CN115515125A - Control method, device and system for slice access - Google Patents

Control method, device and system for slice access Download PDF

Info

Publication number
CN115515125A
CN115515125A CN202110691328.2A CN202110691328A CN115515125A CN 115515125 A CN115515125 A CN 115515125A CN 202110691328 A CN202110691328 A CN 202110691328A CN 115515125 A CN115515125 A CN 115515125A
Authority
CN
China
Prior art keywords
slice
access
network
visited network
users
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110691328.2A
Other languages
Chinese (zh)
Inventor
聂衡
李鹏宇
邢燕霞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Telecom Corp Ltd
Original Assignee
China Telecom Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Telecom Corp Ltd filed Critical China Telecom Corp Ltd
Priority to CN202110691328.2A priority Critical patent/CN115515125A/en
Publication of CN115515125A publication Critical patent/CN115515125A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/26Network addressing or numbering for mobility support
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/0268Traffic management, e.g. flow control or congestion control using specific QoS parameters for wireless networks, e.g. QoS class identifier [QCI] or guaranteed bit rate [GBR]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions
    • H04W48/06Access restriction performed under specific conditions based on traffic conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/18Selecting a network or a communication service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/11Allocation or use of connection identifiers

Abstract

The disclosure relates to a slice access control method, device and system, and relates to the technical field of communication. The control method comprises the following steps: receiving a slice access request of a roaming user sent by a visiting network; judging whether the number of the users of the slices of the home network or the slices of the visited network reaches an upper limit or not according to at least one of the slice information of the home network of the roaming user or the slice information of the visited network in the slice access request; and determining whether to allow the roaming user to access the slice of the home network or the slice of the visited network according to the judgment result.

Description

Control method, device and system for slice access
Technical Field
The present disclosure relates to the field of communications technologies, and in particular, to a slice access control method, a slice access control device, a slice access control system, and a non-volatile computer-readable storage medium.
Background
In order to meet the requirements of SLA (Service Level Agreement), it is often necessary to control the maximum number of access users allowed by a slice.
Disclosure of Invention
The inventors of the present disclosure found that the following problems exist in the above-described related art: mobile network standards and practical applications do not support quantity control of slice roaming users, and SLA requirements cannot be met, resulting in reduced communication performance.
In view of this, the present disclosure provides a slice access control technical solution, which can control the number of slice roaming users, and meet the SLA requirements, thereby improving the communication performance.
According to some embodiments of the present disclosure, there is provided a slice access control method, including: receiving a slice access request of a roaming user sent by a visiting network; judging whether the number of the users of the slices of the home network or the slices of the visited network reaches an upper limit or not according to at least one of the slice information of the home network of the roaming user or the slice information of the visited network in the slice access request; and determining whether to allow the roaming user to access the slice of the home network or the slice of the visited network according to the judgment result.
In some embodiments, determining whether the number of users of the slice of the home network or the slice of the visited network reaches the upper limit according to at least one of the slice information of the home network or the slice information of the visited network of the roaming user in the slice access request includes: searching the upper limit of the number of the access users allowed by the pre-configured slice of the home network according to the slice identifier of the home network of the roaming user in the slice access request; judging whether the current user number of the slice of the home network reaches the upper limit of the number of the allowed access users; or searching the upper limit of the number of the access users allowed by the preset slice of the visiting network according to the slice identification of the visiting network of the roaming user in the slice access request; and judging whether the current user number of the slice of the visiting network reaches the upper limit of the number of the allowed access users.
In some embodiments, the Slice identity of the Home Network is HPLMN S-NSSAI (Home Public Land Mobile Network Single Network Slice Selection Assistance Information), and the Slice identity of the visited Network is VPLMN S-NSSAI (Virtual Public Land Mobile Network Single Network Slice Selection Assistance Information).
In some embodiments, determining whether the number of users of the slice of the home network or the slice of the visited network reaches an upper limit comprises: and judging whether at least one of the number of the roaming users of the slice of the home network, the sum of the number of the roaming users of the slice of the visited network and the number of the non-roaming users and the number of the roaming users of the slice of the visited network reaches an upper limit or not.
In some embodiments, determining whether to allow the roaming user to access the slice of the home network or the slice of the visited network according to the determination result comprises: under the condition that the number of the users does not reach the upper limit, allowing the roaming user to Access the slice of the home network or the slice of the visited network, and sending a control response allowing the slice Access to an AMF (Access and Mobility Management Function) entity of the visited network of the roaming user; and under the condition that the number of the users reaches the upper limit, rejecting the roaming user to access the slice of the home network or the slice of the visited network, and sending a control response of rejecting the slice access to the AMF entity of the visited network of the roaming user.
In some embodiments, the slice access request is sent by the AMF entity of the visited network when the roaming user registers to or deregisters from the visited network.
In some embodiments, the AMF entity that requests the slice access to the visited Network finds a corresponding slice admission control Function entity through an NRF (Network Repository Function) entity according to slice information of the visited Network, and sends the slice admission control Function entity with the slice access request.
According to other embodiments of the present disclosure, there is provided a slice access control apparatus including: a receiving unit, configured to receive a slice access request of a roaming user sent by a visited network; a judging unit, configured to judge whether the number of users in a slice of the home network or a slice of the visited network reaches an upper limit according to at least one of slice information of the home network of the roaming user or slice information of the visited network in the slice access request; and the determining unit is used for determining whether the roaming user is allowed to access the slice of the home network or the slice of the visited network according to the judgment result.
In some embodiments, the determining unit allows the roaming user to access the slice of the home network or the slice of the visited network if the number of users does not reach the upper limit, and rejects the roaming user to access the slice of the home network or the slice of the visited network if the number of users reaches the upper limit.
In some embodiments, the control device further comprises: and the sending unit is used for sending the control response of allowing the slice access to the AMF entity of the visited network of the roaming user and sending the control response of refusing the slice access to the AMF entity of the visited network of the roaming user.
According to still further embodiments of the present disclosure, there is provided a slice access control system, including: a slice admission control function entity for executing a slice admission control method in any one of the embodiments; and the access and mobility management function AMF entity is used for sending the slice access request of the roaming user sent by the visiting network to the slice admission control function entity.
In some embodiments, the control system further comprises: an NRF entity; and the AMF entity searches a corresponding slice admission control function entity through the NRF entity according to the slice information of the visited network.
According to still other embodiments of the present disclosure, there is provided a slice access control apparatus, including: a memory; and a processor coupled to the memory, the processor configured to perform the method of controlling slice access in any of the above embodiments based on instructions stored in the memory device.
According to still further embodiments of the present disclosure, there is provided a non-transitory computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements a control method of slice access in any of the above embodiments.
In the above embodiment, the slice admission control function entity controls the number of users in the slices of the home network or the slices of the visited network according to the slice information of the home network or the slice information of the visited network, so as to meet the SLA requirements, thereby improving the communication performance.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments of the disclosure and together with the description, serve to explain the principles of the disclosure.
The present disclosure may be more clearly understood from the following detailed description, taken with reference to the accompanying drawings, in which:
fig. 1 illustrates a flow diagram of some embodiments of a control method of slice access of the present disclosure;
FIG. 2 illustrates a flow diagram of some embodiments of step 120 of FIG. 1;
fig. 3 illustrates a signaling diagram of some embodiments of a control method of slice access of the present disclosure;
fig. 4 illustrates a block diagram of some embodiments of a control apparatus for slice access of the present disclosure;
fig. 5 shows a block diagram of further embodiments of a control device for slice access of the present disclosure;
fig. 6 shows a block diagram of further embodiments of a control apparatus for slice access of the present disclosure;
fig. 7 illustrates a block diagram of some embodiments of a control system for slice access of the present disclosure.
Detailed Description
Various exemplary embodiments of the present disclosure will now be described in detail with reference to the accompanying drawings. It should be noted that: the relative arrangement of the components and steps, the numerical expressions, and numerical values set forth in these embodiments do not limit the scope of the present disclosure unless specifically stated otherwise.
Meanwhile, it should be understood that the sizes of the respective portions shown in the drawings are not drawn in an actual proportional relationship for the convenience of description.
The following description of at least one exemplary embodiment is merely illustrative in nature and is in no way intended to limit the disclosure, its application, or uses.
Techniques, methods, and apparatus known to those of ordinary skill in the relevant art may not be discussed in detail, but are intended to be part of the specification where appropriate.
In all examples shown and discussed herein, any particular value should be construed as exemplary only and not as limiting. Thus, other examples of the exemplary embodiments may have different values.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, further discussion thereof is not required in subsequent figures.
In order to solve the technical problem, the mobile network disclosed by the present disclosure implements quantity control on the number of allowed access users under the condition of slice roaming through a special network function entity, and meets the requirements of slice SLA under the condition of roaming, thereby further optimizing network resource usage.
For example, the technical solutions of the present disclosure can be realized by the following embodiments.
Fig. 1 illustrates a flow diagram of some embodiments of a control method of slice access of the present disclosure.
As shown in fig. 1, in step 110, a slice access request of a roaming user from a visited network is received.
In some embodiments, the slice access request is sent by the AMF entity of the visited network when the roaming user registers to or deregisters from the visited network. For example, when a roaming user registers to a slice of a visited network, or deregisters from a slice, the AMF entity initiates a slice admission request to the slice admission control function.
In some embodiments, the AMF entity of the visited network finds the corresponding slice admission control function entity through the NRF entity according to the slice information of the visited network, and sends the slice admission control function entity with the slice access request.
In step 120, it is determined whether the number of the users in the slice of the home network or the slice of the visited network reaches an upper limit according to at least one of the slice information of the home network or the slice information of the visited network of the roaming user in the slice access request.
In some embodiments, it is determined whether at least one of the number of roaming users of the slice of the home network, the sum of the number of roaming users of the slice of the visited network and the number of non-roaming users, and the number of roaming users of the slice of the visited network reaches an upper limit.
In some embodiments, the request message of the AMF entity contains the slice ID of the visited network (e.g., VPLMN S-NSSAI) and the mapped home network slice ID (e.g., HPLMN S-NSSAI). According to the configuration of an operator, the slice admission control function can control the number of different slice users. Step 120 may be implemented, for example, by the embodiment of fig. 2.
Fig. 2 shows a flow diagram of some embodiments of step 120 of fig. 1.
As shown in fig. 2, in step 1210, an upper limit of the number of slice-allowed access users of the home network configured in advance is searched according to the slice identifier of the home network of the roaming user in the slice access request.
In some embodiments, according to the mapped home network slice ID of the admission request sent by the AMF entity, the slice admission control function entity determines whether the slice reaches the upper limit of the number of users, so as to deny or allow the users to access.
In some embodiments, the slice admission control function entity of the visited network may pre-configure the maximum number of allowed access users of a slice of the home network according to roaming agreements of both parties.
For example, the slice admission control function entity may store the maximum number of allowed access users of a plurality of home slices in advance, and perform admission control of the slices in a unified manner.
In step 130, it is determined whether the current number of users of the slice of the home network reaches an upper limit of the number of allowed access users.
In some embodiments, according to the slice identifier of the visited network of the roaming user in the slice access request, searching a pre-configured upper limit of the number of the access users allowed by the slice of the visited network; and judging whether the current user number of the slice of the visiting network reaches the upper limit of the number of the allowed access users.
For example, the slice of the home network is identified as HPLMNS-NSSAI and the slice of the visited network is identified as VPLMNS-NSSAI.
In some embodiments, according to the slice ID of the visited network of the admission request sent by the AMF entity, the slice admission control function entity determines whether the slice reaches the upper limit of the number of users, so as to deny or allow the users to access.
In this way, the number of roaming users using visited network slices can be controlled, since roaming users from different home networks can all use the same visited network slice.
Since both non-roaming and roaming subscribers can use the same visited network slice, the number of all subscribers using the visited network slice, including both non-roaming and roaming subscribers, can also be controlled.
After the determination result is obtained, the processing may be continued by using the remaining steps in fig. 1.
In step 130, it is determined whether to allow the roaming user to access the slice of the home network or the slice of the visited network according to the determination result.
In some embodiments, in the case that the number of the users does not reach the upper limit, the roaming user is allowed to access the slice of the home network or the slice of the visited network, and a control response allowing the slice access is sent to the AMF entity of the visited network of the roaming user.
In some embodiments, when the number of users reaches the upper limit, the roaming user is denied access to the slice of the home network or the slice of the visited network, and a control response of denying the access to the slice is sent to the AMF entity of the visited network of the roaming user.
Fig. 3 illustrates a signaling diagram of some embodiments of the control method of slice access of the present disclosure.
As shown in fig. 3, in some embodiments, some technical conditions may be preconfigured before performing the steps in the figure: according to roaming agreements of both parties, the slice admission control function of the visited network configures the maximum number of allowed access users of the slices of the home network; the slice admission control function of the visited network registers its own slice supporting the visited network into the NRF entity.
In event 1, a roaming UE (user equipment) accesses a VPLMN and initiates a slice registration procedure to the AMF entity.
At event 2, the AMF entity of the VPLMN performs slice registration processing for the roaming UE.
For example, the registration process may include registering the actual VPLMN S-NSSAI and the corresponding HPLMN S-NSSAI used by the UE at the visited network. If the UE is a non-roaming user, only VPLMN S-NSSAI is included.
In event 3, the AMF entity learns the user quantity control that the slice accessed by the UE needs to execute the maximum allowable flooding of the slice, and searches and determines the corresponding slice admission control function entity according to the corresponding VPLMN S-NSSAI through the NRF entity.
In event 4, the AMF entity initiates a slice admission control operation to the slice admission control function entity.
For example, the slice admission control operation includes the VPLMN S-NSSAI, HPLMN S-NSSAI of the slice requesting access.
In event 5, based on the configuration of the operator, the slice admission control function entity determines whether the number of registered roaming users of the current slice (identified as HPLMN S-NSSAI) reaches an upper limit; if not, the user is allowed access to the slice.
For example, based on the configuration of an operator, the slice admission control function entity may also determine whether the number of registered roaming users of a current slice (identified as VPLMN S-NSSAI) reaches an upper limit; if not, the user is allowed access to the slice.
For example, based on the configuration of the operator, the slice admission control function entity may further determine whether the number of registered roaming and non-roaming users of the current slice (identified as VPLMN S-NSSAI) reaches an upper limit; if not, the user is allowed access to the slice.
In event 6, the slice admission control function entity sends the judgment result of event 5 to the AMF entity, and the AMF entity completes the subsequent slice registration processing flow of the UE.
For example, the AMF entity may deny or allow the UE to access the corresponding slice.
In some embodiments, the AMF entity sends information of the slice used by the roaming UE, including the HPLMN S-NSSAI and the VPLMN S-NSSAI, to the slice admission control function in a slice registration procedure of the UE. If the UE is a non-roaming user, only VPLMN S-NSSAI is included.
Based on the parameter VPLMN S-NSSAI, the AMF entity searches the slice admission control function in the network through the NRF entity.
And the slice admission control functional entity judges whether the number of registered roaming users of the current slice reaches the upper limit or not according to the received HPLMN S-NSSAI and VPLMN S-NSSAI. If the upper limit is not reached, the user is allowed to access the slice, and the number of the roaming users registered to the current slice is increased by one.
And the slice admission control function entity sends the judgment result to the AMF entity, and the AMF entity completes the subsequent slice registration processing flow of the UE.
According to the roaming agreement, the slice admission control function entity may store a maximum allowed upper limit of the number of registered users for a plurality of HPLMN S-NSSAIs.
According to the configuration of an operator, a slice admission control function entity can process the control of the number of roaming users of a slice (based on HPLMN S-NSSAI); all user number control (based on VPLMN S-NSSAI) using slices in the network, including roaming users and non-roaming users; all the control of the number of the roaming users (based on VPLMN S-NSSAI) by using the slices in the network.
In the above embodiment, for the technical problem of controlling the number of users allowed to access under the condition that the 5G network does not support slice roaming, the AMF entity of the visited network is used to send the local S-NSSAI of the roaming user and the mapped home network S-NSSAI to the slice admission control function entity in a unified manner. Thus, the number of users in a slice is controlled in roaming situations.
The slice admission control function entity distinguishes different home networks S-NSSAI, and stores the maximum signed user number and the current actual user number respectively to judge whether the user number reaches the upper limit or not.
Therefore, the user number control capability under the slice roaming condition can be provided based on the SLA requirement of the client slice, and the network resource can be accurately controlled.
Fig. 4 illustrates a block diagram of some embodiments of a control apparatus of slice access of the present disclosure.
As shown in fig. 4, the slice access control device 4 includes a receiving unit 41, a determining unit 42, and a determining unit 43.
A receiving unit 41, configured to receive a slice access request of a roaming user sent by a visited network.
A determining unit 42, configured to determine whether the number of users in a slice of the home network or a slice of the visited network reaches an upper limit according to at least one of the slice information of the home network of the roaming user or the slice information of the visited network in the slice access request.
A determining unit 43, configured to determine whether to allow the roaming user to access the slice of the home network or the slice of the visited network according to the determination result.
In some embodiments, the determining unit 43 allows the roaming user to access the slice of the home network or the slice of the visited network if the number of users does not reach the upper limit, and rejects the roaming user to access the slice of the home network or the slice of the visited network if the number of users reaches the upper limit.
In some embodiments, the control device 4 further comprises: a sending unit 44, configured to send the control response allowing the slice access to the AMF entity of the visited network of the roaming user, and send the control response rejecting the slice access to the AMF entity of the visited network of the roaming user.
In some embodiments, the determining unit 42 searches for a pre-configured upper limit of the number of the slices of the home network allowed to access the subscriber according to the slice identifier of the home network of the roaming subscriber in the slice access request; judging whether the current user number of the slice of the home network reaches the upper limit of the number of the allowed access users; or searching the upper limit of the number of the access users allowed by the preset slice of the visiting network according to the slice identification of the visiting network of the roaming user in the slice access request; and judging whether the current user number of the slice of the visiting network reaches the upper limit of the number of the allowed access users.
In some embodiments, the slice identification for the home network is HPLMN S-NSSAI and the slice identification for the visited network is VPLMN S-NSSAI.
In some embodiments, the determining unit 42 determines whether at least one of the number of roaming users of the slice of the home network, the sum of the number of roaming users of the slice of the visited network and the number of non-roaming users, and the number of roaming users of the slice of the visited network reaches an upper limit.
In some embodiments, the slice access request is sent by the AMF entity of the visited network when the roaming user registers to the visited network or deregisters from the slice.
In some embodiments, the AMF entity that requests the slice access to the visited Network finds a corresponding slice admission control Function entity through an NRF (Network warehousing Function) entity according to the slice information of the visited Network, and sends the slice admission control Function entity with the slice access request.
Fig. 5 shows a block diagram of further embodiments of the slice access control apparatus of the present disclosure.
As shown in fig. 5, the slice access control device 5 of the embodiment includes: a memory 51 and a processor 52 coupled to the memory 51, the processor 52 being configured to execute a slice access control method in any one embodiment of the present disclosure based on instructions stored in the memory 51.
The memory 51 may include, for example, a system memory, a fixed nonvolatile storage medium, and the like. The system memory stores, for example, an operating system, application programs, a boot loader, a database, and other programs.
Fig. 6 shows a block diagram of further embodiments of the slice access control apparatus of the present disclosure.
As shown in fig. 6, the slice access control device 6 of this embodiment includes: a memory 610 and a processor 620 coupled to the memory 610, wherein the processor 620 is configured to execute the slice access control method in any one of the embodiments based on instructions stored in the memory 610.
The memory 610 may include, for example, system memory, fixed non-volatile storage media, and the like. The system memory stores, for example, an operating system, an application program, a boot loader, and other programs.
The slice access control device 6 may further include an input/output interface 630, a network interface 640, a storage interface 650, and the like. These interfaces 630, 640, 650 and the connections between the memory 610 and the processor 620 may be, for example, via a bus 660. The input/output interface 630 provides a connection interface for input/output devices such as a display, a mouse, a keyboard, a touch screen, a microphone, and a sound box. The network interface 640 provides a connection interface for various networking devices. The storage interface 650 provides a connection interface for external storage devices such as an SD card and a usb disk.
Fig. 7 illustrates a block diagram of some embodiments of a control system for slice access of the present disclosure.
As shown in fig. 7, the slice access control system 7 includes: a slice admission control function 71 configured to execute a slice admission control method in any one of the embodiments; and the AMF entity 72 is configured to send a slice access request of the roaming user sent from the visited network to the slice admission control function entity.
In some embodiments, the control system 7 further comprises: NRF entity 73; the AMF entity 72 searches for a corresponding slice admission control function entity through the NRF entity 73 according to the slice information of the visited network.
As will be appreciated by one skilled in the art, embodiments of the present disclosure may be provided as a method, system, or computer program product. Accordingly, the present disclosure may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present disclosure may take the form of a computer program product embodied on one or more computer-usable non-transitory storage media having computer-usable program code embodied therein.
Up to this point, a control method of slice access, a control apparatus of slice access, a control system of slice access, and a nonvolatile computer-readable storage medium according to the present disclosure have been described in detail. Some details well known in the art have not been described in order to avoid obscuring the concepts of the present disclosure. It will be fully apparent to those skilled in the art from the foregoing description how to practice the presently disclosed embodiments.
The method and system of the present disclosure may be implemented in a number of ways. For example, the methods and systems of the present disclosure may be implemented by software, hardware, firmware, or any combination of software, hardware, and firmware. The above-described order for the steps of the method is for illustration only, and the steps of the method of the present disclosure are not limited to the order specifically described above unless specifically stated otherwise. Further, in some embodiments, the present disclosure may also be embodied as programs recorded in a recording medium, the programs including machine-readable instructions for implementing the methods according to the present disclosure. Thus, the present disclosure also covers a recording medium storing a program for executing the method according to the present disclosure.
Although some specific embodiments of the present disclosure have been described in detail by way of example, it should be understood by those skilled in the art that the above examples are for illustration only and are not intended to limit the scope of the present disclosure. It will be appreciated by those skilled in the art that modifications may be made to the above embodiments without departing from the scope and spirit of the present disclosure. The scope of the present disclosure is defined by the appended claims.

Claims (13)

1. A method for controlling slice access, comprising:
receiving a slice access request of a roaming user sent by a visiting network;
judging whether the number of the users of the home network slice or the visited network slice reaches an upper limit or not according to at least one item of slice information of the home network of the roaming user or slice information of the visited network in the slice access request;
and determining whether the roaming user is allowed to access the slice of the home network or the slice of the visited network according to the judgment result.
2. The control method according to claim 1, wherein the determining, according to at least one of slice information of a home network of the roaming user or slice information of a visited network in the slice access request, whether the number of users of the slice of the home network or the slice of the visited network reaches an upper limit comprises:
searching the upper limit of the number of the access users allowed by the pre-configured slice of the home network according to the slice identifier of the home network of the roaming user in the slice access request;
judging whether the current user number of the slice of the home network reaches the upper limit of the number of the allowed access users; or
Searching the upper limit of the number of the access users allowed by the preset slice of the visiting network according to the slice identification of the visiting network of the roaming user in the slice access request;
and judging whether the current user number of the slice of the visiting network reaches the upper limit of the number of the allowed access users.
3. The control method according to claim 2, wherein the slice identity of the home network is national public land mobile network single network slice selection assistance information HPLMN S-NSSAI, and the slice identity of the visited network is virtual public land mobile network single network slice selection assistance information VPLMN S-NSSAI.
4. The control method of claim 1, wherein the determining whether the number of users of the slice of the home network or the slice of the visited network reaches an upper limit comprises:
and judging whether at least one of the number of the roaming users of the slice of the home network, the sum of the number of the roaming users of the slice of the visited network and the number of the non-roaming users of the slice of the visited network and the number of the roaming users of the slice of the visited network reaches an upper limit or not.
5. The control method of claim 1, wherein the determining whether to allow the roaming user to access the slice of the home network or the slice of the visited network according to the determination result comprises:
under the condition that the number of users does not reach an upper limit, allowing the roaming user to access the slice of the home network or the slice of the visited network, and sending a control response of allowing slice access to an access and mobility management function (AMF) entity of the visited network of the roaming user;
and when the number of the users reaches the upper limit, rejecting the slice of the home network or the slice of the visited network accessed by the roaming user, and sending a control response of rejecting the slice access to the AMF entity of the visited network of the roaming user.
6. The control method according to any of claims 1-5, wherein the slice access request is sent by an AMF entity of a visited network when the roaming user registers to the visited network or deregisters from the slice.
7. The control method according to any one of claims 1 to 5,
and the slice access request is that the AMF entity of the visited network finds the corresponding slice access control function entity through the NRF entity of the network warehousing function according to the slice information of the visited network and sends the slice access control function entity.
8. A control apparatus for slice access, comprising:
a receiving unit, configured to receive a slice access request of a roaming user sent by a visited network;
a determining unit, configured to determine whether the number of users in a slice of the home network or a slice of a visited network reaches an upper limit according to at least one of slice information of the home network or slice information of the visited network of the roaming user in the slice access request;
and the determining unit is used for determining whether the roaming user is allowed to access the slice of the home network or the slice of the visited network according to the judgment result.
9. The control device according to claim 8,
the determining unit allows the roaming user to access the slice of the home network or the slice of the visited network when the number of users does not reach an upper limit, and rejects the roaming user to access the slice of the home network or the slice of the visited network when the number of users reaches the upper limit;
further comprising:
and the sending unit is used for sending the control response of allowing the slice access to the access and mobility management function (AMF) entity of the visited network of the roaming user and sending the control response of rejecting the slice access to the AMF entity of the visited network of the roaming user.
10. A control system for slice access, comprising:
a slice admission control function entity for performing the control method of slice access of any one of claims 1-7;
and the access and mobility management function AMF entity is used for sending a slice access request of the roaming user sent by the visiting network to the slice admission control function entity.
11. The control system of any of claim 10, further comprising:
a network warehousing function (NRF) entity;
and the AMF entity searches a corresponding slice admission control function entity through the NRF entity according to the slice information of the visited network.
12. A control apparatus for slice access, comprising:
a memory; and
a processor coupled to the memory, the processor configured to execute the slice access control method of any one of claims 1-7 based on instructions stored in the memory.
13. A non-transitory computer-readable storage medium on which a computer program is stored, which when executed by a processor implements the slice access control method of any one of claims 1-7.
CN202110691328.2A 2021-06-22 2021-06-22 Control method, device and system for slice access Pending CN115515125A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110691328.2A CN115515125A (en) 2021-06-22 2021-06-22 Control method, device and system for slice access

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110691328.2A CN115515125A (en) 2021-06-22 2021-06-22 Control method, device and system for slice access

Publications (1)

Publication Number Publication Date
CN115515125A true CN115515125A (en) 2022-12-23

Family

ID=84500576

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110691328.2A Pending CN115515125A (en) 2021-06-22 2021-06-22 Control method, device and system for slice access

Country Status (1)

Country Link
CN (1) CN115515125A (en)

Similar Documents

Publication Publication Date Title
US10659952B2 (en) Network slice selection policy updating method and apparatus
EP2223559B1 (en) Automatically provisioning a wwan device
EP3883295B1 (en) Network slice selection method, apparatus, and system
CN112654033B (en) Service opening method and device
CN107645722B (en) Private network selective access method and system, public network MME, HSS and base station
CN111148088B (en) Method, device, equipment and storage medium for managing mobile terminal and system
US20170269918A1 (en) Implicit file creation in apdu scripts
KR101988477B1 (en) Method of registration of devices for M2M network using M2M gateway and M2M gateway for it
US20220248224A1 (en) Systems and methods for obtaining an electronic identification of a user equipment for activation of a subscription
EP4354815A1 (en) Method and apparatus for instantiating edge application server
US20220322088A1 (en) Network roaming method, terminal device, and computer readable storage medium
WO2017197757A1 (en) Method and device for apn assignment, and terminal
US20220329492A1 (en) Data collection method and apparatus
CN103873456B (en) The access control method and WiFi equipment of WiFi equipment
CN112492592A (en) Authorization method under multiple NRF scenes
EP2564555A2 (en) Managing access gateways
CN112839372A (en) Network access method and device for user and computer readable storage medium
CN111601305A (en) Operator ID based restriction of cellular networks
CN115515125A (en) Control method, device and system for slice access
WO2017184103A1 (en) Default roaming restrictions specific to roaming classes of service
US11129026B1 (en) ESIM switching platform
US9118684B2 (en) Method for requesting user access to an application
CN114691734A (en) Cache control method and device, computer readable medium and electronic device
US20140099951A1 (en) Handling of Operator Connection Offers in a Communication Network
CN114584542A (en) Method and system for integrating internet of things card service capability in communication module

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination