized by software, hardware, firmware, or any combination thereof. When implemented using a software program, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. The procedures or functions described in accordance with the embodiments of the application are all or partially generated when the computer program instructions are loaded and executed on a computer. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored on a computer readable storage medium or transmitted from one computer readable storage medium to another, for example, from one website, computer, server, or data center to another website, computer, server, or data center via wire (e.g., coaxial cable, fiber optic, Digital Subscriber Line (DSL)) or wireless (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or can comprise one or more data storage devices, such as servers, data centers, and the like, that can be integrated with the medium. The usable medium may be a magnetic medium (e.g., floppy Disk, hard Disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., Solid State Disk (SSD)), among others.
The above description is only for the specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present application, and shall be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (6)

1. A network slice using method is applied to an access and mobility management function (AMF) of a visited network, and is characterized in that the method comprises the following steps:
the AMF of the visit network sends a first message to a network slice selection function NSSF of the visit network; the first message, configured to cause the NSSF to query, in response to the first message, a value of S-nsais in the visited network corresponding to a target Subscribed S-nsais value; the target Subscrib S-NSSAIs value is the Subscrib S-NSSAIs value of the user equipment UE in the home network;
the AMF of the visit network receives a second message sent by the NSSF of the visit network; the second message is a return message of the visited network from the NSSF to the AMF of the visited network when the NSSF of the visited network cannot inquire the S-NSSAis value in the visited network corresponding to the target Subscribed S-NSSAis value;
and after receiving the second message, the AMF of the visited network analyzes the target Subscribed S-NSSAIs value to obtain a value of a target identification field in the target Subscribed S-NSSAIs value, and determines a first AMF matched with the UE in the visited network according to the value of the target identification field.
2. The method of claim 1, wherein the method further comprises:
before the AMF of the visiting network sends a first message to the NSSF of the visiting network, the AMF of the visiting network sends a third message to a Unified Data Management (UDM) of a home network; the third message is used for enabling the UDM of the home network to respond to the third message and return a fourth message; the fourth message carries subscription data, and the subscription data comprises a Subscribed S-NSSAIs value;
and the AMF of the visited network receives the fourth message, judges that the UE cannot be provided with service according to the Subscribed S-NSSAIs value, and queries and connects NSSF of the visited network through a network storage function (NRF).
3. The method of using network slices of claim 1, further comprising:
the analyzing the target Subscribed S-nsais value to obtain a value of a target identification field in the target Subscribed S-nsais value specifically includes: and analyzing to obtain the value of the SST field of the slice/service type in the target Subscribed S-NSSAIs.
4. A network slice using apparatus, applied to an access and mobility management function AMF of a visited network, the apparatus comprising: the device comprises a first sending unit, a first processing unit and a first receiving unit;
the first sending unit is configured to send a first message to a network slice selection function NSSF of a visited network, where the first message is used to enable the NSSF of the visited network to respond to the first message and query a value of S-nsais in the visited network corresponding to a target Subscribed S-nsais value; the target SubscribeS-NSSAis value is the SubscribeS-NSSAis value of the UE in the home network;
the first receiving unit is configured to receive a second message sent by the NSSF of the visited network, where the second message is a return message sent by the NSSF of the visited network to the AMF of the visited network when the NSSF of the visited network cannot query the S-NSSAIs value in the visited network corresponding to the target Subscribed S-NSSAIs value;
the first processing unit is configured to, after receiving the second message, analyze the target Subscribed S-nsais value to obtain a value of a target identification field in the target Subscribed S-nsais value, and determine, according to the value of the target identification field, a first AMF in the visited network, where the first AMF is matched with the UE.
5. A network slice using device is applied to access of a visiting network and a mobile management function (AMF), and is characterized by comprising: a processor, a memory, a communication interface, and a bus; wherein, the communication interface is used for the AMF of the visit network to communicate with other equipment or networks; the memory is used for storing one or more programs, the one or more programs comprising computer executable instructions, which when executed by the network slice using apparatus, the processor executes the computer executable instructions stored by the memory to cause the network slice using apparatus to perform the network slice using method of any one of claims 1-3.
6. A computer-readable storage medium corresponding to a network slice using apparatus and storing one or more programs, the one or more programs comprising instructions which, when executed by a computer, cause the computer to perform the network slice using method of any one of claims 1-3.
CN201911013691.8A 2019-10-23 2019-10-23 Network slice using method and device Active CN110691384B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911013691.8A CN110691384B (en) 2019-10-23 2019-10-23 Network slice using method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911013691.8A CN110691384B (en) 2019-10-23 2019-10-23 Network slice using method and device

Publications (2)

Publication Number Publication Date
CN110691384A CN110691384A (en) 2020-01-14
CN110691384B true CN110691384B (en) 2022-09-27

Family

ID=69113753

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911013691.8A Active CN110691384B (en) 2019-10-23 2019-10-23 Network slice using method and device

Country Status (1)

Country Link
CN (1) CN110691384B (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111490899A (en) * 2020-03-27 2020-08-04 腾讯科技(深圳)有限公司 Network access method, device, computer readable medium and electronic equipment
CN113762978B (en) * 2020-06-03 2023-08-18 中国移动通信集团浙江有限公司 Complaint delimiting method and device for 5G slicing user and computing equipment
CN113822453B (en) * 2020-06-15 2023-08-18 中国移动通信集团浙江有限公司 Multi-user complaint commonality determining method and device for 5G slices
CN113810212B (en) * 2020-06-15 2023-04-18 中国移动通信集团浙江有限公司 Root cause positioning method and device for 5G slice user complaints
CN113822454B (en) * 2020-06-18 2023-08-18 中国移动通信集团浙江有限公司 Method and device for predicting slice complaint processing resources
CN114391279B (en) * 2020-08-17 2024-04-12 华为技术有限公司 Method and device for discovering target AMF
WO2022126631A1 (en) * 2020-12-18 2022-06-23 华为技术有限公司 Method, apparatus and system for registering to multiple networks
CN115484669A (en) * 2021-06-15 2022-12-16 中国电信股份有限公司 Method, device and system for processing discovery request
KR20230021343A (en) * 2021-08-05 2023-02-14 삼성전자주식회사 Method and apparatus for transmitting data of a roaming terminal in a wireless communication system
CN116684915A (en) * 2022-02-22 2023-09-01 大唐移动通信设备有限公司 Network analysis method, network function and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10172009B1 (en) * 2018-04-05 2019-01-01 Netsia, Inc. System and method for a vehicular network service over a 5G network
CN109699072A (en) * 2018-04-09 2019-04-30 华为技术有限公司 Communication means, device and system
CN109964509A (en) * 2016-11-18 2019-07-02 Lg 电子株式会社 The method and its equipment of network node are selected in a wireless communication system
CN110278096A (en) * 2018-03-14 2019-09-24 华为技术有限公司 A kind of communication means and device based on network slice
CN110324813A (en) * 2019-07-03 2019-10-11 中国联合网络通信集团有限公司 Network slice register method and device under roaming scence based on non-standard S-NSSAI

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10834668B2 (en) * 2017-11-14 2020-11-10 Ofinno, Llc AMF selection for isolated network slice
US10986602B2 (en) * 2018-02-09 2021-04-20 Intel Corporation Technologies to authorize user equipment use of local area data network features and control the size of local area data network information in access and mobility management function

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109964509A (en) * 2016-11-18 2019-07-02 Lg 电子株式会社 The method and its equipment of network node are selected in a wireless communication system
CN110278096A (en) * 2018-03-14 2019-09-24 华为技术有限公司 A kind of communication means and device based on network slice
US10172009B1 (en) * 2018-04-05 2019-01-01 Netsia, Inc. System and method for a vehicular network service over a 5G network
CN109699072A (en) * 2018-04-09 2019-04-30 华为技术有限公司 Communication means, device and system
CN110324813A (en) * 2019-07-03 2019-10-11 中国联合网络通信集团有限公司 Network slice register method and device under roaming scence based on non-standard S-NSSAI

Also Published As

Publication number Publication date
CN110691384A (en) 2020-01-14

Similar Documents

Publication Publication Date Title
CN110691384B (en) Network slice using method and device
CN110267327B (en) Service transmission method and device
CN109922472B (en) Acquisition of user policy
EP3993347A1 (en) Method and device for application migration
CN107295609B (en) Network slice processing method and device, terminal and base station
US11032858B2 (en) Network access method, terminal, access network, and core network
CN109845360B (en) Communication method and device
CN114125808A (en) Discovery method and device of edge application server
CN111586770B (en) Session management method and device
CN109451836B (en) Method and device for recovering and establishing wireless backhaul link
CN103841625A (en) WLAN access method and WLAN access device
CN109246720B (en) Method and terminal for determining establishment cause
CN105557045A (en) Access network node, core network node and paging method
CN112492592A (en) Authorization method under multiple NRF scenes
CN113453312B (en) Roaming guiding method, device, equipment, storage medium and system
CN110650474B (en) Method and device for storing, acquiring and reporting UE (user equipment) capability
EP3560242A1 (en) Control of remote ue to access network via a relay ue based on access level and access restriction configuration
CN114786166B (en) Communication method, device, equipment and computer storage medium
CN114025400B (en) Session state holding method and session state holding device
CN111885583B (en) Network sharing method and device
CN114691734A (en) Cache control method and device, computer readable medium and electronic device
CN114189893A (en) O-RAN capability opening method, communication system, device and storage medium
CN114095986B (en) Communication method, device, equipment and storage medium
CN111371843B (en) Data storage method and device
CN107852579B (en) Network connection method and related equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant