CN112243224B - Edge computing network implementation method and device - Google Patents

Edge computing network implementation method and device Download PDF

Info

Publication number
CN112243224B
CN112243224B CN202011104890.2A CN202011104890A CN112243224B CN 112243224 B CN112243224 B CN 112243224B CN 202011104890 A CN202011104890 A CN 202011104890A CN 112243224 B CN112243224 B CN 112243224B
Authority
CN
China
Prior art keywords
policy
session
information
edge computing
authorization
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011104890.2A
Other languages
Chinese (zh)
Other versions
CN112243224A (en
Inventor
吕华章
张力方
朱常波
冯毅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN202011104890.2A priority Critical patent/CN112243224B/en
Publication of CN112243224A publication Critical patent/CN112243224A/en
Application granted granted Critical
Publication of CN112243224B publication Critical patent/CN112243224B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/02Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]; Transfer of mobility data, e.g. between HLR, VLR or external networks
    • H04W8/08Mobility data transfer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/20Manipulation of established connections

Abstract

The application discloses a method and a device for realizing an edge computing network, and belongs to the technical field of communication. The edge computing network implementation method comprises the following steps: receiving a strategy authorization creation request message sent by a multi-access edge computing node, and identifying a first session according to pre-stored session management information and strategy authorization creation service information; and modifying the session information of the first session, acquiring policy updating information according to the modified session information of the first session, and creating service information to update the policy information of the first policy control function entity according to the policy updating information and the policy authorization, thereby realizing information synchronization between the sinking core network and the operator core network.

Description

Edge computing network implementation method and device
Technical Field
The present application relates to the field of communications technologies, and in particular, to a method and an apparatus for implementing an edge computing network.
Background
In the 5G era, users want to obtain network services supporting ultra-large mobile broadband, mass connection of internet of things and ultra-reliable ultra-low time delay, which also becomes one of the challenges facing operators. Multi-access edge Computing (MEC) is a network architecture that can provide cloud Computing capability and ultra-low latency, high bandwidth service environments at the edge of a network for network operators and service providers. Considering that an operator has a rich edge Data Center (DC), the operator can provide a user with stronger computing power and faster Data response by deploying a service environment at the edge of an access network based on the MEC technology, thereby meeting the high demand of the user. However, for some specific application scenarios, the MEC needs to be implemented in a non-independent deployment manner, that is, an operator deploys a simplified sinking core network, and the MEC accesses the sinking core network to perform actual services. However, how to implement information synchronization between a sinking core network and an operator core network becomes an urgent problem to be solved in the field in view of such a non-independent deployment scenario.
Disclosure of Invention
Therefore, the application provides a method and a device for realizing an edge computing network, so as to solve the problem of how to realize information synchronization between a sinking core network and an operator core network in a non-independent deployment scene.
In order to achieve the above object, a first aspect of the present application provides an edge computing network implementation method, including:
receiving a strategy authorization establishment request message sent by a multi-access edge computing node; the strategy authorization creating request message comprises strategy authorization creating service information;
establishing service information according to prestored session management information and strategy authorization, and identifying a first session; wherein the first session is an affected session;
modifying the session information of the first session, and obtaining strategy updating information according to the modified session information of the first session;
updating the policy information of the first policy control function entity according to the policy updating information and the policy authorization creation service information; the first policy control functional entity is a functional entity in a core network.
Further, the policy authorization creation request message is a message sent to the second policy control function entity when the multi-access edge computing node receives the session creation request; the second policy control function entity is a current policy control function entity, and the current policy control function entity is a function entity in the sinking core network.
Further, modifying the session information of the first session, and obtaining policy update information according to the modified session information of the first session, including:
creating service information according to the session information and the policy authorization of the first session, and generating a session modification request message;
sending the session modification request message to a session management functional entity;
receiving a session modification response message returned by the session management functional entity; the session modification response message is a message returned by the session management functional entity after the session of the multi-access edge computing node is established according to the session modification request message, and the session modification response message comprises modified session information of the first session;
and generating policy update information according to the modified session information of the first session.
Further, updating the policy information of the first policy control function entity according to the policy update information and the policy authorization creation service information includes:
generating a policy update request message based on the policy update information and the policy authorization creation service information;
and sending the policy updating request message to the first policy control function entity so that the first policy control function entity updates the policy information based on the policy updating request message.
Further, after sending the policy update request message to the first policy control function entity, the method further includes:
and receiving a strategy updating response message returned by the first strategy control functional entity.
Further, after receiving the policy update response message returned by the first policy control function entity, the method further includes:
sending a data synchronization reminding message to a second unified data warehouse function entity so that the second unified data warehouse function entity sends a data synchronization request message to a first unified data warehouse function entity, and the first unified data warehouse function entity updates session information of the multi-access edge computing node; the second unified data warehouse functional entity is a functional entity in a sinking core network, and the first unified data warehouse functional entity is a functional entity in the core network.
Further, after receiving a policy authorization creation request message sent by the multi-access edge computing node, before identifying the first session according to the pre-stored session management information and policy authorization creation service information, the method further includes:
judging whether the multi-access edge computing node subscribes a policy authorization service or not;
and when judging that the multi-access edge computing node subscribes to the policy authorization service, identifying the first session according to the pre-stored session management information and the policy authorization creation service information.
Further, the determining whether the multi-access edge computing node subscribes to the policy authorization service includes:
sending a data query request message to a second unified data warehouse functional entity; wherein, the second unified data warehouse functional entity is a functional entity in a sinking core network;
receiving a data query response message returned by the second unified data warehouse functional entity; wherein, the data inquiry response message comprises the subscription information of the multi-access edge computing node;
and judging whether the multi-access edge computing node subscribes the policy authorization service or not according to the subscription information of the multi-access edge computing node.
Further, after determining whether the multi-access edge computing node subscribes to the policy authorization service according to the subscription information of the multi-access edge computing node, the method further includes:
and when judging that the multi-access edge computing node does not subscribe the policy authorization service according to the subscription information of the multi-access edge computing node, sending an unsubscribe policy authorization service prompt message to the multi-access edge computing node.
Further, after sending the non-subscription policy authorization service prompting message to the multi-access edge computing node, the method further includes:
receiving a subscription policy authorization request message sent by a multi-access edge computing node;
subscribing the policy authorization service for the multi-access edge computing node according to the subscription policy authorization request message and generating a subscription policy authorization response message;
and sending a subscription policy authorization response message to the multi-access edge computing node.
In order to achieve the above object, a second aspect of the present application provides an edge computing network implementing apparatus, including:
the receiving module is used for receiving a strategy authorization establishing request message sent by the multi-access edge computing node; the strategy authorization creating request message comprises strategy authorization creating service information;
the identification module is used for establishing service information according to prestored session management information and strategy authorization and identifying the first session; wherein the first session is an affected session;
the modification module is used for modifying the session information of the first session;
the acquisition module is used for acquiring strategy updating information according to the modified session information of the first session;
the updating module is used for updating the strategy information of the first strategy control function entity according to the strategy updating information and the strategy authorization establishing service information; the first policy control functional entity is a functional entity in a core network.
This application has following advantage:
the method for realizing the edge computing network comprises the steps of receiving a strategy authorization establishment request message sent by a multi-access edge computing node, and identifying a first session according to prestored session management information and strategy authorization establishment service information; and modifying the session information of the first session, acquiring policy updating information according to the modified session information of the first session, and creating service information to update the policy information of the first policy control function entity according to the policy updating information and the policy authorization, thereby realizing information synchronization between the sinking core network and the operator core network.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this specification, illustrate embodiments of the application and together with the description serve to explain the principles of the application and not to limit the application.
Fig. 1 is a schematic diagram of an edge computing network architecture according to an embodiment of the present application;
fig. 2 is a flowchart of an edge computing network implementation method according to a first embodiment of the present application;
fig. 3 is a flowchart of an edge computing network implementation method according to a second embodiment of the present application;
fig. 4 is a flowchart of an edge computing network implementation method according to a third embodiment of the present application;
fig. 5 is a flowchart of an edge computing network implementation method according to a fourth embodiment of the present application;
fig. 6 is a schematic block diagram of an edge computing network implementing apparatus according to a fifth embodiment of the present application.
In the drawings:
110: operator core network 111: authentication server functional entity
112: unified data warehouse function entity 113: network storage function entity
114: policy control function 115: network capability open function entity
116: access and mobility management function 117: session management function entity
120: sinking the core network 121: sink unified data warehouse functional entity
122: sinking policy control function 123: sinking access and mobility manager functional entity
124: sinking session management function 125: sinking user plane function entity
130: multi-access edge computing system
501: the receiving module 502: identification module
503: the modification module 504: acquisition module
505: updating module
Detailed Description
The following detailed description of embodiments of the present application will be made with reference to the accompanying drawings. It should be understood that the detailed description and specific examples, while indicating the present application, are given by way of illustration and explanation only, and are not intended to limit the present application.
In view of the fact that in some specific application scenarios for implementing MEC in a non-independent deployment manner, an operator deploys a simplified sinking core network, the MEC is accessed to the sinking core network to develop actual services, and the sinking core network needs to perform information synchronization with the operator core network, the present application provides a method and an apparatus for implementing an edge computing network, in which a multi-access edge computing node sends a policy authorization creation request message to a policy control function entity in the sinking core network when receiving a session creation request, the policy control function entity identifies a first session, modifies session information of the first session, obtains policy update information according to the modified session information of the first session, and updates policy information of the policy control function entity in the operator core network according to the policy authorization creation service information in the policy update information and the policy authorization creation request message, therefore, the information synchronization between the sinking core network and the operator core network is realized.
Fig. 1 is a schematic diagram of an edge computing network architecture according to an embodiment of the present application. As shown in fig. 1, the edge computing network architecture includes an operator core network 110, a sinking core network 120, and a multi-access edge computing system (MEC system) 130, and the MEC system 130 accesses the sinking core network 120 to perform actual services.
The operator core Network 110 is a complete core Network of an operator, and includes an Authentication Server Function (AUSF) entity 111, a Unified Data Repository Function (UDR) entity 112, a Network storage Function (NRF) entity 113, a Policy Control Function (PCF) entity 114, a Network capability opening Function (NEF) entity 115, an Access and Mobility Management Function (AMF) entity 116, and a Session Management Function (SMF) entity 117.
The sinking core network 120 is a simplified core network specially configured and deployed by an operator, the sinking core network 120 is a network where the MEC system 130 accesses and develops actual services, and the sinking core network 120 includes a sinking Unified Data Repository Function (UDR-S) entity 121, a sinking Policy Control Function (PCF-S) entity 122, a sinking Access and Mobility Management Function (Access and Mobility Management Function-linking, AMF-S) entity 123, a sinking Session Management Function (SMF-S) entity 124, and a User Plane Function (UPF-S) entity 125.
The MEC system 130 is a multi-access edge computing system designed and deployed based on MEC technology, and includes several multi-access edge computing nodes.
It should be noted that the operator core network 110 and the sinking core network 120 may also comprise other functional entities (not shown in fig. 1).
It will be appreciated that in practice, the MEC system 130 has a more complex internal structure (not shown in fig. 1). For example, the MEC system has a hierarchical structure including a distributed host layer and a system layer, where the distributed host layer includes a data network, an MEC APP (multi-access edge computing Application), an MEC platform, and various corresponding service interfaces; the system layer comprises an MEC orchestrator and the like.
Fig. 2 is a flowchart of an edge computing network implementation method provided in a first embodiment of the present application, where the edge computing network implementation method is applicable to a policy control function entity. As shown in fig. 2, the edge computing network implementation method may include the following steps:
step S101, receiving a policy authorization creation request message sent by a multi-access edge computing node.
The main execution body of this embodiment is a current policy control function entity, and the current policy control function entity is a policy control function entity (also referred to as a second policy control function entity) in the sinking core network. When the multi-access edge computing node has the requirement of establishing the session, sending a policy authorization creation request message to the current policy control function entity, wherein the policy authorization creation request message comprises policy authorization creation service information.
In some application scenarios, an operator realizes the MEC in a non-independent deployment manner, specifically, the operator deploys a simplified sinking core network, and the MEC accesses the sinking core network to perform actual services. However, for such a non-independent deployment scenario, the information of the MEC is only transmitted and stored in the relevant network elements of the sinking core network, and the core network of the operator cannot acquire and store the information, so the operator needs to synchronize the information between the sinking core network and the core network of the operator. Therefore, a new method for implementing the edge computing network is provided, and a policy control function entity of the sinking core network implements the synchronization of the multi-access edge computing node information between the sinking core network and the operator core network.
In one embodiment, when the multi-access edge computing node receives a session establishment request, the multi-access edge computing node sends a policy authorization creation request message to the current policy control function entity, where the policy authorization creation request message may be sent in the form of an HTTP POST request or the like, and the policy authorization creation request message includes policy authorization creation service information. The policy authorization creation service information specifically includes MEC identification information, Address information of the MEC, Address information of the terminal, identity information of an MEC APP session context, and the like, where the Address information includes an IP (Internet Protocol) Address and/or a Media Access Control (MAC) Address; the policy authorization creation service information further includes some optional information, such as SUPI (user Permanent Identifier), GPSI (Generic Public user Identifier), data network information, bandwidth requirement information, traffic information, MEC APP Identifier information, traffic state information, priority indication information, MEC APP service provider information, and resource allocation information.
It should be noted that the session establishment request of the multi-access edge computing node may be a session request initiated by the MEC on the same terminal side actively, or a session request initiated by the terminal side to the MEC.
It should be noted that, after receiving the policy authorization creation request message, the current policy control function entity also stores the policy authorization creation service information in the policy authorization creation request message.
And step S102, creating service information according to the pre-stored session management information and the policy authorization, and identifying the first session.
Wherein, the first session is an affected session, and the pre-stored session management information may be information obtained from the session management function entity.
In one embodiment, the current policy control function entity creates service information according to pre-stored session management information and policy authorization, and identifies affected sessions, which are the first sessions.
It should be noted that identifying affected sessions includes current and future occurrence session identification techniques, which are not limited in this application.
And step S103, modifying the session information of the first session, and obtaining strategy updating information according to the modified session information of the first session.
The current strategy control function entity modifies the session information of the first session, the session management function entity establishes the session of the multi-access edge computing node, and strategy updating information is obtained according to the modified session information of the first session.
In one embodiment, the current policy control function entity creates service information according to the session information of the first session and the policy authorization, generates a session modification request message, and sends the session modification request message to the session management function entity of the sinking core network. And the session management functional entity receives the session modification request message, establishes a session of the multi-access edge computing node according to the session modification request message, generates a session modification response message based on the modified session information of the first session, and sends the session modification response message to the current policy control functional entity. And the current policy control functional entity receives a session modification response message returned by the session management functional entity, and generates policy update information according to the modified session information of the first session in the session modification response message.
And step S104, updating the strategy information of the first strategy control function entity according to the strategy updating information and the strategy authorization creation service information.
The first policy control functional entity is a functional entity in a core network.
In one embodiment, the current policy control function entity generates a policy update request message based on the policy update information and the policy authorization creation service information, and sends the policy update request message to the first policy control function entity. And the first policy control functional entity receives the policy updating request message, executes updating operation based on the policy updating request message and completes updating of the policy information, thereby realizing information synchronization between the operator core network and the sinking core network.
Fig. 3 is a flowchart of an edge computing network implementation method provided in a second embodiment of the present application, where the edge computing network implementation method is applicable to a policy control function entity, and is substantially the same as the first embodiment of the present application except that: after the policy information of the first policy control functional entity is updated, a policy update response message returned by the first policy control functional entity is also received, and the data of the first unified data warehouse functional entity is further updated. As shown in fig. 3, the edge computing network implementation method may include the following steps:
step S201, receives a policy authorization creation request message sent by a multi-access edge computing node.
Step S201 in this embodiment is the same as step S101 in the first embodiment of the present application, and is not described herein again.
Step S202, creating service information according to the pre-stored session management information and the policy authorization, and identifying the first session.
Step S202 in this embodiment is the same as step S102 in the first embodiment of the present application, and is not described herein again.
And step S203, modifying the session information of the first session, and acquiring policy update information according to the modified session information of the first session.
Step S203 in this embodiment is the same as step S103 in the first embodiment of this application, and is not described herein again.
Step S204, the strategy information of the first strategy control function entity is updated according to the strategy updating information and the strategy authorization creation service information.
Step S204 in this embodiment is the same as step S104 in the first embodiment of the present application, and is not described herein again.
Step S205, a policy update response message returned by the first policy control function entity is received.
The first policy control functional entity is a functional entity in a core network. After the first policy control function entity completes the policy information update, the update result may be sent to the current policy control function entity (i.e., the function entity in the sinking core network).
In one embodiment, after the first policy control function entity completes the policy information update, a policy update response message is generated according to the update result, and the policy update response message is sent to the current policy control function entity. The current strategy control functional entity receives a strategy updating response message sent by the first strategy control functional entity and obtains the result of the strategy updating information of the first strategy control functional entity according to the strategy updating response message.
Step S206, sending a data synchronization reminding message to the second unified data warehouse function entity, so that the second unified data warehouse function entity sends a data synchronization request message to the first unified data warehouse function entity, so that the first unified data warehouse function entity updates the session information of the multi-access edge computing node.
The second unified data warehouse functional entity is a functional entity in a sinking core network, and the first unified data warehouse functional entity is a functional entity in the core network. Specifically, after the first policy control function entity in the core network completes updating of the policy information, the first unified data warehouse function entity in the core network may also update the session information of the multi-access edge computing node accordingly.
In one embodiment, the current policy control functional entity receives a policy update response message returned by the first policy control functional entity, learns that the first policy control functional entity completes updating of the policy information, generates a data synchronization reminding message, and sends the data synchronization reminding message to the second unified data warehouse functional entity in the sinking core network. After receiving the data synchronization reminding message, the second unified data warehouse functional entity learns that the data synchronization requirement exists, and therefore the second unified data warehouse functional entity sends a data synchronization request message to the first unified data warehouse functional entity. And the first unified data warehouse functional entity receives the data synchronization request message and updates the session information of the multi-access edge computing node to realize the information synchronization between the operator core network and the sinking core network.
Fig. 4 is a flowchart of an edge computing network implementation method provided in a third embodiment of the present application, where the edge computing network implementation method is applicable to a policy control function entity, and is substantially the same as the first embodiment of the present application except that: after receiving a policy authorization creation request message sent by a multi-access edge computing node, judging whether the multi-access edge computing node subscribes to a policy authorization service, and executing corresponding operation according to a judgment result. As shown in fig. 4, the edge computing network implementation method may include the following steps:
step S301, receiving a policy authorization creation request message sent by a multi-access edge computing node.
Step S301 in this embodiment is the same as step S101 in the first embodiment of the present application, and is not described herein again.
Step S302, whether the multi-access edge computing node subscribes to the strategy authorization service is judged.
After the current policy control function entity receives the policy authorization creation request message of the multi-access edge computing node, it may first determine whether the multi-access edge computing node subscribes to the policy authorization service, and execute corresponding operations according to the determination result.
In one embodiment, the current policy control function entity sends a data query request message to a second unified data warehouse function entity in the sinking core network. And after receiving the data query request message, the second unified data warehouse functional entity queries the data stored in the second unified data warehouse functional entity, obtains the subscription information of the multi-access edge computing node, generates a data query response message according to the subscription information, and sends the data query response message to the current policy control functional entity. And the current policy control functional entity receives a data query response message returned by the second unified data warehouse functional entity, and judges whether the multi-access edge computing node subscribes the policy authorization service or not according to the subscription information of the multi-access edge computing node in the data query response message.
Step S303, when the multi-access edge computing node is judged not to subscribe the policy authorization service according to the subscription information of the multi-access edge computing node, sending a non-subscription policy authorization service prompt message to the multi-access edge computing node.
When the current policy control function entity judges that the multi-access edge computing node does not subscribe to the policy authorization service, the current policy control function entity can prompt the multi-access edge computing node not to subscribe to the related service.
In one embodiment, when the policy control function entity determines that the multi-access edge computing node does not subscribe to the policy authorization service according to the subscription information of the multi-access edge computing node, the policy control function entity sends a non-subscription policy authorization service prompt message to the multi-access edge computing node. And the multi-access edge computing node receives the non-subscription policy authorization service prompting message and learns the non-subscription policy authorization service.
Step S304, when the multi-access edge computing node is judged to subscribe the strategy authorization service, the first conversation is identified according to the pre-stored conversation management information and the strategy authorization creation service information.
Step S304 in this embodiment is the same as step S102 in the first embodiment of the present application, and is not described herein again.
Step S305, modifying the session information of the first session, and obtaining the policy updating information according to the modified session information of the first session.
Step S305 in this embodiment is the same as step S103 in the first embodiment of this application, and is not described herein again.
Step S306, updating the strategy information of the first strategy control function entity according to the strategy updating information and the strategy authorization creation service information.
Step S306 in this embodiment is the same as step S104 in the first embodiment of the present application, and is not described herein again.
Fig. 5 is a flowchart of an edge computing network implementation method provided in a fourth embodiment of the present application, where the edge computing network implementation method is applicable to a policy control function entity, and is substantially the same as the third embodiment of the present application, except that: after sending a non-subscription policy authorization service prompt message to the multi-access edge computing node, receiving a subscription policy authorization request message sent by the multi-access edge computing node, and executing subsequent operations according to the subscription policy authorization request message. As shown in fig. 5, the edge computing network implementation method may include the following steps:
step S401, receiving a policy authorization creation request message sent by a multi-access edge computing node.
Step S401 in this embodiment is the same as step S301 in the third embodiment of the present application, and is not described herein again.
Step S402, whether the multi-access edge computing node subscribes to the strategy authorization service is judged.
Step S402 in this embodiment is the same as step S302 in the third embodiment of the present application, and is not described herein again.
Step S403, when it is judged that the multi-access edge computing node does not subscribe the policy authorization service according to the subscription information of the multi-access edge computing node, sending a non-subscription policy authorization service prompt message to the multi-access edge computing node.
Step S403 in this embodiment is the same as step S303 in the third embodiment of the present application, and is not described herein again.
Step S404, receiving a subscription policy authorization request message sent by the multi-access edge computing node.
When the multi-access edge computing node learns that the multi-access edge computing node is not subscribed to the policy authorization service and needs to use the policy authorization service, the multi-access edge computing node may request the current policy control function entity to subscribe to the policy authorization service for the multi-access edge computing node to use the policy authorization service.
In one embodiment, the multi-access edge computing node sends a subscription policy authorization request message to the current policy control function entity, and the current policy control function entity receives the subscription policy authorization request message sent by the multi-access edge computing node to know that the multi-access edge computing node has a requirement for subscribing the policy authorization service.
Step S405, subscribing the policy authorization service for the multi-access edge computing node according to the subscription policy authorization request message, and generating a subscription policy authorization response message.
In one embodiment, when the policy control function entity learns that the multi-access edge computing node has a requirement for subscribing the policy authorization service according to the subscription policy authorization request message, the policy control function entity subscribes the policy authorization service for the multi-access edge computing node and generates a corresponding subscription policy authorization response message according to a subscription result.
Step S406, sending the subscription policy authorization response message to the multi-access edge computing node.
In one embodiment, the current policy control function entity sends a subscription policy authorization response message to the multi-access edge compute node. And the multi-access edge computing node receives the subscription policy authorization response message and acquires whether to successfully subscribe the policy authorization service according to the subscription policy authorization response message. And if the multi-access edge computing node successfully subscribes the policy authorization service, when the policy of the current policy control functional entity changes, the current policy control functional entity will actively send a prompt message to the multi-access edge computing node to inform the multi-access edge computing node that the policy of the current policy control functional entity changes.
Step S407, when the multi-access edge computing node is judged to subscribe the policy authorization service, the first session is identified according to the pre-stored session management information and the policy authorization creation service information.
Step S407 in this embodiment is the same as step S304 in the third embodiment of the present application, and is not described herein again.
Step S408, modify the session information of the first session, and obtain the policy update information according to the modified session information of the first session.
Step S408 in this embodiment is the same as step S305 in the third embodiment of the present application, and is not described herein again.
Step S409, updating the policy information of the first policy control function entity according to the policy update information and the policy authorization creation service information.
Step S409 in this embodiment is the same as step S306 in the third embodiment of the present application, and is not described herein again.
The steps of the above methods are divided for clarity, and the implementation may be combined into one step or split some steps, and the steps are divided into multiple steps, so long as the same logical relationship is included, which are all within the protection scope of the present patent; it is within the scope of the patent to add insignificant modifications to the algorithms or processes or to introduce insignificant design changes to the core design without changing the algorithms or processes.
Fig. 6 is a schematic block diagram of an edge computing network implementation apparatus according to a fifth embodiment of the present application, where the edge computing network implementation apparatus is applicable to a policy control function entity. As shown in fig. 6, the edge computing network implementing apparatus includes: a receiving module 501, an identifying module 502, a modifying module 503, an obtaining module 504 and an updating module 505.
A receiving module 501, configured to receive a policy authorization creation request message sent by a multi-access edge computing node.
In one embodiment, when the multi-access edge computing node receives the session establishment request, the multi-access edge computing node sends a policy authorization establishment request message to the current policy control function entity, and the current policy control function entity receives the policy authorization establishment request message through the receiving module 501. The policy authorization creation request message may be sent in the form of an HTTP POST request, and the policy authorization creation request message includes policy authorization creation service information. The policy authorization creation service information specifically comprises MEC identification information, MEC address information, terminal address information, MEC APP session context identity information and the like, wherein the address information comprises an IP address and/or an MAC address; the policy authorization creation service information further includes some optional information, such as SUPI, GPSI, data network information, bandwidth requirement information, traffic information, MEC APP identification information, traffic status information, priority indication information, MEC APP service provider information, and resource allocation information.
The identifying module 502 is configured to create service information according to the pre-stored session management information and the policy authorization, and identify the first session.
Wherein, the first session is an affected session, and the pre-stored session management information may be information obtained from the session management function entity.
In one embodiment, the current policy control function entity creates service information according to the pre-stored session management information and policy authorization, and identifies affected sessions, which are the first sessions, through the identification module 502.
A modifying module 503, configured to modify session information of the first session.
In one embodiment, the current policy control function entity creates service information according to the session information of the first session and the policy authorization, generates a session modification request message through the modification module 503, and sends the session modification request message to the session management function entity of the sinking core network. And the session management functional entity receives the session modification request message, establishes a session of the multi-access edge computing node according to the session modification request message, generates a session modification response message based on the modified session information of the first session, and sends the session modification response message to the current policy control functional entity. And the current policy control function entity receives a session modification response message returned by the session management function entity.
An obtaining module 504, configured to obtain policy update information according to the modified session information of the first session.
In one embodiment, the current policy control function entity obtains the policy update information through the obtaining module 504 according to the modified session information of the first session.
And an updating module 505, configured to update the policy information of the first policy control function entity according to the policy update information and the policy authorization creation service information.
The first policy control functional entity is a functional entity in a core network.
In one embodiment, the current policy control function entity generates a policy update request message based on the policy update information and the policy authorization creation service information through the update module 505, and sends the policy update request message to the first policy control function entity. And the first policy control functional entity receives the policy updating request message, executes updating operation based on the policy updating request message and completes updating of the policy information, thereby realizing information synchronization between the operator core network and the sinking core network.
It should be noted that each module referred to in this embodiment is a logical module, and in practical applications, one logical unit may be one physical unit, may be a part of one physical unit, and may be implemented by a combination of multiple physical units. In addition, in order to highlight the innovative part of the present application, a unit that is not so closely related to solving the technical problem proposed by the present application is not introduced in the present embodiment, but it does not indicate that no other unit exists in the present embodiment.
It is to be understood that the above embodiments are merely exemplary embodiments that are employed to illustrate the principles of the present application, and that the present application is not limited thereto. It will be apparent to those skilled in the art that various changes and modifications can be made therein without departing from the spirit and scope of the application, and these changes and modifications are to be considered as the scope of the application.

Claims (11)

1. An edge computing network implementation method is applied to a policy control functional entity, where the policy control entity is a functional entity of a sinking core network, and the method includes:
receiving a strategy authorization establishment request message sent by a multi-access edge computing node; wherein the policy authorization creation request message includes policy authorization creation service information;
establishing service information according to prestored session management information and the strategy authorization, and identifying a first session; wherein the first session is an affected session;
modifying the session information of the first session, and obtaining strategy updating information according to the modified session information of the first session;
updating the policy information of the first policy control function entity according to the policy updating information and the policy authorization creation service information; wherein, the first policy control function entity is a function entity in a core network.
2. The edge computing network implementation method of claim 1, wherein the policy authorization creation request message is a message sent to a second policy control function entity when the multi-access edge computing node receives a session establishment request; the second policy control function entity is a current policy control function entity, and the current policy control function entity is a function entity in a sinking core network.
3. The edge computing network implementation method of claim 1, wherein the modifying the session information of the first session and obtaining policy update information according to the modified session information of the first session comprises:
creating service information according to the session information of the first session and the policy authorization, and generating a session modification request message;
sending the session modification request message to a session management function entity;
receiving a session modification response message returned by the session management functional entity; wherein, the session modification response message is a message returned by the session management functional entity after establishing the session of the multi-access edge computing node according to the session modification request message, and the session modification response message includes the modified session information of the first session;
and generating the strategy updating information according to the modified session information of the first session.
4. The edge computing network implementation method of claim 1, wherein the updating the policy information of the first policy control function entity according to the policy update information and the policy authorization creation service information comprises:
generating a policy update request message based on the policy update information and the policy authorization creation service information;
and sending the policy updating request message to the first policy control function entity so that the first policy control function entity updates policy information based on the policy updating request message.
5. The edge computing network implementation method of claim 4, wherein after sending the policy update request message to the first policy control function entity, further comprising:
and receiving a strategy updating response message returned by the first strategy control functional entity.
6. The edge computing network implementation method of claim 5, wherein after receiving the policy update response message returned by the first policy control function entity, the method further comprises:
sending a data synchronization reminding message to a second unified data warehouse function entity so that the second unified data warehouse function entity sends a data synchronization request message to a first unified data warehouse function entity, and the first unified data warehouse function entity updates the session information of the multi-access edge computing node; the second unified data warehouse functional entity is a functional entity in a sinking core network, and the first unified data warehouse functional entity is a functional entity in the core network.
7. The method for implementing the edge computing network according to claim 1, wherein after receiving the policy authorization creation request message sent by the multi-access edge computing node, before identifying the first session according to the pre-stored session management information and the policy authorization creation service information, the method further comprises:
judging whether the multi-access edge computing node subscribes to a policy authorization service or not;
and when the multi-access edge computing node is judged to subscribe the policy authorization service, identifying the first session according to the pre-stored session management information and the policy authorization creation service information.
8. The edge computing network implementation method of claim 7, wherein the determining whether the multi-access edge computing node subscribes to a policy authorization service comprises:
sending a data query request message to a second unified data warehouse functional entity; wherein, the second unified data warehouse functional entity is a functional entity in a sinking core network;
receiving a data query response message returned by the second unified data warehouse functional entity; wherein, the data inquiry response message comprises the subscription information of the multi-access edge computing node;
and judging whether the multi-access edge computing node subscribes the strategy authorization service or not according to the subscription information of the multi-access edge computing node.
9. The method for implementing an edge computing network according to claim 8, wherein after determining whether the multi-access edge computing node subscribes to the policy authorization service according to subscription information of the multi-access edge computing node, the method further comprises:
and when judging that the multi-access edge computing node does not subscribe the policy authorization service according to the subscription information of the multi-access edge computing node, sending an unsubscribe policy authorization service prompt message to the multi-access edge computing node.
10. The edge computing network implementation method of claim 9, wherein after sending the unsubscribed policy authorization service hint message to the multi-access edge computing node, the method further comprises:
receiving a subscription policy authorization request message sent by the multi-access edge computing node;
subscribing the policy authorization service for the multi-access edge computing node according to the subscription policy authorization request message, and generating a subscription policy authorization response message;
and sending the subscription policy authorization response message to the multi-access edge computing node.
11. An edge computing network implementation apparatus, applied to a policy control function entity, where the policy control entity is a function entity of a sinking core network, the apparatus includes:
the receiving module is used for receiving a strategy authorization establishing request message sent by the multi-access edge computing node; wherein the policy authorization creation request message includes policy authorization creation service information;
the identification module is used for establishing service information according to prestored session management information and the strategy authorization and identifying the first session; wherein the first session is an affected session;
a modification module for modifying the session information of the first session;
the acquisition module is used for acquiring strategy updating information according to the modified session information of the first session;
the updating module is used for updating the strategy information of the first strategy control function entity according to the strategy updating information and the strategy authorization creation service information; wherein, the first policy control function entity is a function entity in a core network.
CN202011104890.2A 2020-10-15 2020-10-15 Edge computing network implementation method and device Active CN112243224B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011104890.2A CN112243224B (en) 2020-10-15 2020-10-15 Edge computing network implementation method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011104890.2A CN112243224B (en) 2020-10-15 2020-10-15 Edge computing network implementation method and device

Publications (2)

Publication Number Publication Date
CN112243224A CN112243224A (en) 2021-01-19
CN112243224B true CN112243224B (en) 2022-08-02

Family

ID=74168659

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011104890.2A Active CN112243224B (en) 2020-10-15 2020-10-15 Edge computing network implementation method and device

Country Status (1)

Country Link
CN (1) CN112243224B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113422727B (en) * 2021-06-17 2023-01-24 中国联合网络通信集团有限公司 Service processing method and device and electronic equipment
CN115396865B (en) * 2022-09-02 2023-06-16 广州爱浦路网络技术有限公司 Terminal roaming data processing method and network equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110944330A (en) * 2018-09-21 2020-03-31 华为技术有限公司 MEC platform deployment method and device
CN111565404A (en) * 2020-04-15 2020-08-21 中国联合网络通信集团有限公司 Data distribution method and device
CN111656754A (en) * 2018-07-13 2020-09-11 三星电子株式会社 Method for edge computing service and electronic device thereof
KR20200115155A (en) * 2019-03-28 2020-10-07 삼성전자주식회사 Method and apparatus for enabling connectivity for edge computing service to device

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190230484A1 (en) * 2016-05-09 2019-07-25 Nokia Solutions And Networks Oy Policy control with mobile edge computing

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111656754A (en) * 2018-07-13 2020-09-11 三星电子株式会社 Method for edge computing service and electronic device thereof
CN110944330A (en) * 2018-09-21 2020-03-31 华为技术有限公司 MEC platform deployment method and device
KR20200115155A (en) * 2019-03-28 2020-10-07 삼성전자주식회사 Method and apparatus for enabling connectivity for edge computing service to device
CN111565404A (en) * 2020-04-15 2020-08-21 中国联合网络通信集团有限公司 Data distribution method and device

Also Published As

Publication number Publication date
CN112243224A (en) 2021-01-19

Similar Documents

Publication Publication Date Title
CN109842906B (en) Communication method, device and system
CN110679185B (en) Network slicing service function
US11258822B2 (en) Network function service discovery method and device
CN108833181B (en) NG-CN network slice system and network slice selection method
WO2017076086A1 (en) Method, apparatus and system for opening network slicing capability
CN113115480A (en) Address information sending method, address information obtaining method, address information sending device, address information obtaining device, address information equipment and address information medium
US10764742B1 (en) Subscriber management with a stateless network architecture in a fifth generation (5G) network
WO2020015634A1 (en) Mec information acquisition method and device
CN111615844B (en) Method and apparatus for selecting a session management entity serving a wireless communication device
CN111565404A (en) Data distribution method and device
EP3445072B1 (en) Mobile radio communication network and method for associating a mobile radio terminal device to a network slice instance of a mobile radio communication network
CN113572835B (en) Data processing method, network element equipment and readable storage medium
CN112243224B (en) Edge computing network implementation method and device
WO2022052875A1 (en) Terminal cross-region communication method, network element device, and storage medium
CN112533177A (en) Method, device, apparatus and medium for providing and discovering moving edge calculation
CN116668511A (en) Data processing method, network element equipment and readable storage medium
CN114158030B (en) Session binding method, system and storage medium
CN117643042A (en) Notification of results regarding 5 GC-related actions
EP4207676A1 (en) Method and apparatus for establishing secure communication
CN115413014A (en) Network resource service method, device, system, readable medium and electronic equipment
CN114205819A (en) QoS calling method and device based on hybrid networking, and electronic equipment
EP4287689B1 (en) Method for using a terminal device in a telecommunications network, wherein, regarding a specific user equipment functionality, the telecommunications network initializes or provides a logical user equipment entity or functionality, system for using a terminal device in a telecommunications network, terminal device, program and computer-readable medium
US11218550B2 (en) Setup of communication session
CN115103423B (en) Service information determining method, device, electronic equipment and storage medium
EP4366344A1 (en) Address service entity selection method and apparatus, and electronic device and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant