CN116546564A - Communication method and device - Google Patents

Communication method and device Download PDF

Info

Publication number
CN116546564A
CN116546564A CN202210095867.4A CN202210095867A CN116546564A CN 116546564 A CN116546564 A CN 116546564A CN 202210095867 A CN202210095867 A CN 202210095867A CN 116546564 A CN116546564 A CN 116546564A
Authority
CN
China
Prior art keywords
event
network element
information
access network
ran
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210095867.4A
Other languages
Chinese (zh)
Inventor
孙海洋
米而科·施拉姆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN202210095867.4A priority Critical patent/CN116546564A/en
Priority to PCT/CN2022/138409 priority patent/WO2023142726A1/en
Publication of CN116546564A publication Critical patent/CN116546564A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/10Flow control between communication endpoints
    • H04W28/12Flow control between communication endpoints using signalling between network elements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/08Reselecting an access point

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the application provides a communication method and device, and relates to the technical field of communication. In the communication method, after the terminal equipment switches the access network element accessed, the execution state of the access network element after switching is determined to be different from the access network element before switching, and first information can be sent to the strategy control network element.

Description

Communication method and device
Technical Field
The embodiment of the application relates to the technical field of communication, in particular to a communication method and device.
Background
Currently, in order to control the transmission rate of the terminal device within the slice, a maximum bit rate is introduced. The maximum bit rate is, for example, a user equipment slice maximum bit rate (user equipment slice maximum bit rate, UE-slice-MBR), wherein a slice may be one of the slices accessed by the terminal device.
However, how to limit the transmission rate of the terminal device in the slice (i.e. control the maximum bit rate of the terminal device in the slice) according to the maximum bit rate, no corresponding solution exists at present.
Disclosure of Invention
The embodiment of the application provides a communication method and a communication device, which are used for providing a mechanism for controlling the maximum bit rate of terminal equipment in a slice.
In a first aspect, embodiments of the present application provide a communication method, where the method may be performed by a first network element, or may be performed by a chip system, where the chip system may implement a function of the first network element. The first network element is, for example, an access network element, a session management network element, or an access and mobility management network element, etc. For convenience of description, the first network element will be described by taking the communication method as an example. The method comprises the following steps: after terminal equipment is switched from a first access network element to a second access network element, determining that an execution state of the second access network element for a first event is different from the first access network element, wherein the first event is that the transmission rate of the terminal equipment in a slice is limited according to a maximum bit rate, and the execution state of the first event comprises execution of the first event or non-execution of the first event; and sending first information, wherein the first information is used for indicating the change of the execution state of the access network element for the first event.
In the embodiment of the present application, in the case that the access network element to which the terminal device is connected is switched, if the first network element determines that the execution state of the first event is changed by the first access network element connected before the terminal device is switched, compared with the execution state of the first event by the second access network element connected after the terminal device is switched, the first network element timely notifies the policy control network element of the first information, which is equivalent to providing a mechanism for determining who executes the first event by the embodiment of the present application, and also providing a mechanism for controlling the maximum bit rate of the terminal device in a slice. In addition, the policy control network element can timely sense the change of the execution state of the access network element accessed by the terminal equipment to the first event, so that the policy control network element is beneficial to making a more reasonable decision about whether to execute the first event.
In a possible implementation manner, determining that the execution state of the second access network element for the first event is different from the first access network element includes: receiving second information from the second access network element, wherein the second information is used for indicating the execution state of the second access network element for the first event; and determining that the execution state of the second access network element for the first event is different from the first access network element according to the second information and the third information, wherein the third information is used for indicating the execution state of the first access network element for the first event.
In this embodiment, a mechanism is provided for determining that the execution state of the second access network element for the first event is different from that of the first access network element, in which the first access network element may receive the second information from the second access network element, and according to the execution state of the second access network element for the first event indicated by the second information, and the execution state of the first access network element for the first event indicated by the third information, thereby determining whether the execution state of the second access network element for the first event is different from that of the first access network element, and since the first access network element does not need to determine the execution state of the second access network element for the first event by itself, the processing capacity of the first network element is not increased excessively.
In one possible embodiment, the method further comprises: the third information is received from the first access network element.
In this embodiment, the first network element may further receive third information from the first access network element, so that the first network element may determine, directly according to the third information, an execution state of the first access network element for the first event, which provides a relatively simple manner of determining the execution state of the first access network element for the first event, and also does not excessively increase the throughput of the first network element.
In one possible embodiment, the method further comprises: determining information of at least one session, wherein the at least one session comprises a session successfully switched to the second access network element by the terminal equipment in the session corresponding to the first access network element side; determining that the second access network element will perform the first event for a slice corresponding to the at least one session.
In this embodiment, if the second access network element accepts the session on the first access network element side, it indicates that the second access network element can execute the first event on the slice corresponding to the session, so after the terminal device switches from the first access network element to the second access network element, the first network element may determine whether the second access network element executes the first event according to the information of the session that is successfully switched, so that the second access network element does not need to determine the execution state of the second access network element for the first event, which may save the processing amount of the second access network element, and may reduce the number of interactions between the second access network element and the first network element.
In one possible embodiment, the method further comprises: and if the execution state of the second access network element for the first event changes, sending fourth information, wherein the fourth information is used for indicating that the execution state of the second access network element for the first event changes.
In this embodiment, once the second access network element senses that the execution state of the second access network element for the first event changes, the policy control network element can be timely notified, so that the policy control network element can timely adjust the execution state of the policy control network element for the first event according to the execution state of the second access network element for the first event.
In one possible implementation, the first event includes: an aggregate bit rate that is intended to be provided by a quality of service stream limited to a session, the quality of service stream comprising a non-guaranteed bit rate quality of service stream and/or a guaranteed bit rate quality of service stream, the session comprising part or all of the session in the slice that is served by the terminal device.
In this embodiment, several ways are provided in which the first event may be performed, e.g. limited to the aggregate bit rate that the terminal device expects to provide in the non-guaranteed bit rate quality of service stream within the slice, and/or limited to the aggregate bit rate that the terminal device expects to provide in the guaranteed bit rate quality of service stream within the slice.
In one possible implementation, not executing the first event includes one of: not supporting execution of the first event; alternatively, execution of the first event is supported, but the first event is not carried out; alternatively, the first event may not be accurately performed.
In this embodiment, several possibilities are provided for not executing the first event, for example, an access network element is described, which does not execute the first event, e.g. the access network element does not have the capability to execute the first event due to functional limitations, or the access network element has the capability to execute the first event, but chooses not to execute the first event.
In a second aspect, embodiments of the present application provide a communication method, where the method may be performed by a policy control network element, or may be performed by a chip system, where the chip system may implement the functions of the policy control network element. For convenience of description, the method is described below by taking a policy control network element as an example. The method comprises the following steps: acquiring first information, wherein the first information is used for indicating an execution state of an access network element to change a first event, the first event is limiting the transmission rate of terminal equipment in a first slice according to a maximum bit rate, and the execution state of the first event comprises executing the first event or not executing the first event; and determining the execution state of the strategy control network element for the first event according to the first information.
In one possible embodiment, the method further comprises: determining information of at least one session, wherein the at least one session comprises a session which is successfully switched to a second access network element in a session corresponding to a first access network element side by the terminal equipment; determining that the second access network element will perform the first event for a slice corresponding to the at least one session.
In one possible implementation, obtaining the first information includes: acquiring first information, including: receiving second information from a session management network element or a second access network element, wherein the second access network element is an access network element switched by the terminal equipment; and determining the first information according to the second information and the third information, wherein the third information indicates an execution state of a first access network element for the first event, and the first access network element is the access network element before the terminal equipment is switched.
In one possible embodiment, the method further comprises: third information is received from the first access network element, the third information indicating an execution state of the first access network element for the first event.
In one possible implementation manner, determining, according to the first information, an execution state of the policy control network element for the first event includes: if the first information further indicates that a second access network element executes the first event, determining that the policy control network element does not execute the first event, wherein the second access network element is an access network element after the terminal equipment is switched; and if the first information further indicates that the second access network element does not execute the first event, determining that the policy control network element executes the first event, wherein the second access network element is the access network element after the terminal equipment is switched.
In one possible embodiment, the method further comprises: receiving fourth information, where the fourth information is used to indicate that a second access network element changes an execution state of the first event, where the second access network element is an access network element after the terminal device is switched; and determining the execution state of the strategy control network element for the first event according to the fourth information.
In one possible embodiment, the method further comprises: the method further comprises the steps of: adjusting the policy and charging control rule of the session corresponding to the terminal equipment in the slice; or adjusting the aggregation maximum bit rate of the session corresponding to the terminal equipment in the slice.
In one possible implementation, the first event includes: an aggregate bit rate that is intended to be provided by a quality of service stream limited to a session, the quality of service stream comprising a non-guaranteed bit rate quality of service stream and/or a guaranteed bit rate quality of service stream, the session comprising part or all of the session in the slice that is served by the terminal device.
In a third aspect, an embodiment of the present application provides a communication method, where the method may be performed by an access network element, or performed by a chip system, where the chip system may implement a function of the access network element. For ease of description, the following description will take an access network element as an example. The method comprises the following steps: and after the terminal equipment is switched to the access network element, sending second information, wherein the second information is used for indicating the execution state of the access network element for a first event, the first event is limiting the transmission rate of the terminal equipment in a slice according to the maximum bit rate, and the execution state of the first event comprises executing or not executing the first event.
In the embodiment of the application, when determining that the terminal device is switched to the access network element, the access network element may send second information to the session management network element, where the second information indicates an execution state of the access network element for the first event, so that the session management network element determines the execution state of the access network element for the first event.
In one possible embodiment, the method further comprises: and determining the second information.
In one possible embodiment, the slice comprises a slice having a maximum bit rate. A slice with the maximum bit rate may be understood as a slice that needs to be executed with the first event.
In one possible embodiment, the method further comprises: and if the execution state of the access network element for the first event changes, sending fourth information, wherein the fourth information is used for indicating that the execution state of the access network element for the first event changes.
In a fourth aspect, embodiments of the present application provide a communication method, where the method may be performed by a second network element, or may be performed by a chip system, where the chip system may implement the functions of the first network element. The second network element is, for example, an access network element, a session management network element, or an access and mobility management network element, etc. For convenience of description, the second network element is described below as an example. The method comprises the following steps: determining that an execution state of an access network element for a first event changes, wherein the first event is limiting the transmission rate of the terminal equipment in a slice according to a maximum bit rate, and the execution state of the access network element for the first event comprises executing the first event or not executing the first event; and sending fourth information, wherein the fourth information is used for indicating that the execution state of the access network element for the first event is changed.
In the embodiment of the application, once the access network element senses that the execution state of the access network element for the first event changes, the access network element can inform the policy control network element, so that the policy control network element can timely adjust the execution state of the access network element for the first event, and a mechanism for executing the first event is provided.
In a fifth aspect, embodiments of the present application provide a communication method, where the method may be performed by a policy control network element, or a chip system, where the chip system may implement a function of the policy control network element. For ease of description, the following description will take policy control network elements as examples. The method comprises the following steps: receiving fourth information, wherein the fourth information is used for indicating that an execution state of an access network element changes for a first event, the first event is that the transmission rate of terminal equipment in a slice is limited according to the maximum bit rate, and the execution state of the first event comprises execution or non-execution of the first event; and determining the execution state of the strategy control network element for the first event according to the fourth information.
In a sixth aspect, embodiments of the present application provide a communication method, where the method may be performed by a third network element, or may be performed by a chip system, where the chip system may implement a function of the third network element. The third network element is, for example, an access network element, a session management network element, or an access and mobility management network element, etc. The method comprises the following steps: acquiring capability information of an access network element, wherein the capability information is used for indicating whether the access network element can execute a first event, and the first event is limiting the transmission rate of terminal equipment in a slice according to the maximum bit rate; and sending the capability information. The slice is a slice accessed by the terminal equipment through the access network element.
In the embodiment of the application, the policy control network element can directly determine whether the access network element can execute the first event according to the capability information of the access network element, and further determine whether the policy control network element executes the first event in time, so that a mechanism for executing the first event is provided. And, with the RAN as granularity, reporting whether the RAN can execute the first event, without reporting whether the RAN can execute the first event for a single slice, relatively reduces the amount of data transmission.
In one possible embodiment, the method further comprises: and determining that the terminal equipment is switched to the access network element.
In this embodiment, the capability information of the access network element may be reported to the policy control network element under the condition that it is determined that the terminal device is switched to the access network element.
In a possible implementation, the capability information comprises an identification of the access network element.
In a seventh aspect, embodiments of the present application provide a communication method, where the method may be performed by a policy control network element, or may be performed by a chip system, where the chip system may implement a function of the policy control network element. The method comprises the following steps: receiving capability information of an access network element, wherein the capability information is used for indicating whether the access network element can execute a first event, and the first event is limiting the transmission rate of terminal equipment in a slice according to the maximum bit rate; and determining the execution state of the strategy control network element for the first event according to the capability information.
In a possible implementation, the capability information comprises an identification of the access network element.
In an eighth aspect, embodiments of the present application provide a communication apparatus, which may be the first network element in the first aspect, or an electronic device (for example, a chip system) configured in the first network element, or a larger device including the first network element. The first network element comprises corresponding means (means) or modules for performing the above described first aspect or any of the alternative embodiments. For example, the communication device includes a processing module (sometimes also referred to as a processing unit), and a transceiver module (sometimes also referred to as a transceiver unit).
For example, a processing module is configured to determine, after a terminal device is handed over from a first access network element to a second access network element, that an execution state of the second access network element for a first event is different from the first access network element, where the first event is that a transmission rate of the terminal device in a slice is limited according to a maximum bit rate, and the execution state for the first event includes executing the first event or not executing the first event; and the receiving and transmitting module is used for transmitting first information, and the first information is used for indicating the access network element to change the execution state of the first event.
In an alternative embodiment, the communication device comprises a memory unit, the processing unit being capable of being coupled to the memory unit and executing programs or instructions in the memory unit, enabling the communication device to perform the functions of the first network element described above.
In a ninth aspect, embodiments of the present application provide a communications apparatus that may be a policy control network element in the second aspect, or an electronic device (e.g. a chip system) configured in the policy control network element, or a larger device including the policy control network element. The policy control network element comprises corresponding means (means) or modules for performing the above-described second aspect or any of the alternative embodiments. For example, the communication device includes a processing module (sometimes also referred to as a processing unit), and a transceiver module (sometimes also referred to as a transceiver unit).
For example, a transceiver module, configured to obtain first information, where the first information is used to indicate an access network element to change an execution state of a first event, where the first event is a transmission rate of limiting terminal equipment in a slice according to a maximum bit rate, and the execution state of the first event includes executing the first event or not executing the first event; and the processing module is used for determining the execution state of the strategy control network element for the first event according to the first information.
In an alternative embodiment, the communication device comprises a memory unit, the processing unit being capable of being coupled to the memory unit and executing programs or instructions in the memory unit, enabling the communication device to perform the functions of the first network element described above.
In a tenth aspect, embodiments of the present application provide a communications apparatus that may be the second network element in the third aspect, or an electronic device (e.g. a chip system) configured in an access network element, or a larger device including the access network element. The access network element comprises corresponding means (means) or modules for performing the above third aspect or any of the alternative embodiments. For example, the communication device includes a transceiver module (sometimes also referred to as a transceiver unit).
For example, the transceiver is configured to send second information after the terminal device is switched to the access network element, where the second information is used to indicate an execution state of the access network element for the first event, where the first event is that a transmission rate of the terminal device in a slice is limited according to a maximum bit rate, and the execution state for the first event includes executing the first event or not executing the first event.
Optionally, the communication device further comprises a processing module (sometimes also referred to as a processing unit) for determining the second information.
In an eleventh aspect, embodiments of the present application provide a communication apparatus, which may be the second network element in the third aspect, or an electronic device (for example, a chip system) configured in the second network element, or a larger device including the second network element. The second network element comprises corresponding means (means) or modules for performing the above third aspect or any of the alternative embodiments. For example, the communication device includes a processing module (sometimes also referred to as a processing unit), and a transceiver module (sometimes also referred to as a transceiver unit).
For example, a processing module is configured to determine that an execution state of an access network element for a first event changes, where the first event is limiting a transmission rate of the terminal device in a slice according to a maximum bit rate, and the execution state of the access network element for the first event includes executing the first event or not executing the first event; and the receiving and transmitting module is used for transmitting fourth information to the strategy control network element, wherein the fourth information is used for indicating that the execution state of the access network element for the first event is changed.
In an alternative embodiment, the communication device comprises a memory unit, the processing unit being capable of being coupled to the memory unit and executing programs or instructions in the memory unit, enabling the communication device to perform the functions of the first network element described above.
In a twelfth aspect, embodiments of the present application provide a communications apparatus that may be a policy control network element in the fourth aspect, or an electronic device (e.g. a chip system) configured in the policy control network element, or a larger device including the policy control network element. The policy control network element comprises corresponding means (means) or modules for performing the above fourth aspect or any of the alternative embodiments. For example, the communication device includes a processing module (sometimes also referred to as a processing unit), and a transceiver module (sometimes also referred to as a transceiver unit).
For example, a transceiver module, configured to receive fourth information, where the fourth information is used to indicate that an access network element changes an execution state of a first event, where the first event is that a transmission rate of a terminal device in a slice is limited according to a maximum bit rate, and the execution state of the first event includes executing the first event or not executing the first event; and the processing module is used for determining the execution state of the strategy control network element for the first event according to the fourth information.
In an alternative embodiment, the communication device comprises a memory unit, the processing unit being capable of being coupled to the memory unit and executing programs or instructions in the memory unit, enabling the communication device to perform the functions of the first network element described above.
In a thirteenth aspect, an embodiment of the present application provides a communications apparatus that may be the third network element in the fifth aspect, or an electronic device (e.g. a chip system) configured in the third network element, or a larger device including the third network element. The third network element comprises corresponding means (means) or modules for performing the above fifth aspect or any of the alternative embodiments. For example, the communication device includes a transceiver module (sometimes also referred to as a transceiver unit). Optionally, the communication device further comprises a processing module (sometimes also referred to as a processing unit).
For example, a transceiver module is configured to obtain capability information of an access network element, where the capability information is used to indicate whether the access network element can execute a first event, where the first event is to limit a transmission rate of a terminal device in a slice according to a maximum bit rate, and send the capability information. Optionally, the processing module is configured to determine that the terminal device is switched to the access network element.
In a fourteenth aspect, embodiments of the present application provide a communications apparatus that may be a policy control network element in the sixth aspect, or an electronic device (e.g. a chip system) configured in the policy control network element, or a larger device including the policy control network element. The policy control network element comprises corresponding means (means) or modules for performing the above-mentioned sixth aspect or any of the alternative embodiments. For example, the communication device includes a transceiver module (sometimes also referred to as a transceiver unit). Optionally, the communication device further comprises a processing module (sometimes also referred to as a processing unit).
For example, a transceiver module, configured to receive capability information of an access network element, where the capability information is used to indicate whether the access network element can execute a first event, where the first event is limiting a transmission rate of a terminal device in a slice according to a maximum bit rate; and the processing module is used for determining the execution state of the strategy control network element for the first event according to the capability information.
In a fifteenth aspect, embodiments of the present application provide a communication apparatus, including: a processor and a memory; the memory is for storing one or more computer programs, the one or more computer programs comprising computer-executable instructions that, when executed by the communications apparatus, cause the communications apparatus to perform the method of any of the first, second, third, fourth, fifth, or sixth aspects.
Optionally, the communication device further comprises other components, such as an antenna, an input-output module, an interface, etc. These components may be hardware, software, or a combination of software and hardware.
In a sixteenth aspect, embodiments of the present application provide a chip system, comprising: a processor and an interface. Wherein the processor is configured to invoke and execute instructions from the interface, which when executed by the processor, implement the method of any of the first, second, third or fourth aspects above.
A seventeenth aspect provides a computer readable storage medium storing a computer program or instructions which, when executed, performs the method of any of the first, second, third, fourth, fifth, sixth or seventh aspects above.
An eighteenth aspect provides a computer program product comprising instructions which, when run on a computer, implement the method of any of the first, second, third, fourth, fifth, sixth or seventh aspects above.
Regarding the advantages of the second to eighteenth aspects, the advantages discussed with reference to the first aspect are not listed here.
Drawings
Fig. 1A, fig. 1B, fig. 2A, fig. 2B, fig. 3A and fig. 3B are schematic diagrams of several application scenarios applicable in the embodiments of the present application;
fig. 4 is a schematic flow chart of a communication method according to an embodiment of the present application;
fig. 5 is a flow chart of another communication method according to an embodiment of the present application;
fig. 6 is a schematic flow chart of a first RAN sending third information to a second RAN according to an embodiment of the present application;
fig. 7 is a flow chart of still another communication method according to an embodiment of the present application;
fig. 8 is a flow chart of still another communication method according to an embodiment of the present application;
fig. 9 is a flow chart of still another communication method according to an embodiment of the present application;
fig. 10 is a flow chart of still another communication method according to an embodiment of the present application;
fig. 11 is a flow chart of still another communication method according to an embodiment of the present application;
fig. 12 is a flow chart of still another communication method according to an embodiment of the present application;
fig. 13 is a schematic structural diagram of a communication device according to an embodiment of the present application;
Fig. 14 is a schematic structural diagram of still another communication device according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application more apparent, the embodiments of the present application will be described in further detail with reference to the accompanying drawings.
In the following, some terms in the embodiments of the present application are explained for easy understanding by those skilled in the art.
1. The terminal device in the embodiment of the present application is a device with a wireless transceiver function, and may be a fixed device, a mobile device, a handheld device, a wearable device, a vehicle-mounted device, or a wireless apparatus (for example, a communication module or a chip system) built in the above device. The terminal device is used for connecting people, objects, machines and the like, and can be widely used in various scenes, including but not limited to the following scenes: cellular communication, device-to-device (D2D), vehicle-to-everything (vehicle to everything, V2X), machine-to-machine/machine-to-machine-type communications, M2M/MTC), internet of things (internet of things, ioT), virtual Reality (VR), augmented reality (augmented reality, AR), industrial control (industrial control), unmanned driving (self driving), remote medical (remote media), smart grid (smart grid), smart furniture, smart office, smart wear, smart transportation, smart city (smart city), drone, robot, and other end devices. The terminal device may sometimes be referred to as a User Equipment (UE), a terminal, an access station, a UE station, a remote station, a wireless communication device, or a user equipment, etc., and for convenience of description, the UE will be described in the embodiments of the present application.
The network device in the embodiments of the present application includes, for example, an access network element (or referred to as an access network device), and/or a core network element (or referred to as a core network device).
2. The access network element in the embodiment of the present application is a device with a wireless transceiver function, and is configured to communicate with the terminal device. The access network elements include, but are not limited to, base stations (BTS, node B, eNodeB/eNB, or gndeb/gNB) in the above communication system, transceiver points (t (R) ANsmission reception point, TRP), base stations for subsequent evolution of 3GPP, access nodes in a wireless fidelity (wireless fidelity, wiFi) system, wireless relay nodes, wireless backhaul nodes, and the like. The base station may be: macro base station, micro base station, pico base station, small station, relay station, etc. Multiple base stations may support networks of the same access technology as mentioned above, or may support networks of different access technologies as mentioned above. A base station may comprise one or more co-sited or non-co-sited transmission reception points. The network devices may also be wireless controllers, centralized Units (CUs), also referred to as aggregation units, and/or Distributed Units (DUs) in the context of a cloud wireless access network (cloud radio access network, C (R) AN). The network device may also be a server, a wearable device, or an in-vehicle device, etc. For example, the network device in the vehicle-to-everything (vehicle to everything, V2X) technology may be a Road Side Unit (RSU). An access network device will be described below taking a base station as an example. The plurality of network devices in the communication system may be the same type of base station or different types of base stations. The base station may communicate with the terminal device or may communicate with the terminal device through the relay station. A terminal device may communicate with multiple base stations in different access technologies.
The core network element is used for realizing at least one of functions such as mobile management, data processing, session management, policy and charging. The names of devices implementing the core network function in the systems of different access technologies may be different, and the embodiments of the present application are not limited to this. Taking a 5G system as an example, the core network element includes: access and mobility management functions (access and mobility management function, AMF), session management functions (session management function, SMF), PCF or user plane functions (user plane function, UPF), and the like.
In the embodiment of the present application, the means for implementing the function of the network device may be the network device, or may be a means capable of supporting the network device to implement the function, for example, a chip system, and the apparatus may be installed in the network device. In the technical solution provided in the embodiments of the present application, the device for implementing the function of the network device is exemplified by the network device, and the technical solution provided in the embodiments of the present application is described.
3. The network element in the embodiment of the present application may be a single device, or may also be an apparatus integrated with multiple devices. The network elements shown in the embodiments of the present application may also be logic concepts, for example, be software modules, or be network functions corresponding to services provided by each network element, where a network function may be understood as a virtualized function under a virtualized implementation, and may also be understood as a network function that provides services under a virtualized network, for example, a session management SMF mainly responsible for managing sessions exclusively in a 5G core network, which embodiments of the present application are not limited in particular.
4. In the embodiment of the present application, the network slice (network slice) may be simply referred to as a slice, which is a virtual out of a plurality of end-to-end networks based on one general hardware through a slicing technology. In other words, slicing may be understood as a logical network with specific network characteristics divided in the communication network of the operator. One network slice may serve one or more traffic types, such as enhanced mobile broadband (enhanced mobile broadband, emmbb) and mass machine type communications (massive machine type of communication, mctc), among others. Network slices can also be classified into various types, e.g., eMBB type, emtc type, and fixed wireless access (fixed wireless access, FWA), etc.
5. The network slice selection assistance information (single network slice selection assistance information, S-NSSAI) in embodiments of the present application is used to identify a network slice. One S-NSSAI may be associated with one or more network slice instances, and one network slice instance may be associated with one or more S-NSSAIs. For example, ueMBB slice 1, ueMBB slice 2, FWA slice 1 are all services for eMBB type traffic, and their S-NSSAI values are all 0x01000000.
6. The UE-slice-MBR of embodiments of the present application limits the aggregate bit rate that is expected to be provided for all quality of service flows for a session. The session includes some or all of the sessions in a slice that serve the UE, which may also be referred to as including the corresponding session of the UE within the slice. Optionally, the session is a session with an active user plane (have an active user plane). UE-slice-MBR refers to the maximum bit rate of a single UE within a slice, which in turn may be understood as AMBR of a single UE within a single slice, the slice being one or more of the slices that the UE is currently accessing. Wherein the quality of service flows comprise guaranteed bit rate quality of service flows (guranteed bit rate quality of service, GBR Qos flows) and/or non-guaranteed bit rate quality of service flows (non-guranteed bit rate quality of service, non-GBR Qos flows), wherein a session may correspond to one or more GBR Qos flows, and may also correspond to one or more non-GBR Qos flows.
As an example, the UE-slice-MBR may include parameters such as per-UE downlink throughput (downlink throughput per UE) and/or per-UE uplink throughput (uplink throughput per UE). Each UE downlink throughput includes parameters such as each UE downlink guaranteed throughput (guaranteed down throughput per UE) and/or maximum downlink throughput (maximum downlink throughput); each UE uplink throughput includes parameters such as each UE uplink guaranteed throughput (guaranteed uplink throughput per UE) and/or maximum uplink throughput (maximum uplink throughput). The following describes, taking table 1 as an example, the downlink throughput per UE and the uplink throughput per UE.
TABLE 1
It should be noted that UE-slice-MBR is relative to a certain UE in a certain slice, and UE-slice-MBR of the same UE in different slices may be the same or different. Wherein, the two UE-slice-MBRs are the same, which means that parameters included in the UE-slice-MBRs in different slices of the two UEs are the same, and values of the corresponding parameters are also the same; the two UE-slice-MBRs being different means that the information items included in the two UE-slice-MBRs are different and/or the values corresponding to at least one information item are different. The parameters include, for example, one or more of the downlink guaranteed throughput, the maximum downlink throughput, the uplink guaranteed throughput, or the maximum uplink throughput of each UE shown in table 1.
7. The first event in the embodiment of the present application refers to an event that limits the transmission rate of the UE within the slice according to the UE-slice-MBR. The first event can also be described simply as an event that controls or limits the UE-slice-MBR of the UE within the slice. If the slice is a slice, the first event includes an event that limits the transmission rate of the UE within the slice according to the UE-slice-MBR. If the slice is a plurality of slices, the first event includes an event that limits the transmission rate of the UE within the plurality of slices according to the UE-slice-MBR. Optionally, if the UE-slice-MBR corresponding to each of the plurality of slices is different, the first event includes an event of limiting a transmission rate of the terminal device within the corresponding slice according to the UE-slice-MBR corresponding to each of the plurality of slices. For example, the slices include a slice 1, a slice 2 and a slice 3, the UE-slice-MBR corresponding to the slice 1 is a first UE-slice-MBR, the UE-slice-MBR corresponding to the slice 2 is a second UE-slice-MBR, the UE-slice-MBR corresponding to the slice 3 is a third UE-slice-MBR, and then the first event includes an event of limiting the transmission rate of the UE in the slice 1 according to the first UE-slice-MBR, an event of limiting the transmission rate of the UE in the slice 2 according to the second UE-slice-MBR, and an event of limiting the transmission rate of the UE in the slice 3 according to the third UE-slice-MBR.
8. In this embodiment of the present application, the slice corresponding to the first event belongs to some or all of the slices accessed by the UE. The slice includes a slice in which a first event needs to be performed. Wherein some or all of the slices accessed by the UE need to be executed with the first event. That is, on the basis that a slice needs to be subjected to the first event, it is considered for which network element the first event is performed for that slice. The Slice that needs to be executed with the first event includes a Slice with a corresponding UE-Slice-MBR. In other words, some slices that the UE has accessed do not have the UE-Slice-MBR, i.e., it is not necessary to consider whether the first event is performed on that Slice.
Alternatively, the Slice in which the first event needs to be performed may be determined by the RAN, for example, the AMF sends to the RAN, S-nsai of the Slice in which the first event needs to be performed, and UE-Slice-MBR corresponding to the Slice, and the RAN may thereby determine the Slice in which the first event needs to be performed.
9. In this embodiment, the execution state of a network element for the first event may indicate whether the network element executes the first event, for example, the execution state of a network element for the first event includes executing the first event or not executing the first event. The network element is, for example, an access network element or a policy control network element. Alternatively, a network element may not perform the first event, which may include the network element not supporting (not supported) the first event, or the network element supporting the first event but not performing (not effective) the first event, or the network element may not accurately perform the first event (e.g., may generally be accurately performed when the network element is an access network element, and in some cases, may not be guaranteed to accurately perform), which may also be described as not effective. Or it may be understood that a network element does not perform the first event because the network element does not support performing the first event, or the network element supports performing the first event but does not perform the first event, or the network element cannot accurately perform the first event, etc.
If the slice corresponding to the first event is a slice, i.e. the first event includes limiting the transmission rate of the UE within the slice according to the UE-slice-MBR. Executing the first event by a network element may be understood that the network element limits the transmission rate of the UE in the slice according to the UE-slice-MBR, in other words, the network element considers the UE-slice-MBR when controlling the transmission rate of the UE in the slice; the network element not performing the first event may be understood that the network element may not limit the transmission rate of the UE in the slice according to the UE-slice-MBR, in other words, the network element may not consider the UE-slice-MBR when controlling the transmission rate of the UE in the slice.
Alternatively, if the slice includes a plurality of slices, the first event includes limiting the transmission rate of the UE within the plurality of slices, respectively, according to the UE-slice-MBR. The first event is executed by a network element, which is understood to respectively limit the transmission rate of the UE in the plurality of slices according to the UE-slice-MBR, in other words, the network element considers the UE-slice-MBR when controlling the transmission rate of the UE in any one of the plurality of slices. It should be noted that, if the UE-slice-MBR corresponding to each of the plurality of slices is different, the network element may consider the UE-slice-MBR corresponding to one of the plurality of slices when controlling the transmission rate of the UE in the one slice. It is understood that a network element not performing the first event does not limit the UE transmission rate in any of the plurality of slices according to the UE-slice-MBR, in other words, the network element does not consider the UE-slice-MBR when controlling the UE transmission rate in any of the plurality of slices.
Alternatively, the manner in which the first event is performed by different network elements may be the same or different. For example, one way for the access network element to perform the first event is to limit the aggregate bit rate that the UE expects to provide in GBR QoS flows for the session corresponding to the slice, and the aggregate bit rate that the UE expects to provide in non-GBR QoS flows for the session corresponding to the slice. For another example, one way for the policy control network element to perform the first event is to limit the GBR that the UE expects to provide in the GBR traffic in the session to which the slice corresponds. The session corresponding to the slice by the UE may be understood as a session for providing services to the UE in the slice, and the session corresponding to the slice by the UE may be one session or multiple sessions under the slice.
In the embodiments of the present application, the number of nouns, unless otherwise indicated, means "a singular noun or a plural noun", i.e. "one or more". "at least one" means one or more, and "a plurality" means two or more. "and/or", describes an association relationship of an association object, and indicates that there may be three relationships, for example, a and/or B, and may indicate: a alone, a and B together, and B alone, wherein a, B may be singular or plural. The character "/" generally indicates that the context-dependent object is an "or" relationship. For example, A/B, means: a or B. "at least one of" or the like means any combination of these items, including any combination of single item(s) or plural items(s). For example, at least one (one) of a, b, or c, represents: a, b, c, a and b, a and c, b and c, or a and b and c, wherein a, b, c may be single or plural.
The 5G communication system architecture is divided into an access network and a core network. The access network is used to implement radio access related functions and includes third generation partnership project (3rd generation partnership project,3GPP) access networks and non-3 GPP access networks. The core network is connected with the access network and is used for realizing functions related to user control and management.
Please refer to fig. 1A, which is a schematic diagram of a network architecture, such as a service architecture of a 5G network, and a non-roaming network architecture, according to an embodiment of the present application. The 5G network includes (R) AN, UPF, AMF, SMF, authentication server functions (authentication server function, AUSF), network slice selection functions (network slice selection function, NSSF), network opening functions (network exposure function, NEF), network function storage functions (network exposure function Repository Function, NRF), policy control functions (policy control function, PCF), unified data management (unified data management, UDM), unified data store (unified data repository, UDR), application functions (application function, AF), or billing functions (charging function, CHF), etc. It should be noted that fig. 1A is only an example of some network elements or entities in a 5G network, and the 5G network may further include some network elements or entities not illustrated in fig. 1A, such as a network data analysis function (network data analytics function, NWDAF), which is not limited in this embodiment of the present application.
As shown in fig. 1A, the UE accesses the 5G network through the (R) AN, and the UE communicates with the AMF through AN N1 interface (abbreviated as N1); (R) the AN communicates with the AMF through AN N2 interface (N2 for short); (R) the AN communicates with the UPF via AN N3 interface (N3 for short); the SMF communicates with the UPF through an N4 interface (abbreviated as N4), and the UPF accesses a Data Network (DN) through an N6 interface (abbreviated as N6). In addition, the control plane functions such as AUSF, AMF, SMF, NSSF, NEF, NRF, PCF, UDM, UDR, CHF and AF shown in fig. 1A interact with each other by using a service interface. For example, the server interface provided by the AUSF is Nausf; the AMF provides a service interface as Namf; the SMF provides a service interface as Nsmf; the NSSF provides a service interface for the outside as Nnssf; the NEF provides a service interface for the outside as Nnef; the service interface externally provided by the NRF is Nnrf; the PCF provides a service interface for the outside as an Npcf; the service interface externally provided by the UDM is Nudm; the service interface externally provided by the UDR is Nudr; the service interface provided by CHF is Nchf; the service interface provided by the AF is Naf. The relevant functional descriptions and interface descriptions may refer to the 5G system architecture (5G system architecture) diagram in the 23501 standard, which is not listed here.
Please refer to fig. 1B, which is a schematic diagram of another network architecture applied in the embodiments of the present application, wherein the network architecture is a non-roaming network architecture. In this network architecture, network elements such as NSSF, AUSF, UDM, UE, (R) AN, PCF, and SMF can communicate with the AMF. The AUSF can also communicate with UDM, UDM can also communicate with SMF, and SMF can communicate with UPF and PCF in addition to AMF and UDM. The PCF is also capable of communicating with AF and NEF. The NEF can also communicate with the AF. The UPF is able to communicate with the (R) AN and DN. In fig. 1B, "Nxx" between two network elements represents an interface between the two network elements. For example, N22 represents an interface between NSSF and AMF, N12 represents an interface between AUSF and AMF, N8 represents an interface between UDM and AMF, and so on.
Please refer to fig. 2A, which is a schematic diagram of another network architecture, such as a 5G network server architecture, according to an embodiment of the present application. And, the network architecture is a roaming network architecture, for example, a roaming scenario of Local Breakout (LBO). The 5G network includes a home public land mobile network (home public land mobile network, HPLMN) and a visited public land mobile network (visited public land mobile network, VPLMN). The HPLMN is the home network of the UE and the VPLMN is the roaming network of the UE. In this scenario, traffic needs to be offloaded at the VPLMN, i.e. DN at the VPLMN. Wherein the VPLMN and the HPLMN communicate with a home security edge protection agent (home security edge protection proxy, hSEPP) through a visited security edge protection agent (visited security edge protection proxy, vSEPP).
As shown in fig. 2A, in VPLMN, UE accesses to a 5G network through (R) AN, and UE communicates with AMF through AN N1 interface (abbreviated as N1); (R) the AN network element communicates with the AMF through AN N2 interface (N2 for short); (R) the AN network element communicates with the UPF through AN N3 interface (N3 for short); the SMF communicates with the UPF through an N4 interface (abbreviated as N4), and the UPF accesses the DN through an N6 interface (abbreviated as N6). In addition, the control plane functions such as NSSF, NEF, AMF, SMF, NRF, PCF of the VPLMN or AF shown in fig. 2A interact with each other using a service interface. For example, the external service interface provided by the AMF is Namf; the SMF provides a service interface as Nsmf; the NSSF provides a service interface for the outside as Nnssf; the NEF provides a service interface for the outside as Nnef; the service interface externally provided by the NRF is Nnrf; the PCF provides a service interface for the outside as an Npcf; the service interface provided by the AF is Naf. The control plane functions of the HPLMN UDM, AUSF, PCF, NRF, NSSF, or NEF, etc. shown in fig. 2A also interact with the service interface. For example, the server interface provided by the AUSF is Nausf; the service interface provided by the UDM is Nudm.
Referring to fig. 2B, a schematic diagram of another network architecture applied in the embodiments of the present application is shown, and the network architecture is a roaming network architecture, for example, a roaming scenario of LBO. The 5G network includes an HPLMN and a VPLMN. In this network architecture NSSF, UE, (R) AN, SMF within the VPLMN, and AUSF, UDM within the HPLMN can all communicate with AMF within the VPLMN. The SMF within the VPLMN is also able to communicate with the UPF, PCF (also called vcpcf) within the VPLMN and UDM within the HPLMN. The PCF within the VPLMN is also able to communicate with the AF within the VPLMN and the PCF (also referred to as the hPCF) within the HPLMN. The UPF within the VPLMN is also able to communicate with the (R) AN and DN within the VPLMN. In fig. 2B, "Nxx" between two network elements represents the interface between the two network elements.
Please refer to fig. 3A, which is a schematic diagram of another network architecture, such as a 5G network server architecture, according to an embodiment of the present application. The network architecture is a roaming network architecture, such as a roaming scenario of Home Routing (HR). The 5G network includes an HPLMN and a VPLMN, the HPLMN being a home network of the UE, the VPLMN being a roaming network of the UE, the VPLMN and the HPLMN communicating through vSEPP and hSEPP. Unlike the network architecture shown in fig. 2A, in the scenario shown in fig. 3A, traffic needs to be offloaded at the HPLMN, i.e., DN at the HPLMN.
As shown in fig. 3A, in the VPLMN, the UE accesses the 5G network through the (R) AN network element, and the UE communicates with the AMF through AN N1 interface (abbreviated as N1); (R) the AN network element communicates with the AMF through AN N2 interface (N2 for short); (R) the AN network element communicates with the UPF through AN N3 interface (N3 for short); the SMF communicates with the UPF through an N4 interface (N4 for short). In the HPLMN, UPF accesses DN through N6 interface (N6 for short); the UPF communicates with the SMF via an N4 interface (N4 for short). And the UPF within the VPLMN communicates with the UPF within the HPLMN through an N9 interface (abbreviated as N2). In addition, the control plane functions such as NSSF, NEF, AMF, SMF, NRF of the VPLMN or PCF shown in fig. 3A use a service interface for interaction. For example, the external service interface provided by the AMF is Namf; the SMF provides a service interface as Nsmf; the NSSF provides a service interface for the outside as Nnssf; the NEF provides a service interface for the outside as Nnef; the service interface externally provided by the NRF is Nnrf; the PCF uses the service interface to interact with the control plane functions such as UDM, AUSF, PCF, NRF, NSSF, AF of the HPLMN shown in fig. 3A of the Npcf or the NEF. For example, the server interface provided by the AUSF is Nausf; the service interface externally provided by the UDM is Nudm; the service interface provided by the AF is Naf.
Referring to fig. 3B, a schematic diagram of another network architecture is shown, and the network architecture is a roaming network architecture, for example, a roaming scenario of HR. The 5G network includes an HPLMN and a VPLMN. In this network architecture, NSSF, UE, (R) AN, SMF, PCF within the VPLMN, and AUSF, UDM within the HPLMN can all communicate with AMF within the VPLMN. The SMF within the VPLMN is also able to communicate with the UPF within the VPLMN and the SMF within the HPLMN. The PCF in the VPLMN is also capable of communicating with the PCF in the HPLMN. The UPF within the VPLMN is also capable of communicating with the (R) AN within the VPLMN and with the UPF within the HPLMN. NSSF within the VPLMN can also communicate with NSSF within the HPLMN. The SMF within the HPLMN is also capable of communicating with the UPF, UDM, and PCF within the HPLMN. The UDM within the HPLMN is also capable of communicating with the AUSF within the HPLMN. The PCF within the HPLMN is also capable of communicating with the AF within the HPLMN. The UPF in the HPLMN can also access DNs in the VPLMN. In fig. 3B, "Nxx" between two network elements represents the interface between the two network elements.
The functions of some of the network elements as referred to above are described below.
The AMF network element, abbreviated as AMF, is mainly responsible for mobility management in mobile networks, such as user location update, user registration network, user handover, etc.
The SMF network element, abbreviated as SMF, is mainly responsible for session management in the mobile network, such as session establishment, modification, release. Specific functions are e.g. assigning internet protocol (internet protocol, IP) addresses to users, selecting a UPF providing a message forwarding function, etc.
The UPF network element is called UPF for short and is responsible for forwarding and receiving user data in the UE. User data may be received from the data network and transmitted to the UE through the access network device; user data may also be received from the UE via the access network device and forwarded to the data network. The transmission resources and scheduling functions in the UPF that serve the UE are managed and controlled by the SMF.
PCF network element, called PCF for short, mainly supports to provide unified policy framework to control network behavior, provides policy rule to control layer network function, and is responsible for obtaining user subscription information related to policy decision.
The UDM network element, abbreviated as UDM, is configured to generate an authentication credentials, and perform user identification processing (such as storing and managing a permanent identity of a user), access authorization control, and subscription data management.
DN refers to a service network providing a data transmission service for a user, such as an IP Multimedia Service (IMS) or the internet. The UE may access the DN through a session established between the UE and the DN. Optionally, the session in the embodiment of the present application is exemplified by a protocol data unit (protocol data unit, PDU) session.
It should be noted that, the access network element, the policy control network element, the session management network element, the user plane network element, the unified data repository network element, and the like related to the embodiments of the present application are just one name, and the name does not limit the device itself. Taking a 5G system as an example, an access network element is e.g. RAN, a policy control network element is e.g. PCF, a session management network element is e.g. SMF, a user plane network element is e.g. UPF, and a unified data repository network element is e.g. unified data repository (unified data repository, UDR). In a non-5G system, for example, in other future communication systems, a policy control network element, a session management network element, a user plane network element, or a unified data repository network element may also correspond to other network elements, which is not specifically limited in the embodiments of the present application.
The technical solution provided in the embodiments of the present application may be applied to a 5G system, for example, to a network architecture as shown in any of the above figures 1A, 1B, 2A, 2B, 3A, or 3B. Alternatively, the technical solution provided in the embodiment of the present application may also be applied to a next-generation mobile communication system or other similar communication systems, which is not limited in this embodiment of the present application.
In order to provide a method for controlling a transmission rate of a UE in a slice according to a maximum bit rate, in the method for communication, after a handover (e.g., from a first access network element to a second access network element) of the UE occurs, if the first network element determines that an execution state of the access network element (e.g., the second access network element) after the handover is different for a first event (i.e., the transmission rate of the UE in the slice is limited according to the maximum bit rate) from an execution state of the first access network element for the first event, the first network element may send first information to a policy control network element, and the policy control network element may sense a change of the execution state of the access network element for the first event, so as to adjust the execution state of the policy control network element for the first event in time, so as to implement more reasonable rate control for the UE.
The method provided by the embodiments of the present application is described below with reference to the accompanying drawings. In the drawings corresponding to the embodiments of the present application, all steps indicated by dotted lines are optional steps. In the introduction process of each embodiment of the present application, the technical solutions of each embodiment of the present application are applied to the 5G system as an example, so each network element is described by a corresponding network element in the 5G system. For example, PCFs described in various embodiments of the present application may be replaced with policy control function network elements; the SMF described in the various embodiments of the present application may be replaced by a session management function network element; the RAN described in each embodiment of the present application may be replaced by a radio access network element or an access network element, and the AMF described in each embodiment of the present application may be replaced by an access and mobility management network element or the like. However, if the technical solutions provided by the embodiments of the present application are applied to other communication systems, names and/or functions of network elements may be changed, which is not limited.
Fig. 4 is a flow chart of a communication method according to an embodiment of the present application. Note that the communication method shown in fig. 4 may be applied to any of the network architectures shown in fig. 1A, 1B, 2A, 2B, 3A, or 3B. The first network element in the embodiment of the present application is, for example, RAN, SMF, AMF, or the like. In this embodiment, the UE is handed over from a first RAN to a second RAN, where the first RAN may be referred to as a source (source) RAN of the UE, and the second RAN may be referred to as a target (target) RAN of the UE.
S401, the first network element determines that the execution state of the second RAN for the first event is different from the execution state of the first RAN for the first event.
The meaning of the first event and the meaning of the execution state of the first event may refer to the foregoing, and will not be described herein. The manner in which the first network element determines whether the execution state of the second RAN for the first event is different from the execution state of the first RAN for the first event is described below.
1. Determining a first mode.
The first network element determines whether the execution state of the second RAN for the first event is different from the execution state of the first RAN for the first event according to the execution state of the first RAN for the first event and the execution state of the second RAN for the first event.
For example, the first network element may obtain an execution state of the first RAN for the first event and an execution state of the second RAN for the first event, thereby determining whether the execution state of the second RAN for the first event is different from the execution state of the first RAN for the first event.
2. And determining a second mode.
The first network element determines that a slice corresponding to the at least one session will execute the first event according to the information of the at least one session.
The session in the embodiment of the present application is, for example, a PDU session. The information of the at least one session is used to indicate the at least one session, e.g. comprising an identification of the at least one session. At least one session refers to a session corresponding to the UE on the first RAN side, and is successfully switched to the session of the second RAN. For a better understanding of at least one session, an example is described below. For example, the session corresponding to the UE on the first RAN side includes PDU session 1, PDU session 2 and PDU session 3, and after the UE is handed over from the first RAN to the second RAN, PDU session 1 and PDU session 2 are also successfully handed over to the second RAN side, and then PDU session 1 and PDU session 2 are at least one session.
In the process of switching the first RAN to the second RAN, if the second RAN cannot control the transmission rate of the UE in a certain Slice according to the UE-Slice-MBR, or the second RAN selects not to control the transmission rate of the UE in a certain Slice according to the UE-Slice-MBR, or the second RAN cannot accurately control the transmission rate of the UE in a certain Slice according to the UE-Slice-MBR, the second RAN can reject a session corresponding to the Slice; if the second RAN can control the transmission rate of the UE within a Slice according to the UE-Slice-MBR, the second RAN can accept the session corresponding to the Slice. Thus, if the first network element determines that the at least one session handover was successful, it means that the second RAN may perform the first event for the slice corresponding to the at least one session.
Alternatively, if the slice corresponding to the at least one session belongs to a slice for which the first event needs to be performed, the first network element determines that the second RAN will perform the first event for the slice corresponding to the at least one session. If the slice corresponding to the at least one session does not belong to a slice for which the first event needs to be performed, the first network element determines that the second RAN does not perform the first event for the slice corresponding to the at least one session. Wherein the information of the slice to be executed with the first event may be acquired by the first network element from the second RAN.
The first network element may pre-store the execution state of the first RAN for the first event, or may obtain the execution state of the first RAN for the first event from the first RAN, and may further determine whether the execution state of the first RAN for the first event is the same as the execution state of the second RAN for the second event.
The first information is generated if the first network element determines that the execution state of the first RAN for the first event is different from the execution state of the second RAN for the first event. The first information may indicate that the RAN has changed state for execution of the first event. The first information may indicate, either explicitly or implicitly, that the RAN has changed state of execution for the first event. For example, the first information includes a field that may directly indicate that the RAN has changed state for execution of the first event.
As an example, the first information indicates that the RAN changes state for the first event, which may mean that the RAN side changes the execution state of the first event for a slice (e.g., a slice corresponding to S-nsai), and not necessarily that a specific RAN changes the execution state of the first event.
Optionally, the RAN accessed by the UE changes the execution state of the first event, and the UE is handed over from one RAN to another RAN, and the execution state of the first event is different from the execution state of the other RAN, where both the two situations can be regarded as that the execution state of the first event changes.
Optionally, the first information may further include an execution status of the RAN after the change for the first event.
S402, the first network element sends first information to the PCF. Accordingly, the PCF receives the first information from the first network element. The first information is used to indicate that the RAN has changed state for execution of the first event.
The first network element may send the first information directly to the PCF, or send the first information to the PCF through other network elements, which refer to AMFs or SMFs, etc. It should be noted that, the process of sending the determination result to the PCF by the first network element through the other network elements may be transparent or non-transparent, which is not limited in this embodiment of the present application.
S403, the PCF determines the execution state of the PCF for the first event according to the first information.
If the RAN and PCF are unaware of each other whether the other party is able to control the UE's transmission rate within the slice according to the UE-slice-MBR, this may result in the RAN and/or PCF making an erroneous or inaccurate decision. And, while the PCF generally controls the UE-Slice-MBR by limiting the AMBR of the PDU session and GBR and/or MBR of GBR QoS Flow, there may be multiple PDU sessions, so the PCF also has a certain limitation on controlling the UE transmission rate in slices according to the UE-Slice-MBR (for example, it is possible that some PDU sessions already reach the limit of the session AMBR and the actual bit rate of other PDU sessions only reaches a small part of the AMBR), which further increases the possibility of the RAN and/or PCF making an erroneous decision. For example, the access network element controls the transmission rate of the UE in the Slice according to the UE-Slice-MBR, the policy control network element cannot sense the transmission rate of the access network element in the Slice according to the UE-Slice-MBR, and the policy control network element also controls the transmission rate of the UE in the Slice according to the UE-Slice-MBR. Therefore, in the embodiment of the application, once the RAN accessed by the UE changes the execution state of the first event, the PCF may be timely notified, so that the PCF may be facilitated to make a more reasonable decision.
After the PCF receives the first information, the PCF may determine that the access network element has changed the execution status of the first event. Further, the execution state of the PCF for the first event may be determined according to the first information.
For example, the PCF may determine the execution status of the PCF for the first event based on the pre-stored execution status of the first event. It should be noted that, the state of the first event pre-stored in the PCF may be the execution state of the first event corresponding to the UE, and not necessarily the execution state of the first event by a specific RAN.
The execution state of the first event pre-stored by the PCF is that the RAN executes the first event, and then the PCF may determine, according to the first information, that the execution state of the PCF for the first event is that the first event is executed. If the pre-stored execution status of the first event is that the RAN does not execute the first event, the PCF may determine, based on the first information, that the PCF is not executing the first event for the execution status of the first event.
Example two, the first information may further include an execution status of the changed RAN for the first event. The PCF may determine the status of the PCF for the first event based on the changed status of the RAN for the first event and the first information.
For example, if the changed RAN is in a state of executing the first event, the PCF determines not to execute the first event; if the changed RAN's execution status for the first event is that the first event is not executed, the PCF determines to execute the first event.
Example three in the foregoing manner, the PCF determines the execution status of the PCF for the first event based on the content indicated by the first information. Alternatively, after receiving the first information, the PCF may determine the PCF's subsequent execution status for executing the first event based on the PCF's execution status for the first event prior to receiving the first information. In this manner, the PCF may not need to pre-store the execution status of the RAN after the change for the first event, or the execution status of the RAN before the change for the first event.
For example, if the PCF's execution status for the first event is executing the first event before the first information is not received, the PCF determines that the PCF's execution status for the first event is not executing the first event after the PCF receives the first information. If the PCF does not execute the first event before receiving the first information, the PCF determines that the PCF does execute the first event.
In the embodiment of the application, the first network element can determine whether the execution states of the first RAN and the second RAN for the first event are the same, and timely notify the PCF when the execution states of the first RAN and the second RAN for the first event are different, so that the PCF can timely determine the execution states of the PCF for the first event, and a mechanism for executing the first event is provided. And, when the execution state of the second RAN to the first event changes, the PCF can be timely notified, so that the PCF can also timely determine the execution state of the PCF to the first event.
As mentioned above, there are many possible implementations of the first network element, as are many ways the first network element performs the step of S401. One implementation of the embodiment shown in fig. 4 is described below. Fig. 5 is a flow chart of a communication method according to an embodiment of the present application. The method shown in fig. 5 is described by taking the first network element as the RAN, and taking the example that the first network element determines that the execution state of the second RAN for the first event is different from the execution state of the first RAN for the first event according to the foregoing determining manner. In fig. 5, an access network element is taken as RAN, a policy control network element is taken as PCF, and a session management network element is taken as SMF.
S501, the first RAN sends third information to the second RAN. Accordingly, the second RAN receives the third information from the first RAN. The third information indicates an execution status of the first RAN for the first event.
The UE performs a cell handover from the first RAN to the second RAN, e.g., the first RAN may send third information to the second RAN during the handover. For example, the third information may be carried in a handover required request (handover request).
The execution status of the first RAN for the first event may be preconfigured in the first RAN, or predefined by a protocol, or may also be determined by the first RAN itself. If the execution state of the first RAN for the first event is determined by the first RAN, there are various ways of determining the execution state, which will be described by way of example below.
1. In one mode, the first RAN determines, according to its own structure, whether the first RAN performs the first event.
In particular, if the architecture of the first RAN employs a separate architecture of DU and CU, the first RAN determines that the first RAN does not perform the first event. Since the first RAN adopts a split structure, the first RAN may be regarded as a network element including a plurality of functional units such as DU and CU, and the functional units for limiting the transmission rate of the UE in all slices cannot be determined accurately, in this case, the first RAN cannot limit the transmission rate of the UE in all slices according to the UE-slice-MBR accurately, so in this case, the first RAN determines that the first RAN does not perform the first event. The meaning of not executing the first event may be referred to in the foregoing discussion and will not be described in detail herein.
2. In the second mode, the first RAN determines whether the first RAN performs the first event according to the information of the linking mechanism. The link mechanism refers to a communication mechanism used between the first RAN and a session corresponding to a slice accessed by the UE, for example, a double-link mechanism or a non-double-link mechanism (non-double-link mechanism refers to a mechanism other than the double-link mechanism). For simplicity of presentation, the session corresponding to the slice accessed by the UE is referred to as a first session, which may be one or more.
In particular, the first RAN employs a dual link mechanism and Downlink (DL) user plane traffic of QoS flows of the first session is directed to the master RAN and the slave RAN in a decentralized manner, in which case the first RAN may determine not to perform the first event. Wherein the master RAN or the slave RAN is the first RAN. The dispersion orientation can be understood as: DL user plane traffic of a portion of QoS flows of a first session is configured to be directed to the master RAN and DL user plane traffic of another portion of QoS of the first session is configured to be directed to the slave RAN. In this case, there are two N3 tunnel endpoints on the first RAN for the first session communication, regardless of the number of QoS flows, which makes it impossible for the first RAN to limit the UE's transmission rate within the slice accurately according to the UE-slice-MBR, so the first RAN can determine not to perform the first event.
Alternatively, the first RAN employs a dual link mechanism and Downlink (DL) user plane traffic of QoS flows of the first session are both directed to the first RAN, which may be the master RAN or the slave RAN, which determines to perform the first event. In this case, there is a single N3 tunnel endpoint on the first RAN for communicating with the first session, in which case the first RAN may perform the first event.
It should be noted that, the first RAN may determine the execution state of the first RAN for the first event by combining the two modes, which is not limited in the embodiment of the present application.
For example, the first RAN may determine the execution state of the first RAN for the first event in one or more of the first mode and the second mode, or the first RAN may determine the execution state of the first RAN for the first event in other modes than the above, which is not limited in the embodiment of the present application.
The first RAN may send the third information to the second RAN according to the execution status of the first RAN for the first event. The third information indicates an execution status of the first RAN for the first event. Wherein the third information may indicate, either explicitly or implicitly, an execution status of the first RAN for the first event.
For example, if direct communication is possible between the first RAN and the second RAN (e.g., where the first RAN is switching based on an Xn interface), the first RAN may directly send the execution status of the first event by the first RAN to the second RAN. Accordingly, the second RAN receives from the first RAN an execution status of the first RAN for the first event.
Or, for example, if the first RAN and the second RAN cannot directly communicate (for example, where the first RAN performs handover based on the N2 interface), the second RAN may receive the execution status of the first event by the first RAN from other network elements, for example, a target AMF of the UE, which may be referred to as a second AMF in this embodiment of the present application.
Specifically, the first RAN may send the execution state of the first RAN for the first event to a source AMF (an AMF interacting with the first RAN) of the UE, which is abbreviated as a first AMF in this embodiment, where the first AMF may send the execution state of the first RAN for the first event to a second AMF, and the second AMF sends the execution state of the first RAN for the first event to the second RAN.
After the UE is handed over from the first RAN to the second RAN, the architecture of the second RAN may be different from that of the first RAN, or a slice accessed by the UE may be changed, or a linking mechanism adopted by the second RAN may be different from that adopted by the first RAN, which may cause the execution state of the second RAN for the first event to be different from that of the first RAN. Thus, after the UE switches from the first RAN to the second RAN, the second RAN may determine an execution status of the second RAN for the first event.
The first RAN may send the third information to the second RAN after determining the execution status of the first RAN for the first event, the third information indicating the execution status of the first RAN for the first event. Optionally, the third information may also indicate the slice, e.g. the third information comprises an identification of the slice, which is indicated by the identification of the first slice.
Alternatively, if the slice comprises a plurality of slices, the third information may indicate the plurality of slices, e.g., the third information comprises an identification of the plurality of slices.
In this case, the third information may indicate an execution state of the first event for the plurality of slices by the first RAN, respectively. Alternatively, if the execution states of the plurality of slices for the first events are the same, the third information may indicate only the execution state of one first event.
Referring to table 2, a third information may include the second row to the fourth row in table 2 as follows.
TABLE 2
S-NSSAI Value of execution state
1 1
2 0
3 1
Slice 1, slice 2, and slice 3 in table 2 are all slices accessed by the UE through the first RAN. Taking the third information as the second row to the fourth row in the above table 2, the third information includes the identification of the slice (for example, 1,2 and 3), and the values of the execution states corresponding to the slice 1, the slice 2 and the slice 3 are 1,0 and 1, respectively. For example, if the value of the execution state corresponding to one slice is 1, it indicates that the first RAN does not limit the transmission rate of the UE in the slice according to the UE-slice-MBR; and if the value of the execution state corresponding to one slice is 0, the first RAN limits the transmission rate of the UE in the slice according to the UE-slice-MBR. For example, the value of the execution state corresponding to slice 1 in table 2 is 1, which indicates that the first RAN does not limit the transmission rate of the UE in slice 1 according to the UE-slice-MBR, and for example, the value of the execution state corresponding to slice 2 in table 2 is 0, which indicates that the first RAN limits the transmission rate of the UE in slice 2 according to the UE-slice-MBR.
S502, the second RAN determines that the execution state of the first RAN for the first event is different from the execution state of the second RAN for the first event.
The manner in which the second RAN determines the execution status for the first event may refer to the first RAN to determine the execution status for the first event, which is not described herein. Further, the second RAN may determine whether the execution status of the second RNA for the first event is the same as the execution status of the first RAN for the first event.
If the second RAN determines that the execution state of the first RAN for the first event is to execute the first event and the execution state of the second RAN for the first event is not to execute the first event, or if the second RAN determines that the execution state of the first RAN for the first event is not to execute the first event and the execution state of the second RAN for the first event is to execute the first event, the second RAN determines that the execution state of the second RAN for the first event is different from the first RAN. If the execution status of the second RAN and the first RAN for the first event are both not executing the first event or are both executing the first event, the second RAN determines that the execution status of the second RAN for the first event is the same as the execution status of the first RAN.
If the second RAN has the same execution status for the first event as the first RAN, it means that the execution status of the two RANs for the first event has not changed, in which case the second RAN may not perform subsequent steps.
If the execution state of the second RAN for the first event is different from the execution state of the first RAN for the first event, it indicates that the execution state of the second RAN for the first event is changed compared to the first RAN, and thus S503 may be performed, i.e., the second RAN sends the first information to the SMF. Accordingly, the SMF receives the first information from the second RAN. The first information may indicate that the execution state of the first event is different.
Illustratively, in S503, the second RAN may transmit the first information to the SMF through the AMF.
S504, the SMF sends the first information to the PCF. Accordingly, the PCF receives the first information from the SMF.
As one example, the SMF may send the first information to the PCF when the policy control request trigger (policy control request trigger) satisfies the trigger condition.
The triggering condition is, for example, that the execution state of the access network element for the first event changes. Specifically, the PCF may send a policy control request trigger to the SMF, where a trigger condition corresponding to the policy control request trigger, for example, an execution state of the first event indicated by the first information currently received by the SMF is different from an execution state of the first event acquired before the SMF, that is, the execution state of the first event is changed.
Optionally, the first information includes an execution status of the second RAN for the first event.
S505, the PCF determines the execution state of the PCF for the first event according to the first information.
The PCF may refer to the foregoing in determining the execution status of the PCF for the first event based on the first information.
Optionally, the PCF adjusts policy and charging control rules (policy and charging control, PCC) for the UE session in the slice. By adjusting the PCC, the guaranteed bit rate or maximum bit rate of the QoS Flow of the UE in the sliced session may be adjusted. Alternatively, the PCF may adjust PDU session related policy information, such as adjusting the aggregate maximum bit rate of the UE's session at the slice. Wherein the session may be one or more of all sessions of a slice.
For example, if the PCF determines that the PCF's execution status for the first event is not executing the first event, indicating that the PCF has a relatively high likelihood of reducing the aggregate bit rate of the UE's session in Slice before that, and determines that the PCF's execution status for the first event is not executing the first event, indicating that the PCF is no longer limited by the UE-Slice-MBR, the PCF may increase the aggregate bit rate of the UE's session in Slice, the aggregate bit rate of the QoS Flow, or the maximum bit rate, etc.
Further, the PCF sends a policy update response (npcf_ SMPolicyControlUpdate response) message to the SMF. Accordingly, the SMF receives the policy update response message from the PCF. The policy update response message indicates that the PCF has adjusted the corresponding control policy.
S506, the second RAN determines that the execution state of the second RAN for the first event changes.
During the communication, the execution state of the first event by the second RAN may change. For example, the linking mechanism between the second RAN and the session corresponding to the slice accessed by the UE may change, which may result in a change in the execution state of the second RAN for the first event. Of course, there are other factors that may cause the second RAN to change the execution status of the first event, which is not limited in the embodiments of the present application.
S507, the second RAN sends fourth information to the SMF. Accordingly, the SMF receives fourth information from the second RAN. The fourth information indicates that the second access network element has changed the execution status of the first event.
Optionally, the fourth information indicates an execution status of the changed second RAN for the first event.
S508, the SMF sends fourth information to the PCF. Accordingly, the PCF receives fourth information from the SMF.
Alternatively, the SMF may send the first information to the PCF when the policy control request trigger satisfies the trigger condition. The content of the trigger condition may be referred to above.
S509, the PCF determines the execution state of the PCF for the first event according to the fourth information.
If the fourth information does not indicate the changed execution status of the second RAN for the first event, the PCF may determine the subsequent execution status of the PCF for the first event based on the execution status of the PCF for the first event prior to receiving the fourth information.
Specifically, if the PCF is executing the first event in the state of executing the first event before the PCF does not receive the fourth information, the PCF determines that the PCF does not execute the first event after receiving the fourth information. If the PCF is not executing the first event in the execution state of the PCF for the first event before the PCF does not receive the fourth information, the PCF determines that the PCF is executing the first event in the execution state of the PCF for the first event after the PCF receives the fourth information.
Alternatively, if the fourth information includes the changed execution status of the second RAN for the first event, the PCF may obtain the changed execution status of the second RAN for the first event after receiving the fourth information. If the changed execution status of the second RAN is to execute the first event, the PCF determines not to execute the first event. If the changed execution status of the second RAN is that the first event is not executed, the PCF determines to execute the first event.
It should be noted that the execution state of the first event may not change by the second RAN, in which case S506-S509 need not be executed, i.e., S506-S509 are optional.
In the embodiment of the application, the second RAN can determine whether the execution states of the first RAN and the second RAN on the first event are the same, and timely notify the PCF when the execution states of the first RAN and the second RAN on the first event are different, so that the PCF can timely determine the execution state of the PCF on the first event, and a mechanism for executing the first event is provided. And, when the execution state of the second RAN to the first event changes, the PCF can be timely notified, so that the PCF can also timely determine the execution state of the PCF to the first event.
In the embodiment shown in fig. 5, in S501, taking an example in which the first RAN directly transmits the third information to the second RAN, there are various ways in which the first RAN actually transmits the third information to the second RAN. The following describes a flowchart for transmitting third information shown in fig. 6 as an example.
It should be noted that, in fig. 6, the first RAN is taken as an example of switching based on the N2 interface, in this case, the AMF that interacts with the first RAN and the AMF that interacts with the second RAN may be different, and for convenience of description, in this embodiment of the present application, the AMF that interacts with the first RAN is the first AMF, may also be referred to as a source AMF of the UE, and the AMF that corresponds to the second RAN is the second AMF, may also be referred to as a target AMF of the UE.
S601, the first RAN sends a handover required request to the first AMF. Accordingly, the first AMF receives the handover required request from the first RAN.
The handover required request indication requests a handover to the second RAN. Optionally, the handover required request includes a source-to-target transparent container (source to target transparent container) in which the third information may be carried. A source-to-destination transparent container is understood as a cell (cell). For specific meaning of the third information reference is made to the foregoing.
S602, the first AMF sends a UE context creation request (namf_communication_ createUEconrext request) to the second AMF. Accordingly, the second AMF receives the UE context creation request from the first AMF network element. The UE context creation request includes third information.
The UE context creation request is for requesting the second AMF to create the UE context. UE context, e.g., information of the accessed slice, and PDU session of the accessed slice, etc., when the UE accesses the first RAN. In the embodiment of the present application, a PDU session is taken as an example.
Optionally, the UE context creation request includes a source-to-target transparent container, and the third information may be carried in the source-to-target transparent container.
S603, the second AMF sends a handover request (handover request) to the second RAN. Accordingly, the second RAN receives the handover request from the second AMF. The handover request includes third information.
The handover request is for requesting the second RAN to reserve handover resources for the UE. Optionally, the handover request includes a source-to-target transparent container, and the third information may be carried in the source-to-target transparent container.
As mentioned above, there are many possible implementations of the first network element, as are many ways the first network element performs the step of S401. One implementation of the embodiment shown in fig. 4 is described below. Fig. 7 is a flow chart of a communication method according to an embodiment of the present application. In fig. 7, the first network element is exemplified by the SMF, and the SMF adopts the above-mentioned determining manner to execute S401, in fig. 7, the access network element is exemplified by the RAN, the policy control network element is exemplified by the PCF, and the session management network element is exemplified by the SMF.
S701, the first RAN sends third information to the SMF. Accordingly, the SMF receives the third information from the first RAN. The third information indicates an execution status of the first RAN for the first event.
For example, after the UE accesses the first RAN, or after the execution state of the first event by the first RAN changes, the first RAN may determine the execution state of the first RAN for the first event, and the determination manner may refer to the foregoing. The first RAN may generate third information according to an execution state of the first RAN for the first event, and send the third information to the SMF. Optionally, the third information includes an execution status of the first RAN for the first event. The third information may also include an identification of the slice.
In the embodiment of the present application, taking the execution state of the first RAN on the first event received by the SMF from the first RAN as an example, there may be various ways in which the SMF actually obtains the execution state of the first RAN on the first event, for example, the SMF receives the execution state of the first RAN on the first event from the second RAN, which is not limited in the embodiment of the present application.
Optionally, the SMF buffers the third information.
S702, the SMF sends third information to the PCF. Accordingly, the PCF receives the third information from the SMF.
The SMF may send third information to the PCF to facilitate the PCF to determine the PCF's status of execution of the first event based on the status of execution of the first RAN of the first event.
Alternatively, the SMF may send third information to the PCF when the policy control request trigger satisfies the trigger condition. In this case, the content of the trigger condition may be referred to the foregoing.
S701 to S702 are steps performed in the case of the UE accessing the first RAN.
S703, after the UE switches to the second RAN, the second RAN sends second information to the SMF. Accordingly, the SMF receives the second information from the second RAN. The second information indicates an execution status of the second RAN for the first event.
In the embodiment of the application, after the second RAN determines that the UE is switched from the first RAN to the second RAN, the second RAN sends second information to the SMF. Since the UE is handed over, in this case, the PCF or the like is easy to appear, and cannot determine the execution state of the second RAN for executing the first event, so the second RAN may report the second information to the SMF, and inform the SMF of the execution state of the second RAN for the first event in time.
As one example, the second RAN sends second information to the SMF for a slice that needs to be executed with the first event. The meaning of the slice in which the first event needs to be executed may be referred to above.
The meaning of the second information and the manner in which the second RAN determines the execution status of the second RAN for the first event may refer to the foregoing.
S704, the SMF determines that the execution state of the first RAN for the first event is different from the execution state of the second RAN for the first event.
After the SMF obtains the execution state of the first RAN for the first event and the execution state of the second RAN for the first event, it may be determined whether the execution state of the first RAN for the first event is different from the execution state of the second RAN for the first event.
If the SMF determines that the execution states of the first RAN and the second RAN for the first event are both executing the first event, or the execution states of the first RAN and the second RAN for the first event are both not executing the first event, the SMF determines that the execution states of the first RAN for the first event are the same as the second RAN, in which case the SMF may not process.
If the SMF determines that the execution state of the first RAN for the first event is executing the first event and the execution state of the second RAN for the first event is not executing the first event, or the execution state of the first RAN for the first event is not executing the first event and the execution state of the second RAN for the first event is executing the first event, the SMF determines that the execution state of the first RAN for the first event is different from the second RAN, S705 may be executed, i.e., the SMF sends the first information to the PCF. Accordingly, the PCF receives the first information from the SMF. Wherein the meaning of the first information may be referred to the foregoing.
Alternatively, the SMF may send the first information to the PCF when the policy control request trigger satisfies the trigger condition. The content of the trigger condition may be referred to above.
S706, the PCF determines the PCF' S execution status for the first event.
The PCF may refer to the foregoing for determining the execution status of the PCF for the first event.
As one example, the second RAN may send fourth information to the PCF if the second RAN changes execution status for the first event. Accordingly, the PCF receives the fourth information from the second RAN. The PCF may determine, based on the fourth information, an execution status of the PCF for the first event.
The meaning of the fourth information, the manner in which the second RAN sends the fourth information to the PCF, and the PCF may determine, according to the fourth information, the content of the PCF in determining the execution state of the first event may refer to the content discussed in the foregoing, which is not repeated herein.
In the embodiment of the application, the SMF network element may determine whether the execution states of the first RAN and the second RAN for the first event are the same, and timely notify the PCF when the execution states of the first RAN and the second RAN for the first event are different, so that the PCF may timely determine the execution state of the PCF for the first event, and a mechanism for executing the first event is provided. And, since the interaction between the RAN and the PCF is generally implemented by the SMF, and the SMF generally buffers information during the interaction between the RAN and the PCF, whether the execution states of the first RAN and the second RAN for the first event are the same is determined by the SMF, so that the processing amount of maintenance of the execution states of the PCF for the first event can be relatively reduced, and hardware upgrading of the SMF is not required.
Referring to fig. 8, a flow chart of a method according to an embodiment of the present application is provided. Fig. 8 is an illustration of a PCF performing the communication method in the embodiment of the present application.
S801, the first RAN sends third information to the SMF. Accordingly, the SMF receives the third information from the first RAN. The third information includes an execution status of the second RAN for the first event.
The manner in which the second RAN obtains the third information, the meaning of the third information, may be referred to above.
S802, the SMF sends third information to the PCF. Accordingly, the PCF receives the third information from the SMF.
Note that S801 and S802 may be performed by the UE in the case of accessing the first RAN. In the embodiment of the present application, taking the first RAN sending the third information to the SMF as an example, the manner in which the SMF obtains the third information is not limited in practice.
S803, the second RAN sends second information to the SMF. Accordingly, the SMF receives the second information from the second RAN. The second information includes an execution status of the first RAN for the first event.
S804, the SMF sends second information to the PCF. Accordingly, the PCF receives the second information from the SMF. The second information indicates an execution status of the first RAN for the first event. Wherein the meaning of the second information may be referred to in the foregoing.
Alternatively, the SMF may send the first information to the PCF when the policy control request trigger satisfies the trigger condition. The content of the trigger condition may be referred to above.
It should be noted that S803 and S804 may be performed by the UE in the case of accessing the second RAN. In the embodiment of the present application, taking the second RAN sending the second information to the SMF as an example, the manner in which the SMF obtains the second information is not limited in practice.
S805, the PCF determines the first information. The meaning of the first information may be referred to in the foregoing.
The PCF may determine the first information in the manner of determination as described above.
S806, the PCF determines the execution status of the PCF for the first event.
The PCF performs S806 in the manner described above with reference to the foregoing.
As one example, the second RAN may send fourth information to the PCF if the second RAN changes execution status for the first event. Accordingly, the PCF receives the fourth information from the second RAN. The PCF may determine, based on the fourth information, an execution status of the PCF for the first event.
The meaning of the fourth information, the manner in which the second RAN sends the fourth information to the PCF, and the PCF may determine, according to the fourth information, the content of the PCF in determining the execution state of the first event may refer to the content discussed in the foregoing, which is not repeated herein.
In the embodiment of the application, the PCF network element can directly determine whether the execution states of the first RAN and the second RAN for the first event are the same, and timely determine the execution states of the PCF for the first event when the execution states of the first RAN and the second RAN for the first event are different, so that a mechanism for executing the first event is provided.
The following description will take the first network element as an SMF, and take the foregoing determination method two to determine that the execution states of the first RAN and the second RAN for the first event are different as an example.
As mentioned above, there are many possible implementations of the first network element, as are many ways the first network element performs the step of S401. One implementation of the embodiment shown in fig. 4 is described below. Referring to fig. 9, a communication method is provided in an embodiment of the present application. The communication method shown in fig. 9 is shown in fig. 9, in which the first network element is an SMF, the SMF executes S401 in the second determination mode, in fig. 9, the access network element is a RAN, the policy control network element is a PCF, the session management network element is an SMF, and the access and mobility management network element is an AMF.
S901, the second RAN sends a handover indication to the AMF (handover indication). Accordingly, the AMF receives the handover indication from the second RAN.
The handover indication indicates information of at least one PDU session. In the embodiment of the present application, the PDU session is taken as an example.
The meaning of the information of the at least one PDU session may be referred to in the foregoing.
S902, the AMF sends a handover indication to the SMF. Accordingly, the SMF receives a handover indication from the AMF.
As an example, the information of the at least one PDU session may be carried in a PDU session context update request (nsmf_pduse_updatsmcontext), and the AMF sends the PDU session update context message to the SMF, which is equivalent to the information of the at least one PDU session being sent.
S903, the SMF determines that the second RAN will perform the first event for a slice corresponding to at least one PDU session.
The SMF is based on the information of the at least one PDU session and the slice corresponding to the at least one PDU session belongs to the slice for which the first event needs to be performed, and thus determines that the second RAN will perform the first event for the slice corresponding to the at least one PDU session. Wherein the identification of the slice for which the first event needs to be performed may be received by the SMF from the RAN.
If the slice corresponding to the at least one PDU session includes a slice, then the SMF determines that the second RAN will perform the first event. If the slice corresponding to the at least one PDU session does not include a slice, then the SMF determines that the second RAN will not perform the first event.
S904, the SMF determines that the execution state of the second RAN for the first event is different from the execution state of the first RAN for the first event.
The SMF may pre-store an execution state of the first RAN for the first event. The execution state of the first event by the first RAN may be received by the SMF from the first RAN or received by the second RAN, which is not limited in the embodiment of the present application.
The SMF may determine whether the execution state of the second RAN for the first event is the same as the execution state of the first RAN for the first event according to the execution state of the first RAN for the first event and the execution state of the second RAN for the first event, wherein the specific content for determining whether the execution state of the second RAN for the first event is the same may refer to the foregoing.
S905, the SMF sends the first information to the PCF. Accordingly, the PCF receives the first information from the SMF.
Alternatively, the SMF may send the first information to the PCF when the policy control request trigger satisfies the trigger condition. The content of the trigger condition may be referred to above. The meaning of the first information may be referred to in the foregoing.
S906, the PCF determines the execution status of the PCF for the first event.
The PCF may refer to the foregoing for a manner in which the PCF determines the status of the PCF's execution for the first event.
As one example, the second RAN may send fourth information to the PCF if the second RAN changes execution status for the first event. Accordingly, the PCF receives the fourth information from the second RAN. The PCF may determine, based on the fourth information, an execution status of the PCF for the first event.
The meaning of the fourth information, the manner in which the second RAN sends the fourth information to the PCF, and the PCF may determine, according to the fourth information, the content of the PCF in determining the execution state of the first event may refer to the content discussed in the foregoing, which is not repeated herein.
In the embodiment of the application, the SMF may determine whether the second RAN performs the first event according to the PDU session successfully switched after the first RAN is switched to the second RAN, without the second RAN determining whether the second RAN is capable of performing the first event, so that interaction between the second RAN and the SMF is reduced, and processing capacity of the second RAN is reduced.
It should be noted that, in the embodiment of the present application, the communication method may also be performed by the AMF and the PCF in cooperation, in this case, the SMF in the above embodiment may be replaced by the AMF, and the manner in which the AMF performs each step may refer to the manner in which the SMF performs the corresponding step in the foregoing, which is not repeated herein.
Fig. 10 is a schematic flow chart of a communication method according to an embodiment of the present application. In fig. 10, the PCF executes the communication method in the embodiment of the present application as an example. Note that, the communication method shown in fig. 10 may be applied to any of the network architectures shown in fig. 1A, fig. 1B, fig. 2A, fig. 2B, fig. 3A, or fig. 3B, where in fig. 10, an access network element is taken as a RAN, a policy control network element is taken as a PCF, and a session management network element is taken as an SMF as an example.
S1001, the second RAN sends a handover indication to the SMF. Accordingly, the SMF receives the handover indication from the second RAN. The meaning of the handover indication may be referred to above.
S1002, the SMF sends a handoff instruction to the PCF. Accordingly, the PCF receives the handoff indication from the SMF.
Alternatively, the PCF may send a handoff indication to the PCF when the condition is met by setting a policy control trigger at the SMF.
A policy control trigger may be set as shown in table 3 below.
TABLE 3 Table 3
The PCF may set the policy control trigger in the case where the PCF determines that the first RAN may execute the first event, or may set the policy control trigger after the SMF has sent the first RAN that the first event is not executed to the first RAN, which is not limited in the embodiment of the present application.
S1003, the PCF determines that the slice corresponding to the at least one PDU session will perform the first event.
The step of the PCF performing S1003 may refer to the SMF-performed procedure discussed in fig. 9, and will not be described here.
S1004, the PCF determines that the slice corresponding to the at least one PDU session will perform the first event.
S1005, the PCF determines the execution status of the PCF for the first event.
The step of the PCF performing S1005 may refer to the foregoing.
In the embodiment of the application, the PCF may determine the execution state of the second RAN for the first event according to the successfully switched PDU session, which provides a way for the PCF to autonomously determine the execution state of the second RAN for the first event. Further, interactions between the SMF and PCF may follow a trigger mechanism, thus eliminating the need for hardware upgrades to the SMF or PCF.
The embodiment of the application also provides another communication method, in the communication method, if the access network element changes the execution state of the first event (namely, the transmission rate of the UE in the slice is limited according to the UE-slice-MBR) under the condition that the UE accesses a certain access network element, fourth information (the fourth information indicates and/or includes that the execution state of the access network element changes to the first event) can be sent to the policy control network element, so that the policy control network element can determine the execution state of the policy control network element to the first event according to the first information, and a mechanism for executing the first event is provided. And under the condition that the execution state of the access network element for the first event changes, the execution state of the access network element for the first event is actively reported to the policy control network element, so that the policy control network element can timely adjust the execution state of the policy control network element for the first event.
Referring to fig. 11, a flowchart of a communication method according to an embodiment of the present application is provided. The communication method may be performed cooperatively by the RAN and PCF. Note that, in fig. 11, the communication method shown in fig. 11 may be applied to any of the network architectures shown in fig. 1A, fig. 1B, fig. 2A, fig. 2B, fig. 3A, or fig. 3B, and in fig. 11, an access network element is taken as a RAN, a policy control network element is taken as a PCF, and a session management network element is taken as an SMF as an example.
S1101, the RAN determines that the execution state of the RAN for the first event changes.
The manner in which the RAN performs S1101 may refer to the foregoing, and will not be described in detail herein. The RAN in the embodiment of the present application is a RAN currently accessed by the UE.
S1102, the RAN sends fourth information to the SMF. Accordingly, the SMF receives the fourth information from the RAN. The fourth information indicates and/or includes an execution status of the changed RAN for the first event.
S1103, the SMF sends fourth information to the PCF. Accordingly, the PCF receives the fourth information from the SMF network element.
S1104, the PCF determines, according to the fourth information, an execution status of the PCF for the first event.
The manner in which the PCF performs S1104 may refer to the foregoing discussion and is not described in detail herein.
In the embodiment of the application, when the RAN determines that the execution state of the RAN for the first event changes, the PCF can be timely reported, so that the PCF can timely sense the change of the execution state of the RAN for the first event, a mechanism for executing the first event is provided, and the situation that the PCF makes an erroneous decision is reduced.
The embodiment of the application also provides another communication method, in which the policy control network element can receive the capability information of the access network element, the capability information indicates whether the access network element can execute the first event, and further the policy control network element can determine whether the access network element executes the first event according to the capability information, so that a mechanism for executing the first event is provided. The communication scheme may be performed by the session management network element and the policy control network element in cooperation, or the access and mobility management network element and the policy control network element in cooperation, or the RAN and the policy control network element in cooperation, and the following description will be given by taking a communication method corresponding to the AMF executing the communication scheme as an example. Fig. 12 is a flow chart of a communication method according to an embodiment of the present application. In fig. 12, an access network element is taken as a RAN, a session management network element is taken as an SMF, a policy control network element is taken as a PCF, and an access and mobility management network element is taken as an example.
S1201, the AMF transmits capability information to the SMF. The capability information is used to indicate whether the RAN can perform the first event. Accordingly, the SMF receives the capability information from the AMF.
For example, the AMF may receive capability information from the RAN.
Specifically, the capability information may carry an NG setup request (NG setup request) message, which is sent to the AMF when the RAN may establish a connection at the AMF.
Alternatively, the capability information may be carried in a RAN configuration update (RAN configuration update) message, which may send RAN configuration update) a message to the AMF after the UE switches to the RAN.
Alternatively, during registration of a certain UE (e.g., the first UE), the RAN may send the capability information of the RAN to the AMF.
Further, the AMF may send capability information to the SMF during PDU session establishment. The embodiment of the present application is not particularly limited thereto.
Whether the first event can be executed indicates whether the RAN network element has the capability of executing the first event, where the first event refers to limiting the transmission rate of the UE in the slice according to the UE-slice-MBR. The UE in the embodiment of the present application refers to any UE that communicates with the access network element. The slice in the embodiment of the present application refers to one or more slices of the UE through the network element of the access network. For example, the RAN network element is included without the capability to perform the first event, or the RAN network element is included with the capability to perform the first event.
In one possible implementation, the AMF sends the capability information to the SMF after determining that the UE is handed over to the RAN. For example, in a handover preparation phase based on an Xn or N2 interface handover procedure, the AMF may carry the capability information in an SMF session update SM context request (PDU session update SM context request) message sent to the SMF; alternatively, the AMF may send the capability information to the SMF through a dedicated message in a handover preparation phase based on an Xn or N2 interface handover procedure.
Optionally, the capability information includes one or more of an identifier of the RAN, or a corresponding S-nsai, etc., where the S-nsai is used to indicate a slice to which the execution state of the RAN for the first event is directed, i.e. the RAN may be used to report, through the capability information, whether the RAN can execute the first event for a certain slice.
S1202, the SMF sends capability information to the PCF. Accordingly, the PCF receives the capability information from the SMF.
Alternatively, the SMF may send the first information to the PCF when the policy control request trigger satisfies the trigger condition. The triggering condition is, for example, that the RAN is different from capability information of another RAN, which is a RAN to which the UE has accessed before switching to the RAN.
S1203, the PCF determines, according to the capability information, an execution status of the PCF for the first event.
Based on the capability information, the PCF may determine to perform the first event if it is determined that the RAN does not have the capability to perform the first event; if the RAN is determined to be capable of executing the first event, the PCF may determine not to execute the first event.
Optionally, the PCF adjusts policy and charging control rules (policy and charging control, PCC) for the UE session in the slice. By adjusting the PCC, the guaranteed bit rate or maximum bit rate of the QoS Flow of the UE in the sliced session may be adjusted. Alternatively, the PCF may adjust PDU session related policy information, such as adjusting the aggregate maximum bit rate of the UE's session at the slice.
In the embodiment of the application, the information of whether the RAN can execute the first event can be reported by the RAN with granularity, and the report is not needed to be performed by taking the slice as a unit, so that the data transmission quantity in the communication system is relatively reduced. In addition, in the embodiment of the present application, the PCF may also sense whether the RAN can execute the first event, and adjust the execution state of the PCF for the first event in time.
It should be noted that, a mechanism of PCF and AMF interaction is introduced in the 5G system, and for the same UE, the PCF that interacts with the AMF serving the UE may be referred to as PCF for a UE, and the PCF that interacts with the SMF serving the UE may be referred to as PCF for a PDU Session. If the method of any of the embodiments described above (e.g., the embodiments of any of fig. 4-12) is applied in a 5G system, and if PCF (PCF for a UE) serving a UE and PCF (PCF for a PDU Session) serving a PDU session are the same PCF, as an example, the PCF of any of the embodiments described above is both PCF for a UE and PCF for a PDU Session. If PCF for a UE and PCF for a PDU Session are not the same PCF, as another example, the PCF in any of the above embodiments may also be PCF for a UE. In this case, the SMF in any of the above embodiments may be replaced with an AMF, and the PCF for a UE may receive the first information from the AMF and transmit the first information to PCF for a PDU Session.
It should be noted that, in any embodiment, the process of sending the information from a to C through B may be transparent or non-transparent, which is not limited in this embodiment of the present application. For example, the process of the second RAN sending the first information to the PCF through the SMF may be transparent or non-transparent.
Fig. 13 is a schematic structural diagram of a possible communication device according to an embodiment of the present application.
As shown in fig. 13, the communication apparatus 1300 includes a processing module 1301 and a transceiver module 1302.
In the embodiment of the present application, the communications apparatus 1300 can be configured to implement the function of a first network element, for example, the function of the first network element in fig. 4.
If the first network element is a RAN, for example, the communications apparatus 1300 can be configured to implement the functionality of the second RAN illustrated in fig. 5 or fig. 6, or to implement the functionality of the second RAN in fig. 8. For example, a processing module 1301 configured to implement the step of the foregoing S502; a transceiver module 1302 for implementing the steps of the foregoing S503. As another example, the transceiver module 1302 is configured to implement the step of S803.
If the first network element is a RAN, for example, the communications apparatus 1300 can be employed to implement the functionality of the second RAN illustrated in fig. 7. For example, the transceiver module 1302 is configured to implement the steps of the foregoing S703. Optionally, the processing module 1301 is configured to determine the second information in S703.
If the first network element is an SMF, the embodiment of the present application provides a communication device 1300, where the communication device 1300 may be used to implement the functions of the SMF shown in fig. 7, or implement the functions of the SMF shown in fig. 9. For example, a processing module 1301 configured to implement the step of the foregoing S704; a transceiver module 1302 for implementing the steps of the foregoing S703. As another example, the processing module 1301 is configured to implement the step of the foregoing S904; the transceiver module 1302 is configured to implement the step of S905.
The embodiment of the present application provides a communication apparatus 1300, where the communication apparatus 1300 may be used to implement the function of the PCF shown in fig. 5 or fig. 6, implement the function of the PCF shown in fig. 7, implement the function of the PCF shown in fig. 8, implement the function of the PCF shown in fig. 9, or implement the function of the PCF shown in fig. 10. For example, a processing module 1301 configured to implement the step of the foregoing S505; a transceiver module 1302 for implementing the steps of the foregoing S504. As another example, the processing module 1301 is configured to implement the step of the foregoing S705; a transceiver module 1302 for implementing the steps of the foregoing S706. As another example, a processing module 1301 is configured to implement the steps of S805 and S806 above; a transceiver module 1302 for implementing the steps of S804. As another example, the processing module 1301 is configured to implement the step of S906; the transceiver module 1302 is configured to implement the step of S905. Also for example, a processing module 1301 is configured to implement the steps of the foregoing S1004-S1005. Optionally, the communications device 1300 further includes a transceiver module 1302. The transceiver module 1302 may perform the steps of S1002, for example.
The present embodiment provides a communications apparatus 1300, where the communications apparatus 1300 can be configured to implement the functions of the RAN shown in fig. 11, and in this case, the communications apparatus 1300 includes a processing module 1301 and a transceiver module 1302. For example, the processing module 1301 is configured to implement the steps of the foregoing S1101. The transceiver module 1302 is configured to perform the step of S1102.
The embodiment of the present application provides a communication device 1300, where the communication device 1300 may be used to implement the PCF function shown in fig. 11, and in this case, the communication device 1300 includes a processing module 1301 and a transceiver module 1302. For example, the processing module 1301 is configured to implement the steps of the foregoing S1104. The transceiver module 1302 is configured to perform the step of S1103.
The present embodiment provides a communication device 1300, where the communication device 1300 may be used to implement the functions of the SMF or AMF shown in fig. 12, and in this case, the communication device 1300 includes a transceiver module 1302. For example, the transceiver module 1302 is configured to perform the step of S1201.
The embodiment of the present application provides a communication device 1300, where the communication device 1300 may be used to implement the functionality of the PCF shown in fig. 12, and in this case, the communication device 1300 includes a processing module 1301 and a transceiver module 1302. For example, a processing module 1301 is configured to implement the steps of the foregoing S1202. The transceiver module 1302 is configured to perform the step of S1203.
A more detailed description of the processing module 1301 and the transceiver module 1302 described above may be directly obtained by referring to the related description in the method embodiment shown in any one of fig. 4 to fig. 12, which is not repeated herein.
As shown in fig. 14, communication device 1400 includes a processor 1410 and an interface 1420. The processor 1410 and the interface 1420 are coupled to each other. It is understood that interface 1420 may be a transceiver or an input-output interface. Wherein the processor 1410 and the interface 1420 may implement the communication method described in any of the foregoing fig. 4 to 12.
Optionally, the communication device 1400 may also include a memory 1430 for storing instructions to be executed by the processor 1410 or for storing input data required by the processor 1410 to execute instructions or for storing data generated after the processor 1410 executes instructions.
Optionally, the processor 1410 is configured to implement the functions of the processing module 1301, and the interface 1420 is configured to implement the functions of the transceiver module 1302.
The embodiment of the application provides a chip system, which comprises: a processor and an interface. Wherein the processor is configured to invoke and execute instructions from the interface, which when executed by the processor, implement the method of any of the above-described figures 4-12.
Embodiments of the present application provide a computer readable storage medium for storing a computer program or instructions which, when executed, implement a method as described in any of the above figures 4-12.
Embodiments of the present application provide a computer program product comprising instructions which, when run on a computer, implement the method of any of the above figures 4-12.
It is to be appreciated that the processor in embodiments of the present application may be a central processing unit (Central Processing Unit, CPU), but may also be other general purpose processors, digital signal processors (Digital Signal Processor, DSP), application specific integrated circuits (Application Specific Integrated Circuit, ASIC), field programmable gate arrays (Field Programmable Gate Array, FPGA) or other programmable logic devices, transistor logic devices, hardware components, or any combination thereof. The general purpose processor may be a microprocessor, but in the alternative, it may be any conventional processor.
The method steps in the embodiments of the present application may be implemented by hardware, or may be implemented by a processor executing software instructions. The software instructions may be comprised of corresponding software modules that may be stored in random access memory, flash memory, read only memory, programmable read only memory, erasable programmable read only memory, electrically erasable programmable read only memory, registers, hard disk, removable disk, CD-ROM, or any other form of storage medium known in the art. An exemplary storage medium is coupled to the processor such the processor can read information from, and write information to, the storage medium. In the alternative, the storage medium may be integral to the processor. The processor and the storage medium may reside in an ASIC. In addition, the ASIC may reside in a base station or terminal. The processor and the storage medium may reside as discrete components in a base station or terminal.
In the above embodiments, it may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer programs or instructions. When the computer program or instructions are loaded and executed on a computer, the processes or functions described in the embodiments of the present application are performed in whole or in part. The computer may be a general purpose computer, a special purpose computer, a computer network, a network device, a user device, or other programmable apparatus. The computer program or instructions may be stored in a computer readable storage medium or transmitted from one computer readable storage medium to another computer readable storage medium, for example, the computer program or instructions may be transmitted from one website site, computer, server, or data center to another website site, computer, server, or data center by wired or wireless means. The computer readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server, data center, etc. that integrates one or more available media. The usable medium may be a magnetic medium, e.g., floppy disk, hard disk, tape; but also optical media such as digital video discs; but also semiconductor media such as solid state disks. The computer readable storage medium may be volatile or nonvolatile storage medium, or may include both volatile and nonvolatile types of storage medium.
In the various embodiments of the application, if there is no specific description or logical conflict, terms and/or descriptions between the various embodiments are consistent and may reference each other, and features of the various embodiments may be combined to form new embodiments according to their inherent logical relationships.
It will be appreciated that the various numerical numbers referred to in the embodiments of the present application are merely for ease of description and are not intended to limit the scope of the embodiments of the present application. The sequence number of each process does not mean the sequence of the execution sequence, and the execution sequence of each process should be determined according to the function and the internal logic.

Claims (20)

1. A method of communication, comprising:
after terminal equipment is switched from a first access network element to a second access network element, determining that an execution state of the second access network element for a first event is different from the first access network element, wherein the first event is that the transmission rate of the terminal equipment in a slice is limited according to a maximum bit rate, and the execution state of the first event comprises execution of the first event or non-execution of the first event;
and sending first information, wherein the first information is used for indicating the change of the execution state of the access network element for the first event.
2. The method of claim 1, wherein determining that the second access network element performs a different state for the first event than the first access network element comprises:
receiving second information from the second access network element, wherein the second information is used for indicating the execution state of the second access network element for the first event;
and determining that the execution state of the second access network element for the first event is different from the first access network element according to the second information and the third information, wherein the third information is used for indicating the execution state of the first access network element for the first event.
3. The method according to claim 2, wherein the method further comprises:
the third information is received from the first access network element.
4. The method according to claim 1, wherein the method further comprises:
determining information of at least one session, wherein the at least one session comprises a session successfully switched to the second access network element by the terminal equipment in the session corresponding to the first access network element side;
determining that the second access network element will perform the first event for a slice corresponding to the at least one session.
5. The method according to any one of claims 1-4, further comprising:
and if the execution state of the second access network element for the first event changes, sending fourth information, wherein the fourth information is used for indicating that the execution state of the second access network element for the first event changes.
6. The method of any of claims 1-5, wherein the first event comprises:
an aggregate bit rate that is intended to be provided by a quality of service stream limited to a session, the quality of service stream comprising a non-guaranteed bit rate quality of service stream and/or a guaranteed bit rate quality of service stream, the session comprising part or all of the session in the slice that is served by the terminal device.
7. The method of any of claims 1-6, wherein not executing the first event comprises one of:
not supporting execution of the first event; or alternatively, the process may be performed,
support execution of the first event, but not to effectuate the first event; or alternatively, the process may be performed,
the first event cannot be accurately performed.
8. A method of communication, comprising:
acquiring first information, wherein the first information is used for indicating an execution state of an access network element to change a first event, the first event is limiting the transmission rate of terminal equipment in a first slice according to a maximum bit rate, and the execution state of the first event comprises executing the first event or not executing the first event;
And determining the execution state of the strategy control network element for the first event according to the first information.
9. The method of claim 8, wherein the method further comprises:
determining information of at least one session, wherein the at least one session comprises a session which is successfully switched to a second access network element in a session corresponding to a first access network element side by the terminal equipment;
determining that the second access network element will perform the first event for a slice corresponding to the at least one session.
10. The method of claim 8, wherein obtaining the first information comprises:
receiving second information from a session management network element or a second access network element, wherein the second access network element is an access network element switched by the terminal equipment;
and determining the first information according to the second information and the third information, wherein the third information indicates an execution state of a first access network element for the first event, and the first access network element is the access network element before the terminal equipment is switched.
11. The method according to claim 10, wherein the method further comprises:
Third information is received from the first access network element, the third information indicating an execution state of the first access network element for the first event.
12. The method according to any of claims 8-11, wherein determining the execution status of the policy control network element for the first event based on the first information comprises:
if the first information further indicates that a second access network element executes the first event, determining that the policy control network element does not execute the first event, wherein the second access network element is an access network element after the terminal equipment is switched;
and if the first information further indicates that the second access network element does not execute the first event, determining that the policy control network element executes the first event, wherein the second access network element is the access network element after the terminal equipment is switched.
13. The method according to any one of claims 8-12, further comprising:
receiving fourth information, where the fourth information is used to indicate that a second access network element changes an execution state of the first event, where the second access network element is an access network element after the terminal device is switched;
And determining the execution state of the strategy control network element for the first event according to the fourth information.
14. The method according to any one of claims 8-13, further comprising:
adjusting the policy and charging control rule of the session corresponding to the terminal equipment in the slice; or adjusting the aggregation maximum bit rate of the session corresponding to the terminal equipment in the slice.
15. The method of any of claims 8-14, wherein the first event comprises:
an aggregate bit rate that is intended to be provided by a quality of service stream limited to a session, the quality of service stream comprising a non-guaranteed bit rate quality of service stream and/or a guaranteed bit rate quality of service stream, the session comprising part or all of the session in the slice that is served by the terminal device.
16. A method of communication, comprising:
and after the terminal equipment is switched to the access network element, sending second information, wherein the second information is used for indicating the execution state of the access network element for a first event, the first event is limiting the transmission rate of the terminal equipment in a slice according to the maximum bit rate, and the execution state of the first event comprises executing or not executing the first event.
17. A communication device, comprising:
a processing module, configured to determine, after a terminal device is switched from a first access network element to a second access network element, that an execution state of the second access network element for a first event is different from the first access network element, where the first event is that a transmission rate of the terminal device in a slice is limited according to a maximum bit rate, and the execution state of the first event includes executing the first event or not executing the first event;
and the receiving and transmitting module is used for transmitting first information, and the first information is used for indicating the access network element to change the execution state of the first event.
18. A communication device, comprising:
the receiving and transmitting module is used for acquiring first information, wherein the first information is used for indicating the change of the execution state of the access network element for a first event, the first event is to limit the transmission rate of the terminal equipment in a slice according to the maximum bit rate, and the execution state of the first event comprises the execution of the first event or the non-execution of the first event;
and the processing module is used for determining the execution state of the strategy control network element for the first event according to the first information.
19. A communication device, comprising: a processor and a memory; the memory is configured to store one or more computer programs, the one or more computer programs comprising computer-executable instructions that, when executed by the communication device, cause the communication device to perform the method of any of claims 1-16.
20. A computer readable storage medium, characterized in that the storage medium has stored therein a computer program or instructions which, when executed by a communication device, implement the method of any of claims 1-16.
CN202210095867.4A 2022-01-26 2022-01-26 Communication method and device Pending CN116546564A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202210095867.4A CN116546564A (en) 2022-01-26 2022-01-26 Communication method and device
PCT/CN2022/138409 WO2023142726A1 (en) 2022-01-26 2022-12-12 Communication method and apparatus

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210095867.4A CN116546564A (en) 2022-01-26 2022-01-26 Communication method and device

Publications (1)

Publication Number Publication Date
CN116546564A true CN116546564A (en) 2023-08-04

Family

ID=87445780

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210095867.4A Pending CN116546564A (en) 2022-01-26 2022-01-26 Communication method and device

Country Status (2)

Country Link
CN (1) CN116546564A (en)
WO (1) WO2023142726A1 (en)

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9485506B2 (en) * 2012-09-11 2016-11-01 Texas Instruments Incorporated Method and system for constraining slice header processing overhead in video coding
CN107360597A (en) * 2016-05-10 2017-11-17 中国移动通信有限公司研究院 A kind of rate adjusting method, Wireless Communication Equipment and terminal device
CN113556793B (en) * 2020-04-26 2023-03-24 中国电信股份有限公司 non-GBR data transmission control method, system, SMF and user terminal
CN113329429B (en) * 2021-06-08 2022-06-21 安科讯(福建)科技有限公司 Rate scheduling method and terminal

Also Published As

Publication number Publication date
WO2023142726A1 (en) 2023-08-03

Similar Documents

Publication Publication Date Title
US11381956B2 (en) Obtaining of UE policy
US11564284B2 (en) Communication method, apparatus, and system for determining a target user plan function entity
KR102224248B1 (en) Method for establishing protocol data unit in communication system
US11528591B2 (en) Network slicing-based communication method and network slicing-based communications apparatus
CN113767672B (en) Mobile communication core network apparatus and method for managing wireless communication after inserting an intermediate session management function
US20200252837A1 (en) Method for checking change in wireless connection type of terminal in third-party application server
US20220345996A1 (en) Method and device for management and access control of network slice in wireless communication system
EP3913982A1 (en) Network slicing with a radio access network node
US20230164523A1 (en) Communication Method, Device, and System
KR20220044341A (en) Method and device for determining security protection mode
CN114423074A (en) Communication method and device
CN114731604A (en) Method and apparatus for improving network slice control accuracy in a wireless communication system
EP4207828A1 (en) Data communication method and communication apparatus
WO2023213177A1 (en) Communication method and apparatus
WO2022179367A1 (en) New method for external parameter provisioning for an af session
KR20220015350A (en) Method and apparatus for supporting network slicing interworking
CN115734282A (en) Method and device for processing service quality and communication system
CN116546564A (en) Communication method and device
EP4387379A1 (en) Communication method and apparatus
WO2023143212A1 (en) Communication method and apparatus
WO2024082880A1 (en) Communication method and apparatus
US20240155418A1 (en) Method and apparatus for connecting qos flow based terminal in wireless communication system
WO2024032654A1 (en) Positioning method and apparatus, and storage medium
US20240224147A1 (en) Apparatus and method for inter-plmn handover of home routed session in wireless communication system
WO2023197737A1 (en) Message sending method, pin management method, communication apparatus, and communication system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination