CN116368865A - Wireless communication method, terminal equipment and network equipment - Google Patents

Wireless communication method, terminal equipment and network equipment Download PDF

Info

Publication number
CN116368865A
CN116368865A CN202180070417.3A CN202180070417A CN116368865A CN 116368865 A CN116368865 A CN 116368865A CN 202180070417 A CN202180070417 A CN 202180070417A CN 116368865 A CN116368865 A CN 116368865A
Authority
CN
China
Prior art keywords
network
party
configuration information
information
identification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202180070417.3A
Other languages
Chinese (zh)
Inventor
范江胜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Publication of CN116368865A publication Critical patent/CN116368865A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/18Selecting a network or a communication service

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the application provides a wireless communication method, terminal equipment and network equipment, wherein the terminal equipment can determine logic number information corresponding to a network identifier in third-party network identifier configuration information configured by a network side, so that the third-party network is optimized. The method of wireless communication includes: the terminal equipment determines logic number information corresponding to the network identifier in the third party network identifier configuration information configured by the network side; the terminal equipment selects access control parameter configuration and/or system resource configuration associated with the logic number information according to the logic number information; and/or the terminal equipment generates a message containing network routing parameters according to the logic number information.

Description

Wireless communication method, terminal equipment and network equipment Technical Field
The embodiment of the application relates to the field of communication, and more particularly, to a wireless communication method, terminal equipment and network equipment.
Background
The New Radio, NR) version 16 (release 16, R16) introduces a Non-public Network (NPN), and in some scenarios, an operator authorizes a third party entity to establish its NPN Network, where the NPN Network deployed by the third party entity may have its own Network identifier configuration mode, how to determine a logical number corresponding to a Network identifier in the third party Network identifier configuration information is a problem to be solved urgently.
Disclosure of Invention
The embodiment of the application provides a wireless communication method, terminal equipment and network equipment, wherein the terminal equipment can determine logic number information corresponding to a network identifier in third-party network identifier configuration information configured by a network side, so that the third-party network is optimized.
In a first aspect, a method of wireless communication is provided, the method comprising:
the terminal equipment determines logic number information corresponding to the network identifier in the third party network identifier configuration information configured by the network side;
the terminal equipment selects access control parameter configuration and/or system resource configuration associated with the logic number information according to the logic number information; and/or the terminal equipment generates a message containing network routing parameters according to the logic number information.
In a second aspect, there is provided a method of wireless communication, the method comprising:
the network equipment sends target information to the terminal equipment, wherein the target information is used for the terminal equipment to determine logic number information corresponding to the network identifier in the third party network identifier configuration information configured by the network side;
wherein the logic number information is used for selecting access control parameter configuration and/or system resource configuration associated with the logic number information; and/or the logical numbering information is used to generate messages containing network routing parameters.
In a third aspect, a terminal device is provided for performing the method in the first aspect.
Specifically, the terminal device comprises functional modules for performing the method in the first aspect described above.
In a fourth aspect, a network device is provided for performing the method in the second aspect.
In particular, the network device comprises functional modules for performing the method in the second aspect described above.
In a fifth aspect, a terminal device is provided comprising a processor and a memory. The memory is used for storing a computer program, and the processor is used for calling and running the computer program stored in the memory to execute the method in the first aspect.
In a sixth aspect, a network device is provided that includes a processor and a memory. The memory is for storing a computer program and the processor is for calling and running the computer program stored in the memory for performing the method of the second aspect described above.
In a seventh aspect, there is provided an apparatus for implementing the method of any one of the first to second aspects.
Specifically, the device comprises: a processor for calling and running a computer program from a memory, causing a device in which the apparatus is installed to perform the method of any of the first to second aspects as described above.
In an eighth aspect, a computer-readable storage medium is provided for storing a computer program that causes a computer to execute the method of any one of the first to second aspects.
In a ninth aspect, there is provided a computer program product comprising computer program instructions for causing a computer to perform the method of any one of the first to second aspects above.
In a tenth aspect, there is provided a computer program which, when run on a computer, causes the computer to perform the method of any of the first to second aspects described above.
Through the technical scheme, the terminal equipment can determine the logic number information corresponding to the network identifier in the third-party network identifier configuration information configured by the network side, select access control parameter configuration and/or system resource configuration associated with the logic number information according to the logic number information, and/or generate a message containing network routing parameters according to the logic number information. Therefore, the access control parameter configuration, the system resource configuration, the network routing control and other operations can be performed on the third-party network, access congestion, non-isolation of the resource configuration and network routing errors caused by the introduction of the third-party network are avoided, and the third-party network is optimized.
Drawings
Fig. 1 is a schematic diagram of a communication system architecture to which embodiments of the present application apply.
Fig. 2 is a schematic flow chart of a method of wireless communication provided in accordance with an embodiment of the present application.
Fig. 3 is a schematic flow chart of another method of wireless communication provided in accordance with an embodiment of the present application.
Fig. 4 is a schematic block diagram of a terminal device according to an embodiment of the present application.
Fig. 5 is a schematic block diagram of a network device provided according to an embodiment of the present application.
Fig. 6 is a schematic block diagram of a communication device provided according to an embodiment of the present application.
Fig. 7 is a schematic block diagram of an apparatus provided in accordance with an embodiment of the present application.
Fig. 8 is a schematic block diagram of a communication system provided according to an embodiment of the present application.
Detailed Description
The following description of the technical solutions in the embodiments of the present application will be made with reference to the drawings in the embodiments of the present application, and it is apparent that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which can be made by one of ordinary skill in the art without undue burden for the embodiments herein, are intended to be within the scope of the present application.
The technical solution of the embodiment of the application can be applied to various communication systems, for example: global system for mobile communications (Global System of Mobile communication, GSM), code division multiple access (Code Division Multiple Access, CDMA) system, wideband code division multiple access (Wideband Code Division Multiple Access, WCDMA) system, general packet Radio service (General Packet Radio Service, GPRS), long term evolution (Long Term Evolution, LTE) system, long term evolution advanced (Advanced long term evolution, LTE-a) system, new Radio, NR system evolution system, LTE over unlicensed spectrum (LTE-based access to unlicensed spectrum, LTE-U) system, NR over unlicensed spectrum (NR-based access to unlicensed spectrum, NR-U) system, non-terrestrial communication network (Non-Terrestrial Networks, NTN) system, universal mobile telecommunication system (Universal Mobile Telecommunication System, UMTS), wireless local area network (Wireless Local Area Networks, WLAN), wireless fidelity (Wireless Fidelity, wiFi), fifth Generation communication (5 th-Generation, 5G) system, or other communication system, etc.
Generally, the number of connections supported by the conventional communication system is limited and easy to implement, however, with the development of communication technology, the mobile communication system will support not only conventional communication but also, for example, device-to-Device (D2D) communication, machine-to-machine (Machine to Machine, M2M) communication, machine type communication (Machine Type Communication, MTC), inter-vehicle (Vehicle to Vehicle, V2V) communication, or internet of vehicles (Vehicle to everything, V2X) communication, etc., and the embodiments of the present application may also be applied to these communication systems.
Optionally, the communication system in the embodiment of the present application may be applied to a carrier aggregation (Carrier Aggregation, CA) scenario, a dual connectivity (Dual Connectivity, DC) scenario, and a Stand Alone (SA) fabric scenario.
Optionally, the communication system in the embodiments of the present application may be applied to unlicensed spectrum, where unlicensed spectrum may also be considered as shared spectrum; alternatively, the communication system in the embodiments of the present application may also be applied to licensed spectrum, where licensed spectrum may also be considered as non-shared spectrum.
Embodiments of the present application describe various embodiments in connection with network devices and terminal devices, where a terminal device may also be referred to as a User Equipment (UE), access terminal, subscriber unit, subscriber station, mobile station, remote terminal, mobile device, user terminal, wireless communication device, user agent, user Equipment, or the like.
The terminal device may be a STATION (ST) in a WLAN, may be a cellular telephone, a cordless telephone, a session initiation protocol (Session Initiation Protocol, SIP) phone, a wireless local loop (Wireless Local Loop, WLL) STATION, a personal digital assistant (Personal Digital Assistant, PDA) device, a handheld device with wireless communication capabilities, a computing device or other processing device connected to a wireless modem, a vehicle mounted device, a wearable device, a terminal device in a next generation communication system such as an NR network, or a terminal device in a future evolved public land mobile network (Public Land Mobile Network, PLMN) network, etc.
In embodiments of the present application, the terminal device may be deployed on land, including indoor or outdoor, hand-held, wearable or vehicle-mounted; can also be deployed on the water surface (such as ships, etc.); but may also be deployed in the air (e.g., on aircraft, balloon, satellite, etc.).
In the embodiment of the present application, the terminal device may be a Mobile Phone (Mobile Phone), a tablet computer (Pad), a computer with a wireless transceiving function, a Virtual Reality (VR) terminal device, an augmented Reality (Augmented Reality, AR) terminal device, a wireless terminal device in industrial control (industrial control), a wireless terminal device in unmanned driving (self driving), a wireless terminal device in remote medical (remote medical), a wireless terminal device in smart grid (smart grid), a wireless terminal device in transportation security (transportation safety), a wireless terminal device in smart city (smart city), or a wireless terminal device in smart home (smart home), and the like.
By way of example, and not limitation, in embodiments of the present application, the terminal device may also be a wearable device. The wearable device can also be called as a wearable intelligent device, and is a generic name for intelligently designing daily wear by applying wearable technology and developing wearable devices, such as glasses, gloves, watches, clothes, shoes and the like. The wearable device is a portable device that is worn directly on the body or integrated into the clothing or accessories of the user. The wearable device is not only a hardware device, but also can realize a powerful function through software support, data interaction and cloud interaction. The generalized wearable intelligent device includes full functionality, large size, and may not rely on the smart phone to implement complete or partial functionality, such as: smart watches or smart glasses, etc., and focus on only certain types of application functions, and need to be used in combination with other devices, such as smart phones, for example, various smart bracelets, smart jewelry, etc. for physical sign monitoring.
In this embodiment of the present application, the network device may be a device for communicating with a mobile device, where the network device may be an Access Point (AP) in a WLAN, a base station (Base Transceiver Station, BTS) in GSM or CDMA, a base station (NodeB, NB) in WCDMA, an evolved base station (Evolutional Node B, eNB or eNodeB) in LTE, a relay station or an Access Point, a vehicle device, a wearable device, a network device or a base station (gNB) in an NR network, a network device in a PLMN network of future evolution, or a network device in an NTN network, etc.
By way of example and not limitation, in embodiments of the present application, a network device may have a mobile nature, e.g., the network device may be a mobile device. Alternatively, the network device may be a satellite, a balloon station. For example, the satellite may be a Low Earth Orbit (LEO) satellite, a medium earth orbit (medium earth orbit, MEO) satellite, a geosynchronous orbit (geostationary earth orbit, GEO) satellite, a high elliptical orbit (High Elliptical Orbit, HEO) satellite, or the like. Alternatively, the network device may be a base station disposed on land, in a water area, or the like.
In this embodiment of the present application, a network device may provide a service for a cell, where a terminal device communicates with the network device through a transmission resource (e.g., a frequency domain resource, or a spectrum resource) used by the cell, where the cell may be a cell corresponding to a network device (e.g., a base station), and the cell may belong to a macro base station, or may belong to a base station corresponding to a Small cell (Small cell), where the Small cell may include: urban cells (Metro cells), micro cells (Micro cells), pico cells (Pico cells), femto cells (Femto cells) and the like, and the small cells have the characteristics of small coverage area and low transmitting power and are suitable for providing high-rate data transmission services.
Exemplary, a communication system 100 to which embodiments of the present application apply is shown in fig. 1. The communication system 100 may include a network device 110, and the network device 110 may be a device that communicates with a terminal device 120 (or referred to as a communication terminal, terminal). Network device 110 may provide communication coverage for a particular geographic area and may communicate with terminal devices located within the coverage area.
Fig. 1 illustrates one network device and two terminal devices by way of example, and alternatively, the communication system 100 may include a plurality of network devices and may include other numbers of terminal devices within the coverage area of each network device, which is not limited in this embodiment of the present application.
Optionally, the communication system 100 may further include a network controller, a mobility management entity, and other network entities, which are not limited in this embodiment of the present application.
It should be understood that a device having a communication function in a network/system in an embodiment of the present application may be referred to as a communication device. Taking the communication system 100 shown in fig. 1 as an example, the communication device may include a network device 110 and a terminal device 120 with communication functions, where the network device 110 and the terminal device 120 may be specific devices described above, and are not described herein again; the communication device may also include other devices in the communication system 100, such as a network controller, a mobility management entity, and other network entities, which are not limited in this embodiment of the present application.
It should be understood that the terms "system" and "network" are used interchangeably herein. The term "and/or" is herein merely an association relationship describing an associated object, meaning that there may be three relationships, e.g., a and/or B, may represent: a exists alone, A and B exist together, and B exists alone. In addition, the character "/" herein generally indicates that the front and rear associated objects are an "or" relationship.
The terminology used in the description section of the present application is for the purpose of describing particular embodiments of the present application only and is not intended to be limiting of the present application. The terms "first," "second," "third," and "fourth" and the like in the description and in the claims of this application and in the drawings, are used for distinguishing between different objects and not for describing a particular sequential order. Furthermore, the terms "comprise" and "have," as well as any variations thereof, are intended to cover a non-exclusive inclusion.
It should be understood that, in the embodiments of the present application, the "indication" may be a direct indication, an indirect indication, or an indication having an association relationship. For example, a indicates B, which may mean that a indicates B directly, e.g., B may be obtained by a; it may also indicate that a indicates B indirectly, e.g. a indicates C, B may be obtained by C; it may also be indicated that there is an association between a and B.
In the description of the embodiments of the present application, the term "corresponding" may indicate that there is a direct correspondence or an indirect correspondence between the two, or may indicate that there is an association between the two, or may indicate a relationship between the two and the indicated, configured, or the like.
In the embodiment of the present application, the "predefining" may be implemented by pre-storing corresponding codes, tables or other manners that may be used to indicate relevant information in devices (including, for example, terminal devices and network devices), and the specific implementation of the present application is not limited. Such as predefined may refer to what is defined in the protocol.
In this embodiment of the present application, the "protocol" may refer to a standard protocol in the communication field, for example, may include an LTE protocol, an NR protocol, and related protocols applied in a future communication system, which is not limited in this application.
In a 5G network environment, for the purposes of reducing air interface signaling and quickly recovering a radio connection, and quickly recovering data traffic, a new radio resource control (Radio Resource Control, RRC) state, i.e., an rrc_inactive state, is defined. This state is different from the rrc_idle and rrc_connected states. Rrc_idle: mobility is UE-based cell selection reselection, paging is initiated by a Core Network (CN), and paging areas are configured by the CN. The base station side does not have a UE Access Stratum (AS) context, and does not have RRC connection. Rrc_connected: the RRC connection exists, and the base station and the UE exist a UE AS context; the network device knows that the location of the UE is cell specific. Mobility is mobility controlled by the network device. Unicast data may be transmitted between the UE and the base station. Rrc_inactive: mobility is a UE-based cell selection reselection, there is a connection between CN-NRs, the UE AS context is present on a certain base station, paging is triggered by the radio access network (Radio Access Network, RAN), the RAN-based paging area is managed by the RAN, the network device knows that the UE location is based on the RAN paging area level.
For better understanding of the embodiments of the present application, NPN networks related to the present application will be described.
NR version 16 (release 16, R16) introduces an NPN, which in turn can be divided into Stand-alone Non-public Networks (snps) and closed access group (Closed Access Group, CAG) Networks, where one SNPN is determined by PLMN ID and NID and one CAG network is determined by PLMN ID and CAG identification (CAG ID), in order to increase flexibility of NPN deployment. Taking the SNPN as an example, PLMN ID and NID may be used as an identifier of the SNPN, and a user subscribed to a certain SNPN service may configure a corresponding user permanent identifier (Subscriber Permanent Identifier, SUPI) and subscription information, and store them at the terminal device and the core network side. A user subscribed to the SNPN service needs to support an SNPN access mode (SNPN access mode), and a user configured to the SNPN access mode can only access the network through the SNPN, and a user not configured to the SNPN access mode can perform a PLMN selection procedure. Wherein the configuration mode (activation, deactivation, etc.) of the SNPN access mode is implemented by the terminal device. In the processes of initial access and cell reselection, the access network equipment needs to broadcast the NID supported by itself and corresponding PLMN ID information, and the user configured with the SNPN access mode can select an accessible SNPN cell according to own subscription information, and the core network equipment can also authenticate the identity of the user according to the subscription information of the user.
One PLMN can simultaneously support any network sharing combination mode in the common public network, the SNPN and the CAG network. For example, one PLMN may support a common public network, an SNPN, or a CAG network alone, or may support a network sharing combination mode of the common public network and the SNPN, or may support a network sharing combination mode of the common public network, the SNPN, and the CAG network. In other words, the common public network, the SNPN or the CAG network may be supported by one PLMN, or the common public network and the SNPN may share one PLMN network at the same time, or even the common public network, the SNPN and the CAG network may share one PLMN network at the same time. The following table 1 can more clearly reflect the logical deployment relationship among the common public network, the SNPN and the CAG network.
TABLE 1
Figure PCTCN2021071564-APPB-000001
As shown in table 1, from the network configuration perspective, one cell may simultaneously configure public network PLMN ID list information and non-public network NPN network identification list information, where the non-public network NPN network identification list information is an optional parameter introduced by NR R16, and for a CAG type NPN network, one PLMN ID is allowed to be associated with one CAG ID list; for an NPN network of the SNPN type, one PLMN ID is allowed to be associated with one NID list.
The parameter N/M/W in Table 1 is a positive integer of 1 or more.
It should be noted that, the "suitable cell" may refer to a cell in which the terminal device may normally reside.
In order to better understand the embodiments of the present application, the frequency point priority related to the present application is described.
The network side can configure the frequency point priority information at the same time when configuring a frequency point, the frequency point priority value is 0-7, 0 represents the lowest priority, 7 represents the highest priority, for the diversity of the frequency point priority configuration, the standard prescribes that each value of 0-7 can be associated with a decimal place value, the decimal place value range is {0.2,0.4,0.6,0.8}, and the whole digits and the decimal places are matched with 40 frequency point priority combinations in total.
The frequency point priority can be configured through system information or special signaling, the frequency point priority of the special signaling is related to an effective duration, and the special frequency point priority always covers the public frequency point priority of the system information broadcast in the effective duration; after the effective duration is overtime, the terminal can only use the public frequency point priority.
It should be noted that, when a frequency point is configured, the frequency point priority of the frequency point configured by the network side is the absolute frequency point priority of the frequency point.
For better understanding of the embodiments of the present application, a cell selection reselection rule of a terminal in an NPN network related to the present application will be described.
Cell selection: and if the cell selected by the terminal meets the proper cell criterion, the terminal can select to reside in the cell to complete cell selection.
Cell reselection: and if the reselected target cell meets the proper cell criterion and meets the reselection criterion condition defined based on the absolute frequency point priority, the terminal reselects to the cell which corresponds to the condition and completes cell reselection.
The reselection criteria defined based on the absolute frequency point priority include the following three types:
a high priority frequency point reselection criterion;
the equal priority frequency point reselection criterion or the same frequency reselection criterion is also called as an R criterion;
low priority frequency point reselection criteria.
To facilitate a better understanding of embodiments of the present application, the auto neighbor relation (Auto Neighbor Relationship, ANR) associated with the present application is described.
The newly deployed cell may affect the neighbor relation, and the surrounding neighbor cells cannot always obtain the latest neighbor relation information from the operation, administration and maintenance (Operation Administration and Maintenance, OAM), so that the NR allows the terminal to report the neighbor related information obtained by itself, such as the global identity (Cell Global Identity, CGI)/the difference between the system frame number and the frame time (System Frame Number and Frame Timing Difference, SFTD), under the configuration of the network side.
For better understanding of the embodiments of the present application, the indication of the emergency communication service on the network side related to the present application is described.
Currently, the emergency communication service indication information of the network side is configured by the granularity of a cell (cell), that is to say, all PLMNs supported by the cell share one emergency communication service indication information, and the PLMNs either support emergency communication or do not support emergency communication; while the SNPN network provides for no emergency communication service at NR R16.
To facilitate a better understanding of embodiments of the present application, access and mobility management function (Access and Mobility Management Function, AMF) routing mechanisms associated with the present application are described.
NR release15 (R15) specifies that a next generation radio Access network (Next Generation Radio Access Network, NG-RAN) may be connected to one or more AMF entities, different AMF entities may provide different services or be maintained by different operators, in order to route Non-Access Stratum (NAS) data of a terminal to a suitable AMF entity, the terminal device needs to provide one of the following information in the fifth piece of information of the four-step random Access procedure or the third piece of information of the two-step random Access procedure to assist the radio Access network (Radio Access Network, RAN) side in selecting the suitable AMF entity:
PLMN/SNPN network identification number selected by the NAS of the terminal equipment;
slice list information requested by the terminal equipment;
AMF identification information that the terminal device has registered.
For better understanding of the embodiments of the present application, a method for coding a cell network identifier related to the present application is described.
The existing cell network identifier includes a public network PLMN network identifier (using PLMN ID identifier) and/or a non-public network NPN identifier, where the non-public network NPN further includes an SNPN network (using PLMN id+nid ID identifier) or a CAG network (using PLMN id+cag ID identifier), the terminal obtains the network identifier original data information supported by the cell by reading a cell system broadcast information system information block (System Information Block, SIB) 1, where the network identifier is not only used to characterize the network type supported by the current cell, but also used in other network configuration or terminal procedures, such as: the configuration of the cell access control parameters, the adding process of the network identification parameters in the fifth piece of information of the four-step random access process sent by the terminal, and the like, because an original PLMN ID or SNPN ID identifier occupies a large number of bits (one PLMN ID occupies 20 bits or 24 bits, and one SNPN ID occupies 64 bits or 68 bits), the protocol prescribes that the original PLMN ID or SNPN ID identifier broadcasted by the cell system information is represented in an index mode when the related process of the cell or the terminal needs to use the PLMN ID or the SNPN ID, thereby saving the system overhead. Because the protocol specifies that the number of public network PLMNs and non-public network NPN networks together cannot exceed 12 when configured, 4 bits are typically used to represent any public network PLMN or non-public network NPN network identity broadcast by the cell, which saves significant overhead compared to the original PLMN ID or SNPN ID identity broadcast using cell system information.
The specific rules of the network identification index are as follows:
all public network PLMN network identifications form a public network PLMN identification set, and all non-public network NPN network identifications form a non-public network NPN identification set.
Each PLMN ID in all public network PLMN identification sets is counted separately, and for non-public network NPN identification sets, each SNPN ID in the sets is counted separately (even if multiple NIDs are associated with the same PLMN ID, it is also necessary to count separately), but for CAG type NPN networks, if multiple CAG IDs are associated with the same PLMN ID, only one can be counted when counting the network; the protocol further provides that the public network PLMN identification set and the network identifications in the non-public network NPN identification set in the same cell are numbered in a unified manner, and the network identifications in the non-public network NPN identification set are always numbered after the network identifications in the public network PLMN identification set are numbered, for example, the public network PLMN identification set comprises 5 PLMN ID network identifications, and the network identifications in the non-public network NPN identification set can only be numbered from 6 according to the configured logical sequence. For an NPN-only (NPN-only) cell, the protocol specifies that network identities in the non-public network NPN identity set are numbered starting from 1. The number of public network PLMNs together with non-public network NPN networks cannot exceed 12, that is to say the number is up to 12, regardless of the network configuration.
The deployment of NPN networks such as SNPN and CAG is more flexible, and even third party entities can deploy own NPN networks under the authorization of operators, the NPN networks deployed by the third party entities may have own network identification configuration modes, but at present, the logic relationship between the newly introduced network identification configuration and the existing public network PLMN ID list configuration information and the non-public network NPN network identification list configuration information is undefined, so that the newly introduced network identification numbering rules cannot be defined, and therefore other parameters which need to be associated with the newly introduced network identifications in an index mode cannot be defined, such as access control, an AMF routing function and the like, and the consequences are that when a terminal accesses to the network through the newly introduced network identifications, resource congestion is not caused by the constraint of the system access control rules or communication delay is increased due to the fact that a terminal message is wrongly routed to an improper AMF by a network side.
Based on the above problems, the present application proposes a scheme of network identification numbers, where a terminal device can determine logic number information corresponding to a network identification in third party network identification configuration information configured by a network side, so as to optimize a third party network.
The technical scheme of the present application is described in detail below through specific embodiments.
Fig. 2 is a schematic flow chart of a method 200 of wireless communication according to an embodiment of the present application, as shown in fig. 2, the method 200 may include at least some of the following:
s210, the terminal equipment determines logic number information corresponding to the network identifier in the third party network identifier configuration information configured by the network side;
s220, the terminal equipment selects access control parameter configuration and/or system resource configuration associated with the logic number information according to the logic number information; and/or the terminal equipment generates a message containing network routing parameters according to the logic number information.
In the embodiment of the application, the logic relationship between the third party network identifier configuration information and the public network PLMN ID list configuration information and the non-public network NPN network identifier list configuration information is defined, so that the operations such as access control parameter configuration, system resource configuration, network routing control and the like can be performed on the third party network, access congestion, resource configuration non-isolation and network routing error caused by the introduction of the third party network are avoided, and the third party network is optimized.
In some embodiments, the third party network identification configuration information includes at least one of the following:
PLMN network identification, SNPN network identification, temporary network identification, access control related network identification, first functional group identification.
The first function group identifier is a group identifier which allows the terminal to carry out third party authentication through a cell; or the first function group identifier is a group identifier for allowing the terminal to acquire self subscription data through the cell network.
It should be noted that the access control related network identifier is similar to the PLMN ID or the SNPN ID, i.e. has the same actual meaning, but the length of the access control related network identifier may be different from the PLMN ID or the SNPN ID. Similarly, the temporary network identity is similar to, i.e. in the same sense as, the PLMN ID or the SNPN ID, except that the temporary network identity is a temporary identity of the PLMN or SNPN.
In some embodiments, the first functional group identification includes at least one of the following configuration granularities:
PLMN identity or SNPN identity granularity, CAG identity granularity, cell granularity, access control related network identity granularity, temporary network identity granularity.
For example, an alternative cell granularity configuration format for the first functional group identifier may be as shown in table 2, where the first functional group identifier is configured with cell granularity as the public network PLMN network identifier or the non-public network NPN network identifier is configured with the public network PLMN network identifier or the non-public network NPN network identifier in parallel.
TABLE 2
Public network PLMN network identification
NPN network identifier of non-public network
First functional group identification
For example, an alternative PLMN identity or SNPN identity granularity or access control related network identity granularity or temporary network identity granularity configuration format of the first functional group identity may be as shown in table 3, since the first functional group identity is the next level configuration of PLMN identity/SNPN identity/access control related network identity/temporary network identity, the first functional group identity is configured of PLMN identity/SNPN identity/access control related network identity/temporary network identity granularity.
TABLE 3 Table 3
Figure PCTCN2021071564-APPB-000002
It should be noted that, the access control related network identifier and the temporary network identifier in the above table 3 may be parallel to the public network PLMN network identifier/the non-public network NPN network identifier, or as shown in table 3, the access control related network identifier and the temporary network identifier configuration information may be the next configuration of the non-public network NPN network identifier.
For example, an alternative CAG identification granularity configuration format for the first functional group identification may be as shown in table 4, since the first functional group identification is the next level configuration of the CAG identification, the first functional group identification is the configuration of the CAG identification granularity.
TABLE 4 Table 4
Figure PCTCN2021071564-APPB-000003
In some embodiments, the third party network identification configuration information may also be associated with a first configuration information comprising at least one of the following:
indication information whether the terminal is allowed to authenticate through the cell network;
whether the terminal is allowed to initiate the indication information of the third party network authentication request under the condition that the SNPN or PLMN network identifier used for the third party network authentication is not matched with any SNPN or PLMN network identifier broadcasted by the cell system information;
whether the terminal is allowed to acquire or update the indication information of the subscription data of the terminal through the cell network;
indication of whether emergency communication is allowed.
In some embodiments, the first configuration information includes at least one of the following configuration granularities:
PLMN identity or SNPN identity granularity, CAG identity granularity, cell granularity, access control related network identity granularity, temporary network identity granularity.
For example, an alternative cell granularity configuration format for the first configuration information and the first functional group identification may be as shown in table 5, since the public network PLMN network identification or the non-public network NPN network identification is cell granularity configured, the first configuration information and the first functional group identification are also cell granularity configured in parallel with the public network PLMN network identification or the non-public network NPN network identification.
TABLE 5
Public network PLMN network identification
NPN network identifier of non-public network
First functional group identification
First configuration information
For example, an alternative PLMN identity or SNPN identity granularity or access control related network identity granularity or temporary network identity granularity configuration format of the first configuration information may be as shown in table 6, since the first configuration information is the next level configuration of PLMN identity/SNPN identity/access control related network identity/temporary network identity, the first configuration information is PLMN identity/SNPN identity/access control related network identity/temporary network identity granularity configuration.
TABLE 6
Figure PCTCN2021071564-APPB-000004
It should be noted that, the access control related network identifier and the temporary network identifier in the above table 6 may be parallel to the public network PLMN network identifier/the non-public network NPN network identifier, or as shown in table 6, the access control related network identifier and the temporary network identifier configuration information may be the next configuration of the non-public network NPN network identifier.
For example, an alternative CAG identification granularity configuration format for the first configuration information may be as shown in table 7, since the first configuration information is the next level configuration of the CAG identification, the first configuration information is the configuration of the CAG identification granularity.
TABLE 7
Figure PCTCN2021071564-APPB-000005
In some embodiments, the step S210 may specifically be:
the terminal equipment determines the logic number information corresponding to the network identifier in the third party network identifier configuration information according to the first information; the first information is used for indicating the network identifier in the third party network identifier configuration information to be numbered uniformly with the network identifier in the PLMN network identifier configuration information and/or the NPN network identifier configuration information.
For example, the number of network identifications in the third party network identification configuration information follows the number of network identifications in the PLMN network identification configuration information and/or the NPN network identification configuration information.
The "PLMN network identifier configuration information" may also be referred to as "public network PLMN network identifier configuration information" and the "NPN network identifier configuration information" may also be referred to as "non-public network NPN network identifier configuration information".
In some embodiments, the total number of network identifications in the third party network identification configuration information and/or the PLMN network identification configuration information and/or the network identifications in the NPN network identification configuration information is a positive integer M;
wherein M does not exceed 16, alternatively M does not exceed 32, alternatively M does not exceed 64.
In some embodiments, the first information is pre-configured or agreed upon by the protocol, or the first information is configured by the network device.
As an example, assume that the number of network identifications included in the PLMN network identification configuration information is 3, the number of network identifications included in the npn network identification configuration information is 4, and the number of network identifications included in the third party network identification configuration information is 5. Numbering is performed according to a unified numbering mode: the PLMN network identifiers are numbered 1 to 3 in sequence according to the configured logic sequence; NPN network identifiers are numbered 4-7 in sequence according to the configured logic sequence; the third party network identifications are numbered 8-12 in sequence according to the configured logic sequence.
It should be noted that the third party network identifier configuration information may be included in the NPN network identifier configuration information, or may be configured in parallel with the NPN network identifier configuration information, which is not limited in this embodiment of the present application.
In some embodiments, the step S210 may specifically be:
the terminal equipment determines the logic number information corresponding to the network identifier in the third party network identifier configuration information according to the second information; the second information is used for indicating the network identifier in the third party network identifier configuration information to be independently numbered with the network identifier in the PLMN network identifier configuration information and/or the NPN network identifier configuration information.
For example, the logical numbering of the network identifications in the third party network identification configuration information starts from 0 or 1.
In some embodiments, the number of network identifications in the third party network identification configuration information is a positive integer N;
wherein N is not more than 12, alternatively N is not more than 16, alternatively N is not more than 32, alternatively N is not more than 64.
In some embodiments, the second information is pre-configured or agreed upon by the protocol, or the second information is configured by the network device.
As an example, assume that the number of network identifications included in the PLMN network identification configuration information is 3, the number of network identifications included in the npn network identification configuration information is 4, and the number of network identifications included in the third party network identification configuration information is 5. Numbering is performed in an independent numbering manner: the PLMN network identifiers are numbered 1 to 3 in sequence according to the configured logic sequence; NPN network identifiers are numbered 4-7 in sequence according to the configured logic sequence; the third party network identifications are numbered 0-4 or 1-5 in sequence according to the configured logic sequence.
In some embodiments, the association between the logical number of the third party network identifier and the access control parameter configuration includes, but is not limited to, one of:
The logic number of a third party network identifier is associated with a set of access control parameter configurations;
the logic number of the group of third party network identifications is associated with a group of access control parameter configurations;
the logical number of all third party network identifications is associated with a set of access control parameter configurations.
In some embodiments, the association between the logical number of the third party network identity and the system resource configuration comprises one of:
a logic number of a third party network identifier is associated with a set of system resource configurations;
the logic number of the group of third party network identifications is associated with a group of system resource allocation;
the logical number of all third party network identifications is associated with a set of system resource configurations.
For example, an optional association of the logical number of the third party network identity with the access control parameter configuration or the system resource configuration may be as shown in table 8. That is, the logical number of one third party network identity is associated with a set of access control parameter configurations or a set of system resource configurations.
TABLE 8
Figure PCTCN2021071564-APPB-000006
For another example, an optional association of the logical number of the third party network identity with the access control parameter configuration or the system resource configuration may be as shown in table 9. That is, the logical number of the set of third party network identifications is associated with a set of access control parameter configurations or a set of system resource configurations.
TABLE 9
Figure PCTCN2021071564-APPB-000007
For another example, an optional association of the logical number of the third party network identity with the access control parameter configuration or the system resource configuration may be as shown in table 10. The third party network identification logic number 1 and the third party network identification logic number 2 are respectively and independently associated with a group of access control parameter configurations or a group of system resource configurations; and the third party network identification logic number 3 and the third party network identification logic number 4 are jointly associated with a set of access control parameter configurations or a set of system resource configurations, and then the two third party network identification logic codes are jointly associated with a set of access control parameter configurations or a set of system resource configurations.
Table 10
Figure PCTCN2021071564-APPB-000008
As another example, an optional association of the logical number of the third party network identifier with the access control parameter configuration or the system resource configuration may be as shown in table 11. I.e. the logical number of all third party network identities is associated with a set of access control parameter configurations or a set of system resource configurations.
TABLE 11
Figure PCTCN2021071564-APPB-000009
In some embodiments, the system resource configuration includes at least one of the following:
random access resource allocation;
bandwidth Part (BWP) resource allocation;
The slice type configuration supported;
band resource allocation;
and (5) configuring the power level.
In some embodiments, the message including the network routing parameter generated by the terminal device according to the logic number information is a dedicated signaling for uplink of the terminal.
For example, an RRC connection setup complete message. Also for example, an RRC connection reconfiguration complete message. As another example, an RRC connection reestablishment complete message. As another example, an RRC connection resume complete message.
In some embodiments, the network routing parameter is represented by a logical numbered value of a third party network identification.
For example, if the third party network identification logical number value is 16 or less, 4 bits are used to represent the network routing parameter.
For another example, if the third party network identification logical number value is greater than 16 but less than or equal to 32, 5 bits are used to represent the network routing parameter.
For another example, if the third party network identification logical number value is greater than 32 but less than or equal to 64, then 6 bits are used to represent the network routing parameter.
In some embodiments, the network routing parameters are represented by network routing parameters defined for PLMN network identification configuration information and/or NPN network identification configuration information in conjunction with network routing parameters specific to the third party network identification.
As an example, assume that the PLMN network identifier configuration information and/or NPN network identifier configuration information number ranges from 1 to 12, the standard defines 4 bits to represent network routing parameters, and the third party network identifiers are logically numbered in a unified numbering manner. If all the third party network identification numbers are below 12, 4 bits defined by the multiplexing standard and used for representing network routing parameters represent 1-12 values, namely: 4 bits represent 1 to 12 values. If all the third party network identification numbers are more than 13 and less than 32 (more than or equal to 13 and less than or equal to 32), a new bit can be defined to be combined with 4 bits which are defined by the standard and used for representing network routing parameters to form 5 bits to represent all the third party network identification numbers to take values; if all the third party network identification numbers are above 33 and below 64 (more than or equal to 33 and less than or equal to 64), 2 new bits can be defined to form 6 bits in combination with 4 bits defined by the standard and used for representing network routing parameters to represent all the third party network identification numbers to take values.
As an example, assume that the PLMN network identifier configuration information and/or NPN network identifier configuration information number ranges from 1 to 12, the standard defines 4 bits to represent network routing parameters, and the third party network identifiers are logically numbered in an independent numbering manner. If all the third party network identification numbers are below 12, 4 bits defined by the multiplexing standard and used for representing network routing parameters represent 1-12 values, namely: 4 bits represent 1-12 values, but 1 extra bit is needed to represent that the network routing parameter is associated with a third party network identifier; if all the third party network identification numbers are more than 13 and less than 32 (more than or equal to 13 and less than or equal to 32), a new bit can be defined to be combined with 4 bits which are defined by the standard and used for representing network routing parameters to form 5 bits to represent all the third party network identification numbers to take values; if all the third party network identification numbers are above 33 and below 64 (more than or equal to 33 and less than or equal to 64), 2 new bits can be defined to form 6 bits in combination with 4 bits defined by the standard and used for representing network routing parameters to represent all the third party network identification numbers to take values.
Therefore, in the embodiment of the application, the terminal device can determine the logic number information corresponding to the network identifier in the third party network identifier configuration information configured by the network side, select the access control parameter configuration and/or the system resource configuration associated with the logic number information according to the logic number information, and/or generate the message containing the network routing parameter according to the logic number information. Therefore, the access control parameter configuration, the system resource configuration, the network routing control and other operations can be performed on the third-party network, access congestion, non-isolation of the resource configuration and network routing errors caused by the introduction of the third-party network are avoided, and the third-party network is optimized.
The terminal-side embodiment of the present application is described in detail above with reference to fig. 2, and the network-side embodiment of the present application is described in detail below with reference to fig. 3, it being understood that the network-side embodiment corresponds to the terminal-side embodiment, and similar descriptions can be made with reference to the terminal-side embodiment.
Fig. 3 is a schematic flow chart of a method 300 of wireless communication according to an embodiment of the present application, as shown in fig. 3, the method 300 may include at least some of the following:
s310, the network equipment sends target information to the terminal equipment, wherein the target information is used for the terminal equipment to determine logic number information corresponding to the network identifier in the third party network identifier configuration information configured by the network side; wherein the logic number information is used for selecting access control parameter configuration and/or system resource configuration associated with the logic number information; and/or the logical numbering information is used to generate messages containing network routing parameters.
In the embodiment of the application, the logic relationship between the third party network identifier configuration information and the public network PLMN ID list configuration information and the non-public network NPN network identifier list configuration information is defined, so that the operations such as access control parameter configuration, system resource configuration, network routing control and the like can be performed on the third party network, access congestion, resource configuration non-isolation and network routing error caused by the introduction of the third party network are avoided, and the third party network is optimized.
In some embodiments, the third party network identification configuration information includes at least one of the following:
PLMN network identification, SNPN network identification, temporary network identification, access control related network identification, first functional group identification.
The first function group identifier is a group identifier which allows the terminal to carry out third party authentication through a cell; or the first function group identifier is a group identifier for allowing the terminal to acquire self subscription data through the cell network.
It should be noted that the access control related network identifier is similar to the PLMN ID or the SNPN ID, i.e. has the same actual meaning, but the length of the access control related network identifier may be different from the PLMN ID or the SNPN ID. Similarly, the temporary network identity is similar to, i.e. in the same sense as, the PLMN ID or the SNPN ID, except that the temporary network identity is a temporary identity of the PLMN or SNPN.
In some embodiments, the first functional group identification includes at least one of the following configuration granularities:
PLMN identity or SNPN identity granularity, CAG identity granularity, cell granularity, access control related network identity granularity, temporary network identity granularity.
In some embodiments, the third party network identification configuration information may also be associated with a first configuration information comprising at least one of the following:
indication information whether the terminal is allowed to authenticate through the cell network;
whether the terminal is allowed to initiate the indication information of the third party network authentication request under the condition that the SNPN or PLMN network identifier used for the third party network authentication is not matched with any SNPN or PLMN network identifier broadcasted by the cell system information;
whether the terminal is allowed to acquire or update the indication information of the subscription data of the terminal through the cell network;
indication of whether emergency communication is allowed.
In some embodiments, the first configuration information includes at least one of the following configuration granularities:
PLMN identity or SNPN identity granularity, CAG identity granularity, cell granularity, access control related network identity granularity, temporary network identity granularity.
In some embodiments, the target information is used to indicate that the network identifier in the third party network identifier configuration information is uniformly numbered with the network identifier in the PLMN network identifier configuration information and/or NPN network identifier configuration information.
For example, the number of network identifications in the third party network identification configuration information follows the number of network identifications in the PLMN network identification configuration information and/or the NPN network identification configuration information.
The "PLMN network identifier configuration information" may also be referred to as "public network PLMN network identifier configuration information" and the "NPN network identifier configuration information" may also be referred to as "non-public network NPN network identifier configuration information".
In some embodiments, the total number of network identifications in the third party network identification configuration information and/or the PLMN network identification configuration information and/or the network identifications in the NPN network identification configuration information is a positive integer M;
wherein M does not exceed 16, alternatively M does not exceed 32, alternatively M does not exceed 64.
In some embodiments, the first information is pre-configured or agreed upon by the protocol, or the first information is configured by the network device.
As an example, assume that the number of network identifications included in the PLMN network identification configuration information is 3, the number of network identifications included in the npn network identification configuration information is 4, and the number of network identifications included in the third party network identification configuration information is 5. Numbering is performed according to a unified numbering mode: the PLMN network identifiers are numbered 1 to 3 in sequence according to the configured logic sequence; NPN network identifiers are numbered 4-7 in sequence according to the configured logic sequence; the third party network identifications are numbered 8-12 in sequence according to the configured logic sequence.
It should be noted that the third party network identifier configuration information may be included in the NPN network identifier configuration information, or may be configured in parallel with the NPN network identifier configuration information, which is not limited in this embodiment of the present application.
In some embodiments, the target information is used to indicate that the network identifier in the third party network identifier configuration information is independently numbered with the network identifier in the PLMN network identifier configuration information and/or NPN network identifier configuration information.
For example, the logical numbering of the network identifications in the third party network identification configuration information starts from 0 or 1.
In some embodiments, the number of network identifications in the third party network identification configuration information is a positive integer N;
wherein N is not more than 12, alternatively N is not more than 16, alternatively N is not more than 32, alternatively N is not more than 64.
In some embodiments, the second information is pre-configured or agreed upon by the protocol, or the second information is configured by the network device.
As an example, assume that the number of network identifications included in the PLMN network identification configuration information is 3, the number of network identifications included in the npn network identification configuration information is 4, and the number of network identifications included in the third party network identification configuration information is 5. Numbering is performed in an independent numbering manner: the PLMN network identifiers are numbered 1 to 3 in sequence according to the configured logic sequence; NPN network identifiers are numbered 4-7 in sequence according to the configured logic sequence; the third party network identifications are numbered 0-4 or 1-5 in sequence according to the configured logic sequence.
In some embodiments, the association between the logical number of the third party network identifier and the access control parameter configuration includes, but is not limited to, one of:
the logic number of a third party network identifier is associated with a set of access control parameter configurations;
the logic number of the group of third party network identifications is associated with a group of access control parameter configurations;
the logical number of all third party network identifications is associated with a set of access control parameter configurations.
In some embodiments, the association between the logical number of the third party network identity and the system resource configuration comprises one of:
a logic number of a third party network identifier is associated with a set of system resource configurations;
the logic number of the group of third party network identifications is associated with a group of system resource allocation;
the logical number of all third party network identifications is associated with a set of system resource configurations.
In some embodiments, the system resource configuration includes at least one of the following:
random access resource allocation;
BWP resource configuration;
the slice type configuration supported;
band resource allocation;
and (5) configuring the power level.
In some embodiments, the message including the network routing parameter generated by the terminal device according to the logic number information is a dedicated signaling for uplink of the terminal.
For example, an RRC connection setup complete message. Also for example, an RRC connection reconfiguration complete message. As another example, an RRC connection reestablishment complete message. As another example, an RRC connection resume complete message.
In some embodiments, the network routing parameter is represented by a logical numbered value of a third party network identification.
For example, if the third party network identification logical number value is 16 or less, 4 bits are used to represent the network routing parameter.
For another example, if the third party network identification logical number value is greater than 16 but less than or equal to 32, 5 bits are used to represent the network routing parameter.
For another example, if the third party network identification logical number value is greater than 32 but less than or equal to 64, then 6 bits are used to represent the network routing parameter.
In some embodiments, the network routing parameters are represented by network routing parameters defined for PLMN network identification configuration information and/or NPN network identification configuration information in conjunction with network routing parameters specific to the third party network identification.
As an example, assume that the PLMN network identifier configuration information and/or NPN network identifier configuration information number ranges from 1 to 12, the standard defines 4 bits to represent network routing parameters, and the third party network identifiers are logically numbered in a unified numbering manner. If all the third party network identification numbers are below 12, 4 bits defined by the multiplexing standard and used for representing network routing parameters represent 1-12 values, namely: 4 bits represent 1 to 12 values. If all the third party network identification numbers are more than 13 and less than 32 (more than or equal to 13 and less than or equal to 32), a new bit can be defined to be combined with 4 bits which are defined by the standard and used for representing network routing parameters to form 5 bits to represent all the third party network identification numbers to take values; if all the third party network identification numbers are above 33 and below 64 (more than or equal to 33 and less than or equal to 64), 2 new bits can be defined to form 6 bits in combination with 4 bits defined by the standard and used for representing network routing parameters to represent all the third party network identification numbers to take values.
As an example, assume that the PLMN network identifier configuration information and/or NPN network identifier configuration information number ranges from 1 to 12, the standard defines 4 bits to represent network routing parameters, and the third party network identifiers are logically numbered in an independent numbering manner. If all the third party network identification numbers are below 12, 4 bits defined by the multiplexing standard and used for representing network routing parameters represent 1-12 values, namely: 4 bits represent 1-12 values, but 1 extra bit is needed to represent that the network routing parameter is associated with a third party network identifier; if all the third party network identification numbers are more than 13 and less than 32 (more than or equal to 13 and less than or equal to 32), a new bit can be defined to be combined with 4 bits which are defined by the standard and used for representing network routing parameters to form 5 bits to represent all the third party network identification numbers to take values; if all the third party network identification numbers are above 33 and below 64 (more than or equal to 33 and less than or equal to 64), 2 new bits can be defined to form 6 bits in combination with 4 bits defined by the standard and used for representing network routing parameters to represent all the third party network identification numbers to take values.
Therefore, in the embodiment of the application, the terminal device can determine the logic number information corresponding to the network identifier in the third party network identifier configuration information configured by the network side based on the indication of the network device, select the access control parameter configuration and/or the system resource configuration associated with the logic number information according to the logic number information, and/or generate the message containing the network routing parameter according to the logic number information. Therefore, the access control parameter configuration, the system resource configuration, the network routing control and other operations can be performed on the third-party network, access congestion, non-isolation of the resource configuration and network routing errors caused by the introduction of the third-party network are avoided, and the third-party network is optimized.
The method embodiments of the present application are described in detail above with reference to fig. 2 to 3, and the apparatus embodiments of the present application are described in detail below with reference to fig. 4 to 8, it being understood that the apparatus embodiments and the method embodiments correspond to each other, and similar descriptions may refer to the method embodiments.
Fig. 4 shows a schematic block diagram of a terminal device 400 according to an embodiment of the present application. As shown in fig. 4, the terminal device 400 includes:
a processing unit 410, configured to determine logic number information corresponding to a network identifier in third party network identifier configuration information configured by a network side;
The processing unit 410 is further configured to select an access control parameter configuration and/or a system resource configuration associated with the logic number information according to the logic number information; and/or the terminal equipment generates a message containing network routing parameters according to the logic number information.
In some embodiments, the third party network identification configuration information includes at least one of the following:
public land mobile network PLMN network identification, independent non-public network SNPN network identification, temporary network identification, access control related network identification, first function group identification.
In some embodiments, the first functional group identity is a group identity allowing the terminal to perform a third party authentication through the cell; or, the first function group identifier is a group identifier for allowing the terminal to acquire or update own subscription data through the cell network.
In some embodiments, the first functional group identification includes at least one of the following configuration granularities:
PLMN identification or SNPN identification granularity, closed access group CAG identification granularity, cell granularity, access control related network identification granularity, temporary network identification granularity.
In some embodiments, the processing unit 410 is specifically configured to:
Determining the logic number information corresponding to the network identifier in the third party network identifier configuration information according to the first information; the first information is used for indicating the network identifier in the third party network identifier configuration information to be numbered uniformly with the network identifier in the PLMN network identifier configuration information and/or the NPN network identifier configuration information.
In some embodiments, the numbering of the network identifications in the third party network identification configuration information follows the numbering of the network identifications in the PLMN network identification configuration information and/or the NPN network identification configuration information.
In some embodiments, the total number of network identifications in the third party network identification configuration information and/or the PLMN network identification configuration information and/or the network identifications in the NPN network identification configuration information is a positive integer M;
wherein M does not exceed 16, alternatively M does not exceed 32, alternatively M does not exceed 64.
In some embodiments, the first information is pre-configured or agreed upon by the protocol, or the first information is configured by the network device.
In some embodiments, the processing unit 410 is specifically configured to:
determining the logic number information corresponding to the network identifier in the third party network identifier configuration information according to the second information; the second information is used for indicating the network identifier in the third party network identifier configuration information to be independently numbered with the network identifier in the PLMN network identifier configuration information and/or the NPN network identifier configuration information.
In some embodiments, the logical numbering of network identifications in the third party network identification configuration information starts from 0 or 1.
In some embodiments, the number of network identifications in the third party network identification configuration information is a positive integer N;
wherein N is not more than 12, alternatively N is not more than 16, alternatively N is not more than 32, alternatively N is not more than 64.
In some embodiments, the second information is pre-configured or agreed upon by the protocol, or the second information is configured by the network device.
In some embodiments, the association between the logical number of the third party network identity and the access control parameter configuration comprises one of:
the logic number of a third party network identifier is associated with a set of access control parameter configurations;
the logic number of the group of third party network identifications is associated with a group of access control parameter configurations;
the logical number of all third party network identifications is associated with a set of access control parameter configurations.
In some embodiments, the association between the logical number of the third party network identity and the system resource configuration comprises one of:
a logic number of a third party network identifier is associated with a set of system resource configurations;
The logic number of the group of third party network identifications is associated with a group of system resource allocation;
the logical number of all third party network identifications is associated with a set of system resource configurations.
In some embodiments, the system resource configuration includes at least one of the following:
random access resource allocation;
bandwidth part BWP resource configuration;
the slice type configuration supported;
band resource allocation;
and (5) configuring the power level.
In some embodiments, the message containing the network routing parameters is terminal uplink dedicated signaling.
In some embodiments, the network routing parameter is represented by a logical number value of a third party network identification; or,
the network routing parameters are jointly represented by network routing parameters defined for PLMN network identification configuration information and/or NPN network identification configuration information with network routing parameters specific to the third party network identification.
In some embodiments, the processing unit may be one or more processors.
It should be understood that the terminal device 400 according to the embodiment of the present application may correspond to the terminal device in the embodiment of the method of the present application, and the foregoing and other operations and/or functions of each unit in the terminal device 400 are respectively for implementing the corresponding flow of the terminal device in the method 200 shown in fig. 2, and are not further described herein for brevity.
Fig. 5 shows a schematic block diagram of a network device 500 according to an embodiment of the present application. As shown in fig. 5, the network device 500 includes:
a communication unit 510, configured to send target information to a terminal device, where the target information is used for the terminal device to determine logic number information corresponding to a network identifier in third party network identifier configuration information configured by a network side;
wherein the logic number information is used for selecting access control parameter configuration and/or system resource configuration associated with the logic number information; and/or the logical numbering information is used to generate messages containing network routing parameters.
In some embodiments, the third party network identification configuration information includes at least one of the following:
public land mobile network PLMN network identification, independent non-public network SNPN network identification, temporary network identification, access control related network identification, first function group identification.
In some embodiments, the first functional group identity is a group identity allowing the terminal to perform a third party authentication through the cell; or, the first function group identifier is a group identifier for allowing the terminal to acquire or update own subscription data through the cell network.
In some embodiments, the first functional group identification includes at least one of the following configuration granularities:
PLMN identification or SNPN identification granularity, closed access group CAG identification granularity, cell granularity, access control related network identification granularity, temporary network identification granularity.
In some embodiments, the target information is used to indicate that the network identifier in the third party network identifier configuration information is uniformly numbered with the network identifier in the PLMN network identifier configuration information and/or NPN network identifier configuration information.
In some embodiments, the numbering of the network identifications in the third party network identification configuration information follows the numbering of the network identifications in the PLMN network identification configuration information and/or the NPN network identification configuration information.
In some embodiments, the total number of network identifications in the third party network identification configuration information and/or the PLMN network identification configuration information and/or the network identifications in the NPN network identification configuration information is a positive integer M;
wherein M does not exceed 16, alternatively M does not exceed 32, alternatively M does not exceed 64.
In some embodiments, the target information is used to indicate that the network identifier in the third party network identifier configuration information is independently numbered with the network identifier in the PLMN network identifier configuration information and/or NPN network identifier configuration information.
In some embodiments, the logical numbering of network identifications in the third party network identification configuration information starts from 0 or 1.
In some embodiments, the number of network identifications in the third party network identification configuration information is a positive integer N;
wherein N is not more than 12, alternatively N is not more than 16, alternatively N is not more than 32, alternatively N is not more than 64.
In some embodiments, the association between the logical number of the third party network identity and the access control parameter configuration comprises one of:
the logic number of a third party network identifier is associated with a set of access control parameter configurations;
the logic number of the group of third party network identifications is associated with a group of access control parameter configurations;
the logical number of all third party network identifications is associated with a set of access control parameter configurations.
In some embodiments, the association between the logical number of the third party network identity and the system resource configuration comprises one of:
a logic number of a third party network identifier is associated with a set of system resource configurations;
the logic number of the group of third party network identifications is associated with a group of system resource allocation;
the logical number of all third party network identifications is associated with a set of system resource configurations.
In some embodiments, the system resource configuration includes at least one of the following:
random access resource allocation;
bandwidth part BWP resource configuration;
the slice type configuration supported;
band resource allocation;
and (5) configuring the power level.
In some embodiments, the message containing the network routing parameters is terminal uplink dedicated signaling.
In some embodiments, the network routing parameter is represented by a logical number value of a third party network identification; or,
the network routing parameters are jointly represented by network routing parameters defined for PLMN network identification configuration information and/or NPN network identification configuration information with network routing parameters specific to the third party network identification.
Alternatively, in some embodiments, the communication unit may be a communication interface or transceiver, or an input/output interface of a communication chip or a system on a chip.
It should be understood that the network device 500 according to the embodiment of the present application may correspond to the network device in the embodiment of the method of the present application, and the foregoing and other operations and/or functions of each unit in the network device 500 are respectively for implementing the corresponding flow of the network device in the method 300 shown in fig. 3, and are not further described herein for brevity.
Fig. 6 is a schematic structural diagram of a communication device 600 provided in an embodiment of the present application. The communication device 600 shown in fig. 6 comprises a processor 610, from which the processor 610 may call and run a computer program to implement the method in the embodiments of the present application.
Optionally, as shown in fig. 6, the communication device 600 may also include a memory 620. Wherein the processor 610 may call and run a computer program from the memory 620 to implement the methods in embodiments of the present application.
The memory 620 may be a separate device from the processor 610 or may be integrated into the processor 610.
Optionally, as shown in fig. 6, the communication device 600 may further include a transceiver 630, and the processor 610 may control the transceiver 630 to communicate with other devices, and in particular, may send information or data to other devices, or receive information or data sent by other devices.
The transceiver 630 may include a transmitter and a receiver, among others. Transceiver 630 may further include antennas, the number of which may be one or more.
Optionally, the communication device 600 may be specifically a network device in the embodiment of the present application, and the communication device 600 may implement a corresponding flow implemented by the network device in each method in the embodiment of the present application, which is not described herein for brevity.
Optionally, the communication device 600 may be specifically a terminal device in the embodiment of the present application, and the communication device 600 may implement a corresponding flow implemented by the terminal device in each method in the embodiment of the present application, which is not described herein for brevity.
Fig. 7 is a schematic structural view of an apparatus of an embodiment of the present application. The apparatus 700 shown in fig. 7 includes a processor 710, and the processor 710 may call and run a computer program from a memory to implement the methods in the embodiments of the present application.
Optionally, as shown in fig. 7, the apparatus 700 may further comprise a memory 720. Wherein the processor 710 may call and run a computer program from the memory 720 to implement the methods in embodiments of the present application.
Wherein the memory 720 may be a separate device from the processor 710 or may be integrated into the processor 710.
Optionally, the apparatus 700 may further comprise an input interface 730. The processor 710 may control the input interface 730 to communicate with other devices or chips, and in particular, may obtain information or data sent by other devices or chips.
Optionally, the apparatus 700 may further comprise an output interface 740. The processor 710 may control the output interface 740 to communicate with other devices or chips, and in particular, may output information or data to other devices or chips.
Optionally, the apparatus may be applied to a network device in the embodiments of the present application, and the apparatus may implement a corresponding flow implemented by the network device in each method in the embodiments of the present application, which is not described herein for brevity.
Optionally, the apparatus may be applied to a terminal device in the embodiment of the present application, and the apparatus may implement a corresponding flow implemented by the terminal device in each method in the embodiment of the present application, which is not described herein for brevity.
Alternatively, the device mentioned in the embodiments of the present application may also be a chip. For example, a system-on-chip or a system-on-chip, etc.
Fig. 8 is a schematic block diagram of a communication system 800 provided in an embodiment of the present application. As shown in fig. 8, the communication system 800 includes a terminal device 810 and a network device 820.
The terminal device 810 may be used to implement the corresponding functions implemented by the terminal device in the above method, and the network device 820 may be used to implement the corresponding functions implemented by the network device in the above method, which are not described herein for brevity.
It should be appreciated that the processor of an embodiment of the present application may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method embodiments may be implemented by integrated logic circuits of hardware in a processor or instructions in software form. The processor may be a general purpose processor, a digital signal processor (Digital Signal Processor, DSP), an application specific integrated circuit (Application Specific Integrated Circuit, ASIC), an off-the-shelf programmable gate array (Field Programmable Gate Array, FPGA) or other programmable logic device, discrete gate or transistor logic device, discrete hardware components. The disclosed methods, steps, and logic blocks in the embodiments of the present application may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of a method disclosed in connection with the embodiments of the present application may be embodied directly in hardware, in a decoded processor, or in a combination of hardware and software modules in a decoded processor. The software modules may be located in a random access memory, flash memory, read only memory, programmable read only memory, or electrically erasable programmable memory, registers, etc. as well known in the art. The storage medium is located in a memory, and the processor reads the information in the memory and, in combination with its hardware, performs the steps of the above method.
It will be appreciated that the memory in embodiments of the present application may be either volatile memory or nonvolatile memory, or may include both volatile and nonvolatile memory. The nonvolatile Memory may be a Read-Only Memory (ROM), a Programmable ROM (PROM), an Erasable PROM (EPROM), an Electrically Erasable EPROM (EEPROM), or a flash Memory. The volatile memory may be random access memory (Random Access Memory, RAM) which acts as an external cache. By way of example, and not limitation, many forms of RAM are available, such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double Data Rate SDRAM (Double Data Rate SDRAM), enhanced SDRAM (ESDRAM), synchronous DRAM (SLDRAM), and Direct RAM (DR RAM). It should be noted that the memory of the systems and methods described herein is intended to comprise, without being limited to, these and any other suitable types of memory.
It should be understood that the above memory is exemplary but not limiting, and for example, the memory in the embodiments of the present application may be Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM), enhanced SDRAM (ESDRAM), synchronous Link DRAM (SLDRAM), direct RAM (DR RAM), and the like. That is, the memory in embodiments of the present application is intended to comprise, without being limited to, these and any other suitable types of memory.
Embodiments of the present application also provide a computer-readable storage medium for storing a computer program.
Optionally, the computer readable storage medium may be applied to a network device in the embodiments of the present application, and the computer program causes a computer to execute a corresponding flow implemented by the network device in each method in the embodiments of the present application, which is not described herein for brevity.
Optionally, the computer readable storage medium may be applied to a terminal device in an embodiment of the present application, and the computer program causes a computer to execute a corresponding procedure implemented by the terminal device in each method of the embodiment of the present application, which is not described herein for brevity.
Embodiments of the present application also provide a computer program product comprising computer program instructions.
Optionally, the computer program product may be applied to a network device in the embodiments of the present application, and the computer program instructions cause the computer to execute corresponding flows implemented by the network device in the methods in the embodiments of the present application, which are not described herein for brevity.
Optionally, the computer program product may be applied to a terminal device in an embodiment of the present application, and the computer program instructions cause the computer to execute a corresponding procedure implemented by the terminal device in each method in the embodiment of the present application, which is not described herein for brevity.
The embodiment of the application also provides a computer program.
Optionally, the computer program may be applied to a network device in the embodiments of the present application, and when the computer program runs on a computer, the computer is caused to execute a corresponding flow implemented by the network device in each method in the embodiments of the present application, which is not described herein for brevity.
Optionally, the computer program may be applied to a terminal device in the embodiments of the present application, and when the computer program runs on a computer, the computer is caused to execute a corresponding flow implemented by the terminal device in each method in the embodiments of the present application, which is not described herein for brevity.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
It will be clear to those skilled in the art that, for convenience and brevity of description, specific working procedures of the above-described systems, apparatuses and units may refer to corresponding procedures in the foregoing method embodiments, and are not repeated herein.
In the several embodiments provided in this application, it should be understood that the disclosed systems, devices, and methods may be implemented in other manners. For example, the apparatus embodiments described above are merely illustrative, e.g., the division of the units is merely a logical function division, and there may be additional divisions when actually implemented, e.g., multiple units or components may be combined or integrated into another system, or some features may be omitted or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or units, which may be in electrical, mechanical or other form.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in each embodiment of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer-readable storage medium. For such understanding, the technical solutions of the present application may be embodied in essence or in a part contributing to the prior art or in the form of a software product stored in a storage medium, including several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to perform all or part of the steps of the methods described in the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (Random Access Memory, RAM), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
The foregoing is merely specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily think about changes or substitutions within the technical scope of the present application, and the changes and substitutions are intended to be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (44)

  1. A method of wireless communication, comprising:
    the terminal equipment determines logic number information corresponding to the network identifier in the third party network identifier configuration information configured by the network side;
    the terminal equipment selects access control parameter configuration and/or system resource configuration associated with the logic number information according to the logic number information; and/or the terminal equipment generates a message containing network routing parameters according to the logic number information.
  2. The method of claim 1, wherein the third party network identification configuration information comprises at least one of:
    public land mobile network PLMN network identification, independent non-public network SNPN network identification, temporary network identification, access control related network identification, first function group identification.
  3. The method of claim 2, wherein the first functional group identity is a group identity allowing a terminal to perform a third party authentication through a cell; or the first function group identifier is a group identifier which allows the terminal to acquire or update the subscription data of the terminal through the cell network.
  4. A method according to claim 2 or 3, wherein the first functional group identification comprises at least one of the following configuration granularities:
    PLMN identification or SNPN identification granularity, closed access group CAG identification granularity, cell granularity, access control related network identification granularity, temporary network identification granularity.
  5. The method according to any one of claims 1 to 4, wherein the determining, by the terminal device, logic number information corresponding to a network identifier in third party network identifier configuration information configured by a network side, includes:
    the terminal equipment determines the logic number information corresponding to the network identifier in the third party network identifier configuration information according to the first information; the first information is used for indicating the network identifier in the third party network identifier configuration information to be numbered uniformly with the network identifier in the PLMN network identifier configuration information and/or the NPN network identifier configuration information.
  6. The method of claim 5, wherein the numbering of the network identifications in the third party network identification configuration information follows the numbering of the network identifications in the PLMN network identification configuration information and/or NPN network identification configuration information.
  7. The method according to claim 5 or 6, wherein the total number of network identifications in the third party network identification configuration information and/or the PLMN network identification configuration information and/or the NPN network identification configuration information is a positive integer M;
    wherein M does not exceed 16, alternatively M does not exceed 32, alternatively M does not exceed 64.
  8. The method of any of claims 5 to 7, wherein the first information is pre-configured or protocol-agreed or the first information is configured by a network device.
  9. The method according to any one of claims 1 to 4, wherein the determining, by the terminal device, logic number information corresponding to a network identifier in third party network identifier configuration information configured by a network side, includes:
    the terminal equipment determines the logic number information corresponding to the network identifier in the third party network identifier configuration information according to the second information; the second information is used for indicating the network identifier in the third party network identifier configuration information to be independently numbered with the network identifier in the PLMN network identifier configuration information and/or the NPN network identifier configuration information.
  10. The method of claim 9, wherein the logical numbering of network identifications in the third party network identification configuration information starts from 0 or 1.
  11. The method according to claim 9 or 10, wherein the number of network identifications in the third party network identification configuration information is a positive integer N;
    wherein N is not more than 12, alternatively N is not more than 16, alternatively N is not more than 32, alternatively N is not more than 64.
  12. The method of any of claims 9 to 11, wherein the second information is pre-configured or protocol agreed, or wherein the second information is configured by a network device.
  13. The method according to any of claims 1 to 12, wherein the association between the logical number of the third party network identity and the access control parameter configuration comprises one of:
    the logic number of a third party network identifier is associated with a set of access control parameter configurations;
    the logic number of the group of third party network identifications is associated with a group of access control parameter configurations;
    the logical number of all third party network identifications is associated with a set of access control parameter configurations.
  14. The method according to any of claims 1 to 13, wherein the association between the logical number of the third party network identity and the system resource allocation comprises one of:
    A logic number of a third party network identifier is associated with a set of system resource configurations;
    the logic number of the group of third party network identifications is associated with a group of system resource allocation;
    the logical number of all third party network identifications is associated with a set of system resource configurations.
  15. The method of any of claims 1 to 14, wherein the system resource configuration comprises at least one of the following configurations:
    random access resource allocation;
    bandwidth part BWP resource configuration;
    the slice type configuration supported;
    band resource allocation;
    and (5) configuring the power level.
  16. The method according to any of claims 1 to 15, wherein the message comprising network routing parameters is a terminal uplink dedicated signaling.
  17. The method according to any one of claim 1 to 16, wherein,
    the network routing parameters are represented by the logic number values of the third party network identifications; or,
    the network routing parameters are jointly represented by network routing parameters defined for PLMN network identification configuration information and/or NPN network identification configuration information and network routing parameters specific to the third party network identification.
  18. A method of wireless communication, comprising:
    The network equipment sends target information to the terminal equipment, wherein the target information is used for the terminal equipment to determine logic number information corresponding to a network identifier in third-party network identifier configuration information configured by a network side;
    wherein, the logic numbering information is used for selecting the access control parameter configuration and/or the system resource configuration associated with the logic numbering information; and/or the logic numbering information is used to generate messages containing network routing parameters.
  19. The method of claim 18, wherein the third party network identification configuration information comprises at least one of:
    public land mobile network PLMN network identification, independent non-public network SNPN network identification, temporary network identification, access control related network identification, first function group identification.
  20. The method of claim 19, wherein the first functional group identity is a group identity that allows a terminal to perform third party authentication through a cell; or the first function group identifier is a group identifier which allows the terminal to acquire or update the subscription data of the terminal through the cell network.
  21. The method of claim 19 or 20, wherein the first functional group identification comprises at least one of the following configuration granularities:
    PLMN identification or SNPN identification granularity, closed access group CAG identification granularity, cell granularity, access control related network identification granularity, temporary network identification granularity.
  22. The method according to any of claims 18 to 21, wherein the target information is used to indicate that the network identity in the third party network identity configuration information is uniformly numbered with the network identity in the PLMN network identity configuration information and/or NPN network identity configuration information.
  23. The method of claim 22, wherein the numbering of the network identifications in the third party network identification configuration information follows the numbering of the network identifications in the PLMN network identification configuration information and/or NPN network identification configuration information.
  24. The method of claim 22 or 23, wherein,
    the total number of network identifications in the third party network identification configuration information and/or the PLMN network identification configuration information and/or the NPN network identification configuration information is a positive integer M;
    wherein M does not exceed 16, alternatively M does not exceed 32, alternatively M does not exceed 64.
  25. The method according to any of claims 18 to 21, wherein the target information is used to indicate that the network identity in the third party network identity configuration information is independently numbered with the network identity in the PLMN network identity configuration information and/or NPN network identity configuration information.
  26. The method of claim 25, wherein the logical numbering of network identifications in the third party network identification configuration information starts from 0 or 1.
  27. The method of claim 25 or 26, wherein the number of network identifications in the third party network identification configuration information is a positive integer N;
    wherein N is not more than 12, alternatively N is not more than 16, alternatively N is not more than 32, alternatively N is not more than 64.
  28. The method according to any of claims 18 to 27, wherein the association between the logical number of the third party network identity and the access control parameter configuration comprises one of:
    the logic number of a third party network identifier is associated with a set of access control parameter configurations;
    the logic number of the group of third party network identifications is associated with a group of access control parameter configurations;
    the logical number of all third party network identifications is associated with a set of access control parameter configurations.
  29. The method of any of claims 18 to 28, wherein the association between the logical number of the third party network identity and the system resource allocation comprises one of:
    a logic number of a third party network identifier is associated with a set of system resource configurations;
    The logic number of the group of third party network identifications is associated with a group of system resource allocation;
    the logical number of all third party network identifications is associated with a set of system resource configurations.
  30. The method of any of claims 18 to 29, wherein the system resource configuration comprises at least one of the following configurations:
    random access resource allocation;
    bandwidth part BWP resource configuration;
    the slice type configuration supported;
    band resource allocation;
    and (5) configuring the power level.
  31. A method according to any one of claims 18 to 30, wherein the message containing network routing parameters is terminal uplink dedicated signalling.
  32. The method according to any one of claim 18 to 31,
    the network routing parameters are represented by the logic number values of the third party network identifications; or,
    the network routing parameters are jointly represented by network routing parameters defined for PLMN network identification configuration information and/or NPN network identification configuration information and network routing parameters specific to the third party network identification.
  33. A terminal device, comprising:
    the processing unit is used for determining logic number information corresponding to the network identifier in the third party network identifier configuration information configured by the network side;
    The processing unit is further used for selecting access control parameter configuration and/or system resource configuration associated with the logic number information according to the logic number information; and/or the terminal equipment generates a message containing network routing parameters according to the logic number information.
  34. A network device, comprising:
    the communication unit is used for sending target information to the terminal equipment, wherein the target information is used for determining logic number information corresponding to the network identifier in the third party network identifier configuration information configured by the network side by the terminal equipment;
    wherein, the logic numbering information is used for selecting the access control parameter configuration and/or the system resource configuration associated with the logic numbering information; and/or the logic numbering information is used to generate messages containing network routing parameters.
  35. A terminal device, comprising: a processor and a memory for storing a computer program, the processor being adapted to invoke and run the computer program stored in the memory, to perform the method of any of claims 1 to 17.
  36. A network device, comprising: a processor and a memory for storing a computer program, the processor being for invoking and running the computer program stored in the memory, performing the method of any of claims 18 to 32.
  37. A chip, comprising: a processor for calling and running a computer program from a memory, causing a device on which the chip is mounted to perform the method of any one of claims 1 to 17.
  38. A chip, comprising: a processor for calling and running a computer program from a memory, causing a device on which the chip is mounted to perform the method of any of claims 18 to 32.
  39. A computer readable storage medium storing a computer program for causing a computer to perform the method of any one of claims 1 to 17.
  40. A computer readable storage medium storing a computer program for causing a computer to perform the method of any one of claims 18 to 32.
  41. A computer program product comprising computer program instructions for causing a computer to perform the method of any one of claims 1 to 17.
  42. A computer program product comprising computer program instructions which cause a computer to perform the method of any of claims 18 to 32.
  43. A computer program, characterized in that the computer program causes a computer to perform the method according to any one of claims 1 to 17.
  44. A computer program, characterized in that the computer program causes a computer to perform the method of any of claims 18 to 32.
CN202180070417.3A 2021-01-13 2021-01-13 Wireless communication method, terminal equipment and network equipment Pending CN116368865A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2021/071564 WO2022151079A1 (en) 2021-01-13 2021-01-13 Wireless communication method, terminal device, and network device

Publications (1)

Publication Number Publication Date
CN116368865A true CN116368865A (en) 2023-06-30

Family

ID=82446707

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202180070417.3A Pending CN116368865A (en) 2021-01-13 2021-01-13 Wireless communication method, terminal equipment and network equipment

Country Status (2)

Country Link
CN (1) CN116368865A (en)
WO (1) WO2022151079A1 (en)

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8825049B2 (en) * 2009-02-26 2014-09-02 Qualcomm Incorporated Methods and systems using unified operator and rat mapping and selection scheme
CN105830394B (en) * 2014-11-27 2019-05-21 华为技术有限公司 Configuration method, system and its Virtual NE and network management system of virtual network strategy
US12022280B2 (en) * 2018-11-14 2024-06-25 Apple Inc. Network selection and service continuity in non-public networks
CN115484659B (en) * 2019-05-06 2024-03-22 腾讯科技(深圳)有限公司 Network access control method, device, computer readable medium and electronic equipment

Also Published As

Publication number Publication date
WO2022151079A1 (en) 2022-07-21

Similar Documents

Publication Publication Date Title
CN113630849A (en) Network slice selection method, wireless access equipment and terminal
CN114364040B (en) Wireless communication method and terminal device
CN112640347B (en) Wireless communication method, terminal equipment and network equipment
CN115669133B (en) Wireless communication method, terminal equipment and network equipment
CN115103393B (en) Physical channel monitoring method and terminal equipment
CN113692033B (en) Information transmission method and equipment
CN116210326A (en) Method for selecting initial bandwidth part BWP, terminal equipment and network equipment
CN115699868B (en) Method for reselecting initial bandwidth part BWP, terminal equipment and network equipment
CN113316151A (en) Communication method, device and equipment
CN113647125B (en) Wireless communication method, terminal device and network device
CN116437403A (en) Wireless communication method, terminal device and network device
CN115428519B (en) Wireless communication method, terminal equipment and network equipment
CN117917175A (en) Connection control method, terminal device and network device
CN116491135A (en) Authorization configuration method, terminal equipment and network equipment
CN116438828A (en) Measurement configuration method, terminal device, network device, chip and storage medium
CN116367269A (en) Wireless communication method, terminal equipment and network equipment
CN116368865A (en) Wireless communication method, terminal equipment and network equipment
CN114501590A (en) Wireless communication method and terminal equipment
CN116250290B (en) Wireless communication method, terminal equipment, first access network equipment and network element
WO2022021165A1 (en) Relay discovery method, and terminal
CN116325937A (en) Wireless communication method, terminal equipment and network equipment
CN112715052B (en) Random access method, terminal equipment and network equipment
CN116349325A (en) Paging method and network node
CN117376889A (en) Auxiliary routing method, terminal equipment and network equipment
CN117479264A (en) Wireless communication method and terminal device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination