CN111132238A - Network access method and device - Google Patents

Network access method and device Download PDF

Info

Publication number
CN111132238A
CN111132238A CN201911400498.XA CN201911400498A CN111132238A CN 111132238 A CN111132238 A CN 111132238A CN 201911400498 A CN201911400498 A CN 201911400498A CN 111132238 A CN111132238 A CN 111132238A
Authority
CN
China
Prior art keywords
rfsp
access
terminal
network
base station
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201911400498.XA
Other languages
Chinese (zh)
Other versions
CN111132238B (en
Inventor
马泽芳
马瑞涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN201911400498.XA priority Critical patent/CN111132238B/en
Publication of CN111132238A publication Critical patent/CN111132238A/en
Application granted granted Critical
Publication of CN111132238B publication Critical patent/CN111132238B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/16Central resource management; Negotiation of resources or communication parameters, e.g. negotiating bandwidth or QoS [Quality of Service]
    • H04W28/18Negotiating wireless communication parameters
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • H04W36/0055Transmission or use of information for re-establishing the radio link
    • H04W36/0077Transmission or use of information for re-establishing the radio link of access information of target access point
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • H04W36/0083Determination of parameters used for hand-off, e.g. generation or modification of neighbour cell lists
    • H04W36/00835Determination of neighbour cell lists
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/20Selecting an access point
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/02Power saving arrangements
    • H04W52/0209Power saving arrangements in terminal devices
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

The embodiment of the application provides a network access method and a network access device, relates to the technical field of communication machines, and solves the problems that in the prior art, a terminal is long in network access time and large in power consumption. The method comprises the following steps: an access function management network element AMF acquires an access strategy and a first access request, wherein the first access request comprises an identifier of a terminal, and the first access request is used for requesting to access a network; the AMF determines a target wireless access type/radio frequency priority RFSP index according to the identification of the terminal and the access strategy, the AMF stores a plurality of RFSP indexes, the target RFSP index is one of the RFSP indexes, and one RFSP index uniquely identifies one RFSP; the AMF sends the target RFSP index to a base station, and the target RFSP index is used for indicating the base station to determine the RFSP corresponding to the target RFSP index.

Description

Network access method and device
Technical Field
The present application relates to the field of communications technologies, and in particular, to a network access method and apparatus.
Background
At present, when a terminal moves to a coverage area of a 5rd generation (5G) shared base station, the terminal needs to try to access different frequencies in the 5G shared base station for multiple times before selecting a proper frequency for access, so that the terminal not only needs a long time to access a network, but also has large power consumption.
Content of application
The application provides a network access method and a network access device, which are used for solving the problems of long time and high power consumption of a terminal accessing a network in the prior art.
In order to achieve the above purpose, the embodiment of the present application adopts the following technical solutions:
in a first aspect, a network access method is provided, in which an AMF obtains an access policy and a first access request, where the first access request includes an identifier of a terminal, and the first access request is used to request access to a network. Then, the AMF determines a target RFSP index according to the access strategy and the identification of the terminal. The AMF stores a plurality of RFSP indexes, the target index is one of the RFSP indexes, and one RFSP index uniquely identifies one RFSP. Next, the AMF transmits a target RFSP index for instructing the base station to determine an RFSP corresponding to the target RFSP index to the base station.
In the method, after the AMF acquires the access policy and the first access request, the AMF determines a target RFSP index from a plurality of RFSPs according to the access policy and the terminal identifier in the first access request. Then, the AMF transmits the target RFSP index to the base station. After receiving the target RFSP index, the base station may determine the target RFSP according to the target RFSP index and a pre-configured correspondence between the RFSP index and the RFSP. And finally, the base station sends the target RFSP to the terminal so that the terminal accesses the network according to the target RFSP. Compared with the prior art that when the terminal is accessed to the network, the terminal needs to try to access the frequency band of the 5G shared base station for multiple times, the terminal can be accessed to the network once. Accordingly, the terminal can reduce the number of times of accessing the network, so that the terminal can reduce the time of accessing the network and reduce power consumption.
In a second aspect, a network access device is provided, which is capable of implementing the functions of the first aspect and any one of its possible implementations. These functions may be implemented by hardware, or by hardware executing corresponding software. The hardware or software includes one or more modules corresponding to the above-described functions.
In one possible aspect of the present application, the network access apparatus includes: the communication unit is used for acquiring an access policy and a first access request, wherein the first access request comprises an identifier of a terminal, and the first access request is used for requesting to access a network. And the processing unit is used for determining the target RFSP index according to the access strategy and the identifier of the terminal. The storage unit is used for storing a plurality of RFSP indexes, the target RFSP index is one of the RFSP indexes, and one RFSP index uniquely identifies one RFSP. And a communication unit for transmitting a target RFSP index to the base station, wherein the target RFSP index is used for instructing the base station to determine the RFSP corresponding to the target RFSP index.
In a third aspect, a network access apparatus is provided that includes a memory and a processor. The memory is used for storing computer execution instructions, and the processor is connected with the memory through a bus. When the network access device is running, the processor executes the computer executable instructions stored in the memory to cause the network access device to perform the network access method of the first aspect.
The network access device may be an AMF, or may be a part of a device in the AMF, for example, a system-on-chip in the AMF. The system on chip is configured to support the AMF to implement the functions involved in the first aspect and any one of its possible implementations, for example, to receive, determine, and offload data and/or information involved in the network access method. The chip system includes a chip and may also include other discrete devices or circuit structures.
In a fourth aspect, a computer-readable storage medium is provided, which comprises computer-executable instructions, which, when executed on a computer, cause the computer to perform the network access method of the first aspect.
In a fifth aspect, there is provided a computer program product which, when run on a computer, causes the computer to perform the network access method of the first aspect and any of its possible designs.
It should be noted that all or part of the computer instructions may be stored on the first computer storage medium. The first computer storage medium may be packaged together with the processor of the network access apparatus, or may be packaged separately from the processor of the network access apparatus, which is not limited in this embodiment of the application.
For the descriptions of the second, third, fourth and fifth aspects in this application, reference may be made to the detailed description of the first aspect; in addition, for the beneficial effects of the second aspect, the third aspect, the fourth aspect and the fifth aspect, reference may be made to the beneficial effect analysis of the first aspect, and details are not repeated here.
In a sixth aspect, a network access method is provided, in which a base station receives a target RFSP index from an AMF. Then, the base station determines a target RFSP according to the target RFSP index and the corresponding relation between the pre-configured RFSP and the RFSP index. Finally, the base station transmits the target RFSP to the terminal.
In the prior art, when a terminal accesses a network through a base station, the terminal needs to access the frequency of the base station for multiple times until a proper frequency is determined, so that the time for the terminal to access the network is long and the power consumption is high. In the present application, the base station may directly determine the RFSP that can be used by the terminal according to the target RFSP index, and then send the RFSP to the terminal, so that the terminal accesses the network according to the frequency allocated by the base station. The terminal does not need to access the frequency of the base station for multiple times, so that the terminal can reduce the time for accessing the network and the power consumption of the access network.
A seventh aspect provides a network access device, which is capable of implementing the functions in the sixth aspect and any one of the possible implementations thereof. These functions may be implemented by hardware, or by hardware executing corresponding software. The hardware or software includes one or more modules corresponding to the above-described functions.
In one possible aspect of the present application, the network access apparatus includes: a communication unit for receiving the target RFSP index from the AMF. And the processing unit is used for determining the target RFSP according to the target RFSP index and the corresponding relation between the preset RFSP and the RFSP index. The storage unit is used for storing a corresponding relation between the pre-configured RFSP and the RFSP index, wherein the corresponding relation comprises one or more RFSPs and one or more RFSP indexes, one RFSP corresponds to one RFSP index, and the target RFSP is one of the one or more RFSPs. And a communication unit for transmitting the target RFSP to the terminal.
In an eighth aspect, a network access device is provided that includes a memory and a processor. The memory is used for storing computer execution instructions, and the processor is connected with the memory through a bus. When the network access device is running, the processor executes the computer executable instructions stored in the memory to cause the network access device to perform the network access method of the first aspect.
The network access device may be a base station, or may be a part of a device in the base station, such as a system-on-chip in the base station. The chip system is configured to support the base station to implement the functions related to the sixth aspect and any one of the possible implementations thereof, for example, to receive, determine, and offload data and/or information related to the network access method. The chip system includes a chip and may also include other discrete devices or circuit structures.
In a ninth aspect, a computer-readable storage medium is provided, which comprises computer-executable instructions, which, when executed on a computer, cause the computer to perform the network access method of the sixth aspect.
A tenth aspect provides a computer program product for causing a computer to perform the network access method according to the sixth aspect and any of its possible designs, when the computer program product runs on the computer.
It should be noted that all or part of the computer instructions may be stored on the first computer storage medium. The first computer storage medium may be packaged together with the processor of the network access apparatus, or may be packaged separately from the processor of the network access apparatus, which is not limited in this embodiment of the application.
For the description of the seventh aspect, the eighth aspect, the ninth aspect and the tenth aspect in the present application, reference may be made to the detailed description of the sixth aspect; moreover, for the beneficial effects of the seventh aspect, the eighth aspect, the ninth aspect and the tenth aspect, reference may be made to the beneficial effect analysis of the sixth aspect, and details are not repeated here.
In an eleventh aspect, a network access method is provided, where a terminal sends a first access request to a base station, the first access request including an identifier of the terminal, and the first access request is used to request access to a network. Then, the terminal receives the target RFSP from the base station. And finally, the terminal accesses the network according to the target RFSP.
In the method, after the terminal sends the first access request to the base station, the terminal receives the target RFSP from the base station. Thus, the base station can directly access the network according to the target RFSP. Compared with the prior art, the terminal does not need to try to access the network for multiple times. Accordingly, the terminal can reduce the number of times of accessing the network, and thus, the terminal can reduce the time of accessing the network and reduce power consumption.
In a twelfth aspect, a network access device is provided, which is capable of implementing the functions of the eleventh aspect and any one of the possible implementations thereof. These functions may be implemented by hardware, or by hardware executing corresponding software. The hardware or software includes one or more modules corresponding to the above-described functions.
In one possible aspect of the present application, the network access apparatus includes: the communication unit is used for sending a first access request to the base station, wherein the first access request comprises the identification of the terminal, and the first access request is used for requesting to access the network. And the communication unit is also used for receiving the target RFSP from the base station. And the processing unit is used for accessing the network according to the target RFSP.
In a thirteenth aspect, a network access apparatus is provided that includes a memory and a processor. The memory is used for storing computer execution instructions, and the processor is connected with the memory through a bus. When the network access device is running, the processor executes the computer executable instructions stored by the memory to cause the network access device to perform the network access method of the eleventh aspect.
The network access device may be a terminal, or may be a part of a device in the terminal, such as a system-on-chip in the terminal. The chip system is configured to support the terminal to implement the functions related to the eleventh aspect and any one of the possible implementations thereof, for example, to receive, determine, and offload data and/or information related to the network access method. The chip system includes a chip and may also include other discrete devices or circuit structures.
In a fourteenth aspect, a computer-readable storage medium is provided, which comprises computer-executable instructions, which when executed on a computer, cause the computer to perform the network access method of the eleventh aspect.
A fifteenth aspect provides a computer program product for causing a computer to perform the network access method according to the eleventh aspect and any possible design thereof when the computer program product runs on the computer.
It should be noted that all or part of the computer instructions may be stored on the first computer storage medium. The first computer storage medium may be packaged together with the processor of the network access apparatus, or may be packaged separately from the processor of the network access apparatus, which is not limited in this embodiment of the application.
The description of the twelfth, thirteenth, fourteenth and fifteenth aspects in the present application may refer to the detailed description of the sixth aspect; in addition, for the beneficial effects of the twelfth aspect, the thirteenth aspect, the fourteenth aspect and the fifteenth aspect, reference may be made to the beneficial effect analysis of the sixth aspect, and details are not repeated here.
In the embodiment of the present application, the names of the network access apparatuses mentioned above do not limit the devices or the functional modules themselves, and in an actual implementation, the devices or the functional modules may appear by other names. Insofar as the functions of the respective devices or functional modules are similar to those of the present application, they fall within the scope of the claims of the present application and their equivalents.
Drawings
Fig. 1 is a schematic structural diagram of a communication system according to an embodiment of the present application;
fig. 2 is a schematic structural diagram of another communication system according to an embodiment of the present application;
fig. 3 is a flowchart illustrating a network access method according to an embodiment of the present application;
fig. 4 is a flowchart illustrating another network access method according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of a network access device according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of another network access device according to an embodiment of the present application;
fig. 7 is a schematic structural diagram of a chip according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that in the embodiments of the present application, words such as "exemplary" or "for example" are used to indicate examples, illustrations or explanations. Any embodiment or design described herein as "exemplary" or "e.g.," is not necessarily to be construed as preferred or advantageous over other embodiments or designs. Rather, use of the word "exemplary" or "such as" is intended to present concepts related in a concrete fashion.
For the convenience of clearly describing the technical solutions of the embodiments of the present application, in the embodiments of the present application, the terms "first" and "second" are used to distinguish the same items or similar items with basically the same functions and actions, and those skilled in the art can understand that the terms "first" and "second" are not used to limit the quantity and execution order.
In order to facilitate understanding of the technical solutions of the present application, some technical terms are described below.
1、RFSP
The RFSP includes a Radio Access Type (RAT) and a radio frequency priority (FSP). In the embodiment of the present application, the RAT and the FSP are simply referred to as "RFSP".
2. Shared base station
A shared base station refers to a base station in which two (or more) communication carriers share the same network.
For example, taking a shared base station as a 5G shared base station for two communication carriers (communication carrier 1 and communication carrier 2) to share a 5G network as an example, the following overlapping coverage areas or adjacent coverage areas exist in the coverage area of the shared base station.
1) The neighboring base station is located between the 5G shared base station of the carrier 1 and the 5G shared base station of the carrier 2.
2) The 5G shared base station of the carrier 1, the unshared base station of the carrier 2, and the unshared base station of the carrier 1 have an adjacent relationship.
3) The 5G shared base station of the carrier 2, the non-5G shared base station of the carrier 2, and the non-shared base station of the carrier 1 have an adjacent relationship.
It should be noted that, within the coverage area of the 5G shared base station, other network coverage (e.g., 2G, 3G, 4G) of the communication carrier 1 and other network coverage (e.g., 2G, 3G, 4G) of the communication carrier 2 exist at the same time. The frequency distribution within the coverage area of a 5G shared base station is as follows:
(1) the frequency of the 5G independent station of the carrier 1 is F1.
(2) The frequency of the 5G independent station of the carrier 2 is F2.
(3) The frequency of the 5G sharing station has the following three cases:
the first condition is as follows: the frequency of the 5G shared base station of carrier 1 and the frequency of the 5G shared base station of carrier 2 are both F1+ F2.
Case two: the frequency of the 5G shared station of carrier 1 and the frequency of the 5G shared base station of carrier 2 are both F3+ F4.
Case three: the frequency of the 5G shared station of carrier 1 is F1, and the frequency of the 5G shared base station of carrier 2 is F2.
Wherein, F1, F2, F3 and F4 are different frequencies respectively. The selection of the above three cases depends on various factors such as frequency resources of the communication operator.
Based on the frequency assignment, if the coverage area of the shared base station has a frequency of an unshared base station of a communication carrier supported by the terminal, the terminal uses the unshared base station and the frequency. If the coverage area of the shared base station does not have the frequency of the communication operator supported by the terminal, the terminal uses the shared base station and the shared frequency of other communication operators.
It should be noted that, when the terminal accesses the shared base station or the unshared base station, the large broadband access type and frequency are preferentially selected for use. For example, when the terminal moves to the a area, the a area includes a 3G network, a 4G network, and a 5G network, and if the terminal supports the 5G network, the terminal preferentially accesses the 5G network.
Illustratively, there is a 5G shared base station 1 in the B area of the a city, which is hosted by the carrier 1 and shared with the carrier 2. The 5G frequency of the 5G sharing base station 1 is F1 or F1+ F2. For example, F1 is 3.4-3.5GHZ, F2(3.5-3.6 GHZ).
In this case, when the user of carrier 1 has a 5G terminal moving to the B area, the 5G terminal preferentially accesses the 5G shared base station and uses the frequency F1 or F2.
As yet another example, there is a 5G shared base station 2 in the a city C area where the carrier 2 hosts the shared to the carrier 1. The 5G frequency of the 5G shared base station 2 is F2 or F1+ F2.
In this case, when the user of carrier 1 moves to the C area with the 5G terminal, the 5G terminal preferentially accesses the 5G shared base station and uses the frequency F2 or F1.
Here, the B area and the C area have overlapping 4G coverage of the carrier 1 and the carrier 2. For example, the 4G frequency of the carrier 1 is F3(1860-1875HZ) or F5 (1920-1940). The 4G frequency of the carrier 2 is F4 (1735-.
If the user of carrier 1 holds the 5G terminal leaving the coverage of the 5G shared base station in the B-zone or C-zone, the 5G terminal accesses the 4G frequency F3 or F5. If the user of the carrier 2 holds the 5G terminal leaving the coverage of the 5G shared base station in the B-zone or C-zone, the 5G terminal accesses the 4G frequency F4 or F6.
The technical scheme of the embodiment of the application can be applied to various communication systems, for example: code Division Multiple Access (CDMA), Time Division Multiple Access (TDMA), Frequency Division Multiple Access (FDMA), Orthogonal Frequency Division Multiple Access (OFDMA), single carrier frequency division multiple access (SC-FDMA), and other systems. The term "system" may be used interchangeably with "network". CDMA systems may implement wireless technologies such as Universal Terrestrial Radio Access (UTRA), CDMA2000, and the like. UTRA may include Wideband CDMA (WCDMA) technology and other CDMA variant technologies. CDMA2000 may cover the Interim Standard (IS) 2000(IS-2000), IS-95 and IS-856 standards. TDMA systems may implement wireless technologies such as global system for mobile communications (GSM). The OFDMA system may implement wireless technologies such as evolved universal terrestrial radio access (E-UTRA), Ultra Mobile Broadband (UMB), IEEE 802.11(Wi-Fi), IEEE 802.16(WiMAX), IEEE802.20, Flash OFDMA, etc. UTRA and E-UTRA are UMTS as well as UMTS evolved versions. Various versions of 3GPP in Long Term Evolution (LTE) and LTE-based evolution are new versions of UMTS using E-UTRA. The 5G communication system, New Radio (NR), is the next generation communication system under study. In addition, the communication system can also be applied to future-oriented communication technologies, and the technical solutions provided by the embodiments of the present application are all applied.
The system architecture and the service scenario described in the embodiment of the present application are for more clearly illustrating the technical solution of the embodiment of the present application, and do not form a limitation on the technical solution provided in the embodiment of the present application, and as a person of ordinary skill in the art knows that along with the evolution of the network architecture and the appearance of a new service scenario, the technical solution provided in the embodiment of the present application is also applicable to similar technical problems. In the embodiment of the present application, the method provided is applied to an NR system or a 5G network as an example.
As shown in fig. 1, fig. 1 is a schematic structural diagram of a communication system provided in an embodiment of the present application, where the communication system includes: the system comprises a terminal 10, a base station 20 communicated with the terminal, an access function management network element 30, a unified data management network element 40, a strategy control network element 50 and a data network 60.
The terminal 10 may communicate with the access function management network element 30 through the base station 20. The terminal 10 may also access the data network 60 through the base station 20.
The access function management network element 30 is in communication connection with the unified data management network element 40 and the policy control network element 50, respectively. The access function managing network element 30 is used for taking charge of mobility management of the communication system, for example, location update of the terminal 10, registration network of the terminal 10, network handover of the terminal 10, and the like.
The unified data management network element 40 is responsible for subscription information management of the communication system, authentication of the terminal 10, and the like.
The main functions of the policy control network element 50 include: (1) detecting application and service data flow; (2) quality of service (QoS) control; (3) managing the amount; (4) flow-based charging; (5) background data (Background data) transfer policy negotiation; (6) managing a network open function (NEF) element and a packet traffic description function (PFDF) element configured from a third party AS by a pfd (packetfilter descriptor); (7) data flow split management (different DN); (8) the method comprises the steps of providing a UDR (user DataReposity) front-end function to provide subscription information of a terminal; (9) providing network selection and mobility management related policies (e.g., RFSP retrieval); (10) configuration of UE policies (the network side has to support providing policy information to the UE, e.g. network discovery and selection policy, SSC mode selection policy, network slice selection policy).
In this embodiment, the base station 20 may be referred to as an access device, and may also be referred to as a Radio Access Network (RAN). The base station is a shared base station. The base station may be a base station transceiver station (BTS) in a global system for mobile communications (GSM), Code Division Multiple Access (CDMA), a base station (node B) in a Wideband Code Division Multiple Access (WCDMA), an eNB, an internet of things (IoT) or an eNB in a narrowband internet of things (NB-IoT), a base station in a future 5G mobile communication network or a Public Land Mobile Network (PLMN) for future evolution, which is not limited in any way by the embodiments of the present application.
In the embodiment of the present application, the terminal 10 is a device that needs to access a network. The terminal may be referred to by different names, such as User Equipment (UE), access terminal, terminal unit, terminal station, mobile station, remote terminal, mobile device, wireless communication device, vehicular user equipment, terminal agent or terminal device, and the like. Optionally, the terminal may be various handheld devices, vehicle-mounted devices, wearable devices, and computers with communication functions, which is not limited in this embodiment of the present application. For example, the handheld device may be a smartphone. The in-vehicle device may be an in-vehicle navigation system. The wearable device may be a smart bracelet. The computer may be a Personal Digital Assistant (PDA) computer, a tablet computer, and a laptop computer.
As shown in fig. 2, fig. 2 is a schematic structural diagram of a communication system according to an embodiment of the present application.
When a terminal moves to a coverage area of a shared base station, the terminal needs to access an external Data Network (DN) through the shared base station. The shared base station is a shared base station of the carrier 1 and the carrier 2.
It should be understood that, in fig. 2, taking the Core Network (CN) as a 5G Core Network (5G Core, 5GC) as AN example, in this case, the base station may be AN access device in the 5G Network or may be AN Access Network (AN)/Radio Access Network (RAN). For example, The Next Generation Node B (gNB).
In the 5G communication system shown in fig. 2, the functions may establish a connection through a next generation Network (NG) interface to implement communication, for example: the terminal may establish a control plane signaling connection with AN access and mobility Management Function (AMF) network element through AN N interface 1 (N1 for short), the AN/RAN may establish a control plane signaling connection with the AMF through AN N interface 2 (N2 for short), and a User Plane Function (UPF) network element may establish a control plane signaling connection with a Session Management Function (SMF) network element through AN N interface 4 (N4 for short). In fig. 2, a v-security edge protection proxy (vSEPP) in the core network of the carrier 1 is connected to an hSEPP in the core network of the carrier 2 through an N interface 32 (abbreviated as N32).
It should be understood that, in the 5GC, the network element or entity corresponding to the access function management network element may be an AMF network element, and the network element or entity corresponding to the unified data management network element may be an Unified Data Management (UDM) network element, and the network element or entity corresponding to the policy control network element may be a Policy Control Function (PCF) network element.
It should be understood that, if the core network adopts a 4G core network (e.g., Evolved Packet Core (EPC), the base station may be an access device or an evolved node b (eNB) in the 4G network, a network element or entity corresponding to the access function management network element may be a Mobility Management Entity (MME), a unified data management network element may be a Home Subscriber Server (HSS) or a User Subscription Database (USD) or a database entity, and the policy control network element may be a Policy and Charging Rules Function (PCRF) network element.
It should be noted that the base station, the AMF network element, the SMF network element, the UDM network element, the User Plane Function (UPF) network element, the authentication server function (AUSF) network element, the network storage function (NRF) network element, the network open function (NEF) network element, and the Policy Control Function (PCF) network element in fig. 2 are only names, and the names do not limit the device itself. In a 5G network and other future networks, network elements or entities corresponding to a base station, an AMF network element, an SMF network element, an UDM network element, an UPF network element, an AUSF network element, an NRF network element, an NEF network element, an Application Function (AF) and a PCF network element may also be other names, which is not specifically limited in this embodiment of the present application.
With reference to fig. 1 and fig. 2, fig. 3 illustrates a network access method provided in an embodiment of the present application.
As shown in fig. 3, the network access method includes:
step 101, the AMF acquires a first access request.
The first access request includes an identifier of the terminal, where the identifier of the terminal may encrypt an Encrypted Mobile Subscriber identity (emis) code, a Personal Identification Number (PIN), and the like. The first access request is for requesting access to a network.
It should be noted that the first access request may further include location information of the terminal, capability information of the terminal, and subscription information of the terminal.
The capability information of the terminal refers to a network that the terminal can support, for example, in the case that the terminal is a 5G terminal, when the terminal moves to the coverage of the 5G shared base station, the terminal can access the 5G network; when the terminal is a 4G terminal, when the terminal moves to the coverage of the 5G shared base station, the terminal cannot access the 5G network and can only access the 4G network.
The subscription information of the terminal refers to service information possessed by the terminal, that is, information signed by a user corresponding to the terminal and a communication operator. For example, in the case that the terminal has a voice service, if the 5G shared base station supports the voice service, the terminal may use the voice service through the 5G shared base station; if the 5G shared base station does not support the voice service, the terminal can use the voice service through the 4G network.
Step 102, the AMF acquires an access policy.
The access policy is used for determining the RFSP used when the terminal accesses the network.
Step 103, the AMF determines a target RFSP index according to the access policy and the identifier of the terminal.
The AMF stores a plurality of RFSP indexes. The target RFSP is one of a plurality of RFSP indexes, and one RFSP index uniquely identifies one RFSP.
It should be noted that the RFSP Index includes a radio access type Index (Index to RAT) and a radio frequency priority Index (Index to FSP).
For example, Index to RAT may be 1, 2, 3. Wherein 1 represents 5G, 2 represents 4G, and 3 represents 3G.
For example, a 5G shared base station is taken as a base station shared by carrier 1 and carrier 2. For communications carrier 1, the AMF stores Index to FSP in the following order: a. b, c, d, e, f. Wherein a represents F1, b represents F2, c represents F3, d represents F4, e represents F5, and F represents F6. For communications carrier 2, the AMF stores Index to FSP may be in the following order: b. a, d, f, c, e. That is, if the terminal of carrier 1 needs to access the 5G shared base station, F1 is preferentially used, and if F1 is occupied, F2 is used, and so on. If the terminal of carrier 2 needs to access the 5G shared base station, F2 is preferentially used, and if F2 is occupied, F1 is used, and so on.
Step 104, the AMF sends the target RFSP index to the base station.
Wherein the target RFSP index is used to instruct the base station to determine an RFSP corresponding to the target RFSP index.
It should be understood that, in the embodiment of the present application, the AMF transmits Index to RAT and Index to fsp to the base station through the N2 interface. Then, the base station maps Index to RAT and Index to FSP according to the stored corresponding relationship between RFSP and RFSP Index. Therefore, the technical scheme of the embodiment of the application can save channel resources.
According to the network access method provided by the embodiment of the application, after the AMF acquires the access policy and the first access request, the AMF determines the target RFSP index from the plurality of RFSPs according to the access policy and the identifier of the terminal in the first access request. Then, the AMF transmits the target RFSP index to the base station. After receiving the target RFSP index, the base station may determine the target RFSP according to the target RFSP index and a pre-configured correspondence between the RFSP index and the RFSP. And finally, the base station sends the target RFSP to the terminal so that the terminal accesses the network according to the target RFSP. Compared with the prior art that when the terminal is accessed to the network, the terminal needs to try to access the frequency band of the 5G shared base station for multiple times, the terminal can be accessed to the network once. Accordingly, the terminal can reduce the number of times of accessing the network, so that the terminal can reduce the time of accessing the network and reduce power consumption.
In a possible embodiment, with reference to the technical solution shown in fig. 3, fig. 4 shows another network access method provided in the embodiment of the present application.
As shown in fig. 4, before step 101, step 201-step 202 may also be included:
step 201, the terminal sends a first access request to the base station. Accordingly, the base station receives a first access request from the terminal.
It should be noted that, when the terminal moves to the coverage area of the shared base station, or the terminal needs to access the network through the shared base station, the terminal may send the first access request to the base station.
Step 202, the base station sends a first access request to the AMF. In response, the AMF receives a first access request from the base station.
In a possible implementation manner, the base station may directly forward the first access request from the terminal to the base station.
In another possible implementation manner, the base station may generate the second access request according to the identifier of the first access request and the identifier of the base station. The base station then sends a second access request to the AMF.
In one possible embodiment, the access policy comprises a first access policy or a second access policy, the second access policy having a higher priority than the first access policy. As shown in fig. 4, step 102 may be implemented by step 203 or step 204 when the terminal accesses the network through the 5G shared base station for the first time.
Step 203, in case that the access policy includes the first access policy, the AMF acquires the first access policy from the UDM.
Wherein the first access policy comprises any one of the following access policies:
strategy 1, selecting RFSP for the terminal according to the capability information of the terminal.
Illustratively, the terminal supports Voice over IP (Voice over IP), but the base station to which the terminal accesses does not support the Voice service, the AMF selects a 4G radio access type (E-UTRAN) and frequency for the terminal.
Strategy 2, selecting RFSP according to the PLMN supported by the terminal.
That is, the AMF selects different frequencies according to a communication carrier to which the terminal belongs.
For example, for a 5G shared base station that is established by a communications carrier a and shared with a communications carrier B, an AMF corresponding to the 5G shared base station is preferably F1 when the terminal uses a PLMN access of the communications carrier 1. F2 is preferred when the terminal employs PLMN access of carrier 2.
And strategy 3, selecting RFSP according to the capability information of the terminal and the supported PLMN.
Illustratively, for example, if the terminal supports Voice over IP but the 5G sharing base station does not support Voice, the AMF selects a different 4G access frequency according to the PLMN of the terminal, selects the frequency F3 or F5 for the terminal of the home network, and selects the frequency F4 or F6 for the roaming terminal of other networks or the terminal of the sharing network of other networks.
In a possible implementation manner, the AMF sends a first request message to the UDM, where the first request message is used to request a first access policy, and the first request message includes capability information of the terminal and PLMNs supported by the terminal. The UDM receives the first request message from the AMF. The UDM determines a first access policy according to the first request message, and then sends the first access policy to the AMF. The AMF receives a first access policy from the UDM.
In another possible implementation manner, the AMF sends a second request message to the UDM, where the second request message is used to verify the validity of the terminal and the base station. The second request message includes an identification of the terminal and an identification of the base station. And the UDM sends a second response message to the AMF under the condition that the terminal is determined to be a legal terminal and the base station is determined to be a legal base station. The second response message may include the first access policy and may also include subscription information of the terminal.
For example, the UDM may determine that the terminal is a valid terminal and the base station is a valid base station in the following manner.
The UDM stores a first identifier and a second identifier. The first identifier uniquely identifies one terminal, and the second identifier uniquely identifies one base station. Under the condition that the identifier of the terminal in the second request message is the same as the first identifier, the UDM determines that the terminal is a legal terminal; and under the condition that the identification of the base station in the request message of the next day is the same as the second identification, the UDM determines that the base station is a legal base station.
Step 204, the AMF obtains the second access policy from the PCF under the condition that the access policy includes the second access policy.
Wherein the second access policy comprises any one of the following access policies:
strategy 4, selecting RFSP according to the type of the terminal.
Illustratively, different RFSPs may be deployed when the terminals belong to different terminal groups of different enterprises. For example, a communications carrier may assign different RFSPs to a power enterprise. For high priority traffic (e.g., industrial robot traffic), the assigned RFSP is: 5G + F11. For other terminals (such as 5G mobile phones of the employee handheld type), the RFSP assigned is 5G + F1/F2.
Policy 5, RFSP is selected according to the location of the terminal.
Illustratively, the PCF configures different RFSPs based on the location of the terminal. For example, for a power distribution control robot in a power enterprise, F11 may only be accessible within a particular area. When the power distribution control robot is located at other positions, the distributed RFSP is 5G + F1\ F2 or 4G + F3/F4/F5/F6 and the like.
And 6, selecting RFSP according to the requirements of the service of the terminal on time delay and bandwidth.
The PCF may configure a slice selection policy, that is, authorized Network Slice Selection Assistance Information (NSSAI).
Illustratively, the PCF configures the terminal with 5G slice 1 and 5G slice 2. The 5G slice 1 is used for supporting the business of a low-latency high-reliability terminal (such as the business of a power distribution control robot of a power enterprise). The 5G slice 2 is used to support the traffic of a terminal with a large bandwidth (e.g., a 5G handset held by an employee of a power enterprise). The PCF may configure the power distribution control robot with an authorized NSSAI, which is the slice identifier of the industrial robot (i.e., the identification of 5G slice 1), and configure the 5G handset held by the staff of the power enterprise with an authorized NSSAI, which is the slice identifier of the office private network slice (i.e., the identification of 5G slice 2).
In a possible implementation manner, the AMF sends a third request message to the PCF, where the third request message is used to request the second access policy, and the third request message includes location information of the terminal, a type of the terminal, and service information of the terminal. The PCF receives the third request message from the AMF. The PCF determines a second access policy according to the third request message, and then the PCF sends the second access policy to the AMF. Accordingly, the AMF receives a second access policy from the PCF.
In this embodiment of the present application, under the condition that the PCF does not have the second access policy, the AMF may determine the target access policy according to the first access policy and the identifier of the terminal. In the case where the PCF has a second access policy, the AMF may first obtain the first access policy from the UDM and then obtain the second access policy from the PCF. That is, the AMF first performs step 203 and then performs step 204. Then, the AMF takes the second access policy as an access policy. Or, the AMF determines that the terminal is a legal terminal through interaction with the UDM, and the AMF directly acquires the second access policy from the PCF when the base station is a legal base station.
Note that, in the case where the 5G shared base station does not have a shared core network, that is, the 5G core network includes UDMs and PCFs of multiple communication carriers. Illustratively, the 5G core network has UDM1, UDM2, PCF1, PCF 2. The UDMs 1, PCF1 belong to network elements in the core network of carrier 1. The UDMs 2, PCF2 belong to network elements in the core network of the telecommunications carrier 2.
The AMF may determine a communication operator corresponding to the terminal according to the identifier of the terminal. Then, the AMF acquires an access policy from the UDM and/or PCF of the core network of the communications operator corresponding to the terminal.
Illustratively, the 5G shared base station is a 5G shared base station of carrier 1 and carrier 2. The 5G core network includes UDM1 and PCF1 of carrier 1, UDM2 and PCF2 of carrier 2. When the terminal of the carrier 1 moves to the coverage of the 5G shared base station, the terminal sends an access request to the 5G shared base station. And after acquiring the access request of the terminal, the 5G shared base station sends a first access request to the AMF. And after receiving the first access request, the AMF determines the identifier of the terminal according to the first access request. The AMF may determine a communication operator to which the terminal belongs according to the identifier of the terminal. If the terminal belongs to the communication operator 1, the AMF acquires an access strategy from the UDM1 and the PCF 1; if the terminal belongs to the carrier 2, the AMF acquires the access policy from the UDM2 and the PCF 2.
Of course, the carriers 1 and 2 may also share the UDM and/or PCF of the core network. In the case that the carrier 1 and the carrier 2 share the UDM and/or PCF of the core network, the AMF may refer to the description of step 204 and step 205 for the process of obtaining the access policy, and is not described herein again.
It should be noted that, in the case that the terminal has already accessed the network through the base station, that is, the AMF has already stored the access policy corresponding to the terminal. When the AMF receives the access request from the base station again, the AMF may directly determine the access policy corresponding to the terminal according to the identifier of the terminal.
In a possible embodiment, as shown in fig. 4, the network access method provided in the embodiment of the present application may further include the following steps:
step 205, the base station receives the target RFSP index from the AMF.
Step 206, the base station determines the target RFSP according to the target RFSP index and the preset corresponding relation between the RFSP and the RFSP index.
Wherein, the base station is preset with the corresponding relation between RFSP and RFSP index. The correspondence includes one or more RFSPs, and one or more RFSP indices. One RFSP corresponds to one RFSP index.
Illustratively, table 1 shows a correspondence between RFSPs and RFSP indexes.
TABLE 1
RFSP index RAT FSP
1+a 5G F1
1+b 5G F2
2+d 4G F3
2+e 4G F4
3+h 3G F7
3+i 3G F8
As can be seen from table 1, when the base station receives the RFSP index from the AMF as 1+ a, it may be determined that the RAT corresponding to the RFSP index is 5G and the FSP corresponding to the RFSP index is F1. Other corresponding relations can refer to the description of RFSP index, which is not described herein again. In table 1, only partial RFSP indexes and corresponding RATs and FSPs are listed exemplarily. In actual use, the RFSP index and the corresponding RAT and FSP in the correspondence relationship may be configured for the AMF according to actual requirements.
Step 207, the base station sends the target RFSP to the terminal. Accordingly, the terminal receives the target RFSP from the base station.
And step 208, the terminal accesses the network according to the target RFSP.
It should be understood that after the terminal receives the target RFSP from the base station, the terminal may access the network according to the target RFSP. Compared with the prior art, the terminal does not need to try to access the network for multiple times. Accordingly, the terminal can reduce the number of times of accessing the network, and thus, the terminal can reduce the time of accessing the network and reduce power consumption.
The scheme provided by the embodiment of the application is mainly introduced from the perspective of a method. To implement the above functions, it includes hardware structures and/or software modules for performing the respective functions. Those of skill in the art will readily appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as hardware or combinations of hardware and computer software. Whether a function is performed as hardware or computer software drives hardware depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the embodiment of the present application, the network access apparatus may be divided into the functional modules according to the method example, for example, each functional module may be divided corresponding to each function, or two or more functions may be integrated into one processing module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. Optionally, the division of the modules in the embodiment of the present application is schematic, and is only a logic function division, and there may be another division manner in actual implementation.
The network access device 500 provided in the embodiment of the present application is applied to the AMF, and may also be a chip applied to the AMF. Alternatively, the network access apparatus 500 may be applied to a base station, or may be a chip applied to a base station. Alternatively, the network access device may be applied to a terminal, or may be a chip applied to a terminal. As shown in fig. 5, the network access apparatus 500 includes: a communication unit 501, a processing unit 502 and a storage unit 503.
When the network access apparatus is applied to the AMF or a chip applied to the AMF, the communication unit 501 is configured to obtain an access policy and a first access request.
The first access request comprises the identification of the terminal, and the first access request is used for requesting to access the network.
For example, in conjunction with fig. 3, the communication unit 501 may be configured to perform step 101 and step 102.
A processing unit 502, configured to determine a target RFSP according to the access policy and the identifier of the terminal.
For example, in connection with fig. 3, processing unit 502 may be configured to perform step 103.
A storage unit 503 is configured to store a plurality of RFSP indexes.
The target RFSP index is one of a plurality of RFSP indexes, and one RFSP index uniquely identifies one RFSP.
The communication unit 501 is further configured to transmit the target RFSP index to the base station.
Wherein the target RFSP index is used to instruct the base station to determine an RFSP corresponding to the target RFSP index.
For example, in connection with fig. 3, the communication unit 501 may be adapted to perform step 104.
Optionally, the access policy includes a first access policy or a second access policy, and the priority of the second access policy is higher than that of the first access policy. The communication unit 501 is specifically configured to: acquiring a first access policy from the UDM under the condition that the access policy comprises the first access policy; and acquiring the second access policy from the PCF under the condition that the access policy comprises the second access policy.
Optionally, the first access policy includes any one of the following policies: selecting RFSP for the terminal according to the capability information of the terminal; selecting RFSP according to PLMN supported by the terminal; and selecting the RFSP according to the capability information of the terminal and the PLMN supported by the terminal.
Optionally, the second access policy includes any one of the following policies: selecting RFSP according to the type of the terminal; selecting RFSP according to the position information of the terminal; and selecting the RFSP according to the requirements of the service of the terminal on time delay and broadband.
Optionally, the communication unit 501 is specifically configured to obtain the first access request by the communication base station.
When the network access apparatus in fig. 5 is applied to a base station, or is a chip applied to a base station, the communication unit 501 is configured to receive the target RFSP index from the AMF.
For example, in conjunction with fig. 4, the communication unit 501 is configured to perform step 205.
The processing unit 502 is configured to determine a target RFSP according to the target RFSP index and a pre-configured correspondence between RFSPs and RFSP indexes.
For example, in conjunction with fig. 4, processing unit 502 is configured to perform step 206.
A storage unit 503, configured to store a preset correspondence between RFSPs and RFSP indexes.
A communication unit 501, configured to send the target RFSP to the terminal.
For example, in conjunction with fig. 4, the communication unit 501 is configured to execute step 207.
When the network access apparatus 500 is applied to a terminal or a chip applied to the terminal, the communication unit 501 is configured to send a second access request to the base station.
The second access request comprises the identification of the terminal, and the second access request is used for requesting to access the network.
For example, in conjunction with fig. 4, the communication unit 501 is configured to execute step 201.
The communication unit 501 is further configured to receive a target RFSP from a base station.
For example, in conjunction with fig. 4, the communication unit 501 is configured to execute step 207.
A processing unit 502 for connecting to the network according to the target RFSP.
Fig. 6 shows a schematic diagram of another possible structure of the network access device involved in the above embodiments. The device includes: one or more processors 161 and a communications interface 162. The processor 161 is used to control and manage the actions of the device, e.g., to perform the steps performed by the processing unit 502 described above, and/or other processes for performing the techniques described herein.
In particular implementations, processor 161 may include one or more CPUs such as CPU0 and CPU1 of fig. 6, for example, as one embodiment.
In particular implementations, for one embodiment, a communication device may include multiple processors, such as processor 161 in fig. 6. Each of these processors may be a single-core (single-CPU) processor or a multi-core (multi-CPU) processor. A processor herein may refer to one or more devices, circuits, and/or processing cores for processing data (e.g., computer program instructions).
Optionally, the apparatus may also include a memory 163 and a communication line 164, the memory 163 being used to store program codes and data for the apparatus.
Fig. 7 is a schematic structural diagram of a chip 170 according to an embodiment of the present disclosure. Chip 170 includes one or more (including two) processors 1710 and a communication interface 1730.
Optionally, the chip 170 further includes a memory 1740, where the memory 1740 may include both read-only memory and random access memory, and provides operational instructions and data to the processor 1710. A portion of memory 1740 may also include non-volatile random access memory (NVRAM).
In some embodiments, memory 1740 stores elements, execution modules, or data structures, or a subset thereof, or an expanded set thereof.
In the embodiment of the present application, the corresponding operation is performed by calling an operation instruction stored in the memory 1740 (the operation instruction may be stored in an operating system).
The processor 1710 may implement or execute various illustrative logical blocks, units, and circuits described in connection with the disclosure herein. The processor may be a central processing unit, general purpose processor, digital signal processor, application specific integrated circuit, field programmable gate array or other programmable logic device, transistor logic device, hardware component, or any combination thereof. Which may implement or perform the various illustrative logical blocks, units, and circuits described in connection with the disclosure. The processor may also be a combination of computing functions, e.g., comprising one or more microprocessors, DSPs, and microprocessors, among others.
Memory 1740 may include volatile memory, such as random access memory; the memory may also include non-volatile memory, such as read-only memory, flash memory, a hard disk, or a solid state disk; the memory may also comprise a combination of memories of the kind described above.
The bus 1720 may be an Extended Industry Standard Architecture (EISA) bus or the like. Bus 1720 may be divided into an address bus, a data bus, a control bus, and the like. For ease of illustration, only one line is shown in FIG. 7, but it is not intended that there be only one bus or one type of bus.
It is clear to those skilled in the art from the foregoing description of the embodiments that, for convenience and simplicity of description, the foregoing division of the functional units is merely used as an example, and in practical applications, the above function distribution may be performed by different functional units according to needs, that is, the internal structure of the device may be divided into different functional units to perform all or part of the above described functions. For the specific working processes of the system, the apparatus and the unit described above, reference may be made to the corresponding processes in the foregoing method embodiments, and details are not described here again.
The embodiment of the present application further provides a computer-readable storage medium, where instructions are stored in the computer-readable storage medium, and when the instructions are executed by a computer, the computer executes each step in the method flow shown in the above method embodiment.
The computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination thereof. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, and a hard disk. Random Access Memory (RAM), Read-Only Memory (ROM), Erasable Programmable Read-Only Memory (EPROM), registers, a hard disk, an optical fiber, a portable Compact disk Read-Only Memory (CD-ROM), an optical storage device, a magnetic storage device, or any other form of computer-readable storage medium, in any suitable combination, or as appropriate in the art. An exemplary storage medium is coupled to the processor such the processor can read information from, and write information to, the storage medium. Of course, the storage medium may also be integral to the processor. The processor and the storage medium may reside in an Application Specific Integrated Circuit (ASIC). In embodiments of the present application, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
Embodiments of the present application provide a computer program product containing instructions which, when run on a computer, cause the computer to perform a network access method as described in fig. 3, 4.
Since the network access device, the computer-readable storage medium, and the computer program product in the embodiments of the present application may be applied to the method described above, for technical effects that can be obtained by the method, reference may also be made to the method embodiments described above, and details of the embodiments of the present application are not repeated herein.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus, and method may be implemented in other ways. For example, the above-described device embodiments are merely illustrative, and for example, the division of the units is only one logical functional division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
The above description is only for the specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present application, and shall be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (16)

1. A network access method, comprising:
an access function management network element AMF acquires an access strategy and a first access request, wherein the first access request comprises an identifier of a terminal, and the first access request is used for requesting to access a network;
the AMF determines a target wireless access type/radio frequency priority RFSP index according to the identification of the terminal and the access strategy, the AMF stores a plurality of RFSP indexes, the target RFSP index is one of the RFSP indexes, and one RFSP index uniquely identifies one RFSP;
the AMF sends the target RFSP index to a base station, and the target RFSP index is used for indicating the base station to determine the RFSP corresponding to the target RFSP index.
2. The network access method of claim 1, wherein the access policy comprises a first access policy or a second access policy, wherein the second access policy has a higher priority than the first access policy, wherein the AMF obtains the access policy, and wherein the step of:
under the condition that the access policy comprises a first access policy, the AMF acquires the first access policy from a unified data management network element (UDM);
and under the condition that the access strategy comprises a second access strategy, the AMF acquires the second access strategy from a strategy control function network element PCF.
3. The network access method of claim 2, wherein the first access policy comprises any one of the following policies:
selecting a RFSP for the terminal according to the capability information of the terminal;
selecting RFSP according to the PLMN supported by the terminal;
and selecting the RFSP according to the capability information of the terminal and the supported PLMN.
4. The network access method of claim 2, wherein the second access policy comprises any one of the following policies:
selecting RFSP according to the type of the terminal;
selecting RFSP according to the position of the terminal;
and selecting the RFSP according to the requirements of the service of the terminal on time delay and bandwidth.
5. The network access method of any of claims 1-4, wherein the AMF obtaining the first access request comprises:
and the AMF acquires the first access request through a base station.
6. A network access method, characterized in that,
the base station receives a target RFSP index from the AMF;
the base station determines a target RFSP according to the target RFSP index and a corresponding relation between the pre-configured RFSP and the RFSP index; the corresponding relation comprises one or more RFSPs and one or more RFSP indexes, wherein one RFSP corresponds to one RFSP index, and the target RFSP is one of the one or more RFSP indexes;
and the base station sends the target RFSP to a terminal.
7. The network access method of claim 6, wherein before the base station receives the target RFSP index from the AMF, the method further comprises:
the base station receives a first access request from the terminal, wherein the first access request comprises the identification of the terminal; the first access request is used for requesting to access a network;
and the base station sends the first access request to the AMF.
8. A network access apparatus, comprising:
a communication unit, configured to obtain an access policy and a first access request, where the first access request includes an identifier of a terminal, and the first access request is used to request access to a network;
a processing unit, configured to determine a target RFSP index according to the identifier of the terminal and the access policy;
the storage unit is used for storing a plurality of RFSP indexes, the target RFSP index is one of the RFSP indexes, and one RFSP index uniquely identifies one RFSP;
the communication unit is further configured to send the target RFSP index to a base station, where the target RFSP index is used to instruct the base station to determine an RFSP corresponding to the target RFSP index.
9. The network access apparatus of claim 8, wherein the access policy comprises a first access policy or a second access policy, the second access policy having a higher priority than the first access policy;
the communication unit is specifically configured to:
under the condition that the access policy comprises the first access policy, acquiring the first access policy from a unified data management network element (UDM);
and under the condition that the access strategy comprises a second access strategy, acquiring the second access strategy from a strategy control function network element PCF.
10. The network access apparatus of claim 9, wherein the first access policy comprises any one of the following policies:
selecting a RFSP for the terminal according to the capability information of the terminal;
selecting RFSP according to the PLMN supported by the terminal;
and selecting the RFSP according to the capability information of the terminal and the supported PLMN.
11. The network access apparatus of claim 9, wherein the second access policy comprises any one of the following policies:
selecting RFSP according to the type of the terminal;
selecting RFSP according to the position of the terminal;
and selecting the RFSP according to the requirements of the service of the terminal on time delay and bandwidth.
12. The network access apparatus according to any of claims 8-11, wherein the communication unit is specifically configured to obtain the first access request through a base station.
13. A network access apparatus, comprising:
a communication unit for receiving a target RFSP index from the AMF;
the processing unit is used for determining a target RFSP according to the target RFSP index and a preset corresponding relation between the RFSP and the RFSP index;
a storage unit, configured to store a correspondence between the preconfigured RFSPs and RFSP indexes, where the correspondence includes one or more RFSPs and one or more RFSP indexes, one RFSP corresponds to one RFSP index, and the target RFSP is one of the one or more RFSPs;
and the communication unit is used for sending the target RFSP to a terminal.
14. The network access apparatus of claim 13,
the communication unit is further configured to receive a first access request from the terminal, where the first access request is used to request access to a network;
the communication unit is further configured to send the first access request to the AMF.
15. A network access apparatus comprising a memory and a processor; the memory is used for storing computer execution instructions, and the processor is connected with the memory through a bus;
the processor executes the computer-executable instructions stored by the memory when the network access device is running to cause the network access device to perform any of claims 1-5 or to perform the network access method of claim 6 or 7.
16. A computer-readable storage medium, comprising computer-executable instructions, which, when executed on a computer, cause the computer to perform any one of claims 1-5, or perform the network access method of claim 6 or 7.
CN201911400498.XA 2019-12-30 2019-12-30 Network access method and device Active CN111132238B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911400498.XA CN111132238B (en) 2019-12-30 2019-12-30 Network access method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911400498.XA CN111132238B (en) 2019-12-30 2019-12-30 Network access method and device

Publications (2)

Publication Number Publication Date
CN111132238A true CN111132238A (en) 2020-05-08
CN111132238B CN111132238B (en) 2023-05-12

Family

ID=70505712

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911400498.XA Active CN111132238B (en) 2019-12-30 2019-12-30 Network access method and device

Country Status (1)

Country Link
CN (1) CN111132238B (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111818576A (en) * 2020-07-30 2020-10-23 中国联合网络通信集团有限公司 User access method and access network equipment
CN112243228A (en) * 2020-07-31 2021-01-19 国网浙江省电力有限公司培训中心 Energy Internet terminal access system and method based on 5G access network slice
CN113542219A (en) * 2021-06-07 2021-10-22 中国人民解放军战略支援部队信息工程大学 Method and system for realizing signaling access based on multi-mode network element proxy
CN113691936A (en) * 2021-08-25 2021-11-23 中国联合网络通信集团有限公司 Terminal access method based on shared base station and shared base station
WO2022062797A1 (en) * 2020-09-28 2022-03-31 中国电信股份有限公司 Method and system for dynamically triggering access and mobility policy change
CN114390507A (en) * 2020-10-20 2022-04-22 中国电信股份有限公司 Method and system for dynamically triggering RFSP value change
CN114423052A (en) * 2021-12-28 2022-04-29 中国电信股份有限公司 Voice fallback method and related equipment
WO2023065865A1 (en) * 2021-10-20 2023-04-27 华为技术有限公司 Communication method and device
CN114390507B (en) * 2020-10-20 2024-05-03 中国电信股份有限公司 Method and system for dynamically triggering RFSP value change

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104995960A (en) * 2012-10-12 2015-10-21 诺基亚通信公司 Method and apparatus for access network selection
CN108323245A (en) * 2017-06-19 2018-07-24 华为技术有限公司 It is a kind of registration and session establishment method, terminal and AMF entities
WO2019072099A1 (en) * 2017-10-09 2019-04-18 Qualcomm Incorporated Configuration for legacy voice support in 5g
US20190268835A1 (en) * 2018-05-18 2019-08-29 Intel Corporation Ue indication to pcf whether or not to send ue policy
WO2019243872A1 (en) * 2018-06-20 2019-12-26 Telefonaktiebolaget Lm Ericsson (Publ) Dynamic rsfp

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104995960A (en) * 2012-10-12 2015-10-21 诺基亚通信公司 Method and apparatus for access network selection
CN108323245A (en) * 2017-06-19 2018-07-24 华为技术有限公司 It is a kind of registration and session establishment method, terminal and AMF entities
WO2019072099A1 (en) * 2017-10-09 2019-04-18 Qualcomm Incorporated Configuration for legacy voice support in 5g
US20190268835A1 (en) * 2018-05-18 2019-08-29 Intel Corporation Ue indication to pcf whether or not to send ue policy
WO2019243872A1 (en) * 2018-06-20 2019-12-26 Telefonaktiebolaget Lm Ericsson (Publ) Dynamic rsfp

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111818576A (en) * 2020-07-30 2020-10-23 中国联合网络通信集团有限公司 User access method and access network equipment
CN111818576B (en) * 2020-07-30 2022-07-29 中国联合网络通信集团有限公司 User access method and access network equipment
CN112243228A (en) * 2020-07-31 2021-01-19 国网浙江省电力有限公司培训中心 Energy Internet terminal access system and method based on 5G access network slice
WO2022062797A1 (en) * 2020-09-28 2022-03-31 中国电信股份有限公司 Method and system for dynamically triggering access and mobility policy change
CN114390507A (en) * 2020-10-20 2022-04-22 中国电信股份有限公司 Method and system for dynamically triggering RFSP value change
CN114390507B (en) * 2020-10-20 2024-05-03 中国电信股份有限公司 Method and system for dynamically triggering RFSP value change
CN113542219A (en) * 2021-06-07 2021-10-22 中国人民解放军战略支援部队信息工程大学 Method and system for realizing signaling access based on multi-mode network element proxy
CN113542219B (en) * 2021-06-07 2023-02-14 中国人民解放军战略支援部队信息工程大学 Method and system for realizing signaling access based on multi-mode network element proxy
CN113691936A (en) * 2021-08-25 2021-11-23 中国联合网络通信集团有限公司 Terminal access method based on shared base station and shared base station
WO2023065865A1 (en) * 2021-10-20 2023-04-27 华为技术有限公司 Communication method and device
CN114423052A (en) * 2021-12-28 2022-04-29 中国电信股份有限公司 Voice fallback method and related equipment

Also Published As

Publication number Publication date
CN111132238B (en) 2023-05-12

Similar Documents

Publication Publication Date Title
CN111132238B (en) Network access method and device
CN112423301B (en) Private network registration management method and AMF network element
CN110519709B (en) Context management method and device
CN110167088A (en) A kind of management method and device of session
US11647436B2 (en) Gateway handover method, gateway reselection method, and communications apparatus
CN111586797B (en) Communication method and access network equipment
EP4109978A1 (en) Communication method and apparatus
EP4101207A1 (en) Improved selection of slice-supporting plmns while roaming away from home network
CN112105061A (en) Method, device and system for managing background data transmission strategy
US20230239720A1 (en) Wireless communication method and device
CN108243631B (en) Network access method and equipment
WO2021056576A1 (en) Method and device for service transmission, and communication device
CN110913437B (en) Communication method and network element
US10993200B1 (en) Session management function (SMF) data storage in cellular network registration
WO2021088007A1 (en) Wireless communication method, terminal device, and network device
CN111565438B (en) Communication method and access network equipment
CN111885583B (en) Network sharing method and device
CN111565433B (en) Communication method and access network equipment
CN111565436B (en) Communication method and access network equipment
US10911933B1 (en) Steering of roaming based on device type in wireless networks
CN114599022A (en) Method and device for selecting equipment
CN114785626B (en) Method and device for data management
CN114071649A (en) Method and device for accessing local network
US20210136131A1 (en) Method And System For Completing A Voice Call In A Cloud-Based Communication System
CN115499470B (en) Storage management method and device for intelligent ammeter data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant