CN116866965A - Backup method, communication device and communication system - Google Patents

Backup method, communication device and communication system Download PDF

Info

Publication number
CN116866965A
CN116866965A CN202210312475.9A CN202210312475A CN116866965A CN 116866965 A CN116866965 A CN 116866965A CN 202210312475 A CN202210312475 A CN 202210312475A CN 116866965 A CN116866965 A CN 116866965A
Authority
CN
China
Prior art keywords
network element
core network
backup
backup information
data management
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210312475.9A
Other languages
Chinese (zh)
Inventor
杨娇
蓝彧文
李华
王斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN202210312475.9A priority Critical patent/CN116866965A/en
Priority to PCT/CN2022/136249 priority patent/WO2023185062A1/en
Publication of CN116866965A publication Critical patent/CN116866965A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/04Arrangements for maintaining operational condition

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the application provides a backup method, a communication device and a communication system. In the method, the backup information sent by the core network element to the data management network element not only comprises the information for indicating the backup network element of the core network element, but also comprises the effective time of the backup information, so that the timely update of the backup network element of the core network element stored in the data management network element can be ensured, the effectiveness of the backup network element of the core network element stored in the data management network element can be ensured, the error or expired backup network element of the core network element stored in the data management network element can be avoided, the data management network element can provide the correct and effective backup network element information of the core network element to the outside, the backup network element can be accurately and efficiently used, and the stability and service continuity of the network can be improved.

Description

Backup method, communication device and communication system
Technical Field
The embodiment of the application relates to the technical field of communication, in particular to a backup method, a communication device and a communication system.
Background
Taking the core network of the fifth generation (5th generation,5G) communication network as an example, if the core network element fails or the core network element is overloaded during the use, the core network element cannot be used.
In order to ensure normal service provision of the user, a backup network element of the core network element is generally set in the core network, and when the core network element cannot be used normally, the backup network element of the core network element is used for continuously providing service for the user.
In this case, how to accurately and efficiently use the backup network element is to be solved.
Disclosure of Invention
The embodiment of the application provides a backup method, a communication device and a communication system, which are used for realizing accurate and efficient use of backup network elements.
In a first aspect, an embodiment of the present application provides a backup method, which may be performed by a core network element or a module (e.g. a chip) applied to the core network element. Taking the core network element to execute the method as an example, the method comprises the following steps: the method comprises the steps that a core network element sends first backup information of the core network element to a data management network element, wherein the first backup information comprises first effective time of the first backup information and first indication information used for indicating the first backup network element of the core network element, and the first backup information is effective in the first effective time; the core network element sends second backup information to the data management network element according to the first effective time, wherein the second backup information comprises second indication information for indicating the second backup network element of the core network element and second effective time of the second backup information, and the second backup information is effective in the second effective time.
According to the scheme, the backup information sent by the core network element to the data management network element not only comprises the information for indicating the backup network element of the core network element, but also comprises the effective time of the backup information, so that the timely update of the backup network element of the core network element stored in the data management network element can be ensured, the effectiveness of the backup network element of the core network element stored in the data management network element can be ensured, the error or expired backup network element of the core network element stored in the data management network element can be avoided, the data management network element can provide the correct and effective backup network element information of the core network element to the outside, the backup network element can be accurately and efficiently used, and the stability and service continuity of the network can be improved.
In a possible implementation method, the core network element sends second backup information to the data management network element according to the first valid time, including: the core network element determines that the first effective time is overtime and sends the second backup information to the data management network element.
According to the scheme, when the first effective time of the first backup information is overtime, the core network element is triggered to send updated backup information to the data management network element, so that the updated backup information can be timely sent to the data management network element, and the effectiveness of the backup information stored by the data management network element is ensured.
In a possible implementation method, the core network element sends second backup information to the data management network element according to the first valid time, including: the core network element determines that a first time length remains after the first effective time is overtime and the first time length is smaller than a first threshold value, and sends the second backup information to the data management network element.
According to the scheme, the core network element sends updated backup information to the data management network element within a period of time before the first effective time of the first backup information is overtime, so that the updated backup information can be timely sent to the data management network element, and the effectiveness of the backup information stored by the data management network element is ensured.
In a possible implementation method, the core network element determines the first validity time according to a network load.
According to the scheme, the first effective time is determined according to the network load, so that the proper and accurate effective time can be ensured to be determined, and the network performance can be improved.
In a possible implementation method, the method further includes: and receiving pre-configuration information from a network manager, wherein the pre-configuration information comprises the first effective time. In other words, the first validity time is configured by the network manager.
In a possible implementation method, the first valid time is negotiated between the core network element and the data management network element.
According to the scheme, the first effective time is determined through the negotiation between the core network element and the data management network element, so that the proper and accurate effective time can be ensured to be determined, and the network performance can be improved.
In a possible implementation method, the core network element is a mobility management network element, a session management network element, a user plane network element or a policy control network element.
In a second aspect, an embodiment of the present application provides a backup method, which may be performed by a core network element or a module (e.g. a chip) applied to the core network element. Taking the core network element to execute the method as an example, the method comprises the following steps: the method comprises the steps that a core network element sends first backup information of the core network element to a data management network element, wherein the first backup information comprises first effective time of the first backup information and first indication information used for indicating the first backup network element of the core network element, and the first backup information is effective in the first effective time; the core network element receives a request message from the data management network element, wherein the request message requests to update the first backup information; the core network element sends second backup information to the data management network element, wherein the second backup information comprises second indication information for indicating the second backup network element of the core network element and second effective time of the second backup information, and the second backup information is effective in the second effective time.
According to the scheme, the backup information sent by the core network element to the data management network element not only comprises the information for indicating the backup network element of the core network element, but also comprises the effective time of the backup information, so that the timely update of the backup network element of the core network element stored in the data management network element can be ensured, the effectiveness of the backup network element of the core network element stored in the data management network element can be ensured, the error or expired backup network element of the core network element stored in the data management network element can be avoided, the data management network element can provide the correct and effective backup network element information of the core network element to the outside, the backup network element can be accurately and efficiently used, and the stability and service continuity of the network can be improved.
In a possible implementation method, the core network element determines the first validity time according to a network load.
According to the scheme, the first effective time is determined according to the network load, so that the proper and accurate effective time can be ensured to be determined, and the network performance can be improved.
In a possible implementation method, the method further includes: and receiving pre-configuration information from a network manager, wherein the pre-configuration information comprises the first effective time. In other words, the first validity time is configured by the network manager.
In a possible implementation method, the first valid time is negotiated between the core network element and the data management network element.
According to the scheme, the first effective time is determined through the negotiation between the core network element and the data management network element, so that the proper and accurate effective time can be ensured to be determined, and the network performance can be improved.
In a possible implementation method, the core network element is a mobility management network element, a session management network element, a user plane network element or a policy control network element.
In a third aspect, an embodiment of the present application provides a backup method, which may be performed by a core network element or a module (e.g. a chip) applied to the core network element. Taking the core network element to execute the method as an example, the method comprises the following steps: the method comprises the steps that a core network element sends first backup information of the core network element to a data management network element, wherein the first backup information comprises first effective time of the first backup information and first indication information used for indicating the first backup network element of the core network element, and the first backup information is effective in the first effective time; the core network element determines that an update period arrives or a network load changes, and sends second backup information to the data management network element, wherein the second backup information comprises second effective time of the second backup information and second indication information for indicating the second backup network element of the core network element, and the second backup information is effective in the second effective time.
According to the scheme, the backup information sent by the core network element to the data management network element not only comprises the information for indicating the backup network element of the core network element, but also comprises the effective time of the backup information, so that the timely update of the backup network element of the core network element stored in the data management network element can be ensured, the effectiveness of the backup network element of the core network element stored in the data management network element can be ensured, the error or expired backup network element of the core network element stored in the data management network element can be avoided, the data management network element can provide the correct and effective backup network element information of the core network element to the outside, the backup network element can be accurately and efficiently used, and the stability and service continuity of the network can be improved.
In a possible implementation method, the core network element determines the first validity time according to a network load.
In one possible implementation, the first validity time is obtained from pre-configuration information from the network manager.
In a possible implementation method, the first valid time is negotiated between the core network element and the data management network element.
According to the scheme, the first effective time is determined according to the network load, so that the proper and accurate effective time can be ensured to be determined, and the network performance can be improved.
According to the scheme, the first effective time is determined through the negotiation between the core network element and the data management network element, so that the proper and accurate effective time can be ensured to be determined, and the network performance can be improved.
In a possible implementation method, the core network element is a mobility management network element, a session management network element, a user plane network element or a policy control network element.
In a fourth aspect, embodiments of the present application provide a backup method, which may be performed by a data management network element or a module (e.g., a chip) applied to the data management network element. Taking the data management network element as an example, the method comprises the following steps: the data management network element receives first backup information of the core network element from the core network element, wherein the first backup information comprises first effective time of the first backup information and first indication information for indicating the first backup network element of the core network element, and the first backup information is effective in the first effective time; the data management network element receives second backup information from the core network element, wherein the second backup information comprises second indication information for indicating the second backup network element of the core network element and second effective time of the second backup information, and the second backup information is effective in the second effective time.
According to the scheme, the backup information sent by the core network element to the data management network element not only comprises the information for indicating the backup network element of the core network element, but also comprises the effective time of the backup information, so that the timely update of the backup network element of the core network element stored in the data management network element can be ensured, the effectiveness of the backup network element of the core network element stored in the data management network element can be ensured, the error or expired backup network element of the core network element stored in the data management network element can be avoided, the data management network element can provide the correct and effective backup network element information of the core network element to the outside, the backup network element can be accurately and efficiently used, and the stability and service continuity of the network can be improved.
In a possible implementation method, the method further includes: and receiving pre-configuration information from a network manager, wherein the pre-configuration information comprises the first effective time. In other words, the first validity time is configured by the network manager.
In a possible implementation method, the first valid time is negotiated between the core network element and the data management network element.
According to the scheme, the first effective time is determined through the negotiation between the core network element and the data management network element, so that the proper and accurate effective time can be ensured to be determined, and the network performance can be improved.
In a possible implementation method, the core network element is a mobility management network element, a session management network element, a user plane network element or a policy control network element.
In a fifth aspect, embodiments of the present application provide a backup method, which may be performed by a data management network element or a module (e.g., a chip) applied to the data management network element. Taking the data management network element as an example, the method comprises the following steps: the data management network element receives first backup information of the core network element from the core network element, wherein the first backup information comprises first effective time of the first backup information and first indication information for indicating the first backup network element of the core network element, and the first backup information is effective in the first effective time; the data management network element sends a request message to the core network element according to the first effective time, wherein the request message requests to update the first backup information; the data management network element receives second backup information of the core network element from the core network element, wherein the second backup information comprises second effective time of the second backup information and second indication information for indicating the second backup network element of the core network element, and the second backup information is effective in the second effective time.
According to the scheme, the backup information sent by the core network element to the data management network element not only comprises the information for indicating the backup network element of the core network element, but also comprises the effective time of the backup information, so that the timely update of the backup network element of the core network element stored in the data management network element can be ensured, the effectiveness of the backup network element of the core network element stored in the data management network element can be ensured, the error or expired backup network element of the core network element stored in the data management network element can be avoided, the data management network element can provide the correct and effective backup network element information of the core network element to the outside, the backup network element can be accurately and efficiently used, and the stability and service continuity of the network can be improved.
In a possible implementation method, the sending, by the data management network element, a request message to the core network element according to the first validity time includes: the data management network element determines that the first effective time is overtime and sends the request message to the core network element.
According to the scheme, when the first effective time of the first backup information is overtime, the data management network element is triggered to send the request message for requesting to update the backup information to the core network element, so that the data management network element can timely receive the updated backup information, and the validity of the backup information stored by the data management network element is ensured.
In a possible implementation method, the sending, by the data management network element, a request message to the core network element according to the first validity time includes: the data management network element determines that a first time length remains from the first valid time timeout and is less than a first threshold, and sends the request message to the core network element.
According to the scheme, the data management network element sends the request message for requesting to update the backup information to the core network element within a period of time before the first effective time of the first backup information is overtime, so that the data management network element can timely receive the updated backup information, and the validity of the backup information stored by the data management network element is ensured.
In a possible implementation method, the method further includes: and receiving pre-configuration information from a network manager, wherein the pre-configuration information comprises the first effective time. In other words, the first validity time is configured by the network manager.
In a possible implementation method, the first valid time is negotiated between the core network element and the data management network element.
According to the scheme, the first effective time is determined through the negotiation between the core network element and the data management network element, so that the proper and accurate effective time can be ensured to be determined, and the network performance can be improved.
In a possible implementation method, the first validity time is determined by the core network element according to a network load.
According to the scheme, the first effective time is determined according to the network load, so that the proper and accurate effective time can be ensured to be determined, and the network performance can be improved.
In a possible implementation method, the core network element is a mobility management network element, a session management network element, a user plane network element or a policy control network element.
In a sixth aspect, an embodiment of the present application provides a communication device, which may be a core network element or a module (e.g. a chip) applied in the core network element. The apparatus has a function of implementing any implementation method of the first to third aspects. The functions can be realized by hardware, and can also be realized by executing corresponding software by hardware. The hardware or software includes one or more modules corresponding to the functions described above.
In a seventh aspect, embodiments of the present application provide a communication device, which may be a data management network element or a module (e.g. a chip) applied in the data management network element. The apparatus has a function of implementing any implementation method of the fourth or fifth aspect. The functions can be realized by hardware, and can also be realized by executing corresponding software by hardware. The hardware or software includes one or more modules corresponding to the functions described above.
In an eighth aspect, an embodiment of the present application provides a communication apparatus, including a processor and a memory; the memory is configured to store computer instructions that, when executed by the apparatus, cause the apparatus to perform any of the implementation methods of the first to fifth aspects.
In a ninth aspect, embodiments of the present application provide a communications device comprising means for performing the steps of any implementation method of the first to fifth aspects described above.
In a tenth aspect, an embodiment of the present application provides a communication device, including a processor and an interface circuit, where the processor is configured to communicate with other devices through the interface circuit, and perform any implementation method of the first aspect to the fifth aspect. The processor includes one or more.
In an eleventh aspect, an embodiment of the present application provides a communication device, including a processor coupled to a memory, where the processor is configured to invoke a program stored in the memory to perform any implementation method of the first aspect to the fifth aspect. The memory may be located within the device or may be located external to the device. And the processor may be one or more.
In a twelfth aspect, embodiments of the present application further provide a computer-readable storage medium having instructions stored therein that, when executed on a communication device, cause any implementation method of the first to fifth aspects described above to be performed.
In a thirteenth aspect, embodiments of the present application also provide a computer program product comprising a computer program or instructions which, when executed by a communication device, cause any of the implementation methods of the first to fifth aspects described above to be performed.
In a fourteenth aspect, an embodiment of the present application further provides a chip system, including: a processor configured to perform any implementation method of the first to fifth aspects.
In a fifteenth aspect, an embodiment of the present application further provides a communication system, including: a core network element for performing any of the implementation methods of the first aspect described above, and a data management network element for performing any of the implementation methods of the fourth aspect described above.
In a sixteenth aspect, an embodiment of the present application further provides a communication system, including: a core network element for performing any of the implementation methods of the second aspect described above, and a data management network element for performing any of the implementation methods of the fifth aspect described above.
In a seventeenth aspect, an embodiment of the present application further provides a communication system, including: a data management network element and a core network element for performing any of the implementation methods of the third aspect described above. And the data management network element is used for receiving the first backup information from the core network element and receiving the second backup information from the core network element.
Drawings
FIG. 1 is a schematic diagram of a 5G network architecture based on a servitization architecture;
FIG. 2 (a) is a schematic flow chart of a backup method according to an embodiment of the present application;
FIG. 2 (b) is a schematic flow chart of a backup method according to an embodiment of the present application;
FIG. 2 (c) is a schematic flow chart of a backup method according to an embodiment of the present application;
fig. 3 is a schematic diagram of a communication device according to an embodiment of the present application;
fig. 4 is a schematic diagram of a communication device according to an embodiment of the present application.
Detailed Description
Fig. 1 is a schematic diagram of a 5G network architecture based on a servitization architecture. The 5G network architecture shown in fig. 1 may include a terminal device, an access network, a core network, and a data network. The terminal device accesses a Data Network (DN) through an access network and a core network.
The terminal device may be a User Equipment (UE), a mobile station, a mobile terminal, or the like. Fig. 1 illustrates an example of a terminal device as a UE. The terminal device may be widely applied to various scenes, for example, device-to-device (D2D), vehicle-to-device (vehicle to everything, V2X) communication, machine-type communication (MTC), internet of things (internet of things, IOT), virtual reality, augmented reality, industrial control, autopilot, telemedicine, smart grid, smart furniture, smart office, smart wear, smart transportation, smart city, and the like. The terminal equipment can be a mobile phone, a tablet personal computer, a computer with a wireless receiving and transmitting function, a wearable device, a vehicle, an urban air vehicle (such as an unmanned aerial vehicle, a helicopter and the like), a ship, a robot, a mechanical arm, intelligent household equipment and the like. The following description will be given with the UE as one example of the terminal device, and the UE appearing anywhere later may be replaced with the terminal device or other examples of the terminal device.
The access network is used for realizing the function related to access, can provide the network access function for authorized users in a specific area, and can determine transmission links with different qualities according to the level of the users, the service requirements and the like so as to transmit user data. The access network forwards control signals and user data between the UE and the core network. The access network may include access network devices, which may be devices providing access to UEs, and may include radio access network (radio access network, RAN) devices and wired access network devices. Fig. 1 is a depiction of an access network device as an example RAN. The RAN device is mainly responsible for radio resource management, quality of service (quality of service, qoS) management, data compression, encryption, and other functions on the air interface side. The RAN equipment may include various forms of base stations, such as macro base stations, micro base stations (also referred to as small stations), relay stations, access points, balloon stations, and the like. In systems employing different radio access technologies, the names of the base station enabled devices may vary, for example, in 5G systems, referred to as RAN or next-generation base stations (gNB), in long term evolution (long term evolution, LTE) systems, referred to as evolved nodebs (enbs or enodebs).
The access network device and the UE may be fixed in location or may be mobile. Access network devices and UEs may be deployed on land, including indoor or outdoor, hand-held or vehicle-mounted; the device can be deployed on the water surface; but also on aerial planes, balloons and satellites. The embodiment of the application does not limit the application scene of the access network equipment and the UE.
The core network is responsible for maintaining subscription data of the mobile network and providing session management, mobility management, policy management, security authentication and other functions for the UE. Including but not limited to one or more of the following: an application function (application function, AF) network element, a unified data management (unified data management, UDM) network element, a unified database (unified data repository, UDR) network element, a policy control function (policy control function, PCF) network element, a session management function (session management function, SMF) network element, an access and mobility management function (access and mobility management function, AMF) network element, a network storage function (network repository function, NRF) network element, an authentication server function (authentication server function, AUSF) network element, a network opening function (network exposure function, NEF) network element, a user plane function (user plane function, UPF) network element. For convenience of description, for example, hereinafter, the unified data management network element is simply referred to as UDM, and other network elements are similar.
AMF is mainly responsible for mobility management in mobile networks, such as user location update, user registration network, user handover, etc.
SMF is mainly responsible for session management in mobile networks, e.g. session establishment, modification, release. Specific functions are, for example, assigning internet protocol (internet protocol, IP) addresses to users, selecting a UPF that provides a message forwarding function, etc.
UPF is mainly responsible for forwarding and receiving user data, can receive the user data from a data network and transmits the user data to UE through access network equipment; user data may also be received from the UE through the access network device and forwarded to the data network.
UDM comprising functions of performing management of subscription data, user access authorization, etc.
UDR includes access functions for executing data of the subscription data, policy data, application data, and the like.
NEF, mainly used to support the opening of capabilities and events.
AF, delivering the demands of the application side on the network side, e.g. QoS demands or user status event subscriptions, etc. The AF may be a third party functional entity or an application service deployed by an operator, such as an IP multimedia subsystem (IP Multimedia Subsystem, IMS) voice call service.
PCF mainly supports providing unified policy framework to control network behavior, providing policy rules to control layer network function, and meanwhile is responsible for acquiring user subscription information related to policy decision. The PCF may provide policies, such as QoS policies, slice selection policies, etc., to the AMF or SMF.
NRF can be used for providing network element discovery function and providing network element information corresponding to network element types based on the requests of other network elements. NRF also provides network element management services such as network element registration, update, deregistration, and network element state subscription and push.
AUSF network element, responsible for authenticating UE, verifying the validity of UE.
DN, on which multiple services can be deployed, can provide data and/or voice services for the UE. For example, the DN is a private network of some intelligent plant, the sensors installed in the plant of the intelligent plant may be UEs, the DN may deploy control servers of the sensors, and the control servers may service the sensors. The sensor may communicate with the control server, obtain instructions from the control server, transmit collected sensor data to the control server, etc., according to the instructions. For another example, the DN is an internal office network of a company, and the mobile phone or computer of the staff of the company may be UE, and the mobile phone or computer of the staff may access information, data resources, etc. on the internal office network of the company.
Nausf, nnef, nnrf, namf, npcf, nsmf, nudm, nudr, naf in fig. 1 are service interfaces provided by AUSF, NEF, NRF, AMF, PCF, SMF, UDM, UDR, AF, respectively, for invoking corresponding service operations. N1, N2, N3, N4, and N6 are interface serial numbers, and the meaning of these interface serial numbers is as follows:
1) N1: the interface between the AMF and the UE may be used to communicate non-access stratum (non access stratum, NAS) signaling (e.g., including QoS rules from the AMF) to the UE, etc.
2) N2: the interface between the AMF and the RAN may be used to transfer radio bearer control information from the core network side to the access network device, etc.
3) N3: the interface between RAN and UPF is mainly used for transferring the uplink and downlink user plane data between access network equipment and UPF.
4) N4: the interface between SMF and UPF can be used to transfer information between control plane and user plane, including control plane-oriented forwarding rule, qoS rule, flow statistics rule, etc. issuing and user plane information reporting.
5) N6: and the interface of the UPF and the DN is used for transmitting uplink and downlink user data streams between the UPF and the DN.
It will be appreciated that the network elements or functions described above may be either network elements in a hardware device, software functions running on dedicated hardware, or virtualized functions instantiated on a platform (e.g., a cloud platform). As a possible implementation method, the network element or the function may be implemented by one device, or may be implemented by a plurality of devices together, or may be a functional module in one device, which is not specifically limited by the embodiment of the present application.
SMF, PCF, AMF, UPF, UDM in the embodiment of the present application may be SMF, PCF, AMF, UPF, UDM in a 5G system, or may be a network element having the function of SMF, PCF, AMF, UPF, UDM in future communications, such as a 6G network, which is not limited in this aspect of the present application. In the embodiment of the present application, a session management network element, a policy control network element, a mobility management network element, a user plane network element, and a data management network element are described as examples SMF, PCF, AMF, UPF, UDM, respectively.
Fig. 2 (a) is a schematic flow chart of a backup method according to an embodiment of the present application. The core network element in the embodiment of the application can be AMF, SMF, PCF, UPF or the like, and can be classified as a first type core network element; the data management network element may be a UDM or the like. For example, the method may comprise the steps of:
step 201a, the core network element sends first backup information of the core network element to the UDM.
The first backup information includes a first valid time of the first backup information, and first indication information for indicating the first backup network element of the core network element, where the first backup information is valid in the first valid time.
In the embodiment of the present application, the effective time of the backup information may also be referred to as aging time and duration time of the backup information, which are not described in detail later.
In one implementation method, if the first backup information is backup information of the core network element that is first sent by the core network element to the UDM, the core network element may send the first backup information to the UDM with the first backup information carried in the registration request message. In the application, the core network element is AMF, and the registration request message can be an Amf3GppAccess registration message.
The first backup network element and the core network element are the same type of network element, and the first backup network element may be one or more. For example, the core network element is AMF1, the first backup network element includes AMF2, or includes AMF2 and AMF3, or includes AMF2, AMF3 and AMF4, and so on. As another example, the core network element is SMF1, the first backup network element comprises SMF2, or comprises SMF2 and SMF3, or comprises SMF2, SMF3 and SMF4, and so on.
The first indication information is used for indicating the first backup network element. In one implementation, the first indication is a fully qualified domain name (fully qualified domain name, FQDN). For example, the core network element is AMF1, the first indication information is FQDN1, and the FQDN1 indicates AMF2 and AMF3, which indicates that the backup network element of AMF1 includes AMF2 and AMF3. For another example, the core network element is AMF1, the first indication information is FQDN2, and the FQDN2 indicates AMF3 and AMF5, which indicates that the backup network element of AMF1 includes AMF3 and AMF5. In another implementation method, the first indication information is a first backup network element. For example, the core network element is AMF1, and the backup network element of AMF1 includes AMF2 and AMF3, then the first indication information includes identification information of AMF2 and identification information of AMF3. For another example, the core network element is AMF1, and the backup network element of AMF1 includes AMF3 and AMF5, then the first indication information includes identification information of AMF3 and identification information of AMF5.
In one implementation, the first validity time is a time period, such as 30 days, indicating that the first backup information is valid within 30 days after the UDM receives the first backup information. In another implementation, the first validity time is an expiration time indicating that the first backup information is valid before the expiration time is reached. In yet another implementation, the first effective time may be first effective time information, and the first effective time information may be a timer. For example, the first backup information is valid before the timer expires, which may be started by the core network element before the first backup information is sent, or after the UDM receives the first backup information.
In an implementation method, the method further includes: and receiving pre-configuration information from a network manager, wherein the pre-configuration information comprises the first effective time. In other words, the first validity time is configured by the network manager. For example, the network manager configures the first effective time for the core network element according to the current load condition of the core network element, or the network manager selects a default time as the first effective time for the core network element, or the network manager randomly or based on a preset rule selects an effective time from the plurality of candidate effective times as the first effective time.
In yet another implementation method, the first valid time is negotiated by the core network element and the UDM, for example, the UDM sends a plurality of candidate valid times to the core network element in advance, and the core network element determines one valid time from the plurality of candidate valid times as the first valid time according to the local policy. The local policy may be one selected from a plurality of candidate valid times randomly, or one selected from a plurality of candidate valid times sequentially in a certain order, or may be other policies, which are not limited by the embodiment of the present application.
In yet another implementation method, the core network element determines the first validity time according to a network load. For example, when the network load is less than or equal to the network load threshold (or the traffic in the network is less than or equal to the traffic threshold), the first effective time is greater than or equal to the duration 1; when the network load is greater than the load threshold (or the traffic in the network is greater than the traffic threshold), the first effective time is less than the duration 1, and the lighter the network load (or the traffic in the network is less), the longer the first effective time, the heavier the network load (or the traffic in the network is greater), and the shorter the first effective time, so as to update the backup information of the core network element in time.
For example, when the core network element is AMF1, the expression form of the first backup information may be as follows:
in the above example, GUAMI is a globally unique access and mobility management function identification (Globally Unique AMF Identifier) for short. GUAMI-1 can be identification information of AMF1, and backup AmfInfo is first backup information. The FQDN1 may be first indication information, which is used to indicate a backup network element of the AMF 1. The guaamilist contains identification information of the AMFs to be backed up, that is, the AMFs in the guaamilist need to be backed up, and the backup network element of each AMF in the guaamilist includes an AMF indicated by FQDN1, where the guaamilist at least contains identification information of AMF1, that is, GUAMI-1, which indicates that the network element indicated by FQDN1 is a backup network element of AMF 1. Optionally, the guiamilist may further include identification information of other AMFs, for example, further includes identification information of AMF3 (indicated by guimi-3), which indicates that the network element indicated by FQDN1 is also a backup network element of AMF3, that is, the backup network element of AMF1 and the backup network element of AMF3 are both network elements indicated by FQDN 1. Therefore, in some application scenarios, multiple AMFs may be backed up by one backup information (i.e., backup amfnfo), so as to save signaling overhead and improve backup efficiency. The Timer may be a Timer, and the duration of the Timer is the first valid time, specifically 30 days.
Step 202a, the core network element sends second backup information to the UDM according to the first validity time.
The second backup information includes second indication information for indicating a second backup network element of the core network element and a second valid time of the second backup information, and the second backup information is valid in the second valid time. The second valid time may be the same as the first valid time or different from the first valid time, which is not limited in this embodiment. The second indication information may be the same as or different from the first indication information, and the embodiment is not limited.
Regarding the meaning and implementation method of the second effective time, the meaning and implementation method of the second backup network element, and the meaning and implementation method of the second indication information, which are similar to the meaning and implementation method of the first effective time, the meaning and implementation method of the first backup network element, and the meaning and implementation method of the first indication information, respectively, the foregoing description may be referred to, and redundant description is omitted.
And the core network element sends second backup information to the UDM according to the first effective time, which indicates that the first effective time arrives or is about to arrive, and the core network element is triggered to send the second backup information to the UDM.
The core network element determines that the first effective time is overtime, and sends second backup information to the UDM. For example, the first validity time is 30 days, and when the core network element sends the first backup information to the UDM for 30 days or more, the core network element re-determines the second backup information and sends the second backup information to the UDM.
In another implementation method, the core network element determines that a first time length remains after the first valid time is overtime and the first time length is smaller than a first threshold value, and sends second backup information to the UDM. For example, the first threshold is preset to be 1 day, assuming that the first effective time is 30 days, when the core network element sends the first backup information to the UDM for 29 days or more, the core network element re-determines the second backup information and sends the second backup information to the UDM.
According to the scheme, the core network element determines that the effective time of the backup information sent to the UDM last time meets the preset condition (such as overtime or the residual time of the distance overtime is smaller than the first threshold), the core network element is triggered to resend the backup information to the UDM, the backup information sent to the UDM by the core network element not only comprises the information for indicating the backup network element of the core network element, but also comprises the effective time of the backup information, timely update of the backup network element of the core network element stored by the UDM can be ensured, the validity of the backup network element stored in the UDM is ensured, the error or outdated backup network element of the core network element stored by the UDM is avoided, the UDM can provide correct and effective backup network element information of the core network element outwards, and the backup network element is accurately and efficiently used, so that the stability and service continuity of a network are improved. If the effective time is not available, the validity of the backup information cannot be ensured, so that the subsequent error possibly occurs, the network is unstable or the service is interrupted, the resource waste is caused, and the service experience of the user is reduced.
Step 201a and step 202a are described below in connection with specific examples.
For example, in step 201a, the AMF1 sends first backup information to the UDM, where the first backup information is backup information 1, the backup information 1 includes FQDN1 and effective time 1, the FQDN1 indicates that the backup network elements of the AMF1 are AMF2 and AMF3, and the UDM stores the correspondence between the AMF1 and the backup information 1.
When the backup network element of AMF1 changes, for example, updates to AMF3 and AMF4, the information of the backup network element stored in AMF1 is information of AMF3 and information of AMF4, and in the set duration after or before the timeout of the valid time 1, in step 202a, AMF1 may send second backup information to UDM, where the second backup information is backup information 2, where the backup information 2 includes FQDN2 and valid time 2, where the FQDN2 indicates that the backup network element of AMF1 is AMF3 and AMF4, where the valid time 2 may be the same as or different from the valid time 1, and the UDM stores the correspondence between AMF1 and backup information 2. Therefore, the backup network element stored in the UDM can be updated in time.
Subsequently, if the AMF1 fails or is overloaded, and the service object (such as the base station 1) of the AMF1 requests to allocate other AMF network elements to the UDM again, the UDM will provide the information of the AMF1 or the information of the AMF2 to the base station 1, so as to provide the correct information of the AMF for the base station 1, and improve network stability, service continuity and service experience of the user.
It should be noted that, in the embodiment of the present application, the description is given by taking the core network element as an example of the AMF, where the core network element may also be an SMF, PCF, UPF, or the like, and specific implementation manner may refer to the description that the core network element is the AMF, which is not repeated.
Fig. 2 (b) is a flow chart of a backup method provided in an embodiment of the present application, where the method may be performed by a core network element and a UDM, and the core network element in the embodiment of the present application is not limited, and for example, the core network element may be AMF, SMF, PCF or UPF. For example, in connection with fig. 2 (a), the method may comprise the steps of:
step 201b, the core network element sends first backup information of the core network element to the UDM.
This step 201b, like step 201a of fig. 2 (a) described above, may be referred to as described above.
Step 202b, the udm sends a request message to the core network element according to the first validity time, the request message requesting to update the first backup information.
The request message may also be referred to as an update message or an update request message.
The UDM sends a request message to the core network element according to the first effective time, which indicates that the first effective time arrives or is about to arrive, and the UDM is triggered to send the request message to the core network element. In one implementation, the UDM sends the second backup information to the UDM if the UDM determines that the first validity time has expired. For example, the first validity time is 30 days, and when the core network element sends the first backup information to the UDM for 30 days or more, the UDM sends a request message to the core network element to request to send updated backup information. In another implementation method, if the UDM determines that the first time length remains after the first valid time is out and the first time length is smaller than the first threshold, the UDM sends a request message to the core network element. For example, the first threshold is preset to be 1 day, and assuming that the first valid time is 30 days, when the core network element sends the first backup information to the UDM for 29 days or more, the UDM sends a request message to the core network element to request to send updated backup information.
Step 203b, the core network element sends the second backup information to the UDM according to the request message.
The second backup information includes second indication information for indicating a second backup network element of the core network element and a second valid time of the second backup information, and the second backup information is valid in the second valid time. The second valid time may be the same as the first valid time or different from the first valid time, which is not limited in this embodiment. The second indication information may be the same as or different from the first indication information, and the embodiment is not limited.
Regarding the meaning and implementation method of the second effective time, the meaning and implementation method of the second backup network element, and the meaning and implementation method of the second indication information, which are similar to the meaning and implementation method of the first effective time, the meaning and implementation method of the first backup network element, and the meaning and implementation method of the first indication information, respectively, the foregoing description may be referred to, and redundant description is omitted.
The beneficial effects brought by the above-described solution may be referred to the effective effects of the embodiment of fig. 2 (a). In the embodiment of fig. 2 (b), the request message from the UDM for requesting to update the backup information triggers the core network element to resend the backup information to the UDM, so that the core network element can be ensured to send the backup information to the UDM at a proper time, which is helpful for improving the backup efficiency.
Fig. 2 (c) is a flow chart of a backup method provided in an embodiment of the present application, where the method may be performed by a core network element and a UDM, and the core network element in the embodiment of the present application is not limited, and for example, the core network element may be AMF, SMF, PCF or UPF. For example, in connection with fig. 2 (a), the method may comprise the steps of:
step 201c, the core network element sends first backup information of the core network element to the UDM.
This step 201c, like step 201a of fig. 2 (a) described above, may be referred to as described above.
Step 202c, the core network element determines that an update period arrives or a network load changes, and sends second backup information to the UDM.
The update period refers to a period of updating the backup information of the core network element, for example, the update period is 10 days, which indicates that the core network element sends the updated backup information to the UDM regardless of whether the backup network element of the core network element changes. If the backup network element of the core network element changes when the update period arrives, the updated backup information carries the updated backup network element. If the backup network element of the core network element is unchanged when the transmission update period arrives, the backup network element transmitted last time is carried in the updated backup information.
The network load change may be that the change amount of the network load exceeds a preset threshold, the change amount of the network load may be used for measuring the change amount of traffic in the network or the change amount of the usage rate of devices in the network, or the network load change may be that the network load is greater than a first load threshold or lower than a second load threshold, and the first load threshold is greater than the second load threshold. And when the network load changes, triggering the core network element to update backup information to the UDM.
When the update period arrives or the network load changes, the core network element is triggered to send second backup information to the UDM, wherein the second backup information is updated backup information. The second backup information includes second indication information for indicating a second backup network element of the core network element and a second valid time of the second backup information, and the second backup information is valid in the second valid time. The second valid time may be the same as the first valid time or different from the first valid time, which is not limited in this embodiment. The second indication information may be the same as or different from the first indication information, and the embodiment is not limited.
Regarding the second valid time meaning and implementation method, the second backup network element meaning and implementation method, and the second indication information meaning and implementation method, which are similar to the first valid time meaning and implementation method, the first backup network element meaning and implementation method, and the first indication information meaning and implementation method, respectively, the foregoing description may be referred to, and redundant description is omitted.
The beneficial effects brought by the above-described solution may be referred to the effective effects of the embodiment of fig. 2 (a). In the embodiment of fig. 2 (c), when the update period arrives or the network load changes, the core network element is triggered to resend the backup information to the UDM, so that the core network element can determine the opportunity of resending the backup information to the UDM by itself, which is beneficial to realizing reasonable backup of the core network element, thereby improving the backup efficiency. It will be appreciated that, in order to implement the functions in the above embodiments, the core network element or the data management network element comprises corresponding hardware structures and/or software modules performing the respective functions. Those of skill in the art will readily appreciate that the various illustrative elements and method steps described in connection with the embodiments disclosed herein may be implemented as hardware or combinations of hardware and computer software. Whether a function is implemented as hardware or computer software driven hardware depends upon the particular application scenario and design constraints imposed on the solution.
Fig. 3 and fig. 4 are schematic structural diagrams of a possible communication device according to an embodiment of the present application. These communication devices may be used to implement the functions of the core network element or the data management network element in the above method embodiments, so that the beneficial effects of the above method embodiments may also be implemented. In the embodiment of the application, the communication device may be a core network element or a data management network element, or may be a module (such as a chip) applied to the core network element or a module (such as a chip) applied to the data management network element.
The communication device 300 shown in fig. 3 comprises a processing unit 310 and a transceiving unit 320. The communication device 300 is configured to implement the functions of the core network element or the data management network element in the above-described method embodiment.
When the communication device 300 is configured to implement the function of the core network element in the embodiment of fig. 2 (a), the transceiver unit 320 is configured to send, to a data management network element, first backup information of the core network element, where the first backup information includes a first valid time of the first backup information, and first indication information for indicating the first backup network element of the core network element, where the first backup information is valid in the first valid time; the processing unit 310 is configured to send, according to the first valid time, second backup information to the data management network element through the transceiver unit 320, where the second backup information includes second indication information for indicating a second backup network element of the core network element and a second valid time of the second backup information, and the second backup information is valid in the second valid time.
In a possible implementation method, the processing unit 310 is configured to determine that the first valid time is out, and send, through the transceiver unit 320, the second backup information to the data management network element.
In a possible implementation method, the processing unit 310 is configured to determine that the first period of time is longer than the first valid period of time and is smaller than the first threshold, and send, through the transceiver unit 320, the second backup information to the data management network element.
In a possible implementation, the processing unit 310 is configured to determine the first validity time according to a network load.
In one possible implementation, the first validity time is preconfigured.
In a possible implementation method, the first valid time is negotiated between the core network element and the data management network element.
In a possible implementation method, the core network element is a mobility management network element, a session management network element, a user plane network element or a policy control network element.
When the communication device 300 is configured to implement the function of the core network element in the embodiment of fig. 2 (b), the transceiver unit 320 is configured to send, to a data management network element, first backup information of the core network element, where the first backup information includes a first valid time of the first backup information, and first indication information for indicating the first backup network element of the core network element, where the first backup information is valid in the first valid time; receiving a request message from the data management network element, wherein the request message requests to update the first backup information; and sending second backup information to the data management network element, wherein the second backup information comprises second indication information for indicating a second backup network element of the core network element and second effective time of the second backup information, and the second backup information is effective in the second effective time.
In a possible implementation, the processing unit 310 is configured to determine the first validity time according to a network load.
In one possible implementation, the first validity time is preconfigured.
In a possible implementation method, the first valid time is negotiated between the core network element and the data management network element.
In a possible implementation method, the core network element is a mobility management network element, a session management network element, a user plane network element or a policy control network element.
When the communication device 300 is configured to implement the function of the core network element in the embodiment of fig. 2 (c), the transceiver unit 320 is configured to send, to a data management network element, first backup information of the core network element, where the first backup information includes a first valid time of the first backup information, and first indication information for indicating the first backup network element of the core network element, where the first backup information is valid in the first valid time; the processing unit 310 is configured to determine that an update period arrives or a network load changes, and send second backup information to the data management network element through the transceiver unit 320, where the second backup information includes a second valid time of the second backup information and second indication information for indicating a second backup network element of the core network element, and the second backup information is valid in the second valid time.
In a possible implementation, the processing unit 310 is configured to determine the first validity time according to a network load.
In one possible implementation, the first validity time is preconfigured.
In a possible implementation method, the first valid time is negotiated between the core network element and the data management network element.
In a possible implementation method, the core network element is a mobility management network element, a session management network element, a user plane network element or a policy control network element.
When the communication device 300 is configured to implement the function of the data management network element in the embodiment of fig. 2 (b), the transceiver unit 320 is configured to receive, from a core network element, first backup information of the core network element, where the first backup information includes a first valid time of the first backup information, and first indication information for indicating the first backup network element of the core network element, where the first backup information is valid within the first valid time; a processing unit 310, configured to send a request message to the core network element according to the first validity time, where the request message requests to update the first backup information; the transceiver unit 320 is configured to receive, from a core network element, second backup information of the core network element, where the second backup information includes a second valid time of the second backup information, and second indication information of the second backup network element for indicating the core network element, where the second backup information is valid in the second valid time.
In a possible implementation method, the processing unit 310 is configured to determine that the first validity time is out, and send, through the transceiver unit 320, the request message to the core network element.
In a possible implementation method, the processing unit 310 is configured to determine that the first time length remains after the first valid time is out and the first time length is smaller than the first threshold, and send the request message to the core network element through the transceiver unit 320.
In one possible implementation, the first effective time is preconfigured; the first effective time is obtained by negotiating the core network element and the data management network element; alternatively, the first validity time is determined by the core network element according to a network load.
In a possible implementation method, the core network element is a mobility management network element, a session management network element, a user plane network element or a policy control network element.
The more detailed descriptions of the processing unit 310 and the transceiver unit 320 may be directly obtained by referring to the related descriptions in the above method embodiments, and are not repeated herein.
The communication device 400 shown in fig. 4 includes a processor 410 and an interface circuit 420. The processor 410 and the interface circuit 420 are coupled to each other. It is understood that the interface circuit 420 may be a transceiver or an input-output interface. Optionally, the communication device 400 may further comprise a memory 430 for storing instructions to be executed by the processor 410 or for storing input data required by the processor 410 to execute instructions or for storing data generated after the processor 410 executes instructions.
When the communication device 400 is used to implement the above-mentioned method embodiment, the processor 410 is used to implement the function of the above-mentioned processing unit 310, and the interface circuit 420 is used to implement the function of the above-mentioned transceiver unit 320.
It is to be appreciated that the processor in embodiments of the application may be a central processing unit (central processing unit, CPU), other general purpose processor, digital signal processor (digital signal processor, DSP), application specific integrated circuit (application specific integrated circuit, ASIC), field programmable gate array (field programmable gate array, FPGA) or other programmable logic device, transistor logic device, hardware components, or any combination thereof. The general purpose processor may be a microprocessor, but in the alternative, it may be any conventional processor.
The method steps in the embodiments of the present application may be implemented by hardware, or may be implemented by executing software instructions by a processor. The software instructions may be comprised of corresponding software modules that may be stored in random access memory, flash memory, read only memory, programmable read only memory, erasable programmable read only memory, electrically erasable programmable read only memory, registers, hard disk, removable disk, CD-ROM, or any other form of storage medium known in the art. An exemplary storage medium is coupled to the processor such the processor can read information from, and write information to, the storage medium. In the alternative, the storage medium may be integral to the processor. The processor and the storage medium may reside in an ASIC. In addition, the ASIC may reside in a base station or terminal. The processor and the storage medium may reside as discrete components in a base station or terminal.
In the above embodiments, it may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer programs or instructions. When the computer program or instructions are loaded and executed on a computer, the processes or functions described in the embodiments of the present application are performed in whole or in part. The computer may be a general purpose computer, a special purpose computer, a computer network, a base station, a user equipment, or other programmable apparatus. The computer program or instructions may be stored in a computer readable storage medium or transmitted from one computer readable storage medium to another computer readable storage medium, for example, the computer program or instructions may be transmitted from one website site, computer, server, or data center to another website site, computer, server, or data center by wired or wireless means. The computer readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server, data center, etc. that integrates one or more available media. The usable medium may be a magnetic medium, e.g., floppy disk, hard disk, tape; but also optical media such as digital video discs; but also semiconductor media such as solid state disks. The computer readable storage medium may be volatile or nonvolatile storage medium, or may include both volatile and nonvolatile types of storage medium.
In various embodiments of the application, where no special description or logic conflict exists, terms and/or descriptions between the various embodiments are consistent and may reference each other, and features of the various embodiments may be combined to form new embodiments based on their inherent logic.
In the present application, "at least one" means one or more, and "a plurality" means two or more. "and/or", describes an association relationship of an association object, and indicates that there may be three relationships, for example, a and/or B, and may indicate: a alone, a and B together, and B alone, wherein a, B may be singular or plural. In the text description of the present application, the character "/", generally indicates that the associated objects are an or relationship; in the formula of the present application, the character "/" indicates that the front and rear associated objects are a "division" relationship.
It will be appreciated that the various numerical numbers referred to in the embodiments of the present application are merely for ease of description and are not intended to limit the scope of the embodiments of the present application. The sequence number of each process does not mean the sequence of the execution sequence, and the execution sequence of each process should be determined according to the function and the internal logic.

Claims (29)

1. A backup method, comprising:
the method comprises the steps that a core network element sends first backup information of the core network element to a data management network element, wherein the first backup information comprises first effective time of the first backup information and first indication information used for indicating the first backup network element of the core network element, and the first backup information is effective in the first effective time;
the core network element sends second backup information to the data management network element according to the first effective time, wherein the second backup information comprises second indication information for indicating the second backup network element of the core network element and second effective time of the second backup information, and the second backup information is effective in the second effective time.
2. The method of claim 1, wherein the core network element sending second backup information to the data management network element according to the first validity time, comprising:
and the core network element determines that the first effective time is overtime and sends the second backup information to the data management network element.
3. The method of claim 1, wherein the core network element sending second backup information to the data management network element according to the first validity time, comprising:
And the core network element determines that the first time length is longer than the first effective time and is smaller than a first threshold value, and sends the second backup information to the data management network element.
4. A method as claimed in any one of claims 1 to 3, further comprising:
and the core network element determines the first effective time according to network load.
5. A method according to any one of claims 1 to 3, wherein the method further comprises:
and receiving pre-configuration information from a network manager, wherein the pre-configuration information comprises the first effective time.
6. A method according to any one of claims 1 to 3, wherein the first validity time is negotiated between the core network element and the data management network element.
7. The method according to any of claims 1 to 6, wherein the core network element is a mobility management network element, a session management network element, a user plane network element or a policy control network element.
8. A backup method, comprising:
the method comprises the steps that a core network element sends first backup information of the core network element to a data management network element, wherein the first backup information comprises first effective time of the first backup information and first indication information used for indicating the first backup network element of the core network element, and the first backup information is effective in the first effective time;
The core network element receives a request message from the data management network element, wherein the request message requests to update the first backup information;
the core network element sends second backup information to the data management network element, wherein the second backup information comprises second indication information for indicating the second backup network element of the core network element and second effective time of the second backup information, and the second backup information is effective in the second effective time.
9. The method as recited in claim 8, further comprising:
and the core network element determines the first effective time according to network load.
10. The method of claim 8, wherein the method further comprises:
and receiving pre-configuration information from a network manager, wherein the pre-configuration information comprises the first effective time.
11. The method of claim 8, wherein the first validity time is negotiated between the core network element and the data management network element.
12. The method according to any of claims 8 to 11, wherein the core network element is a mobility management network element, a session management network element, a user plane network element or a policy control network element.
13. A backup method, comprising:
the data management network element receives first backup information of the core network element from the core network element, wherein the first backup information comprises first effective time of the first backup information and first indication information for indicating the first backup network element of the core network element, and the first backup information is effective in the first effective time;
the data management network element sends a request message to the core network element according to the first effective time, wherein the request message requests to update the first backup information;
the data management network element receives second backup information of the core network element from the core network element, wherein the second backup information comprises second effective time of the second backup information and second indication information for indicating the second backup network element of the core network element, and the second backup information is effective in the second effective time.
14. The method of claim 13, wherein the data management network element sending a request message to the core network element according to the first validity time comprises:
and the data management network element determines that the first effective time is overtime and sends the request message to the core network element.
15. The method of claim 13, wherein the data management network element sending a request message to the core network element according to the first validity time comprises:
and the data management network element determines that a first time length is remained after the first effective time is overtime and the first time length is smaller than a first threshold value, and sends the request message to the core network element.
16. The method according to any one of claim 13 to 15, wherein,
the first effective time is obtained from the preconfiguration information from the network manager
The first effective time is obtained by negotiation between the core network element and the data management network element; or,
the first effective time is determined by the core network element according to a network load.
17. The method according to any of claims 13 to 16, wherein the core network element is a mobility management network element, a session management network element, a user plane network element or a policy control network element.
18. A backup method, comprising:
the method comprises the steps that a core network element sends first backup information of the core network element to a data management network element, wherein the first backup information comprises first effective time of the first backup information and first indication information used for indicating the first backup network element of the core network element, and the first backup information is effective in the first effective time;
The core network element determines that an update period arrives or a network load changes, and sends second backup information to the data management network element, wherein the second backup information comprises second effective time of the second backup information and second indication information for indicating the second backup network element of the core network element, and the second backup information is effective in the second effective time.
19. The method as recited in claim 18, further comprising:
and the core network element determines the first effective time according to network load.
20. The method of claim 18, wherein the method further comprises:
and receiving pre-configuration information from a network manager, wherein the pre-configuration information comprises the first effective time.
21. The method of claim 18, wherein the first validity time is negotiated between the core network element and the data management network element.
22. A method according to any one of claims 18 to 21, wherein the core network element is a mobility management network element, a session management network element, a user plane network element or a policy control network element.
23. A communication device comprising a processor and interface circuitry for receiving signals from other communication devices than the communication device and transmitting to the processor or sending signals from the processor to other communication devices than the communication device, the processor being configured to implement the method of any one of claims 1 to 7, or to implement the method of any one of claims 8 to 12, or to implement the method of any one of claims 13 to 17, or to implement the method of any one of claims 18 to 22, by logic circuitry or execution of code instructions.
24. A communication device, comprising: a processor and a memory; the memory is configured to store computer instructions that, when executed by the communication device, cause the processor to perform the method of any one of claims 1 to 7, or perform the method of any one of claims 8 to 12, or perform the method of any one of claims 13 to 17, or perform the method of any one of claims 18 to 22.
25. A communication system comprising a data management network element and a core network element for performing the method of any of claims 1 to 7;
the data management network element is configured to receive the first backup information from the core network element and receive the second backup information from the core network element.
26. A communication system comprising a core network element for performing the method of any of claims 8 to 12 and a data management network element for performing the method of any of claims 13 to 17.
27. A communication system comprising a data management network element and a core network element for performing the method of any of claims 18 to 22;
The data management network element is configured to receive the first backup information from the core network element and receive the second backup information from the core network element.
28. A computer program product comprising a computer program which, when executed by a communication device, implements the method of any of claims 1 to 22.
29. A computer readable storage medium, characterized in that the storage medium has stored therein a computer program or instructions which, when executed by a communication device, implement the method of any of claims 1 to 22.
CN202210312475.9A 2022-03-28 2022-03-28 Backup method, communication device and communication system Pending CN116866965A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202210312475.9A CN116866965A (en) 2022-03-28 2022-03-28 Backup method, communication device and communication system
PCT/CN2022/136249 WO2023185062A1 (en) 2022-03-28 2022-12-02 Backup method, communication device, and communication system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210312475.9A CN116866965A (en) 2022-03-28 2022-03-28 Backup method, communication device and communication system

Publications (1)

Publication Number Publication Date
CN116866965A true CN116866965A (en) 2023-10-10

Family

ID=88198926

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210312475.9A Pending CN116866965A (en) 2022-03-28 2022-03-28 Backup method, communication device and communication system

Country Status (2)

Country Link
CN (1) CN116866965A (en)
WO (1) WO2023185062A1 (en)

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017150306A1 (en) * 2016-03-03 2017-09-08 日本電気株式会社 Communication system, backup communication device, main communication device, time synchronization method, and non-transitory computer-readable medium
CN107222883B (en) * 2017-07-12 2020-06-16 锐捷网络股份有限公司 Wireless controller backup method, backup switching method, device and system
US11249892B2 (en) * 2020-07-01 2022-02-15 The Airgap Inc. Methods and systems for backup management
CN112527561B (en) * 2020-12-09 2021-10-01 广州技象科技有限公司 Data backup method and device based on Internet of things cloud storage
CN112968970B (en) * 2021-02-26 2023-04-07 杭州迪普信息技术有限公司 Configuration information backup method and device and network equipment

Also Published As

Publication number Publication date
WO2023185062A1 (en) 2023-10-05

Similar Documents

Publication Publication Date Title
CN111901135B (en) Data analysis method and device
CN110830925B (en) Session management method and device for user group
EP3713372A1 (en) Method and device for creating user group
EP3860176B1 (en) Method, apparatus, and system for obtaining capability information of terminal
CN111615844B (en) Method and apparatus for selecting a session management entity serving a wireless communication device
WO2021051420A1 (en) Dns cache record determination method and apparatus
EP3913982A1 (en) Network slicing with a radio access network node
US20220150784A1 (en) Handover method and apparatus
CN116868603A (en) New method for external parameter provisioning for AF sessions
US20200196227A1 (en) Network slice instance creation
CN115915196A (en) Link state detection method, communication device and communication system
WO2023213177A1 (en) Communication method and apparatus
WO2021159415A1 (en) Communication method, apparatus, and system
WO2021081712A1 (en) Dns query method and apparatus
CN116866965A (en) Backup method, communication device and communication system
US12074919B1 (en) Systems and methods for reauthorization request notification
CN117221884B (en) Base station system information management method and system
CN117478431B (en) Industrial Internet of things control method based on trusted network
CN117544975A (en) Network slice management method, communication device and communication system
CN117014982A (en) Communication method, communication device and communication system
CN116847475A (en) Method for transmitting data packet, communication device and communication system
CN117082527A (en) Communication method, communication device and communication system
CN115988473A (en) Communication method, communication device and communication system
CN117676592A (en) Resource allocation method and device
CN115884134A (en) Communication method and communication device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication