CN112804716B - Configuration method and device of data limit value and storage medium - Google Patents

Configuration method and device of data limit value and storage medium Download PDF

Info

Publication number
CN112804716B
CN112804716B CN202011592100.XA CN202011592100A CN112804716B CN 112804716 B CN112804716 B CN 112804716B CN 202011592100 A CN202011592100 A CN 202011592100A CN 112804716 B CN112804716 B CN 112804716B
Authority
CN
China
Prior art keywords
data limit
user terminal
limit value
terminal according
session request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011592100.XA
Other languages
Chinese (zh)
Other versions
CN112804716A (en
Inventor
杨登富
李学成
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Future Communication Technology Chongqing Co Ltd
Original Assignee
Lenovo Future Communication Technology Chongqing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lenovo Future Communication Technology Chongqing Co Ltd filed Critical Lenovo Future Communication Technology Chongqing Co Ltd
Priority to CN202011592100.XA priority Critical patent/CN112804716B/en
Publication of CN112804716A publication Critical patent/CN112804716A/en
Application granted granted Critical
Publication of CN112804716B publication Critical patent/CN112804716B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/16Central resource management; Negotiation of resources or communication parameters, e.g. negotiating bandwidth or QoS [Quality of Service]
    • H04W28/18Negotiating wireless communication parameters
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/06Optimizing the usage of the radio link, e.g. header compression, information sizing, discarding information

Abstract

The invention discloses a data limit value configuration method, a data limit value configuration device and a storage medium, wherein the method comprises the following steps: receiving a first session request sent by a user terminal, determining a first data limit value of the user terminal according to the first session request, sending a corresponding second session request to at least one uplink network element node, receiving response information corresponding to the second session request sent by the at least one uplink network element node, determining a second data limit value of the user terminal according to the response information, and configuring a third data limit value of the user terminal according to the first data limit value and the second data limit value. In the embodiment of the invention, the first data limit value of the user terminal and the second data limit value configured by at least one uplink network element node for the user terminal are obtained through calculation according to the preset configuration strategy, so that a reasonable third data limit value can be configured for the user terminal, the user terminal sends the message by using the third data limit value, and the message cannot have a fragmentation problem when the message passes through the uplink network element node.

Description

Configuration method and device of data limit value and storage medium
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a method and an apparatus for configuring a data limit value, and a storage medium.
Background
The 5G core network system may be divided into a Control Plane (CP) and a User Plane (UP). The control plane includes access and mobility management (AMF) network elements, session Management Function (SMF) network elements, policy management function (PCF) network elements, and the like. The user plane includes a User Plane Function (UPF) network element. Both the control plane and the user plane communicate based on the N4 interface defined by the 3gpp TS29.244 standard.
In the process of interaction between the user terminal and the data network, the 5G core network system needs to configure a data limit value for the user terminal, namely, determines the maximum length of uplink and downlink messages passing through the user terminal. Currently, user terminals typically acquire data limit values by initiating a Protocol Data Unit (PDU) session creation request to the 5G core network system. In the PDU session creation process of the 5G core network system, the SMF network element configures a data limit value for the user terminal according to the self strategy, but the data limit value of the user terminal is different from the data limit value of the UPF network element of the user plane due to different configuration strategies of the SMF network element and the UPF network element. Therefore, if the user terminal sends a message according to the data limit value configured by the SMF network element, the message fragmentation problem will occur when the message passes through the network element of the user plane, which will greatly consume the memory resource and performance of the network element of the user plane (such as the UPF network element) and will increase the time for forwarding the message.
Content of the application
The embodiment of the invention provides a method, a device and a storage medium for configuring a data limit value, which are used for solving the problem that a user terminal in the prior art sends a message according to the data limit value configured by an SMF network element, and the message fragments occur when the message passes through the network element of a user plane.
In order to solve the above problem, in a first aspect, an embodiment of the present invention provides a method for configuring a data limit, including: receiving a first session request sent by a user terminal; determining a first data limit value of the user terminal according to the first session request, and sending a corresponding second session request to at least one uplink network element node; receiving response information corresponding to a second session request sent by at least one uplink network element node; determining a second data limit value of the user terminal according to the response information; and configuring a third data limit of the user terminal according to the first data limit and the second data limit.
Optionally, determining the first data limit of the user terminal according to the first session request includes: determining a protocol address type corresponding to the first session request according to the first session request and a preset configuration strategy; and determining a first data limit value of the user terminal according to the preset data limit value corresponding to the protocol address type.
Optionally, the reply information comprises protocol address information and/or session endpoint identifier information, the protocol address information and/or session endpoint identifier information comprising extension information.
Optionally, determining the second data limit of the user terminal according to the response information includes: and determining a second data limit value of the user terminal according to the extension information.
Optionally, the number of the uplink network element nodes is greater than or equal to 2, and determining the second data limit value of the user terminal according to the response information includes: and determining a second data limit value of the user terminal according to the minimum value in each extension information.
Optionally, configuring a third data limit of the user terminal according to the first data limit and the second data limit, including: and configuring a third data limit of the user terminal according to the minimum value of the first data limit and the second data limit.
In a second aspect, an embodiment of the present invention provides a configuration apparatus for a data limit value, including: a first receiving unit, configured to receive a first session request sent by a user terminal; a first determining unit, configured to determine a first data limit of the user terminal according to the first session request, and send a corresponding second session request to at least one uplink network element node; a second receiving unit, configured to receive response information corresponding to a second session request sent by at least one uplink network element node; a second determining unit, configured to determine a second data limit value of the user terminal according to the response information; and the configuration unit is used for configuring a third data limit value of the user terminal according to the first data limit value and the second data limit value.
Optionally, the reply information comprises protocol address information and/or session endpoint identifier information, the protocol address information and/or session endpoint identifier information comprising extension information.
In a third aspect, an embodiment of the present invention provides a configuration device for a data limit, including: at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor to cause the at least one processor to perform a method of configuring a data limit as in the first aspect or any implementation of the first aspect.
In a fourth aspect, an embodiment of the present invention provides a computer-readable storage medium storing computer instructions for causing a computer to perform a method for configuring a data limit as in the first aspect or any implementation manner of the first aspect.
The method, the device and the storage medium for configuring the data limit value provided by the embodiment of the invention are used for determining the first data limit value of the user terminal according to the first session request, sending the corresponding second session request to at least one uplink network element node, receiving response information corresponding to the second session request sent by the at least one uplink network element node, determining the second data limit value of the user terminal according to the response information, configuring the third data limit value of the user terminal according to the first data limit value and the second data limit value, so that the data limit value configuring equipment, such as an SMF network element, can refer to the first data limit value of the user terminal calculated according to the preset configuration strategy when the third data limit value of the user terminal is configured, and can refer to the second data limit value configured by at least one uplink network element node for the user terminal, thereby configuring a reasonable third data limit value for the user terminal, so that the user terminal uses the third data limit value to send a message, the message can not cause a problem that the message is divided when the message passes through the at least one uplink network element node, and the additional network element can not consume additional resources and can not be forwarded.
The foregoing description is only an overview of the technical solutions of the present application, and may be implemented according to the content of the specification in order to make the technical means of the present application more clearly understood, and in order to make the above-mentioned and other objects, features and advantages of the present application more clearly understood, the following detailed description of the present application will be given.
Drawings
FIG. 1 is a flow chart of a method for configuring a data limit in an embodiment of the invention;
FIG. 2 is a flow chart of SMF and UPF interactions in an embodiment of the present invention;
FIG. 3 is a schematic diagram of a configuration device for data limit values according to an embodiment of the present invention;
fig. 4 is a schematic hardware structure of a configuration device for data limit in an embodiment of the present invention.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present invention more apparent, the technical solutions of the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention, and it is apparent that the described embodiments are some embodiments of the present invention, but not all embodiments of the present invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to fall within the scope of the invention.
The embodiment of the invention provides a data limit configuration method, as shown in fig. 1, comprising the following steps:
s101, receiving a first session request sent by a user terminal; specifically, in the process of interaction between the user terminal and the data network, the 5G core network system needs to configure a data limit value for the user terminal, that is, determine the maximum length of the uplink and downlink messages passing through the user terminal. In the embodiment of the invention, the executed main body can be a configuration device for the data limit value. In the embodiment of the present invention, the SMF with the execution body being the control plane in the 5G core network system is taken as an example, but not limited thereto. When the user terminal needs to interact with the data network, the first session request can be sent to the SMF of the 5G core network system, so that the SMF can receive the first session request sent by the user terminal.
S102, determining a first data limit value of a user terminal by a first session request, and sending a corresponding second session request to at least one uplink network element node; specifically, when the SMF receives the first session request sent by the ue, the first data limit may be configured for the ue according to a preset configuration policy of the SMF. And simultaneously, sending a second session request corresponding to the first session request to at least one uplink network element node. In the embodiment of the present invention, the uplink network element node may be a network element node of a user plane, for example, but not limited to, a UPF network element.
S103, receiving response information corresponding to a second session request sent by at least one uplink network element node; specifically, after the at least one uplink network element node receives the second session request, if the second session request is received, a second data limit value may be configured for the user terminal according to an algorithm mechanism built in the at least one uplink network element node, and the second data limit value is set in a response message corresponding to the second session request, and the response message corresponding to the second session request is sent to the SMF. The SMF may receive response information corresponding to the second session request sent by the at least one uplink network element node.
S104, determining a second data limit value of the user terminal according to the response information; specifically, since the response information carries the second data limit value, the second data limit value of the user terminal can be obtained through analysis of the response information.
S105, configuring a third data limit value of the user terminal according to the first data limit value and the second data limit value. Specifically, by comprehensively analyzing the first data limit value and the second data limit value, a reasonable third data limit value can be determined.
According to the configuration method of the data limit value, the first data limit value of the user terminal is determined according to the first session request, the corresponding second session request is sent to at least one uplink network element node, response information corresponding to the second session request sent by the at least one uplink network element node is received, the second data limit value of the user terminal is determined according to the response information, the third data limit value of the user terminal is configured according to the first data limit value and the second data limit value, and therefore the data limit value configuration equipment, such as an SMF network element, can refer to the first data limit value of the user terminal calculated according to the preset configuration strategy when the third data limit value of the user terminal is configured, and can refer to the second data limit value configured by at least one uplink network element node for the user terminal, so that the user terminal can configure a reasonable third data limit value for the user terminal, and therefore the user terminal can not cause a problem of fragmentation when the message passes through the at least one uplink network element node, the problem of not consuming additional resources of the at least one uplink network element and not increasing the time of the message can not be transmitted.
In an alternative embodiment, in step S102, determining the first data limit of the user terminal according to the first session request may specifically include: determining a protocol address type corresponding to the first session request according to the first session request and a preset configuration strategy; and determining a first data limit value of the user terminal according to the preset data limit value corresponding to the protocol address type.
Specifically, in the SMF, a first data limit value that can be adopted by the user terminal under different protocol address types may be preset. After the SMF receives the first session request, if a protocol address type of the first session request, for example, IPv4, IPv6, etc., is specified in the preset configuration policy, a protocol address type corresponding to the first session request may be determined according to the first session request and the preset configuration policy, so that a first data limit that may be adopted by the user terminal under the corresponding protocol address type may be found by using the protocol address type corresponding to the first session request, thereby obtaining a first data limit of the user terminal. If the protocol address type of the first session request is not specified in the preset configuration policy, the first data limit of the user terminal may be determined by a default value set in the SMF.
Because the types of the protocol addresses corresponding to the first session request are limited, the first data limit value which can be adopted by the user terminal under different protocol address types is preset in the SMF, and the first data limit value of the user terminal can be rapidly and accurately determined according to the protocol address types by determining the protocol address type corresponding to the first session request.
In an alternative embodiment, in step S103, the reply information comprises protocol address information and/or session endpoint identifier information, which comprises extension information.
Specifically, for the uplink network element node, the protocol address information and/or the session endpoint identifier information may be added to the response information corresponding to the second session request, and a custom extension field may be added behind the standard message format field of the protocol address and/or the session endpoint identifier, where the length of the extension field is within the length range of the standard message format field. The extension information includes an extension field and a value of the extension field.
The self-defined extension field is added behind the standard message format field of the protocol address and/or the session endpoint identifier, so that the second data limit value of the user equipment calculated by the uplink network element node can be added into the extension field, and the SMF can identify the extension information to obtain the second data limit value of the user equipment; and the invention is set in such a way, which is convenient for the extension of other fields of the following 3GPP, and for the SMF which does not support the invention, the field of the 3GPP standard message format can be still understood based on the original message identification rule, so that the compatibility problem is avoided.
For better understanding of the present invention, in the embodiment of the present invention, UPF is taken as an uplink network element node, and 3gpp ts29.244 protocol address is taken as an example for illustration. The standard message format field of the 3gpp ts29.244 protocol address is shown in table 1, and the message format field of the 3gpp ts29.244 protocol address with the addition of the custom extension field is shown in table 2.
TABLE 1
Figure BDA0002869511590000081
TABLE 2
Figure BDA0002869511590000082
The interpretation of the newly added extension field is as follows:
bit 1: MTUv6, suitable for IPv6 first session use, when the bit is 0, the 'MTUv 6' field does not exist, when the bit is 1, the 'MTUv 6' field exists, and the value of the 'MTUv 6' field is the second data limit value calculated by UPF, namely, the monitored MTUv6.
Bit 2: MTUv4, suitable for IPv4 first session use, when the bit is 0, the 'MTUv 4' field does not exist, when the bit is 1, the 'MTUv 4' field exists, and the value of the 'MTUv 4' field is the second data limit value calculated by UPF, namely, the monitored MTUv4.
Bit 3-Bit 8: spare, free field, can be used for expansion of other fields.
As shown in fig. 2, the SMF and the UPF are connected through an N4 channel. When the SMF performs the first session creation procedure, i.e. the PDU session creation procedure, the SMF sends a corresponding second session creation request, i.e. the PFCP session creation request, to the UPF. If the UPF accepts the request, the second session creation request response message, i.e. the PFCP session creation response message, carries the user equipment protocol address information, i.e. the 3gpp ts29.244 protocol address, including a newly added Maximum Transmission Unit (MTU) related field, i.e. MTUv4/MTUv6. If the second session corresponds to an IPv4 first session and/or an IPv6 first session, bit1 and/or bit2 in the extension field of the 3gpp ts29.244 protocol address is set to 1, and carries the corresponding second data limit value "triggered MTUv4" and/or "triggered MTUv6".
In a subsequent flow, as shown in fig. 2, which may involve the SMF performing the first session modification, the SMF sends a corresponding second session modification request, i.e. a PFCP session modification request, to the UPF. If the UPF accepts the request, the second session modification request response message, namely the PFCP session modification response message, carries the user equipment protocol address information, namely the 3gpp ts29.244 protocol address, and includes a newly added MTU related field, namely MTUv4/MTUv6. If the second session corresponds to an IPv4 first session and/or an IPv6 first session, bit1 and/or bit2 in the extension field of the 3gpp ts29.244 protocol address is set to 1, and carries the corresponding second data limit value "triggered MTUv4" and/or "triggered MTUv6".
The second session creation/modification request includes interfaces, the number of interfaces and the type of the first session, which need to be configured at the UPF end when the first session is created/modified. Each interface is an interface where the UPF connects with other network element nodes (excluding SMFs). After the UPF accepts the second session request sent by the SMF, a second data limit may be configured for the user device according to a built-in algorithm mechanism.
It should be noted that, since the interfaces, the number of interfaces, and the first session type that need to be configured at the UPF end may be different when the first session is created and the first session is modified, the second data limit value carried in the second session creation response message may be different from the value of the second data limit value carried in the second session modification response message.
In calculating the second data limit, a specific algorithm mechanism may be:
(1) If the first session exists with an N3 interface at the UPF
N3_mtuv4=n3 interface IPv4 MTU-GTPU encapsulation header length-VxVLAN header length (if VxLAN encapsulation exists) -maximum IP Sec encapsulation format overhead length (if IP Sec and configuration of the corresponding encapsulation format exist) -GRE header overhead (if GRE encapsulation exists);
n3_mtuv6=n3 interface IPv6 MTU-GTPU encapsulation header length-VxVLAN header length if VxLAN encapsulation is present-GRE header overhead if GRE encapsulation is present.
(2) If the first session has 0 to multiple N6 interfaces in the UPF, the minimum MTU value for that type of interface is selected,
N6_MTUv4=MIN_FUNC{
the length of the IPv4 MTU-VxVLAN header of N6 interface 1 (if VxLAN encapsulation exists) -the maximum length of the IP Sec encapsulation format overhead (if IP Sec and configuration of the corresponding encapsulation format exist) -the GRE header overhead (if GRE encapsulation exists),
the length of the IPv4 MTU-VxVLAN header of the N6 interface 2 (if VxLAN encapsulation exists) -the maximum length of the IP Sec encapsulation format overhead (if IP Sec and configuration of the corresponding encapsulation format exist) -the GRE header overhead (if GRE encapsulation exists),
…};
N6_MTUv6=MIN_FUNC{
the length of the IPv6 MTU-VxVLAN header for N6 interface 1 (if VxLAN encapsulation exists) -GRE header overhead (if GRE encapsulation exists),
the length of the IPv6 MTU-VxVLAN header for N6 interface 2 (if VxLAN encapsulation exists) -GRE header overhead (if GRE encapsulation exists),
…}。
(3) If the first session has 0 to multiple N9 interfaces in the UPF, the minimum MTU value for that type of interface is selected,
N9_MTUv4=MIN_FUNC{
the length of IPv4 MTU-GTPU encapsulation header of N9 interface 1-length of VxVLAN header (if VxLAN encapsulation exists) -maximum length of IP Sec encapsulation format overhead (if IP Sec and configuration of the corresponding encapsulation format exist) -GRE header overhead (if GRE encapsulation exists),
the length of IPv4 MTU-GTPU encapsulation header of N9 interface 2-length of VxVLAN header (if VxLAN encapsulation exists) -maximum length of IP Sec encapsulation format overhead (if IP Sec and configuration of the corresponding encapsulation format exist) -GRE header overhead (if GRE encapsulation exists),
…};
N9_MTUv6=MIN_FUNC{
the length of IPv6 MTU-GTPU encapsulation header of N9 interface 1-length of VxVLAN header if VxLAN encapsulation is present) -GRE header overhead if GRE encapsulation is present,
the length of IPv6 MTU-GTPU encapsulation header of N9 interface 2-length of VxVLAN header if VxLAN encapsulation is present) -GRE header overhead if GRE encapsulation is present,
…}。
(4) If there is the PDU Session present at the UPF at 0 to multiple N19 interfaces, the minimum MTU value for that type of interface is selected,
N19_MTUv4=MIN_FUNC{
the length of IPv4 MTU-GTPU encapsulation header of N9 interface 1-length of VxVLAN header (if VxLAN encapsulation exists) -maximum length of IP Sec encapsulation format overhead (if IP Sec and configuration of the corresponding encapsulation format exist) -GRE header overhead (if GRE encapsulation exists),
the length of IPv4 MTU-GTPU encapsulation header of N9 interface 2-length of VxVLAN header (if VxLAN encapsulation exists) -maximum length of IP Sec encapsulation format overhead (if IP Sec and configuration of the corresponding encapsulation format exist) -GRE header overhead (if GRE encapsulation exists),
…};
N19_MTUv6=MIN_FUNC{
the length of IPv6 MTU-GTPU encapsulation header of N9 interface 1-length of VxVLAN header if VxLAN encapsulation is present) -GRE header overhead if GRE encapsulation is present,
the length of IPv6 MTU-GTPU encapsulation header of N9 interface 2-length of VxVLAN header if VxLAN encapsulation is present) -GRE header overhead if GRE encapsulation is present,
…}。
(5)min_MTUv4=MIN_FUNC{
n3_mtuv4 (if present),
n6_mtuv4 (if present),
n9_mtuv4 (if present),
n19_mtuv4 (if present) }.
min_MTUv6=MIN_FUNC{
N3_mtuv6 (if present),
n6_mtuv6 (if present),
n9_mtuv6 (if present),
n19_mtuv6 (if present) }.
(6) If the first session is of IPv4 type, suggested MTUv4 = min_mtuv4; if the first session is of IPv6 type, suggested MTUv6 = min_mtuv6; if the first session is of the IPv4v6 type, the Suggested mtuv4=min_mtuv4, the Suggested mtuv6=min_mtuv6.
In an alternative embodiment, step S104, determining the second data limit value of the user terminal according to the response information may include: and determining a second data limit value of the user terminal according to the extension information.
Specifically, by identifying the value of the extension field in the extension information, a second data limit value of the user terminal may be obtained. Since the SMF can identify the extension information, the SMF can simply and quickly obtain the second data limit of the user equipment by determining the second data limit of the user terminal according to the extension information.
In an alternative embodiment, when the number of the uplink network element nodes is greater than or equal to 2, step S104, determining the second data limit value of the user terminal according to the response information may include: and determining a second data limit value of the user terminal according to the minimum value in each extension information.
Specifically, by analyzing the values in each extension information, the minimum value in each extension information can be determined, which can be determined as the second data limit value of the user terminal.
Because each uplink network element node can configure the second data limit value of the user terminal, and the second data limit values calculated by different uplink network element nodes may be different, when the number of the uplink network element nodes is greater than or equal to 2, the second data limit value of the user terminal is determined according to the minimum value in each extension information, the determined second data limit value of the user terminal can be the minimum value in the second data limit calculated by each uplink network element node, and therefore, when a message sent by the user terminal passes through each uplink network element node, the problem of message fragmentation does not occur.
In an alternative embodiment, step S105, configuring the third data limit of the user terminal according to the first data limit and the second data limit may include: and configuring a third data limit of the user terminal according to the minimum value of the first data limit and the second data limit.
Specifically, the first data limit comprises a first IPv4 data limit and/or a first IPv6 data limit, etc., and the second data limit comprises a second IPv4 data limit and/or a first IPv6 data limit, etc. The third data limit comprises a third IPv4 data limit and/or a third IPv6 data limit, etc. For a first session of the IPv4 protocol type, the SMF selects a minimum of the first IPv4 data limit and the second IPv4 data limit as a third data limit for the user terminal. For a first session of the IPv6 protocol type, the SMF selects a minimum of the first IPv6 data limit and the second IPv6 data limit as a third data limit for the user terminal. For a first session of the IPv4v6 protocol type, the SMF processes based on different IP versions, the SMF selects a minimum of the first IPv4 data limit and the second IPv4 data limit as a third IPv4 data limit, and selects a minimum of the first IPv6 data limit and the second IPv6 data limit as a third IPv6 data limit.
By adopting the minimum value in the first data limit value and the second data limit value to configure the third data limit value of the user terminal, the third data limit value of the user terminal can be ensured to be within the second data limit value configured for the user equipment by the uplink network element node, the message fragmentation is prevented, and the larger third data limit value configured for the user equipment can be met.
The embodiment of the invention also provides a device for configuring the data limit value, as shown in fig. 3, which comprises: a first receiving unit 201, configured to receive a first session request sent by a user terminal; the specific implementation manner is detailed in the description of step S101 in the foregoing embodiment, and will not be repeated here. A first determining unit 202, configured to determine a first data limit of the user terminal according to the first session request, and send a corresponding second session request to at least one uplink network element node; the specific implementation manner is detailed in the description of step S102 in the above embodiment, and will not be repeated here. A second receiving unit 203, configured to receive response information corresponding to a second session request sent by at least one uplink network element node; the specific implementation manner is detailed in the description of step S103 in the above embodiment, and will not be repeated here. A second determining unit 204, configured to determine a second data limit value of the user terminal according to the response information; the detailed description of step S104 in the above embodiment is omitted here for brevity. A configuration unit 205, configured to configure a third data limit of the user terminal according to the first data limit and the second data limit. The specific implementation manner is detailed in the description of step S105 in the above embodiment, and will not be repeated here.
The configuration device for data limit values provided in the embodiment of the present invention determines the first data limit value of the user terminal according to the first session request by receiving the first session request sent by the user terminal, and sends the corresponding second session request to at least one uplink network element node, receives response information corresponding to the second session request sent by at least one uplink network element node, determines the second data limit value of the user terminal according to the response information, configures the third data limit value of the user terminal according to the first data limit value and the second data limit value, so that the data limit value configures the device, such as the SMF network element, when the third data limit value of the user terminal is configured, the first data limit value of the user terminal calculated according to the preset configuration policy of the device can be referred to, and the second data limit value configured by at least one uplink network element node can be referred to the user terminal, so that a reasonable third data limit value is configured for the user terminal, so that when the message passes through the at least one uplink network element node, the message will not be fragmented, and thus the problem of at least one additional uplink network element will not be consumed, and the memory performance of the message will not be increased.
In an alternative embodiment, the reply information in the second receiving unit 203 comprises protocol address information and/or session endpoint identifier information comprising extension information.
Specifically, for the uplink network element node, the protocol address information and/or the session endpoint identifier information may be added to the response information corresponding to the second session request, and a custom extension field may be added behind the standard message format field of the protocol address and/or the session endpoint identifier, where the length of the extension field is within the length range of the standard message format field. The extension information includes an extension field and a value of the extension field.
The self-defined extension field is added behind the standard message format field of the protocol address and/or the session endpoint identifier, so that the second data limit value of the user equipment calculated by the uplink network element node can be added into the extension field, and the SMF can identify the extension information to obtain the second data limit value of the user equipment; and the invention is set in such a way, which is convenient for the extension of other fields of the following 3GPP, and for the SMF which does not support the invention, the field of the 3GPP standard message format can be still understood based on the original message identification rule, so that the compatibility problem is avoided.
Based on the same inventive concept as the method for configuring a data limit value in the foregoing embodiment, the present invention further provides a device for configuring a data limit value, as shown in fig. 4, including: processor 31 and memory 32, wherein processor 31 and memory 32 may be connected by a bus or otherwise, as illustrated in fig. 4 by way of example by a bus connection.
The processor 31 may be a central processing unit (Central Processing Unit, CPU). The processor 31 may also be other general purpose processors, digital signal processors (Digital Signal Processor, DSP), application specific integrated circuits (Application Specific Integrated Circuit, ASIC), field programmable gate arrays (Field-Programmable Gate Array, FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, or a combination thereof.
The memory 32 is used as a non-transitory computer readable storage medium for storing non-transitory software programs, non-transitory computer executable programs, and modules, such as program instructions/modules corresponding to the method for configuring data limit values in the embodiments of the present invention. The processor 31 executes various functional applications of the processor and data processing, i.e. implements the configuration method of the data limit values in the above-described method embodiments, by running non-transitory software programs, instructions and modules stored in the memory 32.
The memory 32 may include a storage program area that may store an operating system, at least one application program required for functions, and a storage data area; the storage data area may store data created by the processor 31, etc. In addition, the memory 32 may include high-speed random access memory, and may also include non-transitory memory, such as at least one magnetic disk storage device, flash memory device, or other non-transitory solid state storage device. In some embodiments, memory 32 may optionally include memory located remotely from processor 31, which may be connected to processor 31 via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
One or more of the modules described above are stored in the memory 32 and when executed by the processor 31 perform the method of configuring data limits in the embodiment shown in fig. 1.
The specific details of the configuration device for the data limit may be understood correspondingly with reference to the corresponding related descriptions and effects in the embodiment shown in fig. 1, which are not described herein.
It will be appreciated by those skilled in the art that implementing all or part of the above-described embodiment method may be implemented by a computer program to instruct related hardware, where the program may be stored in a computer readable storage medium, and the program may include the above-described embodiment method when executed. Wherein the storage medium may be a magnetic Disk, an optical Disk, a Read-Only Memory (ROM), a random access Memory (Random Access Memory, RAM), a Flash Memory (Flash Memory), a Hard Disk (HDD), or a Solid State Drive (SSD); the storage medium may also comprise a combination of memories of the kind described above.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable information processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable information processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable information processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable information processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
It will be apparent to those skilled in the art that various modifications and variations can be made to the present invention without departing from the spirit or scope of the invention. Thus, it is intended that the present invention also include such modifications and alterations insofar as they come within the scope of the appended claims or the equivalents thereof.

Claims (7)

1. A method of configuring a data limit, comprising:
receiving a first session request sent by a user terminal;
determining a first data limit value of the user terminal according to the first session request, and sending a corresponding second session request to at least one uplink network element node;
receiving response information corresponding to a second session request sent by the at least one uplink network element node;
determining a second data limit value of the user terminal according to the response information;
configuring a third data limit of the user terminal according to the first data limit and the second data limit to ensure that the message is not fragmented when the message passes through the at least one uplink network element node;
wherein the reply information comprises protocol address information and/or session endpoint identifier information, the protocol address information and/or session endpoint identifier information comprising extension information; in a corresponding manner,
the determining the second data limit value of the user terminal according to the response information comprises the following steps: and determining a second data limit value of the user terminal according to the extension information.
2. The method for configuring a data limit according to claim 1, wherein said determining a first data limit of the user terminal according to the first session request comprises:
determining a protocol address type corresponding to the first session request according to the first session request and a preset configuration strategy;
and determining a first data limit value of the user terminal according to the preset data limit value corresponding to the protocol address type.
3. The method for configuring data limit values according to claim 1, wherein the number of the uplink network element nodes is 2 or more,
the determining the second data limit value of the user terminal according to the response information comprises the following steps:
and determining a second data limit value of the user terminal according to the minimum value in each piece of extension information.
4. A method of configuring a data limit according to any of claims 1-3, wherein said configuring a third data limit for a user terminal based on said first data limit and said second data limit comprises:
and configuring a third data limit of the user terminal according to the minimum value of the first data limit and the second data limit.
5. A data limit configuration device, comprising:
a first receiving unit, configured to receive a first session request sent by a user terminal;
a first determining unit, configured to determine a first data limit of a user terminal according to the first session request, and send a corresponding second session request to at least one uplink network element node;
a second receiving unit, configured to receive response information corresponding to a second session request sent by the at least one uplink network element node;
a second determining unit, configured to determine a second data limit value of the user terminal according to the response information;
the configuration unit is used for configuring a third data limit value of the user terminal according to the first data limit value and the second data limit value so as to ensure that the message is not fragmented when the message passes through the at least one uplink network element node;
wherein the reply information comprises protocol address information and/or session endpoint identifier information, the protocol address information and/or session endpoint identifier information comprising extension information;
the second determining unit determines a second data limit value of the user terminal according to the response information, including: and determining a second data limit value of the user terminal according to the extension information.
6. A configuration apparatus for data limit values, comprising:
at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor to cause the at least one processor to perform the method of configuring data limits as claimed in any one of claims 1 to 4.
7. A computer readable storage medium storing computer instructions for causing a computer to perform the method of configuring a data limit value according to any one of claims 1-4.
CN202011592100.XA 2020-12-29 2020-12-29 Configuration method and device of data limit value and storage medium Active CN112804716B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011592100.XA CN112804716B (en) 2020-12-29 2020-12-29 Configuration method and device of data limit value and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011592100.XA CN112804716B (en) 2020-12-29 2020-12-29 Configuration method and device of data limit value and storage medium

Publications (2)

Publication Number Publication Date
CN112804716A CN112804716A (en) 2021-05-14
CN112804716B true CN112804716B (en) 2023-04-28

Family

ID=75805498

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011592100.XA Active CN112804716B (en) 2020-12-29 2020-12-29 Configuration method and device of data limit value and storage medium

Country Status (1)

Country Link
CN (1) CN112804716B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101400085A (en) * 2007-09-30 2009-04-01 华为技术有限公司 Method, device and system for negotiating maximum transmission unit value of path
US7684440B1 (en) * 2003-12-18 2010-03-23 Nvidia Corporation Method and apparatus for maximizing peer-to-peer frame sizes within a network supporting a plurality of frame sizes
CN105530682A (en) * 2014-09-30 2016-04-27 华为技术有限公司 Terminal access method and related device
CN106656848A (en) * 2017-03-01 2017-05-10 迈普通信技术股份有限公司 Method and device for determining MTU (Maximum Transmission Unit) of path, and communication system

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7995478B2 (en) * 2007-05-30 2011-08-09 Sony Computer Entertainment Inc. Network communication with path MTU size discovery
US8576847B2 (en) * 2010-08-26 2013-11-05 International Business Machines Corporation Mechanisms for discovering path maximum transmission unit
CN101931630B (en) * 2010-09-01 2014-09-10 中兴通讯股份有限公司 Method, user equipment and network element for transmitting SIP message
CN102868609B (en) * 2012-09-27 2018-03-13 中兴通讯股份有限公司 A kind of MTU machinery of consultation and data terminal
US8897749B1 (en) * 2013-05-09 2014-11-25 Cellco Partnership Policy decisions based on subscriber spending limits
CN103701790B (en) * 2013-12-20 2017-02-08 广东威创视讯科技股份有限公司 Method and device for generating session identifier in real time streaming protocol (RTSP)
WO2018188170A1 (en) * 2017-04-14 2018-10-18 华为技术有限公司 Data communication method, device and system
CN109951347B (en) * 2017-12-21 2021-11-19 华为技术有限公司 Service identification method, device and network equipment
CN110121194B (en) * 2018-02-07 2021-06-11 大唐移动通信设备有限公司 Information transmission method and device and computer storage medium
CN110602735B (en) * 2018-06-13 2021-06-29 华为技术有限公司 Method for providing limited service and communication equipment
CN110636544B (en) * 2018-06-22 2022-09-23 华为技术有限公司 Data transmission method and device
CN110839060B (en) * 2019-10-16 2022-02-01 武汉绿色网络信息服务有限责任公司 HTTP multi-session file restoration method and device in DPI scene

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7684440B1 (en) * 2003-12-18 2010-03-23 Nvidia Corporation Method and apparatus for maximizing peer-to-peer frame sizes within a network supporting a plurality of frame sizes
CN101400085A (en) * 2007-09-30 2009-04-01 华为技术有限公司 Method, device and system for negotiating maximum transmission unit value of path
CN105530682A (en) * 2014-09-30 2016-04-27 华为技术有限公司 Terminal access method and related device
CN106656848A (en) * 2017-03-01 2017-05-10 迈普通信技术股份有限公司 Method and device for determining MTU (Maximum Transmission Unit) of path, and communication system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
高性能IPSec客户端软件设计与实现;蒋嘉琦;《中国优秀硕士学位论文辑》;全文 *

Also Published As

Publication number Publication date
CN112804716A (en) 2021-05-14

Similar Documents

Publication Publication Date Title
AU2021277736B2 (en) Pdu type setting method, ue policy setting method, and related entity
CN112913212A (en) Control of user plane functions with control plane-user plane separation
US11497077B2 (en) Method and apparatus for port management of ethernet bridges
US9936493B2 (en) Traffic optimization in a communications network
EP3099032A1 (en) A load balancing method, device, system and computer storage medium
CN107222321B (en) Configuration message sending method and device
WO2021134446A1 (en) Information processing method, communication device and communication system
US10136375B2 (en) Method for service data management, apparatus, and system
CN110417632B (en) Network communication method, system and server
CN112910793B (en) Method for connection multiplexing in seven-layer load balancing and load balancer
WO2022222674A1 (en) Message processing method and apparatus, electronic device, and computer-readable storage medium
CN112272244B (en) Router WAN end IPv6 internet mode configuration method and device
CN112804716B (en) Configuration method and device of data limit value and storage medium
US20230216798A1 (en) Data Steering Method and Apparatus
US11223567B2 (en) Transmission control protocol session mobility
US20160182357A1 (en) Internet Control Message Protocol For Completing A Secondary Protocol Transaction
CN114745456A (en) Message processing method and device and network address translation equipment
WO2017219667A1 (en) Method, device, and system for modifying mss
CN109639555B (en) Link layer message generation method, link layer message generation device and terminal equipment
CN104219178A (en) Openflow-based control message processing method, Openflow-based control message transmitting device, Openflow-based control message receiving device and Openflow-based control message processing system
US20220006735A1 (en) Network device and packet processing method using same
US20160269304A1 (en) Method for dynamically adjusting packet transmission timing
US20240048644A1 (en) Message transmission method and system, and network device and storage medium
CN110753043A (en) Communication method, device, server and medium
CN111865884A (en) Message processing method, device and equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant