CN117320122A - Network access method, device and storage medium - Google Patents

Network access method, device and storage medium Download PDF

Info

Publication number
CN117320122A
CN117320122A CN202311331008.1A CN202311331008A CN117320122A CN 117320122 A CN117320122 A CN 117320122A CN 202311331008 A CN202311331008 A CN 202311331008A CN 117320122 A CN117320122 A CN 117320122A
Authority
CN
China
Prior art keywords
network
network element
terminal
configuration information
twif
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311331008.1A
Other languages
Chinese (zh)
Inventor
李沸乐
杨文聪
曹畅
唐雄燕
岳毅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN202311331008.1A priority Critical patent/CN117320122A/en
Publication of CN117320122A publication Critical patent/CN117320122A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W60/00Affiliation to network, e.g. registration; Terminating affiliation with the network, e.g. de-registration

Abstract

The application provides a network access method, a network access device and a storage medium, which relate to the technical field of communication and can efficiently and conveniently acquire network configuration information from a core network so as to facilitate a terminal to access the core network. The method is applied to TWIF network elements; the TWIF network element is configured with DHCP; the method comprises the following steps: receiving a DHCP request for requesting to acquire network configuration information of the terminal; responding to the DHCP request, and requesting network configuration information from a core network element; and sending the network configuration information to the terminal under the condition that the network configuration information is successfully requested from the core network element, so that the terminal accesses the core network. The method and the device are used for carrying out network access on the terminal.

Description

Network access method, device and storage medium
Technical Field
The present disclosure relates to the field of communications technologies, and in particular, to a network access method, a device, and a storage medium.
Background
In a convergence system of a fifth generation mobile communication technology (5 th-generation mobile communication technology, 5G) communication system and a wireless communication technology (WiFi) communication system, a wireless local area network (non-5G-capable over wireless local area networks device, N5 CW) device without a 5G access capability is often required to be accessed to a 5G core network, so as to realize effective management of the N5CW device, and improve operation efficiency and security of the device.
Currently, the general technology mainly adopts a traditional WiFi wireless access point (wireless access point, AP) device to add a Yw interface with an interworking function (trusted wireless local area network interworking function, TWIF) with a trusted wireless local area network so as to facilitate the N5CW device to be accessed to a 5G core network. However, this way of adding a Yw interface to existing AP devices tends to result in higher costs and lower efficiency.
Disclosure of Invention
The application provides a network access method, a network access device and a storage medium, which can efficiently and conveniently acquire network configuration information from a core network so as to facilitate a terminal to access the core network.
In order to achieve the above purpose, the present application adopts the following technical scheme:
in a first aspect, the present application provides a network access method, applied to a TWIF network element; the TWIF network element is configured with DHCP; the method comprises the following steps: receiving a DHCP request for requesting to acquire network configuration information of the terminal; responding to the DHCP request, and requesting network configuration information from a core network element; and sending the network configuration information to the terminal under the condition that the network configuration information is successfully requested from the core network element, so that the terminal accesses the core network.
In a possible manner, in response to the DHCP request, the network configuration information is requested from the core network element, including: responding to the DHCP request, and sending a registration request message to an AMF network element; the registration request message includes a registration request and terminal information; under the condition of receiving a registration acceptance message from an AMF network element, sending a session establishment request message to the AMF network element; and under the condition that a session establishment acceptance message from the AMF network element is received, analyzing the session establishment acceptance message to obtain network configuration information.
In one possible manner, the method further comprises: and sending a network access failure message to the terminal under the condition that the registration failure message from the AMF network element is received.
In one possible manner, the method further comprises: and under the condition of receiving the session establishment failure message from the AMF network element, sending a network access failure message to the terminal.
In a second aspect, the present application provides a network access device applied to a TWIF network element, where the TWIF network element is configured with DHCP, the device includes: the device comprises a receiving unit, a requesting unit and a transmitting unit;
a receiving unit, configured to receive a DHCP request for requesting to acquire network configuration information of a terminal; a request unit, configured to respond to a DHCP request and request network configuration information from a core network element; and the sending unit is used for sending the network configuration information to the terminal under the condition that the network configuration information is successfully requested from the core network element, so that the terminal is accessed to the core network.
In a possible manner, the request unit is specifically configured to:
responding to the DHCP request, and sending a registration request message to an AMF network element; the registration request message includes a registration request and terminal information; under the condition of receiving a registration acceptance message from an AMF network element, sending a session establishment request message to the AMF network element; and under the condition that a session establishment acceptance message from the AMF network element is received, analyzing the session establishment acceptance message to obtain network configuration information.
In a possible manner, the sending unit is further configured to send a network access failure message to the terminal when receiving the registration failure message from the AMF network element.
In a possible manner, the sending unit is further configured to send a network access failure message to the terminal when receiving the session establishment failure message from the AMF network element.
In a third aspect, the present application provides a network access device, the device comprising: a processor and a communication interface; the communication interface is coupled to a processor for running a computer program or instructions to implement the network access method as described in any one of the possible implementations of the first aspect and the first aspect.
In a fourth aspect, the present application provides a computer readable storage medium having instructions stored therein which, when run on a terminal, cause the terminal to perform a network access method as described in any one of the possible implementations of the first aspect and the first aspect.
In a fifth aspect, embodiments of the present application provide a computer program product comprising instructions which, when run on a network access device, cause the network access device to perform a network access method as described in any one of the possible implementations of the first aspect and the first aspect.
In a sixth aspect, embodiments of the present application provide a chip comprising a processor and a communication interface, the communication interface and the processor being coupled, the processor being configured to execute a computer program or instructions to implement a network access method as described in any one of the possible implementations of the first aspect and the first aspect.
Specifically, the chip provided in the embodiments of the present application further includes a memory, configured to store a computer program or instructions.
In this application, the names of the above network access devices do not limit the devices or functional modules themselves, and in actual implementation, these devices or functional modules may appear under other names. Insofar as the function of each device or function module is similar to the present application, it is within the scope of the claims of the present application and the equivalents thereof.
These and other aspects of the present application will be more readily apparent from the following description.
Based on any one of the above aspects, the technical solution provided by the present application at least brings the following beneficial effects:
the TWIF network element may be configured with DHCP, capable of receiving a DHCP request for requesting acquisition of network configuration information of the terminal, and requesting the network configuration information from the core network element in response to the DHCP request, to further send the network configuration information to the terminal in case of successful request from the core network element to the network configuration information, so as to enable the terminal to access the core network.
Compared with the prior art, the method has the advantages that the Yw interface with TWIF is added to the AP equipment of the traditional WiFi, so that the network configuration information is obtained from the core network. The DHCP is configured in the TWIF network element, so that the support terminal can acquire network configuration information from the core network through the TWIF network element, and the problems of higher cost and lower efficiency caused by increasing Yw interfaces between the AP equipment and the TWIF are avoided. Therefore, the method and the device can acquire the network configuration information from the core network efficiently and at low cost.
Drawings
Fig. 1 is a schematic architecture diagram of a network access system with 5G and WiFi integration provided in an embodiment of the present application;
fig. 2 is a schematic architecture diagram of another network access system with 5G and WiFi integration according to an embodiment of the present application;
fig. 3 is a schematic architecture diagram of another network access system with 5G and WiFi integration according to an embodiment of the present application;
fig. 4 is an interaction schematic diagram of an N5CW device accessing a core network according to an embodiment of the present application;
fig. 5 is a schematic architecture diagram of a network access system according to an embodiment of the present application;
fig. 6 is a schematic hardware structure of a network access device according to an embodiment of the present application;
fig. 7 is a flow chart of a network access method according to an embodiment of the present application;
Fig. 8 is a flow chart of another network access method according to an embodiment of the present application;
fig. 9 is a schematic diagram of a network access procedure provided in an embodiment of the present application;
fig. 10 is a schematic structural diagram of a network access device according to an embodiment of the present application.
Detailed Description
The network access method and device provided by the embodiment of the application are described in detail below with reference to the accompanying drawings.
The term "and/or" is herein merely an association relationship describing an associated object, meaning that there may be three relationships, e.g., a and/or B, may represent: a exists alone, A and B exist together, and B exists alone.
The terms "first" and "second" and the like in the description and in the drawings are used for distinguishing between different objects or for distinguishing between different processes of the same object and not for describing a particular sequential order of objects.
Furthermore, references to the terms "comprising" and "having" and any variations thereof in the description of the present application are intended to cover a non-exclusive inclusion. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those listed but may optionally include other steps or elements not listed or inherent to such process, method, article, or apparatus.
It should be noted that, in the embodiments of the present application, words such as "exemplary" or "such as" are used to mean serving as an example, instance, or illustration. Any embodiment or design described herein as "exemplary" or "for example" should not be construed as preferred or advantageous over other embodiments or designs. Rather, the use of words such as "exemplary" or "such as" is intended to present related concepts in a concrete fashion.
In order to facilitate understanding of the technical solution of the present application, the following description refers to technical terms related to the present application:
1. user Equipment (UE).
The UE refers to personal electronic devices in mobile communication, such as smart phones, tablet computers, internet of things devices, and the like. The UE may act as an interface and a terminal point between the user and the mobile network for accessing and using mobile communication services.
2. Authentication management functions (access and mobility function, AMF).
The AMF is a key functional module in the 5G core network, responsible for managing and controlling the access and movement of the UE. The AMF can handle UE access requests, authentication, session management, etc., and ensure seamless mobility handover and service continuity. The AMF and the UE can communicate through an N1 interface, and safe and efficient connection and service are provided for the UE.
3. AN Access Network (AN).
AN refers to a network part in a mobile communication network connecting between a user equipment UE and a core network. The AN is responsible for transporting the communication traffic of the user equipment to the core network and provides access and connection management functions.
4. Wireless access nodes (APs).
An AP is a device in a WLAN for providing wireless network connection services. The AP acts as an access point for the wireless network and can serve as a bridge between the connected user equipment and the wired network.
5. Dynamic host configuration protocol (dynamic host configuration protocol, DHCP).
DHCP is a network protocol that may be used to automatically assign IP addresses and other network configuration information to devices connected to a network.
6. A trusted wireless local area network access point (trusted Wireless Local Area Network access point, TWAP).
TWAP refers to a device that is approved and trusted in a network for connecting a user device to a local area network or the internet.
7. A trusted wireless local area network interworking function (trusted wireless local area network interworking function, TWIF).
TWIF refers to the implementation of secure interworking and interoperability between different WLANs in a network.
8. A trusted wireless local area network access network (trusted wireless local area network access network, TWAN).
TWAN refers to a wireless access network with security and reliability that can provide secure wireless connections and services for user devices.
9. N5CW device.
N5CW devices refer to those WLAN devices that do not support connection to a 5G network. These devices can only connect to conventional Wi-Fi networks in the 2.4 Gigahertz (Gigahertz) or 5GHz band, and cannot connect through a 5G network.
10. Session management functions (session management function, SMF).
SMF is a key functional module in the 5G core network, responsible for session management and control. The SMF may communicate with the UE and other network elements to provide session management and control functions for the 5G network.
Wherein the local session management function (home session management function, hSMF) and the visited session management function (visited session management function, vSMF) are one of the SMFs.
11. 3GPP access networks.
The 3GPP access network is a communication protocol for data transmission and voice communication in the 3GPP network. It supports high-speed mobile communications based on packet switching, including various device types and network architectures.
12. Unified packet processing functions (unified packet fabric, UPF).
UPF is the core of a 5G network, can connect applications to the network, and can provide 5G core network services supporting all terminals, data types, locations, all applications, and device capabilities through mobile data gateways, mobile edge computing, and user plane processing functions.
13. Adapt the protocol of the transport network (transport network adaptation protocol, TNAP).
TNAP is a communication protocol for interfacing between a 5G core network and a transport network. The TNAP may provide an adaptation function between the 5G core network and the transport network to ensure reliable transport and interoperability of data. The YNAP may also associate data flows in the core network with physical or virtual connections in the transport network and perform corresponding conversion and adaptation processes.
14. Trusted non-3GPP gateway functions (trusted non-3gpp gateway function,TNGF).
The main function of TNGF is to realize terminal access from trusted non-3GPP network to 5G core network.
15. Protocol data unit (protocol data unit, PDU) session.
A PDU session refers to a data transmission session in a 5G network. In a 5G network, a data transmission session is divided into different PDUs for carrying and transmission.
The technical terms related to the present application are described above.
With the exploration of 5G in the global mature business and industry digitization, 5G is promoting the deep convergence with various industries such as industry, traffic and medical, pushing the digitization, intellectualization and collaborative development of research, design, manufacturing, marketing and service fields. At the same time, 5G also faces a great challenge from the industry. For example, in the live video industry, a live video with ultra-high definition needs to be transmitted back in real time, and enterprises such as intelligent manufacturing and the like need to transmit back a large amount of monitoring in real time. In the face of these demands for higher uplink transmission speeds, the experience of the public network users may be affected if only the 5G frequency of the public network is relied on, while the use of a dedicated 5G frequency requires a large amount of spectrum resources to be obtained, which is difficult to achieve in a short period of time. Thus, the 5G and WiFi fusion scheme becomes a viable and economical implementation.
According to whether the 3GPP standard is a trust domain of an operator and whether terminal equipment has 5G access capability, namely capability division of a 5G core network (5Gcore network,5GC) terminal or not, a network access system integrating the following three 5G and WiFi is defined by the WiFi/wireless local area network (wireless local area network, WLAN):
the system 1, as shown in fig. 1, accesses a non-3 GPP (e.g. WiFi) terminal of a non-trust domain to a 5G core network through an N3 (N3 interworking function, N3 IWF) interface of an interworking function.
In one possible approach, the system 3 includes an access public land mobile network, a local public land mobile network, and a non-3 GPP network.
The access public land mobile network comprises a 3GPP access network, an AMF network element, a vSMF network element and a UPF network element. The local public land mobile network comprises an AMF network element, an N3IWF network element, a hSMF/SMF network element, a UPF network element and a data network. The non-3 GPP network includes a UE and an untrusted 3GPP access network.
The UE and the AMF network element are communicated through an N1 interface, the UE and the N3IWF network element are communicated through an N5 interface, the 3GPP access network and the AMF network element are communicated through an N2 interface, the AMF network element and the vSM F network element are communicated through an N11 interface, the 3GPP access network and the UPF network element are communicated through an N3 interface, the vSMF network element and the UPF network element are communicated through an N4 interface, the vSMF network element and the hSMF/SMF network element are communicated through an N16 interface, the UPF network element and the UPF network element are communicated through an N9 interface, the UPF network element and the N3IWF network element are communicated through an N3 interface, the UE and the untrusted non-3 GPP access network are connected through a Y1 interface, the N3IWF network element and the untrusted non-3 GPP access network are connected through a Y2 interface, and the UPF network and the data network are connected through an N6 interface.
The system 2, as shown in fig. 2, accesses the non-3 gpp 5gc terminal of the trust domain to the 5G core network through the TNAN module.
In one possible approach, the system 2 includes access to a public land mobile network and a local public land mobile network.
The access public land mobile network comprises a 3GPP access network, an AMF network element, a vSMF network element, a UPF network element, a UE and TNAN architecture, wherein the TNAN architecture comprises a TNAP network element and a TNGF network element. The local public land mobile network comprises hSMF/SMF network element, UPF network element and data network.
The UE is connected with the AMF network element through an N1 interface, the 3GPP access network is connected with the AMF network element through an N2 interface, the AMF network element is connected with the vSMF network element through an N11 interface, the 3GPP access network is connected with the UPF network element through an N3 interface, the vSMF network element is connected with the UPF network element through an N4 interface, the vSMF network element is connected with the hSMF/SMF network element through an N16 interface, the UPF network element is connected with the UPF network element through an N9 interface, the UPF network element is connected with the data network through a GN6 interface, the UE is connected with the TNAP network element through a Yt interface, the UE is connected with the TNGF network element through an Nwt interface, the TNGF network element is connected with the TNAP network element through a Ta interface, the TNGF network element is connected with the AMF network element through an N2 interface, and the TNGF network element is connected with the UPF network element through an N3 interface.
The system 3, as shown in fig. 3, accesses a conventional WLAN terminal of the trust domain to the 5G core network through the TWIF module.
The system 3 comprises a TWAN architecture, an N5CW device, an AMF network element, an SMF network element, a UPF network element and a data network. The TWAN architecture comprises a TWAP network element and a TWIF network element.
The AMF network element and the SMF network element are connected through an N11 interface, the SMF network element and the UPF network element are connected through an N4 interface, and the AMF network element and the TWIF network element are connected through an N1 interface and an N2 interface. The UPF network element is connected with the data network through an N6 interface, the N5CW device is connected with the TWAP network element through a Yt interface, and the TWAP network element is connected with the TWIF network element through a Yw interface.
The system 1 and the system 2 require a network attached storage (network attached storage, NAS) session function that the WiFi device supports 5GC to access the WiFi device to the network, but most WiFi devices do not support the NAS session function of 5 GC.
The system 3 is a TWAN architecture-based system, and the WiFi device can access the control plane and the user plane of the 5G core network without supporting the NAS session function of the 5 GC.
The system 3 not only can aggregate the unlicensed WiFi frequency bands, but also can support large bandwidth uplink, can uniformly and dynamically schedule the resources of two systems, can quickly integrate the WiFi terminals, and has wide market and application prospects.
From the research situation at home and abroad, the prior patent does not relate to the access of N5CW equipment to a core network in a 5G and WiFi fusion system. Although the patent can realize that the WLAN terminal equipment can access the core network, the 5G core network is not accessed through the TWAN architecture in the WiFi network, the fusion of the 5G and the WLAN network at the network level is not involved, and the problem of the N5CW equipment is not solved.
Therefore, there is a need for an improved method for creating terminal access and core network session to achieve the purpose of the immediately old WiFi network (i.e., the N5CW device is accessed to the core network) in the network access system based on the integration of 5G and WiFi of TWAN architecture.
At present, the general technology mainly adopts that the Yw interface of the conventional WiFi AP equipment and a trusted wireless TWIF network element is added so as to facilitate the N5CW equipment to be accessed to the 5G core network. However, this way of adding a Yw interface to existing AP devices tends to result in higher costs and lower efficiency.
In view of the above technical drawbacks, the network access method provided by the present application may be configured with DHCP, where the TWIF network element is capable of receiving a DHCP request for requesting to obtain network configuration information of the terminal, and requesting the network configuration information from the core network element in response to the DHCP request, so as to further send the network configuration information to the terminal when the network configuration information is successfully requested from the core network element to the core network, so that the terminal accesses the core network.
Compared with the prior art, the method has the advantages that the Yw interface with TWIF is added to the AP equipment of the traditional WiFi, so that the network configuration information is obtained from the core network. The DHCP is configured in the TWIF network element, so that the support terminal can acquire network configuration information from the core network through the TWIF network element, and the problems of higher cost and lower efficiency caused by increasing Yw interfaces between the AP equipment and the TWIF are avoided. Therefore, the method and the device can acquire the network configuration information from the core network efficiently and at low cost.
Referring to fig. 3, an interaction diagram of an N5CW device accessing a core network is shown in fig. 4.
In one possible approach, the N5CW device may send a WiFi access request to the TWAP network element. The TWAP network element may receive and respond to the WiFi access request by sending a Yw registration request to the TWIF network element. The TWIF network element may receive and send a user registration request to the core network element in response to the Yw registration request. The core network element may receive and respond to the user registration request, complete the registration procedure, access the N5CW device to WiFi, and send a user registration response to the TWIF network element. The TWIF network element may send a Yw registration response to the TWAP after receiving and the user registration response. The TWAP network element may send a WiFi access response to the N5CW device after receiving the Yw registration response.
In one possible approach, the N5CW device may send a DHCP request to the TWAP to request network resource information after WiFi access is completed. The TWAP network element may receive and respond to the DHCP request by sending a Yw session request to the TWIF network element. The TWIF network element may receive and respond to the Yw session request by sending a request to the core network element to establish a PDU session. The core network element may receive and respond to the PDU session establishment request, complete the PDU session establishment, allocate network resource information for the N5CW device, and send a PDU session establishment response to the TWIF network element. The TWIF network element may send a Yw session response to the TWAP after receiving and the establish PDU session response. The TWAP network element may send a DHCP response to the N5CW device after receiving the Yw session response. The N5CW device may access the core network according to network resource information in the N5CW device.
Exemplary, as shown in fig. 5, an architecture diagram of a network access system according to an embodiment of the present application is provided. The network access system 100 may comprise a TWIF network element 101, a terminal 102 and a core network element 103.
In practical applications, the TWIF network element 101 may be in communication connection with one or more terminals 102. The TWIF network element 101 may be in communication connection with one or more core network elements 103. For ease of understanding, the present application will be described with reference to a TWIF network element 101, a terminal 102 and a core network element 103.
Alternatively, the terminal 102 may be an N5CW device. The N5CW device may be a device that provides voice and/or data connectivity to a user, a handheld device with wireless connectivity, or other processing device connected to a wireless modem. The N5CW device may communicate with one or more core networks via a radio access network (radio access network, RAN). The N5CW device may be a mobile terminal, such as a computer with a mobile terminal, or a portable, pocket, hand-held, computer-built-in mobile device that exchanges voice and/or data with a radio access network, such as a cell phone, tablet, notebook, netbook, personal digital assistant, to which the embodiments of the present application are not limited. The configuration shown in fig. 5 is merely an example of the configuration of the terminal 102, and is not limited thereto.
Optionally, the core network element 103 may include an AMF network element, and may also include an SMF network element. This is not particularly limited in this application.
Alternatively, the TWIF network element 101 and the core network element 103 in fig. 5 may be network elements integrated in the same device, or may be two network elements that are set independently. The present application is not limited in this regard.
For ease of understanding, the present application will mainly be described by taking the example that the TWIF network element 101 and the core network element 103 are disposed independently of each other.
The terminal 102 in fig. 5 may send a DHCP request to the TWIF network element 101. The TWIF network element 101 may send request network configuration information to the core network element 103 in response to the DHCP request, and in case that the request for the network configuration information from the core network element 103 is successful, send the network configuration information to the terminal 102, so that the terminal 102 accesses the core network.
Referring to fig. 5, as shown in fig. 6, a hardware structure diagram of a network access device according to an embodiment of the present application is shown. The network access device comprises a processor 21, a memory 22, a communication interface 23, a bus 24. The processor 21, the memory 22 and the communication interface 23 may be connected by a bus 24.
The processor 21 is a control center of the TWIF network element, and may be one processor or may be a generic name of a plurality of processing elements. For example, the processor 21 may be a general-purpose central processing unit (central processing unit, CPU), or may be another general-purpose processor. Wherein the general purpose processor may be a microprocessor or any conventional processor or the like.
As one example, processor 21 may include one or more CPUs, such as CPU 0 and CPU 1 shown in fig. 6.
Memory 22 may be, but is not limited to, a read-only memory (ROM) or other type of static storage device that can store static information and instructions, a random access memory (random access memory, RAM) or other type of dynamic storage device that can store information and instructions, or an electrically erasable programmable read-only memory (EEPROM), magnetic disk storage or other magnetic storage device, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer.
In a possible implementation, the memory 22 may exist separately from the processor 21, and the memory 22 may be connected to the processor 21 by a bus 24 for storing instructions or program code. The processor 21, when calling and executing instructions or program code stored in the memory 22, is capable of implementing the network access method provided in the embodiments described below.
In another possible implementation, the memory 22 may also be integrated with the processor 21.
The communication interface 23 is used for connecting the TWIF network element with other devices through a communication network, and the communication network may be an ethernet, a radio access network, a wireless local area network (wireless local area networks, WLAN), etc. The communication interface 23 may include a receiving unit for receiving data, and a transmitting unit for transmitting data.
Bus 24 may be an industry standard architecture (industry standard architecture, ISA) bus, an external device interconnect (peripheral component interconnect, PCI) bus, or an extended industry standard architecture (extended industry standard architecture, EISA) bus, among others. The bus may be classified as an address bus, a data bus, a control bus, etc. For ease of illustration, only one thick line is shown in fig. 6, but not only one bus or one type of bus.
It should be noted that the structure shown in fig. 6 does not constitute a limitation of the TWIF network element, which may comprise more or less components than shown in fig. 6, or may combine certain components, or a different arrangement of components.
Fig. 7 is a schematic flow chart of a network access method according to an embodiment of the present application. The network access method may be applied to a TWIF network element in the network access system 100 shown in fig. 5. The network access method comprises the following steps: S301-S303.
S301, the TWIF network element receives a DHCP request for requesting to acquire network configuration information of the terminal.
Wherein the TWIF network element may be configured with DHCP.
It should be noted that, in connection with fig. 3, when the twif network element is not configured with DHCP, the twif network element needs to communicate with the TWAP network element through the Yw interface to obtain a DHCP request of network configuration information of the terminal. In the application, DHCP is configured for the TWIF network element, and the TWIF network element may directly receive a DHCP request for requesting to acquire network configuration information of the terminal. Therefore, the method and the device can avoid the problems of higher cost and lower efficiency caused by increasing the Yw interface between the AP equipment and the TWIF, and acquire the network configuration information from the core network efficiently and with lower cost.
Alternatively, the terminal may be an N5CW device, or may be another terminal that needs to request the obtained network configuration information. This is not particularly limited in this application.
In one possible manner, the DHCP request may include information such as a device identification of the terminal and a media access control (media access control, MAC) address.
Optionally, the network configuration information may include an IP address, and may further include a network protocol, a subnet mask, a default network manager, and the like. The terminal can access the core network according to the network configuration information.
In one possible approach, the terminal may broadcast a DHCP request to network devices in a two-layer network in the communication network requesting acquisition of network configuration information of the terminal. The TWIF network element may receive the DHCP request.
Illustratively, the N5CW device may broadcast a DHCP request into the network requesting acquisition of network configuration information. The TWIF network element may receive the DHCP request.
S302, the TWIF network element responds to the DHCP request and requests network configuration information from the core network element.
In one possible manner, the core network element may include multiple network elements such as an AMF network element, an SMF network element, and a UPF network element.
In a possible manner, after receiving the DHCP request, the TWIF network element may send a registration request message to the AMF network element in response to the DHCP request, and send a session establishment request message to the AMF network element to request network configuration information to the core network element if a registration accept message from the AMF network element is received. For a specific implementation manner in which the TWIF network element requests the core network element for the network configuration information, reference may be made to the following S401-S403, which are not described herein.
And S303, the TWIF network element sends the network configuration information to the terminal under the condition that the network configuration information is successfully requested from the core network element, so that the terminal is accessed to the core network.
In a possible manner, the core network element may respond to the DHCP request sent by the tif network element, and send the allocated network configuration information to the tif network element after the tif completes registration and session establishment. The TWIF network element may receive the network configuration information and send the network configuration information to the terminal to enable the terminal to access the core network.
It can be understood that the terminal may receive the network configuration information sent by the TWIF network element, and configure itself according to the received network configuration information, so as to access the core network.
Based on the above technical solution, in the network access method provided by the present application, the TWIF network element may be configured with DHCP, and may receive a DHCP request for requesting to obtain network configuration information of the terminal, and respond to the DHCP request, request the network configuration information from the core network element to the core network element, so as to further send the network configuration information to the terminal under the condition that the network configuration information is successfully requested from the core network element to the core network, so that the terminal accesses the core network.
Compared with the prior art, the method has the advantages that the Yw interface with TWIF is added to the AP equipment of the traditional WiFi, so that the IP address is acquired from the core network. The DHCP is configured in the TWIF network element, so that the support terminal can acquire network configuration information from the core network through the TWIF network element, and the problems of higher cost and lower efficiency caused by increasing Yw interfaces between the AP equipment and the TWIF are avoided. Therefore, the method and the device can acquire the network configuration information from the core network efficiently and at low cost.
In one embodiment, when the TWIF network element requests network configuration information from the core network element, as shown in fig. 8, an embodiment of the present application provides an alternative implementation manner, including: S401-S403.
S401, the TWIF network element responds to the DHCP request and sends a registration request message to the AMF network element.
Wherein the registration request message includes a registration request and terminal information.
In a possible manner, the TWIF network element may send a registration request message to the AMF network element after receiving a DHCP request sent by the terminal.
The registration request message may include a registration request and terminal information, for example. The registration request may also be referred to as registration request. The terminal information may also be referred to as Initial UE Message.
In one possible manner, the AMF network element may perform a registration procedure after receiving the registration request message sent by the TWIF network element.
In one possible way, the registration procedure is as follows:
(1) And the AMF network element performs identity verification on the terminal according to the terminal information in the registration request message.
(2) After the verification is successful, the AMF network element sends an authentication request to the AUSF network element so as to authenticate the terminal.
(3) The AUSF network element responds to the authentication request and sends the authentication result to the AMF network element.
(4) The AMF network element may send a registration accept message to the TWIF network element after the authentication is successful.
It is understood that the registration procedure is not limited to the methods provided herein. See, for example, the prior art in the field, and are not described in detail herein.
S402, the TWIF network element sends a session establishment request message to the AMF network element when receiving a registration acceptance message from the AMF network element.
In a possible manner, the TWIF network element may send a session establishment request message to the AMF network element upon receiving a registration accept message from the AMF network element.
The registration accept message may be referred to as Registration Accept, for example. The session establishment request message may be referred to as PDU Session Establishment Request.
In one possible manner, the AMF network element may perform session establishment after receiving the session establishment request message sent by the TWIF network element.
In one possible way, the session establishment procedure is as follows:
(1) The AMF sends a query request to the UDM network element to obtain subscription data and configuration parameters of the terminal, etc.
(2) The UDM network element responds to the query request and sends a query result to the AMF network element.
(3) After the AMF network element receives the query result, an SMF network element context of the terminal is created, and the SMF network element is distributed for the terminal.
(4) The AMF network element establishes session with the SMF network element, and transmits the related SMF network element context, including the distribution of network configuration information for the terminal by the SMF network element.
(5) The AMF network element sends a session establishment accept message with network configuration information to the TWIF.
It is understood that the establishment of session flows is not limited to the methods provided herein. See, for example, the prior art in the field, and are not described in detail herein.
S403, the TWIF network element analyzes the session establishment acceptance message to obtain network configuration information under the condition that the TWIF network element receives the session establishment acceptance message from the AMF network element.
In one possible manner, the session establishment acceptance message may include network configuration information, and the TWIF network element may parse the session establishment acceptance message to obtain the network configuration information.
The session establishment acceptance message may be referred to as PDU Session Establishment Accept, for example. The session establishment acceptance message may carry network configuration information.
In one possible manner, after analyzing the session establishment acceptance message, the TWIF network element may send the network configuration information to the terminal, so that the terminal accesses the core network.
Based on the above technical solution, in the network access method provided by the present application, the TWIF network element may be configured with DHCP, and can send a registration request message to the AMF network element in response to a DHCP request, and send a session establishment request message to the AMF network element when receiving a registration accept message from the AMF network element, so as to further analyze the session establishment accept message to obtain network configuration information when receiving the session establishment accept message from the AMF network element.
Compared with the prior art, the method has the advantages that the Yw interface with TWIF is added to the AP equipment of the traditional WiFi, so that the IP address is acquired from the core network. The DHCP is configured in the TWIF network element, so that the support terminal can acquire network configuration information from the core network through the TWIF network element, and the problems of higher cost and lower efficiency caused by increasing Yw interfaces between the AP equipment and the TWIF are avoided. Therefore, the method and the device can acquire the network configuration information from the core network efficiently and at low cost.
In a real-time example, the TWIF may send a network access failure message to the terminal when receiving a registration failure message from the AMF network element. Illustratively, the network access method further comprises: s501.
S501, the TWIF network element sends a network access failure message to the terminal under the condition that the TWIF network element receives the registration failure message from the AMF network element.
In a possible manner, the AMF network element performs identity verification on the terminal according to the terminal information in the registration request message and obtains authentication data of the terminal, which may occur in the case of identity verification failure or authentication failure. In case of authentication failure or authentication failure, the AMF network element may send a registration failure message to the TWIF network element. The TWIF network element may send a network access failure message to the terminal upon receiving the registration failure message from the AMF network element. The terminal may receive the network access failure message and determine that the network access failed.
Based on the above technical scheme, in the network access method provided by the present application, the TWIF network element may send a network access failure message to the terminal under the condition that the registration failure message from the AMF network element is received, so as to remind the terminal that the core network cannot be accessed.
In a real-time example, the TWIF may send a network access failure message to the terminal when receiving a session establishment failure message from the AMF network element. Illustratively, the network access method further comprises: s601.
S601, the TWIF network element sends a network access failure message to the terminal under the condition that the TWIF network element receives the session establishment failure message from the AMF network element.
In a possible manner, when the AMF may network element establishes a session according to the session establishment request message, a session establishment failure may occur, and in this case, the AMF network element may send a session establishment failure message to the TWIF network element. The TWIF network element may send a network access failure message to the terminal upon receiving the session establishment failure message from the AMF network element. The terminal may receive the network access failure message and determine that the network access failed.
Based on the above technical solution, in the network access method provided by the present application, the TWIF network element may send a network access failure message to the terminal under the condition that a session establishment failure message from the AMF network element is received, so as to remind the terminal that the core network cannot be accessed.
Exemplary, as shown in fig. 9, a schematic diagram of a network access procedure according to an embodiment of the present application is provided.
S1, closing the DHCP service on the TWAP network element and configuring the DHCP service on the TWIF.
The S2, N5CW device may send a WiFi access request to the TWAP network element.
And S3, the TWAP network element can respond to the WiFi access request, access the N5CW device to WiFi, and send a WiFi access response to the N5CW device.
In a possible manner, the present invention does not need to add the Yw interface of the AP device, and the following steps do not directly register in the core network according to the 3GPP standard procedure. The TWAP network element in S2 does not forward the Yw registration request (i.e. Yw Registration Request) message to the TWIF via the Yw interface, i.e. does not register with the core network.
S4, the N5CW device sends a DHCP request to the TWIF network element.
In one possible approach, the DHCP request is a broadcast packet that may be sent to the two-layer network. Because only TWIF network elements in the two-layer network are configured with DHCP service, only TWIF network elements in the two-layer network can receive the DHCP request sent by the N5 CW.
S5, after receiving the DHCP request, the TWIF network element can proxy the N5CW device to register in the core network. The TWIF network element may send a user registration request containing the registration request and the N5CW device information to the AMF network element.
S6, under the condition that the TWIF network element, the AMF network element and other network elements finish the 3GPP standard registration flow in the core network, the AMF network element can send a user registration response (Registration Accept) message to the TWIF network element to inform the TWIF network element that the user registration request is accepted.
And S7, after the user registration process is successful, the TWIF network element can proxy the N5CW device to establish a session in the 5G core network. I.e. the TWIF network element may send a request for establishing a PDU session (i.e. PDU Session Establishment Request) message to the AMF network element requesting to establish the session.
S8, under the condition that the TWIF network element, the AMF network element and other network elements finish establishing the session in the core network, the SMF network elements in the other network elements distribute network configuration information for the N5CW device. The AMF network element may send a setup PDU session response (i.e., PDU Session Establishment Accept) message carrying network configuration information to the TWIF network element.
In a possible manner, if the registration procedure fails in S7, the core network will reject the request for establishing the PDU session for the TWIF network element.
And S9, after receiving the PDU session establishment response, the TWIF network element transmits a DHCP response message carrying network configuration information to the N5CW device. After receiving the DHCP response, the N5CW device may configure itself according to the received network configuration information to access the core network.
In a possible manner, if the session establishment in S8 fails, no network configuration information is allocated to the N5CW device in S8.
Based on the technical scheme, the application has the following technical effects:
1. the method and the device do not need to upgrade the traditional AP equipment, and can avoid upgrade cost.
2. The method and the device can prevent the DHCP service conflict by closing the DHCP service of the stock WiFi network (namely the TWAP network element) and disposing and providing the DHCP service on the TWIF network element.
3. The TWIF network element proxy N5CW device can register and establish the session in the core network, and the efficiency is higher.
4. According to the method and the device, the core network distribution network resource information can be distributed to the N5CW equipment, so that the N5CW equipment can be accessed to the 5G core network and establish a session, and the traditional AP equipment is not required to be updated, so that the original investment of a customer can be protected.
Exemplary, as shown in fig. 10, a schematic structural diagram of a network access device according to an embodiment of the present application is provided. The network access device is used for executing the network access method provided by the application. For example, the network access method in fig. 7 and 8 described above. The network access device may include: a receiving unit 701, a requesting unit 702, and a transmitting unit 703.
In a possible manner, the receiving unit 701 is configured to receive a DHCP request for requesting to acquire network configuration information of the terminal. For example, as shown in fig. 7, a receiving unit 701 is used to perform S301.
In a possible manner, the request unit 702 is configured to request network configuration information from a core network element in response to a DHCP request. For example, as shown in fig. 7, the request unit 702 is configured to execute S302.
In a possible manner, the sending unit 703 is configured to send the network configuration information to the terminal, so that the terminal accesses the core network, if the network configuration information is successfully requested from the core network element. For example, as shown in fig. 7, a transmission unit 703 is used to execute S303.
In a possible manner, the request unit 702 is specifically configured to:
and responding to the DHCP request, and sending a registration request message to the AMF network element.
In a possible manner, the sending unit 703 is further configured to send a session establishment request message to the AMF network element when receiving a registration accept message from the AMF network element.
In a possible manner, the parsing unit 704 is further configured to parse the session establishment acceptance message to obtain the network configuration information when receiving the session establishment acceptance message from the AMF network element. For example, as shown in fig. 8, the request unit 702 is specifically configured to execute S401-S403.
In a possible manner, the sending unit 703 is further configured to send a network access failure message to the terminal when receiving a registration failure message from the AMF network element. For example, the transmitting unit 703 is further configured to execute S501.
In a possible manner, the sending unit 703 is further configured to send a network access failure message to the terminal when receiving a session establishment failure message from the AMF network element. For example, the transmitting unit 703 is further configured to execute S303.
In addition, the technical effects of the network access device of fig. 10 may refer to the technical effects of the network access method of the foregoing embodiment, and will not be described herein.
From the foregoing description of the embodiments, it will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-described division of functional modules is illustrated, and in practical application, the above-described functional allocation may be implemented by different functional modules according to needs, i.e. the internal structure of the apparatus is divided into different functional modules to implement all or part of the functions described above. The specific working processes of the above-described systems, devices and units may refer to the corresponding processes in the foregoing method embodiments, which are not described herein.
Embodiments of the present application provide a computer program product comprising instructions which, when run on a computer, cause the computer to perform the network access method of the method embodiments described above.
The embodiment of the application also provides a computer readable storage medium, in which instructions are stored, which when executed on a computer, cause the computer to execute the network access method in the method flow shown in the method embodiment.
The computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples (a non-exhaustive list) of the computer-readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a random access Memory (Random Access Memory, RAM), a Read-Only Memory (ROM), an erasable programmable Read-Only Memory (Erasable Programmable Read Only Memory, EPROM), a register, a hard disk, an optical fiber, a portable compact disc Read-Only Memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing, or any other form of computer readable storage medium known in the art. An exemplary storage medium is coupled to the processor such the processor can read information from, and write information to, the storage medium. In the alternative, the storage medium may be integral to the processor. The processor and the storage medium may reside in an application specific integrated circuit (Application Specific Integrated Circuit, ASIC). In the context of the present application, a computer-readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
Since the network access device, the computer readable storage medium and the computer program product in the embodiments of the present application may be applied to the above-mentioned method, the technical effects that can be obtained by the network access device, the computer readable storage medium and the computer program product may also refer to the above-mentioned method embodiments, and the embodiments of the present application are not repeated herein.
The foregoing is merely a specific real-time manner of the present application, but the scope of the present application is not limited thereto, and any changes or substitutions within the technical scope of the present disclosure should be covered in the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (10)

1. The network access method is characterized by being applied to a trusted wireless local area network interworking function TWIF network element; the TWIF network element is configured with a dynamic host configuration protocol DHCP; the method comprises the following steps:
receiving a DHCP request for requesting to acquire network configuration information of the terminal;
responding to the DHCP request, and requesting the network configuration information from a core network element;
and sending the network configuration information to the terminal under the condition that the network configuration information is successfully requested from the core network element, so that the terminal accesses the core network.
2. The network access method according to claim 1, wherein said requesting the network configuration information from a core network element in response to the DHCP request comprises:
responding to the DHCP request, and sending a registration request message to an AMF network element; the registration request message comprises a registration request and terminal information;
under the condition of receiving a registration acceptance message from the AMF network element, sending a session establishment request message to the AMF network element;
and under the condition that a session establishment acceptance message from the AMF network element is received, analyzing the session establishment acceptance message to obtain the network configuration information.
3. The network access method of claim 2, further comprising:
and under the condition that the registration failure message from the AMF network element is received, sending a network access failure message to the terminal.
4. The network access method of claim 2, further comprising:
and under the condition of receiving the session establishment failure message from the AMF network element, sending a network access failure message to the terminal.
5. A network access device for use in a TWIF network element configured with DHCP, comprising: the device comprises a receiving unit, a requesting unit and a transmitting unit;
The receiving unit is used for receiving a DHCP request for requesting to acquire network configuration information of the terminal;
the request unit is used for responding to the DHCP request received by the receiving unit and requesting the network configuration information from a core network element;
the sending unit is further configured to send the network configuration information to the terminal, so that the terminal accesses a core network, if the requesting unit successfully requests the network configuration information from the core network element.
6. The network access device according to claim 5, wherein the requesting unit is specifically configured to:
responding to the DHCP request, and sending a registration request message to an AMF network element; the registration request message comprises a registration request and terminal information;
under the condition of receiving a registration acceptance message from the AMF network element, sending a session establishment request message to the AMF network element;
and under the condition that a session establishment acceptance message from the AMF network element is received, analyzing the session establishment acceptance message to obtain the network configuration information.
7. The network access device of claim 6, wherein,
the sending unit is further configured to send a network access failure message to the terminal when receiving a registration failure message from the AMF network element.
8. The network access device of claim 6, wherein,
the sending unit is further configured to send a network access failure message to the terminal when receiving a session establishment failure message from the AMF network element.
9. A network access device, comprising: a processor and a communication interface; the communication interface is coupled to the processor for running a computer program or instructions to implement the network access method as claimed in any one of claims 1-4.
10. A computer readable storage medium having instructions stored therein, characterized in that when executed by a computer, the computer performs the network access method of any of the preceding claims 1-4.
CN202311331008.1A 2023-10-13 2023-10-13 Network access method, device and storage medium Pending CN117320122A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311331008.1A CN117320122A (en) 2023-10-13 2023-10-13 Network access method, device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311331008.1A CN117320122A (en) 2023-10-13 2023-10-13 Network access method, device and storage medium

Publications (1)

Publication Number Publication Date
CN117320122A true CN117320122A (en) 2023-12-29

Family

ID=89237041

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311331008.1A Pending CN117320122A (en) 2023-10-13 2023-10-13 Network access method, device and storage medium

Country Status (1)

Country Link
CN (1) CN117320122A (en)

Similar Documents

Publication Publication Date Title
CN112423301B (en) Private network registration management method and AMF network element
RU2520380C2 (en) Method and system for dynamic service coordination with homogeneous protective control plane in wireless network
CN109314917A (en) Network is sliced selection strategy update method and device
US9473877B2 (en) Uplink/downlink transmission method for small amount of data, and corresponding terminal and mobility management unit
EP3022952B1 (en) Billing of relayed device
CN107105458B (en) A kind of information processing method and device
US8665849B2 (en) Methods and systems for implementing inter-network roam, querying and attaching network
EP3823332A1 (en) Communication method and apparatus
US8984287B2 (en) Wireless personal area network access method based on primitive
EP3190830B1 (en) Service processing method to enhance user privacy
CN103384365B (en) A kind of method for network access, method for processing business, system and equipment
WO2022001318A1 (en) Communication method and apparatus
CN114158038B (en) Communication method, device and storage medium
WO2018170703A1 (en) Connection establishment method and device
CN103634880A (en) Service providing method, system and terminal
WO2021159708A1 (en) Method and apparatus for automatic access of internet of things device to wireless local area network
WO2022021435A1 (en) Data transmission method, device, and storage medium
US20220312188A1 (en) Network operations to receive user consent for edge computing
WO2011015091A1 (en) Method, device, system and authentication authorization accounting (aaa) server for home node base station accessing
WO2016134543A1 (en) Cell access method, convergence terminal and access terminal
CN117320122A (en) Network access method, device and storage medium
CN113873491A (en) Communication apparatus, system, and computer-readable storage medium
CN115734173A (en) Method and apparatus for inter-device communication
US20220361093A1 (en) Network Slice Admission Control (NSAC) Discovery and Roaming Enhancements
US20220304079A1 (en) Security protection on user consent for edge computing

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination