CN112153698A - Method and equipment for generating cross-domain multi-access edge calculation strategy - Google Patents

Method and equipment for generating cross-domain multi-access edge calculation strategy Download PDF

Info

Publication number
CN112153698A
CN112153698A CN202010948996.4A CN202010948996A CN112153698A CN 112153698 A CN112153698 A CN 112153698A CN 202010948996 A CN202010948996 A CN 202010948996A CN 112153698 A CN112153698 A CN 112153698A
Authority
CN
China
Prior art keywords
policy
pcf entity
mec server
pcf
generation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010948996.4A
Other languages
Chinese (zh)
Other versions
CN112153698B (en
Inventor
吕华章
张力方
朱常波
冯毅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN202010948996.4A priority Critical patent/CN112153698B/en
Publication of CN112153698A publication Critical patent/CN112153698A/en
Application granted granted Critical
Publication of CN112153698B publication Critical patent/CN112153698B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/10Flow control between communication endpoints
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/16Central resource management; Negotiation of resources or communication parameters, e.g. negotiating bandwidth or QoS [Quality of Service]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Quality & Reliability (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application discloses a method and equipment for generating a cross-domain multi-access edge calculation strategy, which can realize the generation of the cross-domain multi-access edge calculation strategy. The method comprises the following steps: a multi-access edge computing MEC server sends a first policy generation request to a first policy control function PCF entity; the first policy generation request is for requesting generation of a policy in the first PCF entity; the first PCF entity is a PCF entity in a network of which the MEC server moves to the visit place; the MEC server receives a first strategy generation response sent by the first PCF; the first policy generation response is used to indicate that the generation of the policy in the first PCF entity was successful. According to the method for generating the cross-domain edge calculation strategy, when the MEC server moves to the visited network, the strategy can be requested to be generated from the PCF entity in the visited network, and therefore the cross-domain multi-access edge calculation strategy is generated.

Description

Method and equipment for generating cross-domain multi-access edge calculation strategy
Technical Field
The present application relates to the field of communications, and in particular, to a method and an apparatus for generating a cross-domain multi-access edge calculation policy.
Background
Multi-access edge computing (MEC) refers to an open platform that integrates network, computing, storage, and application core capabilities at the edge of a network near a human, object, or data source, providing edge intelligent services nearby, and meeting the key requirements of industry digitization in aspects of agile connection, real-time services, data optimization, application intelligence, security, privacy protection, and the like. The MEC server can provide an open-source, open and friendly deployment environment for third-party Applications (APPs), and the APPs can also utilize various capabilities provided by the MEC server to provide better services for users. The MEC technology has become one of the important technologies supported by the fifth generation mobile communication technology 5G.
The existing MEC server requests policy generation from a policy function (PCF) in the home network. However, there is no prior art relating to how the MEC server requests policy generation when the MEC server leaves the home and enters the visited.
Disclosure of Invention
The application provides a method and a device for generating a cross-domain multi-access edge calculation strategy, which can realize the generation of the cross-domain multi-access edge calculation strategy.
In order to achieve the purpose, the technical scheme is as follows:
in a first aspect, the present application provides a method for generating a cross-domain edge computation policy, where the method includes: the MEC server sends a first policy generation request for requesting to generate a policy in a first PCF entity to the first PCF entity, the first PCF entity is a PCF entity in a network of which the MEC server moves to a visit place, and the MEC server receives a first policy generation response which is sent by the first PCF and used for indicating that the policy generation in the first PCF entity is successful.
It can be seen that the method for generating cross-domain edge calculation policy provided by the present application can request the PCF entity in the visited network to generate a policy when the MEC server moves to the visited network, thereby implementing the generation of cross-domain multi-access edge calculation policy.
In a second aspect, the present application provides a method for generating a cross-domain edge computation policy, the method including: a first PCF entity receives a first policy generation request sent by an MEC server for requesting policy generation in the first PCF entity, the first PCF entity is a PCF entity in a network where the MEC server moves to a visited place, the first PCF entity sends the first policy generation request to a second PCF entity, the second PCF entity is a PCF entity in a network where the MEC server belongs, the first PCF entity receives a second policy generation response including a trigger parameter of the policy sent by the second PCF entity, and the first PCF entity generates a first policy generation response indicating that the policy generation in the first PCF entity is successful according to the trigger parameter and sends the first policy generation response to the MEC server.
It can be seen that the method for generating cross-domain edge calculation policy provided by the present application can request the PCF entity in the visited network to generate a policy when the MEC server moves to the visited network, thereby implementing the generation of cross-domain multi-access edge calculation policy.
In a third aspect, the present application provides a multi-access edge computing MEC server, comprising: a sending unit, configured to send a first policy generation request to a first policy control function PCF entity; the first policy generation request is for requesting generation of a policy in the first PCF entity; the first PC F entity is a PCF entity in a network in which the MEC server moves to the visit place; a receiving unit, configured to receive a first policy generation response sent by a first PCF; the first policy generation response is used to indicate that the generation of the policy in the first PCF entity was successful.
In a fourth aspect, the present application provides a policy control function PCF entity, comprising: the receiving unit is used for receiving a first strategy generation request sent by the multi-access edge computing MEC server; the first policy generation request is for requesting generation of a policy in the first PCF entity; the first PCF entity is a PCF entity in a network where the M EC server moves to the visit place; a sending unit, configured to send a first policy generation request to a second PCF entity; the second PCF entity is a PCF entity in a network of the attribution of the MEC server; the receiving unit is further configured to receive a second policy generation response sent by the second PCF entity; the second policy generation response includes a trigger parameter of the policy; the generating unit is used for generating a first strategy generating response according to the trigger parameter; the first strategy generation response comprises the content corresponding to the strategy; and the sending unit is further used for sending the first policy generation response to the MEC server.
In a fifth aspect, the present application provides a multi-access edge computing MEC server comprising a memory and a processor. The memory is coupled to the processor. The memory is for storing computer program code comprising computer instructions. When the processor executes the computer instructions, the MEC server performs the method for cross-domain multi-access edge calculation policy generation as described in the first aspect and any one of its possible designs.
In a sixth aspect, the present application provides a PCF entity comprising a memory and a processor. The memory is coupled to the processor. The memory is for storing computer program code comprising computer instructions. When the processor executes the computer instructions, the PCF entity performs the method of cross-domain multi-access edge computation policy generation as described in the second aspect and any one of its possible designs.
In a seventh aspect, the present application provides a computer-readable storage medium, which stores instructions that, when executed on an MEC server, cause the MEC server to perform the method for generating a cross-domain multi-access edge computation policy according to the first aspect and any one of the possible design manners thereof.
In an eighth aspect, the present application provides a computer-readable storage medium, which stores instructions that, when executed on a PCF entity, cause the PCF entity to perform the method for cross-domain multi-access edge computation policy generation as described in the second aspect and any one of its possible design manners.
In a ninth aspect, the present application provides a computer program product comprising computer instructions which, when run on an MEC server, cause the MEC server to perform the method for cross-domain multi-access edge computation policy generation as described in the first aspect and any one of its possible designs.
In a tenth aspect, the present application provides a computer program product, which includes computer instructions, when the computer instructions are executed on a PCF entity, causing the PCF entity to perform the method for cross-domain multi-access edge computation policy generation as described in the second aspect and any one of its possible design manners.
For a detailed description of the third aspect, the fifth aspect, the seventh aspect, the ninth aspect, and various implementations thereof in the present application, reference may be made to the detailed description of the first aspect and various implementations thereof; moreover, for the beneficial effects of the third aspect, the fifth aspect, the seventh aspect, the ninth aspect and various implementation manners thereof, reference may be made to beneficial effect analysis in the first aspect and various implementation manners thereof, and details are not repeated here.
For a detailed description of the fourth, sixth, eighth, tenth aspects and various implementations thereof in this application, reference may be made to the detailed description of the second aspect and its various implementations; moreover, the beneficial effects of the fourth aspect, the sixth aspect, the eighth aspect, the tenth aspect and various implementation manners thereof may refer to the beneficial effect analysis in the second aspect and various implementation manners thereof, and are not described herein again.
These and other aspects of the present application will be more readily apparent from the following description.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic architecture diagram of a network according to an embodiment of the present application;
fig. 2 is a first flowchart of a method for generating a cross-domain multi-access edge calculation policy according to an embodiment of the present application;
fig. 3 is a schematic flowchart of a method for generating a cross-domain multi-access edge calculation policy according to an embodiment of the present application;
fig. 4 is a schematic hardware structure diagram of a communication device according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of an MEC server provided in an embodiment of the present application;
fig. 6 is a schematic structural diagram of a PCF entity according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The terms "first", "second" and "first" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include one or more of that feature. In the description of the present application, "a plurality" means two or more unless otherwise specified.
Existing MEC servers request policy generation from a policy control function PCF in the home network. However, there is no prior art relating to how the MEC server requests policy generation when the MEC server leaves the home and enters the visited.
In order to solve the above problem, the present application provides a method and an apparatus for generating a cross-domain edge calculation policy, which can implement generation of the cross-domain edge calculation policy.
Fig. 1 is a schematic diagram of an architecture of a network according to an embodiment of the present application. The network includes an authentication server function (AUSF) 101, a Unified Data Management (UDM) 102, a network storage function (NRF) 103, a Policy Control Function (PCF) 104, a network open capability (NEF) 105, an access and mobility management function (AMF) 106, a Session Management Function (SMF) 107, a User Equipment (UE) 108, a Radio Access Network (RAN) 109, and a multi-access edge computing MEC server 110. The MEC server 110 includes a User Plane Function (UPF) 110a and an Application Function (AF) 110 b.
The AUSF101 is mainly responsible for authenticating and authorizing access of user equipment; the UDM102 is mainly responsible for storing subscription data of the user; NRF103 is mainly responsible for registering and managing network functions; PCF104 is primarily responsible for policy decisions; NEF105 is primarily responsible for opening network data to the outside; the AMF106 is mainly responsible for access authentication, authorization and mobility management; SMF107 is primarily responsible for session management, I P address assignment; the UPF110a is mainly responsible for routing, forwarding and policy enforcement of packet data of Protocol Data Units (PDUs); AF110b is primarily responsible for providing PCF104 with service information for user visited services for policy decisions by PCF 104.
The method for generating the cross-domain edge calculation policy provided by the embodiment of the present application is described below.
As shown in fig. 2, the method for generating the cross-domain edge computation policy includes:
s201, the MEC server sends a first policy generation request to a first PCF entity.
The first PCF entity is a PCF entity in the network of which the MEC server moves to the visit place.
The first policy generation request is for requesting generation of a policy in the first PCF entity.
Optionally, when the MEC server moves to the visited coverage, the MEC server requests to generate a new PCF, and the MEC server sends a first policy generation request to the first PCF entity; or, when the MEC makes a service for the first time in the coverage of the visited place, the MEC server sends a first policy generation request to the first PCF entity.
Optionally, the first policy generation request may include: an identity of the MEC server, an identity of the UE generating the policy, identity information of a context of the APP session related to the policy.
Illustratively, the identification of the MEC server may be an ID of the MEC server, an Internet Protocol (IP) address or a (media access control, MAC) address of the MEC server. The identity of the UE may be an IP address or MAC address of the UE.
Further optionally, the first policy generation request may further include: a persistent subscription identity (SUPI), a generic public user identifier, a Deep Neural Network (DNN), a bandwidth requirement, a traffic description, an identifier of the MEC APP, a traffic status, a priority indication, a provider of the APP service, a resource allocation result.
Alternatively, the first policy generation request may be an Npcf _ mecliconcontrol _ createrequest message.
Optionally, the first policy generation request may be sent in a hypertext transfer protocol (HTTP) _ POST manner.
S202, the first PCF entity receives the first policy generation request sent by the MEC server.
S203, the first PCF entity sends a second policy generation request to the second PCF entity.
The second policy generation request is for requesting a trigger parameter for the policy.
The second PCF entity is a PCF entity in the network to which the MEC server is home.
Optionally, the content included in the second policy generation request may be the same as or different from the content included in the first policy generation request.
S204, the second PCF entity receives the second strategy generation request sent by the first PCF entity.
S205, the second PCF entity sends a second strategy generation response to the first PCF entity.
The second policy generation response includes a trigger parameter for the policy.
Alternatively, the second policy generation response may be an Npcf _ meclicolicocontrol Create Res response message.
Alternatively, the second policy generation response may be a hypertext transfer protocol (HTTP) 201 message.
S206, the first PCF entity receives the second strategy generation response sent by the second PCF entity.
S207, the first PCF entity generates a first strategy generation response according to the trigger parameters.
The first policy generation response is used to indicate that the generation of the policy in the first PCF entity was successful.
Alternatively, the first policy generation response may be an Npcf _ meclicolicocontrol Create Res response message.
S208, the first PCF entity sends a first strategy generation response to the MEC server.
Alternatively, the first policy generation response may be an Npcf _ meclicolicocontrol Create Res response message.
For example, since the MEC generates control plane signaling and user plane data with the SMF and the UPF, after the message, the first PCF may subscribe to policy information of the SMF and the UPF related to the MEC.
S209, the MEC server receives the first policy generation response sent by the first PCF entity.
Optionally, with reference to fig. 2, as shown in fig. 3, after S209, the method for generating a cross-domain edge computation policy provided by the present application further includes S210-S217.
S210, the MEC server sends a first policy updating request to the first PCF entity.
The first policy update request is to indicate an update of a policy in the first PCF.
Optionally, the first policy update request may include a base station accessed by the MEC, an MEC offloading policy, a DNN of the connection, and context information of an APP on the MEC.
S211, the first PCF entity receives the first policy update request sent by the MEC server.
S212, the first PCF entity sends a first policy update response to the MEC server.
The first policy update response is used to indicate that the policy update was successful in the first PCF entity.
Alternatively, the first policy Update response may be an Npcf _ meccolicycontrol Update No tify response message.
Optionally, the first policy update response may be an HTTP 200OK message.
S213, the MEC server receives the first policy update response sent by the first PCF entity.
S214, the first PCF entity sends a second strategy updating request to the second PCF entity.
Optionally, the content included in the second policy update request may be the same as or different from the content included in the first policy update request.
Optionally, the second policy update request includes: an identification of the MEC server, an identification of U E that generated the policy, identity information of a context of the APP session related to the policy.
Illustratively, the identification of the MEC server may be an ID of the MEC server, an Internet Protocol (IP) address or a (media access control, MAC) address of the MEC server. The identity of the UE may be an IP address or MAC address of the UE.
Further optionally, the first policy generation request may further include: a persistent subscription identity (SUPI), a generic public user identifier, a Deep Neural Network (DNN), a bandwidth requirement, a traffic description, an identifier of the MEC APP, a traffic status, a priority indication, a provider of the APP service, a resource allocation result.
S215, the second PCF entity receives the second policy update request sent by the first PCF entity.
S216, the second PCF entity sends a second strategy updating response to the first PCF entity.
The second policy update response is used to indicate that the policy update in the second PCF entity was successful.
Alternatively, the second policy Update response may be an Npcf _ meccolicycontrol Update No tify response message.
Optionally, the first policy update response may be an HTTP 200OK message.
S217, the first PCF entity receives the second policy update response sent by the second PCF entity.
According to the method for generating the cross-domain edge calculation strategy, when the MEC server moves to the visited network, the strategy can be requested to be generated from the PCF entity in the visited network, and therefore the cross-domain multi-access edge calculation strategy is generated.
The scheme provided by the embodiment of the application is mainly introduced from the perspective of a method. To implement the above functions, it includes hardware structures and/or software modules for performing the respective functions. Those of skill in the art would readily appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as hardware or combinations of hardware and computer software. Whether a function is performed as hardware or computer software drives hardware depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
As shown in fig. 4, an embodiment of the present application provides a communication device 400, where the communication device 400 may be an MEC server or a PCF entity, and the present application does not limit this. The communication device 400 may include at least one processor 401, communication circuitry 402, memory 403, and communication interface 404.
In particular, the processor 401 is configured to execute computer-executable instructions stored in the memory 403, thereby implementing steps or actions of the terminal.
The processor 401 may be a chip. For example, the Field Programmable Gate Array (FPGA) may be a Field Programmable Gate Array (FPGA), an Application Specific Integrated Circuit (ASIC), a system on chip (So C), a Central Processing Unit (CPU), a Network Processor (NP), a digital signal processing circuit (DSP), a Microcontroller (MCU), a Programmable Logic Device (PLD) or other integrated chips.
A communication line 402 for transmitting information between the processor 401 and the memory 403.
A memory 403 for storing and executing computer-executable instructions, and controlled by the processor 401.
The memory 403 may be separate and coupled to the processor via the communication line 402. The memory 403 may be either volatile memory or nonvolatile memory, or may include both volatile and nonvolatile memory. The non-volatile memory may be a read-only memory (ROM), a Programmable ROM (PROM), an Erasable PROM (EPROM), an electrically Erasable EPROM (EEPROM), or a flash memory. Volatile memory can be Random Access Memory (RAM), which acts as external cache memory. By way of example, and not limitation, many forms of RAM may be used, such as Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), Synchronous Dynamic Random Access Memory (SDRAM), double data rate SDRAM (DDR SDRAM), Enhanced SDRAM (ESDRAM). It should be noted that the memory of the systems and devices described herein is intended to comprise, without being limited to, these and any other suitable types of memory.
A communication interface 404 for communicating with other devices or a communication network. The communication network may be an ethernet, a Radio Access Network (RAN), or a Wireless Local Area Network (WLAN).
It is noted that the configuration shown in fig. 4 does not constitute a limitation of the communication device, which may comprise more or less components than those shown in fig. 4, or a combination of some components, or a different arrangement of components than those shown in fig. 4.
As shown in fig. 5, an embodiment of the present application provides an MEC server 50. The MEC server 50 may include a transmitting unit 51, a receiving unit 52.
A sending unit 51, configured to send a first policy generation request to a first policy control function PCF entity. For example, in conjunction with fig. 2, the sending unit 51 may be configured to perform S201.
A receiving unit 52, configured to receive the first policy generation response sent by the first PCF. For example, in conjunction with fig. 2, the receiving unit 52 may be configured to perform S209.
In practical implementation, the sending unit 51 and the receiving unit 52 can be implemented by the processor 401 shown in fig. 4 calling the program code in the memory 403. For a specific implementation process, reference may be made to the description of the method for generating a cross-domain multi-access edge calculation policy shown in fig. 2, which is not described herein again.
As shown in fig. 6, the present embodiment provides a PCF entity 60. PCF entity 60 may include a receiving unit 61, a sending unit 62, and a generating unit 63.
A receiving unit 61, configured to receive a first policy generation request sent by a multi-access edge computing MEC server. For example, in connection with fig. 2, the receiving unit 61 may be configured to perform S202.
A sending unit 62, sending the first policy generation request to the second PCF entity. For example, in conjunction with fig. 2, the sending unit 62 may be configured to perform S203.
The receiving unit 61 is further configured to receive a second policy generation response sent by the second PCF entity. For example, in connection with fig. 2, the receiving unit 61 may be configured to perform S206.
A generating unit 63, configured to generate a first policy generation response according to the trigger parameter. For example, in connection with fig. 2, the generating unit 63 may be configured to execute S207.
The sending unit 62 is further configured to send a first policy generation response to the MEC server. For example, in conjunction with fig. 2, the sending unit 62 may also be configured to perform S208.
In actual implementation, the receiving unit 61, the sending unit 62, and the generating unit 63 may be implemented by the processor 401 shown in fig. 4 calling the program code in the memory 403. For a specific implementation process, reference may be made to the description of the method for generating a cross-domain multi-access edge calculation policy shown in fig. 2, which is not described herein again.
It should be understood that, in the various embodiments of the present application, the sequence numbers of the above-mentioned processes do not mean the execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments of the present application.
Another embodiment of the present application further provides a computer-readable storage medium, in which computer instructions are stored, and when the computer instructions are executed on the MEC server, the MEC server is caused to execute the steps executed by the MEC server in the method flow shown in the foregoing method embodiment.
Another embodiment of the present application further provides a computer-readable storage medium, in which computer instructions are stored, and when the computer instructions are executed on a PCF entity, the PCF entity executes the steps executed by the PCF entity in the method flow shown in the foregoing method embodiment.
In another embodiment of the present application, there is also provided a computer program product, which includes instructions that, when executed on an MEC server, cause the MEC server to perform the steps performed by the MEC server in the method flow illustrated in the above method embodiment.
In another embodiment of the present application, a computer program product is also provided, which includes instructions that, when executed on a PCF entity, cause the PCF entity to perform the steps performed by the PCF entity in the method flow illustrated in the above method embodiment.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, devices and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus, and method may be implemented in other ways. For example, the above-described embodiments of the apparatus are merely illustrative, and for example, a division of a unit is merely a logical division, and an actual implementation may have another division, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
Units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
The above description is only for the specific embodiments of the present application, but the scope of the present application is not limited thereto, and any changes or substitutions that can be easily conceived by those skilled in the art within the technical scope of the present application should be covered within the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (12)

1. A method for generating cross-domain multi-access edge calculation strategies is characterized by comprising the following steps:
a multi-access edge computing MEC server sends a first policy generation request to a first policy control function PCF entity; the first policy generation request is for requesting generation of a policy in the first PCF entity; the first PCF entity is a PCF entity in a network of which the MEC server moves to a visit place;
the MEC server receives a first policy generation response sent by the first PCF; the first policy generation response is to indicate that generating a policy in the first PCF entity was successful.
2. The method of claim 1,
the first policy generation request includes: an identity of the MEC server, an identity of a UE requesting a policy, identity information of a context of an APP session related to the policy.
3. A method for generating cross-domain multi-access edge calculation strategies is characterized by comprising the following steps:
a first Policy Control Function (PCF) entity receives a first policy generation request sent by a multi-access edge computing (MEC) server; the first policy generation request is for requesting generation of a policy in the first PCF entity; the first PCF entity is a PCF entity in a network of which the MEC server moves to a visit place;
the first PCF entity sends the second strategy generation request to a second PCF entity; the second policy generation request is used for requesting a trigger parameter of the policy; the second PCF entity is a PCF entity in a network of the MEC server home location;
the first PCF entity receives a second strategy generation response sent by the second PCF entity; the second policy generation response includes a trigger parameter for the policy;
the first PCF entity generates a first strategy generation response according to the trigger parameter; the first policy generation response is to indicate that generating a policy in the first PCF entity was successful;
the PCF entity sends the first policy generation response to the MEC server.
4. The method of claim 3,
the first policy generation request includes: an identity of the MEC server, an identity of a UE requesting a policy, identity information of a context of an APP session related to the policy.
5. The method of claim 3, further comprising:
the first PCF entity receives a first policy updating request sent by the MEC server; the first policy update request is used to indicate an update of a policy in the first PCF.
6. The method of claim 5, further comprising:
the first PCF entity sends the second policy updating request to the second PCF entity so that the second PCF entity updates the policy in the second PCF.
7. A multi-access edge computing, MEC, server, the MEC server comprising:
a sending unit, configured to send a first policy generation request to a first policy control function PCF entity; the first policy generation request is for requesting generation of a policy in the first PCF entity; the first PCF entity is a PCF entity in a network of which the MEC server moves to a visit place;
a receiving unit, configured to receive a first policy generation response sent by the first PCF; the first policy generation response is to indicate that generating a policy in the first PCF entity was successful.
8. A policy control function, PCF, entity, comprising:
the receiving unit is used for receiving a first strategy generation request sent by the multi-access edge computing MEC server; the first policy generation request is for requesting generation of a policy in the first PCF entity; the first PCF entity is a PCF entity in a network of which the MEC server moves to a visit place;
a sending unit, configured to send the first policy generation request to a second PCF entity; the second PCF entity is a PCF entity in a network of the MEC server home location;
the receiving unit is further configured to receive a second policy generation response sent by the second PCF entity; the second policy generation response includes a trigger parameter for the policy;
the generating unit is used for generating a first strategy generating response according to the trigger parameter; the first policy generation response is to indicate that generating a policy in the first PCF entity was successful;
the sending unit is further configured to send the first policy generation response to the MEC server.
9. An MEC server, wherein the MEC server comprises a memory and a processor; the memory and the processor are coupled; the memory for storing computer program code, the computer program code comprising computer instructions; the MEC server, when executing the computer instructions, performs the method of cross-domain multi-access edge computation policy generation of claim 1 or 2.
10. A PCF entity, comprising a memory and a processor; the memory and the processor are coupled; the memory for storing computer program code, the computer program code comprising computer instructions; the PCF entity, when executing the computer instructions, performs the method of cross-domain multi-access edge computation policy generation of any of claims 3-6.
11. A computer readable storage medium having stored therein instructions which, when run on an MEC server, cause the MEC server to perform the method of cross-domain multi-access edge computation policy generation of claim 1 or 2.
12. A computer-readable storage medium having stored therein instructions that, when executed on a PCF entity, cause the PCF entity to perform the method of cross-domain multi-access edge computation policy generation of any of claims 3-6.
CN202010948996.4A 2020-09-10 2020-09-10 Method and equipment for generating cross-domain multi-access edge calculation strategy Active CN112153698B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010948996.4A CN112153698B (en) 2020-09-10 2020-09-10 Method and equipment for generating cross-domain multi-access edge calculation strategy

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010948996.4A CN112153698B (en) 2020-09-10 2020-09-10 Method and equipment for generating cross-domain multi-access edge calculation strategy

Publications (2)

Publication Number Publication Date
CN112153698A true CN112153698A (en) 2020-12-29
CN112153698B CN112153698B (en) 2023-06-23

Family

ID=73890015

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010948996.4A Active CN112153698B (en) 2020-09-10 2020-09-10 Method and equipment for generating cross-domain multi-access edge calculation strategy

Country Status (1)

Country Link
CN (1) CN112153698B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115225363A (en) * 2022-07-13 2022-10-21 中国电信股份有限公司 Opening method and device of edge capability, storage medium and electronic equipment

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008083630A1 (en) * 2007-01-11 2008-07-17 Huawei Technologies Co., Ltd. Method, system and device for policy and rules decision
CN109673005A (en) * 2017-10-17 2019-04-23 华为技术有限公司 A kind of method, apparatus and system of determining PCF
CN109729181A (en) * 2017-10-27 2019-05-07 华为技术有限公司 A kind of method for accessing domain name and equipment
CN109922472A (en) * 2017-12-13 2019-06-21 华为技术有限公司 The acquisition of subscriber policy
CN110519746A (en) * 2018-05-21 2019-11-29 华为技术有限公司 One kind is for terminating access and the associated method and apparatus of Mobility Management Strategy
US20200195543A1 (en) * 2017-08-30 2020-06-18 Zte Corporation Method for monitoring and controlling session traffic usage, server and storage medium
CN111565385A (en) * 2019-02-14 2020-08-21 华为技术有限公司 Policy providing method, device and system

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008083630A1 (en) * 2007-01-11 2008-07-17 Huawei Technologies Co., Ltd. Method, system and device for policy and rules decision
US20200195543A1 (en) * 2017-08-30 2020-06-18 Zte Corporation Method for monitoring and controlling session traffic usage, server and storage medium
CN109673005A (en) * 2017-10-17 2019-04-23 华为技术有限公司 A kind of method, apparatus and system of determining PCF
EP3700241A1 (en) * 2017-10-17 2020-08-26 Huawei Technologies Co., Ltd. Method, apparatus and system for determining pcf
CN109729181A (en) * 2017-10-27 2019-05-07 华为技术有限公司 A kind of method for accessing domain name and equipment
CN109922472A (en) * 2017-12-13 2019-06-21 华为技术有限公司 The acquisition of subscriber policy
CN110519746A (en) * 2018-05-21 2019-11-29 华为技术有限公司 One kind is for terminating access and the associated method and apparatus of Mobility Management Strategy
CN111565385A (en) * 2019-02-14 2020-08-21 华为技术有限公司 Policy providing method, device and system

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
"\"S2-165172-revision of 4740-PCR-Solutions to Policy framework for roaming cases\"", 3GPP TSG_SA\\WG2_ARCH *
ERICSSON: "C3-190211 \"Corrections for Location Change Policy Control Request Triggers\"", 3GPP TSG_CT\\WG3_INTERWORKING_EX-CN3 *
ERICSSON: "S2-165534 \"Updates in Policy Reference Architecture to reflect roaming aspects\"", 3GPP TSG_SA\\WG2_ARCH *
NOKIA, NOKIA SHANGHAI BELL: "S2-1903668 \"Correcting AMF behaviour for Service Request that is not integrity protected\"", 3GPP TSG_SA\\WG2_ARCH *
ZTE, ORACLE, TELECOM ITALIA, ETRI(?), SANDVINE, CHINA TELECOM(?): "S2-166368 \"NextGen roaming interface between VPF and HPF in case of LBO\"", 3GPP TSG_SA\\WG2_ARCH *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115225363A (en) * 2022-07-13 2022-10-21 中国电信股份有限公司 Opening method and device of edge capability, storage medium and electronic equipment
CN115225363B (en) * 2022-07-13 2024-01-30 中国电信股份有限公司 Edge capability opening method and device, storage medium and electronic equipment

Also Published As

Publication number Publication date
CN112153698B (en) 2023-06-23

Similar Documents

Publication Publication Date Title
US11843950B2 (en) Protecting a telecommunications network using network components as blockchain nodes
US11329982B2 (en) Managing internet of things devices using blockchain operations
CN112202844B (en) Method and equipment for opening cross-domain multi-access edge computing capability
CN112437456B (en) Communication method and equipment in non-public network
CN108683690B (en) Authentication method, user equipment, authentication device, authentication server and storage medium
EP4007326A1 (en) Method and device for activating 5g user
US8914867B2 (en) Method and apparatus for redirecting data traffic
KR20220114638A (en) Method, device, and system for updating an anchor key in a communication network for encrypted communication with a service application
CN109561429B (en) Authentication method and device
CN110535808B (en) Equipment monitoring and de-registration method and device
CN112202917A (en) Method and equipment for terminating multi-access edge computing service
US20220368684A1 (en) Method, Device, and System for Anchor Key Generation and Management in a Communication Network for Encrypted Communication with Service Applications
CN104917761A (en) General access control method and device
CN114189844A (en) Terminal cross-region communication method, network element equipment and storage medium
CN112153698B (en) Method and equipment for generating cross-domain multi-access edge calculation strategy
Boubakri et al. Access control in 5G communication networks using simple PKI certificates
CN108024241A (en) Terminal accessing authentication method, system and authentication server
Kalalas et al. Lightweight and space-efficient vehicle authentication based on cuckoo filter
KR20220100669A (en) Method, device and system for generating and managing application keys in a communication network for encrypted communication with service applications
KR20210040776A (en) Method and apparatus for activating 5g user in 5g system
CN114268945B (en) Communication network access method, device and system
US20240187860A1 (en) Methods and means for providing access to external networks
JP2019121848A (en) Radio communication system and radio communication method
CN117478431B (en) Industrial Internet of things control method based on trusted network
CN115484077A (en) Method and device for customizing service gateway based on supervision situation business and computer equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant