CN114175727A - Method and device for accessing network slice - Google Patents

Method and device for accessing network slice Download PDF

Info

Publication number
CN114175727A
CN114175727A CN201980098916.6A CN201980098916A CN114175727A CN 114175727 A CN114175727 A CN 114175727A CN 201980098916 A CN201980098916 A CN 201980098916A CN 114175727 A CN114175727 A CN 114175727A
Authority
CN
China
Prior art keywords
access network
identification information
equipment
terminal equipment
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201980098916.6A
Other languages
Chinese (zh)
Other versions
CN114175727B (en
Inventor
黄曲芳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Publication of CN114175727A publication Critical patent/CN114175727A/en
Application granted granted Critical
Publication of CN114175727B publication Critical patent/CN114175727B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application discloses a method and a device for accessing a network slice, relates to the technical field of communication, and is beneficial to saving network resources, improving the efficiency of accessing a terminal device into the network slice and reducing the energy consumption of the terminal device. The method is applied to the terminal equipment and comprises the following steps: and sending the identification information of the target network slice to access network equipment, wherein the access network equipment is the access network equipment accessed by the terminal equipment. The identification information of the target network slice is used for the access network equipment to acquire the identification information of the target cell so as to obtain the identification information of the terminal equipment. The target cell is a cell that supports the target network slice. The identification information of the terminal device is identification information of the terminal device in the target cell. And receiving the identification information of the terminal equipment sent by the access network equipment. And accessing the target network slice according to the identification information of the terminal equipment.

Description

Method and device for accessing network slice Technical Field
The present application relates to the field of communications technologies, and in particular, to a method and an apparatus for accessing a network slice (slice).
Background
With the continuous development of wireless communication networks, the third generation partnership project (3 GPP) introduced a concept of network slicing into access networks, where a physical network is divided into a plurality of logical networks supporting different services, one logical network is a network slice, and a cell of one access network supports a terminal device within a cell range of the access network to access some network slices. Thus, the access network device needs to send network slice list information to the terminal devices within the cell managed by the access network device through a System Information Broadcast (SIB), where the network slice list information includes which network slices the terminal device can access or cannot access in the cell of the access network.
Currently, before a terminal device accesses a network slice, an SIB needs to be read, and whether a cell where the terminal device is located supports the terminal device to access the network slice is determined based on the SIB. If so, the terminal equipment initiates a connection request to the access network equipment managing the cell; and if not, the terminal equipment searches for other cells.
In an implementation manner, the access network device broadcasts the network slice list information at the air interface periodically, and in this manner, since a cell of the access network supports more network slices for access, the network slice list information is broadcast at the air interface periodically, which results in a large amount of resources being occupied.
In another implementation manner, the access network device broadcasts the network slice list information at the air interface only when receiving a request from the terminal device and requesting to acquire the network slice list information, in this manner, the terminal device needs to request to acquire the network slice list information supported by the cell for each cell of an access network, and then determines whether the network slice can be accessed, which is time-consuming and long-lasting.
Disclosure of Invention
Embodiments of the present application provide a method and an apparatus for accessing a network slice, which are helpful for saving network resources, improving the efficiency of accessing a terminal device to the network slice, and reducing the energy consumption of the terminal device. In order to achieve the above purpose, the embodiment of the present application adopts the following technical solutions:
in a first aspect, a method for accessing a network slice is provided, and is applied to a terminal device, and the method includes: and sending the identification information of the target network slice to access network equipment, wherein the access network equipment is the access network equipment accessed by the terminal equipment. The identification information of the target network slice is used for the access network equipment to acquire the identification information of the target cell so as to obtain the identification information of the terminal equipment. The target cell is a cell that supports the target network slice. The identification information of the terminal device is the identification information of the terminal device in the target cell. And receiving the identification information of the terminal equipment sent by the access network equipment. And accessing the target network slice according to the identification information of the terminal equipment. The first access network device is an access network device that manages a current cell, which is a cell to which the terminal device is accessed. The current cell does not support target network slicing. In this way, the terminal device can access the target network slice. The terminal device does not need to send a request to the first access network device to acquire the list information of the network slices supported by the accessed cell, and judges whether the cell in which the terminal device is located supports the target network slice. The efficiency of the terminal equipment accessing the target network slice is improved, and the energy consumption of the terminal equipment is reduced.
According to the first aspect, in a first implementation manner of the first aspect, the identification information of the target network slice is carried in a radio resource control, RRC, connection setup complete message.
In a second aspect, a method for accessing a network slice is provided, where the method is applied to a first access network device, and the method includes: and receiving the identification information of the target network slice sent by the terminal equipment accessed to the first access network equipment. And acquiring the identification information of the target cell according to the identification information of the target network slice. The target cell is a cell that supports the target network slice. And determining the identification information of the terminal equipment according to the identification information of the target cell. Wherein the identification information of the terminal device is the identification information of the terminal device in the target cell. And sending the identification information of the terminal equipment to the terminal equipment. The identification information of the terminal device is used for the terminal device to access the target network slice. Therefore, the access network equipment does not need to broadcast the network slice list information, and the terminal equipment can access the target network slice. The occupation of network slice list information to air interface broadcasting resources is reduced. Network resources are saved, the efficiency of accessing the terminal equipment into the target network slice is improved, and the energy consumption of the terminal equipment is reduced.
According to the second aspect, in a first implementation manner of the second aspect, determining the identification information of the terminal device according to the identification information of the target cell specifically includes: and determining the second access network equipment according to the identification information of the target cell. The second access network device is an access network device that manages the target cell. And sending the identification information of the target network slice to the second access network equipment. The identification information of the target network slice is used for the second access network device to determine that the terminal device is allowed to access the target network slice, and after the second access network device determines that the terminal device is allowed to access the target network slice, the second access network device allocates the identification information of the terminal device to the terminal device. And receiving the identification information of the terminal equipment sent by the second access network equipment. Therefore, the access network equipment does not need to broadcast the network slice list information, and the terminal equipment can access the target network slice. The occupation of network slice list information to air interface broadcasting resources is reduced. Network resources are saved, the efficiency of accessing the terminal equipment into the target network slice is improved, and the energy consumption of the terminal equipment is reduced.
In a third aspect, a method for accessing a network slice is provided, where the method is applied to a second access network device, and the second access network device is an access network device for managing a target cell. The target cell is a cell that supports the target network slice. The method comprises the following steps: and receiving the identification information of the target network slice sent by the first access network equipment. The first access network device is an access network device to which the terminal device is accessed. The target network slice is the network slice that the terminal device requests access to. And determining to allow the terminal equipment to access the target network slice according to the identification information of the target network slice. And distributing the identification information of the terminal equipment to the terminal equipment. The identification information of the terminal device is identification information of the terminal device in the target cell. And sending the identification information of the terminal equipment to the first access network equipment, wherein the identification information of the terminal equipment is used for accessing the terminal equipment into the target network slice. The current cell is a cell managed by the first access network device. The current cell is the cell to which the terminal device is accessed. The current cell does not support target network slicing. Therefore, the access network equipment does not need to broadcast the network slice list information, and the terminal equipment can access the target network slice. The occupation of network slice list information to air interface broadcasting resources is reduced. Network resources are saved, the efficiency of accessing the terminal equipment into the target network slice is improved, and the energy consumption of the terminal equipment is reduced.
In a fourth aspect, a method for accessing a network slice is provided, where the method is applied to a first access network device, and the method includes: and receiving the identification information of the terminal equipment and the identification information of the target cell, which are sent by the terminal equipment accessed to the first access network equipment. The target cell is a cell that supports the target network slice. The identification information of the terminal device is the identification information of the terminal device in the target cell. Determining second access network equipment according to the identification information of the target cell; the second access network device is an access network device that manages the target cell. And establishing a channel between the first access network device and the second access network device according to the identification information of the terminal device, wherein the channel is used for the terminal device to access the target network slice through the first access network device and the second access network device. In this way, the terminal device does not need to re-establish the RRC connection with the second access network device. The efficiency of the terminal equipment accessing the target network slice is improved, and the energy consumption of the terminal equipment is reduced.
According to the fourth aspect, in a first implementation manner of the fourth aspect, establishing a channel between the first access network device and the second access network device according to the identification information of the terminal device specifically includes: and allocating a first interface for the terminal equipment according to the identification information of the terminal equipment. The first interface is used for the first access network equipment to receive the service sent to the terminal equipment by the second access network equipment. The second access network device is an access network device that manages the target cell. And sending the identification information of the first interface and the identification information of the terminal equipment to second access network equipment so that the second access network equipment stores the identification information of the first interface and allocates a second interface to the terminal equipment according to the identification information of the terminal equipment. The second interface is used for the second access network equipment to receive the service from the terminal equipment, which is sent by the first access network equipment. Receiving identification information of a second interface sent by second access network equipment; identification information of the second interface is stored.
According to the first implementation form of the fourth aspect, in the second implementation form of the fourth aspect, the method further comprises: and receiving the service sent to the terminal equipment by the second access network equipment through the channel. And sending the service to the terminal equipment.
In a fifth aspect, a method for accessing a network slice is provided, where the method is applied to a second access network device, and the second access network device is an access network device that manages a target cell. The target cell is a cell that supports the target network slice. The method comprises the following steps: and receiving the identification information of the first interface and the identification information of the terminal equipment, which are sent by the first access network equipment. The first access network device is an access network device accessed by the terminal device. The first interface is used for the first access network equipment to receive the service sent by the second access network equipment to the terminal equipment. The first interface is an interface allocated by the first access network device for the terminal device. The identification information of the terminal device is identification information of the terminal device in the target cell. Identification information of the first interface is stored. And distributing a second interface for the terminal equipment according to the identification information of the terminal equipment. The second interface is used for the second access network equipment to receive the service from the terminal equipment, which is sent by the first access network equipment. And sending the identification information of the second interface to the first access network equipment so that the first access network equipment stores the identification information of the second interface. The first interface and the second interface are used for the terminal device to access the target network slice through the first access network device and the second access network device. In this way, the terminal device does not need to re-establish the RRC connection with the second access network device. The efficiency of the terminal equipment accessing the target network slice is improved, and the energy consumption of the terminal equipment is reduced.
According to a fifth aspect, in a first possible implementation manner of the fifth aspect, the method further includes: and sending the service of the terminal equipment to the first interface of the first access network equipment, so that the first access network equipment sends the service of the terminal equipment to the terminal equipment.
In a sixth aspect, there is provided a terminal device operable to perform any of the methods of the first aspect described above or any of the methods provided in any of the possible implementations of the first aspect.
According to the second aspect, in a first possible implementation manner of the sixth aspect, the terminal device may be divided into functional modules according to any one of the methods provided by the first aspect. For example, each functional unit may be divided for each function, or two or more functions may be integrated into one processing unit.
In a second possible implementation manner of the sixth aspect, the terminal device may include a processor configured to execute any one of the methods provided by the first aspect.
In a seventh aspect, a computer-readable storage medium, such as a computer non-transitory readable storage medium, is provided. Having stored thereon a computer program (or instructions) which, when run on a computer, causes the computer to perform any of the methods provided by the first aspect or any of the possible implementations of the first aspect.
In an eighth aspect, there is provided a computer program product enabling, when running on a computer, the execution of any one of the methods provided by the first aspect or any one of the possible implementations of the first aspect.
In a ninth aspect, there is provided a chip comprising: a processor, configured to invoke and run a computer program stored in the memory from the memory, and execute any method provided by the first aspect or any possible implementation manner of the first aspect.
In a tenth aspect, an access network device is provided, which is operable to perform any of the methods provided in any of the possible implementations of the second to fifth aspects. Illustratively, the access network device may be a base station or the like.
According to a tenth aspect, in a first possible implementation manner of the tenth aspect, the access network device may be divided into functional modules according to any method provided in any one of the possible implementation manners of the second aspect to the fifth aspect. For example, each functional unit may be divided for each function, or two or more functions may be integrated into one processing unit.
According to the tenth aspect or the first possible implementation manner of the tenth aspect, in a second possible implementation manner of the tenth aspect, the access network device may include a processor configured to execute any one of the methods provided in any one of the possible implementation manners of the second aspect to the fifth aspect.
In an eleventh aspect, a computer-readable storage medium, such as a computer-non-transitory readable storage medium, is provided. Having stored thereon a computer program (or instructions) which, when run on a computer, causes the computer to perform any of the methods provided in any of the possible implementations of the second to fifth aspects described above.
In a twelfth aspect, there is provided a computer program product which, when run on a computer, causes any of the methods provided in any of the possible implementations of the second to fifth aspects to be performed.
In a thirteenth aspect, there is provided a chip comprising: a processor for calling and running the computer program stored in the memory from the memory, and executing any of the methods provided in any of the possible implementations of the second aspect to the fifth aspect.
It can be understood that any one of the access network devices, terminal devices, computer storage media, chips, or computer program products provided above may be applied to the corresponding method provided above, and therefore, the beneficial effects achieved by the access network devices, terminal devices, computer storage media, chips, or computer program products may refer to the beneficial effects in the corresponding method, and are not described herein again.
Drawings
Fig. 1 is a schematic diagram of a communication system to which the technical solution provided by the present application is applied;
fig. 2 is a schematic hardware structure diagram of a communication device according to an embodiment of the present application;
fig. 3 is a flowchart illustrating a method for accessing a network slice according to an embodiment of the present application;
fig. 4 is a schematic diagram of a network structure applicable to the embodiments of the present application;
fig. 5 is a flowchart illustrating another method for accessing a network slice according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of a terminal device according to an embodiment of the present application;
fig. 7 is a schematic structural diagram of an access network device according to an embodiment of the present application;
fig. 8 is a schematic structural diagram of another access network device according to an embodiment of the present application.
Detailed Description
The network architecture and the service scenario described in the embodiment of the present application are for more clearly illustrating the technical solution in the embodiment of the present application, and do not limit the technical solution provided in the embodiment of the present application. As can be known to those skilled in the art, with the evolution of network architecture and the emergence of new service scenarios, the technical solution provided in the embodiments of the present application is also applicable to similar technical problems.
The technical scheme provided by the application can be applied to various communication systems. The technical scheme provided by the application can be applied to a 5G communication system, a future evolution system or a plurality of communication fusion systems and the like, and can also be applied to the existing communication system and the like. The application scenarios of the technical solution provided in the present application may include a variety of scenarios, for example, scenarios such as machine-to-machine (M2M), macro-micro communication, enhanced mobile broadband (eMBB), ultra high reliability and ultra low latency communication (urlcc), and massive internet of things communication (mtc). These scenarios may include, but are not limited to: a communication scenario between the terminal device and the terminal device, a communication scenario between the network device and the network device, a communication scenario between the network device and the terminal device, and the like. The following description is given by way of example in a scenario where the network device and the terminal device communicate with each other.
Fig. 1 shows a schematic diagram of a communication system to which the technical solution provided by the present application is applicable, which may include one or more network devices 100 (only 1 is shown) and one or more terminal devices 200 connected to each network device 100. Fig. 1 is a schematic diagram, and does not limit the application scenarios of the technical solutions provided in the present application.
The network device 100 may be a transmission reception node (TRP), a base station, a relay station, an access point, or the like. The network device 100 may be a network device in a 5G communication system or a network device in a future evolution network; but also wearable devices or vehicle-mounted devices, etc. In addition, the method can also comprise the following steps: a Base Transceiver Station (BTS) in a global system for mobile communication (GSM) or Code Division Multiple Access (CDMA) network, or an nb (nodeb) in Wideband Code Division Multiple Access (WCDMA), or an eNB or enodeb (evolved nodeb) in Long Term Evolution (LTE). The network device 10 may also be a wireless controller in a Cloud Radio Access Network (CRAN) scenario.
Terminal equipment 200 may be User Equipment (UE), access terminal equipment, UE unit, UE station, mobile station, remote terminal equipment, mobile device, UE terminal equipment, wireless communication device, UE agent, or UE device, etc. The access terminal device may be a cellular phone, a cordless phone, a Session Initiation Protocol (SIP) phone, a Wireless Local Loop (WLL) station, a Personal Digital Assistant (PDA), a handheld device with wireless communication capability, a computing device or other processing device connected to a wireless modem, a vehicle-mounted device, a wearable device, a terminal device in a 5G network or a terminal device in a future evolved Public Land Mobile Network (PLMN) network, etc.
Optionally, each network element (for example, the network device 100 and the terminal device 200) in fig. 1 may be implemented by one device, may also be implemented by multiple devices together, and may also be a functional module in one device, which is not specifically limited in this embodiment of the present application. It is understood that the above functions may be either network elements in a hardware device, software functions running on dedicated hardware, or virtualized functions instantiated on a platform (e.g., a cloud platform).
For example, each network element in fig. 1 may be implemented by the communication device 200 in fig. 2.
Fig. 2 is a schematic diagram illustrating a hardware structure of a communication device according to an embodiment of the present application. The communication device 200 includes at least one processor 201, communication lines 202, memory 203, and at least one communication interface 204.
The processor 201 may be a general processing unit (CPU), a microprocessor, an application-specific integrated circuit (ASIC), or one or more ics for controlling the execution of programs in accordance with the present invention.
The communication link 202 may include a path for transmitting information between the aforementioned components.
Communication interface 204 may be any device, such as a transceiver, for communicating with other devices or communication networks, such as an ethernet, RAN, Wireless Local Area Networks (WLAN), etc.
The memory 203 may be a read-only memory (ROM) or other type of static storage device that can store static information and instructions, a Random Access Memory (RAM) or other type of dynamic storage device that can store information and instructions, an electrically erasable programmable read-only memory (EEPROM), a compact disc read-only memory (CD-ROM) or other optical disk storage, optical disk storage (including compact disc, laser disc, optical disc, digital versatile disc, blu-ray disc, etc.), magnetic disk storage media or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer, but is not limited to these. The memory may be separate and coupled to the processor via communication line 202. The memory may also be integral to the processor. The memory provided by the embodiment of the application can be generally nonvolatile. The memory 203 is used for storing computer execution instructions for executing the scheme of the application, and is controlled by the processor 201 to execute. The processor 201 is configured to execute computer-executable instructions stored in the memory 203, thereby implementing the methods provided by the embodiments described below.
Optionally, the computer-executable instructions in the embodiments of the present application may also be referred to as application program codes, which are not specifically limited in the embodiments of the present application.
In particular implementations, processor 201 may include one or more CPUs such as CPU0 and CPU1 in fig. 2, for example, as one embodiment.
In particular implementations, communication device 200 may include multiple processors, such as processor 201 and processor 207 in fig. 2, for example, as an example. Each of these processors may be a single-core (single-CPU) processor or a multi-core (multi-CPU) processor. A processor herein may refer to one or more devices, circuits, and/or processing cores for processing data (e.g., computer program instructions).
In particular implementations, communication device 200 may also include an output device 205 and an input device 206, as one embodiment. The output device 205 is in communication with the processor 201 and may display information in a variety of ways. For example, the output device 205 may be a Liquid Crystal Display (LCD), a Light Emitting Diode (LED) display device, a Cathode Ray Tube (CRT) display device, a projector (projector), or the like. The input device 206 is in communication with the processor 201 and may receive user input in a variety of ways. For example, the input device 206 may be a mouse, a keyboard, a touch screen device, or a sensing device, among others.
The communication device 200 described above may be a general purpose device or a special purpose device. In a specific implementation, the communication device 200 may be a desktop, a laptop, a web server, a Personal Digital Assistant (PDA), a mobile phone, a tablet, a wireless terminal device, an embedded device, or a device with a similar structure as in fig. 2. The embodiment of the present application does not limit the type of the communication device 200.
In the following, some terms referred to in the present application are explained:
network slicing, in a 5th-Generation (5G) network, different services can be provided for different tenants, and quality of service (QoS) of different services is different, so that a physical network can be divided into multiple logical networks supporting different services, and one logical network is one network slice. The network slices of different services have different network access information. An access network device manages multiple cells, each cell supporting one or more network slices. Each network slice supports traffic for a different service.
The service refers to services such as voice, fax, video and data which are required to be transmitted by the terminal device on the network.
In the embodiments of the present application, words such as "exemplary" or "for example" are used to mean serving as an example, instance, or illustration. Any embodiment or design described herein as "exemplary" or "e.g.," is not necessarily to be construed as preferred or advantageous over other embodiments or designs. Rather, use of the word "exemplary" or "such as" is intended to present concepts related in a concrete fashion.
In the embodiments of the present application, "at least one" means one or more. "plurality" means two or more.
In the embodiment of the present application, "and/or" is only one kind of association relationship describing an association object, and indicates that three relationships may exist, for example, a and/or B may indicate: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the character "/" herein generally indicates that the former and latter related objects are in an "or" relationship.
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Example one
Fig. 3 is a schematic flowchart of a method for accessing a network slice according to an embodiment of the present application. Illustratively, the present embodiment may be applied to the communication system shown in fig. 1. The method shown in fig. 3 may comprise the following steps:
s101: and the terminal equipment sends the identification information of the target network slice to the first access network equipment. The first access network device is an access network device to which the terminal device is accessed. The first access network device is an access network device that manages a current cell, which is a cell to which the terminal device is accessed. The current cell does not support target network slicing.
The target network slice is a network slice which the terminal device requests to access, and the target network slice is a logical network which can provide a specific service for the terminal device.
Optionally, the terminal device may send the identifier information of the target network slice in a Radio Resource Control (RRC) connection establishment procedure with the first access network device, or may send the identifier information of the target network slice after the RRC connection establishment with the first access network device. This is not limited by the present application.
Optionally, when the terminal device sends an RRC connection setup complete message to the first access network device, the RRC connection setup complete message includes identification information of the target network slice.
S102: and the first access network equipment acquires the identification information of the target cell according to the identification information of the target network slice. The target cell is a cell that supports the target network slice.
In one implementation, the first access network device may obtain, according to a pre-stored correspondence relationship between "identification information of multiple cells and identification information of a network slice supported by each cell of the multiple cells", identification information of a cell corresponding to the identification information of the target network slice. Wherein, the identification information of the cell in the corresponding relationship comprises: identification information of a cell managed by the first access network device and identification information of a cell managed by an access network device adjacent to the first access network device. Optionally, the first access network device may exchange, at power up, identification information of network slices supported by cells managed by each other with an access network device adjacent to the first access network device through a common interface (e.g., an Xn interface), and store the information. In the network operation process, if the network slice supported by a certain cell changes, the access network device managing the cell sends a notification to other access network devices having a common interface with the access network device through the common interface, so that the other access network devices update the stored corresponding relationship between the identification information of the plurality of cells and the identification information of the network slice supported by each cell in the plurality of cells.
S103: and the first access network equipment determines second access network equipment according to the identification information of the target cell. The second access network device is an access network device that manages the target cell.
Specifically, the first access network device obtains the identification information of the access network device corresponding to the identification information of the target cell according to the correspondence between the identification information of the plurality of access network devices and the identification information of the cell managed by each access network device, and uses the obtained identification information of the access network device as the identification information of the second access network device.
The prior art may be referred to for maintenance of the correspondence between the identification information of the cell and the identification information of the access network device. For example, after being powered on, the access network device may start a network interface (e.g., Xn interface) establishment procedure between access network devices in a 5G access network (NG-RAN) for establishing an interface with other adjacent access network devices. In the Xn interface establishing process, the first access network device exchanges, with the adjacent access network device, the identification information of each cell in the one to multiple cells managed by the first access network device and the identification information of the network slice supported by each cell. Through the Xn interface establishing process, each access network device stores the corresponding relation between the identification information of the access network device which is adjacent and has the Xn interface with the access network device and the identification information of the cell managed by each access network device.
S104: the first access network device determines that the second access network device is not the same access network device as the first access network device.
It should be noted that, when the second access network device and the first access network device are not the same access network device, the first access network device may execute S105 to S107 to obtain the identification information of the terminal device. When the second access network device and the first access network device are the same access network device, the first access network device may obtain the identification information of the terminal device according to the identification information of the target network slice. Specifically, refer to the implementation manner in S106, and are not described herein again. The identification information of the terminal device is identification information of the terminal device in a target cell, such as a cell-radio network temporary identifier (C-RNTI).
S105: and the first access network equipment sends the identification information of the target network slice to the second access network equipment.
S106: and the second access network equipment determines to allow the terminal equipment to access the target network slice according to the identification information of the target network slice.
Specifically, the second access network device performs admission control according to the identification information of the target network slice to determine that the load condition of the cell supporting the target network slice allows the terminal device to access the target network slice.
S107: and the second access network equipment distributes the identification information of the terminal equipment to the terminal equipment.
S108: and the second access network equipment sends the identification information of the terminal equipment to the first access network equipment.
S109: and the first access network equipment sends the identification information of the terminal equipment to the terminal equipment.
S110: the first access network device sends an RRC connection setup complete message to the second access network device. The RRC connection setup complete message is from the terminal device.
It should be noted that S110 may not be executed when the second access network device is the same access network device as the first access network device. The embodiment of the present application does not limit the execution sequence of S109 and S110, for example, the first access network device may execute S109 after executing S110.
S111: and the terminal equipment accesses the target network slice according to the identification information of the terminal equipment.
For example, the terminal device switches from the current cell to the target cell according to the identification information of the terminal device, so as to access the target network slice. The terminal equipment is switched to the target cell, namely the terminal equipment is switched to the target cell from the current cell under the condition of no data bearing.
Subsequently, after the terminal device switches to the target cell, the terminal device may monitor the network access information sent by the second access network device in the target cell to access the target network slice. The network access information may include: the terminal device accesses necessary information of the target network slice, such as at least one of transmission time-interval (TTI), frequency point, or downlink bandwidth information related to the target network slice. Optionally, the network access information may further include at least one of uplink and downlink ratio information related to the target network slice, timer information, a dedicated preamble allocated to the terminal device by the second access network device, bearer configuration information (e.g., signaling resource radio bearer (SRB) configuration information), counter information, and the like.
It should be noted that, in the first embodiment, if the first access network device does not acquire the identification information of the terminal device, a message is sent to the terminal device, where the message includes information of a cell that the first access network device can acquire and does not support a target network slice. The terminal device stores the message, and reports the message to the first access network device through a Minimization Drive Test (MDT) message, wherein the message is used for the first access network device to optimize the network. Meanwhile, the first access network device may send the message to a device where an operation and maintenance administration (OAM) is located, so that the device determines in which cells the target network slice is supported.
In this embodiment, the terminal device actively reports the identification information of the target network slice to the first access network device, so that the first access network device allocates the identification information of the terminal device to the terminal device, and the identification information of the terminal device is used for the first access network device to select the target cell. In this way, the terminal device can access the target network slice. On one hand, occupation of network slice list information to an air interface broadcasting resource is reduced, on the other hand, the terminal equipment does not need to send a request to the first access network equipment to acquire the list information of the network slices supported by the accessed cell, and whether the cell where the terminal equipment is located supports the target network slice or not is judged. Therefore, the efficiency of accessing the terminal equipment into the target network slice is improved, and the energy consumption of the terminal equipment is reduced.
For Machine Type Communication (MTC) services, 5G introduces an INACTIVE (INACTIVE) state, and when the terminal device has no data to transmit for a period of time, the access network device notifies the terminal device to enter the INACTIVE state, a user plane protocol stack of the terminal device is stored in a target cell, and a channel (e.g., N3 tunnel) between the access network device and the core network device for transmitting the service of the terminal device is also reserved. The access network equipment sends a cell list to the terminal equipment, and if the terminal equipment moves in the range of the cell list, the access network equipment does not need to be informed.
Fig. 4 is a schematic diagram of a network structure applicable to the embodiment of the present application, where in fig. 4, a User Plane Function (UPF) 30 is connected to a target cell through a tunnel. The cell list sent by the access network device to the terminal device includes a cell a, a target cell and a cell B. Cell a, target cell and cell B together constitute a RAN Notification Area (RNA). The access network device needs to be notified when the terminal device has moved out of the RNA. In this way, the terminal device need not re-establish a connection with the access network device to transport traffic as long as it is within the RAN. However, after each cell is introduced to support a certain network slice, if the service transmitted by the terminal device belongs to the target network slice, the cell to which the terminal device is currently accessed does not support the target network slice. The terminal device needs to re-establish a connection with the access network device managing the target cell to transmit the traffic. In view of the above, the present application provides a method for accessing a network slice. Embodiment two describes the method of the access network slicing in detail.
Example two
Fig. 5 is a schematic flowchart of another method for accessing a network slice according to an embodiment of the present application. Illustratively, the present embodiment may be applied to the communication system shown in fig. 1. The method shown in fig. 5 may comprise the steps of:
s201: and the terminal equipment sends the identification information of the terminal equipment in the target cell and the identification information of the target cell to the first access network equipment. The target cell is a cell that supports the target network slice. The first access network device is an access network device to which the terminal device is accessed. The target network slice is a network slice which the terminal device requests to access, and the target network slice is a logical network which can provide specific service for the terminal device. The first access network device is an access network device that manages a current cell, which is a cell to which the terminal device is accessed. The current cell does not support target network slicing.
In one implementation, after establishing an RRC connection with a first access network device, a terminal device sends identification information of the terminal device in a target cell and identification information of the target cell to the first access network device.
The embodiment of the application does not limit how the terminal device sends the identification information of the terminal device in the target cell and the identification information of the target cell to the first access network device. For example, the identification information of the terminal device in the target cell and the identification information of the target cell may be carried in RRC signaling. For example, the terminal device sends an RRC connection resume (RRC connection resume) message to the first access network device, and the identification information of the terminal device in the target cell and the identification information of the target cell are carried in the RRC connection resume message (e.g., carried in resume id). The identification information of the terminal device in the target cell and the identification information of the target cell may be carried in one or two new messages designed in the embodiments of the present application.
S202: and the first access network equipment determines second access network equipment according to the identification information of the target cell.
Specifically, the first access network device obtains the identification information of the access network device corresponding to the identification information of the target cell according to the correspondence between the identification information of the plurality of access network devices and the identification information of the cell managed by each access network device, and uses the obtained identification information of the access network device as the identification information of the second access network device. Thereby determining the second access network device.
S203: the first access network equipment determines that the second access network equipment and the first access network equipment are not the same access network equipment, and allocates a first interface for the terminal equipment according to the identification information of the terminal equipment in the target cell. The first interface is used for receiving the service sent to the terminal device by the second access network device.
Alternatively, the first interface may be a port in the first access network device.
Optionally, the first interface is further configured to send the service from the terminal device to the second access network device.
S204: and the first access network equipment sends the identification information of the first interface and the identification information of the terminal equipment in the target cell to the second access network equipment.
The sending method of the first access network device sending the identification information of the first interface and the identification information of the terminal device in the target cell to the second access network device is not limited in the present application, for example, the identification information of the first interface and the identification information of the terminal device in the target cell may be included in one message. The identification information of the first interface and the identification information of the terminal device in the target cell may also be sent through multiple messages, respectively.
S205: the second access network device stores the identification information of the first interface and allocates a second interface to the terminal device according to the identification information of the terminal device in the target cell. The second interface is used for receiving the service sent by the first access network equipment from the terminal equipment.
Alternatively, the second interface may be a port in the second access network device.
Optionally, the second interface is further configured to send the service of the terminal device to the first access network device.
Subsequently, when the second access network device needs to send the service to the terminal device, the service is first sent to the first interface of the first access network device, and then the first access network device sends the service to the terminal device.
S206: and the second access network equipment sends the identification information of the second interface to the first access network equipment.
S207: the first access network device stores identification information for the second interface.
Subsequently, when the first access network device needs to send the service from the terminal device to the second access network device, the service is sent to the second interface of the second access network device.
And the first access network equipment and the second access network equipment finish establishing the channel established for the terminal equipment.
The terminal device can access the target network slice through the first access network device, the channel and the second access network device. Specifically, the terminal device sends a service to the UPF network element in the current cell through the first access network device, the channel, and the second access network device. And the second access network equipment sends the service which is sent to the terminal equipment from the UPF network element to the first access network equipment through the channel, and the first access network equipment sends the service to the terminal equipment.
In this embodiment, the first access network device and the second access network device together establish a channel for the terminal device according to the received identification information of the terminal device in the target cell from the terminal device, so that the terminal device accesses the target network slice through the first access network device, the channel and the second access network device. The terminal device need not re-establish the RRC connection with the second access network device. The efficiency of the terminal equipment accessing the target network slice is improved, and the energy consumption of the terminal equipment is reduced.
It should be noted that, in the first embodiment, the terminal device finally switches from the current cell to the target cell to access the target network slice. In the second embodiment, the terminal device is still in the current cell without being transferred to the target cell, and the first access network device managing the current cell sends the service of the terminal device to the core network through the channel and the second access network device.
It should be noted that the first embodiment may be used in a scenario where a terminal device initially accesses a target network slice, and is directed to a terminal device in an idle (idle) state. The terminal device in this state has no access to the target network slice. The second embodiment can be used in a scenario where the terminal device in the INACTIVE (INACTIVE) state resumes the connection with the access network device. The terminal device in the inactive state has already accessed the target network slice, and the terminal device stores the identification information of the target cell and the identification information of the terminal device in the target cell.
The scheme provided by the embodiment of the application is mainly introduced from the perspective of a method. To implement the above functions, it includes hardware structures and/or software modules for performing the respective functions. Those of skill in the art will readily appreciate that the present application is capable of hardware or a combination of hardware and computer software implementing the exemplary method steps described in connection with the embodiments disclosed herein. Whether a function is performed as hardware or computer software drives hardware depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the embodiment of the present application, the computer device may be divided into the functional modules according to the method example, for example, each functional module may be divided corresponding to each function, or two or more functions may be integrated into one processing module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. It should be noted that, in the embodiment of the present application, the division of the module is schematic, and is only one logic function division, and there may be another division manner in actual implementation.
Fig. 6 is a schematic structural diagram of a terminal device according to an embodiment of the present application. The terminal device 50 may be configured to perform the functions performed by the terminal device in any of the above embodiments (such as the embodiments shown in fig. 3 or fig. 5). The terminal device 50 may include: a sending module 501, a processing module 502 and a receiving module 503. A sending module 501, configured to send the identification information of the target network slice to an access network device, where the access network device is an access network device to which the terminal device 50 is accessed. The identification information of the target network slice is used for the access network device to obtain the identification information of the target cell, so as to obtain the identification information of the terminal device 50. The target cell is a cell that supports the target network slice. The identification information of the terminal device 50 is identification information of the terminal device 50 in the target cell. A receiving module 503, configured to receive the identification information of the terminal device 50 sent by the access network device. The processing module 502 is configured to access the target network slice according to the identification information of the terminal device 50. For example, in conjunction with fig. 3, the sending module 501 may be configured to perform the sending step in S101; the receiving module 503 may be configured to perform the receiving step in S109; the processing module 502 may be configured to perform S111. In conjunction with fig. 5, the sending module 501 may be configured to execute the sending step in S201.
Optionally, the identification information of the target network slice is carried in the RRC connection setup complete message.
In an example, referring to fig. 2, the sending module 501 and the receiving module 503 may be implemented by the communication interface 204 in fig. 2; the processing module 502 may be implemented by the processor 201 in fig. 2 calling a computer program stored in the memory 203.
For the detailed description of the above alternative modes, reference is made to the foregoing method embodiments, which are not described herein again. In addition, for any explanation and beneficial effect description of the terminal device 50 provided above, reference may be made to the corresponding method embodiment described above, and details are not repeated.
It should be noted that the actions performed by the modules are only specific examples, and the actions actually performed by the modules refer to the actions or steps mentioned in the description of the embodiment based on fig. 3 and 5.
As shown in fig. 7, for an access network device provided in this embodiment of the present application, the access network device 60 may be configured to perform the functions performed by the first access network device in any of the foregoing embodiments (e.g., the embodiment shown in fig. 3). The access network device 60 includes: a receiving module 601, a processing module 602, and a sending module 603. A receiving module 601, configured to receive identification information of a target network slice sent by a terminal device accessing the access network device 60. The processing module 602 is configured to obtain identification information of the target cell according to the identification information of the target network slice. The target cell is a cell that supports the target network slice. And determining the identification information of the terminal equipment according to the identification information of the target cell. The identification information of the terminal device is the identification information of the terminal device in the target cell. The sending module 603 is configured to send the identification information of the terminal device to the terminal device. And the identification information of the terminal equipment is used for accessing the terminal equipment into the target network slice. For example, in conjunction with fig. 3, the receiving module 601 may be configured to perform the receiving steps in S101 and S108. The processing module 602 may be configured to perform S102-S104. The transmitting module 603 may be configured to perform the transmitting steps in S105, S109 to S110.
Optionally, the processing module 602 is specifically configured to: and determining the second access network equipment according to the identification information of the target cell. The second access network device is an access network device that manages the target cell. The sending module 603 is further configured to: and sending the identification information of the target network slice to the second access network equipment. The identification information of the target network slice is used for the second access network equipment to determine that the terminal equipment is allowed to access the target network slice, and the identification information of the terminal equipment is distributed to the terminal equipment. The receiving module 601 is further configured to: and receiving the identification information of the terminal equipment sent by the second access network equipment.
In an example, referring to fig. 2, the receiving module 601 and the sending module 603 may be implemented by the communication interface 204 in fig. 2; the processing module 602 may be implemented by the processor 201 in fig. 2 calling a computer program stored in the memory 203.
For the detailed description of the above alternative modes, reference is made to the foregoing method embodiments, which are not described herein again. In addition, for the explanation and the description of the beneficial effects of any of the access network devices 60 provided above, reference may be made to the corresponding method embodiments described above, and details are not repeated.
It should be noted that the actions performed by the modules are only specific examples, and the actions actually performed by the modules refer to the actions or steps mentioned in the description of the embodiment based on fig. 3.
As shown in fig. 7, for an access network device provided in this embodiment of the present application, the access network device 60 may be configured to perform the functions performed by the second access network device in any of the above embodiments (e.g., the embodiment shown in fig. 3). The access network device 60 is an access network device that manages the target cell. The target cell is a cell that supports the target network slice. The access network device 60 includes: a receiving module 601, a processing module 602 and a sending module 603. The receiving module 601 is configured to receive identification information of a target network slice sent by a first access network device. The first access network device is an access network device to which the terminal device is accessed. The target network slice is the network slice that the terminal device requests access to. The processing module 602 is configured to determine, according to the identification information of the target network slice, that the terminal device is allowed to access the target network slice. And distributing the identification information of the terminal equipment to the terminal equipment. The identification information of the terminal device is identification information of the terminal device in the target cell. A sending module 603, configured to send identification information of a terminal device to a first access network device, where the identification information of the terminal device is used to access a target network slice. For example, in conjunction with fig. 3, the receiving module 601 may be configured to perform the receiving steps in S105 and S110. The processing module 602 may be configured to perform S106-S107. The transmitting module 603 may be configured to perform the transmitting step in S108.
In an example, referring to fig. 2, the receiving module 601 and the sending module 603 may be implemented by the communication interface 204 in fig. 2; the processing module 602 may be implemented by the processor 201 in fig. 2 calling a computer program stored in the memory 203.
For the detailed description of the above alternative modes, reference is made to the foregoing method embodiments, which are not described herein again. In addition, for the explanation and the description of the beneficial effects of any of the access network devices 60 provided above, reference may be made to the corresponding method embodiments described above, and details are not repeated.
It should be noted that the actions performed by the modules are only specific examples, and the actions actually performed by the modules refer to the actions or steps mentioned in the description of the embodiment based on fig. 3.
As shown in fig. 8, for an access network device provided in this embodiment of the present application, the access network device 70 may be configured to perform the functions performed by the first access network device in any of the foregoing embodiments (such as the embodiment shown in fig. 5). The access network device 70 includes: a receiving module 701 and a processing module 702. The receiving module 701 is configured to receive the identification information of the terminal device and the identification information of the target cell, which are sent by the terminal device accessing the access network device 70. The target cell is a cell that supports the target network slice. The identification information of the terminal device is identification information of the terminal device in the target cell. A processing module 702, configured to determine, according to the identifier information of the target cell, a second access network device, where the second access network device is an access network device that manages the target cell. And establishing a channel between the access network device 70 and the second access network device according to the identification information of the terminal device, wherein the channel is used for the terminal device to access the target network slice through the access network device 70 and the second access network device.
Optionally, the processing module 702 is specifically configured to allocate a first interface to the terminal device according to the identification information of the terminal device. The first interface is used for receiving the service sent by the second access network device to the terminal device. The access network device 70 further includes: a sending module 703 is configured to send the identifier information of the first interface and the identifier information of the terminal device to the second access network device, so that the second access network device stores the identifier information of the first interface, and allocates the second interface to the terminal device according to the identifier information of the terminal device. The second interface is used for receiving the traffic from the terminal device sent by the access network device 70. The receiving module 701 is further configured to: and receiving the identification information of the second interface sent by the second access network equipment. The access network device 70 further includes: a storage module 704, configured to store the identification information of the second interface. For example, in conjunction with fig. 5, the receiving module 701 may be configured to perform the receiving steps in S201 and S206. The processing module 702 may be configured to perform S202-S203. The sending module 703 may be configured to execute the sending step in S204. The storage module 704 may be configured to execute S207.
Optionally, the receiving module 701 is further configured to: and receiving the service sent to the terminal equipment by the second access network equipment through the channel. The sending module 703 is further configured to: and sending the service to the terminal equipment.
In an example, referring to fig. 2, the receiving module 701 and the sending module 703 may be implemented by the communication interface 204 in fig. 2; the processing module 702 may be implemented by the processor 201 in fig. 2 calling a computer program stored in the memory 203.
For the detailed description of the above alternative modes, reference is made to the foregoing method embodiments, which are not described herein again. In addition, for any explanation and beneficial effect description of the access network device 70 provided above, reference may be made to the corresponding method embodiment described above, and details are not repeated.
It should be noted that the actions performed by the modules are only specific examples, and the actions actually performed by the modules refer to the actions or steps mentioned in the description of the embodiment based on fig. 5.
As shown in fig. 8, for an access network device provided in this embodiment of the present application, the access network device 70 may be configured to perform the functions performed by the second access network device in any of the above embodiments (such as the embodiment shown in fig. 5). The access network device 70 is an access network device that manages the target cell. The target cell is a cell that supports the target network slice. The access network device 70 includes: a receiving module 701, configured to receive identifier information of the first interface and identifier information of the terminal device, where the identifier information is sent by the first access network device. The first access network device is an access network device accessed by the terminal device. The first interface is used for receiving the service sent by the access network device 70 to the terminal device. The first interface is an interface allocated by the first access network device for the terminal device. The identification information of the terminal device is identification information of the terminal device in the target cell. A storage module 704, configured to store identification information of the first interface. The processing module 702 is configured to allocate a second interface to the terminal device according to the identifier information of the terminal device. The second interface is used for receiving the service sent by the first access network equipment from the terminal equipment. A sending module 703 is configured to send the identification information of the second interface to the first access network device, so that the first access network device stores the identification information of the second interface. The first interface and the second interface are used for the terminal device to access the target network slice through the first access network device and the access network device 70. For example, in conjunction with fig. 5, the receiving module 701 may be configured to perform the receiving step in S204. The processing module 702 is configured to execute S205. The sending module 703 may be configured to execute the sending step in S206. The storage module 704 may be configured to perform an operation of storing the identification information of the first interface in S205.
Optionally, the sending module 703 is further configured to send a service of the terminal device to the first interface of the first access network device; the method is used for the first access network equipment to send the service of the terminal equipment to the terminal equipment.
In an example, referring to fig. 2, the receiving module 701 and the sending module 703 may be implemented by the communication interface 204 in fig. 2; the processing module 702 may be implemented by the processor 201 in fig. 2 calling a computer program stored in the memory 203.
For the detailed description of the above alternative modes, reference is made to the foregoing method embodiments, which are not described herein again. In addition, for any explanation and beneficial effect description of the access network device 70 provided above, reference may be made to the corresponding method embodiment described above, and details are not repeated.
It should be noted that the actions performed by the modules are only specific examples, and the actions actually performed by the modules refer to the actions or steps mentioned in the description of the embodiment based on fig. 5.
An apparatus (e.g., a computer device or a chip) is also provided in an embodiment of the present application, including: a memory and a processor; the memory is for storing a computer program, and the processor is for invoking the computer program to perform the actions or steps mentioned in any of the embodiments provided above.
Embodiments of the present application also provide a computer-readable storage medium, on which a computer program is stored, which, when run on a computer, causes the computer to perform the actions or steps mentioned in any of the embodiments provided above.
The embodiment of the application also provides a chip. The chip has integrated therein circuitry and one or more interfaces for implementing the functionality of the network device described above. Optionally, the functions supported by the chip may include processing actions in the embodiments described based on fig. 3 and fig. 5, which are not described herein again. Those skilled in the art will appreciate that all or part of the steps for implementing the above embodiments may be implemented by a program instructing the associated hardware to perform the steps. The program may be stored in a computer-readable storage medium. The above-mentioned storage medium may be a read-only memory, a random access memory, or the like. The processing unit or processor may be a central processing unit, a general purpose processor, an Application Specific Integrated Circuit (ASIC), a microprocessor (DSP), a Field Programmable Gate Array (FPGA) or other programmable logic device, a transistor logic device, a hardware component, or any combination thereof.
The embodiments of the present application also provide a computer program product containing instructions, which when executed on a computer, cause the computer to execute any one of the methods in the above embodiments. The computer program product includes one or more computer instructions. The procedures or functions described in accordance with the embodiments of the present application are all or partially generated upon loading and execution of computer program instructions on a computer. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored on a computer readable storage medium or transmitted from one computer readable storage medium to another computer readable storage medium, for example, the computer instructions may be transmitted from one website, computer, server, or data center to another website, computer, server, or data center via wire (e.g., coaxial cable, fiber optic, Digital Subscriber Line (DSL)) or wireless (e.g., infrared, wireless, microwave, etc.). Computer-readable storage media can be any available media that can be accessed by a computer or can comprise one or more data storage devices, such as servers, data centers, and the like, that can be integrated with the media. The usable medium may be a magnetic medium (e.g., floppy disk, hard disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., Solid State Disk (SSD)), among others.
It should be noted that the above devices for storing computer instructions or computer programs provided in the embodiments of the present application, such as, but not limited to, the above memories, computer readable storage media, communication chips, and the like, are all nonvolatile (non-volatile).
Other variations to the disclosed embodiments can be understood and effected by those skilled in the art in practicing the claimed application, from a review of the drawings, the disclosure, and the appended claims. In the claims, the word "comprising" does not exclude other elements or steps, and the word "a" or "an" does not exclude a plurality. A single processor or other unit may fulfill the functions of several items recited in the claims. The mere fact that certain measures are recited in mutually different dependent claims does not indicate that a combination of these measures cannot be used to advantage.
The above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention, and all the changes or substitutions should be covered within the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the appended claims.

Claims (18)

  1. A method for accessing network slices, which is applied to a terminal device, is characterized in that the method comprises the following steps:
    sending identification information of a target network slice to access network equipment, wherein the access network equipment is the access network equipment accessed by the terminal equipment; the identification information of the target network slice is used for the access network equipment to acquire the identification information of a target cell so as to obtain the identification information of the terminal equipment; the target cell is a cell supporting the target network slice; the identification information of the terminal equipment is the identification information of the terminal equipment in the target cell;
    receiving the identification information of the terminal equipment sent by the access network equipment;
    and accessing the target network slice according to the identification information of the terminal equipment.
  2. The method of claim 1, wherein the identification information of the target network slice is carried in a Radio Resource Control (RRC) connection setup complete message.
  3. A method for accessing network slices, the method being applied to a first access network device, the method comprising:
    receiving identification information of a target network slice sent by terminal equipment accessed to the first access network equipment;
    acquiring identification information of a target cell according to the identification information of the target network slice; the target cell is a cell supporting the target network slice;
    determining the identification information of the terminal equipment according to the identification information of the target cell; the identification information of the terminal equipment is the identification information of the terminal equipment in the target cell;
    sending the identification information of the terminal equipment to the terminal equipment; and the identification information of the terminal equipment is used for accessing the terminal equipment to the target network slice.
  4. The method of claim 3, wherein the determining the identification information of the terminal device according to the identification information of the target cell comprises:
    determining second access network equipment according to the identification information of the target cell; the second access network device is an access network device that manages the target cell;
    sending the identification information of the target network slice to second access network equipment; the identification information of the target network slice is used for the second access network equipment to determine that the terminal equipment is allowed to access the target network slice, and the identification information of the terminal equipment is distributed to the terminal equipment;
    and receiving the identification information of the terminal equipment sent by the second access network equipment.
  5. A method for accessing network slices is applied to a second access network device, wherein the second access network device is an access network device for managing a target cell; the target cell is a cell supporting a target network slice; the method comprises the following steps:
    receiving identification information of the target network slice sent by first access network equipment; the first access network equipment is access network equipment accessed by the terminal equipment; the target network slice is a network slice which is requested to be accessed by the terminal equipment;
    determining to allow the terminal equipment to access the target network slice according to the identification information of the target network slice;
    distributing identification information of the terminal equipment to the terminal equipment; the identification information of the terminal equipment is the identification information of the terminal equipment in the target cell;
    and sending the identification information of the terminal equipment to the first access network equipment, wherein the identification information of the terminal equipment is used for accessing the terminal equipment to the target network slice.
  6. A method for accessing network slices, the method being applied to a first access network device, the method comprising:
    receiving identification information of the terminal equipment and identification information of a target cell, which are sent by the terminal equipment accessed to the first access network equipment; the target cell is a cell supporting a target network slice; the identification information of the terminal equipment is the identification information of the terminal equipment in the target cell;
    determining second access network equipment according to the identification information of the target cell; the second access network device is an access network device that manages the target cell;
    establishing a channel between the first access network device and the second access network device according to the identification information of the terminal device; the channel is used for the terminal device to access the target network slice through the first access network device and the second access network device.
  7. The method of claim 6, wherein the establishing a tunnel between the first access network device and the second access network device according to the identification information of the terminal device comprises:
    according to the identification information of the terminal equipment, allocating a first interface for the terminal equipment; the first interface is used for the first access network equipment to receive the service sent to the terminal equipment by the second access network equipment;
    sending the identification information of the first interface and the identification information of the terminal equipment to the second access network equipment, so that the second access network equipment stores the identification information of the first interface and allocates a second interface to the terminal equipment according to the identification information of the terminal equipment; the second interface is used for the second access network equipment to receive the service from the terminal equipment, which is sent by the first access network equipment;
    receiving the identification information of the second interface sent by the second access network equipment;
    and storing the identification information of the second interface.
  8. The method according to claim 6 or 7, characterized in that the method further comprises:
    receiving the service sent to the terminal equipment by the second access network equipment through the channel;
    and sending the service to the terminal equipment.
  9. A terminal device, characterized in that the terminal device comprises:
    a sending module, configured to send identification information of a target network slice to an access network device, where the access network device is an access network device to which the terminal device is accessed; the identification information of the target network slice is used for the access network equipment to acquire the identification information of a target cell so as to obtain the identification information of the terminal equipment; the target cell is a cell supporting the target network slice; the identification information of the terminal equipment is the identification information of the terminal equipment in the target cell;
    a receiving module, configured to receive the identifier information of the terminal device sent by the access network device;
    and the processing module is used for accessing the target network slice according to the identification information of the terminal equipment.
  10. The terminal device of claim 9, wherein the identification information of the target network slice is carried in a radio resource control, RRC, connection setup complete message.
  11. An access network device, characterized in that the access network device comprises:
    the receiving module is used for receiving the identification information of the target network slice sent by the terminal equipment accessed to the access network equipment;
    the processing module is used for acquiring the identification information of the target cell according to the identification information of the target network slice; the target cell is a cell supporting the target network slice; determining the identification information of the terminal equipment according to the identification information of the target cell; the identification information of the terminal equipment is the identification information of the terminal equipment in the target cell;
    a sending module, configured to send identification information of the terminal device to the terminal device; and the identification information of the terminal equipment is used for accessing the terminal equipment to the target network slice.
  12. The access network device of claim 11,
    the processing module is specifically configured to: determining second access network equipment according to the identification information of the target cell; the second access network device is an access network device that manages the target cell;
    the sending module is further configured to: sending the identification information of the target network slice to second access network equipment; the identification information of the target network slice is used for the second access network equipment to determine that the terminal equipment is allowed to access the target network slice, and the identification information of the terminal equipment is distributed to the terminal equipment;
    the receiving module is further configured to: and receiving the identification information of the terminal equipment sent by the second access network equipment.
  13. An access network device, characterized in that the access network device is an access network device managing a target cell; the target cell is a cell supporting a target network slice; the access network device includes:
    a receiving module, configured to receive identifier information of the target network slice sent by a first access network device; the first access network equipment is access network equipment accessed by the terminal equipment; the target network slice is a network slice which is requested to be accessed by the terminal equipment;
    the processing module is used for determining that the terminal equipment is allowed to access the target network slice according to the identification information of the target network slice; distributing identification information of the terminal equipment to the terminal equipment; the identification information of the terminal equipment is the identification information of the terminal equipment in the target cell;
    a sending module, configured to send the identifier information of the terminal device to the first access network device, where the identifier information of the terminal device is used for the terminal device to access the target network slice.
  14. An access network device, characterized in that the access network device comprises:
    a receiving module, configured to receive identifier information of the terminal device and identifier information of a target cell, where the identifier information of the terminal device and the identifier information of the target cell are sent by a terminal device accessing the access network device; the target cell is a cell supporting a target network slice; the identification information of the terminal equipment is the identification information of the terminal equipment in the target cell;
    the processing module is used for determining second access network equipment according to the identification information of the target cell; the second access network device is an access network device that manages the target cell; establishing a channel between the access network equipment and the second access network equipment according to the identification information of the terminal equipment; the channel is used for the terminal device to access the target network slice through the access network device and the second access network device.
  15. The access network device of claim 14, wherein the processing module is specifically configured to: according to the identification information of the terminal equipment, allocating a first interface for the terminal equipment; the first interface is used for the access network equipment to receive the service sent to the terminal equipment by the second access network equipment;
    the access network device further includes: a sending module, configured to send the identifier information of the first interface and the identifier information of the terminal device to the second access network device; the identification information of the first interface is used for the second access network equipment to store the identification information of the first interface, and a second interface is allocated to the terminal equipment according to the identification information of the terminal equipment; the second interface is used for the second access network equipment to receive the service sent by the access network equipment from the terminal equipment;
    the receiving module is further configured to: receiving the identification information of the second interface sent by the second access network equipment;
    the access network device further includes: and the storage module is used for storing the identification information of the second interface.
  16. The access network device of claim 15,
    the receiving module is further configured to: receiving the service sent to the terminal equipment by the second access network equipment through the channel;
    the sending module is further configured to: and sending the service to the terminal equipment.
  17. An apparatus for accessing network slicing, comprising: a memory and a processor; the memory is for storing a computer program, and the processor is for invoking the computer program to perform the method of any of claims 1-8.
  18. A computer-readable storage medium, having stored thereon a computer program which, when run on a computer, causes the computer to perform the method of any one of claims 1 to 8.
CN201980098916.6A 2019-12-30 2019-12-30 Method and device for accessing network slice Active CN114175727B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2019/130218 WO2021134377A1 (en) 2019-12-30 2019-12-30 Network slice accessing method and apparatus

Publications (2)

Publication Number Publication Date
CN114175727A true CN114175727A (en) 2022-03-11
CN114175727B CN114175727B (en) 2023-04-28

Family

ID=76687528

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201980098916.6A Active CN114175727B (en) 2019-12-30 2019-12-30 Method and device for accessing network slice

Country Status (2)

Country Link
CN (1) CN114175727B (en)
WO (1) WO2021134377A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114095158A (en) * 2021-11-04 2022-02-25 中国电信股份有限公司 Network slice selection method, system, device and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108696910A (en) * 2017-04-11 2018-10-23 华为技术有限公司 A kind of method, apparatus and storage medium of selection target base station
CN108924884A (en) * 2017-04-04 2018-11-30 华为技术有限公司 Communication means and communication equipment
CN109041137A (en) * 2016-01-16 2018-12-18 华为技术有限公司 A kind of method of switching, base station and terminal device
US20190246323A1 (en) * 2018-02-07 2019-08-08 Lg Electronics Inc. Method and apparatus for performing handover

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102281606B (en) * 2010-06-11 2014-07-30 华为技术有限公司 Method, device and system for switching communication paths
US10349324B2 (en) * 2016-11-03 2019-07-09 Industrial Technology Research Institute User equipment, access node and slice-based handover method thereof
CN109151924B (en) * 2017-06-16 2024-03-01 华为技术有限公司 Communication method, access network equipment and core network equipment

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109041137A (en) * 2016-01-16 2018-12-18 华为技术有限公司 A kind of method of switching, base station and terminal device
CN108924884A (en) * 2017-04-04 2018-11-30 华为技术有限公司 Communication means and communication equipment
CN108696910A (en) * 2017-04-11 2018-10-23 华为技术有限公司 A kind of method, apparatus and storage medium of selection target base station
US20190246323A1 (en) * 2018-02-07 2019-08-08 Lg Electronics Inc. Method and apparatus for performing handover

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
ZTE: "R3-181687 "Further Discussion and 38.300 TP on Slice Aware Mobility"", 《3GPP TSG_RAN\WG3_IU》 *

Also Published As

Publication number Publication date
CN114175727B (en) 2023-04-28
WO2021134377A1 (en) 2021-07-08

Similar Documents

Publication Publication Date Title
US11425634B2 (en) Slice information update method and apparatus
US20220217625A1 (en) Network slice selection method, device, and system
US20220264428A1 (en) Method for controlling use of network slice, apparatus, and system
EP3493642A1 (en) Terminal state conversion method and apparatus
US11470674B2 (en) Communication method and communications apparatus
US20240080750A1 (en) Mobile telecommunications system method, user equipment and base station for transmitting on demand system information
US20220104078A1 (en) Communications Method, Apparatus, and System
EP3457755A1 (en) Method and device for performing data transmission
US12035174B2 (en) Rate control method, apparatus, and system
US20190141769A1 (en) Data Transmission Method and Device
US20220264378A1 (en) Communication Method, Device, and System
US20220312517A1 (en) D2d communication method, apparatus, and system
US20220150784A1 (en) Handover method and apparatus
US20220070967A1 (en) Communications method, apparatus, and system
CN109392094A (en) A kind of householder method of inactive state, equipment and system
CN114175727B (en) Method and device for accessing network slice
WO2017101042A1 (en) Access control parameter update apparatus and method, and communication system
WO2019141194A1 (en) Method and device for updating system message
CN114731731B (en) Communication method and device
EP4397125A1 (en) Method and apparatus for small data transmission
WO2022237269A1 (en) Communication method and apparatus
JPWO2019176068A1 (en) Wireless communication system, base station, mobile station and wireless communication method
US20220039018A1 (en) Terminal device management method and apparatus
CN114071799B (en) Method and device for managing session connection
US20240365423A1 (en) Method and apparatus for small data transmission

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant