CN111132238B - Network access method and device - Google Patents

Network access method and device Download PDF

Info

Publication number
CN111132238B
CN111132238B CN201911400498.XA CN201911400498A CN111132238B CN 111132238 B CN111132238 B CN 111132238B CN 201911400498 A CN201911400498 A CN 201911400498A CN 111132238 B CN111132238 B CN 111132238B
Authority
CN
China
Prior art keywords
access
rfsp
terminal
network
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911400498.XA
Other languages
Chinese (zh)
Other versions
CN111132238A (en
Inventor
马泽芳
马瑞涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN201911400498.XA priority Critical patent/CN111132238B/en
Publication of CN111132238A publication Critical patent/CN111132238A/en
Application granted granted Critical
Publication of CN111132238B publication Critical patent/CN111132238B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/16Central resource management; Negotiation of resources or communication parameters, e.g. negotiating bandwidth or QoS [Quality of Service]
    • H04W28/18Negotiating wireless communication parameters
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • H04W36/0055Transmission or use of information for re-establishing the radio link
    • H04W36/0077Transmission or use of information for re-establishing the radio link of access information of target access point
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • H04W36/0083Determination of parameters used for hand-off, e.g. generation or modification of neighbour cell lists
    • H04W36/00835Determination of neighbour cell lists
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/20Selecting an access point
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/02Power saving arrangements
    • H04W52/0209Power saving arrangements in terminal devices
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Quality & Reliability (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the application provides a network access method and device, relates to the technical field of communication machines, and solves the problems of long network access time and high power consumption of a terminal in the prior art. The method comprises the following steps: the method comprises the steps that an access function management network element (AMF) obtains an access strategy and a first access request, wherein the first access request comprises an identifier of a terminal, and the first access request is used for requesting access to a network; the AMF determines a target wireless access type/wireless frequency priority RFSP index according to the identification of the terminal and the access strategy, wherein the AMF stores a plurality of RFSP indexes, the target RFSP index is one of the RFSP indexes, and one RFSP index uniquely identifies one RFSP; and the AMF sends the target RFSP index to a base station, wherein the target RFSP index is used for indicating the base station to determine the RFSP corresponding to the target RFSP index.

Description

Network access method and device
Technical Field
The present disclosure relates to the field of communications technologies, and in particular, to a network access method and device.
Background
Currently, when a terminal moves to the coverage of a fifth generation (5rd generation,5G) shared base station, the terminal needs to try to access different frequencies in the 5G shared base station multiple times before selecting a proper frequency access, so that the terminal can access a network only for a long time, and the power consumption of the terminal is also high.
Disclosure of Invention
The application provides a network access method and device, which are used for solving the problems of long network access time and high power consumption of a terminal in the prior art.
In order to achieve the above purpose, the embodiment of the application adopts the following technical scheme:
in a first aspect, a network access method is provided, where an AMF obtains an access policy and a first access request, where the first access request includes an identifier of a terminal, and the first access request is used to request access to a network. Then, the AMF determines a target RFSP index according to the access strategy and the identification of the terminal. The AMF stores a plurality of RFSP indexes, the target index is one of the RFSP indexes, and one RFSP index uniquely identifies one RFSP. Next, the AMF transmits a target RFSP index for instructing the base station to determine an RFSP corresponding to the target RFSP index to the base station.
In the method, after the AMF acquires the access strategy and the first access request, the AMF determines a target RFSP index from a plurality of RFSPs according to the access strategy and the identification of the terminal in the first access request. The AMF then sends the target RFSP index to the base station. After receiving the target RFSP index, the base station may determine the target RFSP according to the target RFSP index and a corresponding relationship between the pre-configured RFSP index and the RFSP. And finally, the base station transmits the target RFSP to the terminal so that the terminal accesses the network according to the target RFSP. Compared with the prior art that the terminal needs to try to access the frequency band of the 5G shared base station for many times when accessing the network, the terminal can access the network once. Therefore, the terminal can reduce the number of times of accessing the network, so that the terminal can reduce the time of accessing the network and reduce the power consumption.
In a second aspect, a network access device is provided, which is capable of implementing the functionality of the first aspect and any one of its possible implementations. These functions may be implemented by hardware, or may be implemented by hardware executing corresponding software. The hardware or software includes one or more modules corresponding to the functions described above.
In one possible manner of the present application, the network access device includes: the communication unit is used for acquiring an access strategy and a first access request, wherein the first access request comprises the identification of the terminal, and the first access request is used for requesting to access the network. And the processing unit is used for determining a target RFSP index according to the access strategy and the identification of the terminal. And the storage unit is used for storing a plurality of RFSP indexes, wherein the target RFSP index is one of the RFSP indexes, and one RFSP index uniquely identifies one RFSP. And the communication unit is further used for sending a target RFSP index to the base station, wherein the target RFSP index is used for indicating the base station to determine the RFSP corresponding to the target RFSP index.
In a third aspect, a network access device is provided that includes a memory and a processor. The memory is used for storing computer execution instructions, and the processor is connected with the memory through a bus. When the network access device is running, the processor executes the computer-executable instructions stored in the memory to cause the network access device to perform the network access method of the first aspect.
The network access device may be an AMF or may be a part of an AMF, for example, a chip system in the AMF. The chip system is configured to support functions involved in the implementation of the first aspect and any one of its possible implementations, for example, receiving, determining, and distributing data and/or information involved in the network access method described above. The chip system includes a chip, and may also include other discrete devices or circuit structures.
In a fourth aspect, there is provided a computer readable storage medium comprising computer executable instructions which, when run on a computer, cause the computer to perform the network access method of the first aspect.
In a fifth aspect, there is provided a computer program product which, when run on a computer, causes the computer to perform the network access method according to the first aspect and any one of its possible designs.
It should be noted that, the above-mentioned computer instructions may be stored in whole or in part on the first computer storage medium. The first computer storage medium may be packaged together with the processor of the network access device, or may be packaged separately from the processor of the network access device, which is not limited in the embodiment of the present application.
The description of the second, third, fourth and fifth aspects of the present application may refer to the detailed description of the first aspect; the advantages of the second aspect, the third aspect, the fourth aspect and the fifth aspect may be referred to as analysis of the advantages of the first aspect, and will not be described here.
In a sixth aspect, a network access method is provided, where a base station receives a target RFSP index from an AMF. Then, the base station determines a target RFSP according to the target RFSP index and the correspondence between the preconfigured RFSPs and the RFSP index. Finally, the base station transmits the target RFSP to the terminal.
In the prior art, when a terminal accesses a network through a base station, the frequency of the base station needs to be accessed for multiple times until the proper frequency is determined, so that the time for accessing the terminal to the network is longer and the power consumption is high. In the application, the base station may directly determine the RFSP that the terminal may use according to the target RFSP index, and then send the RFSP to the terminal, so that the terminal accesses the network according to the frequency allocated by the base station. The terminal does not need to access the frequency of the base station for a plurality of times, so the terminal can reduce the time for accessing the network and reduce the power consumption of the access network.
In a seventh aspect, a network access device is provided, which is capable of implementing the functionality of the sixth aspect and any one of its possible implementations. These functions may be implemented by hardware, or may be implemented by hardware executing corresponding software. The hardware or software includes one or more modules corresponding to the functions described above.
In one possible manner of the present application, the network access device includes: and a communication unit for receiving the target RFSP index from the AMF. And the processing unit is used for determining the target RFSP according to the target RFSP index and the corresponding relation between the pre-configured RFSP and the RFSP index. And the storage unit is used for storing a corresponding relation between the pre-configured RFSPs and the RFSP indexes, wherein the corresponding relation comprises one or more RFSPs and one or more RFSP indexes, one RFSP corresponds to one RFSP index, and the target RFSP is one of the one or more RFSPs. And the communication unit is also used for sending the target RFSP to the terminal.
In an eighth aspect, a network access device is provided that includes a memory and a processor. The memory is used for storing computer execution instructions, and the processor is connected with the memory through a bus. When the network access device is running, the processor executes the computer-executable instructions stored in the memory to cause the network access device to perform the network access method of the first aspect.
The network access device may be a base station or may be a part of a device in a base station, such as a system-on-chip in a base station. The system-on-a-chip is configured to support the base station to implement the functions involved in the sixth aspect and any one of its possible implementations, e.g. to receive, determine, and offload data and/or information involved in the network access method described above. The chip system includes a chip, and may also include other discrete devices or circuit structures.
In a ninth aspect, there is provided a computer readable storage medium comprising computer executable instructions which, when run on a computer, cause the computer to perform the network access method of the sixth aspect.
In a tenth aspect, there is provided a computer program product which, when run on a computer, causes the computer to perform the network access method according to the sixth aspect and any one of its possible designs.
It should be noted that, the above-mentioned computer instructions may be stored in whole or in part on the first computer storage medium. The first computer storage medium may be packaged together with the processor of the network access device, or may be packaged separately from the processor of the network access device, which is not limited in the embodiment of the present application.
The description of the seventh aspect, the eighth aspect, the ninth aspect, and the tenth aspect in the present application may refer to the detailed description of the sixth aspect; further, the advantages of the seventh aspect, the eighth aspect, the ninth aspect and the tenth aspect may be referred to as the analysis of the advantages of the sixth aspect, and will not be repeated here.
In an eleventh aspect, a network access method is provided, first, a terminal sends a first access request to a base station, where the first access request includes an identifier of the terminal, and the first access request is used to request access to a network. The terminal then receives the target RFSP from the base station. And finally, the terminal accesses the network according to the target RFSP.
In the above method, after the terminal sends the first access request to the base station, the terminal receives the target RFSP from the base station. In this way, the base station can directly access the network according to the target RFSP. Compared with the prior art, the terminal does not need to try to access the network for a plurality of times. Therefore, the terminal can reduce the number of times of accessing the network, and thus, the terminal can reduce the time of accessing the network and reduce power consumption.
In a twelfth aspect, there is provided a network access device capable of implementing the functionality of the eleventh aspect and any one of its possible implementations. These functions may be implemented by hardware, or may be implemented by hardware executing corresponding software. The hardware or software includes one or more modules corresponding to the functions described above.
In one possible manner of the present application, the network access device includes: and the communication unit is used for sending a first access request to the base station, wherein the first access request comprises the identification of the terminal, and the first access request is used for requesting to access the network. And the communication unit is also used for receiving the target RFSP from the base station. And the processing unit is used for accessing the network according to the target RFSP.
In a thirteenth aspect, a network access device is provided that includes a memory and a processor. The memory is used for storing computer execution instructions, and the processor is connected with the memory through a bus. When the network access device is operating, the processor executes computer-executable instructions stored in the memory to cause the network access device to perform the network access method of the eleventh aspect.
The network access device may be a terminal or may be part of a device in a terminal, such as a system-on-chip in a terminal. The system on a chip is configured to support the terminal to implement the functions involved in the eleventh aspect and any one of its possible implementations, for example, to receive, determine, and offload data and/or information involved in the network access method described above. The chip system includes a chip, and may also include other discrete devices or circuit structures.
In a fourteenth aspect, there is provided a computer-readable storage medium comprising computer-executable instructions which, when run on a computer, cause the computer to perform the network access method of the eleventh aspect.
In a fifteenth aspect, there is provided a computer program product for, when run on a computer, causing the computer to perform the network access method according to the eleventh aspect and any one of its possible designs.
It should be noted that, the above-mentioned computer instructions may be stored in whole or in part on the first computer storage medium. The first computer storage medium may be packaged together with the processor of the network access device, or may be packaged separately from the processor of the network access device, which is not limited in the embodiment of the present application.
The twelfth, thirteenth, fourteenth and fifteenth aspects of the present application may be described with reference to the detailed description of the sixth aspect; also, the advantages of the twelfth, thirteenth, fourteenth and fifteenth aspects may be referred to the advantageous analysis of the sixth aspect, and will not be repeated here.
In the embodiment of the present application, the names of the above network access devices do not limit the devices or functional modules, and in actual implementation, these devices or functional modules may appear under other names. Insofar as the function of each device or function module is similar to the present application, it is within the scope of the claims of the present application and the equivalents thereof.
Drawings
Fig. 1 is a schematic structural diagram of a communication system according to an embodiment of the present application;
fig. 2 is a schematic structural diagram of another communication system according to an embodiment of the present application;
fig. 3 is a flow chart of a network access method according to an embodiment of the present application;
fig. 4 is a flow chart of another network access method according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of a network access device according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of another network access device according to an embodiment of the present application;
fig. 7 is a schematic structural diagram of a chip according to an embodiment of the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are only some, but not all, of the embodiments of the present application. All other embodiments, which can be made by one of ordinary skill in the art without undue burden from the present disclosure, are within the scope of the present disclosure.
It should be noted that, in the embodiments of the present application, words such as "exemplary" or "such as" are used to mean serving as an example, instance, or illustration. Any embodiment or design described herein as "exemplary" or "for example" should not be construed as preferred or advantageous over other embodiments or designs. Rather, the use of words such as "exemplary" or "such as" is intended to present related concepts in a concrete fashion.
In order to clearly describe the technical solutions of the embodiments of the present application, in the embodiments of the present application, the terms "first", "second", and the like are used to distinguish the same item or similar items having substantially the same function and effect, and those skilled in the art will understand that the terms "first", "second", and the like are not limited in number and execution order.
In order to facilitate understanding of the technical solutions of the present application, some technical terms are described below.
1、RFSP
RFSP includes radio access type (radio access type, RAT) and radio frequency priority (frequency selection priority, FSP). In the embodiment of the present application, RAT and FSP are simply referred to as "RFSP".
2. Shared base station
The shared base station refers to a base station in which two (or more) communication operators commonly use the same network.
By way of example, taking a 5G shared base station in which the shared base station commonly uses a 5G network for two communication carriers (communication carrier 1 and communication carrier 2), there are the following overlapping coverage areas or adjacent coverage areas in the coverage area of the shared base station.
1) The 5G shared base station of the communication carrier 1 and the 5G shared base station of the communication carrier 2 are adjacent base stations.
2) There is a neighboring relationship between the 5G shared base station of the communication carrier 1 and the non-shared base station of the communication carrier 2, and between the non-shared base stations of the communication carrier 1.
3) There is a neighboring relationship between the 5G shared base station of the communication carrier 2 and the non-shared base station of the communication carrier 1.
It should be noted that, in the coverage area of the 5G shared base station, there are other network coverage (e.g., 2G, 3G, 4G) of the communication carrier 1, and other network coverage (e.g., 2G, 3G, 4G) of the communication carrier 2 at the same time. The frequency distribution within the coverage area of the 5G shared base station is as follows:
(1) The frequency of the 5G independent station of the communication carrier 1 is F1.
(2) The frequency of the 5G independent station of the communication carrier 2 is F2.
(3) The frequency of the 5G sharing station has the following three cases:
case one: the frequencies of the 5G shared base station of the communication carrier 1 and the 5G shared base station of the communication carrier 2 are f1+f2.
And a second case: the frequencies of the 5G sharing station of the communication carrier 1 and the 5G sharing base station of the communication carrier 2 are f3+f4.
And a third case: the frequency of the 5G sharing station of the communication carrier 1 is F1, and the frequency of the 5G sharing base station of the carrier 2 is F2.
Wherein F1, F2, F3 and F4 are respectively different frequencies. The selection of the above three cases depends on various factors such as frequency resources of the communication carrier.
Based on the above-described frequency allocation, if there is a frequency of an unshared base station of a communication carrier supported by a terminal in a coverage area of the shared base station, the terminal uses the unshared base station and the frequency. If the coverage area of the shared base station does not have the frequencies of the communication operators supported by the terminal, the terminal uses the shared base station and the shared frequencies of other communication operators.
When a terminal accesses a shared base station or a non-shared base station, the terminal preferably selects a large broadband access type and a frequency. For example, when the terminal moves to the a area, the a area has a 3G network, a 4G network, and a 5G network, and if the terminal supports the 5G network, the terminal accesses the 5G network preferentially.
Illustratively, the B area in the a city has the 5G shared base station 1 that the communication carrier 1 hosts to share to the communication carrier 2. The 5G frequency of the 5G shared base station 1 is F1 or f1+f2. For example, F1 is 3.4-3.5GHZ, F2 (3.5-3.6 GHZ).
In this case, if the user of the communication carrier 1 moves to the B area with the 5G terminal, the 5G terminal preferentially accesses the 5G shared base station, and the frequency used is F1 or F2.
As yet another example, there is a 5G shared base station 2 that the communication carrier 2 hosts to share to the communication carrier 1 in the a city C area. The 5G frequency of the 5G shared base station 2 is F2 or f1+f2.
In this case, if the user of the communication carrier 1 moves to the C area with the 5G terminal, the 5G terminal preferentially accesses the 5G shared base station, and the frequency used is F2 or F1.
Wherein the B area and the C area have overlapping 4G coverage of the communication carrier 1 and the communication carrier 2. For example, the 4G frequency of the communication carrier 1 is F3 (1860-1875 HZ) or F5 (1920-1940). The 4G frequency of the communication carrier 2 is F4 (1735-1760) or F6 (1940-955).
If a user of the communication carrier 1 holds that a 5G terminal leaves the coverage of a 5G sharing base station in the B area or the C area, the 5G terminal accesses to the 4G frequency F3 or F5. If a user of the communication carrier 2 holds that a 5G terminal leaves the coverage of a 5G sharing base station in the B area or the C area, the 5G terminal accesses to the 4G frequency F4 or F6.
The technical solution of the embodiment of the application can be applied to various communication systems, for example: code division multiple access (code division multiple access, CDMA), time division multiple access (time division multiple access, TDMA), frequency division multiple access (frequency division multiple access, FDMA), orthogonal frequency division multiple access (orthogonal frequency-division multiple access, OFDMA), single carrier frequency division multiple access (SC-FDMA), and other systems, among others. The term "system" may be used interchangeably with "network". A CDMA system may implement wireless technologies such as universal wireless terrestrial access (universal terrestrial radio access, UTRA), CDMA2000, and the like. UTRA may include Wideband CDMA (WCDMA) technology and other CDMA variant technologies. CDMA2000 may cover the transition standard (IS) 2000 (IS-2000), IS-95 and IS-856 standards. TDMA systems may implement wireless technologies such as the global system for mobile communications (global system for mobile communication, GSM). OFDMA systems may implement wireless technologies such as evolved universal wireless terrestrial access (E-UTRA), ultra mobile broadband (ultra mobile broadband, UMB), IEEE 802.11 (Wi-Fi), IEEE 802.16 (WiMAX), IEEE 802.20,Flash OFDMA, and the like. UTRA and E-UTRA are UMTS and UMTS evolution versions. Various versions of 3GPP in long term evolution (long term evolution, LTE) and LTE-based evolution are new versions of UMTS that use E-UTRA. The 5G communication system, new Radio (NR), is the next generation communication system under study. In addition, the communication system can be also suitable for future communication technologies, and the technical scheme provided by the embodiment of the application is applicable.
The system architecture and the service scenario described in the embodiments of the present application are for more clearly describing the technical solution of the embodiments of the present application, and do not constitute a limitation on the technical solution provided in the embodiments of the present application, and those skilled in the art can know that, with the evolution of the network architecture and the appearance of the new service scenario, the technical solution provided in the embodiments of the present application is also applicable to similar technical problems. The embodiments of the present application will be described by taking an example in which the method provided is applied to an NR system or a 5G network.
As shown in fig. 1, fig. 1 shows a schematic structural diagram of a communication system according to an embodiment of the present application, where the communication system includes: a terminal 10, a base station 20 in communication with the terminal, an access function management network element 30, a unified data management network element 40, a policy control network element 50, and a data network 60.
The terminal 10 may communicate with an access function management network element 30 through a base station 20. The terminal 10 may also access a data network 60 through the base station 20.
The access function management network elements 30 are respectively in communication with the unified data management network element 40 and the policy control network element 50. The access function management network element 30 is used to take charge of mobility management of the communication system, for example, location update of the terminal 10, registration network of the terminal 10, network handover of the terminal 10, and the like.
The unified data management network element 40 is responsible for subscription management of the communication system, authentication of the terminal 10, etc.
The main functions of the policy control network element 50 include: (1) application and traffic data stream detection; (2) quality of service (quality of service, qoS) control; (3) credit management; (4) flow-based charging; (5) Background data (Background data) transmission policy negotiation; (6) Managing PFD (Packet Filter Descriptor) configured from a third party AS through a network opening function (network exposure function, NEF) network element and a Packet Flow Description Function (PFDF); (7) data flow split management (different DNs); (8) The terminal has UDR (User Data Repository) front end function to provide subscription information of the terminal; (9) Providing network selection and mobility management related policies (e.g., RFSP retrieval); (10) Configuration of UE policies (network side has to support providing policy information to UE, e.g. network discovery and selection policies, SSC mode selection policies, network slice selection policies).
In the embodiments of the present application, the base station 20 may be referred to as an access device, and may also be referred to as a radio access network (radio access network, RAN). The base station is a shared base station. The base station may be a base station (base transceiver station, BTS) in a global system for mobile communications (global system for mobile communication, GSM), a base station (base transceiver station, BTS) in a code division multiple access (code division multiple access, CDMA), a base station (node B) in a wideband code division multiple access (wideband code division multiple access, WCDMA), an eNB in the internet of things (internet of things, ioT) or a narrowband internet of things (narrow band-internet of things, NB-IoT), a base station in a future 5G mobile communication network or a future evolved public land mobile network (public land mobile network, PLMN), to which the embodiments of the present application do not impose any limitation.
In the embodiment of the present application, the terminal 10 is a device that needs to access a network. The terminals may be variously named, for example, user Equipment (UE), access terminals, terminal units, terminal stations, mobile stations, remote terminals, mobile devices, wireless communication devices, vehicle user equipment, terminal agents or end devices, etc. Optionally, the terminal may be a handheld device, an in-vehicle device, a wearable device, or a computer with a communication function, which is not limited in the embodiments of the present application. For example, the handheld device may be a smart phone. The in-vehicle device may be an in-vehicle navigation system. The wearable device may be a smart bracelet. The computer may be a personal digital assistant (personal digital assistant, PDA) computer, a tablet computer, or a laptop computer (laptop computer).
As shown in fig. 2, fig. 2 shows a schematic structural diagram of a communication system according to an embodiment of the present application.
When a terminal moves to a coverage area of a shared base station, the terminal needs to access an external Data Network (DN) through the shared base station. The shared base station is a shared base station of the communication carrier 1 and the communication carrier 2.
It should be understood that in fig. 2, taking Core Network (CN) as AN example of a 5G Core Network (5 gcore,5 gc), the base station may be AN access device in the 5G Network or may be AN Access Network (AN)/radio access Network (radio access Network, RAN). Such as next generation node bs (The Next Generation Node B, gNB).
In the 5G communication system shown in fig. 2, the functions may be connected to each other through a Next Generation (NG) interface to implement communication, for example: the terminal can establish control plane signaling connection with AN access and mobility management function (access and mobility management function, AMF) network element through AN N interface 1 (N1 for short), the AN/RAN can establish control plane signaling connection with the AMF through AN N interface 2 (N2 for short), and the user plane function (User plane function, UPF) network element can establish control plane signaling connection with a session management function (Session Management Function, SMF) network element through AN N interface 4 (N4 for short). In fig. 2, a v-security border protection agent (v-security edge protection proxy, vSEPP) in the core network of the communication carrier 1 is connected to hSEPP in the core network of the communication carrier 2 through an N interface 32 (abbreviated as N32).
It should be understood that in the 5GC, the network element or entity corresponding to the access function management network element may be an AMF network element, the network element or entity corresponding to the unified data management network element may be a unified data management (unified data management, UDM) network element, and the network element or entity corresponding to the policy control network element may be a policy control function (policy control function, PCF) network element.
It should be appreciated that if the core network employs a 4G core network (e.g., a core packet network evolution (evolved packet core, EPC), the base station may be an access device or an evolved NodeB (eNB) in the 4G network, the network element or entity corresponding to the access function management network element may be a mobility management entity (mobility management entity, MME).
It should be noted that, the base station, AMF network element, SMF network element, UDM network element, user plane function (User plane function, UPF) network element, authentication server function (authentication server function, AUSF) network element, network storage function (NF repository function, NRF) network element, network opening function (network exposure function, NEF) network element, policy control function (policy control function, PCF) network element, and the like in fig. 2 are just one name, and the name does not limit the device itself. In the 5G network and other networks in the future, the network elements or entities corresponding to the base station, the AMF network element, the SMF network element, the UDM network element, the UPF network element, the AUSF network element, the NRF network element, the NEF network element, the application function (application function, AF) and the PCF network element may also be other names, which are not specifically limited in the embodiment of the present application.
With reference to fig. 1 and fig. 2, fig. 3 illustrates a network access method provided in an embodiment of the present application.
As shown in fig. 3, the network access method includes:
step 101, the AMF obtains a first access request.
Wherein the first access request includes an identification of the terminal, which may encrypt a mobile subscriber identity (Encrypted Mobile Subscriber Identification, EMSI) code, a personal identification number (personal identification number, PIN), etc. The first access request is for requesting access to the network.
It should be noted that, the first access request may further include location information of the terminal, capability information of the terminal, and subscription information of the terminal.
The capability information of the terminal refers to a network that the terminal can support, for example, in the case that the terminal is a 5G terminal, when the terminal moves to a coverage area of a 5G shared base station, the terminal can access the 5G network; in the case that the terminal is a 4G terminal, when the terminal moves to the coverage of the 5G shared base station, the terminal cannot access the 5G network, and can only access the 4G network.
The subscription information of the terminal refers to service information of the terminal, that is, information signed by a user corresponding to the terminal and a communication carrier. For example, in the case that the terminal has a voice service, if the 5G sharing base station supports the voice service, the terminal may use the voice service through the 5G sharing base station; if the 5G sharing base station does not support voice service, the terminal can use the voice service through the 4G network.
Step 102, the AMF acquires an access strategy.
The access strategy is used for determining RFSP used when the terminal accesses the network.
And 103, the AMF determines a target RFSP index according to the access strategy and the identification of the terminal.
Wherein the AMF stores a plurality of RFSP indexes. The target RFSP is one of a plurality of RFSP indexes, one RFSP index uniquely identifying one RFSP.
The RFSP Index includes a radio access type Index (Index to RAT) and a radio frequency priority Index (Index to FSP).
Illustratively, index to RAT may be 1,2,3. Wherein 1 represents 5G,2 represents 4G, and 3 represents 3G.
Illustratively, a 5G shared base station is taken as an example of a base station shared by the communication carrier 1 and the communication carrier 2. For communication carrier 1, the Index to FSP stored by the amf may be in the following order: a. b, c, d, e, f. Wherein a represents F1, b represents F2, c represents F3, d represents F4, e represents F5, and F represents F6. For communication carrier 2, the amf store Index to FSP may be in the following order: b. a, d, f, c, e. That is, if the terminal of the communication carrier 1 needs to access the 5G shared base station, F1 is preferentially used, F2 is used if F1 is occupied, and so on. If the terminal of the communication carrier 2 needs to access the 5G shared base station, F2 is preferentially used, F1 is used if F2 is occupied, and so on.
Step 104, the AMF sends the target RFSP index to the base station.
The target RFSP index is used for indicating the base station to determine the RFSP corresponding to the target RFSP index.
It should be appreciated that in the embodiments of the present application, the AMF transmits the Index to RAT and the Index to FSP to the base station over the N2 interface. Then, the base station maps Index to RAT and Index to FSP according to the corresponding relation between stored RFSP and RFSP Index. In this way, the technical scheme of the embodiment of the application can save channel resources.
According to the network access method provided by the embodiment of the application, after the AMF acquires the access strategy and the first access request, the AMF determines the target RFSP index from the RFSPs according to the access strategy and the identification of the terminal in the first access request. The AMF then sends the target RFSP index to the base station. After receiving the target RFSP index, the base station may determine the target RFSP according to the target RFSP index and a corresponding relationship between the pre-configured RFSP index and the RFSP. And finally, the base station transmits the target RFSP to the terminal so that the terminal accesses the network according to the target RFSP. Compared with the prior art that the terminal needs to try to access the frequency band of the 5G shared base station for many times when accessing the network, the terminal can access the network once. Therefore, the terminal can reduce the number of times of accessing the network, so that the terminal can reduce the time of accessing the network and reduce power consumption.
In a possible embodiment, in conjunction with the technical solution shown in fig. 3, fig. 4 shows another network access method provided in the embodiment of the present application.
As shown in fig. 4, before step 101, steps 201 to 202 may be further included:
step 201, the terminal sends a first access request to the base station. Correspondingly, the base station receives a first access request from the terminal.
It should be noted that, when the terminal moves to the coverage area of the shared base station, or the terminal needs to access the network through the shared base station, the terminal may send the first access request to the base station.
Step 202, the base station sends a first access request to the AMF. In response, the AMF receives a first access request from a base station.
In one possible implementation, the base station may forward the first access request from the terminal directly to the base station.
In another possible implementation, the base station may generate the second access request according to the first access request and the identity of the base station. Then, the base station transmits a second access request to the AMF.
In a possible embodiment, the access policy comprises a first access policy or a second access policy, the second access policy having a higher priority than the first access policy. As shown in fig. 4, when the terminal accesses the network through the 5G shared base station for the first time, step 102 may be implemented through step 203 or step 204.
In step 203, in case the access policy comprises a first access policy, the AMF obtains the first access policy from the UDM.
Wherein the first access policy includes any one of the following access policies:
policy 1, selecting RFSP to be used for the terminal according to the capability information of the terminal.
Illustratively, the terminal supports Voice over IP (Voice over IP), but the base station to which the terminal is accessing does not support the Voice service, the AMF selects a 4G radio access type (E-UTRAN) and frequency for the terminal.
And 2, selecting RFSP according to PLMN supported by the terminal.
That is, the AMF selects different frequencies according to the communication carrier to which the terminal belongs.
For example, for the communication carrier a to build a 5G sharing base station shared to the communication carrier B, the AMF corresponding to the 5G sharing base station is preferably F1 when the terminal uses PLMN of the communication carrier 1 to access. When the terminal is accessed by using the PLMN of the communication carrier 2, F2 is preferable.
Policy 3, selecting RFSP according to terminal capability information and supported PLMN.
For example, if the terminal supports Voice over IP, but the 5G sharing base station does not support Voice, the AMF selects a different 4G access frequency according to the PLMN of the terminal, selects a frequency F3 or F5 for the terminal of the home network, and selects a frequency F4 or F6 for the roaming terminal of the other network or the terminal of the other network sharing network.
In a possible implementation, the AMF sends a first request message to the UDM, the first request message being for requesting a first access policy, the first request message including capability information of the terminal and a PLMN supported by the terminal. The UDM receives a first request message from the AMF. The UDM determines a first access policy from the first request message, and then the UDM sends the first access policy to the AMF. The AMF receives a first access policy from the UDM.
In another possible implementation, the AMF sends a second request message to the UDM, the second request message being used to verify the legitimacy of the terminal and the base station. The second request message includes an identification of the terminal, an identification of the base station. And the UDM sends a second response message to the AMF under the condition that the terminal is determined to be a legal terminal and the base station is determined to be a legal base station. The second response message may include the first access policy, and may further include subscription information of the terminal.
Illustratively, the UDM may determine that the terminal is a legitimate terminal and the base station is a legitimate base station by.
The UDM has a first identifier and a second identifier stored therein. Wherein the first identifier uniquely identifies a terminal and the second identifier uniquely identifies a base station. Under the condition that the identification of the terminal in the second request message is the same as the first identification, the UDM determines that the terminal is a legal terminal; in case the identity of the base station in the next day request message is the same as the second identity, the UDM determines that the base station is a legitimate base station.
Step 204, in case the access policy includes a second access policy, the AMF obtains the second access policy from the PCF.
Wherein the second access policy includes any one of the following access policies:
policy 4, selecting RFSP according to terminal type.
For example, when terminals belong to different terminal groups of different enterprises, different RFSPs may be configured. For example, a communications carrier may allocate different RFSPs for a power enterprise. For high priority traffic (e.g., traffic of industrial robots), the assigned RFSPs are: 5g+f11. For other terminals (such as 5G handsets of the employee's hand-held type), the allocated RFSP is 5G+F1/F2.
Policy 5, selecting RFSP according to terminal position.
Illustratively, the PCF configures different RFSPs according to the location of the terminal. For example, for a power distribution control robot of a power enterprise, F11 can be accessed only in a specific area. When the power distribution control robot is positioned at other positions, the distributed RFSP is 5G+F1\F2 or 4G+F3/F4/F5/F6, etc.
And 6, selecting RFSP according to the requirement of the service of the terminal on time delay and bandwidth.
Wherein the PCF may configure a slice selection policy, i.e. authorized network slice selection assistance information (network slice selection assistance information, nsai).
Illustratively, the PCF configures the terminal with 5G slices 1 and 5G slices 2. The 5G slice 1 is used to support services of a low latency highly reliable terminal (e.g., services of a power distribution control robot of a power enterprise). The 5G slice 2 is used to support the traffic of a terminal with a large bandwidth (e.g., a 5G handset held by a worker of a power enterprise). The PCF may configure the power distribution control robot with an authorized nsai=slice flag of the industrial robot (i.e., identification of 5G slice 1) and an authorized nsai=slice flag of the office private network slice (i.e., identification of 5G slice 2) for a 5G handset held by the employee of the power enterprise.
In a possible implementation manner, the AMF sends a third request message to the PCF, where the third request message is used to request the second access policy, and the third request message includes location information of the terminal, a type of the terminal, and service information of the terminal. The PCF receives a third request message from the AMF. The PCF determines a second access policy according to the third request message, and then the PCF sends the second access policy to the AMF. Accordingly, the AMF receives a second access policy from the PCF.
In this embodiment of the present application, in the case where the PCF does not have the second access policy, the AMF may determine the target access policy according to the first access policy and the identifier of the terminal. In the case where the PCF has a second access policy, the AMF may first obtain the first access policy from the UDM and then obtain the second access policy from the PCF. That is, the AMF first performs step 203, and then performs step 204. The AMF then takes the second access policy as the access policy. Or the AMF determines that the terminal is a legal terminal through interaction with the UDM, and the AMF directly acquires the second access strategy from the PCF under the condition that the base station is the legal base station.
In the case where the 5G shared base station does not have a shared core network, that is, the 5G core network includes UDMs and PCFs of a plurality of communication carriers. The 5G core network has, for example, UDM1, UDM2, PCF1, PCF2.UDM1 and PCF1 belong to network elements in the core network of the communication carrier 1. UDM2, PCF2 belong to network elements in the core network of the communication carrier 2.
The AMF may determine a communication carrier corresponding to the terminal according to the identifier of the terminal. Then, the AMF acquires an access policy from the UDM and/or PCF of the core network of the communication carrier corresponding to the terminal.
Illustratively, the 5G shared base station is a 5G shared base station of the communication carrier 1 and the communication carrier 2. The 5G core network includes UDM1 and PCF1 of the communication carrier 1, and UDM2 and PCF2 of the communication carrier 2. After the terminal of the communication carrier 1 moves to the coverage area of the 5G sharing base station, the terminal sends an access request to the 5G sharing base station. After the 5G sharing base station obtains the access request of the terminal, the first access request is sent to the AMF. After the AMF receives the first access request, the identification of the terminal is determined according to the first access request. The AMF may determine, according to the identity of the terminal, a communication carrier to which the terminal belongs. If the terminal belongs to the communication carrier 1, the AMF acquires an access strategy from the UDM1 and the PCF 1; if the terminal belongs to the communication carrier 2, the AMF acquires an access policy from the UDM2 and PCF2.
Of course, the communication carrier 1 and the communication carrier 2 may share UDM and/or PCF of the core network. In the case where the communication carrier 1 and the communication carrier 2 share the UDM and/or PCF of the core network, the procedure of the AMF to acquire the access policy may refer to the descriptions of step 204 and step 205, which are not described herein.
It should be noted that, in the case that the terminal has accessed the network through the base station, that is, the AMF has stored the access policy corresponding to the terminal. When the AMF receives the access request from the base station again, the AMF may directly determine the access policy corresponding to the terminal according to the identifier of the terminal.
In a possible embodiment, as shown in fig. 4, the network access method provided in the embodiment of the present application may further include the following steps:
step 205, the base station receives the target RFSP index from the AMF.
Step 206, the base station determines the target RFSP according to the target RFSP index and the preset correspondence between RFSPs and RFSP indexes.
Wherein, the base station is preset with the corresponding relation between RFSP and RFSP index. The correspondence includes one or more RFSPs, and one or more RFSP indexes. One RFSP corresponds to one RFSP index.
Illustratively, table 1 shows a correspondence between RFSPs and RFSP indexes.
TABLE 1
RFSP index RAT FSP
1+a 5G F1
1+b 5G F2
2+d 4G F3
2+e 4G F4
3+h 3G F7
3+i 3G F8
As can be seen from table 1, when the base station receives the RFSP index 1+a from the AMF, it can determine that the RAT corresponding to the RFSP index is 5G and the corresponding FSP is F1. Other correspondence may refer to the description of RFSP index, and will not be described here. In table 1, only a partial RFSP index and corresponding RAT, FSP are listed for example. During actual use, the RFSP index in the corresponding relation, the corresponding RAT and the corresponding FSP can be configured for the AMF according to actual requirements.
Step 207, the base station transmits the target RFSP to the terminal. Accordingly, the terminal receives the target RFSP from the base station.
And step 208, the terminal accesses the network according to the target RFSP.
It should be understood that after the terminal receives the target RFSP from the base station, the terminal may access the network according to the target RFSP. Compared with the prior art, the terminal does not need to try to access the network for a plurality of times. Therefore, the terminal can reduce the number of times of accessing the network, and thus, the terminal can reduce the time of accessing the network and reduce power consumption.
The foregoing description of the solution provided in the embodiments of the present application has been mainly presented in terms of a method. To achieve the above functions, it includes corresponding hardware structures and/or software modules that perform the respective functions. Those of skill in the art will readily appreciate that the elements and algorithm steps of the examples described in connection with the embodiments disclosed herein may be implemented as hardware or combinations of hardware and computer software. Whether a function is implemented as hardware or computer software driven hardware depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
The embodiment of the application may divide the functional modules of the network access device according to the above method example, for example, each functional module may be divided corresponding to each function, or two or more functions may be integrated into one processing module. The integrated modules may be implemented in hardware or in software functional modules. Optionally, the division of the modules in the embodiments of the present application is schematic, which is merely a logic function division, and other division manners may be actually implemented.
The network access device 500 provided in the embodiment of the present application is applied to an AMF, and may also be a chip applied to the AMF. Alternatively, the network access device 500 may be applied to a base station or a chip applied to a base station. Alternatively, the network access device may be applied to the terminal or may be a chip applied to the terminal. As shown in fig. 5, the network access device 500 includes: a communication unit 501, a processing unit 502, and a storage unit 503.
When the network access device is applied to an AMF or a chip applied to an AMF, the communication unit 501 is configured to obtain an access policy and a first access request.
Wherein the first access request includes an identification of the terminal, and the first access request is used for requesting access to the network.
For example, in connection with fig. 3, the communication unit 501 may be used to perform steps 101, 102.
And the processing unit 502 is configured to determine a target RFSP according to the access policy and the identifier of the terminal.
For example, in connection with fig. 3, the processing unit 502 may be adapted to perform step 103.
A storage unit 503 for storing a plurality of RFSP indexes.
Wherein the target RFSP index is one of a plurality of RFSP indexes, and one RFSP index uniquely identifies one RFSP.
The communication unit 501 is further configured to send the target RFSP index to the base station.
The target RFSP index is used for indicating the base station to determine the RFSP corresponding to the target RFSP index.
For example, in connection with fig. 3, the communication unit 501 may be used to perform step 104.
Optionally, the access policy includes a first access policy or a second access policy, and the second access policy has a higher priority than the first access policy. The communication unit 501 is specifically configured to: in case the access policy comprises a first access policy, obtaining the first access policy from the UDM; in the case where the access policy includes a second access policy, the second access policy is acquired from the PCF.
Optionally, the first access policy includes any one of the following policies: RFSP used for the terminal is selected according to the capability information of the terminal; selecting RFSP according to PLMN supported by terminal; and selecting RFSP according to the capability information of the terminal and PLMN supported by the terminal.
Optionally, the second access policy includes any one of the following policies: selecting RFSP according to the type of the terminal; selecting RFSP according to the position information of the terminal; RFSP is selected according to the requirements of the service of the terminal on time delay and broadband.
Optionally, the communication unit 501 is specifically configured to obtain the first access request by the communication base station.
When the network access device in fig. 5 is applied to a base station, or a chip applied to a base station, the communication unit 501 is configured to receive a target RFSP index from an AMF.
For example, in connection with fig. 4, a communication unit 501 is provided for performing step 205.
And a processing unit 502, configured to determine the target RFSP according to the target RFSP index and the correspondence between the preconfigured RFSPs and the RFSP index.
For example, in connection with fig. 4, a processing unit 502 is provided for performing step 206.
A storage unit 503, configured to store a preset correspondence between RFSPs and RFSP indexes.
A communication unit 501, configured to send the target RFSP to the terminal.
For example, in connection with fig. 4, the communication unit 501 is configured to perform step 207.
When the network access device 500 is applied to a terminal, or a chip in a terminal, the communication unit 501 is configured to send a second access request to the base station.
Wherein the second access request includes an identification of the terminal, and the second access request is used for requesting access to the network.
For example, in connection with fig. 4, a communication unit 501 is provided for performing step 201.
The communication unit 501 is further configured to receive a target RFSP from a base station.
For example, in connection with fig. 4, the communication unit 501 is configured to perform step 207.
A processing unit 502 for connecting to the network according to the target RFSP.
Figure 6 shows a further possible structural schematic diagram of the network access device involved in the above embodiment. The device comprises: one or more processors 161 and a communication interface 162. The processor 161 is configured to control and manage the actions of the apparatus, for example, to perform the steps performed by the processing unit 502 described above, and/or to perform other processes of the techniques described herein.
In a particular implementation, processor 161 may include one or more CPUs, such as CPU0 and CPU1 in fig. 6, as an embodiment.
In a particular implementation, as one embodiment, the communication device may include a plurality of processors, such as processor 161 in FIG. 6. Each of these processors may be a single-core (single-CPU) processor or may be a multi-core (multi-CPU) processor. A processor herein may refer to one or more devices, circuits, and/or processing cores for processing data (e.g., computer program instructions).
Optionally, the apparatus may further comprise a memory 163 and a communication line 164, the memory 163 being for storing program codes and data of the apparatus.
Fig. 7 is a schematic structural diagram of a chip 170 according to an embodiment of the present application. Chip 170 includes one or more (including two) processors 1710 and communication interfaces 1730.
Optionally, the chip 170 further includes a memory 1740, the memory 1740 may include read-only memory and random access memory, and provides operating instructions and data to the processor 1710. A portion of memory 1740 may also include non-volatile random access memory (non-volatile random access memory, NVRAM).
In some implementations, memory 1740 stores the elements, execution modules or data structures, or a subset thereof, or an extended set thereof.
In the present embodiment, the corresponding operations are performed by invoking operational instructions stored in memory 1740 (which may be stored in the operating system).
Wherein the processor 1710 may implement or perform various exemplary logic blocks, units, and circuits described in connection with the present disclosure. The processor may be a central processing unit, a general purpose processor, a digital signal processor, an application specific integrated circuit, a field programmable gate array or other programmable logic device, a transistor logic device, a hardware component, or any combination thereof. Which may implement or perform the various exemplary logic blocks, units and circuits described in connection with this disclosure. The processor may also be a combination that performs the function of a computation, e.g., a combination comprising one or more microprocessors, a combination of a DSP and a microprocessor, etc.
Memory 1740 may include volatile memory, such as random access memory; the memory may also include non-volatile memory, such as read-only memory, flash memory, hard disk or solid state disk; the memory may also comprise a combination of the above types of memories.
Bus 1720 may be an extended industry standard architecture (Extended Industry Standard Architecture, EISA) bus or the like. Bus 1720 may be divided into an address bus, a data bus, a control bus, and the like. For ease of illustration, only one line is shown in fig. 7, but not only one bus or one type of bus.
From the foregoing description of the embodiments, it will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-described division of functional units is illustrated, and in practical application, the above-described functional allocation may be performed by different functional units, that is, the internal structure of the apparatus is divided into different functional units, so as to perform all or part of the functions described above. The specific working processes of the above-described systems, devices and units may refer to the corresponding processes in the foregoing method embodiments, which are not described herein.
The embodiment of the application further provides a computer readable storage medium, in which instructions are stored, and when the computer executes the instructions, the computer executes each step in the method flow shown in the method embodiment.
The computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples (a non-exhaustive list) of the computer-readable storage medium would include the following: electrical connections having one or more wires, portable computer diskette, hard disk. Random access Memory (Random Access Memory, RAM), read-Only Memory (ROM), erasable programmable Read-Only Memory (Erasable Programmable Read Only Memory, EPROM), registers, hard disk, optical fiber, portable compact disc Read-Only Memory (CD-ROM), an optical storage device, a magnetic storage device, or any other form of computer-readable storage medium suitable for use by a person or persons of skill in the art. An exemplary storage medium is coupled to the processor such the processor can read information from, and write information to, the storage medium. In the alternative, the storage medium may be integral to the processor. The processor and the storage medium may reside in an application specific integrated circuit (Application Specific Integrated Circuit, ASIC). In the context of the present application, a computer-readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
Embodiments of the present application provide a computer program product comprising instructions which, when run on a computer, cause the computer to perform a network access method as described in fig. 3, 4.
Since the network access device, the computer readable storage medium and the computer program product in the embodiments of the present application may be applied to the above-mentioned method, the technical effects that can be obtained by the network access device, the computer readable storage medium and the computer program product may also refer to the above-mentioned method embodiments, and the embodiments of the present application are not repeated herein.
In the several embodiments provided in this application, it should be understood that the disclosed systems, devices, and methods may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is merely a logical function division, and there may be additional divisions when actually implemented, for example, multiple units or components may be combined or integrated into another system, or some features may be omitted or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be through some interface, indirect coupling or communication connection of devices or units, electrical, mechanical, or other form.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in each embodiment of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit.
The foregoing is merely specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily think about changes or substitutions within the technical scope of the present application, and the changes and substitutions are intended to be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (14)

1. A network access method, comprising:
the method comprises the steps that an access function management network element (AMF) obtains an access strategy and a first access request, wherein the first access request comprises an identifier of a terminal, and the first access request is used for requesting access to a network;
The AMF determines a target wireless access type/wireless frequency priority RFSP index according to the identification of the terminal and the access strategy, wherein the AMF stores a plurality of RFSP indexes, the target RFSP index is one of the RFSP indexes, and one RFSP index uniquely identifies one RFSP;
the AMF sends the target RFSP index to a base station, wherein the target RFSP index is used for indicating the base station to determine RFSP corresponding to the target RFSP index;
the access policy includes a first access policy or a second access policy, the second access policy has a higher priority than the first access policy, and the AMF obtains the access policy, including:
in case the access policy comprises a first access policy, the AMF obtains the first access policy from a unified data management network element, UDM;
in case the access policy comprises a second access policy, the AMF obtains the second access policy from a policy control function network element, PCF.
2. The network access method of claim 1, wherein the first access policy comprises any one of:
selecting RFSPs for the terminal according to the capability information of the terminal;
Selecting RFSP according to PLMN supported by terminal;
and selecting RFSP according to the capability information of the terminal and the supported PLMN.
3. The network access method of claim 1, wherein the second access policy comprises any one of the following policies:
selecting RFSP according to the type of the terminal;
selecting RFSP according to the position of the terminal;
and selecting RFSP according to the requirements of the service of the terminal on time delay and bandwidth.
4. A network access method according to any of claims 1-3, wherein the AMF obtaining the first access request comprises:
the AMF obtains the first access request through a base station.
5. A network access method is characterized in that,
the base station receives a target RFSP index from an AMF for acquiring a first access policy from a UDM in case the access policy includes the first access policy; the AMF is further configured to obtain a second access policy from the PCF if the access policy includes the second access policy; the second access policy has a higher priority than the first access policy;
the base station determines a target RFSP according to the target RFSP index and the corresponding relation between the pre-configured RFSP and the RFSP index; the corresponding relation comprises one or more RFSPs and one or more RFSP indexes, one RFSP corresponds to one RFSP index, and the target RFSP is one of the one or more RFSP indexes;
And the base station sends the target RFSP to a terminal.
6. The network access method of claim 5, wherein before the base station receives the target RFSP index from the AMF, the method further comprises:
the base station receives a first access request from the terminal, wherein the first access request comprises the identification of the terminal; the first access request is used for requesting to access a network;
the base station sends the first access request to the AMF.
7. A network access device, comprising:
the communication unit is used for acquiring an access strategy and a first access request, wherein the first access request comprises an identifier of a terminal, and the first access request is used for requesting to access a network;
the processing unit is used for determining a target RFSP index according to the identification of the terminal and the access strategy;
a storage unit, configured to store a plurality of RFSP indexes, where the target RFSP index is one of the RFSP indexes, and one RFSP index uniquely identifies one RFSP;
the communication unit is further configured to send the target RFSP index to a base station, where the target RFSP index is used to instruct the base station to determine an RFSP corresponding to the target RFSP index;
The access policy comprises a first access policy or a second access policy, and the second access policy has a higher priority than the first access policy;
the communication unit is specifically configured to:
acquiring the first access policy from a unified data management network element (UDM) under the condition that the access policy comprises the first access policy;
and acquiring the second access policy from a policy control function network element PCF in the case that the access policy comprises the second access policy.
8. The network access device of claim 7, wherein the first access policy comprises any one of:
selecting RFSPs for the terminal according to the capability information of the terminal;
selecting RFSP according to PLMN supported by terminal;
and selecting RFSP according to the capability information of the terminal and the supported PLMN.
9. The network access device of claim 7, wherein the second access policy comprises any one of:
selecting RFSP according to the type of the terminal;
selecting RFSP according to the position of the terminal;
and selecting RFSP according to the requirements of the service of the terminal on time delay and bandwidth.
10. The network access device according to any of the claims 7-9, wherein the communication unit is specifically configured to obtain the first access request through a base station.
11. A network access device, comprising:
a communication unit configured to receive a target RFSP index from an AMF, where the AMF is configured to obtain a first access policy from a UDM if the access policy includes the first access policy; the AMF is further configured to obtain a second access policy from the PCF if the access policy includes the second access policy; the second access policy has a higher priority than the first access policy;
a processing unit, configured to determine a target RFSP according to the target RFSP index and a correspondence between a preconfigured RFSP and an RFSP index;
a storage unit, configured to store a correspondence between the preconfigured RFSPs and RFSP indexes, where the correspondence includes one or more RFSPs and one or more RFSP indexes, one RFSP corresponds to one RFSP index, and the target RFSP is one of the one or more RFSPs;
the communication unit is configured to send the target RFSP to a terminal.
12. The network access device of claim 11, wherein,
The communication unit is further configured to receive a first access request from the terminal, where the first access request is used to request access to a network;
the communication unit is further configured to send the first access request to the AMF.
13. A network access device comprising a memory and a processor; the memory is used for storing computer execution instructions, and the processor is connected with the memory through a bus;
the processor, when executed by the network access device, executes the computer-executable instructions stored by the memory to cause the network access device to perform any one of claims 1-4, or perform the network access method of claim 5 or 6.
14. A computer readable storage medium comprising computer executable instructions which, when run on a computer, cause the computer to perform any of claims 1-4 or to perform the network access method of claim 5 or 6.
CN201911400498.XA 2019-12-30 2019-12-30 Network access method and device Active CN111132238B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911400498.XA CN111132238B (en) 2019-12-30 2019-12-30 Network access method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911400498.XA CN111132238B (en) 2019-12-30 2019-12-30 Network access method and device

Publications (2)

Publication Number Publication Date
CN111132238A CN111132238A (en) 2020-05-08
CN111132238B true CN111132238B (en) 2023-05-12

Family

ID=70505712

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911400498.XA Active CN111132238B (en) 2019-12-30 2019-12-30 Network access method and device

Country Status (1)

Country Link
CN (1) CN111132238B (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111818576B (en) * 2020-07-30 2022-07-29 中国联合网络通信集团有限公司 User access method and access network equipment
CN112243228A (en) * 2020-07-31 2021-01-19 国网浙江省电力有限公司培训中心 Energy Internet terminal access system and method based on 5G access network slice
CN114339801A (en) * 2020-09-28 2022-04-12 中国电信股份有限公司 Method and system for dynamically triggering access and mobility policy changes
CN114390507B (en) * 2020-10-20 2024-05-03 中国电信股份有限公司 Method and system for dynamically triggering RFSP value change
CN113542219B (en) * 2021-06-07 2023-02-14 中国人民解放军战略支援部队信息工程大学 Method and system for realizing signaling access based on multi-mode network element proxy
CN113691936B (en) * 2021-08-25 2023-03-24 中国联合网络通信集团有限公司 Terminal access method based on shared base station and shared base station
CN116017607A (en) * 2021-10-20 2023-04-25 华为技术有限公司 Communication method and device
CN114423052A (en) * 2021-12-28 2022-04-29 中国电信股份有限公司 Voice fallback method and related equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104995960A (en) * 2012-10-12 2015-10-21 诺基亚通信公司 Method and apparatus for access network selection
CN108323245A (en) * 2017-06-19 2018-07-24 华为技术有限公司 It is a kind of registration and session establishment method, terminal and AMF entities
WO2019072099A1 (en) * 2017-10-09 2019-04-18 Qualcomm Incorporated Configuration for legacy voice support in 5g
WO2019243872A1 (en) * 2018-06-20 2019-12-26 Telefonaktiebolaget Lm Ericsson (Publ) Dynamic rsfp

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10524198B2 (en) * 2018-05-18 2019-12-31 Intel Corporation UE indication to PCF whether or not to send UE policy

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104995960A (en) * 2012-10-12 2015-10-21 诺基亚通信公司 Method and apparatus for access network selection
CN108323245A (en) * 2017-06-19 2018-07-24 华为技术有限公司 It is a kind of registration and session establishment method, terminal and AMF entities
WO2019072099A1 (en) * 2017-10-09 2019-04-18 Qualcomm Incorporated Configuration for legacy voice support in 5g
WO2019243872A1 (en) * 2018-06-20 2019-12-26 Telefonaktiebolaget Lm Ericsson (Publ) Dynamic rsfp

Also Published As

Publication number Publication date
CN111132238A (en) 2020-05-08

Similar Documents

Publication Publication Date Title
CN111132238B (en) Network access method and device
CN112423301B (en) Private network registration management method and AMF network element
US10798647B2 (en) Network slice selection
US20230093339A1 (en) Session Management Method, Apparatus, and System
CN110519709B (en) Context management method and device
US20220330361A1 (en) Method for establishing connection and obtaining relay service code and communications apparatus
CN108632808B (en) Core network control plane device selection method and device
CN112312539B (en) Method, device, system and storage medium for selecting policy control function network element
CN113630843B (en) Communication method and communication device
US20210297844A1 (en) Selection of Slice-Supporting PLMNs While Roaming Away from Home Network
EP4109978A1 (en) Communication method and apparatus
CN111586797B (en) Communication method and access network equipment
WO2020102989A1 (en) Method, terminal device and network device for registration
CN111586690A (en) Communication method and device
WO2021056576A1 (en) Method and device for service transmission, and communication device
TW202025843A (en) Information processing method, terminal device, and storage medium
CN110913437B (en) Communication method and network element
US20190281464A1 (en) Network Access Method And Device
WO2021088007A1 (en) Wireless communication method, terminal device, and network device
CN114785626B (en) Method and device for data management
CN114071649A (en) Method and device for accessing local network
RU2811790C2 (en) Communication device and communication method
CN112449377A (en) Network data reporting method and device
CN109525979B (en) Context information management method and device
WO2021208572A1 (en) Information obtaining method and apparatus, electronic device, and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant