CN114175727B - Method and device for accessing network slice - Google Patents

Method and device for accessing network slice Download PDF

Info

Publication number
CN114175727B
CN114175727B CN201980098916.6A CN201980098916A CN114175727B CN 114175727 B CN114175727 B CN 114175727B CN 201980098916 A CN201980098916 A CN 201980098916A CN 114175727 B CN114175727 B CN 114175727B
Authority
CN
China
Prior art keywords
identification information
access network
terminal equipment
equipment
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201980098916.6A
Other languages
Chinese (zh)
Other versions
CN114175727A (en
Inventor
黄曲芳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Publication of CN114175727A publication Critical patent/CN114175727A/en
Application granted granted Critical
Publication of CN114175727B publication Critical patent/CN114175727B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application discloses a method and a device for accessing a network slice, which relate to the technical field of communication and are beneficial to saving network resources, improving the efficiency of accessing terminal equipment into the network slice and reducing the energy consumption of the terminal equipment. The method is applied to the terminal equipment and comprises the following steps: and sending the identification information of the target network slice to access network equipment, wherein the access network equipment is accessed by the terminal equipment. The identification information of the target network slice is used for the access network equipment to acquire the identification information of the target cell so as to obtain the identification information of the terminal equipment. The target cell is a cell supporting the target network slice. The identification information of the terminal device is identification information of the terminal device in the target cell. And receiving the identification information of the terminal equipment sent by the access network equipment. And accessing the target network slice according to the identification information of the terminal equipment.

Description

Method and device for accessing network slice
Technical Field
The present application relates to the field of communications technologies, and in particular, to a method and an apparatus for accessing a slice of a network.
Background
With the continued development of wireless communication networks, the third generation partnership project (3rd generation partnership project,3GPP) introduced the concept of network slicing into access networks, one physical network being divided into a plurality of logical networks supporting different services, one logical network being one network slice, the cells of one access network supporting access to certain network slices by terminal devices within the cell range of the access network. Thus, the access network device needs to send network slice list information to the terminal device within the cell managed by the access network device through a system broadcast message (system information broadcast, SIB), where the network slice list information includes which network slices the terminal device can access, or which network slices cannot access, in the cell of the access network.
Currently, before a terminal device accesses a network slice, SIB needs to be read, and whether a cell in which the terminal device is located supports the terminal device to access the network slice is determined based on SIB. If so, the terminal equipment initiates a connection request to access network equipment for managing the cell; if not, the terminal device searches for other cells.
In one implementation, the access network device periodically broadcasts network slice list information over the air, where the network slice list information is periodically broadcast over the air due to the number of network slices that the cells of the access network support access, resulting in a significant amount of resources being consumed.
In another implementation manner, the access network device receives a request of the terminal device, and broadcasts the network slice list information on the air interface only when the access network device requests to acquire the network slice list information.
Disclosure of Invention
The embodiment of the application provides a method and a device for accessing network slices, which are beneficial to saving network resources, improving the efficiency of accessing terminal equipment into the network slices and reducing the energy consumption of the terminal equipment. In order to achieve the above purpose, the embodiments of the present application adopt the following technical solutions:
In a first aspect, a method for accessing a network slice is provided, and the method is applied to a terminal device, and includes: and sending the identification information of the target network slice to access network equipment, wherein the access network equipment is accessed by the terminal equipment. The identification information of the target network slice is used for the access network equipment to acquire the identification information of the target cell so as to obtain the identification information of the terminal equipment. The target cell is a cell supporting the target network slice. The identification information of the terminal device is the identification information of the terminal device in the target cell. And receiving the identification information of the terminal equipment sent by the access network equipment. And accessing the target network slice according to the identification information of the terminal equipment. The first access network device is an access network device for managing a current cell, and the current cell is a cell accessed by the terminal device. The current cell does not support the target network slice. In this way, the terminal device can access the target network slice. The terminal equipment does not need to send list information of network slices supported by the accessed cell to the first access network equipment, and judges whether the cell where the terminal equipment is located supports the target network slices. The efficiency of accessing the terminal equipment into the target network slice is improved, and the energy consumption of the terminal equipment is reduced.
In a first implementation manner of the first aspect, according to the first aspect, the identification information of the target network slice is carried in a radio resource control RRC connection setup complete message.
In a second aspect, a method for accessing a network slice is provided, and the method is applied to a first access network device, and includes: and receiving the identification information of the target network slice sent by the terminal equipment accessed to the first access network equipment. And acquiring the identification information of the target cell according to the identification information of the target network slice. The target cell is a cell supporting the target network slice. And determining the identification information of the terminal equipment according to the identification information of the target cell. Wherein the identification information of the terminal device is the identification information of the terminal device in the target cell. And sending the identification information of the terminal equipment to the terminal equipment. The identification information of the terminal device is used for the terminal device to access the target network slice. Thus, the access network device can access the target network slice without broadcasting network slice list information. The occupation of the network slice list information to the air interface broadcast resources is reduced. Network resources are saved, efficiency of accessing the terminal equipment into the target network slice is improved, and energy consumption of the terminal equipment is reduced.
According to a second aspect, in a first implementation manner of the second aspect, the determining, according to the identification information of the target cell, identification information of the terminal device specifically includes: and determining second access network equipment according to the identification information of the target cell. The second access network device is an access network device managing the target cell. And sending the identification information of the target network slice to the second access network equipment. The identification information of the target network slice is used for the second access network equipment to determine that the terminal equipment is allowed to access the target network slice, and after the second access network equipment determines that the terminal equipment is allowed to access the target network slice, the second access network equipment distributes the identification information of the terminal equipment for the terminal equipment. And receiving the identification information of the terminal equipment sent by the second access network equipment. Thus, the access network device can access the target network slice without broadcasting network slice list information. The occupation of the network slice list information to the air interface broadcast resources is reduced. Network resources are saved, efficiency of accessing the terminal equipment into the target network slice is improved, and energy consumption of the terminal equipment is reduced.
In a third aspect, a method for accessing a network slice is provided, which is applied to a second access network device, where the second access network device is an access network device for managing a target cell. The target cell is a cell supporting the target network slice. The method comprises the following steps: and receiving the identification information of the target network slice sent by the first access network equipment. The first access network device is an access network device to which the terminal device is connected. The target network slice is the network slice to which the terminal device requests access. And determining that the terminal equipment is allowed to access the target network slice according to the identification information of the target network slice. And allocating the identification information of the terminal equipment to the terminal equipment. The identification information of the terminal device is identification information of the terminal device in the target cell. And sending the identification information of the terminal equipment to the first access network equipment, wherein the identification information of the terminal equipment is used for accessing the terminal equipment to the target network slice. The current cell is a cell managed by the first access network device. The current cell is the cell to which the terminal device is connected. The current cell does not support the target network slice. Thus, the access network device can access the target network slice without broadcasting network slice list information. The occupation of the network slice list information to the air interface broadcast resources is reduced. Network resources are saved, efficiency of accessing the terminal equipment into the target network slice is improved, and energy consumption of the terminal equipment is reduced.
In a fourth aspect, a method for accessing a network slice is provided, and the method is applied to a first access network device, and includes: and receiving the identification information of the terminal equipment and the identification information of the target cell, which are sent by the terminal equipment accessed to the first access network equipment. The target cell is a cell supporting the target network slice. The identification information of the terminal device is the identification information of the terminal device in the target cell. Determining a second access network device according to the identification information of the target cell; the second access network device is an access network device managing the target cell. And establishing a channel between the first access network equipment and the second access network equipment according to the identification information of the terminal equipment, wherein the channel is used for the terminal equipment to access the target network slice through the first access network equipment and the second access network equipment. In this way, the terminal device does not need to re-establish the RRC connection with the second access network device. The efficiency of accessing the terminal equipment into the target network slice is improved, and the energy consumption of the terminal equipment is reduced.
According to a fourth aspect, in a first implementation manner of the fourth aspect, a channel is established between a first access network device and a second access network device according to identification information of a terminal device, and specifically includes: and distributing a first interface for the terminal equipment according to the identification information of the terminal equipment. The first interface is used for the first access network equipment to receive the service sent to the terminal equipment by the second access network equipment. The second access network device is an access network device managing the target cell. And sending the identification information of the first interface and the identification information of the terminal equipment to the second access network equipment so that the second access network equipment stores the identification information of the first interface and distributes the second interface for the terminal equipment according to the identification information of the terminal equipment. The second interface is used for receiving the service from the terminal equipment sent by the first access network equipment by the second access network equipment. Receiving identification information of a second interface sent by second access network equipment; the identification information of the second interface is stored.
In a second implementation form of the fourth aspect according to the first implementation form of the fourth aspect, the method further comprises: and receiving the service sent to the terminal equipment by the second access network equipment through the channel. And sending the service to the terminal equipment.
In a fifth aspect, a method for accessing a network slice is provided, where the method is applied to a second access network device, where the second access network device is an access network device for managing a target cell. The target cell is a cell supporting the target network slice. The method comprises the following steps: and receiving the identification information of the first interface and the identification information of the terminal equipment, which are sent by the first access network equipment. The first access network device is an access network device to which the terminal device accesses. The first interface is used for the first access network equipment to receive the service sent to the terminal equipment by the second access network equipment. The first interface is an interface allocated by the first access network device for the terminal device. The identification information of the terminal device is identification information of the terminal device in the target cell. The identification information of the first interface is stored. And distributing a second interface for the terminal equipment according to the identification information of the terminal equipment. The second interface is used for receiving the service from the terminal equipment sent by the first access network equipment by the second access network equipment. And sending the identification information of the second interface to the first access network equipment so that the first access network equipment stores the identification information of the second interface. The terminal equipment is connected with the target network slice through the first access network equipment and the second access network equipment. In this way, the terminal device does not need to re-establish the RRC connection with the second access network device. The efficiency of accessing the terminal equipment into the target network slice is improved, and the energy consumption of the terminal equipment is reduced.
According to a fifth aspect, in a first possible implementation manner of the fifth aspect, the method further includes: and sending the service of the terminal equipment to the first interface of the first access network equipment so that the first access network equipment sends the service of the terminal equipment to the terminal equipment.
In a sixth aspect, there is provided a terminal device operable to perform any of the methods of the first aspect or any of the methods provided in any of the possible implementations of the first aspect.
In a first possible implementation manner of the sixth aspect according to the first aspect, the dividing of the functional module may be performed on the terminal device according to any one of the methods provided in the first aspect. For example, each functional unit may be divided corresponding to each function, or two or more functions may be integrated in one processing unit.
In a second possible implementation manner of the sixth aspect according to the sixth aspect, the terminal device may include a processor configured to perform any of the methods provided in the first aspect.
In a seventh aspect, a computer readable storage medium, such as a computer non-transitory readable storage medium, is provided. On which a computer program (or instructions) is stored which, when run on a computer, causes the computer to perform any of the methods provided by the first aspect or any of the possible implementations of the first aspect.
In an eighth aspect, there is provided a computer program product which, when run on a computer, causes the first aspect or any of the methods provided by any of the possible implementations of the first aspect to be performed.
In a ninth aspect, there is provided a chip comprising: a processor for calling from a memory and running a computer program stored in the memory, performing the method of the first aspect or any of the methods provided by any of the possible implementations of the first aspect.
In a tenth aspect, there is provided an access network device operable to perform any of the methods provided in any of the possible implementations of the second to fifth aspects described above. By way of example, the access network device may be a base station or the like.
According to a tenth aspect, in a first possible implementation manner of the tenth aspect, the division of the functional modules may be performed on the access network device according to any method provided in any one of the possible implementation manners of the second aspect to the fifth aspect. For example, each functional unit may be divided corresponding to each function, or two or more functions may be integrated in one processing unit.
In a second possible implementation manner of the tenth aspect according to the tenth aspect, the access network device may comprise a processor configured to perform any of the methods provided in any of the possible implementation manners of the second to fifth aspects.
In an eleventh aspect, a computer readable storage medium, such as a computer non-transitory readable storage medium, is provided. On which a computer program (or instructions) is stored which, when run on a computer, causes the computer to perform any one of the methods provided in any one of the possible implementations of the second to fifth aspects described above.
In a twelfth aspect, there is provided a computer program product which, when run on a computer, causes any one of the methods provided in any one of the possible implementations of the second to fifth aspects to be performed.
In a thirteenth aspect, there is provided a chip comprising: a processor for calling from a memory and running a computer program stored in the memory, performing any one of the methods provided in any one of the possible implementations of the second to fifth aspects.
It is to be understood that any of the access network device, the terminal device, the computer storage medium, the chip or the computer program product and the like provided above may be applied to the corresponding method provided above, and therefore, the benefits achieved by the method may refer to the benefits in the corresponding method, which are not repeated herein.
Drawings
Fig. 1 is a schematic diagram of a communication system to which the technical solution provided in the present application is applicable;
fig. 2 is a schematic hardware structure of a communication device according to an embodiment of the present application;
fig. 3 is a flowchart of a method for accessing a network slice according to an embodiment of the present application;
FIG. 4 is a schematic diagram of a network architecture applicable to embodiments of the present application;
fig. 5 is a flowchart of another method for accessing a network slice according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of a terminal device according to an embodiment of the present application;
fig. 7 is a schematic structural diagram of an access network device according to an embodiment of the present application;
fig. 8 is a schematic structural diagram of another access network device according to an embodiment of the present application.
Detailed Description
The network architecture and the service scenario described in the embodiments of the present application are for more clearly describing the technical solutions of the embodiments of the present application, and do not constitute a limitation on the technical solutions provided by the embodiments of the present application. As can be appreciated by those skilled in the art, with the evolution of the network architecture and the appearance of new service scenarios, the technical solution provided in the embodiments of the present application is applicable to similar technical problems.
The technical scheme provided by the application can be applied to various communication systems. The technical scheme provided by the application can be applied to a 5G communication system, a future evolution system or a plurality of communication fusion systems and the like, and can also be applied to an existing communication system and the like. The application scenarios of the technical scheme provided by the application may include various scenarios such as machine-to-machine (machine to machine, M2M), macro-micro communication, enhanced mobile internet (enhanced mobile broadband, eMBB), ultra-high reliability and ultra-low latency communication (ultra-reliable & low latency communication, uirllc), mass internet of things communication (massive machine type communication, mctc), and the like. These scenarios may include, but are not limited to: a communication scenario between terminal devices, a communication scenario between network devices, a communication scenario between a network device and a terminal device, etc. The following description will be given by taking as an example a scenario applied to communication between a network device and a terminal device.
Fig. 1 shows a schematic diagram of a communication system to which the technical solution provided in the present application is applicable, where the communication system may include one or more network devices 100 (only 1 is shown) and one or more terminal devices 200 connected to each network device 100. Fig. 1 is only a schematic diagram, and does not constitute a limitation on the applicable scenario of the technical solution provided in the present application.
The network device 100 may be a transmission receiving node (transmission reception point, TRP), a base station, a relay station, or an access point, etc. The network device 100 may be a network device in a 5G communication system or a network device in a future evolution network; but also a wearable device or a vehicle-mounted device, etc. In addition, it is also possible to: base transceiver stations (base transceiver station, BTS) in a global system for mobile communications (global system for mobile communication, GSM) or code division multiple access (code division multiple access, CDMA) network, as well as NB (NodeB) in wideband code division multiple access (wideband code division multiple access, WCDMA), as well as eNB or eNodeB (evolutional NodeB) in long term evolution (long term evolution, LTE). The network device 10 may also be a wireless controller in the context of a cloud wireless access network (cloud radio access network, CRAN).
The terminal device 200 may be a User Equipment (UE), an access terminal device, a UE unit, a UE station, a mobile station, a remote terminal device, a mobile device, a UE terminal device, a wireless communication device, a UE agent, a UE apparatus, or the like. The access terminal device may be a cellular telephone, a cordless telephone, a session initiation protocol (session initiation protocol, SIP) phone, a wireless local loop (wireless local loop, WLL) station, a personal digital assistant (personal digital assistant, PDA), a handheld device with wireless communication capabilities, a computing device or other processing device connected to a wireless modem, an in-vehicle device, a wearable device, a terminal device in a 5G network or a terminal device in a future-evolving public land mobile network (public land mobile network, PLMN) network, etc.
Alternatively, each network element (for example, the network device 100 and the terminal device 200, etc.) in fig. 1 may be implemented by one device, or may be implemented by a plurality of devices together, or may be a functional module in one device, which is not specifically limited in this embodiment of the present application. It will be appreciated that the above described functionality may be either a network element in a hardware device, a software function running on dedicated hardware, or a virtualized function instantiated on a platform (e.g., a cloud platform).
For example, each network element in fig. 1 may be implemented by the communication device 200 in fig. 2.
Fig. 2 is a schematic hardware structure of a communication device according to an embodiment of the present application. The communication device 200 comprises at least one processor 201, communication lines 202, a memory 203 and at least one communication interface 204.
The processor 201 may be a general purpose central processing unit (central processing unit, CPU), microprocessor, application-specific integrated circuit (ASIC), or one or more integrated circuits for controlling the execution of programs in accordance with aspects of the present application.
Communication line 202 may include a pathway to transfer information between the aforementioned components.
The communication interface 204 uses any transceiver-like device for communicating with other devices or communication networks, such as ethernet, RAN, wireless local area network (wireless local area networks, WLAN), etc.
The memory 203 may be, but is not limited to, a read-only memory (ROM) or other type of static storage device that can store static information and instructions, a random access memory (random access memory, RAM) or other type of dynamic storage device that can store information and instructions, or an electrically erasable programmable read-only memory (electrically erasable programmable read-only memory, EEPROM), a compact disc read-only memory (compact disc read-only memory) or other optical disc storage, optical disc storage (including compact disc, laser disc, optical disc, digital versatile disc, blu-ray disc, etc.), magnetic disk storage media or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer. The memory may be stand alone and be coupled to the processor via communication line 202. The memory may also be integrated with the processor. The memory provided by embodiments of the present application may generally have non-volatility. The memory 203 is used for storing computer-executable instructions for executing the embodiments of the present application, and is controlled by the processor 201 to execute the instructions. The processor 201 is configured to execute computer-executable instructions stored in the memory 203, thereby implementing the methods provided in the embodiments described below.
Alternatively, the computer-executable instructions in the embodiments of the present application may be referred to as application program codes, which are not specifically limited in the embodiments of the present application.
In a particular implementation, as one embodiment, processor 201 may include one or more CPUs, such as CPU0 and CPU1 of FIG. 2.
In a particular implementation, as one embodiment, the communication device 200 may include a plurality of processors, such as processor 201 and processor 207 in FIG. 2. Each of these processors may be a single-core (single-CPU) processor or may be a multi-core (multi-CPU) processor. A processor herein may refer to one or more devices, circuits, and/or processing cores for processing data (e.g., computer program instructions).
In a specific implementation, as an embodiment, the communication device 200 may further include an output device 205 and an input device 206. The output device 205 communicates with the processor 201 and may display information in a variety of ways. For example, the output device 205 may be a liquid crystal display (liquid crystal display, LCD), a light emitting diode (light emitting diode, LED) display device, a Cathode Ray Tube (CRT) display device, or a projector (projector), or the like. The input device 206 is in communication with the processor 201 and may receive user input in a variety of ways. For example, the input device 206 may be a mouse, a keyboard, a touch screen device, a sensing device, or the like.
The communication device 200 may be a general purpose device or a special purpose device. In particular implementations, the communication device 200 may be a desktop, laptop, web server, palmtop (personal digital assistant, PDA), mobile handset, tablet, wireless terminal device, embedded device, or device having a similar structure as in fig. 2. The embodiments of the present application are not limited to the type of communication device 200.
In the following, some terms referred to in the present application are explained:
in a fifth Generation mobile communication technology (5 th-Generation, 5G) network, different services can be provided for different tenants, and service qualities (quality of service, qoS) of the different services are different, so that one physical network can be divided into a plurality of logical networks supporting different services, and one logical network is one network slice. The network access information of the network slices of different services is different. An access network device manages a plurality of cells, each cell supporting one or more network slices. Each network slice supports traffic for a different service.
The service refers to services such as voice, fax, video and data which are required to be transmitted by the terminal equipment on the network.
In the embodiments of the present application, words such as "exemplary" or "such as" are used to mean serving as examples, illustrations, or descriptions. Any embodiment or design described herein as "exemplary" or "for example" should not be construed as preferred or advantageous over other embodiments or designs. Rather, the use of words such as "exemplary" or "such as" is intended to present related concepts in a concrete fashion.
In the present embodiments, "at least one" refers to one or more. "plurality" means two or more.
In the embodiment of the present application, "and/or" is merely an association relationship describing an association object, and indicates that three relationships may exist, for example, a and/or B may indicate: a exists alone, A and B exist together, and B exists alone. In addition, the character "/" herein generally indicates that the front and rear associated objects are an "or" relationship.
The following description of the technical solutions in the embodiments of the present application will be made clearly and completely with reference to the drawings in the embodiments of the present application, and it is apparent that the described embodiments are only some embodiments of the present application, not all embodiments. All other embodiments, which can be made by one of ordinary skill in the art without undue burden from the present disclosure, are within the scope of the present disclosure.
Example 1
Fig. 3 is a schematic flow chart of a method for accessing a network slice according to an embodiment of the present application. The present embodiment can be applied to the communication system shown in fig. 1, for example. The method shown in fig. 3 may comprise the steps of:
s101: and the terminal equipment sends the identification information of the target network slice to the first access network equipment. The first access network device is an access network device accessed by the terminal device. The first access network device is an access network device for managing a current cell, and the current cell is a cell accessed by the terminal device. The current cell does not support the target network slice.
The target network slice is a network slice to which the terminal device requests access, and the target network slice is a logical network capable of providing a specific service to the terminal device.
Alternatively, the terminal device may send the identification information of the target network slice during the process of establishing a radio resource control (radio resource control, RRC) connection with the first access network device, or may send the identification information of the target network slice after establishing an RRC connection with the first access network device. This application is not limited in this regard.
Optionally, when the terminal device sends an RRC connection setup complete message to the first access network device, the RRC connection setup complete message includes identification information of the target network slice.
S102: and the first access network equipment acquires the identification information of the target cell according to the identification information of the target network slice. The target cell is a cell supporting the target network slice.
In one implementation manner, the first access network device may obtain the identification information of the cell corresponding to the identification information of the target network slice according to a pre-stored correspondence between the identification information of the plurality of cells and the identification information of the network slice supported by each of the plurality of cells. The identification information of the cells in the corresponding relationship comprises: the identification information of the cell managed by the first access network device and the identification information of the cell managed by the access network device adjacent to the first access network device. Alternatively, the first access network device may exchange, at power-up, identification information of network slices supported by cells managed by each other with access network devices adjacent to the first access network device through a common interface (e.g., an Xn interface), and store the identification information. In the network operation process, if the network slice supported by a certain cell changes, the access network equipment managing the cell sends a notification to other access network equipment having a public interface with the access network equipment through a public interface, and the notification is used for updating the stored correspondence between the identification information of a plurality of cells and the identification information of the network slice supported by each cell in the plurality of cells by the other access network equipment.
S103: the first access network equipment determines second access network equipment according to the identification information of the target cell. The second access network device is an access network device for managing the target cell.
Specifically, the first access network device obtains the identification information of the access network device corresponding to the identification information of the target cell according to the corresponding relation between the identification information of the plurality of access network devices and the identification information of the cell managed by each access network device, and takes the obtained identification information of the access network device as the identification information of the second access network device.
The maintenance of the correspondence between the identification information of the cell and the identification information of the access network device may refer to the prior art. For example, the access network device may, after power-up, initiate a network interface (e.g., an Xn interface) setup procedure between access network devices in a 5G access network (next generation-RAN, NG-RAN) for interfacing with other adjacent access network devices. In the Xn interface establishment procedure, the first access network device exchanges with the neighboring access network device identification information of each of the one or more cells managed by each of the neighboring access network devices and identification information of the network slice supported by each of the cells. Through Xn interface establishing flow, each access network device stores the corresponding relation between the adjacent identification information of the access network device with Xn interface and the identification information of the cell managed by each access network device.
S104: the first access network device determines that the second access network device is not the same access network device as the first access network device.
It should be noted that, when the second access network device is not the same access network device as the first access network device, the first access network device may execute S105 to S107 to obtain the identification information of the terminal device. When the second access network device and the first access network device are the same access network device, the first access network device can acquire the identification information of the terminal device according to the identification information of the target network slice. Specifically, referring to the implementation in S106, a description thereof is omitted here. The identification information of the terminal device is identification information of the terminal device in the target cell, such as a cell radio network temporary identity (cell-radio network temporary identifier, C-RNTI).
S105: the first access network device sends the identification information of the target network slice to the second access network device.
S106: and the second access network equipment determines to allow the terminal equipment to access the target network slice according to the identification information of the target network slice.
Specifically, the second access network device performs admission control according to the identification information of the target network slice, so as to determine that the load condition of the cell supporting the target network slice allows the terminal device to access the target network slice.
S107: the second access network equipment distributes the identification information of the terminal equipment for the terminal equipment.
S108: the second access network device sends the identification information of the terminal device to the first access network device.
S109: the first access network device sends the identification information of the terminal device to the terminal device.
S110: the first access network device sends an RRC connection setup complete message to the second access network device. The RRC connection setup complete message comes from the terminal device.
Note that S110 may not be performed when the second access network device is the same access network device as the first access network device. The execution sequence of S109 and S110 is not limited in the embodiment of the present application, for example, the first access network device may execute S109 after executing S110.
S111: and the terminal equipment accesses the target network slice according to the identification information of the terminal equipment.
For example, the terminal device switches from the current cell to the target cell according to the identification information of the terminal device, so as to access the target network slice. The terminal device switching to the target cell means that the terminal device is switched from the current cell to the target cell under the condition that no data is loaded.
And after the terminal equipment is transferred to the target cell, the terminal equipment can monitor network access information sent by the second access network equipment in the target cell so as to access the target network slice. The network access information may include: the terminal device accesses necessary information of the target network slice, such as at least one of transmission timing (transmission time-interval, TTI), frequency point or downlink bandwidth information related to the target network slice. Optionally, the network access information may further include at least one of uplink/downlink ratio information related to the target network slice, timer information, a dedicated preamble allocated by the second access network device to the terminal device, bearer configuration information (such as signaling resource radio bearer (sigaling radio bearer, SRB) configuration information), or counter information.
It should be noted that, in the first embodiment, if the first access network device does not acquire the identification information of the terminal device, a message is sent to the terminal device, where the message includes information of a cell that does not support the target network slice, which can be acquired by the first access network device. The terminal device stores the message and reports it to the first access network device via a minimization of drive tests (minimization drive test, MDT) message, which is used by the first access network device to optimize the network. At the same time, the first access network device may send the message to the device where the operation and maintenance management (operation administration and maintenance, OAM) is located for the device to determine in which cells to open the support target network slice.
In this embodiment, the terminal device actively reports the identification information of the target network slice to the first access network device, so that the first access network device distributes the identification information of the terminal device to the terminal device, and the identification information of the terminal device is used for the first access network device to select the target cell. In this way, the terminal device can access the target network slice. On one hand, the occupation of network slice list information to air interface broadcast resources is reduced, on the other hand, the terminal equipment does not need to send the list information of the network slices supported by the cell requiring access to the first access network equipment, and whether the cell where the terminal equipment is located supports the target network slices is judged. Therefore, the efficiency of accessing the terminal equipment into the target network slice is improved, and the energy consumption of the terminal equipment is reduced.
For machine type communication (machine type communication, MTC) type services, an INACTIVE (INACTIVE) state is introduced in 5G, when there is no data to be transmitted by the terminal device for a period of time, the access network device notifies the terminal device to enter the INACTIVE state, a user plane protocol stack of the terminal device is stored in a target cell, and a channel (e.g., N3 tunnel) between the access network device and the core network device for transmitting the service of the terminal device is also reserved. The access network device sends a cell list to the terminal device, and if the terminal device moves within the range of the cell list, the access network device does not need to be notified.
As shown in fig. 4, a network structure diagram applicable to the embodiment of the present application is shown, where the user plane function (userplane function, UPF) 30 in fig. 4 is connected to the target cell through a channel. The cell list sent by the access network device to the terminal device comprises a cell A, a target cell and a cell B. Cell a, target cell and cell B together constitute a RAN-based notification area (RNA). The access network device needs to be informed after the terminal device has moved out of the RNA. In this way, the terminal device need not re-establish a connection with the access network device to transport traffic as long as it is within range of the RAN. However, after each cell is introduced to support a certain network slice, if the service transmitted by the terminal device belongs to the target network slice, the cell currently accessed by the terminal device does not support the target network slice. The terminal device needs to re-establish a connection with the access network device managing the target cell to transmit the service. In view of this, the present application proposes a method of accessing a network slice. Embodiment two describes the method of the access network slice in detail.
Example two
Fig. 5 is a schematic flow chart of another method for accessing a network slice according to an embodiment of the present application. The present embodiment can be applied to the communication system shown in fig. 1, for example. The method shown in fig. 5 may comprise the steps of:
s201: the terminal equipment sends the identification information of the terminal equipment in the target cell and the identification information of the target cell to the first access network equipment. The target cell is a cell supporting the target network slice. The first access network device is an access network device accessed by the terminal device. The target network slice is a network slice to which the terminal device requests access, and the target network slice is a logical network capable of providing a specific service to the terminal device. The first access network device is an access network device for managing a current cell, and the current cell is a cell accessed by the terminal device. The current cell does not support the target network slice.
In one implementation, after establishing an RRC connection with the first access network device, the terminal device sends identification information of the terminal device in the target cell and identification information of the target cell to the first access network device.
The embodiment of the application does not limit how the terminal device sends the identification information of the terminal device in the target cell and the identification information of the target cell to the first access network device. For example, the identification information of the terminal device in the target cell and the identification information of the target cell may be carried in RRC signaling. For example, the terminal device sends an RRC connection resume (RRC connection resume) message to the first access network device, and the identification information of the terminal device in the target cell and the identification information of the target cell are carried in the RRC connection resume message (e.g. in the resume id). The identification information of the terminal device in the target cell and the identification information of the target cell may be carried in one or two new messages designed in the embodiment of the present application.
S202: the first access network equipment determines second access network equipment according to the identification information of the target cell.
Specifically, the first access network device obtains the identification information of the access network device corresponding to the identification information of the target cell according to the corresponding relation between the identification information of the plurality of access network devices and the identification information of the cell managed by each access network device, and takes the obtained identification information of the access network device as the identification information of the second access network device. Thereby determining a second access network device.
S203: the first access network equipment determines that the second access network equipment and the first access network equipment are not the same access network equipment, and allocates a first interface to the terminal equipment according to the identification information of the terminal equipment in the target cell. The first interface is used for receiving the service sent to the terminal equipment by the second access network equipment.
Alternatively, the first interface may be a port in the first access network device.
Optionally, the first interface is further configured to send traffic from the terminal device to the second access network device.
S204: the first access network device sends the identification information of the first interface and the identification information of the terminal device in the target cell to the second access network device.
The method for sending the identification information of the first interface and the identification information of the terminal equipment in the target cell by the first access network equipment to the second access network equipment is not limited, for example, the identification information of the first interface and the identification information of the terminal equipment in the target cell can be included in one message. The identification information of the first interface and the identification information of the terminal device in the target cell may also be sent separately by a plurality of messages.
S205: the second access network device stores the identification information of the first interface, and distributes the second interface to the terminal device according to the identification information of the terminal device in the target cell. The second interface is used for receiving the service from the terminal equipment sent by the first access network equipment.
Alternatively, the second interface may be a port in the second access network device.
Optionally, the second interface is further configured to send the service of the terminal device to the first access network device.
And subsequently, when the second access network equipment needs to send the service to the terminal equipment, the service is sent to the first interface of the first access network equipment, and then the first access network sends the service to the terminal equipment.
S206: the second access network device sends the identification information of the second interface to the first access network device.
S207: the first access network device stores identification information of the second interface.
And subsequently, when the first access network equipment needs to send the service from the terminal equipment to the second access network equipment, sending the service to a second interface of the second access network equipment.
So far, the channel establishment established by the first access network equipment and the second access network equipment for the terminal equipment is completed.
The terminal device may access the target network slice through the first access network device, the tunnel, and the second access network device. Specifically, the terminal device sends a service to the UPF network element through the first access network device, the channel and the second access network device in the current cell. The second access network device sends the service which is sent to the terminal device from the UPF network element to the first access network device through the channel, and the first access network device sends the service to the terminal device.
In this embodiment, the first access network device establishes a channel for the terminal device together with the second access network device according to the received identification information of the terminal device in the target cell from the terminal device, so as to realize that the terminal device accesses the target network slice through the first access network device, the channel and the second access network device. The terminal device does not need to re-establish the RRC connection with the second access network device. The efficiency of accessing the terminal equipment into the target network slice is improved, and the energy consumption of the terminal equipment is reduced.
It should be noted that in the first embodiment, the terminal device finally transfers from the current cell to the target cell to access the target network slice. In the second embodiment, the terminal device does not need to be transferred to the target cell, and still in the current cell, the first access network device managing the current cell sends the service of the terminal device to the core network through the channel and the second access network device.
In addition, it should be noted that, in the first embodiment, the scenario of initial access to the target network slice by the terminal device may be used for the terminal device in the idle state. The terminal device in this state is not connected to the target network slice. The second embodiment may be used in a scenario where a terminal device in an INACTIVE (INACTIVE) state resumes a connection with an access network device. The terminal equipment in the inactive state has been accessed to the target network slice, and the identification information of the target cell and the identification information of the terminal equipment in the target cell are stored in the terminal equipment.
The foregoing description of the solution provided in the embodiments of the present application has been mainly presented in terms of a method. To achieve the above functions, it includes corresponding hardware structures and/or software modules that perform the respective functions. Those of skill in the art will readily appreciate that the various illustrative method steps described in connection with the embodiments disclosed herein may be implemented as hardware or a combination of hardware and computer software. Whether a function is implemented as hardware or computer software driven hardware depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
The embodiment of the application may divide the functional modules of the computer device according to the above method examples, for example, each functional module may be divided corresponding to each function, or two or more functions may be integrated into one processing module. The integrated modules may be implemented in hardware or in software functional modules. It should be noted that, in the embodiment of the present application, the division of the modules is schematic, which is merely a logic function division, and other division manners may be implemented in actual implementation.
Fig. 6 is a schematic structural diagram of a terminal device according to an embodiment of the present application. The terminal device 50 may be adapted to perform the functions performed by the terminal device in any of the embodiments described above (e.g. the embodiments shown in fig. 3 or fig. 5). The terminal device 50 may include: a transmitting module 501, a processing module 502 and a receiving module 503. A sending module 501, configured to send identification information of the target network slice to an access network device, where the access network device is an access network device accessed by the terminal device 50. The identification information of the target network slice is used for the access network device to obtain the identification information of the target cell, so as to obtain the identification information of the terminal device 50. The target cell is a cell supporting the target network slice. The identification information of the terminal device 50 is identification information of the terminal device 50 in the target cell. A receiving module 503, configured to receive identification information of the terminal device 50 sent by the access network device. A processing module 502, configured to access the target network slice according to the identification information of the terminal device 50. For example, in connection with fig. 3, the transmitting module 501 may be configured to perform the transmitting step in S101; the receiving module 503 may be configured to perform the receiving step in S109; the processing module 502 may be used to perform S111. In connection with fig. 5, a transmitting module 501 may be used to perform the transmitting step in S201.
Optionally, the identification information of the target network slice is carried in a radio resource control RRC connection setup complete message.
In one example, referring to fig. 2, the above-described transmitting module 501 and receiving module 503 may be implemented by the communication interface 204 in fig. 2; the processing module 502 may be implemented by the processor 201 in fig. 2 invoking a computer program stored in the memory 203.
Reference is made to the foregoing method embodiments for the detailed description of the foregoing optional modes, and details are not repeated herein. In addition, any explanation and description of the beneficial effects of the terminal device 50 provided above may refer to the corresponding method embodiments described above, and will not be repeated.
It should be noted that the actions correspondingly performed by the above modules are only specific examples, and the actions actually performed by the modules refer to the actions or steps mentioned in the description of the embodiments described above based on fig. 3 and 5.
As shown in fig. 7, an access network device 60 according to an embodiment of the present application may be configured to perform the functions performed by the first access network device in any of the foregoing embodiments (such as the embodiment shown in fig. 3). The access network device 60 includes: a receiving module 601, a processing module 602, and a transmitting module 603. A receiving module 601, configured to receive identification information of a target network slice sent by a terminal device accessing the access network device 60. And the processing module 602 is configured to obtain the identification information of the target cell according to the identification information of the target network slice. The target cell is a cell supporting the target network slice. And determining the identification information of the terminal equipment according to the identification information of the target cell. Wherein the identification information of the terminal device is the identification information of the terminal device in the target cell. The sending module 603 is configured to send identification information of the terminal device to the terminal device. The identification information of the terminal device is used for accessing the terminal device to the target network slice. For example, in connection with fig. 3, the receiving module 601 may be configured to perform the receiving steps in S101, S108. The processing module 602 may be used to perform S102-S104. The transmission module 603 may be configured to perform the transmission steps in S105, S109 to S110.
Optionally, the processing module 602 is specifically configured to: and determining second access network equipment according to the identification information of the target cell. The second access network device is an access network device managing the target cell. The sending module 603 is further configured to: and sending the identification information of the target network slice to the second access network equipment. The identification information of the target network slice is used for the second access network equipment to determine that the terminal equipment is allowed to access the target network slice, and the identification information of the terminal equipment is distributed to the terminal equipment. The receiving module 601 is further configured to: and receiving the identification information of the terminal equipment sent by the second access network equipment.
In one example, referring to fig. 2, the receiving module 601 and the transmitting module 603 described above may be implemented by the communication interface 204 in fig. 2; the processing module 602 may be implemented by the processor 201 in fig. 2 invoking a computer program stored in the memory 203.
Reference is made to the foregoing method embodiments for the detailed description of the foregoing optional modes, and details are not repeated herein. In addition, any explanation and description of the beneficial effects of the access network device 60 provided above may refer to the corresponding method embodiments described above, and will not be repeated.
It should be noted that the actions correspondingly performed by the above modules are only specific examples, and the actions actually performed by the modules refer to the actions or steps mentioned in the description of the embodiment described above based on fig. 3.
As shown in fig. 7, an access network device 60 according to an embodiment of the present application may be configured to perform the functions performed by the second access network device in any of the foregoing embodiments (such as the embodiment shown in fig. 3). The access network device 60 is an access network device that manages a target cell. The target cell is a cell supporting the target network slice. The access network device 60 includes: a receiving module 601, a processing module 602 and a transmitting module 603. The receiving module 601 is configured to receive identification information of a target network slice sent by a first access network device. The first access network device is an access network device to which the terminal device is connected. The target network slice is a network slice to which the terminal device requests access. A processing module 602, configured to determine, according to the identification information of the target network slice, to allow the terminal device to access the target network slice. And distributing the identification information of the terminal equipment to the terminal equipment. The identification information of the terminal device is identification information of the terminal device in the target cell. A sending module 603, configured to send identification information of the terminal device to the first access network device, where the identification information of the terminal device is used for accessing the target network slice. For example, in connection with fig. 3, the receiving module 601 may be configured to perform the receiving steps in S105, S110. The processing module 602 may be used to perform S106-S107. The transmission module 603 may be used to perform the transmission step in S108.
In one example, referring to fig. 2, the receiving module 601 and the transmitting module 603 described above may be implemented by the communication interface 204 in fig. 2; the processing module 602 may be implemented by the processor 201 in fig. 2 invoking a computer program stored in the memory 203.
Reference is made to the foregoing method embodiments for the detailed description of the foregoing optional modes, and details are not repeated herein. In addition, any explanation and description of the beneficial effects of the access network device 60 provided above may refer to the corresponding method embodiments described above, and will not be repeated.
It should be noted that the actions correspondingly performed by the above modules are only specific examples, and the actions actually performed by the modules refer to the actions or steps mentioned in the description of the embodiment described above based on fig. 3.
As shown in fig. 8, an access network device according to an embodiment of the present application is provided, where the access network device 70 may be configured to perform the function performed by the first access network device in any of the foregoing embodiments (such as the embodiment shown in fig. 5). The access network device 70 includes: a receiving module 701 and a processing module 702. The receiving module 701 is configured to receive identification information of a terminal device and identification information of a target cell sent by a terminal device accessing the access network device 70. The target cell is a cell supporting the target network slice. The identification information of the terminal device is identification information of the terminal device in the target cell. A processing module 702 is configured to determine a second access network device according to the identification information of the target cell, where the second access network device is an access network device for managing the target cell. A tunnel is established between the access network device 70 and the second access network device according to the identification information of the terminal device, the tunnel being used for the terminal device to access the target network slice through the access network device 70 and the second access network device.
Optionally, the processing module 702 is specifically configured to allocate a first interface to the terminal device according to the identification information of the terminal device. The first interface is used for receiving the service sent to the terminal equipment by the second access network equipment. The access network device 70 further comprises: a sending module 703, configured to send the identification information of the first interface and the identification information of the terminal device to the second access network device, so that the second access network device stores the identification information of the first interface, and allocate the second interface to the terminal device according to the identification information of the terminal device. The second interface is used to receive traffic from the terminal device sent by the access network device 70. The receiving module 701 is further configured to: and receiving the identification information of the second interface sent by the second access network equipment. The access network device 70 further comprises: and a storage module 704, configured to store identification information of the second interface. For example, in connection with fig. 5, the receiving module 701 may be configured to perform the receiving steps in S201, S206. The processing module 702 may be used to perform S202-S203. The transmission module 703 may be used to perform the transmission step in S204. The storage module 704 may be used to perform S207.
Optionally, the receiving module 701 is further configured to: and receiving the service sent to the terminal equipment by the second access network equipment through the channel. The sending module 703 is further configured to: and sending the service to the terminal equipment.
In one example, referring to fig. 2, the receiving module 701 and the transmitting module 703 described above may be implemented by the communication interface 204 in fig. 2; the processing module 702 may be implemented by the processor 201 in fig. 2 invoking a computer program stored in the memory 203.
Reference is made to the foregoing method embodiments for the detailed description of the foregoing optional modes, and details are not repeated herein. In addition, any explanation and description of the beneficial effects of the access network device 70 provided above may refer to the corresponding method embodiments described above, and will not be repeated.
It should be noted that the actions correspondingly performed by the above modules are only specific examples, and the actions actually performed by the modules refer to the actions or steps mentioned in the description of the embodiment described based on fig. 5.
As shown in fig. 8, an access network device according to an embodiment of the present application is provided, where the access network device 70 may be configured to perform the function performed by the second access network device in any of the foregoing embodiments (such as the embodiment shown in fig. 5). The access network device 70 is an access network device that manages a target cell. The target cell is a cell supporting the target network slice. The access network device 70 includes: a receiving module 701, configured to receive identification information of a first interface and identification information of a terminal device sent by a first access network device. The first access network device is an access network device to which the terminal device accesses. The first interface is for receiving traffic sent by the access network device 70 to the terminal device. The first interface is an interface allocated by the first access network device to the terminal device. The identification information of the terminal device is identification information of the terminal device in the target cell. And the storage module 704 is configured to store identification information of the first interface. And the processing module 702 is configured to allocate a second interface to the terminal device according to the identification information of the terminal device. The second interface is used for receiving the service from the terminal equipment sent by the first access network equipment. A sending module 703, configured to send the identification information of the second interface to the first access network device, so that the first access network device stores the identification information of the second interface. Wherein the first interface and the second interface are used for the terminal device to access the target network slice through the first access network device and the access network device 70. For example, in connection with fig. 5, the receiving module 701 may be configured to perform the receiving step in S204. The processing module 702 is configured to execute S205. The transmission module 703 may be used to perform the transmission step in S206. The storage module 704 may be used to perform the operation of storing the identification information of the first interface in S205.
Optionally, the sending module 703 is further configured to send a service of the terminal device to a first interface of the first access network device; the method is used for the first access network equipment to send the service of the terminal equipment to the terminal equipment.
In one example, referring to fig. 2, the receiving module 701 and the transmitting module 703 described above may be implemented by the communication interface 204 in fig. 2; the processing module 702 may be implemented by the processor 201 in fig. 2 invoking a computer program stored in the memory 203.
Reference is made to the foregoing method embodiments for the detailed description of the foregoing optional modes, and details are not repeated herein. In addition, any explanation and description of the beneficial effects of the access network device 70 provided above may refer to the corresponding method embodiments described above, and will not be repeated.
It should be noted that the actions correspondingly performed by the above modules are only specific examples, and the actions actually performed by the modules refer to the actions or steps mentioned in the description of the embodiment described based on fig. 5.
The embodiment of the application also provides an apparatus (such as a computer device or a chip), including: a memory and a processor; the memory is used to store a computer program that is used by the processor to invoke the computer program to perform the actions or steps mentioned in any of the embodiments provided above.
Embodiments of the present application also provide a computer-readable storage medium having stored thereon a computer program which, when run on a computer, causes the computer to perform the actions or steps mentioned in any of the embodiments provided above.
The embodiment of the application also provides a chip. The chip has integrated therein circuitry and one or more interfaces for implementing the functions of the network device described above. Optionally, the functions supported by the chip may include processing actions in the embodiments described based on fig. 3 and fig. 5, which are not described herein. Those of ordinary skill in the art will appreciate that all or a portion of the steps implementing the above-described embodiments may be implemented by a program to instruct associated hardware. The program may be stored in a computer readable storage medium. The above-mentioned storage medium may be a read-only memory, a random access memory, or the like. The processing unit or processor may be a central processing unit, a general purpose processor, an application specific integrated circuit (application specific integrated circuit, ASIC), a microprocessor (digital signal processor, DSP), a field programmable gate array (field programmable gate array, FPGA) or other programmable logic device, transistor logic device, hardware components, or any combination thereof.
Embodiments of the present application also provide a computer program product comprising instructions which, when run on a computer, cause the computer to perform any of the methods of the above embodiments. The computer program product includes one or more computer instructions. When the computer program instructions are loaded and executed on a computer, the processes or functions described in accordance with embodiments of the present application are produced in whole or in part. The computer may be a general purpose computer, a special purpose computer, a computer network, or other programmable apparatus. The computer instructions may be stored in or transmitted from one computer-readable storage medium to another, for example, a website, computer, server, or data center via a wired (e.g., coaxial cable, fiber optic, digital subscriber line (digital subscriber line, DSL)) or wireless (e.g., infrared, wireless, microwave, etc.) means. Computer readable storage media can be any available media that can be accessed by a computer or data storage devices including one or more servers, data centers, etc. that can be integrated with the media. The usable medium may be a magnetic medium (e.g., a floppy disk, a hard disk, a magnetic tape), an optical medium (e.g., a DVD), or a semiconductor medium (e.g., a Solid State Disk (SSD)), or the like.
It should be noted that the above-mentioned devices for storing computer instructions or computer programs, such as, but not limited to, the above-mentioned memories, computer-readable storage media, communication chips, and the like, provided in the embodiments of the present application all have non-volatility (non-transparency).
Other variations to the disclosed embodiments can be understood and effected by those skilled in the art in practicing the claimed application, from a study of the drawings, the disclosure, and the appended claims. In the claims, the word "comprising" does not exclude other elements or steps, and the "a" or "an" does not exclude a plurality. A single processor or other unit may fulfill the functions of several items recited in the claims. The mere fact that certain measures are recited in mutually different dependent claims does not indicate that a combination of these measures cannot be used to advantage.
The foregoing is merely illustrative of the present invention, and the present invention is not limited thereto, and any person skilled in the art will readily recognize that variations or substitutions are within the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (18)

1. A method of accessing a network slice, for application to a terminal device, the method comprising:
the method comprises the steps of sending identification information of a target network slice to first access network equipment, wherein the first access network equipment is access network equipment accessed by the terminal equipment; the identification information of the target network slice is used for the first access network equipment to acquire the identification information of the target cell according to the corresponding relation between the prestored identification information of a plurality of cells and the identification information of the network slice supported by each cell in the plurality of cells; the target cell is a cell supporting the target network slice; the identification information of the network slice supported by each cell is obtained through a public interface; the identification information of the target cell is used for the first access network equipment to determine the identification information of the terminal equipment; the identification information of the terminal equipment is the identification information of the terminal equipment in the target cell;
receiving the identification information of the terminal equipment sent by the first access network equipment;
and accessing the target network slice according to the identification information of the terminal equipment.
2. The method of claim 1, wherein the identification information of the target network slice is carried in a radio resource control, RRC, connection setup complete message.
3. A method of accessing a network slice for use with a first access network device, the method comprising:
receiving identification information of a target network slice sent by terminal equipment accessed to the first access network equipment;
acquiring the identification information of a target cell according to the corresponding relation between the prestored identification information of a plurality of cells and the identification information of the network slice supported by each cell in the plurality of cells and the identification information of the target network slice; the target cell is a cell supporting the target network slice; the identification information of the network slice supported by each cell is obtained through a public interface;
determining the identification information of the terminal equipment according to the identification information of the target cell; wherein the identification information of the terminal equipment is the identification information of the terminal equipment in the target cell;
transmitting the identification information of the terminal equipment to the terminal equipment; the identification information of the terminal equipment is used for the terminal equipment to access the target network slice.
4. A method according to claim 3, wherein said determining the identification information of the terminal device based on the identification information of the target cell comprises:
Determining a second access network device according to the identification information of the target cell; the second access network device is an access network device for managing the target cell;
transmitting the identification information of the target network slice to a second access network device; the identification information of the target network slice is used for the second access network equipment to determine that the terminal equipment is allowed to access the target network slice, and the identification information of the terminal equipment is distributed to the terminal equipment;
and receiving the identification information of the terminal equipment sent by the second access network equipment.
5. A method of accessing a network slice, characterized by being applied to a second access network device, the second access network device being an access network device managing a target cell; the target cell is a cell supporting a target network slice; the method comprises the following steps:
receiving identification information of the target network slice sent by first access network equipment; the first access network equipment is access network equipment accessed by the terminal equipment; the target network slice is a network slice to which the terminal equipment requests access; the identification information of the target network slice is used for the first access network equipment to acquire the identification information of the target cell according to the corresponding relation between the prestored identification information of a plurality of cells and the identification information of the network slice supported by each cell in the plurality of cells; the identification information of the target cell is used for the first access network equipment to determine the second access network equipment; the identification information of the network slice supported by each cell is obtained through a public interface;
Determining to allow the terminal equipment to access the target network slice according to the identification information of the target network slice;
distributing the identification information of the terminal equipment to the terminal equipment; the identification information of the terminal equipment is the identification information of the terminal equipment in the target cell;
and sending the identification information of the terminal equipment to the first access network equipment, wherein the identification information of the terminal equipment is used for the terminal equipment to access the target network slice.
6. A method of accessing a network slice for use with a first access network device, the method comprising:
receiving identification information of terminal equipment and identification information of a target cell, wherein the identification information of the terminal equipment and the identification information of the target cell are sent by the terminal equipment accessed to the first access network equipment; the target cell is a cell supporting a target network slice; the identification information of the terminal equipment is the identification information of the terminal equipment in the target cell;
determining a second access network device according to the identification information of the target cell; the second access network device is an access network device for managing the target cell;
establishing a channel between the first access network equipment and the second access network equipment according to the identification information of the terminal equipment; the channel is used for the terminal equipment to access the target network slice through the first access network equipment and the second access network equipment.
7. The method of claim 6, wherein the establishing a tunnel between the first access network device and the second access network device based on the identification information of the terminal device comprises:
according to the identification information of the terminal equipment, a first interface is allocated to the terminal equipment; the first interface is used for the first access network equipment to receive the service sent to the terminal equipment by the second access network equipment;
the identification information of the first interface and the identification information of the terminal equipment are sent to the second access network equipment, so that the second access network equipment stores the identification information of the first interface, and a second interface is distributed to the terminal equipment according to the identification information of the terminal equipment; the second interface is used for receiving the service from the terminal equipment sent by the first access network equipment by the second access network equipment;
receiving identification information of the second interface sent by the second access network equipment;
and storing the identification information of the second interface.
8. The method according to claim 6 or 7, characterized in that the method further comprises:
receiving the service sent to the terminal equipment by the second access network equipment through the channel;
And sending the service to the terminal equipment.
9. A terminal device, characterized in that the terminal device comprises:
a sending module, configured to send identification information of a target network slice to a first access network device, where the first access network device is an access network device to which the terminal device is connected; the identification information of the target network slice is used for the first access network equipment to acquire the identification information of the target cell according to the corresponding relation between the prestored identification information of a plurality of cells and the identification information of the network slice supported by each cell in the plurality of cells; the target cell is a cell supporting the target network slice; the identification information of the network slice supported by each cell is obtained through a public interface; the identification information of the target cell is used for the first access network equipment to determine the identification information of the terminal equipment; the identification information of the terminal equipment is the identification information of the terminal equipment in the target cell;
a receiving module, configured to receive identification information of the terminal device sent by the first access network device;
and the processing module is used for accessing the target network slice according to the identification information of the terminal equipment.
10. The terminal device according to claim 9, wherein the identification information of the target network slice is carried in a radio resource control, RRC, connection setup complete message.
11. A first access network device, the first access network device comprising:
the receiving module is used for receiving the identification information of the target network slice sent by the terminal equipment accessed to the first access network equipment;
the processing module is used for acquiring the identification information of the target cell according to the corresponding relation between the prestored identification information of a plurality of cells and the identification information of the network slice supported by each cell in the plurality of cells and the identification information of the target network slice; the target cell is a cell supporting the target network slice; the identification information of the network slice supported by each cell is obtained through a public interface;
determining the identification information of the terminal equipment according to the identification information of the target cell; wherein the identification information of the terminal equipment is the identification information of the terminal equipment in the target cell;
a sending module, configured to send identification information of the terminal device to the terminal device; the identification information of the terminal equipment is used for the terminal equipment to access the target network slice.
12. The access network device of claim 11, wherein,
the processing module is specifically configured to: determining a second access network device according to the identification information of the target cell; the second access network device is an access network device for managing the target cell;
the sending module is further configured to: transmitting the identification information of the target network slice to a second access network device; the identification information of the target network slice is used for the second access network equipment to determine that the terminal equipment is allowed to access the target network slice, and the identification information of the terminal equipment is distributed to the terminal equipment;
the receiving module is further configured to: and receiving the identification information of the terminal equipment sent by the second access network equipment.
13. A second access network device, wherein the second access network device is an access network device managing a target cell; the target cell is a cell supporting a target network slice; the second access network device includes:
the receiving module is used for receiving the identification information of the target network slice sent by the first access network equipment; the first access network equipment is access network equipment accessed by the terminal equipment; the target network slice is a network slice to which the terminal equipment requests access; the identification information of the target network slice is used for the first access network equipment to acquire the identification information of the target cell according to the corresponding relation between the prestored identification information of a plurality of cells and the identification information of the network slice supported by each cell in the plurality of cells; the identification information of the target cell is used for the first access network equipment to determine the second access network equipment; the identification information of the network slice supported by each cell is obtained through a public interface;
The processing module is used for determining that the terminal equipment is allowed to access the target network slice according to the identification information of the target network slice; distributing the identification information of the terminal equipment to the terminal equipment; the identification information of the terminal equipment is the identification information of the terminal equipment in the target cell;
and the sending module is used for sending the identification information of the terminal equipment to the first access network equipment, wherein the identification information of the terminal equipment is used for accessing the terminal equipment into the target network slice.
14. An access network device, the access network device comprising:
a receiving module, configured to receive identification information of a terminal device and identification information of a target cell, where the identification information is sent by the terminal device accessing the access network device; the target cell is a cell supporting a target network slice; the identification information of the terminal equipment is the identification information of the terminal equipment in the target cell;
the processing module is used for determining second access network equipment according to the identification information of the target cell; the second access network device is an access network device for managing the target cell; establishing a channel between the access network equipment and the second access network equipment according to the identification information of the terminal equipment; the channel is used for the terminal equipment to access the target network slice through the access network equipment and the second access network equipment.
15. The access network device of claim 14, wherein the processing module is specifically configured to: according to the identification information of the terminal equipment, a first interface is allocated to the terminal equipment; the first interface is used for the access network equipment to receive the service sent to the terminal equipment by the second access network equipment;
the access network device further comprises: a sending module, configured to send, to the second access network device, identification information of the first interface and identification information of the terminal device; the identification information of the first interface is used for the second access network equipment to store the identification information of the first interface, and a second interface is allocated to the terminal equipment according to the identification information of the terminal equipment; the second interface is used for receiving the service from the terminal equipment, which is sent by the access network equipment, by the second access network equipment;
the receiving module is further configured to: receiving identification information of the second interface sent by the second access network equipment;
the access network device further comprises: and the storage module is used for storing the identification information of the second interface.
16. The access network device of claim 15, wherein,
The receiving module is further configured to: receiving the service sent to the terminal equipment by the second access network equipment through the channel;
the sending module is further configured to: and sending the service to the terminal equipment.
17. An apparatus for accessing a network slice, comprising: a memory and a processor; the memory is for storing a computer program, the processor is for invoking the computer program to perform the method of any of claims 1 to 8.
18. A computer readable storage medium, characterized in that the computer readable storage medium has stored thereon a computer program which, when run on a computer, causes the computer to perform the method of any of claims 1 to 8.
CN201980098916.6A 2019-12-30 2019-12-30 Method and device for accessing network slice Active CN114175727B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2019/130218 WO2021134377A1 (en) 2019-12-30 2019-12-30 Network slice accessing method and apparatus

Publications (2)

Publication Number Publication Date
CN114175727A CN114175727A (en) 2022-03-11
CN114175727B true CN114175727B (en) 2023-04-28

Family

ID=76687528

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201980098916.6A Active CN114175727B (en) 2019-12-30 2019-12-30 Method and device for accessing network slice

Country Status (2)

Country Link
CN (1) CN114175727B (en)
WO (1) WO2021134377A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114095158A (en) * 2021-11-04 2022-02-25 中国电信股份有限公司 Network slice selection method, system, device and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108696910A (en) * 2017-04-11 2018-10-23 华为技术有限公司 A kind of method, apparatus and storage medium of selection target base station
CN108924884A (en) * 2017-04-04 2018-11-30 华为技术有限公司 Communication means and communication equipment
CN109041137A (en) * 2016-01-16 2018-12-18 华为技术有限公司 A kind of method of switching, base station and terminal device

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102281606B (en) * 2010-06-11 2014-07-30 华为技术有限公司 Method, device and system for switching communication paths
US10349324B2 (en) * 2016-11-03 2019-07-09 Industrial Technology Research Institute User equipment, access node and slice-based handover method thereof
CN117998503A (en) * 2017-06-16 2024-05-07 华为技术有限公司 Communication method, access network equipment and core network equipment
US10757618B2 (en) * 2018-02-07 2020-08-25 Lg Electronics Inc. Method and apparatus for performing handover

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109041137A (en) * 2016-01-16 2018-12-18 华为技术有限公司 A kind of method of switching, base station and terminal device
CN108924884A (en) * 2017-04-04 2018-11-30 华为技术有限公司 Communication means and communication equipment
CN108696910A (en) * 2017-04-11 2018-10-23 华为技术有限公司 A kind of method, apparatus and storage medium of selection target base station

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
R3-181687 "Further Discussion and 38.300 TP on Slice Aware Mobility";ZTE;《3GPP tsg_ran\WG3_Iu》;20180405;全文 *

Also Published As

Publication number Publication date
CN114175727A (en) 2022-03-11
WO2021134377A1 (en) 2021-07-08

Similar Documents

Publication Publication Date Title
US11425634B2 (en) Slice information update method and apparatus
US20230180274A1 (en) Data scheduling method, base station, and system
CN111567113B (en) Session establishment method, relay device selection method, registration method and device
US20210377847A1 (en) Communication method, terminal device, and core network device
EP3493642A1 (en) Terminal state conversion method and apparatus
US20240080750A1 (en) Mobile telecommunications system method, user equipment and base station for transmitting on demand system information
US20220264378A1 (en) Communication Method, Device, and System
CN113810964B (en) Communication method and device
CN114175727B (en) Method and device for accessing network slice
WO2020164470A1 (en) Communication method, apparatus, and system
WO2023028991A1 (en) Method and apparatus for small data transmission
US10057871B2 (en) Data transmission method and base station
US11963218B2 (en) Communications method and communications apparatus
US9332459B1 (en) Method and system for setting a hold-timer duration
US20240056926A1 (en) Communication method and apparatus for obtaining load information
US12035174B2 (en) Rate control method, apparatus, and system
US20210099912A1 (en) Rate control method, apparatus, and system
US20220039018A1 (en) Terminal device management method and apparatus
CN114642079B (en) Communication method and device
CN114731731B (en) Communication method and device
EP4397125A1 (en) Method and apparatus for small data transmission
CN115209489A (en) Network switching method and device
KR20220123979A (en) Method and apparatus for providing integrated paging in communication system
CN117769056A (en) Communication method and device
CN118250761A (en) Cell switching method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant