CN111757419A - Network access method and device - Google Patents

Network access method and device Download PDF

Info

Publication number
CN111757419A
CN111757419A CN201910252502.6A CN201910252502A CN111757419A CN 111757419 A CN111757419 A CN 111757419A CN 201910252502 A CN201910252502 A CN 201910252502A CN 111757419 A CN111757419 A CN 111757419A
Authority
CN
China
Prior art keywords
network
access
public network
public
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910252502.6A
Other languages
Chinese (zh)
Other versions
CN111757419B (en
Inventor
马景旺
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN201910252502.6A priority Critical patent/CN111757419B/en
Priority to PCT/CN2020/078675 priority patent/WO2020199868A1/en
Publication of CN111757419A publication Critical patent/CN111757419A/en
Application granted granted Critical
Publication of CN111757419B publication Critical patent/CN111757419B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information

Abstract

The embodiment of the application provides a network access method and device, relates to the technical field of communication, and is used for providing network access for vertical industries by utilizing a public network so as to reduce network construction cost. The method comprises the following steps: the first device receives a first request message from a vertical industry control center, wherein the first request message comprises: requesting a coverage area of a managed non-public network and a network access parameter of the non-public network; the network access parameters of the non-public network are used for the terminal to access the non-public network. The first device sends a first configuration message to the access network management device, wherein the first configuration message comprises: network access parameters of the non-public network and a coverage area of the non-public network, and an access network management device for managing the access device providing the non-public network.

Description

Network access method and device
Technical Field
The embodiment of the application relates to the technical field of communication, in particular to a network access method and device.
Background
The next generation communication system can be applied to the application fields of a plurality of vertical industries (also can be called as industry users) such as ports, intelligent factories, railway transportation, logistics, unmanned planes, unmanned vehicles and the like, and provides network access for the vertical industries. In order to realize the safety of the service, the vertical industry operator can independently build a network. For example, a Non-public network (Non-public network) is used for network coverage in a vertical industry area, a vertical industry operator purchases network equipment by itself, applies for and purchases a frequency spectrum used by the Non-public network, and a professional is required to operate and maintain the Non-public network after network deployment.
However, since it is necessary to separately open and operate the non-public network for the vertical industry operator, this increases the network construction and operation costs, and reduces the efficiency of accessing the non-public network for the vertical industry terminal.
Disclosure of Invention
The embodiment of the application provides a network access method and device, which are used for providing network access for vertical industries by utilizing a public network so as to reduce network construction cost.
In order to achieve the above purpose, the embodiments of the present application provide the following technical solutions:
in a first aspect, an embodiment of the present application provides a network access method, where the method includes: the first device receives a first request message from a vertical industry control center. The first request message includes: requesting the management of the coverage area of the non-public network and the network access parameters of the non-public network, wherein the network access parameters of the non-public network are used for the terminal to access the non-public network. The first device sends a first configuration message to the access network management device, wherein the first configuration message comprises: network access parameters of the non-public network and a coverage area of the non-public network, and an access network management device for managing the access device providing the non-public network.
It should be understood that the access device may be used to provide not only non-public networks, but also public networks.
The embodiment of the application provides a network access method, wherein a first device receives a first request message from a vertical industry control center and responds to the first request message to send a network access parameter and a coverage area of a non-public network requested to be managed by the vertical industry control center to an access network management device through a first configuration message. In order for the access network management device to determine the access devices present within the coverage area and to send the network access parameters of the non-public network to the access devices. The access device may then broadcast the network access parameters for the non-public network. On one hand, the deployed non-public network can meet the network coverage requirement of the vertical industry. The vertical industry control center is convenient for the terminal to access the non-public network through the network access parameter by configuring the network access parameter, and does not need to perform independent setting and network access processing according to different PLMN networks, thereby reducing the complexity of the terminal. In addition, a public network operator providing a non-public network with access devices in the coverage area of the non-public network can increase the business model and revenue sources of the public network through cooperation of the industry verticals.
In a possible implementation manner, the method provided in the embodiment of the present application further includes: the first device receives any one or more of the following information from the industry vertical control center: the system comprises a time indication of a non-public network, information of a terminal accessed to the non-public network, information of a user data management network element corresponding to the terminal and an identifier of the vertical industry control center, wherein the time indication is used for indicating an effective time period of the non-public network.
In a possible implementation manner, the method provided in the embodiment of the present application further includes: the first device sends a time indication to the access network management device.
In a possible implementation manner, the method provided in the embodiment of the present application further includes: the first device determines the access network management device according to the coverage area of the non-public network and the configuration information of the management area of one or more access network management devices.
In a possible implementation manner, the method provided in the embodiment of the present application further includes: the first device sends a registration request to the network storage function. The registration request includes: the user data manages information of network elements and information of terminals accessing the non-public network.
In a possible implementation manner, the method provided in the embodiment of the present application further includes: the first device receives a registration completion message from the network storage function, wherein the registration completion message is used for indicating that the registration of the user data management network element is completed. This facilitates the first device determining that the network storage function completed registration with the user data managing network element.
In a possible implementation manner, the method provided in the embodiment of the present application further includes: the first device sends a first configuration message to an access network management device, and the first configuration message comprises: and the first equipment determines that the vertical industry control center has the authority of managing the non-public network according to the first request message, and sends a first configuration message to the access network management equipment.
In a possible implementation manner, the method provided in the embodiment of the present application further includes: the first device receives a first configuration response from the access network management device, the first configuration response indicating that management of the non-public network is completed.
In a possible implementation manner, the method provided in the embodiment of the present application further includes: the first device sends a first response message to the vertical industry control center, wherein the first response message is used for indicating that the management request for the non-public network is processed successfully.
In one possible implementation, the network access parameters of the non-public network include: an identification of the non-public network.
In a second aspect, an embodiment of the present application provides a network access method, where the method includes: the access network management device receives a first configuration message from a first device. The first configuration message includes: network access parameters of the non-public network and a coverage area of the non-public network. The network access parameters of the non-public network are used for the terminal to access the non-public network. And the access network management equipment sends the network access parameters of the non-public network to the access equipment providing the non-public network according to the coverage area of the non-public network.
In a possible implementation manner, the method provided in the embodiment of the present application further includes: the access network management device receives a time indication of the non-public network from the first device, the time indication indicating a valid time period of the non-public network. And the access network management equipment sends the effective time period to the access equipment.
In a possible implementation manner, the method provided in the embodiment of the present application further includes: and the access network management equipment determines the network area of the non-public network according to the coverage area of the non-public network. And the access network management equipment determines the access equipment according to the network area of the non-public network.
In a possible implementation manner, the method provided in the embodiment of the present application further includes: and the access network management equipment sends a first configuration response to the first equipment, wherein the first configuration response is used for indicating that the management of the non-public network is completed.
In a possible implementation manner, the method provided in the embodiment of the present application further includes: and the access network management equipment receives a second response message from the access equipment, wherein the second response message is used for confirming that the network access parameters of the non-public network are successfully received.
In one possible implementation, the network access parameters of the non-public network include: an identification of the non-public network.
In a third aspect, an embodiment of the present application provides a network access method, including: the access equipment receives network access parameters of a non-public network from the access network management equipment, wherein the network access parameters of the non-public network are used for a terminal to access the non-public network. The access device sends a broadcast message, wherein the broadcast message comprises the network access parameters of the non-public network.
In a possible implementation manner, the method provided in the embodiment of the present application further includes: the access device receives a time indication from the non-public network of the access network management device. The time indication is used to indicate a valid period of the non-public network.
In one possible implementation, the access device sends a broadcast message, including: the access device transmits the broadcast message within the validity period.
In one possible implementation, the network access parameters of the non-public network include: identification of non-public networks.
In a fourth aspect, an embodiment of the present application provides a network access method, including: the industry vertical control center determines to manage the non-public network. The vertical industry control center sends a first request message to a first device. The first request message includes: a coverage area of a non-public network requested to be managed and network access parameters of the non-public network. The network access parameters of the non-public network are used for the terminal to access the non-public network.
In a possible implementation manner, the method provided in the embodiment of the present application further includes: the industry vertical control center receives a first response message from a first device indicating that a management request for the non-public network has been successfully processed.
In one possible implementation, the network access parameters of the non-public network include: an identification of the non-public network.
In a fifth aspect, an embodiment of the present application provides a network access method, where the method includes: the network storage function receives a registration request from a first device, the registration request including: the information of the user data management network element and the information of the terminal accessed to the non-public network;
and the network storage function responds to the registration request and stores the association relationship between the information of the terminal accessed to the non-public network and the information of the user data management network element.
In a possible implementation manner, the method provided in the embodiment of the present application further includes: the network storage function receives information of a terminal which is accessed to the non-public network and comes from an authentication server function network element and an identifier of a user data management network element type, wherein the user data management network element type is used for informing the network storage function that the user data management network element is requested to be found; and the network storage function sends the information of the user data management network element corresponding to the terminal accessed to the non-public network to the authentication server function network element.
In a possible implementation manner, the method provided in the embodiment of the present application further includes: and the network storage function sends a registration completion message to the first equipment, wherein the registration completion message is used for indicating that the registration of the user data management network element is completed.
In a sixth aspect, an embodiment of the present application provides a network access method, where the method includes: the terminal is provided with a user identifier used by the terminal for accessing a non-public network and a target network access parameter of the non-public network; the terminal receives a broadcast message sent by the access device that includes network access parameters of the non-public network. And the terminal determines that the network access parameters are matched with the target network access parameters, and the terminal accesses the non-public network according to the user identification and the network access parameters.
In a possible implementation manner, a terminal receiving a broadcast message sent by an access device includes: the terminal receives the broadcast message sent by the access equipment in the effective time period; the terminal accesses the non-public network according to the user identification and the network access parameter, and the method comprises the following steps: and the terminal accesses the non-public network according to the user identification and the network access parameter in the effective time period.
In a seventh aspect, an embodiment of the present application provides a communication apparatus, where the communication apparatus may implement a network access method described in the first aspect or any one of the possible implementation manners of the first aspect, and therefore may also implement beneficial effects in any one of the possible implementation manners of the first aspect or the first aspect. The communication apparatus may be the first device, or may be an apparatus that can support the first device to implement the first aspect or any one of the possible implementation manners of the first aspect. For example a chip applied in the first device. The communication device may implement the above method by software, hardware, or by executing corresponding software by hardware.
An example, the communications apparatus, comprising: the receiving unit is used for receiving a first request message from a vertical industry control center. The first request message includes: requesting a coverage area of a managed non-public network and a network access parameter of the non-public network; and the network access parameters of the non-public network are used for the terminal to access the non-public network. A sending unit, configured to send a first configuration message to an access network management device, where the first configuration message includes: the access network management device is used for managing the access device providing the non-public network.
In one possible implementation, the receiving unit is further configured to receive any one or more of the following information from the industry vertical control center: the system comprises a time indication of a non-public network, information of a terminal accessed to the non-public network, information of a user data management network element corresponding to the terminal and an identifier of the vertical industry control center, wherein the time indication is used for indicating an effective time period of the non-public network.
In a possible implementation manner, the sending unit is configured to send the time indication to the access network management device.
In one possible implementation, the communication apparatus further includes: and the processing unit is used for determining the access network management equipment according to the coverage area of the non-public network and the configuration information of the management area of one or more access network management equipment.
In a possible implementation manner, the sending unit is configured to send the registration request to the network storage function. The registration request includes: the user data manages information of network elements and information of terminals accessing the non-public network.
In a possible implementation manner, the sending unit is specifically configured to send the first configuration message to the access network management device when the processing unit determines that the vertical industry control center has the right to manage the non-public network according to the first request message.
In a possible implementation manner, the receiving unit is further configured to receive a first configuration response from the access network management device, where the first configuration response is used to indicate that management of the non-public network is completed.
In a possible implementation manner, the sending unit is further configured to send a first response message to the industry vertical control center, where the first response message is used to indicate that the management request for the non-public network has been successfully processed.
In one possible implementation, the network access parameters of the non-public network include: an identification of the non-public network.
In another example, an embodiment of the present application provides a communication apparatus, where the communication apparatus may be a first device or a chip in the first device. The communication device may include a transmitting unit and a receiving unit. The transmitting unit and the receiving unit may be collectively referred to as a communication interface. When the communication apparatus is the first device, the communication apparatus may further include a processing unit and a storage unit. The storage unit may be a memory. The memory unit is to store computer program code, the computer program code comprising instructions. The processing unit may be a processor. The processing unit executes the instructions stored by the storage unit to enable the first device to implement the first aspect or a network access method described in any one of the possible implementations of the first aspect. When the communication means is a chip within the first device, the processing unit may be a processor and the communication interface may be an input/output interface, a pin or a circuit, etc. The processing unit executes computer program code stored by a storage unit, which may be a storage unit within the chip (e.g., a register, a cache, etc.) or a storage unit external to the chip within the first device (e.g., a read-only memory, a random access memory, etc.), to cause the first device to implement a network access method as described in the first aspect or any one of the possible implementations of the first aspect.
Optionally, the processor, the communication interface and the memory are coupled to each other.
In an eighth aspect, an embodiment of the present application provides a communication apparatus, which may implement one network access method described in any possible implementation manner of the second aspect or the second aspect, and therefore may also implement beneficial effects in any possible implementation manner of the second aspect or the second aspect. The communication device may be an access network management device, or may be a device that can support the access network management device to implement the second aspect or any possible implementation manner of the second aspect. For example, a chip applied in an access network management device. The communication device may implement the above method by software, hardware, or by executing corresponding software by hardware.
An example, an embodiment of the present application provides a communication apparatus, including: a receiving unit, configured to receive a first configuration message from a first device. The first configuration message includes: network access parameters of the non-public network and a coverage area of the non-public network. The network access parameters of the non-public network are used for the terminal to access the non-public network. A sending unit, configured to send a network access parameter of a non-public network to an access device providing the non-public network according to a coverage area of the non-public network.
In a possible implementation, the receiving unit is further configured to receive a time indication from a non-public network of the first device. The time indication is used to indicate a valid period of the non-public network. And the sending unit is further used for sending the valid time period to the access equipment.
In one possible implementation, the communication apparatus further includes: and the processing unit is used for determining the network area of the non-public network according to the coverage area of the non-public network. And the processing unit is also used for determining the access equipment according to the network area of the non-public network.
In a possible implementation manner, the sending unit is further configured to send a first configuration response to the first device, where the first configuration response is used to indicate that management of the non-public network is completed.
In a possible implementation manner, the receiving unit is further configured to receive a second response message from the access device, where the second response message is used to confirm that the network access parameters of the non-public network are successfully received.
In one possible implementation, the network access parameters of the non-public network include: identification of non-public networks.
In another example, an embodiment of the present application provides a communication apparatus, where the communication apparatus may be an access network management device, or may be a chip in the access network management device. The communication device may include a transmitting unit and a receiving unit. The transmitting unit and the receiving unit may be collectively referred to as a communication interface. When the communication device is an access network management apparatus, the communication device may further include a processing unit and a storage unit. The storage unit may be a memory. The memory unit is to store computer program code, the computer program code comprising instructions. The processing unit may be a processor. The processing unit executes the instructions stored by the storage unit to enable the access network management device to implement a network access method described in the second aspect or any one of the possible implementation manners of the second aspect. When the communication means is a chip within an access network management device, the processing unit may be a processor, and the communication interface may be an input/output interface, a pin or a circuit, etc. The processing unit executes computer program code stored by a storage unit, which may be a storage unit (e.g. register, cache, etc.) within the chip or a storage unit (e.g. read-only memory, random access memory, etc.) located outside the chip within the access network management device, to cause the access network management device to implement a network access method described in the second aspect or any one of the possible implementations of the second aspect.
Optionally, the processor, the communication interface and the memory are coupled to each other.
In a ninth aspect, an embodiment of the present application provides a communication apparatus, which may implement a network access method described in any one of the possible implementations of the third aspect or the third aspect, and therefore may also achieve beneficial effects in any one of the possible implementations of the third aspect or the third aspect. The communication apparatus may be an access device, or may be an apparatus that can support the access device to implement the third aspect or any one of the possible implementation manners of the third aspect. For example, a chip applied in an access device. The communication device may implement the above method by software, hardware, or by executing corresponding software by hardware.
An example, the communications apparatus, comprising: a receiving unit, configured to receive a network access parameter of a non-public network from an access network management device, where the network access parameter of the non-public network is used for a terminal to access the non-public network. A sending unit, configured to send a broadcast message, where the broadcast message includes a network access parameter of the non-public network.
In a possible implementation manner, the receiving unit is further configured to receive a time indication from a non-public network of the access network management device. The time indication is used to indicate a valid period of the non-public network.
In a possible implementation, the sending unit is specifically configured to send the broadcast message within a valid time period.
In one possible implementation, the network access parameters of the non-public network include: an identification of the non-public network.
In another example, an embodiment of the present application provides a communication apparatus, where the communication apparatus may be an access device or a chip in the access device. The communication apparatus may include: a transmitting unit and a receiving unit. When the communication device is an access apparatus, the transmitting unit may be a transmitter. The receiving unit may be a receiver. The receiver and transmitter may be collectively referred to as a transceiver. The communication device may further comprise a processing unit and a memory unit. The storage unit may be a memory. The memory unit is to store computer program code, the computer program code comprising instructions. The processing unit may be a processor. The processing unit executes the instructions stored in the storage unit to enable the access device to implement a network access method described in the third aspect or any one of the possible implementation manners of the third aspect. When the communication device is a chip within an access apparatus, the processing unit may be a processor, and the transmitting unit and the receiving unit may be collectively referred to as: a communication interface. For example, the communication interface may be an input/output interface, a pin or a circuit, or the like. The processing unit executes the computer program code stored in the storage unit, which may be a storage unit (e.g. register, cache, etc.) within the chip or a storage unit (e.g. read-only memory, random access memory, etc.) located outside the chip within the access device, so as to enable the access device to implement a network access method described in any one of the possible implementations of the third aspect or the third aspect.
Optionally, the processor, the communication interface and the memory are coupled to each other.
In a tenth aspect, an embodiment of the present application provides a communication apparatus, which may implement one network access method described in any possible implementation manner of the fourth aspect or the fourth aspect, and therefore may also implement beneficial effects in any possible implementation manner of the fourth aspect or the fourth aspect. The communication device may be a vertical industry control center, or may be a device that can support the vertical industry control center to implement the fourth aspect or any one of the possible implementation manners of the fourth aspect. Such as a chip in a vertical industry control center. The communication device may implement the above method by software, hardware, or by executing corresponding software by hardware.
An example, the communications apparatus, comprising: a processing unit for determining to manage the non-public network. A sending unit, configured to send a first request message to a first device. The first request message includes: a coverage area of a non-public network requested to be managed and network access parameters of the non-public network. The network access parameters of the non-public network are used for the terminal to access the non-public network.
In a possible implementation manner, the receiving unit is configured to receive a first response message from the first device, where the first response message is used to indicate that the management request for the non-public network has been successfully processed.
In one possible implementation, the network access parameters of the non-public network include: an identification of the non-public network.
In an eleventh aspect, an embodiment of the present application provides a communication apparatus, which may implement one network access method described in any one of the possible implementations of the fifth aspect or the fifth aspect, and therefore may also achieve the beneficial effects in any one of the possible implementations of the fifth aspect or the fifth aspect. The communication device may be a network storage function, or may be a device that can support the network storage function to implement the fifth aspect or any one of the possible implementation manners of the fifth aspect. Such as a chip used in a network storage function. The communication device may implement the above method by software, hardware, or by executing corresponding software by hardware.
An example, an embodiment of the present application provides a communication apparatus, including: a receiving unit, configured to receive a registration request from a first device, where the registration request includes: and the user data manages the information of the network element and the information of the terminal accessing the non-public network. And the processing unit is used for responding to the registration request and storing the association relationship between the information of the terminal accessed to the non-public network and the information of the user data management network element.
In a possible implementation manner, the receiving unit is further configured to receive information of a terminal accessing the non-public network from an authentication server function network element and an identifier of a user data management network element type, where the user data management network element type is used to notify a network storage function that it requests to discover that it is the user data management network element; the communication device further comprises: and the sending unit is used for sending the information of the user data management network element corresponding to the terminal accessed to the non-public network to the authentication server function network element.
In a possible implementation manner, the sending unit is further configured to send a registration completion message to the first device, where the registration completion message is used to indicate that the registration of the user data management network element is completed.
For another example, an embodiment of the present application provides a communication device, where the communication device may be a network storage function, and may also be a chip within the network storage function. The communication apparatus may include: a receiving unit and a processing unit. When the communication device is a network storage function, the receiving unit may be a receiving circuit. The communication device may further include a transmitting unit and a storage unit. The storage unit may be a memory. The transmitting unit may be a transmitting circuit, in general the receiving unit and the transmitting unit may also be referred to as a communication interface. The memory unit is to store computer program code, the computer program code comprising instructions. The processing unit may be a processor. The processing unit executes the instructions stored in the storage unit to enable the network storage function to implement a network access method described in the fifth aspect or any one of the possible implementation manners of the fifth aspect. When the communication device is a chip within a network storage function, the processing unit may be a processor, and the transmitting unit and the receiving unit may be collectively referred to as: a communication interface. For example, the communication interface may be an input/output interface, a pin or a circuit, or the like. The processing unit executes the computer program code stored in the storage unit, which may be a storage unit (e.g., register, cache, etc.) within the chip or a storage unit (e.g., read only memory, random access memory, etc.) external to the chip within the network storage function, so as to enable the network storage function to implement a network access method described in the fifth aspect or any one of the possible implementations of the fifth aspect.
Optionally, the processor, the communication interface and the memory are coupled to each other.
In a twelfth aspect, an embodiment of the present application provides a communication apparatus, which may implement one network access method described in any possible implementation manner of the fourth aspect or the fourth aspect, and therefore may also implement beneficial effects in any possible implementation manner of the fourth aspect or the fourth aspect. The communication device may be a terminal, or may be a device that can support the terminal to implement the fourth aspect or any one of the possible implementation manners of the fourth aspect. For example, for chips in terminals. The communication device may implement the above method by software, hardware, or by executing corresponding software by hardware.
An example of a communication device having therein a subscriber identity used by the terminal to access a non-public network and a target network access parameter of the non-public network, the communication device comprising: a receiving unit, configured to receive a broadcast message sent by an access device, where the broadcast message includes a network access parameter of a non-public network; and the processing unit is used for determining that the network access parameters are matched with the target network access parameters and accessing the non-public network according to the user identification and the network access parameters.
In a possible implementation manner, the receiving unit is specifically configured to receive a broadcast message sent by the access device within a valid time period; and the processing unit is specifically configured to access the non-public network according to the user identifier and the network access parameter in an effective time period.
In another example, an embodiment of the present application provides a communication device, where the communication device may be a terminal or a chip in the terminal. The communication apparatus may include: a receiving unit and a processing unit. When the communication device is a terminal, the receiving unit may be a receiver. The communication device may further include a transmitting unit and a storage unit. The storage unit may be a memory. The sending unit may be a transmitter, and typically the receiver and transmitter may also be referred to as a transceiver. The memory unit is to store computer program code, the computer program code comprising instructions. The processing unit may be a processor. The processing unit executes the instructions stored in the storage unit to enable the terminal to implement a network access method described in any one of the possible implementation manners of the sixth aspect or the sixth aspect. When the communication device is a chip within a terminal, the processing unit may be a processor, and the transmitting unit and the receiving unit may be collectively referred to as: a communication interface. For example, the communication interface may be an input/output interface, a pin or a circuit, or the like. The processing unit executes the computer program code stored by the storage unit, which may be a storage unit (e.g. register, cache, etc.) within the chip or a storage unit (e.g. read-only memory, random access memory, etc.) external to the chip within the terminal, to make the terminal implement a network access method as described in any one of the possible implementations of the sixth aspect or the sixth aspect.
Optionally, the processor, the communication interface and the memory are coupled to each other.
In a thirteenth aspect, embodiments of the present application provide a computer-readable storage medium, in which a computer program or an instruction is stored, and when the computer program or the instruction runs on a computer, the computer is caused to execute the network access method as described in the first aspect or any possible implementation manner of the first aspect.
In a fourteenth aspect, embodiments of the present application provide a computer-readable storage medium, in which a computer program or instructions are stored, and when the computer program or instructions are run on a computer, the computer is caused to execute the network access method as described in the second aspect or any possible implementation manner of the second aspect.
In a fifteenth aspect, an embodiment of the present application provides a computer-readable storage medium, in which a computer program or an instruction is stored, and when the computer program or the instruction runs on a computer, the computer is caused to execute the network access method as described in the third aspect or any possible implementation manner of the third aspect.
In a sixteenth aspect, embodiments of the present application provide a computer-readable storage medium, in which a computer program or instructions are stored, and when the computer program or instructions is executed on a computer, the computer is caused to execute the network access method as described in the fourth aspect or any possible implementation manner of the fourth aspect.
In a seventeenth aspect, embodiments of the present application provide a computer-readable storage medium, in which a computer program or instructions are stored, and when the computer program or instructions are run on a computer, the computer is caused to execute the network access method as described in the fifth aspect or any possible implementation manner of the fifth aspect.
In an eighteenth aspect, embodiments of the present application provide a computer-readable storage medium, in which a computer program or instructions are stored, and when the computer program or instructions are run on a computer, the computer is caused to execute the network access method as described in the sixth aspect or any possible implementation manner of the sixth aspect.
In a nineteenth aspect, embodiments of the present application provide a computer program product including instructions that, when executed on a computer, cause the computer to perform the network access method as described in the first aspect or any one of the possible implementations of the first aspect.
In a twentieth aspect, embodiments of the present application provide a computer program product comprising instructions that, when executed on a computer, cause the computer to perform the network access method as described in the second aspect or any one of the possible implementations of the second aspect.
In a twenty-first aspect, embodiments of the present application provide a computer program product including instructions that, when executed on a computer, cause the computer to perform the network access method as described in the third aspect or any one of the possible implementations of the third aspect.
In a twenty-second aspect, embodiments of the present application provide a computer program product including instructions that, when executed on a computer, cause the computer to perform the network access method as described in the fourth aspect or any one of the possible implementations of the fourth aspect.
In a twenty-third aspect, embodiments of the present application provide a computer program product including instructions that, when executed on a computer, cause the computer to perform the network access method as described in the fifth aspect or any one of the possible implementations of the fifth aspect.
In a twenty-fourth aspect, an embodiment of the present application provides a communication system, including: the communications apparatus described in the seventh aspect or in various possible implementations of the seventh aspect, and the communications apparatus described in the eighth aspect or in various possible implementations of the eighth aspect. Wherein the communication device described in the seventh aspect or various possible implementations of the seventh aspect and the communication device described in the eighth aspect or various possible implementations of the eighth aspect may communicate with each other.
In an optional implementation manner, the communication system may further include: the communications apparatus described in the ninth aspect or various possible implementations of the ninth aspect, and the communications apparatus described in the tenth aspect or various possible implementations of the tenth aspect.
In an optional implementation manner, the communication system may further include: the communications apparatus described in the eleventh aspect or various possible implementations of the eleventh aspect, and the communications apparatus described in the twelfth aspect or various possible implementations of the twelfth aspect.
For specific steps executed by each communication apparatus in the communication system, reference may be made to the description in the corresponding place, which is not described herein again.
In a twenty-fifth aspect, an embodiment of the present application provides a communication apparatus, where the communication apparatus includes a processor and a storage medium, where the storage medium stores instructions, and the instructions, when executed by the processor, implement the network access method as described in the first aspect or various possible implementation manners of the first aspect.
In a twenty-sixth aspect, an embodiment of the present application provides a communication apparatus, which includes a processor and a storage medium, where the storage medium stores instructions, and the instructions, when executed by the processor, implement the network access method as described in the second aspect or various possible implementation manners of the second aspect.
In a twenty-seventh aspect, an embodiment of the present application provides a communication apparatus, where the communication apparatus includes a processor and a storage medium, where the storage medium stores instructions, and the instructions, when executed by the processor, implement the network access method as described in the third aspect or various possible implementations of the third aspect.
In a twenty-eighth aspect, embodiments of the present application provide a communication apparatus, which includes a processor and a storage medium, where the storage medium stores instructions that, when executed by the processor, implement the network access method as described in the fourth aspect or various possible implementation manners of the fourth aspect.
In a twenty-ninth aspect, an embodiment of the present application provides a communication apparatus, which includes a processor and a storage medium, where the storage medium stores instructions, and the instructions, when executed by the processor, implement the network access method as described in the fifth aspect or various possible implementation manners of the fifth aspect.
Thirty-first, the present application provides a communication apparatus, which includes a processor and a storage medium, where the storage medium stores instructions, and the instructions are executed by the processor to implement the network access method as described in the sixth aspect or various possible implementation manners of the sixth aspect.
In a thirty-first aspect, an embodiment of the present application provides a first device, including: at least one processor and a communication interface, the at least one processor and the communication interface being interconnected by a line, the at least one processor being coupled to a memory, the memory being configured to store a computer program or instructions, the at least one processor being configured to execute the computer program or instructions in the memory such that the communication device performs the network access method described in the first aspect or in the various possible implementations of the first aspect.
In a thirty-second aspect, an embodiment of the present application provides an access network management device, including: at least one processor and a communication interface, the at least one processor and the communication interface being interconnected by a line, the at least one processor being coupled to a memory, the memory being configured to store a computer program or instructions, the at least one processor being configured to execute the computer program or instructions in the memory such that the communication device performs the network access method described in the second aspect or in various possible implementations of the second aspect.
In a thirty-third aspect, an embodiment of the present application provides an access device, including: at least one processor and a communication interface, the at least one processor and the communication interface being interconnected by a line, the at least one processor being coupled to a memory, the memory being configured to store a computer program or instructions, the at least one processor being configured to execute the computer program or instructions in the memory, such that the communication device performs the network access method described in the third aspect or in various possible implementations of the third aspect.
In a thirty-fourth aspect, an embodiment of the present application provides a vertical industry control center, including: at least one processor and a communication interface, the at least one processor and the communication interface being interconnected by a line, the at least one processor being coupled to a memory, the memory being configured to store a computer program or instructions, the at least one processor being configured to execute the computer program or instructions in the memory, such that the communication apparatus performs the network access method described in the fourth aspect or the various possible implementations of the fourth aspect.
In a thirty-fifth aspect, an embodiment of the present application provides a network storage function, including: at least one processor and a communication interface, the at least one processor and the communication interface being interconnected by a line, the at least one processor being coupled to a memory, the memory being configured to store a computer program or instructions, the at least one processor being configured to execute the computer program or instructions in the memory such that the communication device performs the network access method described in the fifth aspect or the various possible implementations of the fifth aspect.
In a sixteenth aspect, an embodiment of the present application provides a terminal, including: at least one processor and a communication interface, the at least one processor and the communication interface being interconnected by a line, the at least one processor being coupled to a memory, the memory being configured to store a computer program or instructions, the at least one processor being configured to execute the computer program or instructions in the memory such that the communication apparatus performs the network access method described in the sixth aspect or the various possible implementations of the sixth aspect.
In a possible implementation manner, the apparatus described in any one of the thirty-first aspect, the thirty-second aspect, the thirty-third aspect, the thirty-fourth aspect, the thirty-fifth aspect, and the thirty-sixth aspect may further include: a memory.
In a thirty-seventh aspect, embodiments of the present application provide a chip, where the chip includes at least one processor and a communication interface, where the communication interface is coupled to the at least one processor, and the at least one processor is configured to execute a computer program or instructions to implement the first aspect or one of the network access methods described in the various possible implementations of the first aspect. The communication interface is used for communicating with other modules outside the chip.
In a thirty-eighth aspect, embodiments of the present application provide a chip, where the chip includes at least one processor and a communication interface, the communication interface is coupled to the at least one processor, and the at least one processor is configured to execute a computer program or instructions to implement one of the network access methods described in the second aspect or various possible implementations of the second aspect. The communication interface is used for communicating with other modules outside the chip.
In a thirty-ninth aspect, embodiments of the present application provide a chip, where the chip includes at least one processor and a communication interface, the communication interface is coupled to the at least one processor, and the at least one processor is configured to execute a computer program or instructions to implement one of the network access methods described in the third aspect or various possible implementations of the third aspect. The communication interface is used for communicating with other modules outside the chip.
Fortieth, embodiments of the present application provide a chip, which includes at least one processor and a communication interface, the communication interface is coupled with the at least one processor, and the at least one processor is configured to execute a computer program or instructions to implement a network access method described in the fourth aspect or various possible implementations of the fourth aspect. The communication interface is used for communicating with other modules outside the chip.
In a fortieth aspect, embodiments of the present application provide a chip, where the chip includes at least one processor and a communication interface, the communication interface is coupled with the at least one processor, and the at least one processor is configured to execute a computer program or instructions to implement one of the network access methods described in the fifth aspect or various possible implementations of the fifth aspect. The communication interface is used for communicating with other modules outside the chip.
Forty-second aspect, embodiments of the present application provide a chip, where the chip includes at least one processor and a communication interface, where the communication interface is coupled to the at least one processor, and the at least one processor is configured to execute a computer program or instructions to implement a network access method described in the sixth aspect or various possible implementations of the sixth aspect. The communication interface is used for communicating with other modules outside the chip.
A forty-third aspect, an embodiment of the present application provides a communication apparatus, which includes one or more modules, and is configured to implement the methods of the first, second, third, fourth, fifth, and sixth aspects, where the one or more modules may correspond to the steps of the methods of the first, second, third, fourth, fifth, and sixth aspects.
For the beneficial effects of the second aspect to the forty-third aspect and various implementation manners thereof in the present application, reference may be made to beneficial effect analysis in the first aspect and various implementation manners thereof, and details are not described here.
Drawings
Fig. 1 is a schematic structural diagram of a communication system according to an embodiment of the present application;
fig. 2 is a schematic structural diagram of a 5G network according to an embodiment of the present disclosure;
fig. 3 is a schematic structural diagram of another 5G network provided in the embodiment of the present application;
fig. 4 is a schematic structural diagram of a base station according to an embodiment of the present application;
fig. 5 is a first flowchart illustrating a network access method according to an embodiment of the present application;
fig. 6 is a flowchart illustrating a network access method according to an embodiment of the present application;
fig. 7 is a third flowchart illustrating a network access method according to an embodiment of the present application;
fig. 8 is a fourth flowchart of a network access method according to an embodiment of the present application;
fig. 9 is a fifth flowchart of a network access method according to an embodiment of the present application;
fig. 10 is a sixth schematic flowchart of a network access method according to an embodiment of the present application;
fig. 11 is a seventh flowchart illustrating a network access method according to an embodiment of the present application;
fig. 12 is a schematic structural diagram of a communication device according to an embodiment of the present application;
fig. 13 is a schematic structural diagram of a communication device according to an embodiment of the present application;
fig. 14 is a schematic structural diagram of another communication device according to an embodiment of the present application;
fig. 15 is a schematic structural diagram of a network device according to an embodiment of the present application;
fig. 16 is a schematic structural diagram of a chip according to an embodiment of the present application.
Detailed Description
In the embodiments of the present application, terms such as "first" and "second" are used to distinguish the same or similar items having substantially the same function and action. For example, the first device and the second device are only used for distinguishing different devices, and the sequence order thereof is not limited. Those skilled in the art will appreciate that the terms "first," "second," etc. do not denote any order or quantity, nor do the terms "first," "second," etc. denote any order or importance.
It is noted that, in the present application, words such as "exemplary" or "for example" are used to mean exemplary, illustrative, or descriptive. Any embodiment or design described herein as "exemplary" or "e.g.," is not necessarily to be construed as preferred or advantageous over other embodiments or designs. Rather, use of the word "exemplary" or "such as" is intended to present concepts related in a concrete fashion.
The network architecture and the service scenario described in the embodiment of the present application are for more clearly illustrating the technical solution of the embodiment of the present application, and do not form a limitation on the technical solution provided in the embodiment of the present application, and as a person of ordinary skill in the art knows that along with the evolution of the network architecture and the appearance of a new service scenario, the technical solution provided in the embodiment of the present application is also applicable to similar technical problems. In the embodiment of the present application, the method provided is applied to a New Radio (NR) system or a 5G network as an example.
In the present application, "at least one" means one or more, "a plurality" means two or more. "and/or" describes the association relationship of the associated objects, meaning that there may be three relationships, e.g., a and/or B, which may mean: a exists alone, A and B exist simultaneously, and B exists alone, wherein A and B can be singular or plural. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship. "at least one of the following" or similar expressions refer to any combination of these items, including any combination of the singular or plural items. For example, at least one (one) of a, b, or c, may represent: a, b, c, a-b, a-c, b-c, or a-b-c, wherein a, b, c may be single or multiple.
The network architecture and the service scenario described in the embodiment of the present application are for more clearly illustrating the technical solution of the embodiment of the present application, and do not form a limitation on the technical solution provided in the embodiment of the present application, and as a person of ordinary skill in the art knows that along with the evolution of the network architecture and the appearance of a new service scenario, the technical solution provided in the embodiment of the present application is also applicable to similar technical problems.
As shown in fig. 1, fig. 1 shows that the embodiment of the present application provides a communication system, which includes: a first device 10, and a vertical industry control center 20 in communication with the first device 10. The first device 10 may be connected to the vertical industry control center 20 in a wired manner or a wireless manner, which is not limited in the embodiment of the present application.
In one possible implementation, as shown in fig. 1, the communication system may further include: an access network management device 30 and one or more access devices 40. Wherein access network management device 30 is configured to manage one or more access devices 40. It is to be understood that the one or more access devices 40 can provide a non-public network for the industry vertical's work area in which the industry vertical control center 20 is located. In addition, in another possible implementation manner, as shown in fig. 1, the communication system may further include: one or more terminals (e.g., terminal 501, terminal 502, and terminal 503). The one or more terminals are located within the work area of the industry vertical in which the industry vertical control center 20 is located.
For example, the work area of a vertical industry may be distributed over multiple areas. Each area may correspond to a non-public network, and different areas may be covered by the same non-public network, that is, a non-public network may provide network coverage for different areas. The non-public network only serves the equipment managed or owned by a vertical industry operator, and provides network communication services such as data connection and the like for the equipment; terminals in the public network of the communication operator do not access the non-public network. A non-public network within an area may be used to provide access services to terminals within the area. For example, the work areas of the industry verticals include area 01, area 02, and area 03. Wherein the non-public network 01 in the area 01 is used for providing access service for the terminal in the area 01. The non-public network 02 in the area 02 is used to provide access services to terminals in the area 02. The non-public network 03 in the area 03 is used to provide access services to terminals in the area 03. It should be understood that the industry vertical control center 20 may be shared by multiple zones if the industry vertical work area is comprised of multiple zones. Or each of the plurality of areas corresponds to one industry vertical control center 20, which is not limited in the embodiment of the present application.
In fig. 1, a plurality of terminals include a terminal 501, a terminal 502, and a terminal 503. It is to be understood that, in an actual process, the communication system shown in fig. 1 may further include three or more terminals, which is not limited in this embodiment of the present application.
The plurality of terminals in the embodiment of the present application may include a terminal in a mobile state. Or the plurality of terminals may comprise fixedly deployed terminals. Alternatively, the plurality of terminals may include terminals in a mobile state and terminals in a fixed deployment.
Wherein the vertical industry control center 20 is configured to place a demand for deploying the non-public network on the first appliance 10. Such as the coverage area of the non-public network, network access parameters of the non-public network, the validity period of the non-public network, etc. For example, the vertical industry control Center 20 may be a control Center of a factory (Operation Technology Center), a control Center of a port, or the like. The industry vertical control center 20 can either directly provide the demand for deploying the non-public network to the first appliance 10 or indirectly forward the demand for deploying the non-public network to the first appliance 10. The industry vertical control center 20 may be a device other than a non-public network, and may be understood to be an application server of an industry vertical operator.
The non-public network in the embodiment of the present application may also be referred to as: a private network or a private network.
The first device 10 is configured to store environment information of a corresponding industry vertical, communication network deployment information of an area corresponding to the industry vertical, communication capability of a terminal, a group relationship, a deployment location of the terminal, and the like. Further, the first device 10 may determine that a non-public network needs to be opened. For example, the first device 10 may send the first configuration message to the access network management device 30 according to a requirement of deploying a non-public network set forth by the vertical industry control center 20. The first configuration message includes: network access parameters of the non-public network and a coverage area of the non-public network, so that the access network management device 30 instructs the access device 40 managed by the access network management device to provide the non-public network for one or more terminals to access the non-public network.
It should be understood that the first device 10 may be deployed in a core network. Access network management device 30 and access device 40 may be deployed in an access network. That is, after the demand for deploying the non-public network is provided by the vertical industry control center 20, the core network and the access network interactively process the demand for deploying the non-public network, so as to complete the deployment of the non-public network.
For example, the communication system shown in fig. 1 may be applied to the current 5G network architecture and other network architectures appearing in the future, and the embodiment of the present application is not particularly limited thereto.
The following will take the example of the communication system shown in fig. 1 being applied to a 5G network architecture, for example, the communication system shown in fig. 1 being applied to a 5G network architecture in a non-roaming scenario shown in fig. 2:
for example, taking an interface-based architecture of the communication system shown in fig. 1 applied to a current non-roaming 5G network architecture as an example, the first device 10 may be a network element belonging to a 5G core network (5G core network, 5GC), and the access device 40 may be a network element in a 5G access network.
Illustratively, the core Network portion of the next-generation communication Network is split into different Network Function (NF) components according to the categories of functions, such as: authentication and security functions, session management functions, mobility management functions, access control functions and the like, wherein the functions are realized by corresponding NF components, and related functional decoupling and independent components interact with other NF components through interfaces supported by the related functional decoupling and independent components to complete related network services.
As shown in fig. 2, the network element or entity corresponding to the first device 10 may be a 5G Core (5G Core, 5GC) network element. For example, the Network element or entity corresponding to the first device 10 may be a Network Vision and Awareness Function (NVAF) Network element in the non-roaming 5G Network architecture shown in fig. 2. Access device 40 may be AN Access Network (AN) device or a Radio Access Network (RAN) device. The network element or entity corresponding to the access network management apparatus 30 may be RAN OAM in the non-roaming 5G network architecture shown in fig. 2.
Furthermore, as shown in fig. 2, the 5G network architecture may include: an access and mobility Management Function (AMF) Network element, a Session Management Function (SMF) Network element, a Policy Control Function (PCF) Network element, a User Plane Function (UPF) Network element, a Data Network (DN), an authentication server Function (AUSF) Network element, a Unified Database (UDR), a Unified Data Management (UDM) Network element, or a Binding Support Function (BSF), a Network Function repository Function (NRF) Network element, a Network Slice Selection Function (Network Slice, nsf) Network element, and the like.
A vertical industry operator and a PLMN network operator have signed a service cooperation agreement, where a user subscription database UDM is managed by OT, and other network functions, such as AMF, SMF, PCF, UPF, etc., are managed by PLMN, which can be set by the PLMN network operator alone for the vertical industry operator, so that management and network services for the vertical industry terminal can be isolated from other terminals.
The terminal communicates with the AMF network element through a Next generation network (N1) interface (N1 for short). The access equipment communicates with the AMF network element through an N2 interface (abbreviated as N2). The access equipment communicates with the UPF network element through an N3 interface (abbreviated as N3). The UPF network elements communicate with the DN over an N6 interface (abbreviated N6). Any two UPF network elements communicate with each other through an N9 interface (N9 for short). The UPF network element communicates with the SMF network element over an N4 interface (abbreviated N4). The AMF network element communicates with the SMF network element via an N11 interface (abbreviated as N11). The AMF network element communicates with the UDM network element via an N8 interface (N8 for short). The SMF network element communicates with the PCF network element via an N7 interface (abbreviated N7). The SMF network element communicates with the UDM network element over an N10 interface (abbreviated N10). The AMF network element communicates with the AUSF network element through an N12 interface (abbreviated as N12). The AMF network element communicates with the NSSF network element through an N22 interface (abbreviated as N22). The AUSF network element communicates with the UDM network element via an N13 interface (abbreviated N13). The UDM network element communicates with the UDR network element. The PCF network element is communicated with the UDR network element, and the BSF network element is communicated with the PCF network element and the SMF network element. And the AMF network element communicates with the NVAF network element through a first interface. The AMF network elements communicate with each other through an N14 interface. Illustratively, the first interface may be an Nx interface.
Fig. 3 shows a service interface-based architecture in a non-roaming 5G network architecture, which differs from fig. 3 in that the control plane network element in the 5GC in fig. 3 can also interact with the service interface. For example, the AMF network element, the AUSF network element, the SMF network element, the UDM network element, the UDR network element, the NRF network element, the NEF network element, the NSSF network element, or the PCF network element use a service interface for interaction. For example, the service interface provided by the AMF network element to the outside may be Namf. The service interface externally provided by the SMF network element may be Nsmf. The external serving interface provided by the UDM network element may be Nudm. The serving interface externally provided by the UDR network element may be nurr. The service interface externally provided by the PCF network element may be Npcf. The service interface externally provided by the BSF network element may be Nbsf. The service interface provided by the NEF network element to the outside may be Nnef. The service interface provided by the NRF network element to the outside may be nrrf. The external service interface provided by the NSSF network element may be NSSF. The service interface provided by the NWDAF network element to the outside may be NWDAF. It should be understood that the related descriptions of the names of the various service interfaces in fig. 3 can refer to the 5G system architecture (5G system architecture) diagram in the 23501 standard, which is not repeated herein.
It should be noted that the interface name between the network elements in fig. 2 or fig. 3 is only an example, and the interface name may be other names in a specific implementation, which is not specifically limited in this embodiment of the present application.
It should be noted that the access device, the AF network element, the AMF network element, the SMF network element, the AUSF network element, the UDM network element, the UPF network element, the PCF network element, and the like in fig. 2 or fig. 3 are only names, and the names do not limit the device itself. In the 5G network and other future networks, the network elements corresponding to the access device, the AF network element, the AMF network element, the SMF network element, the AUSF network element, the UDM network element, the UPF network element, and the PCF network element may also be other names, which is not specifically limited in this embodiment of the present application. For example, the UDM network element may also be replaced by a user home server (HSS) or a User Subscription Database (USD) or a database entity, and the like, which are described herein in a unified manner and will not be described in detail later.
Fig. 1-3 are network architectures applied to embodiments of the present application. The functions of the various parts or network elements involved in the network architecture in a 5G network are described below as examples.
1. A terminal (terminal) is a device that provides voice and/or data connectivity to a user, such as a handheld device having wireless connection capability, a vehicle mounted device, a wearable device, a computing device or other processing device connected to a wireless modem, as well as various forms of terminals and the like. A Terminal may also be referred to as a User Equipment (UE), an Access Terminal (Access Terminal), a subscriber Unit (User Unit), a subscriber Station (User Station), a Mobile Station (Mobile Station), a Remote Station (Remote Station), a Remote Terminal (Remote Terminal), a Mobile device (Mobile Equipment), a User Terminal (User Terminal), a Wireless communication device (Wireless Terminal Equipment), a User Agent (User Agent), User Equipment (User Equipment), or a User device. The terminal may be a Station (STA) in a Wireless Local Area Network (WLAN), and may be a cellular phone, a cordless phone, a Session Initiation Protocol (SIP) phone, a Wireless Local Loop (WLL) Station, a Personal Digital Assistant (PDA) device, a handheld device with Wireless communication function, a computing device or other processing device connected to a Wireless modem, a vehicle-mounted device, a wearable device, and a terminal in a next Generation communication system (e.g., a Fifth-Generation (5G) communication Network) or a terminal in a future-evolution Public Land Mobile Network (PLMN) Network, and the like. Among them, 5G may also be referred to as New Radio (NR). For convenience of description, the above-mentioned devices are collectively referred to as a terminal in this application.
As an example, in the embodiment of the present application, the terminal may also be a wearable device. Wearable equipment can also be called wearable intelligent equipment, is the general term of applying wearable technique to carry out intelligent design, develop the equipment that can dress to daily wearing, like glasses, gloves, wrist-watch, dress and shoes etc.. A wearable device is a portable device that is worn directly on the body or integrated into the clothing or accessories of the user. The wearable device is not only a hardware device, but also realizes powerful functions through software support, data interaction and cloud interaction. The generalized wearable smart device includes full functionality, large size, and can implement full or partial functionality without relying on a smart phone, such as: smart watches or smart glasses and the like, and only focus on a certain type of application functions, and need to be used in cooperation with other devices such as smart phones, such as various smart bracelets for physical sign monitoring, smart jewelry and the like.
For example, the terminal in the embodiment of the present application may be a terminal in various vertical industry application fields, such as ports, smart factories, railway transportation, logistics, unmanned aerial vehicles, and unmanned vehicles. For example: mobile robots (Mobile Robot), Automated Guided Vehicles (AGV), unmanned vehicles, devices and sensors on trains, control devices and sensors (sensors) deployed in factories, and the like.
2. The access device is used for providing a network access function for an authorized terminal in a specific area, and can use transmission tunnels with different qualities according to the grade of the terminal, the service requirement and the like. The access device can manage wireless resources, provide access service for the terminal device, and further complete forwarding of control signals and terminal device data between the terminal device and the core network, and the access device can also be understood as a base station in a traditional network.
May be a device in a wireless network. An access device may also be referred to as a wireless access device or a network device. Such as a Radio Access Network (RAN) node that accesses the terminal to a wireless network. Currently, some examples of access devices are: next Generation Node B (gNB), Transmission Reception Point (TRP), evolved Node B (eNB), Radio Network Controller (RNC), Node B (NB), Base Station Controller (BSC), Base Transceiver Station (BTS), home base station (e.g., home evolved Node B or home Node B, HNB), Base Band Unit (BBU), or wireless fidelity (Wifi) Access Point (AP), etc. In one network configuration, a network device may include a Centralized Unit (CU) node, or a Distributed Unit (DU) node, or a RAN device including a CU node and a DU node. The access device may also be a wireless backhaul device, a vehicle mounted device, a wearable device, and a network device in a future 5G network or a network device in a future evolved PLMN network, etc.
3. The user plane network element is used for packet routing and forwarding, quality of service (QoS) processing of user plane data, and the like.
In a 5G communication system, the user plane network element may be a UPF network element, and in a future communication system, the UPF network element may also have another name, which is not limited in this application.
4. And the data network element is used for providing a network for transmitting data.
In a 5G communication system, the data network element may be a DN. In future communication systems, the data network element may still be DN, or may also have other names, which is not limited in this application.
5. An access management network element is mainly used for mobility management, access management, and the like, and may be used to implement other functions, such as functions of lawful interception, access authorization/authentication, and the like, in addition to session management in Mobility Management Entity (MME) functions.
In the 5G communication system, the access management network element may be an AMF network element. In a future communication system, the access management network element may still be an AMF network element, or may also have another name, which is not limited in this application.
6. The session management network element is mainly used for session management, allocation and management of an Internet Protocol (IP) address of a terminal, selection of a termination point of an interface capable of managing a user plane function, policy control and charging function, downlink data notification, and the like.
In the 5G communication system, the session management network element may be an SMF network element, and in a future communication system, the session management network element may also have another name, which is not limited in this application.
7. The policy control network element is a unified policy framework for guiding network behavior, and provides policy rule information for control plane function network elements (such as AMF and SMF network elements).
In a 4G communication system, the policy control network element may be replaced by a Policy and Charging Rules Function (PCRF) network element. In future communication systems, the policy control network element may still be a PCF network element, or may also have another name, which is not limited in this application.
8. Binding the functional network element: for finding the PCF with which the session is associated.
In the 5G communication system, the binding support network element may be a Binding Support Function (BSF) network element. In a future communication system, the binding support network element may still be a BSF network element, or may also have another name, which is not limited in this application.
9. And the authentication server is used for authenticating service, generating a secret key to realize bidirectional authentication on the terminal equipment and supporting a uniform authentication framework.
In a 5G communication system, the authentication server may be an authentication server function (AUSF) network element. In a future communication system, the authentication server function network element may still be an AUSF network element, or may also have another name, which is not limited in this application.
10. And the data management network element is used for processing the terminal identification, the access authentication, the registration, the mobility management and the like.
In the 5G communication system, the data management network element may be a Unified Data Management (UDM) network element. In future communication systems, the unified data management may still be a UDM network element, or may also have other names, which is not limited in this application.
11. And the application network element is used for carrying out data routing influenced by application, accessing the network open function network element, carrying out strategy control by interacting with the strategy framework and the like.
In the 5G communication system, the application network element may be an Application Function (AF) network element. In a future communication system, the application network element may still be an AF network element, or may also have another name, which is not limited in this application.
12. And the network storage network element is used for maintaining real-time information of all network function services in the network.
In the 5G communication system, the network storage network element may be a Network Registration Function (NRF) network element. In future communication systems, the network storage network element may still be an NRF network element, or may also have another name, which is not limited in this application.
It is to be understood that the above network elements or functions may be network elements in a hardware device, or may be software functions running on dedicated hardware, or virtualization functions instantiated on a platform (e.g., a cloud platform).
Further, the AF network element is abbreviated as AF, the BSF network element is abbreviated as BSF, the NRF network element is abbreviated as NRF, and the PCF network element is abbreviated as PCF. That is, AF described later in this application may be replaced with an application network element, BSF may be replaced with a binding support network element, NRF may be replaced with a network storage network element, and PCF may be replaced with a policy control network element.
The following describes a user group session management method provided in the embodiment of the present application specifically based on fig. 1 or fig. 2.
It should be noted that the embodiment of the present application is not limited to the system architectures shown in fig. 1 to fig. 3, and may also be applied to other future communication systems, such as the 6th generation (6G) system architecture. In addition, the names of the network elements used in the embodiments of the present application may remain the same in the future communication system, but the names may change.
For convenience of description, in the following embodiments of the present application, an LSMF network element, an AMF network element, an UPF network element, and an SMF network element are respectively referred to as LSMF, AMF, UPF, and SMF for short. It can be understood that the LSMF described later in this embodiment may be replaced by a user group management network element, the AMF may be replaced by a mobility management network element, the UPF may be replaced by a user plane network element, and the SMF may be replaced by a session management network element.
The NRF stores information of deployed Network Function (NF) components, such as identifiers and Network addresses of the NF components, identifiers of supported Network slices, and the like, and provides services such as registration and discovery of the NF components to other NFs.
In the access network part of next generation communication networks, in order to support flexible deployment of different service requirements and AN functions, the functions (e.g. access devices) within the access network may be decoupled into one or more Distributed Units (DUs) and one or more Central Units (CUs), as shown in fig. 4. The actual deployment mode of the CU and the DU is flexible. For example, the CU parts of a plurality of base stations are integrated together to form a larger functional network element. The access device may be implemented by one node, or may be implemented by a plurality of nodes, where the access device is configured to implement functions of Protocol layers such as Radio Resource Control (RRC), Packet Data Convergence Protocol (PDCP), Radio Link Control (RLC), and Medium Access Control (MAC). For example, the CU and the DU may be divided according to protocol layers of the wireless network, for example, functions of a packet data convergence layer protocol layer and above protocol layers are disposed in the CU, protocol layers below the PDCP, and functions including RLC and MAC layers and the like are disposed in the DU. The first interface that exists between a CU and a DU may be referred to as the F1 interface.
This kind of protocol layer division is only an example, and it is also possible to divide at other protocol layers, for example, at the RLC layer, the functions of the RLC layer and the above protocol layers are set in the CU, and the functions of the protocol layers below the RLC layer are set in the DU; alternatively, the functions are divided into some protocol layers, for example, a part of the functions of the RLC layer and the functions of the protocol layers above the RLC layer are provided in the CU, and the remaining functions of the RLC layer and the functions of the protocol layers below the RLC layer are provided in the DU. In addition, the processing time may be divided in other manners, for example, by time delay, a function that needs to satisfy the time delay requirement for processing is provided in the DU, and a function that does not need to satisfy the time delay requirement is provided in the CU.
In addition, please refer to fig. 4, the Control Plane (CP) and the user Plane (user Plane, UP) of the CU may be separated and divided into different network elements, which are respectively a Control Plane CU (CU-CP, abbreviated as CU-C) network element and a user Plane CU (CU-UP, abbreviated as CU-U) network element. With the separation of the control plane and the user plane of a CU, the interface between CU-C and DU can be called: F1-C. The interface between a CU-U and a DU may be referred to as: F1-U.
Wherein CU-C supports the functions and services of the control plane PDCP/RRC protocol control plane portion, as well as control of the DUs and CU-Us. The CU-U supports the user plane functions of a Packet Data Convergence Protocol (PDCP) Protocol and a Service Data Adaptation Protocol (SDAP) Protocol; the DUs implement the functionality of the RLC/MAC/PHY protocol.
As shown in fig. 4, the CU-U is connected to the user plane (NG-U) of the core network. The CU-C is connected with the control plane (NG-C) of the core network.
In the above network architecture, data generated by a CU may be transmitted to a terminal through a DU, or data generated by a terminal may be transmitted to a CU through a DU. The DU may not parse the data and directly encapsulate the data through a protocol layer and transmit the encapsulated data to the terminal or CU. For example, signaling of the RRC or PDCP Layer is finally processed into data of a Physical Layer (PHY) to be transmitted to the terminal, or converted from received data of the PHY Layer.
In the above embodiment, the CU serves as an access network device in the RAN, and in addition, the CU may also be divided into access network devices in the CN, which is not limited herein.
The apparatus in the following embodiments of the present application may be located in a terminal or a radio access network device according to the implemented functions. When the above structure of CU-DU is adopted, the access network device may be a CU node, or a DU node, or a RAN device including the functions of the CU node and the DU node.
In the prior art, a vertical industry operator can build a non-public network in a working area of the vertical industry, so that the self-built non-public network provides network coverage for the working area of the vertical industry. The self-built non-public network not only causes the increase of the network construction cost and the later maintenance cost. The self-established non-public network may also reduce the access efficiency of the terminal. Therefore, the embodiment of the application acquires the first request message of the vertical industry control center through the first device, and opens the non-public network for the working area of the vertical industry by the operator of the public network where the working area of the vertical industry is located based on the first request message. This avoids the cost of separately opening a non-public network for the work area of the industry vertical. In addition, by configuring network access parameters, the terminal can conveniently access the non-public network of the working area of the vertical industry in which the terminal is positioned, and the complexity of terminal access is reduced.
The steps executed by the first device in the method for configuring a radio bearer according to the present application may also be executed by a chip applied to the first device. The steps performed by the access network management device may also be performed by a chip applied to the access network management device, the steps performed by the access device in a method for configuring a radio bearer may also be performed by a chip applied to the access device, and the steps performed by the terminal in a method for configuring a radio bearer may also be performed by a chip applied to the terminal. The following embodiments exemplify a configuration method of a radio bearer performed by a first device, an access network management device, an access device, or a terminal. For the implementation method that the apparatus is a chip in the first device, a chip in the access network management device, or a chip in the access device or the terminal, reference may be made to specific descriptions of the apparatus for the first device, the access network management device, the access device, or the terminal, and a description thereof will not be repeated.
As shown in fig. 5, an embodiment of the present application provides a network access method, where the method includes:
step 101, a first device receives a first request message from a vertical industry control center. Wherein the first request message includes: requesting a coverage area of the non-public network to manage and network access parameters of the non-public network. The network access parameters of the non-public network are used for the terminal to access the non-public network.
In this embodiment, the network access parameter of the non-public network may be an identifier (non-public network identity) of the non-public network.
The coverage area of the non-public network can be a working area of a vertical industry in which a vertical industry control center is located. The coverage area of the non-public network may include a plurality of areas. It should be understood that the industry vertical control center may request that a non-public network be established for one or more areas, or update an established non-public network for one or more areas. Illustratively, the coverage area of the non-public network is an area identified using geographic coordinates.
In an optional implementation manner, before step 101, the method provided in the embodiment of the present application may further include: 100-1, a vertical industry control center determines a non-public network that manages a work area of a vertical industry. 100-2, the vertical industry control center sends a first request message to a first device. For example, a industry vertical control center determines a non-public network that manages a work area of a industry vertical based on the needs of industry vertical operators to deploy the network in the work area of the industry vertical.
The non-public network requested to be managed in the embodiment of the application can be newly established for the request. That is, if the non-public network is not established or opened in the working area of the vertical industry, the vertical industry control center may request the first device to establish the non-public network through the first request message. For example, the first request message is specifically for requesting establishment of a non-public network in a work area of a vertical industry.
The non-public network requesting management in the embodiment of the application may be a request for updating the established non-public network. That is, if the non-public network is opened in the working area of the vertical industry, and if the relevant configuration (for example, the coverage area or the effective time period) of the non-public network needs to be changed subsequently, the vertical industry control center may request the first device to update the non-public network through the first request message. For example, the range of the non-public network coverage is updated, or the effective time period of the non-public network coverage is updated. For example, the coverage area of the non-public network opened in the working area of the vertical industry is R, and if the control center of the vertical industry determines that the coverage area of the non-public network is to be expanded, the first request message may carry the updated coverage area of the non-public network.
It should be understood that the first device, the access network management device, and the access device are devices in a common network operator in which the work area of the industry vertical is located. For example, the Public network may be a Public Land Mobile Network (PLMN). The following embodiments take the public network operator as the PLMN network operator as an example.
In the embodiment of the present application, before step 100-1, a vertical industry operator of a vertical industry control center and a PLMN network operator have signed a service cooperation agreement.
Illustratively, the business cooperation agreement may include the following: non-public networks may be provided by PLMN network operators for industry vertical operators. Through the cooperation agreement, the PLMN network operator can determine the service authority of the vertical industry operator, the rules of charging, etc.
Because the user data management network element can provide the authentication of terminal access and information such as security parameters in a public network provided by a PLMN network operator or a non-public network required by a vertical industry operator. Namely, the vertical industry operator and the PLMN network operator correspond to a user data management network element respectively. And the user data management network element corresponding to the vertical industry operator is used for storing the subscription data, the authentication information and the like of the vertical industry terminal. And the user data management network element corresponding to the PLMN network operator is used for storing the subscription data, the authentication information and the like of the terminal in the PLMN network operator.
In addition, the service cooperation protocol may further include: the user data management network element of the vertical industry operator is managed by the vertical industry control center, and the user data management network element of the PLMN network operator is managed by the PLMN network operator. Other network functions such as an AMF network element, an SMF network element, a PCF network element, a UPF network element, etc. are managed by a PLMN network operator, and these network functions can be set individually by the PLMN network operator for the vertical industry operator, so that management and network services for the vertical industry terminal can be isolated from other terminals.
Step 102, the first device sends a first configuration message to the access network management device. The first configuration message includes: network access parameters of the non-public network and a coverage area of the non-public network. The access network management device is for managing access devices providing non-public networks.
It should be understood that the access device may be used to provide not only public networks, but also non-public networks.
Step 103, the access network management device receives a first configuration message from the first device.
And step 104, the access network management device sends the network access parameters of the non-public network to the access device providing the non-public network according to the coverage area of the non-public network.
It should be appreciated that the access network management device in step 104 finds the deployed access device for providing the public network in the coverage area of the non-public network and sends the network access parameters of the non-public network to the access device for providing the public network, which facilitates providing the non-public network using the access device for providing the public network.
And 105, the access device receives the network access parameter of the non-public network from the access network management device, wherein the network access parameter of the non-public network is used for the terminal to access the non-public network.
Step 106, the access device sends a broadcast message, wherein the broadcast message includes network access parameters of the non-public network.
It should be noted that if the access device determines to newly establish the non-public network, a broadcast message including network access parameters of the non-public network is sent in the coverage area of the non-public network requested by the industry vertical control center. If the access equipment determines to update the coverage area of the non-public network, the access equipment sends a broadcast message including network access parameters of the non-public network in the coverage area of the non-public network requested to be updated by the vertical industry control center. For example, if the coverage area of the non-public network established before the update is a, the access device sends a broadcast message including network access parameters of the non-public network within the coverage area a. And if the coverage area of the non-public network is B after updating, the access equipment sends a broadcast message comprising the network access parameters of the non-public network in the coverage area B.
Illustratively, through steps 101-106, the same public network operator may provide non-public networks for multiple areas. Of course, non-public networks covered by different areas may also be provided by different public network operators. For example, the non-public network of area 1 is provided by public network operator 1. The non-public network of area 2 is provided by a public network operator 2.
It should be noted that, if different areas cover different non-public networks, the network access parameters of the non-public network corresponding to each area may be different. In this way, by setting the network access parameters for different non-public networks covered by different areas respectively, independent setting and network access processing are not required according to different PLMN networks, thereby reducing the complexity of the terminal.
It should be noted that, in the embodiment of the present application, a terminal in a vertical industry may have an identifier of a user assigned to the terminal by a vertical industry operator, and a network access parameter of a non-public network. Therefore, when the access device sends the broadcast message, the terminal can access the corresponding non-public network according to the user identification distributed to the terminal by the vertical industry operator and the network access parameter of the non-public network carried in the broadcast message. Specifically, the network access parameter of the non-public network stored in the terminal is consistent with or has a mapping relationship with the network access parameter of the non-public network carried in the broadcast message, and the terminal accesses the corresponding non-public network according to the network access parameter of the non-public network carried in the broadcast message.
The embodiment of the application provides a network access method, wherein a first device receives a first request message from a vertical industry control center and responds to the first request message to send a network access parameter and a coverage area of a non-public network requested to be managed by the vertical industry control center to an access network management device through a first configuration message. In order for the access network management device to determine the access devices present within the coverage area and to send the network access parameters of the non-public network to the access devices. The access device may then broadcast the network access parameters for the non-public network. On one hand, the deployed non-public network can meet the network coverage requirement of the vertical industry. The vertical industry control center is convenient for the terminal to access the non-public network through the network access parameter by configuring the network access parameter, and does not need to perform independent setting and network access processing according to different PLMN networks, thereby reducing the complexity of the terminal. In addition, a public network operator providing a non-public network with access devices in the coverage area of the non-public network can increase the business model and revenue sources of the public network through cooperation of the industry verticals.
As shown in fig. 6, the same public network operator may provide non-public networks for multiple areas.
In a possible embodiment, with reference to fig. 6 and as shown in fig. 7, the method provided in the embodiment of the present application further includes:
step 107, the vertical industry control center sends any one or more of the following information to the first device: the system comprises a time indication of a non-public network, information of a terminal accessed to the non-public network, information of a user data management network element corresponding to the terminal and an identifier of a vertical industry control center, wherein the time indication is used for indicating an effective time period of the non-public network.
The information of the terminal accessing the non-public network is used for determining the terminal accessing the non-public network. For example, the information of the terminal accessing the non-public network may be a number segment of the vertical industry terminal user, that is, a user identifier accessing the non-public network. The user data management network element may be any one of a Unified Data Management (UDM) network element, a User Data Repository (UDR) network element, and a user home server (HSS) network element.
It should be understood that the information sent by the vertical business control center to the first device in step 107 may be sent to the first device alone, or may be sent to the first device by being carried in the above-mentioned first request message, which is not limited in this embodiment of the application. The vertical industry control center provides the time indication so that the core network and the access network can determine the time period for providing the non-public network conveniently, namely the access network can determine the network access parameters broadcast in the effective time period of the time indication so that the terminal can access the non-public network conveniently.
Illustratively, the time indication may be a start time and a duration period. For example, if the starting time is a and the duration period is L, the valid period is a + L. Or as yet another example, the time indication may be a start time and an end time. The validity period is the period between the start time and the end time.
The valid time period indicated by the time indication may be a continuous time period or a discontinuous time period. For example, the time indication indicates a valid time period of 08.00-10.00. For example, the time indication may indicate a valid time period of 08.00-10.00, 11.00-12.00, etc.
Step 108, the first device receives any one or more of the following information from the industry vertical control center: the system comprises a time indication of a non-public network, information of a terminal accessed to the non-public network, information of a user data management network element corresponding to the terminal and an identifier of a vertical industry control center, wherein the time indication is used for indicating an effective time period of the non-public network.
Illustratively, the information of the terminal accessing the non-public network is used to determine the terminal accessing the non-public network. That is, the information of the terminal accessing the non-public network may be the identifier of the user allocated to the terminal by the vertical industry operator. It can also be understood that: identification of the terminal used in the industry vertical. For example, the user's identity may be a user Permanent Identifier (SUPI), or a user hidden Identifier (SUCI) or a telephone number.
For example, the information of the terminal accessing the non-public network may be: A00100001-A00109999, and the network access parameter is A001.
For example, the information of the user data management network element may be an identification and an address of the user data management network element.
Step 109, the first device sends a time indication to the access network management device.
It should be understood that, in step 109, the first device may send the time indication to the access network management device separately, or the time indication may be sent to the access network management device by the first device in a first configuration message, so that the access network management device obtains the time indication from the first configuration message.
Step 110, the access network management device receives an indication of time from the non-public network of the first device.
And step 111, the access network management device sends the time indication to the access device.
Accordingly, step 106 may be specifically implemented by: and the access equipment transmits the broadcast message in the valid time period. It should be understood that, if the access device sends the broadcast message in the valid time period, the terminal may access the non-public network according to the network access parameters carried in the broadcast message in the valid time period. By providing the time indication, the access device can provide a non-public network for the working area of the industry vertical in the effective time period so as to save network resources.
It should be noted that, for the newly established non-public network, the access device transmits a broadcast message including the network access parameters of the non-public network within the valid time period C determined by the time indication. For the updated non-public network, if the valid time period of the opened non-public network is a, if the vertical industry control center determines that the valid time period of the opened non-public network needs to be updated, the vertical industry control center may further send an updated time indication of the non-public network to the first device. This facilitates the first device informing the access device via the access network management device to adjust the updated time indication for the non-public network. For example, the access device adjusts the validity period of the non-public network from validity period C to validity period B.
In a possible embodiment, with reference to fig. 7, as shown in fig. 8, the method provided in the embodiment of the present application further includes:
step 112, the first device sends a registration request to the network storage function, so that the network storage function receives the registration request. Wherein the registration request includes: the user data manages information of network elements and information of terminals accessing the non-public network.
It should be appreciated that by executing step 112, the network element (AUSF) performing terminal authentication can subsequently request the UDM corresponding to the terminal of the industry vertical from the network storage function when the terminal of the industry vertical accesses the non-public network.
Step 113, the first device receives a registration completion message from the network storage function. The registration completion message is used to indicate that authentication of the user data management network element and the terminal accessing the non-public network has been completed.
Specifically, the network storage function may store, in the network storage function, a mapping relationship between information of the user data management network element and information of the terminal accessing the non-public network, when receiving the registration request. Therefore, in the process that the terminal is accessed into the non-public network, the network storage function can send the information of the user data management network element corresponding to the information of the terminal accessed into the non-public network to the authentication server function network element according to the information of the terminal accessed into the non-public network from the authentication server function network element and the identification of the type of the user data management network element.
In one possible implementation manner, step 102 in the embodiment of the present application may be implemented by: and the first equipment determines that the vertical industry control center has the authority of managing the non-public network according to the first request message, and the first equipment sends a first configuration message to access network management equipment.
Specifically, the first device performs an authorization check on the first request message, and determines whether to permit the first request message. For example, the first device determines whether the vertical industry operator has a right to open a non-public network, and sends the first configuration message if the vertical industry operator has the right to open the non-public network. And if the vertical industry operator does not have the authority of opening the non-public network, sending a request for refusing the vertical industry control center to manage the non-public network.
The first device determining that the vertical industry control center has authority to manage the non-public network may be implemented by: on one hand, a vertical industry operator configured with a vertical industry control center in the first device and a PLMN network operator have signed a service cooperation agreement, so that the first device can determine whether the vertical industry operator has the authority of opening a non-public network according to the service cooperation agreement. On the other hand, the first device may query from the PLMN network operator or the industry vertical control center whether the industry vertical operator has the right to open the non-public network. On the other hand, the vertical industry control center can also send information that the vertical industry operator and the PLMN network operator have signed a service cooperation agreement to the first device in the process of sending the first request message, so that the first device can conveniently determine that the vertical industry control center has the authority of opening the non-public network.
In an alternative embodiment, as shown in fig. 9, before step 104, the method provided in this embodiment further includes:
step 114, the access network management device determines the network area of the non-public network according to the coverage area of the non-public network.
Step 115, the access network management device determines the access device according to the network area of the non-public network.
In particular, since the access network management device may manage one or more access devices, the network area covered by each access device is different. Therefore, if the network area of the non-public network coincides with the area covered by a certain access device a or is located within the coverage area of the access device a, the access network management device may determine that the non-public network is provided by the access device a.
In an alternative embodiment, as shown in fig. 9, before step 102, the method provided in this embodiment further includes:
step 116, the first device determines the access network management device according to the coverage area of the non-public network and the configuration information of the management area of the one or more access network management devices.
Specifically, the first device determines, as the access network management device, a device that manages the non-public network in the one or more access network management devices according to the coverage area of the non-public network and the configuration information of the management area of the one or more access network management devices.
As shown in fig. 10, taking the first device as NVAF, the access network management device as RAN OAM, the access device as RAN, and the vertical industry control center as OT center as an example, a process that OT center requests a public network operator (taking PLMN network operator as an example) to establish a non-public network is described in detail, as shown in fig. 10, the method includes:
step 201, the OT center sends a non-public network service request (service request) to the NVAF. Wherein the non-public network service request comprises: the coverage area of the non-public network, the network access parameter of the non-public network, the time indication of the non-public network, the number segment of the vertical industry terminal user, the identification and/or address of the corresponding UDM network element, and the identification of the OTcenter. Since a public network operator may provide services for a plurality of different vertical industry operators, sending the identity of the OT center facilitates the NVAF to determine that the OTcenter indicated by the identity of the OT center opens or manages a non-public network.
It should be noted that, before performing step 201, the method provided in the embodiment of the present application further includes: the vertical industry operators and PLMN network operators have signed service cooperation agreements.
It should be understood that the non-public network service request is the first request message in the above embodiments.
Step 202, the NVAF performs authorization check on the non-public network service request, and determines whether to permit the non-public network service request.
Specifically, after receiving the non-public network service request, the NVAF determines whether the vertical industry operator has the right to open the non-public network. For example, if the NVAF determines that the vertical industry operator has entered into a business cooperation agreement with a PLMN network operator, the NVAF determines that the vertical industry operator has the right to open a non-public network. Otherwise, the NVAF determines that the vertical industry operator does not have the authority of opening the non-public network.
Step 203, the NVAF sends NF Registration request to the NRF, so that the NRF receives the NF Registration request from the NVAF. And the NF registration operation carries the identifier and/or address of the UDM network element and the number field of the vertical industry terminal user.
In the embodiment of the present application, step 203 is executed to enable the AMF network element managed by the PLMN network operator to find the UDM network element corresponding to the vertical industry operator through the NRF when the vertical industry terminal executes the network attach. And the AMF network element can further acquire authentication information and subscription data of the vertical industry terminal from the UDM network element corresponding to the vertical industry operator.
Step 204, the NRF sends a NF Registration response message (Registration response) to the NVAF, so that the NVAF receives the NF Registration response message from the NRF. The NF registration complete message is used to indicate that the NRF has completed the registration of the UDM network element corresponding to the vertical industry operator.
Step 205, the NVAF determines RAN OAM for managing the non-public network according to the coverage area of the non-public network and configuration information of one or more areas managed by the RAN OAM.
In step 206, the NVAF sends a Non-public network setup request (Non-public network setup request) to the RAN OAM, so that the RAN OAM receives the Non-public network setup request from the NVAF. Wherein, the non-public network setting request comprises: a coverage area of the non-public network, a network access parameter of the non-public network, a time indication of the non-public network.
Step 207, the RAN OAM sends a second configuration message to the RAN equipment, so that the RAN equipment receives the second configuration message. Wherein the second configuration message includes: a network access parameter of the non-public network, a time indication of the non-public network.
Step 208, the RAN device sends the broadcast message according to the second configuration message within the valid time period indicated by the time indication. Wherein, the broadcast message at least comprises: network access parameters of the non-public network.
In the embodiment of the present application, by performing step 208, the industry vertical terminal may select an access network to be accessed according to the network access parameter including the non-public network in the broadcast message by searching and parsing the broadcast message of the RAN device.
In step 209, the RAN OAM sends a Non-public network setup response (Non-public network setup response) to the NVAF, so that the NVAF receives the Non-public network setup response. The non-public network setup response is used to indicate that the non-public network setup is complete.
Step 210, the NVAF feeds back to the OT center that the non-public network service request has been successfully processed.
The method of the embodiment of the application can enable the vertical industry operator to open the non-public network to the PLMN network operator according to the requirement, so as to meet the network coverage requirement of the vertical industry operator, and meanwhile, the public network operator can increase the service mode and income source of the public network through cooperation of the vertical industry.
It should be understood that steps 201-210 take the example where the OT center requests the PLMN network operator to establish (may also be referred to as provisioning) a non-public network within the coverage of the non-public network specified by the OT center. If the OT center has requested the PLMN network operator to open the non-public network within the coverage of the non-public network specified by the OT center, the OT center may request the NVAF to update the non-public network service if the coverage and the validity period of the non-public network need to be changed subsequently. The specific process that the OT center can request the NVAF to update the non-public network service may refer to steps 201-210, which are not described herein. In a specific process that the OT center requests to update the non-public network service, the OT center sends information corresponding to the changed non-public network to the NVAF. For example, the changed coverage area and time indication corresponding to the non-public network and the network access parameter of the non-public network. Of course, the changed information corresponding to the non-public network may also be: and the information of the vertical industry terminal accessed to the non-public network, the information of the UDM network element and the like.
As shown in fig. 11, fig. 11 illustrates a specific process of accessing a non-public network by a terminal after a RAN device establishes or updates the non-public network for a vertical industry control center.
Step 301, the terminal selects the accessed non-public network according to the identifier supporting the non-public network contained in the broadcast message by searching and analyzing the broadcast message of the RAN device.
It should be understood that the terminal is configured with a user identifier (Type a user ID) used by the terminal to access the non-public network, an identifier of the non-public network. The specific identification format of the user is as follows: a00101234, network identification A001.
Step 302, RRC connection is established between the terminal and the RAN device.
The specific implementation of step 302 may refer to descriptions in the prior art, and is not described herein again.
Step 303, the terminal sends a Registration Request message (Registration Request) to the AMF network element. Wherein, the registration request message includes the user's identification.
And step 304, the AMF network element sends an authentication request message to the AUSF network element. The authentication request message is used to authenticate the terminal. For example, the authentication request message includes an identification of the user of the terminal.
Step 305, the AUSF network element sends a discovery request to the NRF. The discovery request is used for determining information of a UDM corresponding to the terminal. The discovery request includes a UDM type (type), and an identifier of the user. Wherein the UDM type is to inform the NRF that the network element it requests to discover is a UDM network element. It should be appreciated that the execution of the discovery request in step 305 facilitates the AUSF network element to determine the UDM network element corresponding to the terminal of the industry vertical.
Step 306, the NRF determines the UDM network element serving the terminal according to the identity of the user in step 305.
It should be understood that the NRF holds information (identification and network address, etc.) of the UDM for a vertical and number segment information (e.g., a 00100001-a 00109999) of the vertical user identification for the UDM service.
Step 307, the NRF provides the identifier and the network address information of the UDM network element serving the terminal to the AUSF network element. It should be understood that, through step 307, the AUSF network element may determine the UDM network element corresponding to the terminal in the industry vertical.
And 308, sending a request message to the UDM network element corresponding to the terminal of the vertical industry by the AUSF network element. The request message is used for authenticating data such as an authentication vector used by the terminal, and the request message includes an identifier of a user of the terminal.
Step 309, the UDM network element sends the authentication vector data corresponding to the terminal user to the AUSF network element.
And step 310, the AUSF network element uses the authentication vector data of the terminal obtained from the UDM network element and the terminal to perform authentication operation.
For a specific authentication process, reference may be made to descriptions in the prior art, which are not described herein again.
Step 311, the AUSF network element provides the authentication result and the key information of the control plane connection to the AMF network element.
The above-mentioned scheme of the embodiment of the present application is introduced mainly from the perspective of interaction between network elements. It is to be understood that each network element, for example, the first device, the access network management device, the access device, and the like, includes a corresponding hardware structure and/or software module for performing each function in order to implement the above functions. Those of skill in the art would readily appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as hardware or combinations of hardware and computer software. Whether a function is performed as hardware or computer software drives hardware depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the embodiment of the present application, the first device, the access network management device, and the access device may perform the division of the functional units according to the method, for example, each functional unit may be divided corresponding to each function, or two or more functions may be integrated into one processing unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit. It should be noted that the division of the unit in the embodiment of the present application is schematic, and is only a logic function division, and there may be another division manner in actual implementation.
The following description will be given by taking the division of each function module corresponding to each function as an example:
as shown in fig. 12, fig. 12 is a schematic diagram of a hardware structure of a communication device according to an embodiment of the present application. In the embodiment of the present application, the hardware structures of the first device and the access network management device may refer to a hardware structure diagram of the communication device shown in fig. 12. The communication device comprises a processor 41, a communication line 44 and at least one communication interface (illustrated exemplarily by the communication interface 43 in fig. 12).
Processor 41 may be a general-purpose Central Processing Unit (CPU), a microprocessor, an application-specific integrated circuit (ASIC), or one or more ics for controlling the execution of programs in accordance with the teachings of the present disclosure.
The communication link 44 may include a path for transmitting information between the aforementioned components.
The communication interface 43 may be any communication interface or other communication network, such as ethernet, Radio Access Network (RAN), Wireless Local Area Network (WLAN), etc.
Optionally, the communication device may also include a memory 42.
The memory 42 may be, but is not limited to, a read-only memory (ROM) or other type of static storage device that can store static information and instructions, a Random Access Memory (RAM) or other type of dynamic storage device that can store information and instructions, an electrically erasable programmable read-only memory (EEPROM), a compact disc read-only memory (CD-ROM) or other optical disk storage, optical disk storage (including compact disc, laser disc, optical disc, digital versatile disc, blu-ray disc, etc.), magnetic disk storage media or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer. The memory may be separate and coupled to the processor via a communication line 44. The memory may also be integral to the processor.
The memory 42 is used for storing computer-executable instructions for executing the present application, and is controlled by the processor 41 to execute. The processor 41 is configured to execute computer-executable instructions stored in the memory 42, so as to implement the policy control method provided by the following embodiments of the present application.
Optionally, the computer-executable instructions in the embodiments of the present application may also be referred to as application program codes, which are not specifically limited in the embodiments of the present application.
In particular implementations, processor 41 may include one or more CPUs such as CPU0 and CPU1 in fig. 12, for example, as one embodiment.
In particular implementations, the communication device may include multiple processors, such as processor 41 and processor 45 in fig. 12, for example, as an embodiment. Each of these processors may be a single-core (single-CPU) processor or a multi-core (multi-CPU) processor. A processor herein may refer to one or more devices, circuits, and/or processing cores for processing data (e.g., computer program instructions).
Illustratively, the communication device shown in fig. 12 is a first device, and the communication interface 43 is used to support the communication device shown in fig. 12 to perform the operation of transmitting and receiving messages/data at the first device in the above embodiment. For example, the communication interface 43 is used to support the communication device shown in fig. 12 to execute step 101 and step 102 in the above embodiment.
In an alternative implementation, the communication interface 43 is used to support the communication device shown in fig. 12 to perform steps 108, 109, 112, and 113 in the above embodiment.
In an alternative implementation, processor 41 and processor 45 are included in the communication device. Wherein the processor 41 and the processor 45 are used to support the communication device shown in fig. 12 to perform the steps of message/data processing at the first device in the above embodiment. For example, processor 41 and processor 45 are configured to enable a communication device as shown in fig. 12 to perform step 116 in the above-described embodiment.
It should be understood that if the communication device shown in fig. 12 is the first device, the communication device may not include the processor 41 and the processor 45. That is, when the communication device shown in fig. 12 is the first device, the processor 41 and the processor 45 in the communication device shown in fig. 12 may be omitted.
In another example, the communication device shown in fig. 12 is an access network management device, and the communication interface 43 is used to support the communication device shown in fig. 12 to perform the operation of transmitting and receiving messages/data at the access network management device in the above embodiment. For example, the communication interface 43 is used to support the access network management device to execute step 103 and step 104 in the above embodiments.
In an alternative implementation, the communication interface 43 is used to support the communication device shown in fig. 12 to perform steps 110 and 111 in the above embodiment.
Wherein, the processor 41 and the processor 45 are used for supporting the communication device shown in fig. 12 to execute the steps of message/data processing at the access network management device in the above embodiment. For example, processor 41 and processor 45 are configured to support a communication device as shown in fig. 12 to perform steps 114 and 115 in the above-described embodiment.
In yet another example, the communication device shown in fig. 12 is a vertical industry control center or a chip applied in the vertical industry control center, and the communication interface 43 is used to support the communication device shown in fig. 12 to perform the operation of transmitting and receiving messages/data at the vertical industry control center in the above embodiment. For example, the communication interface 43 is used to support the vertical industry control center to perform steps 100-2 and in the above embodiments. Wherein, the processor 41 and the processor 45 are used for supporting the communication device shown in fig. 12 to execute the steps of message/data processing at the vertical industry control center in the above embodiment. For example, processor 41 and processor 45 are configured to enable a communication device, such as that shown in FIG. 12, to perform step 100-1 in the above-described embodiment.
The following description will be given by taking the division of each function module corresponding to each function as an example:
as shown in fig. 13, fig. 13 is a schematic structural diagram of a communication apparatus provided in this embodiment of the present application, where the communication apparatus may be any one of a first device, a vertical industry control center, and an access network management device in this embodiment of the present application, and may also be a chip applied to any one of the first device, the vertical industry control center, and the access network management device. The communication device includes: receiving section 101, transmitting section 102, and processing section 103. Wherein the receiving unit 101 is configured to support the communication device to perform the step of information/data reception. The transmitting unit 102 is used to support the communication device to perform the steps of information/data transmission. The processing unit 103 is used to support the steps of the communication device performing information/data processing.
Optionally, the communication device may further include: a memory unit 104. The processing unit 103, the receiving unit 101, the transmitting unit 102, and the storage unit 104 are connected via a communication bus.
The storage unit 104 may include one or more memories, which may be devices in one or more devices or circuits for storing programs or data.
The storage unit 104 may be independent and connected to the processing unit 103 provided in the communication device via a communication bus. The memory unit 104 may also be integrated with the processing unit.
The communication means may be used in a communication device, circuit, hardware component or chip.
Taking the communication apparatus as a first device or a chip applied in the first device as an example, the receiving unit 101 is configured to support the communication apparatus to perform step 101 in the foregoing embodiments. The sending unit 102 is configured to support the communication apparatus to execute step 102 in the foregoing embodiments.
In an alternative implementation manner, the receiving unit 101 is further configured to support the communication device to perform steps 108 and 113 in the foregoing embodiment. The sending unit 102 is configured to support the communication apparatus to perform step 109 and step 112 in the above embodiments.
In an alternative implementation, the processing unit 103 is further configured to support the communication device to perform step 116 in the foregoing embodiment. It is to be understood that if the communication apparatus shown in fig. 13 is the first device or a chip applied in the first device, the communication apparatus may not include the processing unit 103.
For another example, taking the communication device as an access network management device or a chip applied in the access network management device as an example, the receiving unit 101 is configured to support the communication device to perform step 103 performed by the access network management device in the foregoing embodiment. The sending unit 102 is configured to support the communication device to perform step 104 performed by the access network management apparatus in the foregoing embodiment.
In an alternative implementation manner, the receiving unit 101 is further configured to support the communication device to perform step 110 performed by the access network management apparatus in the foregoing embodiment. The sending unit 102 is further configured to support the communication device to perform step 111 performed by the access network management apparatus in the foregoing embodiment.
In an alternative implementation manner, the processing unit 103 is further configured to support the communication device to perform step 114 and step 115, which are performed by the access network management apparatus in the foregoing embodiment. It should be understood that if the communication apparatus shown in fig. 13 is an access network management device or a chip applied in an access network management device, the communication apparatus may not include the processing unit 103.
For another example, taking the communication device as a vertical industry control center or a chip applied in the vertical industry control center as an example, the processing unit 103 is configured to support the communication device to perform the step 101-1 performed by the vertical industry control center in the foregoing embodiment. The sending unit 102 is configured to support the communication device to perform step 101-2 performed by the vertical industry control center in the above embodiment.
In an alternative implementation manner, the sending unit 102 is further configured to support the communication device to perform step 106 in the foregoing embodiment.
It should be understood that if the communication apparatus shown in fig. 13 is a vertical industry control center or a chip applied in a vertical industry control center, the communication apparatus may not include the receiving unit 101.
As another example, taking the communication apparatus as an access device or a chip applied in the access device as an example, the receiving unit 101 is configured to support the communication apparatus to perform step 105 performed by the access device in the foregoing embodiment. The sending unit 102 is configured to support the communication apparatus to perform step 106 performed by the access device in the foregoing embodiment.
It should be understood that if the communication apparatus shown in fig. 13 is an access device or a chip applied in an access device, the communication apparatus may not include the processing unit 103.
It is to be understood that the receiving unit 101 and the transmitting unit 102 as in fig. 13 may be integrated together as a communication unit.
Taking the communication device may be a chip in the first device, the vertical industry control center, or the access network management device in the embodiment of the present application as an example, the receiving unit 101 and the sending unit 102 may be input or output interfaces, pins, or circuits. Optionally, the storage unit 104 may store computer-executable instructions of the methods of the first device, the vertical industry control center, and the access network management device side, so that the processing unit 103 executes the methods of the first device, the vertical industry control center, and the access network management device side in the foregoing embodiments. The storage unit 104 may be a register, a cache, a RAM, or the like, and the storage unit 104 may be integrated with the processing unit 103; the memory unit 104 may be a ROM or other type of static storage device that may store static information and instructions, and the memory unit 104 may be separate from the processing unit 103. Taking the communication apparatus may be an access device in the embodiment of the present application as an example, the receiving unit 101 and the transmitting unit 102 may be transceivers. Optionally, the storage unit 104 may store a computer-executable instruction of the method on the access device side, so that the processing unit 103 executes the method on the access device side in the foregoing embodiment. The storage unit 104 may be a register, a cache, a RAM, or the like, and the storage unit 104 may be integrated with the processing unit 103; the memory unit 104 may be a ROM or other type of static storage device that may store static information and instructions, and the memory unit 104 may be separate from the processing unit 103.
The embodiment of the present application provides a communication apparatus, which includes one or more modules for implementing the method in the above steps 101 to 116, where the one or more modules may correspond to the steps of the method in the above steps 101 to 116. Specifically, in the embodiment of the present application, each step in the method is executed by the first device, and a unit or a module for executing each step in the method exists in the first device. Each step of the method is performed by an access network management device, where there are elements or modules performing each step of the method. Each step of the method is performed by an access device, and there are units or modules in the access device that perform each step of the method. Each step in the method is performed by a vertical industry control center in which there are units or modules that perform each step in the method.
For example, in the case of using an integrated unit, fig. 14 shows a schematic diagram of a possible logical structure of the communication apparatus involved in the foregoing embodiment, where the communication apparatus may be any one of the first device, or the vertical industry control center, or the access network management device, and the access device in the foregoing embodiment, or a chip applied to any one of the first device, or the vertical industry control center, or the access network management device, and the access device. The communication device includes: a processing module 112 and a communication module 113. The processing module 112 is used for controlling and managing the operation of the communication device, and the communication module 113 is used for executing a procedure of processing a message or data on the communication device side.
Optionally, the communication device may further comprise a storage module 111 for storing program codes and data of the communication device.
For example, taking the communication apparatus as a first device or a chip applied in the first device as an example, the communication module 113 is used to support the communication apparatus to perform steps 101 and 102 in the above embodiments.
In an alternative implementation manner, the communication module 113 is further configured to support the communication device to perform steps 108, 109, 112, and 113 in the foregoing embodiment. In an alternative implementation, the processing module 112 is configured to support the communication apparatus shown in fig. 14 to perform step 116 in the foregoing embodiment.
In another example, taking the communication device may be an access network management device or a chip applied in the access network management device as an example, the communication module 113 is configured to support the communication device to perform steps 103 and 104 performed by the access network management device in the foregoing embodiments.
In an alternative implementation manner, the communication module 113 is configured to support the communication device to perform the steps 110 and 111 performed by the access network management apparatus in the foregoing embodiment.
In an alternative implementation, the processing module 112 is configured to support the communication device to perform the steps 114 and 115 performed by the access network management apparatus in the foregoing embodiment.
As another example, taking the communication device as a vertical industry control center or a chip applied in the vertical industry control center as an example, the communication module 113 is configured to support the communication device to perform the step 100-2 performed by the vertical industry control center in the foregoing embodiment. The processing module 112 is used to support the communication device to perform the step 100-1 performed by the industry vertical control center in the above embodiments.
In another example, taking the communication apparatus as an access device or a chip applied in the access device as an example, the communication module 113 is configured to support the communication apparatus to perform the steps 105 and 106 performed by the access device in the foregoing embodiments.
The processing module 112 may be a processor or controller, such as a central processing unit, a general purpose processor, a digital signal processor, an application specific integrated circuit, a field programmable gate array or other programmable logic device, a transistor logic device, a hardware component, or any combination thereof. Which may implement or perform the various illustrative logical blocks, modules, and circuits described in connection with the disclosure. A processor may also be a combination of computing functions, e.g., comprising one or more microprocessors, a digital signal processor, a combination of microprocessors, and the like. The communication module 113 may be a communication interface, a transceiver, a transceiving circuit or an interface circuit, etc. The storage module 111 may be a memory.
When the processing module 112 is the processor 41 or 45, the communication module 113 is the transceiver 43, and the storage module 111 is the memory 42, the communication device according to the present application may be the communication device shown in fig. 12.
Please refer to fig. 15, which is a schematic structural diagram of a network device according to an embodiment of the present application. It may be the access device in the above embodiments, for implementing the operation of the access device in the above embodiments. As shown in fig. 15, the network device includes: antenna 110, rf device 120, and baseband device 130. The antenna 110 is connected to the rf device 120. In the uplink direction, the rf device 120 receives information transmitted by the terminal through the antenna 110, and transmits the information transmitted by the terminal to the baseband device 130 for processing. In the downlink direction, the baseband device 130 processes the information of the terminal and sends the information to the rf device 120, and the rf device 120 processes the information of the terminal and sends the processed information to the terminal through the antenna 110.
The baseband device 130 may be one device physically or may include at least two devices physically separated. The baseband device 130 may be integrated with the rf device 120 or may be physically separated. The baseband apparatus 130 may include at least one baseband board on which a plurality of processing elements may be integrated to implement baseband processing functions. The network device is a RAN device, for example, an eNB in an LTE system, and at this time, the baseband apparatus 130 may be a baseband apparatus in an access device; as another example, the network device may be a RAN device, and the baseband device may be a DU node.
The above communication means for performing the operation of the access device may be located in the baseband apparatus 130, and in one implementation, each unit shown in fig. 15 is implemented in the form of a processing element scheduler, for example, the baseband apparatus 130 includes a processing element 131 and a storage element 132, and the processing element 131 calls a program stored in the storage element 132 to perform the method performed by the network device in the above method embodiment. The baseband device 130 may further include an interface 133 for exchanging information with the rf device 120, such as a Common Public Radio Interface (CPRI), which may be an on-board interface or an inter-board interface when the baseband device 130 and the rf device 120 are physically disposed together, where the board refers to a circuit board.
In another implementation, each unit shown in fig. 15 may be one or more processing elements configured to implement the method performed by the above access device, and the processing elements are disposed on the baseband apparatus 130, where the processing elements may be integrated circuits, for example: one or more ASICs, or one or more DSPs, or one or more FPGAs, etc. These integrated circuits may be integrated together to form a chip.
For example, the units shown in fig. 15 may be integrated together and implemented in the form of a system-on-a-chip (SOC), for example, the baseband device 130 includes an SOC chip for implementing the above method. The processing element 131 and the storage element 132 may be integrated in the chip, and the method executed by the above access device or the functions of the units shown in fig. 15 may be implemented in the form of the processing element 131 calling the stored program of the storage element 132. Alternatively, at least one integrated circuit may be integrated into the chip, so as to implement the method performed by the above network device or the functions of the units shown in fig. 15. Alternatively, the above implementation modes may be combined, the functions of the partial units are implemented in the form of a processing element calling program, and the functions of the partial units are implemented in the form of an integrated circuit.
In summary, the above communication apparatus for an access device includes at least one processing element and a storage element, where the at least one processing element is configured to execute the method executed by the network device provided in the above embodiments. The processing element may: that is, the manner of executing the program stored in the storage element performs some or all of the steps performed by the network device in the above embodiments; it is also possible to: that is, some or all of the steps performed by the network device in the above embodiments are performed by integrated logic circuits of hardware in the processor element in combination with instructions; of course, some or all of the steps performed by the network device in the above embodiments may also be performed in combination with the first manner and the second manner.
The processing element may be a general-purpose processor, such as a Central Processing Unit (CPU), or one or more integrated circuits configured to implement the above methods, as described above, for example: one or more Application Specific Integrated Circuits (ASICs), or one or more microprocessors (DSPs), or one or more Field Programmable Gate Arrays (FPGAs), among others.
The storage element may be a memory or a combination of a plurality of storage elements.
Fig. 16 is a schematic structural diagram of a chip 150 according to an embodiment of the present invention. Chip 150 includes one or more (including two) processors 1510 and a communication interface 1530.
Optionally, the chip 150 further includes a memory 1540, which may include both read-only memory and random access memory, and provides operating instructions and data to the processor 1510. A portion of memory 1540 may also include non-volatile random access memory (NVRAM).
In some embodiments, memory 1540 stores the following elements, executable modules or data structures, or a subset thereof, or an expanded set thereof:
in the embodiment of the present invention, by calling an operation instruction stored in the memory 1540 (the operation instruction may be stored in an operating system), a corresponding operation is performed.
One possible implementation is: the first device, the access network management device, the access device and the chip used by the vertical industry control center have similar structures, and different devices can use different chips to realize respective functions.
The processor 1510 controls operations of the first device, the access network management device, the access device, and the vertical industry control center, and the processor 1510 may also be referred to as a Central Processing Unit (CPU). Memory 1540 can include both read-only memory and random-access memory, and provides instructions and data to processor 1510. A portion of memory 1540 may also include non-volatile random access memory (NVRAM). For example, in an application where memory 1540, communications interface 1530 and memory 1540 are coupled together by bus system 1520, where bus system 1520 may include a power bus, control bus, status signal bus, etc. in addition to a data bus. For clarity of illustration, however, the various buses are labeled in fig. 16 as bus system 1520.
The above transmitting unit and receiving unit may be an interface circuit or a communication interface of the apparatus for receiving signals from other apparatuses. For example, when the device is implemented in the form of a chip, the transmitting unit and the receiving unit are interface circuits or communication interfaces for the chip to receive signals from other chips or devices or to transmit signals.
The method disclosed in the above embodiments of the present invention may be applied to the processor 1510 or implemented by the processor 1510. The processor 1510 may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method may be performed by instructions in the form of hardware, integrated logic circuits, or software in the processor 1510. The processor 1510 may be a general purpose processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic device, or discrete hardware components. The various methods, steps and logic blocks disclosed in the embodiments of the present invention may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in connection with the embodiments of the present invention may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor. The software module may be located in ram, flash memory, rom, prom, or eprom, registers, etc. storage media as is well known in the art. The storage medium is located in the memory 1540, and the processor 1510 reads the information in the memory 1540, and performs the steps of the above method in combination with the hardware thereof.
In one possible implementation, communication interface 1530 is configured to perform the steps of receiving and sending by the first device, the access network management device, the access device, and the industry vertical control center in the embodiments illustrated in fig. 5-11. The processor 1510 is configured to perform the steps of the processing of the first device, the access network management device, the access device, and the vertical industry control center in the embodiments shown in fig. 5-11.
In the above embodiments, the instructions stored by the memory for execution by the processor may be implemented in the form of a computer program product. The computer program product may be written in the memory in advance or may be downloaded in the form of software and installed in the memory.
The computer program product includes one or more computer instructions. The procedures or functions according to the embodiments of the present application are all or partially generated when the computer program instructions are loaded and executed on a computer. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored in a computer readable storage medium or transmitted from one computer readable storage medium to another, e.g., the computer instructions may be transmitted from one website, computer, server, or data center to another website, computer, server, or data center via wired (e.g., coaxial cable, fiber optic, Digital Subscriber Line (DSL)) or wireless (e.g., infrared, wireless, microwave, etc.) means. A computer-readable storage medium may be any available medium that a computer can store or a data storage device including one or more available media integrated servers, data centers, and the like. The usable medium may be a magnetic medium (e.g., floppy disk, hard disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., Solid State Disk (SSD)), among others.
The embodiment of the application also provides a computer readable storage medium. The methods described in the above embodiments may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. If implemented in software, the functions may be stored on or transmitted over as one or more instructions or code on a computer-readable medium. Computer-readable media may include computer storage media and communication media, and may include any medium that can communicate a computer program from one place to another. A storage medium may be any target medium that can be accessed by a computer.
As an alternative design, a computer-readable medium may include RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium that is targeted for carriage or stores desired program code in the form of instructions or data structures and that is accessible by a computer. Also, any connection is properly termed a computer-readable medium. For example, if the software is transmitted from a website, server, or other remote source using a coaxial cable, fiber optic cable, twisted pair, Digital Subscriber Line (DSL), or wireless technologies such as infrared, radio, and microwave, then the coaxial cable, fiber optic cable, twisted pair, DSL, or wireless technologies such as infrared, radio, and microwave are included in the definition of medium. Disk and disc, as used herein, includes Compact Disc (CD), laser disc, optical disc, Digital Versatile Disc (DVD), floppy disk and blu-ray disc where disks usually reproduce data magnetically, while discs reproduce data optically with lasers. Combinations of the above should also be included within the scope of computer-readable media.
The embodiment of the application also provides a computer program product. The methods described in the above embodiments may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. If implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. The procedures or functions described in the above method embodiments are generated in whole or in part when the above computer program instructions are loaded and executed on a computer. The computer may be a general purpose computer, a special purpose computer, a computer network, a base station, a terminal, or other programmable device.
The above-mentioned embodiments, objects, technical solutions and advantages of the present invention are further described in detail, it should be understood that the above-mentioned embodiments are only exemplary embodiments of the present invention, and are not intended to limit the scope of the present invention, and any modifications, equivalent substitutions, improvements and the like made on the basis of the technical solutions of the present invention should be included in the scope of the present invention.

Claims (33)

1. A network access method, comprising:
the first device receives a first request message from a vertical industry control center, wherein the first request message comprises: requesting a coverage area of a managed non-public network and a network access parameter of the non-public network; the network access parameters of the non-public network are used for a terminal to access the non-public network;
the first device sends a first configuration message to an access network management device, where the first configuration message includes: the access network management device is used for managing the access device providing the non-public network.
2. The method of claim 1, further comprising:
the first device receives any one or more of the following information from the industry vertical control center:
the time indication of the non-public network, the information of a terminal accessing the non-public network, the information of a user data management network element corresponding to the terminal and the identification of the vertical industry control center,
wherein the time indication indicates a valid time period for the non-public network.
3. The method according to claim 1 or 2, characterized in that the method further comprises:
the first device sends a registration request to a network storage function, wherein the registration request comprises: and the user data manages the information of the network element and the information of the terminal accessing the non-public network.
4. The method of claim 2, further comprising:
and the first equipment sends the time indication to the access network management equipment.
5. The method according to any one of claims 1-4, further comprising:
and the first equipment determines the access network management equipment according to the coverage area of the non-public network and the configuration information of the management area of one or more access network management equipment.
6. The method of any of claims 1-5, wherein the first device sending a first configuration message to an access network management device comprises:
and the first equipment determines that the vertical industry control center has the authority of managing the non-public network according to the first request message, and the first equipment sends a first configuration message to access network management equipment.
7. The method according to any of claims 1-6, wherein the network access parameters of the non-public network comprise: an identification of the non-public network.
8. A network access method, comprising:
an access network management device receives a first configuration message from a first device, the first configuration message comprising: network access parameters of a non-public network and a coverage area of the non-public network; the network access parameters of the non-public network are used for a terminal to access the non-public network;
and the access network management equipment sends the network access parameters of the non-public network to the access equipment providing the non-public network according to the coverage area of the non-public network.
9. The method of claim 8, further comprising:
the access network management equipment determines the network area of the non-public network according to the coverage area of the non-public network;
and the access network management equipment determines the access equipment according to the network area of the non-public network.
10. The method according to claim 8 or 9, characterized in that the method further comprises:
the access network management device receiving a time indication of the non-public network from the first device, the time indication indicating a valid time period of the non-public network;
and the access network management equipment sends the time indication to the access equipment.
11. The method according to any of claims 8-10, wherein the network access parameters of the non-public network comprise: an identification of the non-public network.
12. A network access method, comprising:
the access equipment receives network access parameters of a non-public network from access network management equipment, wherein the network access parameters of the non-public network are used for a terminal to access the non-public network;
the access device sends a broadcast message including network access parameters of the non-public network.
13. The method of claim 12, further comprising:
the access equipment receives a time indication of the non-public network from the access network management equipment, wherein the time indication is used for indicating the valid time period of the non-public network.
14. The method of claim 13, wherein the access device sends a broadcast message comprising:
the access device sends the broadcast message within the valid time period.
15. The method according to any of claims 12-14, wherein the network access parameters of the non-public network comprise: an identification of the non-public network.
16. A communications apparatus, comprising:
a receiving unit, configured to receive a first request message from a vertical industry control center, where the first request message includes: requesting a coverage area of a managed non-public network and a network access parameter of the non-public network; the network access parameters of the non-public network are used for a terminal to access the non-public network;
a sending unit, configured to send a first configuration message to an access network management device, where the first configuration message includes: the access network management device is used for managing the access device providing the non-public network.
17. The apparatus of claim 16, wherein the receiving unit is further configured to receive any one or more of the following information from the industry vertical control center:
the time indication of the non-public network, the information of a terminal accessed to the non-public network, the information of a user data management network element corresponding to the terminal, and the identification of the vertical industry control center, wherein the time indication is used for indicating the effective time period of the non-public network.
18. The apparatus according to claim 16 or 17, wherein the sending unit is further configured to send a registration request to a network storage function, where the registration request includes: and the user data manages the information of the network element and the information of the terminal accessing the non-public network.
19. The apparatus of claim 17, wherein the sending unit is further configured to send the time indication to the access network management device.
20. The apparatus of any one of claims 16-18, further comprising: a processing unit, configured to determine the access network management device according to a coverage area of the non-public network and configuration information of a management area of one or more access network management devices.
21. The apparatus according to any of claims 16-20, wherein the processing unit determines that the industry vertical control center has the right to manage the non-public network according to the first request message, and the sending unit is configured to send a first configuration message to an access network management device.
22. The apparatus according to any of claims 16-21, wherein the network access parameters of the non-public network comprise: an identification of the non-public network.
23. A communications apparatus, comprising:
a receiving unit, configured to receive a first configuration message from a first device, where the first configuration message includes: network access parameters of a non-public network and a coverage area of the non-public network; the network access parameters of the non-public network are used for a terminal to access the non-public network;
a sending unit, configured to send a network access parameter of the non-public network to an access device providing the non-public network according to a coverage area of the non-public network.
24. The apparatus of claim 23, further comprising: a processing unit, configured to determine a network area of the non-public network according to a coverage area of the non-public network; and means for determining the access device based on a network area of the non-public network.
25. The apparatus according to claim 23 or 24, wherein the receiving unit is further configured to receive a time indication of the non-public network from the first device, where the time indication indicates a valid time period of the non-public network;
the sending unit is further configured to send the valid time period to the access device.
26. The apparatus according to any of claims 23-25, wherein the network access parameters of the non-public network comprise: an identification of the non-public network.
27. A communications apparatus, comprising:
a receiving unit, configured to receive a network access parameter of a non-public network from an access network management device, where the network access parameter of the non-public network is used for a terminal to access the non-public network;
a sending unit, configured to send a broadcast message, where the broadcast message includes a network access parameter of the non-public network.
28. The apparatus of claim 27, wherein the receiving unit is further configured to receive a time indication of the non-public network from the access network management device, and wherein the time indication indicates a valid time period of the non-public network.
29. The apparatus of claim 28, wherein the sending unit is specifically configured to send the broadcast message within the valid time period.
30. The apparatus according to any of claims 27-29, wherein the network access parameters of the non-public network comprise: an identification of the non-public network.
31. A readable storage medium having stored therein instructions which, when executed, implement the network access method of any one of claims 1-7, or the network access method of any one of claims 8-11, or the network access method of any one of claims 12-15.
32. A chip comprising a processor and a communication interface, the communication interface being coupled to the processor, the processor being configured to execute a computer program or instructions to implement the network access method of any of claims 1-7, or the network access method of any of claims 8-11, or the network access method of any of claims 12-15, the communication interface being configured to communicate with other modules outside the chip.
33. A communications apparatus, comprising: a processor and a communication interface, wherein the communication interface is configured to perform the operations of messaging in the first device in the network access method according to any one of claims 1-7; the processor executes instructions to perform operations of processing or controlling in the first device in the network access method of any one of claims 1-7;
alternatively, the first and second electrodes may be,
the communication interface is configured to perform the operation of messaging in the access network management device in the network access method according to any one of claims 8 to 11; the processor executes instructions to perform operations of processing or controlling in the access network management device in the network access method according to any one of claims 8 to 11; alternatively, the first and second electrodes may be,
the communication interface is used for executing the operation of message sending and receiving in the access equipment in the communication method according to any one of claims 12-15; the processor executes instructions to perform operations for processing or controlling in the access device in the network access method of any of claims 12-15.
CN201910252502.6A 2019-03-29 2019-03-29 Network access method and device Active CN111757419B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201910252502.6A CN111757419B (en) 2019-03-29 2019-03-29 Network access method and device
PCT/CN2020/078675 WO2020199868A1 (en) 2019-03-29 2020-03-10 Network access method and apparatus

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910252502.6A CN111757419B (en) 2019-03-29 2019-03-29 Network access method and device

Publications (2)

Publication Number Publication Date
CN111757419A true CN111757419A (en) 2020-10-09
CN111757419B CN111757419B (en) 2021-08-03

Family

ID=72664524

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910252502.6A Active CN111757419B (en) 2019-03-29 2019-03-29 Network access method and device

Country Status (2)

Country Link
CN (1) CN111757419B (en)
WO (1) WO2020199868A1 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112437456A (en) * 2020-12-07 2021-03-02 中国联合网络通信集团有限公司 Communication method and device in non-public network
CN113891249A (en) * 2021-10-18 2022-01-04 中国联合网络通信集团有限公司 Network coverage determination method, device and storage medium
CN114584512A (en) * 2020-11-18 2022-06-03 中国移动通信有限公司研究院 Address reporting method, information processing method, recording method and equipment
WO2022174794A1 (en) * 2021-02-21 2022-08-25 华为技术有限公司 Communication method and communication apparatus
CN115134908A (en) * 2022-08-30 2022-09-30 中国移动通信有限公司研究院 Network registration method under service architecture

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104469764A (en) * 2013-09-16 2015-03-25 中兴通讯股份有限公司 WLAN (Wireless Local Area Network) networking method and system
CN105357733A (en) * 2015-10-26 2016-02-24 中国人民解放军信息工程大学 Method and device for localizing public network access function of management and control equipment

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101836474B (en) * 2007-08-17 2015-04-29 美国博通公司 Self-configuring small scale base station
CN104255064B (en) * 2012-05-03 2020-06-26 瑞典华为技术有限公司 Sending access information from an entity access control system to a user terminal
WO2018166614A1 (en) * 2017-03-17 2018-09-20 Huawei Technologies Co., Ltd. Techniques for radio access network (ran) configuration in slice-based networks

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104469764A (en) * 2013-09-16 2015-03-25 中兴通讯股份有限公司 WLAN (Wireless Local Area Network) networking method and system
CN105357733A (en) * 2015-10-26 2016-02-24 中国人民解放军信息工程大学 Method and device for localizing public network access function of management and control equipment

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
DONGGUAN: "FS_Vertical_LAN: Access to PLMN/NPN services via N3IWF", 《SA WG2 MEETING #S2-129,S2-1810074》 *
SAMSUNG: "update on Standalone NPN description", 《SA WG2 MEETING #131,S2-1901953》 *
SANTA CRUZ - TENERIFE: "TS 23.501: Introducing Non-public network", 《3GPP TSG-SA2 MEETING #131,S2-1902067》 *

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114584512A (en) * 2020-11-18 2022-06-03 中国移动通信有限公司研究院 Address reporting method, information processing method, recording method and equipment
CN112437456A (en) * 2020-12-07 2021-03-02 中国联合网络通信集团有限公司 Communication method and device in non-public network
CN112437456B (en) * 2020-12-07 2023-05-26 中国联合网络通信集团有限公司 Communication method and equipment in non-public network
WO2022174794A1 (en) * 2021-02-21 2022-08-25 华为技术有限公司 Communication method and communication apparatus
CN113891249A (en) * 2021-10-18 2022-01-04 中国联合网络通信集团有限公司 Network coverage determination method, device and storage medium
CN113891249B (en) * 2021-10-18 2023-07-28 中国联合网络通信集团有限公司 Network coverage determination method, device and storage medium
CN115134908A (en) * 2022-08-30 2022-09-30 中国移动通信有限公司研究院 Network registration method under service architecture
CN115134908B (en) * 2022-08-30 2022-12-02 中国移动通信有限公司研究院 Network registration method under service architecture

Also Published As

Publication number Publication date
CN111757419B (en) 2021-08-03
WO2020199868A1 (en) 2020-10-08

Similar Documents

Publication Publication Date Title
CN111757419B (en) Network access method and device
EP4016961A1 (en) Information obtaining method and device
CN110912661A (en) Capability information receiving and sending method and device
CN112449399A (en) Communication method, device and system
WO2019234479A1 (en) Methods and systems for online services apps, browsers, or external devices to request ue handover via modem apis
CN113747516B (en) Method and device for realizing service continuity
CN114071510A (en) Communication method and device
CN112584464B (en) Communication method, communication device, and storage medium
CN114007204A (en) Communication selection method and device based on relay communication and direct communication
US20220303833A1 (en) Relation indication for multi-sim devices
CN112954768B (en) Communication method, device and system
US20220225463A1 (en) Communications method, apparatus, and system
CN115884153A (en) Communication method and device
CN115396853A (en) Communication method, device and system of terminal equipment
CN115484582A (en) Communication method and communication device
CN113329448A (en) Communication method and device
US20240022469A1 (en) Method for determining edge configuration server and apparatus
CN112584326B (en) Communication method, device and system
WO2022198497A1 (en) Positioning method, apparatus and system
WO2023272670A1 (en) Network connection method, and apparatus and system
CN112672336B (en) Method, communication device and communication system for realizing external authentication
WO2023179231A1 (en) Cell information configuration method and apparatus, and readable storage medium and chip system
US20220377547A1 (en) Wireless communication method, terminal device and network element
CN116321328A (en) Session switching method and device
CN115884155A (en) Information transmission method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant