CN115734314A - Slice access optimization method and related product - Google Patents

Slice access optimization method and related product Download PDF

Info

Publication number
CN115734314A
CN115734314A CN202111000762.8A CN202111000762A CN115734314A CN 115734314 A CN115734314 A CN 115734314A CN 202111000762 A CN202111000762 A CN 202111000762A CN 115734314 A CN115734314 A CN 115734314A
Authority
CN
China
Prior art keywords
slice
message
ursp
information
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111000762.8A
Other languages
Chinese (zh)
Inventor
陈晓宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Spreadtrum Communications Shanghai Co Ltd
Original Assignee
Spreadtrum Communications Shanghai Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Spreadtrum Communications Shanghai Co Ltd filed Critical Spreadtrum Communications Shanghai Co Ltd
Priority to CN202111000762.8A priority Critical patent/CN115734314A/en
Publication of CN115734314A publication Critical patent/CN115734314A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the application discloses a slice access optimization method and a related product. Therefore, the slice access strategy can be indicated to the user equipment through the network, the user equipment behavior is optimized, and the influence of insufficient network slice resources on the user equipment is reduced.

Description

Slice access optimization method and related product
Technical Field
The application belongs to the technical field of communication, and particularly relates to a slice access optimization method and a related product.
Background
Today, various emerging services are emerging, the existing fourth generation mobile communication 4G network cannot meet the increasing service requirements, and therefore, a great deal of attention is paid to network slicing. The network slice is a networking mode according to needs, and is characterized in that a physical network is cut into a plurality of mutually independent logical grids according to requirements of different Service applications on the number of users, quality of Service (QoS) and bandwidth, an operator can separate a plurality of virtual end-to-end networks on a unified infrastructure, and each network slice is logically isolated from a wireless access network bearing network to a core network so as to adapt to various types of applications. However, the network slice resources are limited, and when the network slice resources are insufficient, the user equipment slice service is affected, for example, the access speed becomes slow, or even the user equipment slice service cannot be accessed to the desired network slice service, thereby affecting the user service experience.
Disclosure of Invention
The embodiment of the application provides a slice access optimization method and a related product, aiming at indicating a slice access strategy to user equipment through a network, optimizing the behavior of the user equipment and reducing the influence of insufficient network slice resources on the user equipment.
In a first aspect, an embodiment of the present application provides a slice access optimization method, where the method includes:
the first network equipment acquires slice access strategy information;
and the first network equipment sends the slice access strategy information to a terminal.
In a second aspect, an embodiment of the present application provides a slice access optimization method, where the method includes:
the terminal acquires slice access strategy information from first network equipment;
and the terminal accesses the first network slice according to the slice access strategy information.
In a third aspect, an embodiment of the present application provides a slice access optimization method, where the method includes:
the second network equipment acquires the slice access strategy request information from the first network equipment;
and the second network equipment sends access policy request reply information to the first network equipment.
In a fourth aspect, an embodiment of the present application provides a slice access optimization apparatus, including: the acquisition unit is used for acquiring the slice access strategy information by the first electronic equipment; a sending unit, configured to send the slice access policy information to a terminal by the first electronic device.
In a fifth aspect, an embodiment of the present application provides a slice access optimization apparatus, including: an obtaining unit, configured to obtain, by a terminal, slice access policy information from a first network device; and the access unit is used for accessing the terminal into the first network slice according to the slice access strategy information.
In a sixth aspect, an embodiment of the present application provides a slice access optimization apparatus, including: an obtaining unit, configured to obtain, by a second network device, slice access policy request information from a first network device; a sending unit, configured to send, by the second network device, information related to the slice access policy request information to the first network device.
In a seventh aspect, an embodiment of the present application provides a network device, including a processor, a memory, a communication interface, and one or more programs, where the one or more programs are stored in the memory and configured to be executed by the processor, and the program includes instructions for executing the steps in any of the methods of the first aspect of the embodiment of the present application.
In an eighth aspect, embodiments of the present application provide a terminal, including a processor, a memory, a communication interface, and one or more programs, where the one or more programs are stored in the memory and configured to be executed by the processor, and the program includes instructions for performing the steps of any of the methods of the second aspects of the embodiments of the present application.
In a ninth aspect, embodiments of the present application provide a network device, including a processor, a memory, a communication interface, and one or more programs, where the one or more programs are stored in the memory and configured to be executed by the processor, and the program includes instructions for performing the steps in any of the methods of the third aspects of the embodiments of the present application.
In a tenth aspect, an embodiment of the present application provides a chip, including: and the processor is used for calling and running the computer program from the memory so that the device provided with the chip executes part or all of the steps described in the method of any one of the first aspect, the second aspect or the third aspect of the embodiment of the application.
In an eleventh aspect, an embodiment of the present application provides a chip module including the chip described in the tenth aspect of the embodiment of the present application.
In a twelfth aspect, the present application provides a computer-readable storage medium, where the computer-readable storage medium stores a computer program for electronic data exchange, where the computer program causes a computer to execute some or all of the steps described in any one of the methods of the first aspect, the second aspect, or the third aspect of the present application.
It can be seen that, in the embodiment of the present application, after acquiring the slice access policy information, the first network device sends the slice access policy information to the terminal, and the terminal accesses the network slice according to the slice access policy information. Therefore, the slice access strategy can be indicated to the user equipment through the network, the user equipment behavior is optimized, and the influence of insufficient network slice resources on the user equipment is reduced.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1a is a system architecture diagram of an example communication system provided by an embodiment of the present application;
fig. 1b is a schematic structural diagram of a first network device according to an embodiment of the present application;
fig. 1c is a schematic structural diagram of a terminal according to an embodiment of the present application;
fig. 1d is a schematic structural diagram of a second network device according to an embodiment of the present application;
fig. 2a is a schematic flowchart of a slice access optimization method provided in an embodiment of the present application;
fig. 2b is a schematic flowchart of another slice access optimization method provided in an embodiment of the present application;
fig. 3 is a block diagram of functional units of a slice access optimization apparatus according to an embodiment of the present disclosure;
fig. 4 is a block diagram of functional units of another slice access optimization apparatus provided in an embodiment of the present application;
fig. 5 is a block diagram of functional units of another slice access optimization apparatus provided in an embodiment of the present application;
fig. 6 is a block diagram of functional units of another slice access optimization apparatus provided in an embodiment of the present application;
fig. 7 is a block diagram of functional units of another slice access optimization apparatus provided in an embodiment of the present application;
fig. 8 is a block diagram of functional units of another slice access optimization apparatus provided in an embodiment of the present application.
Detailed Description
In order to make the technical solutions of the embodiments of the present invention better understood by those skilled in the art, the technical solutions of the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some embodiments of the present invention, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The terms "first," "second," and the like in the description and claims of the present application and in the foregoing drawings are used for distinguishing between different objects and not for describing a particular sequential order. Furthermore, the terms "include" and "have," as well as any variations thereof, are intended to cover non-exclusive inclusions. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those steps or elements listed, but may alternatively include other steps or elements not listed, or inherent to such process, method, article, or apparatus.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the application. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is explicitly and implicitly understood by one skilled in the art that the embodiments described herein can be combined with other embodiments.
In order to better understand the technical solutions of the embodiments of the present application, the technical solutions of the embodiments of the present application will be described below with reference to the accompanying drawings.
As shown in fig. 1a, this example communication system 100 may be, for example: code Division Multiple Access (CDMA) System, wideband Code Division Multiple Access (WCDMA) System, general Packet Radio Service (GPRS), long Term Evolution (Long Term Evolution, LTE) System, advanced Long Term Evolution (LTE-a) System, new Radio (NR) System, evolution System of NR System, LTE (LTE-based Access to unlicensed spectrum, LTE-U) System on unlicensed spectrum, NR (NR-based Access to unlicensed spectrum, NR-U) System on unlicensed spectrum, universal Mobile Telecommunications System (UMTS), next generation communication System, or other communication System.
Generally, the conventional Communication system supports a limited number of connections and is easy to implement, however, with the development of Communication technology, the mobile Communication system will support not only conventional Communication but also, for example, device-to-Device (D2D) Communication, machine-to-Machine (M2M) Communication, machine Type Communication (MTC), and Vehicle-to-Vehicle (V2V) Communication, and the embodiments of the present application can also be applied to these Communication systems. Optionally, the communication system in the embodiment of the present application may be applied to a Carrier Aggregation (CA) scenario, may also be applied to a Dual Connectivity (DC) scenario, and may also be applied to an independent (SA) networking scenario.
The frequency spectrum of the application is not limited in the embodiment of the present application. For example, the embodiments of the present application may be applied to a licensed spectrum and may also be applied to an unlicensed spectrum.
In this embodiment, the first network device 110 and the second network device 130 may be evolved NodeB (eNB or eNodeB) in an LTE system, may also be a wireless controller in a Cloud Radio Access Network (CRAN) scenario, or a network element, or the network device may be a relay device, an access point, an in-vehicle device, a wearable device, and a network device in a future 5G network or a network device in a future evolved PLMN network, one or a group (including multiple antenna panels) of a base station in a 5G system, or may also be a network node forming a gNB or a transmission point, such as a baseband unit (BBU) or a Distributed Unit (DU), and the embodiment of the present invention is not limited. As shown in fig. 1b, the first network device 110 in the embodiment of the present application may include one or more of the following components: a processor 210, a memory 220, and a communication interface 230, the processor 210 being communicatively coupled to the memory 220 and the communication interface 230, respectively, the memory 220 further including one or more programs 221. Similarly, the second network device 130 of fig. 1d may also include one or more of the following components: a processor 410, a memory 420, and a communication interface 430, the processor 410 being communicatively coupled to the memory 420 and the communication interface 430, respectively, the memory 420 further including one or more programs 421.
In some deployments, the gNB may include a Centralized Unit (CU) and a DU. The gNB may also include an Active Antenna Unit (AAU). The CU implements part of the function of the gNB and the DU implements part of the function of the gNB. For example, the CU is responsible for processing non-real-time protocols and services, and implementing functions of a Radio Resource Control (RRC) layer and a Packet Data Convergence Protocol (PDCP) layer. The DU is responsible for processing a physical layer protocol and a real-time service, and implements functions of a Radio Link Control (RLC) layer, a Medium Access Control (MAC) layer, and a Physical (PHY) layer. The AAU implements part of the physical layer processing functions, radio frequency processing, and active antenna related functions. Since the information of the RRC layer eventually becomes or is converted from the information of the PHY layer, the higher layer signaling, such as the RRC layer signaling, may also be considered to be transmitted by the DU or by the DU + AAU under this architecture. It is to be understood that the network device may be a device comprising one or more of a CU node, a DU node, an AAU node. In addition, the CU may be divided into network devices in an access network (RAN), or may be divided into network devices in a Core Network (CN), which is not limited in this application.
A terminal 120 in the embodiments of the subject application may refer to a user equipment, an access terminal, a subscriber unit, a subscriber station, a mobile station, a remote terminal, a mobile device, a user terminal, a wireless communication device, a user agent, or a user device. The terminal may also be a cellular phone, a cordless phone, a Session Initiation Protocol (SIP) phone, a Wireless Local Loop (WLL) station, a Personal Digital Assistant (PDA), a handheld device with wireless communication function, a computing device or other processing device connected to a wireless modem, a relay device, a vehicle-mounted device, a wearable device, a terminal in a future 5G network or a terminal in a future evolved Public Land Mobile Network (PLMN), and the like, which are not limited in this embodiment. As shown in fig. 1c, the terminal 120 in the terminal according to the embodiment of the present application may include one or more of the following components: a processor 310, a memory 320, and a communication interface 330, the processor 310 being communicatively coupled to the memory 320 and the communication interface 330, respectively, the memory 320 further including one or more programs 321.
In the embodiment of the present application, the terminal 120 or the first network device 110 and the second network device 130 include a hardware layer, an operating system layer running on the hardware layer, and an application layer running on the operating system layer. The hardware layer includes hardware such as a Central Processing Unit (CPU), a Memory Management Unit (MMU), and a memory (also referred to as a main memory). The operating system may be any one or more computer operating systems that implement business processes through processes (processes), such as a Linux operating system, a Unix operating system, an Android operating system, an iOS operating system, or a windows operating system. The application layer comprises applications such as a browser, an address list, word processing software, instant messaging software and the like. Furthermore, the embodiment of the present application does not particularly limit the specific structure of the execution main body of the method provided by the embodiment of the present application, as long as the communication can be performed according to the method provided by the embodiment of the present application by running the program recorded with the code of the method provided by the embodiment of the present application, for example, the execution main body of the method provided by the embodiment of the present application may be a terminal, or a functional module in the terminal that can call the program and execute the program.
The definitions or explanations of the concepts and terms referred to in this application are as follows.
Network slicing: in order to meet the requirements of different services on network performance, a future network needs to have the capability of being formulated as required, that is, a network slice needs to be configured flexibly, a physical network is cut into a plurality of virtual network slices, each virtual network slice faces different application scene requirements, and the final resource form of the virtual network is a virtual network which is connected with a plurality of Virtual Machines (VMs) and has a certain topological structure. Mapping of a Network slice is a process in which Data Center (DC) resources, which are composed of hosts of the Infrastructure layers (NFVI), are allocated to resources required for the Network slice.
URSP rules: in 5G, policy information related to User Equipment (UE), that is, a URSP rule, is introduced, and a terminal device is used as an executor of a policy to select a Packet Data Unit (PDU) session conforming to the URSP rule for an uplink service flow. That is, some services have certain requirements for the Data Network Name (DNN) of the used PDU Session, single Network Slice selection assistance Information (S-NSSAI), session and Service Continuity (SSC) mode (mode), and the like. It is understood that the URSP rule specifies to which applications the PDU session attributes should correspond, for example, there are multiple attributes for the PDU session, and different PDU sessions may have different attributes, and the URSP specifies to which applications the various attributes of the PDU session should correspond. For example, the first PDU session has a first attribute, and applications corresponding to the first attribute can be determined according to the URSP, so that the applications are the applications allowed to be used by the first PDU session.
At present, network slice resources are limited, and when the network slice resources are insufficient, a user equipment slice service is affected, for example, the access speed becomes slow, and even an expected network slice service cannot be accessed, so that the user service experience is affected. When the ue initiates network slice access, if the network side performs a related operation, such as slice remapping, the ue cannot sense the operation, so that when the ue initiates network slice access again, the network side needs to perform the operation again, thereby affecting the network slice access speed.
In view of the foregoing problems, embodiments of the present application provide a slice access optimization method and related products, which are described in detail below with reference to the accompanying drawings.
Referring to fig. 2a, fig. 2a is a schematic flowchart illustrating a slice access optimization method according to an embodiment of the present disclosure. As shown, the method comprises the steps of:
step 201, a first network device obtains slice access policy information.
The slice access policy information may be obtained by the first network device before and stored locally, or may be access policy information generated by the first network device itself, or may be obtained by the first network device from another network device, or may be generated by the first network device according to information obtained from another network device.
In a specific implementation, before a first network device obtains slice access policy information, the first network device determines that a current slice resource is limited. The slice resource restriction includes Radio Access Network (RAN) side slice resource restriction and Core Network (CN) side slice resource restriction. The RAN side resource limitation includes that the RAN side does not configure corresponding network slice resources, that is, does not support corresponding network slices, or the RAN side configures corresponding network slice resources, but the utilization rate/load of the network slice resources is too high, which results in that corresponding network slice services of more user equipments cannot be served. The CN side Slice resources are limited, including that the CN does not configure corresponding network Slice resources, or the CN side configures corresponding network Slice resources, but there is a limitation on a Slice Generic Slice Template (GST). The GST, including various attributes, may have limitations on network slice access, such as the maximum number of supported user equipments (ues), the maximum number of supported Protocol Data Units (PDUs) sessions, and the like.
Step 202, the first network device sends the slice access policy information to a terminal;
and 203, the terminal accesses the first network slice according to the slice access strategy information.
And the slice access method corresponding to the slice access strategy information is different from the slice access method in the current terminal. The slice access method may be different in the slice mapping rule used by the terminal, or different in the URSP message used by the terminal.
It can be seen that, in the embodiment of the present application, after acquiring the slice access policy information, the first network device sends the slice access policy information to the terminal, and the terminal accesses the network slice according to the slice access policy information. Therefore, the slice access strategy can be indicated to the terminal through the network, the terminal behavior is optimized, and the influence of insufficient network slice resources on the terminal is reduced. And the terminal receives the slice access strategy information, so that the terminal can perform network slice access directly according to the slice access strategy information subsequently, and the access speed of the network slice is improved.
In one possible example, the slice access policy information comprises first policy information related to slice remapping or second policy information related to a terminal routing policy, URSP.
Wherein the first policy information may include a slice remapping rule and a first constraint of the slice remapping rule, and the second policy information may include a URSP message and a second constraint of the URSP message. The terminal can re-determine the connectable network slice according to the slice re-mapping rule, and obtain the network slice identifier corresponding to the currently determined network slice found according to the URSP message.
Wherein, the network slice identifier may be: single Network Slice Selection Assistance Information (S-NSSAI), or include other identifier Information, sequence number, etc. that can identify a Network Slice.
In this example, under the condition that the slice resource is limited, the network side may enable the terminal to perform network slice connection by issuing a slice remapping rule or re-determining the URSP message of the terminal, so as to ensure the network slice service experience of the user.
In one possible example, the slice access policy information includes the first policy information, and the sending the slice access policy information to the terminal includes: and sending the slice remapping rule and/or the first limiting condition of the slice remapping rule to the terminal through a first message.
Wherein the first constraint condition may include a valid region, a valid time, and the like of the slice remapping rule. The valid Area may be geographical location information (e.g., latitude and longitude information), a cell identifier (e.g., a physical cell identifier), a Tracking Area (TA), a TA list, or the like. The valid time may be an absolute time or a relative time.
Therefore, in the embodiment, the terminal receives the slice access strategy information, so that the terminal can perform network slice access directly according to the slice access strategy information subsequently, and the access speed of the network slice is improved.
In one possible example, the method further comprises: and sending a first stopping strategy of the slice remapping rule to the terminal through a second message.
The first stopping policy may be generated by the first network device itself, or may be previously acquired from the second network device and stored locally, or may be acquired from the second network device by the first network device, or may be generated by the first network device according to information sent by the second network device. The first message and the second message may be the same message, i.e. the first network device may send the slice remapping rule, the first restriction condition, the first stop policy to the terminal through the same type of message.
In this example, the first network device further sends a stop policy to the terminal, so that the terminal returns to use the normal slice access mode, and provides a network slice service with performance guarantee for the terminal.
In one possible example, before the sending the first stop policy of the slice remapping rule to the terminal through the second message, the method further includes: sending first stop policy request information to the second network device; receiving first stop policy reply information from the second network device; and acquiring the first stopping strategy according to the first stopping strategy reply information.
After receiving the first stopping policy, the second network device sends first stopping policy reply information to the first network device. The first stop policy request message may include a first stop policy, and the reply message of the second network device may include a message for determining whether to use the first stop policy. The first stop policy reply information may include the first stop policy or may be information related to the first stop policy, and the first stop policy is generated by the first network device according to the related information.
As can be seen, in this example, the first network device generates the stop policy according to the information of the second network device, and can provide a network slicing service with guaranteed performance for the terminal.
In one possible example, the first stopping strategy comprises: instructing the terminal to discard the slice remapping rule.
As can be seen, the first network device instructs the terminal to discard the slice remapping rule, i.e., the terminal stops using the slice remapping rule, and switches back to using the normal slice selection mode, so as to provide the network slice service with performance guarantee for the terminal.
In one possible example, the first stopping strategy comprises: and instructing the terminal to suspend using the slice remapping rule within a first preset time period.
The first preset time period is a time length for the terminal to suspend using the slice remapping rule, and the first preset time period may be a relative time length or an absolute time length. The slice remapping rule at this time may be temporarily stored in the local storage medium of the terminal.
As can be seen, in this example, the first network device instructs the terminal to suspend using the slice remapping rule, and switches back to using the normal slice selection manner within a certain time period, so as to provide a network slice service with performance guarantee for the terminal.
In one possible example, the slice access policy information comprises the first policy information, and after the obtaining of the slice access policy information from the first network device, the method further comprises obtaining a first constraint of a slice remapping rule according to the first policy information; discarding the slice remapping rule if the first constraint is not satisfied.
The terminal may determine a first constraint condition of the current slice remapping rule, and if the first constraint condition is not satisfied, the terminal may actively discard the slice remapping rule and use a normal slice selection method. The first restriction condition may include a use area and/or a use time. For example, when the effective time of the slice remapping rule is over, the terminal directly discards the slice remapping rule. When there are a plurality of first constraints, the terminal may discard the slice remapping rule after a specific constraint is not satisfied, may discard the slice remapping rule after any one constraint of the first constraints is not satisfied, or may discard the slice remapping rule after a plurality of or all the first constraints are not satisfied at the same time.
In the specific implementation, after the terminal acquires the slice access policy information from the first network device, the method further comprises the steps of acquiring a first stop policy from the first network device; discarding the slice remapping rule according to the first stopping policy.
Therefore, in this example, the terminal actively discards the slice remapping rule after the first limiting condition is not met, and switches back to the normal slice selection mode, so as to ensure the performance of the network slice service used by the terminal.
In one possible example, after the obtaining of the slice access policy information from the first network device, the method further comprises obtaining a first constraint of a slice remapping rule according to the first policy information; suspending use of the slice remapping rule for a third preset time period if the first restriction condition is not satisfied.
The first preset time period is a time period for the terminal to suspend using the slice remapping rule, the third preset time period may be a relative time period or an absolute time period, and the first preset time period and the third preset time period may be the same.
In a specific implementation, after the slice access policy information from the first network device is obtained, the method further includes obtaining a first stop policy from the first network device; suspending use of the slice remapping rule within a first preset time period according to the first stopping policy.
In this example, the terminal actively suspends the use of the slice remapping rule within the third preset time period after the first limiting condition is not met, and then returns to use the normal slice selection mode, so that the performance of the network slice service used by the terminal is guaranteed.
In one possible example, after the sending the first stopping policy of the slice remapping rule to the terminal through the second message, the method further comprises: and sending the slice remapping rule enabling information to the terminal.
The first network device may actively send the enabling information to the terminal, or the first network device may first receive the request enabling information of the terminal, and then the first network device sends the enabling information to the terminal. Or the second network equipment sends the enabling information to the first network equipment first and then the first network equipment sends the enabling information to the terminal. In a specific implementation, the terminal may directly start the slice remapping rule after meeting the first constraint condition. For example, if the first constraint condition is that the slice remapping rule is applicable in the a-region, the terminal leaves the a-region before, and therefore the first constraint condition is not satisfied, and the slice remapping rule is suspended to be used, and at this time, after the terminal returns to the a-region again, the terminal satisfies the first constraint condition, and then the terminal may directly enable the slice remapping rule.
As can be seen, in this example, the first network device may instruct the terminal to enable the slice remapping rule, which may ensure performance of a network slice service used by the terminal, and may not send the slice access policy information again.
In one possible example, the first message comprises a system message block SIB message or a radio resource control, RRC, message or a non-access stratum, NAS, message.
The first network device broadcasts a slice remapping rule through an SIB message, wherein the slice remapping rule may also include a limiting condition on an effective area and/or an effective time of the slice remapping rule; the valid Area may be geographical location information (e.g., latitude and longitude information), a cell identifier (e.g., a physical cell identifier), a Tracking Area (TA), a TA list, or the like. The first network device may further indicate the slice remapping rule to the terminal through a dedicated RRC message (e.g., adding the slice remapping rule information in RRCReconfiguration/rrcreelease, or a new RRC message). The first network device may further indicate the slice remapping rule to the terminal through a NAS message (e.g., a new NAS message or a slice remapping information added in a PDU Session assignment Accept/PDU Session assignment report). Specifically, when the first message is an SIB message or an RRC message, the first network device may be a 5G base station gNB, and when the first message is an NAS message, the first network device may be an Access and Mobility Management Function (AMF) device.
Therefore, in this example, the first network device may send the first policy information to the terminal through multiple messages, so as to ensure that the user can obtain the slice remapping rule, and facilitate the subsequent terminal to select a suitable network slice to initiate access.
In one possible example, the slice access policy information includes the second policy information, and the sending the slice access policy information to the terminal includes: and sending the first URSP information and/or the second limiting condition of the first URSP information to the terminal through a third message.
The third message may be a configuration update message, and the first network device may initiate a configuration update procedure to the terminal to update the current URSP message of the terminal to the first URSP message. The first URSP information may be updated URSP information according to the current URSP information, or a new URSP message acquired for the first network device, and at this time, the first URSP message may be temporary URSP information. The second restriction condition may include a valid region, a valid time, etc. of the first URSP message. The valid Area may be geographical location information (e.g., latitude and longitude information), a cell identifier (e.g., a physical cell identifier), a Tracking Area (TA), a list, or the like. The valid time may be an absolute time or a relative time.
Therefore, in the embodiment, the terminal receives the slice access strategy information, so that the terminal can perform network slice access directly according to the slice access strategy information subsequently, and the access speed of the network slice is improved.
In one possible example, the method further comprises: and sending the second stopping strategy of the first URSP message to the terminal through a fourth message.
The third message and the fourth message may be the same type of message, that is, both are configuration update messages, or may be different types of messages, that is, the fourth message may be an SIB message, an RRC message, or an NAS message. The second stopping policy may be generated by the first network device itself, or may be obtained from the second network device and stored locally, or may be obtained from the first network device to the second network device, or may be generated by the first network device according to information sent by the second network device.
In a specific implementation, before the sending the first stop policy of the first URSP message to the terminal through the second message, the method further includes: sending second stop policy request information to the second network device; receiving second stop policy reply information from the second network device; and acquiring the second stopping strategy according to the second stopping strategy reply information.
And after receiving the second stopping strategy, the second network equipment sends second stopping strategy reply information to the first network equipment. At this time, information for determining whether to use the second stop policy may be included in the reply information of the second network device. The second stop policy reply message may include the second stop policy, or may be information related to the second stop policy, and the first network device generates the second stop policy according to the related information. Therefore, the first network equipment generates a stopping strategy according to the information of the second network equipment, and can provide network slicing service with performance guarantee for the terminal.
As can be seen, in this example, the first network device further sends a stop policy to the terminal, so that the terminal returns to use the normal URSP message, and provides a network slicing service with performance guarantee for the terminal.
In one possible example, the second stopping strategy comprises: indicating that a second URSP message is a current URSP message, where the second URSP message is a URSP message updated according to a preset URSP message, or the second URSP message is a URSP message regenerated by the first network device.
The first network device may initiate the configuration update process of the terminal again through the fourth message, and actively update the URSP message stored at the terminal side, that is, update the first URSP message currently used at the terminal side to the second URSP message. The preset URSP message may be the first URSP message, i.e. the second URSP message is updated according to the first URSP message. The preset URSP message may also be a URSP message that the terminal originally stored before using the first URSP message. This second URSP message may be included in the second stopping strategy at this point.
In a specific implementation, after the terminal obtains the slice access policy information from the first network device, the method further includes: obtaining a second stopping strategy from the first network equipment; and determining that a second URSP message is a current URSP message according to the second stopping strategy, wherein the second URSP message is a URSP message updated according to a preset URSP message, or the second URSP message is a URSP message regenerated by the first network equipment.
As can be seen, in this example, the first network device actively updates the URSP message of the terminal, and provides a network slicing service with performance guarantee for the terminal.
In one possible example, the second stopping strategy comprises: and indicating the terminal to discard the first URSP message, and determining that the third URSP message is the current URSP message.
The third URSP message may be an originally used URSP message of the terminal, or may be a specific URSP message.
As can be seen, in this example, the first network device instructs the terminal to discard the first URSP message, and switches back to use the third URSP message, so as to provide a network slicing service with guaranteed performance for the terminal.
In one possible example, the second stopping strategy comprises: and indicating the terminal to suspend using the first URSP message within a second preset time period, and determining a third URSP message as the current URSP message.
The second preset time period is a time period for the terminal to suspend using the first URSP message, and the first preset time period may be a relative time period or an absolute time period. The first URSP message at this time may be buffered in the local storage medium of the terminal.
As can be seen, in this example, the first network device instructs the terminal to discard the first URSP message, and switches back to use the third URSP message, so as to provide a network slicing service with guaranteed performance for the terminal.
In one possible example, the slice access policy information includes the second policy information, and after the terminal acquires the slice access policy information from the first network device, the method further includes acquiring a second constraint condition of the first URSP information according to the second policy information; and under the condition that the second limiting condition is not met, discarding the first URSP information, and determining a third URSP message as the current URSP message.
The terminal may first determine the second limiting condition of the first URSP message, and if the second limiting condition is not satisfied, may actively discard the first URSP message and use the original third URSP message. The second restriction condition may include a use area and/or a use time. For example, when the validity time of the first URSP message has expired, the terminal directly discards the first URSP message. When there are a plurality of second limiting conditions, the terminal may discard the first URSP message after the specific limiting condition is not satisfied, may discard the first URSP message after any one of the second limiting conditions is not satisfied, and may discard the first URSP message after a plurality of or all of the second limiting conditions are not satisfied at the same time.
In a specific implementation, after the terminal obtains the slice access policy information from the first network device, the method further includes: obtaining a second stopping strategy from the first network equipment; and discarding the first URSP message according to the second stopping strategy, and determining a third URSP message as the current URSP message.
Therefore, in this example, the terminal actively discards the first URSP message after the second limiting condition is not satisfied, and returns to use the original third URSP message, thereby ensuring the performance of the network slicing service used by the terminal.
In one possible example, after obtaining the slice access policy information from the first network device, the method further comprises: acquiring a second limiting condition of the first URSP information according to the second strategy information; and under the condition that the second limiting condition is not met, suspending the use of the first URSP message within a fourth preset time period, and determining a third URSP message as the current URSP message.
The fourth preset time period is the time length for the terminal to suspend using the slice remapping rule, the third preset time period may be a relative time length or an absolute time length, and the fourth preset time period and the third preset time period may be the same.
In a specific implementation, after the terminal obtains the slice access policy information from the first network device, the method further includes: obtaining a second stopping strategy from the first network equipment; and suspending using the first URSP message within a second preset time period according to the second stopping strategy, and determining that the third URSP message is the current URSP message.
In this example, after the terminal does not satisfy the second limiting condition, the terminal suspends the use of the first URSP message within the second preset time period, and returns to use the original third URSP message, thereby ensuring the performance of the network slicing service used by the terminal.
In a possible example, after the sending the second stop policy of the first URSP message to the terminal through the fourth message, the method further includes: and sending the first URSP message enabling information to the terminal, wherein the first URSP message enabling information is used for indicating that the first URSP message is the current URSP message.
The first network device may actively send the enabling information to the terminal, or the first network device may first receive the request enabling information of the terminal, and then the first network device sends the enabling information to the terminal. Or the second network equipment sends the enabling information to the first network equipment first and then the first network equipment sends the enabling information to the terminal. In a specific implementation, the terminal may directly enable the first URSP message to be the current URSP message after the second limiting condition is satisfied. For example, if the second restriction condition is that the first URSP message is applicable in the B area, the first URSP message is suspended because the terminal leaves the B area before, and therefore the second restriction condition is not satisfied.
As can be seen, in this example, the first network device may instruct the terminal to enable the first URSP message, which may not only ensure the performance of the network slicing service used by the terminal, but also avoid sending the slicing access policy information again.
In a possible example, please refer to fig. 2b, and fig. 2b is a schematic flowchart of another slice access optimization method provided in an embodiment of the present application. As shown in the figure, the acquiring slice access policy information includes the following steps:
step 301, a first network device sends a slice access policy request message to a second network device;
step 302, the second network device sends access policy request information to the first network device;
step 303, the first network device receives slice access policy reply information from the second network device;
step 304, the first network device obtains the slice access policy information according to the slice access policy reply information.
The slice access policy reply information may include slice access policy information or information related to the slice access policy information, and at this time, the first network device may generate the slice access policy information according to the related information. For example, the first network device may predict the network slice congestion time through the slice access policy reply information sent by the second network device, thereby determining the first limitation condition or the second limitation condition.
In this example, the first network device generates the slice access policy information according to the information of the second network device, and can provide a network slice service with performance guarantee for the terminal.
In one possible example, the slice access policy request information includes preset slice access policy information.
The slice access policy request message may include slice access policy information, and the reply message of the second network device may include information for determining whether to use the slice access policy. The second network device determines whether the preset slice access policy information is available, and informs the first network device through reply information. If the current slice access policy information is available, the first network device is informed to use the preset slice access policy, if the current slice access policy information is unavailable, the reply information simultaneously comprises final slice access policy information, and the first network device uses the final slice access policy information.
In this example, the first network device generates the slice access policy information according to the information of the second network device, and can provide a network slice service with performance guarantee for the terminal.
In one possible example, the slice access policy request information includes: requesting to obtain a slice remapping rule and/or a first constraint of the slice remapping rule.
The first network device may determine a slice remapping rule according to the preconfigured information, and send a slice access policy request message to the second network device to request to obtain a first constraint condition of the slice remapping rule. Or the first network equipment sends the slice access strategy request information to the second network equipment to request to acquire the slice remapping rule and the first limiting condition. Or the first network device sends the slice access policy request information to the second network device to request to acquire the slice remapping rule, and then sends the slice access policy request information to the second network device to request to acquire the second limiting condition. Specifically, the first network device and the second network device may be a plurality of types of network devices, and the device types of the first network device and the second network device may also be different. And after the second network device acquires the slice access policy request information, the second network device can also perform interactive communication with other network devices, so that the second network device sends the slice remapping rule and/or the first limiting condition to the first network device. For example, when the first Network device is an AMF, the second Network device may be a Network Data analysis Function (NWDAF) device. When the first network device is a gNB, the second network device may be an AI entity on the RAN side, that is, the rule for slice remapping may not only be preconfigured, but also be temporarily decided/dynamically generated, and will be generated by an NWDAF or an AI entity on the RAN side according to requirements such as slice resource load, slice QoS, or Service Level Agreement (SLA).
Therefore, in the embodiment, the information related to the slice remapping is acquired through the two network devices, so that the terminal can select a proper network slice to initiate access, the resource load of the network slice can be adjusted, and the service experience of the network slice of the user is guaranteed.
In one possible example, the slice access policy request information includes: and requesting to acquire the first URSP information and/or a second limiting condition of the first URSP information.
The first network device may obtain the first URSP information according to the preconfigured information, and send slice access policy request information to the second network device, requesting to obtain the second limitation condition of the first URSP message. And acquiring the slice access policy request information sent by the first network equipment to the second network equipment, and requesting to acquire the first URSP message and the second limiting condition. Specifically, the first network device and the second network device may be a plurality of types of network devices, and the device types of the first network device and the second network device may also be different. And after the second network device acquires the slice access policy request information, the second network device may also perform interactive communication with other network devices, so as to send the first URSP information and/or the second restriction condition to the first network device through the second network device. For example, the first network device is an AMF device, and at this time, the second network device is a Policy Control Function (PCF) device, and the second network device may perform interactive communication with other network devices, such as an NWDAF, so as to send the content, such as the first URSP message, to the first network device through the second network device.
Therefore, in the embodiment, the information related to the URSP message is acquired through the two network devices, so that the terminal can select a proper network slice to initiate access, the resource load of the network slice can be adjusted, and the service experience of the network slice of the user is guaranteed.
In one possible example, the slice access policy information includes the first policy information, and the accessing a first network slice according to the slice access policy information includes: determining a first network slice identifier from the third URSP information; acquiring a second network slice identifier according to the first network slice identifier and the first policy information; accessing the first network slice according to the second network slice identifier.
Wherein, the third URSP message is the existing URSP message of the user.
Therefore, in this example, the behavior of the terminal using the slice remapping rule is standardized, and it is ensured that the terminal can correctly initiate an access request for the remapped network slice service.
In one possible example, before the accessing the first network slice according to the second network slice identifier, the method further comprises: determining a second network slice from the first network slice identifier; determining that the second network slice is barred in a serving cell and that the second network slice identifier satisfies a third restriction condition corresponding to a slice remapping rule.
The terminal determines a first network slice identifier according to an existing URSP message, if the first network slice identifier is forbidden in a service cell, a second network slice identifier can be determined according to first policy information, namely a slice remapping rule, and if the second network slice identifier meets a third limiting condition, the terminal performs network slice access according to the second network slice identifier. The third limitation condition may be the same as the first limitation condition, or may be a preset default limitation condition, and if the first network device does not send the second limitation condition to the terminal, the third limitation condition may default to the content that meets the second limitation condition.
Therefore, in this example, the behavior of the terminal using the slice remapping rule is standardized, and it is ensured that the terminal can correctly initiate an access request for the remapped network slice service.
In one possible example, the slice access policy information includes the second policy information, and the accessing a first network slice according to the slice access policy information includes: acquiring first URSP information and a second limiting condition of the first URSP information; determining a third network slice identifier from the first URSP information if the second constraint is satisfied; accessing the first network slice according to the third network slice identifier.
Therefore, in this example, the behavior of using the URSP message by the terminal is standardized, and the terminal can be guaranteed to correctly initiate an access request for the remapped network slice service.
In one possible example, the accessing a network slice according to the slice access policy information comprises: determining a first network slice identifier from third URSP information in case the second limitation condition is not met; accessing a network slice according to the first network slice identifier.
And the third URSP message is the original URSP message of the terminal.
Therefore, in this example, the behavior of using the URSP message by the terminal is standardized, and the terminal can be guaranteed to correctly initiate an access request for the remapped network slice service.
In one possible example, the method further comprises: and sending configuration updating request information under the condition that the second limiting condition is not met.
The configuration update request information is used for the first network equipment to initiate a configuration update process to the terminal so as to update the current URSP message of the terminal.
In a specific implementation, the method further comprises: the first network equipment acquires a configuration updating request message from the terminal; and initiating configuration updating according to the configuration updating request message.
Therefore, in this example, the behavior of using the URSP message by the terminal is standardized, and the terminal can be guaranteed to correctly initiate an access request for the remapped network slice service.
In one possible example, after obtaining the slice access policy information from the first network device, the method further comprises: under the condition of cell selection or/and reselection, acquiring a third network slice according to the current URSP message; determining a camped first cell according to the third network slice and the first policy information.
The user can determine the relationship between the third network slice corresponding to the network slice identifier and the neighboring cell according to the network slice identifier of the third network slice acquired by the current URSP message, and then determine the first cell where the user finally resides according to the first policy information.
As can be seen, in this example, the establishment of the network slicing service expected by the ue and the basic service experience are guaranteed during cell selection/reselection.
In one possible example, the determining the camped first cell according to the third network slice and the first policy information includes: determining at least one fourth network slice according to the first policy information and the third network slice in case that a neighboring cell does not support the third network slice; and determining a cell as the resident first cell from the cells corresponding to the at least one fourth network slice.
If the neighboring cell does not support the third network slice, the terminal may find a fourth network slice that may be mapped or may replace the corresponding third network slice according to the slice remapping rule, and consider the cell that supports the fourth network slice when performing cell reselection or selection.
In this example, by considering the support condition of the candidate cell to the remapped network slice when the cell is selected/reselected, the terminal can be selected/reselected to the cell supporting the remapped network slice, thereby ensuring the establishment of the network slice service expected by the terminal and the basic service experience.
In one possible example, the determining the camped first cell according to the third network slice and the first policy information includes: determining at least one fourth network slice according to the first policy information and the third network slice in case that there is at least one cell supporting the third network slice; and determining a cell as the resident first cell from the third cell corresponding to the third network slice and/or the cells corresponding to the at least one fourth network slice.
If there are multiple cells supporting the third network slice, when other conditions are the same (for example, the measured RSRP/RSRQ is the same), the terminal may additionally consider the cell supporting the fourth network slice during cell selection/reselection.
Therefore, in the embodiment, when the cell is selected/reselected, the support condition of the candidate cell to the remapped network slice is additionally considered, so that the influence of the slice resource load change of the target cell on the terminal can be reduced, the reliability of the establishment of the slice service is improved, and the service experience of the terminal slice service is ensured.
In one possible example, after obtaining the slice access policy information from the first network device, the method further comprises: determining the current URSP message according to the second strategy information; and selecting or/reselecting the cell according to the current URSP message.
When cell selection or reselection is performed, if the first network device updates the URSP message to the terminal, the updated URSP message may be used to determine a network slice identifier, and then a target network slice is determined according to the network slice identifier and is camped in a cell supporting the target network slice.
Therefore, in this example, when a cell is selected/reselected, the network slice identifier is determined according to the updated URSP message, so that the reliability of the establishment of the slice service is improved, and the service experience of the terminal slice service is guaranteed.
The embodiment of the application provides a slice access optimization device, which is used for executing the steps executed by the first electronic equipment in the slice access optimization method. The slice access optimization device provided by the embodiment of the application may include a unit corresponding to the response step.
In the embodiment of the present application, the slice access optimization apparatus may be divided into the functional units according to the above method example, for example, each functional unit may be divided corresponding to each function, or two or more functions may be integrated into one processing unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit. The division of the unit in the embodiment of the present application is schematic, and is only a logic function division, and there may be another division manner in actual implementation.
Fig. 3 shows a schematic structural diagram of a possible slice access optimization apparatus in the above embodiment, in the case of dividing each functional unit by corresponding functions, as shown in fig. 3, the slice access optimization apparatus 3 includes: an obtaining unit 31, configured to obtain, by a first electronic device, slice access policy information; a sending unit 32, configured to send the slice access policy information to a terminal by the first electronic device.
In one possible example, the slice access policy information comprises first policy information related to slice remapping or second policy information related to a user equipment routing policy, URSP.
In a possible example, the slice access policy information includes the first policy information, and in terms of the sending the slice access policy information to the terminal, the sending unit 32 is specifically configured to: and sending the slice remapping rule and/or the first limiting condition of the slice remapping rule to the terminal through a first message.
In one possible example, the apparatus 3 is further configured to: and sending a first stopping strategy of the slice remapping rule to the terminal through a second message.
In one possible example, before the sending the first stop policy of the slice remapping rule to the terminal through the second message, the apparatus 3 is further configured to: sending first stop policy request information to the second network device; receiving first stop policy reply information from the second network device; and acquiring the first stopping strategy according to the first stopping strategy reply information.
In one possible example, the first stopping strategy comprises: instructing the terminal to discard the slice remapping rule.
In one possible example, the first stopping strategy comprises: and instructing the terminal to suspend using the slice remapping rule within a first preset time period.
In one possible example, after the sending of the first stop policy of the slice remapping rule to the terminal through the second message, the apparatus 3 is further configured to: and sending the slice remapping rule enabling information to the terminal.
In one possible example, the first message comprises a system message block SIB message or a radio resource control, RRC, message or a non-access stratum, NAS, message.
In a possible example, the slice access policy information includes the second policy information, and in terms of the sending the slice access policy information to the terminal, the sending unit 32 is specifically configured to: and sending the first URSP information and/or the second limiting condition of the first URSP information to the terminal through a third message.
In one possible example, the apparatus 3 is further configured to: and sending a second stopping strategy of the first URSP message to the terminal through a fourth message.
In one possible example, the second stopping strategy comprises:
indicating that a second URSP message is a current URSP message, where the second URSP message is a URSP message updated according to a preset URSP message, or the second URSP message is a URSP message regenerated by the first network device.
In one possible example, the second stopping strategy comprises: and indicating the terminal to discard the first URSP message, and determining that the third URSP message is the current URSP message.
In one possible example, the second stopping strategy comprises: and indicating the terminal to suspend using the first URSP message within a second preset time period, and determining a third URSP message as the current URSP message.
In one possible example, after the second stop policy of sending the first URSP message to the terminal through the fourth message, the apparatus 3 is further configured to: and sending the first URSP message enabling information to the terminal, wherein the first URSP message enabling information is used for indicating that the first URSP message is the current URSP message.
In a possible example, in terms of the acquiring slice access policy information, the acquiring unit 31 is specifically configured to: sending a slice access policy request message to a second network device; receiving slice access policy reply information from the second network device; and acquiring the slice access strategy information according to the slice access strategy reply information.
In one possible example, the slice access policy request information includes preset slice access policy information.
In one possible example, the slice access policy request information includes: requesting to obtain a slice remapping rule and/or a first constraint of the slice remapping rule.
In one possible example, the slice access policy request information includes: and requesting to acquire the first URSP information and/or a second limiting condition of the first URSP information.
In one possible example, the apparatus 3 is further configured to: acquiring a configuration updating request message from the terminal; and initiating configuration updating according to the configuration updating request message.
All relevant contents of each step related to the above method embodiment may be referred to the functional description of the corresponding functional unit, and are not described herein again. Of course, the slice access optimization apparatus provided in the embodiments of the present application includes, but is not limited to, the above units, for example: the slice access optimization apparatus may further include a storage unit. A memory unit may be used for storing program code and data of the slice access optimization device.
In the case of using an integrated module, a schematic structural diagram of a slice access optimization device provided in an embodiment of the present application is shown in fig. 4. In fig. 4, the slice access optimization apparatus 4 includes a processing module 40 and a communication module 41. The processing module 40 is used for controlling and managing the actions of the slice access optimization device, such as the steps performed by the acquisition unit 31 and the sending unit 32, and/or other processes for performing the techniques described herein. The communication module 41 is used for interaction between the slice access optimization apparatus and other devices. As shown in fig. 4, the slice access optimization apparatus 4 may further include a storage module 42, and the storage module 42 is used for program codes and data of the slice access optimization processing apparatus 3, for example, storing contents stored in the storage unit.
The Processing module 40 may be a Processor or a controller, and may be, for example, a Central Processing Unit (CPU), a general-purpose Processor, a Digital Signal Processor (DSP), an ASIC, an FPGA or other programmable logic device, a transistor logic device, a hardware component, or any combination thereof. Which may implement or perform the various illustrative logical blocks, modules, and circuits described in connection with the disclosure. The processor may also be a combination of computing functions, e.g., comprising one or more microprocessors, DSPs, and microprocessors, among others. The communication module 41 may be a transceiver, an RF circuit or a communication interface, etc. The storage module 42 may be a memory.
All relevant contents of each scene related to the method embodiment may be referred to the functional description of the corresponding functional module, and are not described herein again. Both the slice access optimization means 3 and the slice access optimization means 4 may perform the steps performed by the first electronic device in the slice access optimization method shown in fig. 2 a.
The embodiment of the present application further provides a slice access optimization device, where the slice access optimization device is configured to execute steps executed by a terminal in the above slice access optimization method. The slice access optimization device provided by the embodiment of the application may include a unit corresponding to the response step.
In the embodiment of the present application, the slice access optimization apparatus may be divided into the functional units according to the above method example, for example, each functional unit may be divided corresponding to each function, or two or more functions may be integrated into one processing unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit. The division of the unit in the embodiment of the present application is schematic, and is only a logic function division, and there may be another division manner in actual implementation.
In the case of dividing each functional unit according to each function, fig. 5 shows a schematic diagram of a possible structure of the slice access optimization apparatus in the foregoing embodiment, and as shown in fig. 5, the slice access optimization apparatus 5 includes: an obtaining unit 51, configured to obtain, by a terminal, slice access policy information from a first network device; and an accessing unit 52, configured to access, by the terminal, the first network slice according to the slice access policy information.
In one possible example, the slice access policy information comprises first policy information related to slice remapping or second policy information related to a user equipment routing policy, URSP.
In a possible example, the slice access policy information includes the first policy information, and after the obtaining of the slice access policy information from the first network device, the obtaining unit 51 is specifically configured to: acquiring a first limiting condition of a slice remapping rule according to the first strategy information; discarding the slice remapping rule if the first constraint is not satisfied.
In one possible example, after the obtaining of the slice access policy information from the first network device, the apparatus 5 is further configured to: acquiring a first limiting condition of a slice remapping rule according to the first strategy information; suspending use of the slice remapping rule for a third preset time period if the first restriction condition is not satisfied.
In one possible example, after the obtaining of the slice access policy information from the first network device, the apparatus 5 is further configured to: obtaining a first stopping strategy from the first network equipment; discarding the slice remapping rule according to the first stopping policy.
In one possible example, after the obtaining of the slice access policy information from the first network device, the apparatus 5 is further configured to: obtaining a first stopping strategy from the first network equipment; suspending use of the slice remapping rule within a first preset time period according to the first stopping policy.
In one possible example, the slice access policy information includes the second policy information, and after the obtaining of the slice access policy information from the first network device, the apparatus 5 is further configured to: acquiring a second limiting condition of the first URSP information according to the second strategy information; and under the condition that the second limiting condition is not met, discarding the first URSP information, and determining a third URSP message as the current URSP message.
In one possible example, after the obtaining of the slice access policy information from the first network device, the apparatus 5 is further configured to: acquiring a second limiting condition of the first URSP information according to the second strategy information; and under the condition that the second limiting condition is not met, suspending the use of the first URSP message within a fourth preset time period, and determining a third URSP message as the current URSP message.
In one possible example, after the obtaining of the slice access policy information from the first network device, the apparatus 6 is further configured to: obtaining a second stopping strategy from the first network equipment; and determining that a second URSP message is a current URSP message according to the second stopping strategy, wherein the second URSP message is a URSP message updated according to a preset URSP message, or the second URSP message is a URSP message regenerated by the first network equipment.
In one possible example, after the obtaining of the slice access policy information from the first network device, the apparatus is further configured to: obtaining a second stopping strategy from the first network equipment; and discarding the first URSP message according to the second stopping strategy, and determining a third URSP message as the current URSP message.
In one possible example, after the obtaining of the slice access policy information from the first network device, the apparatus 5 is further configured to: obtaining a second stopping strategy from the first network equipment; and suspending using the first URSP message within a second preset time period according to the second stopping strategy, and determining that the third URSP message is the current URSP message.
In one possible example, the slice access policy information includes the first policy information, and in terms of the accessing a first network slice according to the slice access policy information, the accessing unit 52 is specifically configured to: determining a first network slice identifier from the third URSP information; acquiring a second network slice identifier according to the first network slice identifier and the first policy information; accessing the first network slice according to the second network slice identifier.
In one possible example, prior to said accessing said first network slice according to said second network slice identifier, said apparatus 5 is further configured to: determining a second network slice from the first network slice identifier; determining that the second network slice is barred in a serving cell and that the second network slice identifier satisfies a third restriction condition corresponding to a slice remapping rule.
In one possible example, the slice access policy information includes the second policy information, and in terms of the accessing the first network slice according to the slice access policy information, the accessing unit 52 is specifically configured to:
in one possible example, in an aspect, the method is specific to: acquiring first URSP information and a second limiting condition of the first URSP information; determining a third network slice identifier from the first URSP information if the second constraint is satisfied; accessing the first network slice according to the third network slice identifier.
In one possible example, in terms of said accessing the network slice according to the slice access policy information, the access unit 52 is specifically configured to: determining a first network slice identifier from third URSP information in case the second limitation condition is not met; accessing a network slice according to the first network slice identifier.
In one possible example, the apparatus 5 is further configured to: and sending configuration updating request information under the condition that the second limiting condition is not met.
In one possible example, after the obtaining of the slice access policy information from the first network device, the apparatus 5 is further configured to: under the condition of cell selection or/reselection, acquiring a third network slice according to the current URSP message; determining a camped first cell according to the third network slice and the first policy information.
In one possible example, in terms of the determining the camped first cell according to the third network slice and the first policy information, the apparatus 5 is further configured to: determining at least one fourth network slice according to the first policy information and the third network slice in case that a neighboring cell does not support the third network slice; and determining a cell as the resident first cell from the cells corresponding to the at least one fourth network slice.
In one possible example, in terms of the determining the camped first cell according to the third network slice and the first policy information, the apparatus 5 is further configured to: determining at least one fourth network slice according to the first policy information and the third network slice in case that there is at least one cell supporting the third network slice; and determining a cell as the resident first cell from the third cell corresponding to the third network slice and/or the cells corresponding to the at least one fourth network slice.
In one possible example, after the obtaining of the slice access policy information from the first network device, the apparatus 5 is further configured to: determining the current URSP message according to the second strategy information; and selecting or/reselecting the cell according to the current URSP message.
All relevant contents of each step related to the above method embodiment may be referred to the functional description of the corresponding functional unit, and are not described herein again. Of course, the slice access optimization apparatus provided in the embodiments of the present application includes, but is not limited to, the above units, for example: the slice access optimization apparatus may further include a storage unit. The memory unit may be used for storing program code and data of the slice access optimization device.
In the case of using an integrated module, a schematic structural diagram of the slice access optimization apparatus provided in the embodiment of the present application is shown in fig. 6. In fig. 6, the slice access optimization apparatus 6 includes a processing module 60 and a communication module 61. The processing module 60 is used for controlling and managing the actions of the slice access optimization device, such as the steps performed by the acquisition unit 51 and the access unit 52, and/or other processes for performing the techniques described herein. The communication module 61 is used for interaction between the slice access optimization processing apparatus and other devices. As shown in fig. 6, the slice access optimization apparatus 6 may further include a storage module 62, and the storage module 62 is used for program codes and data of the slice access optimization processing apparatus 5, for example, to store contents stored in the storage unit.
The Processing module 60 may be a Processor or a controller, and may be, for example, a Central Processing Unit (CPU), a general-purpose Processor, a Digital Signal Processor (DSP), an ASIC, an FPGA or other programmable logic device, a transistor logic device, a hardware component, or any combination thereof. Which may implement or perform the various illustrative logical blocks, modules, and circuits described in connection with the disclosure. The processor may also be a combination of computing functions, e.g., comprising one or more microprocessors, DSPs, and microprocessors, among others. The communication module 61 may be a transceiver, an RF circuit or a communication interface, etc. The storage module 62 may be a memory.
All relevant contents of each scene related to the method embodiment may be referred to the functional description of the corresponding functional module, and are not described herein again. Both the slice access optimization means 5 and the slice access optimization means 6 may perform the steps performed by the terminal in the slice access optimization method shown in fig. 2 a.
The embodiment of the present application further provides a slice access optimization apparatus, where the slice access optimization apparatus is configured to execute steps executed by a second electronic device in the above slice access optimization method. The slice access optimization device provided by the embodiment of the application may include a unit corresponding to the response step.
In the embodiment of the present application, the slice access optimization apparatus may be divided into the functional units according to the above method example, for example, each functional unit may be divided corresponding to each function, or two or more functions may be integrated into one processing unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit. The division of the unit in the embodiment of the present application is schematic, and is only a logic function division, and there may be another division manner in actual implementation.
Fig. 7 shows a schematic diagram of a possible structure of the slice access optimization apparatus in the above embodiment, in the case of dividing each functional unit by corresponding functions, as shown in fig. 7, the slice access optimization apparatus 7 includes: an obtaining unit 71, configured to obtain, by a second network device, slice access policy request information from a first network device; a sending unit 72, configured to send, by the second network device, information related to the slice access policy request information to the first network device.
All relevant contents of each step related to the above method embodiment may be referred to the functional description of the corresponding functional unit, and are not described herein again. Of course, the slice access optimization apparatus provided in the embodiments of the present application includes, but is not limited to, the above units, for example: the slice access optimization apparatus may further include a storage unit. The memory unit may be used for storing program code and data of the slice access optimization device.
In the case of using an integrated module, a schematic structural diagram of a slice access optimization device provided in an embodiment of the present application is shown in fig. 8. In fig. 8, the slice access optimization apparatus 8 includes a processing module 80 and a communication module 81. The processing module 80 is used for controlling and managing the actions of the slice access optimization device, such as the steps performed by the acquisition unit 71 and the sending unit 72, and/or other processes for performing the techniques described herein. The communication module 81 is used for interaction between the slice access optimization processing apparatus and other devices. As shown in fig. 8, the slice access optimization apparatus 8 may further include a storage module 82, and the storage module 82 is used for program codes and data of the slice access optimization processing apparatus 7, for example, to store contents stored in the storage unit.
The Processing module 80 may be a Processor or a controller, and may be, for example, a Central Processing Unit (CPU), a general-purpose Processor, a Digital Signal Processor (DSP), an ASIC, an FPGA or other programmable logic device, a transistor logic device, a hardware component, or any combination thereof. Which may implement or perform the various illustrative logical blocks, modules, and circuits described in connection with the disclosure. The processor may also be a combination of computing functions, e.g., comprising one or more microprocessors, DSPs, and microprocessors, among others. The communication module 81 may be a transceiver, an RF circuit or a communication interface, etc. The storage module 82 may be a memory.
All relevant contents of each scene related to the method embodiment may be referred to the functional description of the corresponding functional module, and are not described herein again. The slice access optimization device 7 and the slice access optimization device 8 may each perform the steps performed by the terminal in the slice access optimization method shown in fig. 2a and 2 b.
The embodiment of the present application further provides a computer-readable storage medium, where the computer-readable storage medium stores a computer program for electronic data exchange, where the computer program causes a computer to perform some or all of the steps described in the above method embodiment for a network-side device.
The embodiment of the application provides a chip, which is used for a first network device to acquire slice access strategy information; and for sending the slice access policy information to a terminal.
The embodiment of the application provides a chip module, which comprises a transceiving component and a chip, wherein the chip is used for a first network device to acquire slice access strategy information; and for sending the slice access policy information to a terminal.
The embodiment of the application provides a chip, which is used for a terminal to acquire slice access strategy information from first network equipment; and the terminal is used for accessing the first network slice according to the slice access strategy information.
The embodiment of the application provides a chip module, which comprises a transceiving component and a chip, wherein the chip is used for a terminal to acquire slice access strategy information from first network equipment; and the terminal is used for accessing the first network slice according to the slice access strategy information.
The embodiment of the application provides a chip, which is used for a second network device to obtain slice access policy request information from a first network device; and the second network device is used for sending information related to the slice access policy request information to the first network device.
The embodiment of the application provides a chip module, which comprises a transceiving component and a chip, wherein the chip is used for acquiring slice access strategy request information from first network equipment by second network equipment; and for the second network device to send information related to the slice access policy request information to the first network device.
The steps of a method or algorithm described in the embodiments of the present application may be implemented in hardware, or may be implemented by a processor executing software instructions. The software instructions may be comprised of corresponding software modules that may be stored in Random Access Memory (RAM), flash Memory, read Only Memory (ROM), erasable Programmable ROM (EPROM), electrically Erasable Programmable ROM (EEPROM), registers, a hard disk, a removable disk, a compact disc Read Only Memory (CD-ROM), or any other form of storage medium known in the art. An exemplary storage medium is coupled to the processor such the processor can read information from, and write information to, the storage medium. Of course, the storage medium may also be integral to the processor. The processor and the storage medium may reside in an ASIC. Additionally, the ASIC may reside in an access network device, a target network device, or a core network device. Of course, the processor and the storage medium may reside as discrete components in an access network device, a target network device, or a core network device.
Those skilled in the art will appreciate that in one or more of the examples described above, the functionality described in the embodiments of the present application may be implemented, in whole or in part, by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. The procedures or functions described in accordance with the embodiments of the application are all or partially generated when the computer program instructions are loaded and executed on a computer. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored on a computer readable storage medium or transmitted from one computer readable storage medium to another, for example, from one website, computer, server, or data center to another website, computer, server, or data center via wire (e.g., coaxial cable, fiber optic, digital Subscriber Line (DSL)) or wireless (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device, such as a server, a data center, etc., that incorporates one or more of the available media. The usable medium may be a magnetic medium (e.g., floppy Disk, hard Disk, magnetic tape), an optical medium (e.g., digital Video Disk (DVD)), or a semiconductor medium (e.g., solid State Disk (SSD)), among others.
The above-mentioned embodiments are intended to illustrate the objects, technical solutions and advantages of the embodiments of the present application in further detail, and it should be understood that the above-mentioned embodiments are only specific embodiments of the present application, and are not intended to limit the scope of the embodiments of the present application, and any modifications, equivalent substitutions, improvements and the like made on the basis of the technical solutions of the embodiments of the present application should be included in the scope of the embodiments of the present application.

Claims (48)

1. A method for slice access optimization, the method comprising:
the first network equipment acquires slice access strategy information;
and the first network equipment sends the slice access strategy information to a terminal.
2. The method according to claim 1, wherein said slice access policy information comprises first policy information related to slice remapping or second policy information related to a user equipment routing policy, URSP.
3. The method of claim 2, wherein the slice access policy information comprises the first policy information, and wherein the sending the slice access policy information to the terminal comprises:
and sending the slice remapping rule and/or the first limiting condition of the slice remapping rule to the terminal through a first message.
4. The method of claim 3, further comprising:
and sending a first stopping strategy of the slice remapping rule to the terminal through a second message.
5. The method of claim 4, wherein before sending the first stopping policy of the slice remapping rule to the terminal through the second message, the method further comprises:
sending first stop policy request information to the second network device;
receiving first stop policy reply information from the second network device;
and acquiring the first stopping strategy according to the first stopping strategy reply information.
6. The method according to claim 4 or 5, wherein the first stopping strategy comprises: instructing the terminal to discard the slice remapping rule.
7. The method according to claim 4 or 5, wherein the first stopping strategy comprises: and instructing the terminal to suspend using the slice remapping rule within a first preset time period.
8. The method of claim 7, wherein after sending the first stop policy of the slice remapping rule to the terminal through the second message, the method further comprises:
and sending the slice remapping rule enabling information to the terminal.
9. The method of claim 2, wherein the first message comprises a system message block (SIB) message or a Radio Resource Control (RRC) message or a non-access stratum (NAS) message.
10. The method of claim 2, wherein the slice access policy information comprises the second policy information, and wherein the sending the slice access policy information to the terminal comprises:
and sending the first URSP information and/or the second limiting condition of the first URSP information to the terminal through a third message.
11. The method of claim 10, further comprising:
and sending the second stopping strategy of the first URSP message to the terminal through a fourth message.
12. The method of claim 11, wherein the second stopping strategy comprises:
indicating that a second URSP message is a current URSP message, where the second URSP message is a URSP message updated according to a preset URSP message, or the second URSP message is a URSP message regenerated by the first network device.
13. The method of claim 11, wherein the second stopping strategy comprises: and indicating the terminal to discard the first URSP message, and determining that the third URSP message is the current URSP message.
14. The method of claim 11, wherein the second stopping strategy comprises: and indicating the terminal to suspend using the first URSP message within a second preset time period, and determining a third URSP message as the current URSP message.
15. The method of claim 14, wherein after sending the second stop policy for the first URSP message to the terminal via a fourth message, the method further comprises:
and sending the first URSP message enabling information to the terminal, wherein the first URSP message enabling information is used for indicating that the first URSP message is the current URSP message.
16. The method of claim 2, wherein the obtaining slice access policy information comprises:
sending a slice access policy request message to a second network device;
receiving slice access policy reply information from the second network device;
and acquiring the slice access strategy information according to the slice access strategy reply information.
17. The method of claim 16, wherein the slice access policy request information comprises preset slice access policy information.
18. The method of claim 16, wherein the slice access policy request message comprises: requesting to obtain a slice remapping rule and/or a first constraint of the slice remapping rule.
19. The method of claim 16, wherein the slice access policy request message comprises: and requesting to acquire the first URSP information and/or a second limiting condition of the first URSP information.
20. The method of claim 10, further comprising:
acquiring a configuration updating request message from the terminal;
and initiating configuration updating according to the configuration updating request message.
21. A method for slice access optimization, the method comprising:
the terminal acquires slice access strategy information from first network equipment;
and the terminal accesses the first network slice according to the slice access strategy information.
22. The method of claim 21, wherein the slice access policy information comprises first policy information related to slice remapping or second policy information related to a user equipment routing policy, URSP.
23. The method of claim 22, wherein the slice access policy information comprises the first policy information, and wherein after obtaining the slice access policy information from the first network device, the method further comprises:
acquiring a first limiting condition of a slice remapping rule according to the first strategy information;
discarding the slice remapping rule if the first constraint is not satisfied.
24. The method of claim 22, wherein after obtaining the slice access policy information from the first network device, the method further comprises:
acquiring a first limiting condition of a slice remapping rule according to the first strategy information;
suspending use of the slice remapping rule for a third preset time period if the first restriction condition is not satisfied.
25. The method of any of claims 22-24, wherein after obtaining the slice access policy information from the first network device, the method further comprises:
obtaining a first stopping strategy from the first network equipment;
discarding the slice remapping rule according to the first stopping policy.
26. The method of any of claims 22-24, wherein after obtaining the slice access policy information from the first network device, the method further comprises:
obtaining a first stopping strategy from the first network equipment;
suspending use of the slice remapping rule within a first preset time period according to the first stopping policy.
27. The method of claim 22, wherein the slice access policy information comprises the second policy information, and wherein after obtaining the slice access policy information from the first network device, the method further comprises:
acquiring a second limiting condition of the first URSP information according to the second strategy information;
and under the condition that the second limiting condition is not met, discarding the first URSP information, and determining a third URSP message as the current URSP message.
28. The method of claim 22, wherein after obtaining the slice access policy information from the first network device, the method further comprises:
acquiring a second limiting condition of the first URSP information according to the second strategy information;
and under the condition that the second limiting condition is not met, suspending the use of the first URSP message within a fourth preset time period, and determining a third URSP message as the current URSP message.
29. The method according to claim 22 or 27 or 28, wherein after obtaining the slice access policy information from the first network device, the method further comprises:
obtaining a second stopping strategy from the first network equipment;
and determining that a second URSP message is a current URSP message according to the second stopping strategy, wherein the second URSP message is a URSP message updated according to a preset URSP message, or the second URSP message is a URSP message regenerated by the first network equipment.
30. The method of claim 22, 27 or 28, wherein after obtaining the slice access policy information from the first network device, the method further comprises:
obtaining a second stopping strategy from the first network equipment;
and discarding the first URSP message according to the second stopping strategy, and determining a third URSP message as the current URSP message.
31. The method of claim 22, 27 or 28, wherein after obtaining the slice access policy information from the first network device, the method further comprises:
obtaining a second stopping strategy from the first network equipment;
and suspending using the first URSP message within a second preset time period according to the second stopping strategy, and determining that the third URSP message is the current URSP message.
32. The method of claim 22, wherein the slice access policy information comprises the first policy information, and wherein accessing a first network slice according to the slice access policy information comprises:
determining a first network slice identifier from the third URSP information;
acquiring a second network slice identifier according to the first network slice identifier and the first policy information;
accessing the first network slice according to the second network slice identifier.
33. The method of claim 32, wherein prior to accessing the first network slice according to the second network slice identifier, the method further comprises:
determining a second network slice from the first network slice identifier;
determining that the second network slice is barred in a serving cell and that the second network slice identifier satisfies a third restriction condition corresponding to a slice remapping rule.
34. The method of claim 22, wherein the slice access policy information comprises the second policy information, and wherein accessing a first network slice according to the slice access policy information comprises:
acquiring first URSP information and a second limiting condition of the first URSP information;
determining a third network slice identifier from the first URSP information if the second constraint is satisfied;
accessing the first network slice according to the third network slice identifier.
35. The method of claim 34, wherein the accessing the network slice according to the slice access policy information comprises:
determining a first network slice identifier from third URSP information in case the second limitation condition is not met;
accessing a network slice according to the first network slice identifier.
36. The method of claim 34, further comprising:
and sending configuration updating request information under the condition that the second limiting condition is not met.
37. The method of claim 22, wherein after obtaining the slice access policy information from the first network device, the method further comprises:
under the condition of cell selection or/reselection, acquiring a third network slice according to the current URSP message;
determining a camped first cell according to the third network slice and the first policy information.
38. The method of claim 37, wherein the determining the camped first cell according to the third network slice and the first policy information comprises:
determining at least one fourth network slice according to the first policy information and the third network slice in case that a neighboring cell does not support the third network slice;
and determining a cell as the first cell to camp on from the cells corresponding to the at least one fourth network slice.
39. The method of claim 37, wherein the determining the camped first cell according to the third network slice and the first policy information comprises:
determining at least one fourth network slice according to the first policy information and the third network slice in case there is at least one cell supporting the third network slice;
and determining a cell as the first cell to camp on from a third cell corresponding to the third network slice and/or a cell corresponding to the at least one fourth network slice.
40. The method of claim 22, wherein after obtaining the slice access policy information from the first network device, the method further comprises:
determining the current URSP message according to the second strategy information;
and selecting or/reselecting the cell according to the current URSP message.
41. A method for slice access optimization, the method comprising:
the second network equipment acquires the slice access strategy request information from the first network equipment;
and the second network equipment sends access policy request reply information to the first network equipment.
42. A slice access optimization apparatus, comprising:
the acquisition unit is used for acquiring the slice access strategy information by the first electronic equipment;
a sending unit, configured to send the slice access policy information to a terminal by the first electronic device.
43. A slice access optimization apparatus, comprising:
an obtaining unit, configured to obtain, by a terminal, slice access policy information from a first network device;
and the access unit is used for accessing the terminal into the first network slice according to the slice access strategy information.
44. A slice access optimization apparatus, the method comprising:
the acquisition unit is used for acquiring the slice access strategy request information from the first network equipment by the second network equipment;
a sending unit, configured to send, by the second network device, information related to the slice access policy request information to the first network device.
45. A network device comprising a processor, a memory, and one or more programs stored in the memory and configured to be executed by the processor, the programs including instructions for performing the steps in the method of any of claims 1-20.
46. A terminal comprising a processor, memory, and one or more programs stored in the memory and configured to be executed by the processor, the programs including instructions for performing the steps in the method of any of claims 21-40.
47. A network device comprising a processor, a memory, and one or more programs stored in the memory and configured to be executed by the processor, the programs including instructions for performing the steps in the method of claim 41.
48. A computer-readable storage medium, characterized in that a computer program for electronic data exchange is stored, wherein the computer program causes a computer to perform the method of any of claims 1-20 or any of claims 21-40 or claim 41.
CN202111000762.8A 2021-08-28 2021-08-28 Slice access optimization method and related product Pending CN115734314A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111000762.8A CN115734314A (en) 2021-08-28 2021-08-28 Slice access optimization method and related product

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111000762.8A CN115734314A (en) 2021-08-28 2021-08-28 Slice access optimization method and related product

Publications (1)

Publication Number Publication Date
CN115734314A true CN115734314A (en) 2023-03-03

Family

ID=85290592

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111000762.8A Pending CN115734314A (en) 2021-08-28 2021-08-28 Slice access optimization method and related product

Country Status (1)

Country Link
CN (1) CN115734314A (en)

Similar Documents

Publication Publication Date Title
CN109429295B (en) Method for selecting AMF, system and storage medium
US11706702B2 (en) Network entity, user equipment and method for the control and use of network slices
CN108353067B (en) Method, system and related equipment for realizing capability openness
CN110073638B (en) Data transmission method, terminal and access network element
CN109600802B (en) Data transmission method, related equipment and system
CN111601353B (en) Routing method of application program and related device
US20220338106A1 (en) Slice control method and apparatus
CN110519709B (en) Context management method and device
US20210099921A1 (en) Communication method, paging method, device, and system
CN112312418A (en) Method and device for acquiring user plane data and storage medium
CN111641989B (en) Protocol data unit session establishing method and related device
WO2021217672A1 (en) Load control method for network slice and related product
CN111132271A (en) Dynamic adjustment method and device for PDU session
US20210153157A1 (en) Method and apparatus for improving network slice control accuracy in wireless communication system
US20240098556A1 (en) User Equipment Network Slice Information Storage and Packet Data Unit Session Establishment for New Radio
CN113795019B (en) Communication control method and communication equipment
CN112291848B (en) Terminal capability configuration method and communication device
CN115734314A (en) Slice access optimization method and related product
CN114828203A (en) Information processing method, device, equipment and readable storage medium
CN113473564B (en) Network slice switching method, PDU session establishing method and device
US20230345347A1 (en) Method for determining mec access point and apparatus
CN116437354A (en) Network resource management method and communication device
CN116419310A (en) Slice access control method and device and network equipment
CN113543157A (en) Method and equipment for controlling network resources
CN115314934A (en) Reporting method, equipment, device and storage medium of QoE measurement report

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination