WO2017185909A1 - Procédé et appareil de traitement de tranche de réseau - Google Patents

Procédé et appareil de traitement de tranche de réseau Download PDF

Info

Publication number
WO2017185909A1
WO2017185909A1 PCT/CN2017/077376 CN2017077376W WO2017185909A1 WO 2017185909 A1 WO2017185909 A1 WO 2017185909A1 CN 2017077376 W CN2017077376 W CN 2017077376W WO 2017185909 A1 WO2017185909 A1 WO 2017185909A1
Authority
WO
WIPO (PCT)
Prior art keywords
network slice
terminal device
identifier
network
protocol configuration
Prior art date
Application number
PCT/CN2017/077376
Other languages
English (en)
Chinese (zh)
Inventor
李宏
张锦芳
张伟
晋英豪
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2017185909A1 publication Critical patent/WO2017185909A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • H04W36/0055Transmission or use of information for re-establishing the radio link
    • H04W36/0066Transmission or use of information for re-establishing the radio link of control information between different types of networks in order to establish a new radio link in the target network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/002Transmission of channel access control information

Definitions

  • the present application relates to communication technologies, and in particular, to a network slice processing method and apparatus.
  • 5G Fifth Generation
  • Future wireless communication services are ever-changing, and different services have different requirements for network performance.
  • services with high-speed mobile features have high requirements for network performance indicators such as handover delay and mobility;
  • Machine type communication services (Machine Type Communication; referred to as: MTC) has higher requirements on the number of service connections, but does not require handover delay and mobility. Therefore, in a 5G communication system, in order to adapt to different network performance requirements of different services, the network needs to have an on-demand capability, and needs to be able to implement flexible network slicing.
  • the development trend of the 5G communication system is to establish different network slices for different types of services through virtualization technology. Each network slice can be regarded as a complete network, and different network types corresponding to different types of services can use different networks.
  • the form for example, uses a different protocol stack structure on the data plane or the signaling plane to better match the characteristics of the service.
  • the terminal device When different network slices use different data or signaling transmission protocols, if the terminal device needs to switch from one network slice to another, or the terminal device needs to access another network slice at the same time, then the terminal device The protocol stack corresponding to the original network slice may not match the protocol stack corresponding to the switched network slice or the newly accessed network slice, thereby causing the terminal device to switch the network slice failure.
  • the present application provides a network slice processing method and apparatus to improve the success rate when a terminal device switches to a target network slice or simultaneously accesses a target network slice.
  • the present application provides a network slice processing method.
  • the method includes: the network manager receives a network slice processing request that includes the target identifier sent by the terminal device, and the terminal device has accessed the source network slice.
  • the network manager performs the target network slice access authorization corresponding to the target identifier on the terminal device according to the network slice processing request, and acquires the first protocol configuration information corresponding to the target network slice, and sends the first protocol configuration information to the terminal device.
  • the first protocol configuration information is used to instruct the terminal device to perform protocol configuration according to the first protocol configuration information to access the target network slice.
  • the terminal device can generate a network slice processing request according to the requirements of the network, and the network manager determines the first protocol configuration information according to the network slice processing request, and the terminal device can be configured according to the first protocol configuration information, so that the terminal device can be based on the target network.
  • the first protocol configuration information corresponding to the slice is configured by the protocol, so that the terminal device can correctly access the target network slice, which improves the success rate when the terminal device switches to the target network slice or simultaneously accesses the target network slice.
  • the target identifier is an identifier of the target network slice
  • the network slice processing request further includes an identifier of the terminal device.
  • the network manager obtains the subscription information corresponding to the identifier of the terminal device from the HSS or the PCRF according to the identifier of the terminal device, and if the network manager determines, according to the subscription information and the identifier of the target network slice, the terminal device can access the target network. When slicing, it is set for the terminal.
  • the target network slice access authorization corresponding to the identifier of the target network slice is prepared. The access authorization further improves the success rate when the terminal device switches to the target network slice or simultaneously accesses the target network slice.
  • the target identifier is an identifier of the target service type
  • the network slice processing request further includes an identifier of the terminal device.
  • the network manager obtains the subscription information corresponding to the identifier of the terminal device from the HSS or the PCRF according to the identifier of the terminal device, and if the network manager determines, according to the subscription information and the identifier of the target service type, the terminal device can access the target network. If the slice is used, the target device performs the target network slice access authorization corresponding to the identifier of the target service type. The access authorization further improves the success rate when the terminal device switches to the target network slice or simultaneously accesses the target network slice.
  • the network slice processing request further includes the terminal Protocol configuration capability information of the device. If the network manager determines that the terminal device supports the protocol reconfiguration according to the protocol configuration capability information of the terminal device, determining to perform the operation of performing the target network slice access authorization corresponding to the target identifier of the terminal device according to the network slice processing request.
  • the authorization step is performed only when the terminal device supports protocol reconfiguration, which further improves the success rate when the terminal device switches to the target network slice or simultaneously accesses the target network slice.
  • the terminal device is initially accessed by default.
  • the network slice is described.
  • the source network slice is the default network slice.
  • the network manager receives the first network slice access request sent by the terminal device, including the identifier of the terminal device.
  • the network manager obtains a default network slice corresponding to the identifier of the terminal device according to the first network slice access request, and performs default network slice access authorization on the terminal device, and the network manager obtains a second protocol corresponding to the default network slice.
  • the configuration information is sent by the network manager to the terminal device for the terminal device to perform protocol configuration according to the second protocol configuration information to access the default network slice.
  • the network manager may send the second protocol configuration information to the terminal device, where the second protocol configuration information is used to instruct the terminal device to perform protocol configuration according to the second protocol configuration information corresponding to the default network slice, thereby improving the initial access of the terminal device.
  • the success rate of the default network slice may be used to instruct the terminal device to perform protocol configuration according to the second protocol configuration information corresponding to the default network slice, thereby improving the initial access of the terminal device.
  • the initial access to the terminal device is Access network slices are described.
  • the source network slice is the slice to be accessed.
  • the network manager receives the second network slice access request that is sent by the terminal device, including the to-be-accessed identifier, and the network manager performs, according to the second network slice access request, the network slice to be accessed corresponding to the to-be-accessed identifier of the terminal device.
  • the network manager sends the third protocol configuration information to the terminal device, so that the terminal device performs protocol configuration according to the third protocol configuration information to access the Access network slices.
  • the network manager may send the third protocol configuration information to the terminal device, where the third protocol configuration information is used to instruct the terminal device to perform protocol configuration according to the third protocol configuration information corresponding to the network slice to be accessed, thereby improving the connection of the terminal device. The success rate when entering the network slice.
  • the to-be-access-identified identifier is an identifier of a network slice to be accessed
  • the second network slice access request further includes a terminal The identity of the device.
  • the network manager obtains the subscription information corresponding to the identifier of the terminal device from the HSS or the PCRF according to the identifier of the terminal device, and if the network manager determines, according to the subscription information and the identifier of the network slice to be accessed, the terminal device can access the access device to be accessed. If the network is sliced, the network manager accesses the network slice access authorization corresponding to the identifier of the network slice to be accessed by the terminal device. The access authorization further improves the success rate of the terminal device when accessing the slice to be accessed.
  • a seventh possible implementation manner of the first aspect if the network manager determines, according to the subscription information and the identifier of the network slice to be accessed, the terminal device cannot be connected to be connected.
  • the network slice is obtained, the default network slice corresponding to the identifier of the terminal device is obtained, and the default network slice access authorization is performed on the terminal device, and the fourth protocol configuration information corresponding to the default network slice is obtained, and the fourth protocol is sent to the terminal device.
  • the configuration information, the fourth protocol configuration information is used to instruct the terminal device to perform protocol configuration according to the fourth protocol configuration information to access the default network slice.
  • the network manager needs to connect the terminal device to the network slice to be accessed when the terminal device can access the network slice to be accessed.
  • the network slice access authorization is obtained, and the third protocol configuration information corresponding to the network slice to be accessed is obtained, and when the terminal device cannot access the network slice to be accessed, the default network slice corresponding to the identifier of the terminal device is obtained, and the terminal is obtained.
  • the device performs the default network slice access authorization, and obtains the fourth protocol configuration information corresponding to the default network slice, so as to enable the terminal device to access the network slice access authorization or the default network according to the second network slice access request.
  • the network slice processing request further includes an identifier of the processing request type; and if the processing request type corresponding to the identifier of the processing request type is a network slice switching request, the method The method further includes: the network manager tearing down the bearer and connection between the terminal device and the slice to be accessed. When the terminal device needs to switch to the target network slice, the network manager can remove the bearer and connection between the terminal device and the initially accessed network slice to be accessed to save air interface resources.
  • the network manager includes an interconnected slice manager and an SDPC.
  • the slice manager receives a network slice processing request sent by the terminal device.
  • the network slice processing request includes a target identifier, and the terminal device has accessed the source network slice.
  • the slice manager performs the target network slice access authorization corresponding to the target identifier of the terminal device according to the network slice processing request.
  • the slice manager sends a network slice processing request to the SDPC, and the SDPC determines first protocol configuration information corresponding to the target identifier according to the network slice processing request, and sends the first protocol configuration information to the slice manager.
  • the slice manager receives the first protocol configuration information sent by the SDPC, and sends the first protocol configuration information to the terminal device, where the first protocol configuration information is used to instruct the terminal device to perform protocol configuration according to the first protocol configuration information to access the target network slice. .
  • the slice manager is authorized to access, and the SDPC determines the first protocol configuration information.
  • the slice manager and the SDPC are respectively implemented in the implementation. Achieve different functions and be more efficient.
  • the application provides a network slice processing method.
  • the method includes: the terminal device accesses the source network slice.
  • the terminal device sends a network slice processing request to the network manager.
  • the network slice processing request includes an identifier of the target network slice.
  • the terminal device receives the first protocol configuration information corresponding to the target network slice that is obtained by the network manager according to the network slice processing request, and the terminal device performs protocol configuration according to the first protocol configuration information to access the target network slice.
  • the terminal device can generate a network slice processing request according to the requirements of the network, and the network manager determines the first protocol configuration information according to the network slice processing request, and the terminal device can be configured according to the first protocol configuration information, so that the terminal device can be based on the target network.
  • the first protocol configuration information corresponding to the slice is configured by the protocol, so that the terminal device can correctly access the target network slice, which improves when the terminal device switches from the source network slice to the target network slice or simultaneously accesses the target network slice. Success rate.
  • the target identifier is an identifier of the target network slice
  • the network slice processing request further includes an identifier of the terminal device
  • the network slice processing request is used to indicate that the network manager is configured according to
  • the identifier of the terminal device obtains the subscription information corresponding to the identifier of the terminal device from the HSS or the PCRF. If the network manager determines that the terminal device can access the target network slice according to the subscription information and the identifier of the target network slice, the terminal device performs the terminal device.
  • the target network slice access authorization corresponding to the identity of the target network slice. The access authorization further improves the success rate when the terminal device switches to the target network slice or simultaneously accesses the target network slice.
  • the target identifier is an identifier of the target service type
  • the network slice processing request further includes an identifier of the terminal device
  • the network slice processing request is used to instruct the network manager to
  • the identifier of the terminal device is obtained from the HSS or the PCRF, and the network manager obtains the subscription information corresponding to the identifier of the terminal device. If the network manager determines that the terminal device can access the target network slice according to the subscription information and the identifier of the target service type, the terminal device performs the terminal device.
  • the target network slice access authorization corresponding to the identifier of the target service type. The access authorization further improves the success rate when the terminal device switches to the target network slice or simultaneously accesses the target network slice.
  • the network slice processing request further includes the terminal
  • the protocol configuration capability information of the device is used to indicate that if the network manager determines that the terminal device supports protocol reconfiguration according to the protocol configuration capability information of the terminal device, the network slice manager determines to perform the performing on the terminal device according to the network slice processing request.
  • the target network slice corresponds to the target network slice access authorization operation. The step of performing access authorization is performed only when the terminal device supports protocol reconfiguration, which further improves the success rate when the terminal device switches to the target network slice or simultaneously accesses the target network slice.
  • the terminal device is initially accessed by default.
  • the network slice is described.
  • the source network slice is the default network slice.
  • the terminal device sends a first network slice access request including the identifier of the terminal device to the network manager, where the first network slice access request is used to instruct the network manager to acquire the identifier corresponding to the identifier of the terminal device according to the first network slice access request.
  • Default network segmentation, and performing default network slice access authorization for the terminal device obtaining second protocol configuration information corresponding to the default network slice, the terminal device receiving the second protocol configuration information sent by the network manager, and the terminal device according to the second protocol
  • the configuration information is configured for protocol access to the default network slice.
  • the terminal device can perform protocol configuration according to the second protocol configuration information corresponding to the default network slice, thereby improving the success rate of the terminal device when initially accessing the network slice.
  • the source network slice is to be accessed Network slicing.
  • the terminal device sends a second network slice access request to the network manager, where the second network slice access request includes a to-be-accessed identifier, and the second network slice access request is used to instruct the network manager to access according to the second network slice
  • the terminal device performs the access network slice access authorization corresponding to the to-be-accessed identifier, and acquires third protocol configuration information corresponding to the to-be-accessed network slice.
  • the terminal device receives the third protocol configuration information sent by the network manager.
  • the terminal device performs protocol configuration according to the third protocol configuration information to access the network slice to be accessed, thereby improving the success rate of the terminal device when accessing the slice to be accessed.
  • the identifier to be accessed is an identifier of a network slice to be accessed
  • the second network slice access request further includes a terminal The identity of the device.
  • the network slice access request is used to instruct the network manager to obtain the subscription information corresponding to the identifier of the terminal device from the HSS or the PCRF according to the identifier of the terminal device, if the network manager determines according to the subscription information and the identifier of the network slice to be accessed.
  • the terminal device can access the network slice to be accessed, and the network manager performs access to the network slice access authorization corresponding to the identifier of the network slice to be accessed by the terminal device.
  • the access authorization further improves the success rate of the terminal device when accessing the slice to be accessed.
  • the network manager determines, according to the subscription information and the identifier of the network slice to be accessed, that the terminal device cannot be connected to be connected.
  • the method further includes: receiving, by the terminal device, fourth protocol configuration information sent by the network manager.
  • the fourth protocol configuration information is protocol configuration information corresponding to the default network slice obtained by the network manager, and the default network slice is a network slice corresponding to the identifier of the terminal device acquired by the slice manager.
  • the terminal device performs protocol configuration according to the fourth protocol configuration information to access the default network slice.
  • the network manager When the terminal device cannot access the network slice to be accessed, the network manager obtains a default network slice corresponding to the identifier of the terminal device, performs default network slice access authorization on the terminal device, and acquires a fourth protocol configuration corresponding to the default network slice.
  • the information is configured by the terminal device to access the default network slice according to the fourth protocol configuration information corresponding to the default network slice, thereby improving the success rate of the terminal device when initially accessing the network slice.
  • the application provides a network manager, including: a transceiver, a memory, and a processor.
  • the memory is used to store instructions.
  • the processor is connected to the memory and the transceiver, respectively, for executing instructions to perform the following steps: receiving, by the transceiver, a network slice processing request sent by the terminal device, where the network slice processing request includes the target identifier, and the terminal device has Accessing the source network slice; performing the target network slice access authorization corresponding to the target identifier on the terminal device according to the network slice processing request, and acquiring the first protocol configuration information corresponding to the target network slice; sending the first to the terminal device by using the transceiver
  • the protocol configuration information is used to indicate that the terminal device performs protocol configuration according to the first protocol configuration information to access the target network slice.
  • the target identifier is an identifier of the target network slice.
  • the network slice processing request also includes an identification of the terminal device.
  • the processor is configured to perform, according to the network slice processing request, the target network slice access authorization corresponding to the target identifier of the terminal device, according to the identifier of the terminal device, from the home subscription user server HSS or the policy and charging rule function unit PCRF Obtaining subscription information corresponding to the identifier of the terminal device; if it is determined that the terminal device can access the target network slice according to the subscription information and the identifier of the target network slice, performing target network slice access authorization corresponding to the identifier of the target network slice for the terminal device .
  • the target identifier is an identifier of the target service type.
  • the network slice processing request also includes an identification of the terminal device.
  • the processor is configured to obtain the subscription information corresponding to the identifier of the terminal device from the HSS or the PCRF according to the identifier of the terminal device, according to the network slice processing request, the terminal device performs the target network slice access authorization corresponding to the target identifier. If the terminal device can access the target network slice according to the signing information and the identifier of the target service type, the target device performs the target network slice access authorization corresponding to the target service type identifier.
  • the network slice processing request further includes the terminal Protocol configuration capability information of the device.
  • the processor is further configured to: determine, according to the protocol configuration capability information of the terminal device, that the terminal device supports protocol reconfiguration, according to the network slice processing request, before performing the target network slice access authorization corresponding to the target identifier of the terminal device, determining the execution basis
  • the network slice processing request cuts the target network corresponding to the target identifier of the terminal device. Slice access authorization operation.
  • the source network slice is a default network slice .
  • the processor Before receiving, by the transceiver, the network slice processing request sent by the terminal device, the processor is further configured to: receive, by the transceiver, a first network slice access request sent by the terminal device, where the first network slice access request includes the terminal device And obtaining, according to the first network slice access request, a default network slice corresponding to the identifier of the terminal device, and performing default network slice access authorization on the terminal device; acquiring second protocol configuration information corresponding to the default network slice; The device sends the second protocol configuration information to the terminal device, where the second protocol configuration information is used to instruct the terminal device to perform protocol configuration according to the second protocol configuration information to access the default network slice.
  • the source network slice is to be accessed Network slicing.
  • the processor is further configured to: receive, by the transceiver, a second network slice access request sent by the terminal device, where the second network slice access request includes the to-be-accessed And determining, according to the second network slice access request, the access device to access the network slice access authorization corresponding to the to-be-accessed identifier, and acquiring the third protocol configuration information corresponding to the to-be-accessed network slice;
  • the terminal device sends the third protocol configuration information, where the third protocol configuration information is used to instruct the terminal device to perform protocol configuration according to the third protocol configuration information to access the network slice to be accessed.
  • the identifier to be accessed is an identifier of a network slice to be accessed
  • the second network slice access request further includes a terminal The identity of the device.
  • the processor is configured to: acquire, according to the identifier of the terminal device, the terminal and the PCRF from the HSS or the PCRF according to the second network slice access request, and the terminal device performs the access network access access authorization corresponding to the to-be-accessed identifier.
  • the subscription information corresponding to the identifier of the device if it is determined that the terminal device can access the network slice to be accessed according to the subscription information and the identifier of the network slice to be accessed, the terminal device needs to access the network corresponding to the identifier of the network slice to be accessed.
  • Slice access authorization if it is determined that the terminal device can access the network slice to be accessed according to the subscription information and the identifier of the network slice to be accessed, the terminal device needs to access the network corresponding to the identifier of the network slice to be accessed.
  • the processor is further configured to: if the terminal device cannot be connected according to the subscription information and the identifier of the network slice to be accessed After the access network slice is received, the default network slice corresponding to the identifier of the terminal device is obtained, and the default network slice access authorization is performed on the terminal device; the fourth protocol configuration information corresponding to the default network slice is obtained; and the terminal device is sent through the transceiver.
  • the fourth protocol configuration information is sent, where the fourth protocol configuration information is used to instruct the terminal device to perform protocol configuration according to the fourth protocol configuration information to access the default network slice.
  • the network slice processing request further includes an identifier of the processing request type. If the processing request type corresponding to the identifier of the processing request type is a network slice switching request, the processor is further configured to: remove the bearer and the connection between the terminal device and the source network slice.
  • the application provides a terminal device. Includes: transceiver, memory, and processor.
  • the memory is used to store instructions.
  • the processor is coupled to the memory and the transceiver, respectively, for executing instructions to perform the following steps: accessing the source network slice; and transmitting, by the transceiver, a network slice processing request to the network manager, where the network slice processing request includes a target identifier, the network slice processing request is used to instruct the network manager to perform the target network slice access authorization corresponding to the target identifier of the terminal device according to the network slice processing request, and obtain the first protocol configuration information corresponding to the target network slice;
  • the device receives the first protocol configuration information sent by the network manager; performs protocol configuration according to the first protocol configuration information to access the target network slice.
  • the target identifier is an identifier of the target network slice.
  • the network slice processing request also includes an identification of the terminal device.
  • the network slice processing request is used to instruct the network manager to obtain the subscription information corresponding to the identifier of the terminal device from the home subscription subscriber server HSS or the policy and charging rule function unit PCRF according to the identifier of the terminal device, if the network manager is contracted according to the subscription.
  • the identifier of the information and the target network slice determines that the terminal device can access the target network slice, and then performs the target network slice access authorization corresponding to the identifier of the target network slice to the terminal device.
  • the target identifier is an identifier of the target service type.
  • the network slice processing request also includes an identification of the terminal device.
  • the network slice processing request is used to instruct the network manager to obtain the subscription information corresponding to the identifier of the terminal device from the HSS or the PCRF according to the identifier of the terminal device, and if the network manager determines, according to the subscription information and the identifier of the target service type, the terminal device can After accessing the target network slice, the terminal device performs the target network slice access authorization corresponding to the identifier of the target service type.
  • the network slice processing request further includes the terminal Protocol configuration capability information of the device.
  • the protocol configuration capability information is used to indicate that if the network manager determines that the terminal device supports protocol reconfiguration according to the protocol configuration capability information of the terminal device, the network manager determines to perform the target network slice connection corresponding to the target identifier of the terminal device according to the network slice processing request. Enter the authorized operation.
  • the source network slice is a default network slice .
  • the processor is configured to: send, by the transceiver, a first network slice access request to the network manager, where the first network slice access request includes an identifier of the terminal device, and the first network slice access The request is used to instruct the network manager to obtain a default network slice corresponding to the identifier of the terminal device according to the first network slice access request, perform default network slice access authorization on the terminal device, and obtain a second protocol corresponding to the default network slice.
  • the configuration information is received by the transceiver, and the second protocol configuration information sent by the network manager is received by the transceiver; and the protocol configuration is performed according to the second protocol configuration information to access the default network slice.
  • the source network slice is to be accessed Network slicing.
  • the processor is configured to: send, by the transceiver, a second network slice access request to the network manager, where the second network slice access request includes the to-be-accessed identifier, and the second network slice access The request is used to instruct the network manager to perform the access network slice access authorization corresponding to the to-be-accessed identifier of the terminal device according to the second network slice access request, and obtain the third protocol configuration information corresponding to the to-be-accessed network slice.
  • the identifier to be accessed is an identifier of a network slice to be accessed.
  • the second network slice access request further includes an identifier of the terminal device, where the second network slice access request is used to instruct the network manager to obtain the subscription information corresponding to the identifier of the terminal device from the HSS or the PCRF according to the identifier of the terminal device. If the network manager determines, according to the subscription information and the identifier of the network slice to be accessed, that the terminal device can access the network slice to be accessed, the network manager performs the network slice to be accessed corresponding to the identifier of the network slice to be accessed by the terminal device. Into the authorization.
  • the network manager determines, according to the subscription information and the identifier of the network slice to be accessed, that the terminal device cannot access the connection.
  • the processor is further configured to: receive, by the transceiver, fourth protocol configuration information sent by the network manager, where the fourth protocol configuration information is protocol configuration information that is obtained by the network manager and corresponding to the default network slice, and the default network slice A network slice corresponding to the identifier of the terminal device acquired by the slice manager; configured according to the fourth protocol configuration information to access the default network slice.
  • the application provides a network manager, including: a receiving module, an authorization module, and a sending module.
  • the receiving module is configured to receive a network slice processing request sent by the terminal device, where the network slice processing request includes a target identifier, and the terminal device has accessed the source network slice.
  • the authorization module is configured to perform, according to the network slice processing request, the target network slice access authorization corresponding to the target identifier of the terminal device, and obtain the first protocol configuration information corresponding to the target network slice.
  • a sending module configured to send the first protocol configuration information to the terminal device, where the first protocol configuration information is used to instruct the terminal device to perform protocol configuration according to the first protocol configuration information to access the target network slice.
  • the target identifier is an identifier of the target network slice.
  • the network slice processing request also includes an identification of the terminal device.
  • the authorization module is specifically configured to: obtain, according to the identifier of the terminal device, the subscription information corresponding to the identifier of the terminal device from the home subscription subscriber server HSS or the policy and charging rule function unit PCRF; if the subscription information and the target network slice are used according to the subscription information
  • the identifier determines that the terminal device can access the target network slice, and performs the target network slice access authorization corresponding to the identifier of the target network slice to the terminal device.
  • the target identifier is an identifier of the target service type.
  • the network slice processing request also includes an identification of the terminal device.
  • the authorization module is specifically configured to: obtain, according to the identifier of the terminal device, the subscription information corresponding to the identifier of the terminal device from the HSS or the PCRF; and if the terminal device can access the target network slice according to the identifier information and the identifier of the target service type, The target network slice access authorization corresponding to the identifier of the target service type is performed on the terminal device.
  • the network slice processing request further includes the terminal Protocol configuration capability information of the device.
  • the network manager further includes: a determining module, configured to: when determining the terminal device support protocol reconfiguration according to the protocol configuration capability information of the terminal device, determining to perform the target network slice access authorization corresponding to the target identifier of the terminal device according to the network slice processing request Operation.
  • the source network slice is a default network slice .
  • the receiving module is further configured to receive a first network slice access request sent by the terminal device, where the first network slice access request includes an identifier of the terminal device, and the authorization module is further configured to acquire, according to the first network slice access request, the terminal The default network slice corresponding to the identifier of the device, and the default network slice access authorization for the terminal device.
  • the network manager further includes: an obtaining module, configured to acquire second protocol configuration information corresponding to the default network slice.
  • the sending module is further configured to send the second protocol configuration information to the terminal device, where the second protocol configuration information is used to instruct the terminal device to perform protocol configuration according to the second protocol configuration information to access the default network slice.
  • the source network slice is to be accessed Network slicing.
  • the receiving module is further configured to receive a second network slice access request sent by the terminal device.
  • the second network slice access request includes an identifier to be accessed.
  • the authorization module is further configured to perform, according to the second network slice access request, the access device to access the network slice access authorization corresponding to the to-be-accessed identifier, and obtain the third protocol configuration information corresponding to the to-be-accessed network slice.
  • the sending module is further configured to send third protocol configuration information to the terminal device, where the third protocol configuration information is used to indicate the terminal device according to the The three protocol configuration information is configured to access the network slice to be accessed.
  • the identifier to be accessed is an identifier of a network slice to be accessed.
  • the second network slice access request further includes an identifier of the terminal device.
  • the authorization module is specifically configured to: obtain the subscription information corresponding to the identifier of the terminal device from the HSS or the PCRF according to the identifier of the terminal device; and determine, according to the subscription information and the identifier of the network slice to be accessed, that the terminal device can access the access device to be accessed. If the network is sliced, the network manager accesses the network slice access authorization corresponding to the identifier of the network slice to be accessed by the terminal device.
  • the acquiring module is further configured to: when determining that the terminal device cannot access according to the subscription information and the identifier of the network slice to be accessed When the network slice is to be accessed, the default network slice corresponding to the identifier of the terminal device is obtained, and the default network slice access authorization is performed on the terminal device, and the fourth protocol configuration information corresponding to the default network slice is obtained.
  • the sending module is further configured to send the fourth protocol configuration information to the terminal device, where the fourth protocol configuration information is used to instruct the terminal device to perform protocol configuration according to the fourth protocol configuration information to access the default network slice.
  • the network slice processing request further includes an identifier of the processing request type.
  • the processing request type corresponding to the identifier of the processing request type is a network slice switching request.
  • the network manager also includes a removal module for removing the bearer and connection between the terminal device and the source network slice.
  • the application provides a terminal device.
  • the terminal device includes: an access module, a sending module, a receiving module, and a configuration module.
  • the access module is used to access the source network slice.
  • the sending module is configured to send a network slice processing request to the network manager, where the network slice processing request includes a target identifier, where the network slice processing request is used to instruct the network manager to perform the target network corresponding to the target identifier according to the network slice processing request
  • the slice access authorization is obtained, and the first protocol configuration information corresponding to the target network slice is obtained.
  • the receiving module is configured to receive first protocol configuration information sent by the network manager.
  • a configuration module configured to perform protocol configuration according to the first protocol configuration information to access the target network slice.
  • the target identifier is an identifier of the target network slice.
  • the network slice processing request also includes an identification of the terminal device.
  • the network slice processing request is used to instruct the network manager to obtain the subscription information corresponding to the identifier of the terminal device from the home subscription subscriber server HSS or the policy and charging rule function unit PCRF according to the identifier of the terminal device, if the network manager is contracted according to the subscription.
  • the identifier of the information and the target network slice determines that the terminal device can access the target network slice, and then performs the target network slice access authorization corresponding to the identifier of the target network slice to the terminal device.
  • the target identifier is an identifier of the target service type.
  • the network slice processing request also includes an identification of the terminal device.
  • the network slice processing request is used to instruct the network manager to obtain the subscription information corresponding to the identifier of the terminal device from the HSS or the PCRF according to the identifier of the terminal device, and if the network manager determines, according to the subscription information and the identifier of the target service type, the terminal device can After accessing the target network slice, the terminal device performs the target network slice access authorization corresponding to the identifier of the target service type.
  • the network slice processing request further includes the terminal Protocol configuration capability information of the device.
  • the protocol configuration capability information is used to indicate that if the network manager determines that the terminal device supports protocol reconfiguration according to the protocol configuration capability information of the terminal device, the network manager determines to perform the target network slice connection corresponding to the target identifier of the terminal device according to the network slice processing request. Enter the authorized operation.
  • the source network slice is a default network slice .
  • the access module is specifically configured to: send a first network slice access request to the network manager, where the first network slice access request includes an identifier of the terminal device, where the first network slice access request is used to indicate that the network manager is configured according to the a network slice access request, obtaining a default network slice corresponding to the identifier of the terminal device, performing default network slice access authorization on the terminal device, acquiring second protocol configuration information corresponding to the default network slice, and receiving the network protocol sending The second protocol configuration information is configured according to the second protocol configuration information to access the default network slice.
  • the source network slice is to be accessed Network slicing.
  • the access module is specifically configured to: send a second network slice access request to the network manager, where the second network slice access request includes a to-be-accessed identifier, and the second network slice access request is used to indicate that the network manager is configured according to the a network slice access request, the terminal device performs the access network slice access authorization corresponding to the to-be-accessed identifier, and acquires third protocol configuration information corresponding to the to-be-accessed network slice; and receives the third network configuration information sent by the network manager. Protocol configuration information; protocol configuration according to the third protocol configuration information to access the network slice to be accessed.
  • the identifier to be accessed is an identifier of a network slice to be accessed.
  • the second network slice access request further includes an identifier of the terminal device.
  • the second network slice access request is used to instruct the network manager to obtain the subscription information corresponding to the identifier of the terminal device from the HSS or the PCRF according to the identifier of the terminal device, if the network manager is based on the subscription information and the slice to be accessed by the network
  • the identifier determines that the terminal device can access the network slice to be accessed, and the network manager performs the access network slice access authorization corresponding to the identifier of the network slice to be accessed by the terminal device.
  • the network manager determines, according to the subscription information and the identifier of the network slice to be accessed, that the terminal device cannot be connected to be connected.
  • the access module is further configured to receive the fourth protocol configuration information sent by the network manager, where the fourth protocol configuration information is protocol configuration information that is obtained by the network manager and corresponding to the default network slice, and the default network slice is The network slice corresponding to the identifier of the terminal device acquired by the slice manager; the access module is configured to perform protocol configuration according to the fourth protocol configuration information to access the default network slice.
  • Embodiment 1 is a system structural diagram of Embodiment 1 of a network slice processing method according to the present application;
  • Embodiment 2 is a signaling interaction diagram of Embodiment 1 of a network slice processing method provided by the present application;
  • FIG. 3 is a signaling interaction diagram of Embodiment 2 of a network slice processing method provided by the present application.
  • Embodiment 4 is a signaling interaction diagram of Embodiment 3 of a network slice processing method provided by the present application.
  • FIG. 5 is a schematic structural diagram of Embodiment 1 of a network manager according to the present application.
  • FIG. 6 is a schematic structural diagram of Embodiment 1 of a terminal device according to the present application.
  • FIG. 7 is a schematic structural diagram of Embodiment 2 of a network manager according to the present application.
  • FIG. 8 is a schematic structural diagram of Embodiment 2 of a terminal device provided by the present application.
  • FIG. 1 is a structural diagram of a network system provided by the present application.
  • the network slices are divided on the data plane, and all network slices share a common control plane function.
  • a network slice consists of a set of one or more network functions and resources that can run these network functions. Among them, network functions can provide the required telecommunications services and network capabilities.
  • a network function is a processing unit in a network that has well-defined functional behavior and well-defined interfaces.
  • the network slice includes an evolved base station (evolved Node B; eNB for short), a serving gateway (Serving Gateway; SGW), and a packet data network gateway (PGW).
  • eNB evolved Node B
  • SGW serving gateway
  • PGW packet data network gateway
  • the control plane includes a Mobility Management Entity (MME), a Home Subscriber Server (HSS), a Policy and Charging Rules Function (PCRF), and a slice. Manager and Software Defined Protocol Controller (SDPC).
  • MME Mobility Management Entity
  • HSS Home Subscriber Server
  • PCRF Policy and Charging Rules Function
  • SDPC Manager and Software Defined Protocol Controller
  • the MME, the Slice Manager, and the SDPC are sequentially connected and connected to the HSS and the PCRF, respectively.
  • Solid line in Figure 1 Indicates the connection of the data plane
  • the dotted line Indicates the connection of the control surface.
  • the network manager in this application includes a slice manager and an SDPC.
  • the slice manager and the SDPC can be located in the same entity or in different entities, and the two are connected through interfaces.
  • the network manager can be located in an entity in the live network, and its logic functionally implements the functions of the network manager.
  • the slice manager is responsible for network slice generation, resource allocation, access selection, and access authorization.
  • the slice manager completes the generation of the network slice by establishing a connection and a bearer of each network slice. According to the logical function corresponding to the network slice, the mapping between the logical function and the physical resource is completed to implement resource allocation.
  • the default network slice is selected for the terminal device according to the subscription information of the terminal device to implement the access selection.
  • the terminal device can be authorized to implement the access authorization when the terminal device can switch to the target network slice or access the network slice.
  • the SDPC is configured to perform protocol configuration on the network entity function on the network slice according to the service type supported on the network slice, and select protocol configuration information corresponding to the network slice that the terminal device needs to access. Different types of services can be carried on different network slices. The terminal device can access different network slices to perform different services.
  • the network slice processing method provided by the present application can be applied to the following scenario: when the terminal device needs to perform the second type of service, the performance of the network slice 11 cannot meet the second type of service requirement, and the terminal device needs to switch to the network slice. 12; and, when the terminal device needs to perform the second type of service while performing the first type of service, the terminal device needs to access the network slice 12 at the same time.
  • the terminal device in this application may be a handheld device, an in-vehicle device, a wearable device, a computing device, And various forms of user equipment (User Equipment; abbreviated as: UE), mobile station (Mobile Station; abbreviated as: MS) and terminal (terminal).
  • UE User Equipment
  • MS Mobile Station
  • terminal terminal
  • FIG. 2 is a signaling interaction diagram of Embodiment 1 of a network slice processing method provided by the present application. As shown in FIG. 2, the network slice processing method provided by the present application includes the following steps:
  • S201 The terminal device accesses the source network slice.
  • the terminal device may send an access request to the network manager, and the network manager performs access authorization on the terminal device according to the access request, and sends configuration information, and the terminal device configures according to the configuration information to access the source network slice.
  • the source network slice in this application is a network slice that the terminal device has currently accessed.
  • the access request when accessing the source network slice, may include only the identifier of the terminal device.
  • the network slice manager obtains a default network slice corresponding to the identifier of the terminal device, performs default network slice access authorization on the terminal device, and obtains protocol configuration information corresponding thereto, and sends the protocol configuration information to the terminal device.
  • the terminal device is configured to access the default network slice according to protocol configuration information corresponding to the default network slice.
  • the default network slice is a network slice that is determined when the terminal device signs up to meet the basic service requirements of the terminal device.
  • the access request when accessing the source network slice, includes an identifier of the source network slice that needs to be accessed by the terminal device according to the service that is required by the terminal device. Since the terminal device does not access the source network slice at this time, the identifier is referred to as the to-be-accessed identifier, and the corresponding source network slice is referred to as the to-be-accessed network slice.
  • the network slice manager performs the network slice access authorization for the terminal device to be accessed according to the to-be-accessed identifier, and obtains the protocol configuration information corresponding thereto, and sends the protocol configuration information to the terminal device, and the terminal device according to the slice to be accessed according to the network slice to be accessed.
  • the protocol configuration information is configured to access the network slice to be accessed.
  • S202 The terminal device sends a network slice processing request to the network manager, and the network manager receives the network slice processing request sent by the terminal device.
  • the network slice processing request includes a target identifier.
  • the terminal device has access to the source network slice.
  • the terminal device sends a network slice processing request to the network manager, where the network slice processing request is used to instruct the network manager to perform the target network slice access authorization corresponding to the target identifier of the terminal device according to the network slice processing request, and obtain the mapping corresponding to the target network slice.
  • the first protocol configuration information is used to instruct the network manager to perform the target network slice access authorization corresponding to the target identifier of the terminal device according to the network slice processing request, and obtain the mapping corresponding to the target network slice.
  • the network slice processing request may include an identifier of the processing request type to indicate what type of network slice processing request is.
  • the network slice processing request may be a network slice handover request or a network slice access request.
  • Different services can be run on the terminal device.
  • the terminal device has accessed a source network slice to run a service, and the connection between the target network slice and the control plane has been established. For example, in the first case, the terminal device has access to a source network slice to run the voice service. At this time, if the terminal device needs to end the voice service and connect the smart meter to read the power of the power, due to the current The source network slice is suitable for running voice services.
  • the characteristics of the source network slice are small delay, low security, and low reliability.
  • the service requires security and reliability. Higher, therefore, the terminal device needs to switch from the current source network slice to the target network slice that can run the degree of reading the power on the smart meter.
  • the terminal device needs to connect the smart meter to read the degree of power without ending the voice service, and the terminal device needs to access the target network slice that can meet the service demand of the read power, and also Access to running voice services Source network slice.
  • the network slice processing request is a network slice handover request.
  • the network slice processing request is a network slice access request. The terminal device and the network manager can pre-agreed rules to cause the network manager to identify the type of network slice processing request.
  • the terminal device When the terminal device needs to run a new service and the current source network slice cannot meet the requirement of the new service, the terminal device sends a network slice processing request to the network manager.
  • the target network slice is a network slice to which the terminal device is to be accessed or to be switched.
  • the target identifier can be the identity of the target network slice.
  • the terminal device can query the mapping relationship between the stored service and the network slice, and determine the target network slice according to the target service type that is to be run, so as to obtain the identifier of the target network slice.
  • the terminal device queries the mapping relationship between the identifier of the service type stored by itself and the identifier of the network slice, and determines the identifier of the target network slice according to the target service type to be run by itself.
  • the target identity can also be an identity of the target service type.
  • the terminal device can query the mapping relationship between the target service type and the identifier of the target service type, and determine the identifier of the target service type according to the target service type to be run.
  • the terminal device may first send a network slice processing request to the eNB in the source network slice.
  • the eNB in the source network slice then sends a network slice processing request to the MME of the control plane.
  • the MME then sends a network slice processing request to the network manager.
  • the network manager receives the network slice processing request sent by the MME.
  • the network manager performs the target network slice access authorization corresponding to the target identifier on the terminal device according to the network slice processing request, and acquires first protocol configuration information corresponding to the target network slice.
  • the target identifier is an identifier of the target network slice.
  • the network manager stores the subscription information of the terminal device, and performs the target network slice access authorization corresponding to the identifier of the target network slice according to the subscription information of the terminal device and the identifier of the target network slice.
  • the target identifier is an identifier of the target network slice
  • the network slice processing request sent by the terminal device further includes an identifier of the terminal device.
  • the identifier of the terminal device may be an International Mobile Subscriber Identification Number (IMSI) or the like.
  • IMSI International Mobile Subscriber Identification Number
  • the network manager obtains the subscription information corresponding to the identifier of the terminal device from the HSS or the PCRF according to the identifier of the terminal device in the network slice processing request. If the network manager determines that the terminal device can access the target network slice according to the subscription information and the identifier of the target network slice, the terminal device performs the target network slice access authorization corresponding to the identifier of the target network slice.
  • the subscription information here may be information such as the type of the service that the terminal device can sign when entering the network, the data transmission rate, the bandwidth, the delay, and the packet loss rate.
  • the target identifier is an identifier of the target service type
  • the network slice processing request further includes an identifier of the terminal device.
  • the network manager After receiving the network slice processing request, the network manager obtains the subscription information corresponding to the identifier of the terminal device from the HSS or the PCRF according to the identifier of the terminal device in the network slice processing request. If the network manager determines that the terminal device can access the target network slice according to the subscription information and the identifier of the target service type, the terminal device performs the target network slice access authorization corresponding to the identifier of the target service type.
  • the network manager and the SDPC in the network manager are located in the same entity, that is, when the network manager integrates with the terminal device, the network manager can obtain the target network from itself.
  • the corresponding first protocol configuration information is sliced.
  • the slice manager and the SDPC in the network manager are separately set to different entities, the slice manager performs access authorization on the terminal device according to the network slice processing request, and then the slice manager sends the network slice processing request to the SDPC.
  • the SDPC determines the first protocol configuration information corresponding to the target network slice, and then sends the first protocol configuration information to the slice manager.
  • the network manager may determine that if the subscription information of the terminal device includes the service corresponding to the target network slice, the network manager determines The terminal device can access the target network slice.
  • the network manager may also use other methods for determining. For example, when the bandwidth of the subscription information can satisfy the service corresponding to the target network slice, the network manager determines that the terminal device can access the target network slice. This embodiment does not limit this.
  • the network manager may determine that, if the subscription information of the terminal device includes the target service type corresponding to the identifier of the target service type, The network manager determines that the terminal device can access the target network slice.
  • the first protocol configuration information may include protocol stack configuration information corresponding to the target network slice that the terminal device needs to adopt.
  • S204 The network manager sends the first protocol configuration information to the terminal device, where the terminal device receives the first protocol configuration information sent by the network manager.
  • the network manager sends the first protocol configuration information to the terminal device, where the first protocol configuration information is used to instruct the terminal device to perform protocol configuration according to the first protocol configuration information to access the target network slice.
  • the network manager may first send the first protocol configuration information to the MME.
  • the MME then sends the first protocol configuration information to the eNB in the source network slice.
  • the eNB in the source network slice then sends the first protocol configuration information to the terminal device.
  • the terminal device receives the first protocol configuration information sent by the eNB in the source network slice.
  • S205 The terminal device performs protocol configuration according to the first protocol configuration information to access the target network slice.
  • the terminal device in this application is a terminal device having a protocol configuration function.
  • the first implementation manner only one basic protocol configuration information is stored on the terminal device, and after receiving the first protocol configuration information, the terminal device performs configuration on the basis of the basic protocol configuration information to ensure that the protocol stack of the terminal device can Matches the target network slice.
  • the second implementation manner is: the terminal device stores a plurality of different protocol configuration information, and after receiving the first protocol configuration information, the terminal device selects the protocol configuration information that is the same as the first protocol configuration information to complete the configuration.
  • the MME or the network manager triggers the connection between the established terminal device and the target network slice and the bearer access target network slice.
  • the network slice processing method provided by the present application accesses the source network slice through the terminal device, the terminal device sends a network slice processing request to the network manager, and the network manager receives the network slice processing request sent by the terminal device, and the network manager processes the network slice according to the network.
  • the network manager sending the first protocol configuration information to the terminal device, where The first protocol configuration information is performed
  • the protocol is configured to access the target network slice
  • the terminal device receives the first protocol configuration information sent by the network manager, and the terminal device performs protocol configuration according to the first protocol configuration information, where the terminal device needs to switch or simultaneously run a new service
  • the network slice processing request is generated according to the requirements of the network
  • the network manager can determine the first protocol configuration information according to the network slice processing request, and the terminal device can be configured according to the first protocol configuration information, so that the terminal device can be configured according to the target network slice.
  • the first protocol configuration information is configured by the protocol, so that the terminal device can correctly access the target network slice, which improves the success rate when the terminal device switches to the target network slice or simultaneously accesses the target network slice.
  • FIG. 3 is a signaling interaction diagram of Embodiment 2 of a network slice processing method provided by the present application.
  • the network slice processing method provided by the present application on the basis of the foregoing embodiment shown in FIG. 2, details the steps of S201 when the source network slice is the default network slice:
  • S301 The terminal device sends a first network slice access request to the network manager, where the network manager receives the first network slice access request sent by the terminal device.
  • the first network slice access request includes an identifier of the terminal device.
  • the terminal device sends a first network slice access request to the network manager, where the first network slice access request is used to instruct the network manager to obtain a default network slice corresponding to the identifier of the terminal device according to the first network slice access request, and Performing a default network slice access authorization on the terminal device, and acquiring second protocol configuration information corresponding to the default network slice.
  • the terminal device sends a first network slice access request to the network manager.
  • the terminal device may first send the first network slice access request to the eNB of the default network slice.
  • the eNB of the default network slice then sends a first network slice access request to the MME.
  • the MME then sends the first network slice access request to the network manager.
  • the first network slice access request includes an identifier of the terminal device.
  • the network manager obtains a default network slice corresponding to the identifier of the terminal device according to the first network slice access request, and performs default network slice access authorization for the terminal device.
  • the network manager may obtain a default corresponding to the identifier of the terminal device according to the identifier of the terminal device.
  • Network slicing, and default network slice access authorization for terminal devices may also obtain the subscription information of the terminal device from the HSS or the PCRF according to the identifier of the terminal device, and then determine the default network slice of the terminal device according to the subscription information.
  • the network manager stores a default network slice corresponding to the identifier of the different terminal device.
  • the network manager acquires second protocol configuration information corresponding to the default network slice.
  • the network manager can obtain the second protocol configuration information corresponding to the default network slice from itself after performing the access authorization on the terminal device;
  • the slice manager and SDPC in the network manager are separately set to different entities, the slice manager performs default network slice access authorization on the terminal device, and then the slice manager sends a network slice processing request to the SDPC, and the SDPC determines the default network.
  • the corresponding second protocol configuration information is sliced, and the second protocol configuration information is sent to the slice manager.
  • S304 The network manager sends second protocol configuration information to the terminal device, where the terminal device receives the second protocol configuration information sent by the network manager.
  • the network manager sends the second protocol configuration information to the terminal device, so that the terminal device is configured according to the second protocol.
  • S305 The terminal device performs protocol configuration according to the second protocol configuration information to access the default network slice.
  • the implementation process is similar to that of S205, and details are not described herein again.
  • the connection between the established terminal device and the default network slice and the bearer access to the default network slice are triggered by the MME or the network manager.
  • the method further includes: S306: establishing a bearer and a connection between the terminal device and the default network slice.
  • the network manager may trigger the establishment of a bearer and a connection between the terminal device and the default network slice.
  • the network manager obtains the second protocol configuration information corresponding to the default network slice, the network manager triggers the establishment of the bearer and the connection.
  • the network manager establishes a bearer and a connection between the terminal device and the source network slice by generating an identifier related to the bearer, a quality of service (QoS), and a maintenance amount.
  • the terminal device sends a configuration completion message to the network manager, and after receiving the configuration completion message, the network manager triggers the establishment of a bearer and a connection between the terminal device and the source network slice.
  • QoS quality of service
  • the terminal device sends a network slice processing request to the network manager, and the network manager receives the network slice processing request sent by the terminal device.
  • the network manager performs the target network slice access authorization corresponding to the target identifier on the terminal device according to the network slice processing request, and acquires first protocol configuration information corresponding to the target network slice.
  • the network manager sends the first protocol configuration information to the terminal device, where the terminal device receives the first protocol configuration information sent by the network manager.
  • the network manager sends the first protocol configuration information to the terminal device, so that the terminal device accesses the target network slice, and performs protocol configuration according to the first protocol configuration information.
  • S310 The terminal device performs protocol configuration according to the first protocol configuration information to access the target network slice.
  • S307-S310 is similar to the implementation process of S202-S205, and is not described here.
  • the method further includes: S311: establishing a bearer and a connection between the terminal device and the target network slice.
  • the network manager may trigger the establishment of a bearer and a connection between the terminal device and the target network slice.
  • the network manager After the network manager obtains the first protocol configuration information corresponding to the target network slice, the network manager triggers the establishment of the bearer and the connection.
  • the network manager establishes bearers and connections between the terminal device and the target network slice by generating the identity, QoS, and maintenance amount associated with the bearer.
  • the terminal device After the S310, the terminal device sends a configuration completion message to the network manager, and after receiving the configuration completion message, the network manager triggers the establishment of the bearer and the connection between the terminal device and the target network slice.
  • the network slice processing method provided by the present application sends a first network slice access request to the network manager by using the terminal device, and the network manager receives the first network slice access request sent by the terminal device, and the network manager receives the first network slice according to the first network slice Entering a request, acquiring a default network slice corresponding to the identifier of the terminal device, and performing default network slice access authorization on the terminal device, the network manager acquiring second protocol configuration information corresponding to the default network slice, and the network manager sends the terminal protocol information to the terminal device
  • the second protocol configuration information is configured for the terminal device to perform the protocol configuration according to the accessing the default network, and the protocol is configured according to the second protocol configuration information, the terminal device receives the second protocol configuration information sent by the network manager, and the terminal device accesses the default network slice.
  • the terminal device needs to access the network slice for the first time, in the first network slice access request
  • the default network slice is determined according to the identifier of the terminal device in the first network slice access request, and the second protocol configuration information corresponding to the default network slice is obtained, and the terminal device may slice according to the default network.
  • Corresponding second protocol configuration information is used for protocol configuration, thereby improving the success rate of the terminal device when initially accessing the network slice.
  • the method further includes:
  • the network manager removes the bearer and connection between the terminal device and the source network slice.
  • the source network slice is a default network slice.
  • the network manager tears down the bearer and connection between the terminal device and the eNB, SGW, and PGW of the default network slice.
  • Removing the bearer and connection between the terminal device and the default network slice after the terminal device accesses the target network slice can save air interface resources.
  • the method further includes:
  • the network manager determines that the terminal device supports protocol reconfiguration according to the protocol configuration capability information of the terminal device, it is determined to execute S203 or S308.
  • the protocol configuration capability information of the terminal device is used to indicate whether the terminal device supports protocol reconfiguration and a protocol type that supports the configuration. It includes the programmability of the terminal device and the type of protocol that supports the configuration.
  • the programmability of the terminal device is used to indicate whether the terminal device supports protocol reconfiguration.
  • the programmability of the terminal device can be represented by a 1-bit binary number. For example, a "1" indicates that the terminal device supports protocol reconfiguration, and a "0" indicates that the terminal device does not support protocol reconfiguration.
  • the network manager and the terminal device can pre-agreed the judgment rules. After receiving the network slice processing request, the network manager can judge according to the agreed judgment rule.
  • the network manager determines that the terminal device supports protocol reconfiguration, it is determined to execute S203 or S308.
  • the terminal device If the network manager determines that the terminal device does not support protocol reconfiguration, the terminal device is not authorized to terminate the operation. The terminal device failed to access.
  • the network manager determines, according to the protocol configuration capability information of the terminal device, whether the terminal device supports protocol reconfiguration, and performs authorization only when the terminal device supports protocol reconfiguration. The step further improves the success rate when the terminal device switches to the target network slice or simultaneously accesses the target network slice.
  • the source network slice is a network slice to be accessed
  • the network slice processing method provided by the present application:
  • the terminal device sends a second network slice access request to the network manager, where the second network slice access request includes the to-be-accessed identifier, so that the network manager performs the standby on the terminal device according to the second network slice access request.
  • the second network slice access request in this step includes the to-be-accessed identifier.
  • the to-be-accessed identifier may be an identifier of a network slice to be accessed.
  • the identifier of the network slice to be accessed may be an identifier of the network slice determined by the terminal device according to the service to be performed by itself.
  • the network manager receives the second network slice access request sent by the terminal device, and accesses according to the second network slice And requesting, the terminal device performs the access network slice access authorization corresponding to the to-be-accessed identifier, and acquires third protocol configuration information corresponding to the to-be-accessed network slice.
  • the to-be-accessed identifier may be an identifier of the network slice to be accessed
  • the second network-slice access request may further include an identifier of the terminal device.
  • the network manager obtains subscription information corresponding to the identifier of the terminal device from the HSS or the PCRF according to the identifier of the terminal device. If the network manager determines, according to the subscription information and the identifier of the network slice to be accessed, that the terminal device can access the network slice to be accessed, the network manager determines, to access the identifier of the network slice to be accessed by the network device. Network slice access authorization.
  • the network manager sends the third protocol configuration information to the terminal device, so that the terminal device performs protocol configuration according to the third protocol configuration information.
  • the terminal device receives the third protocol configuration information sent by the network manager, and performs protocol configuration according to the third protocol configuration information.
  • the network manager determines that the terminal device cannot access the network slice to be accessed, obtains a default network slice corresponding to the identifier of the terminal device, and performs default network slice access authorization for the terminal device.
  • the network manager obtains fourth protocol configuration information corresponding to the default network slice.
  • the network manager sends the fourth protocol configuration information to the terminal device, so that the terminal device accesses the default network slice, and performs protocol configuration according to the fourth protocol configuration information.
  • the network manager receives the fourth protocol configuration information, accesses the default network slice, and performs protocol configuration according to the fourth protocol configuration information.
  • the scheme for performing network slice switching or accessing a new network slice in this embodiment is the same as the scheme for performing network slice switching or accessing a new network slice in the embodiment shown in FIG. 3, and details are not described herein again.
  • the method when performing network slice switching or accessing a new network slice, when the processing request type corresponding to the identifier of the processing request type in the network slice processing request is a network slice switching request, After the terminal device accesses the target network slice, the method further includes:
  • the network manager removes the bearer and connection between the terminal device and the slice to be accessed.
  • the second network slice access request includes the to-be-accessed identifier
  • the terminal device is to be accessed. Identifying the corresponding network slice access authorization to be accessed, and acquiring the third protocol configuration information corresponding to the network slice to be accessed, and obtaining the identifier of the terminal device when the network slice determines that the terminal device cannot access the network slice to be accessed.
  • the network slice access authorization is performed or the default network slice access authorization is performed, and further, determining whether to send the third protocol configuration information corresponding to the to-be-accessed network slice to the terminal device or the fourth protocol configuration information corresponding to the default network slice to the terminal device, Thereby, the success rate of the terminal device when initially accessing the network slice is improved.
  • the second network slice access request may also include protocol configuration capability information of the terminal device.
  • the network manager performs the access network slice access authorization corresponding to the identifier of the network slice to be accessed according to the second network slice access request, if the network manager can also use the protocol of the terminal device
  • the configuration capability information determines whether the terminal device supports the protocol reconfiguration, and determines to perform the operation of performing the access to the network slice access authorization corresponding to the to-be-accessed identifier of the terminal device.
  • the first protocol configuration information includes a target network slice pair that the terminal device needs to adopt.
  • the protocol stack configuration information should be.
  • the second protocol configuration information includes protocol stack configuration information corresponding to the default network slice that the terminal device needs to adopt.
  • the third protocol configuration information includes protocol stack configuration information corresponding to the network slice to be accessed that the terminal device needs to adopt.
  • the fourth protocol configuration information includes protocol stack configuration information corresponding to the default network slice that the terminal device needs to adopt.
  • the difference between the first protocol configuration information, the second protocol configuration information, and the third protocol configuration information is that it corresponds to a different network slice.
  • the second protocol configuration information and the fourth protocol configuration information are protocol stack configuration information corresponding to the default network slice that the terminal device needs to adopt, and the difference is that the two are different protocol stacks corresponding to the default network slice. Configuration information.
  • FIG. 4 is a signaling interaction diagram of Embodiment 3 of a network slice processing method provided by the present application. As shown in FIG. 4, the network slice processing method provided by the present application is described in detail on the basis of the embodiment shown in FIG. 3:
  • the source network slice is the default network slice.
  • the eNB, the SGW, and the PGW are included in the default network slice and the target network slice, and the control plane includes: an MME, a slice manager, and an SDPC.
  • S401 may include: S401a default network slice establishment and S401b target network slice establishment. There is no timing relationship between S401a and S401b.
  • the default network slice and the target network slice are respectively connected to the slice manager in the control plane.
  • Different network slices are used to carry different types of services, and different control/signaling protocols are used to process the structure. During this process, resource mapping and protocol configuration on different network slices has been completed.
  • the terminal device sends a first network slice access request to the slice manager, where the slice manager receives the first network slice access request sent by the terminal device.
  • the terminal device may first send the first network slice access request to the eNB of the default network slice.
  • the eNB of the default network slice then sends a first network slice access request to the MME.
  • the MME then sends the first network slice access request to the slice manager.
  • the first network slice access request includes an identifier of the terminal device.
  • the slice manager obtains a default network slice corresponding to the identifier of the terminal device according to the first network slice access request, and performs default network slice access authorization on the terminal device.
  • the default network slice here is the source network slice.
  • S404 The slice manager sends the first network slice access request to the SDPC.
  • S405 The SDPC determines second protocol configuration information according to the first network slice access request.
  • the second protocol configuration information includes protocol stack configuration information corresponding to the default network slice that the terminal device needs to adopt.
  • the SDPC stores a mapping relationship between the identifier of the terminal device and the default network slice corresponding to the identifier of the terminal device, and also stores a default network slice and protocol configuration information corresponding to the default network slice.
  • the SDPC determines the default network slice corresponding to the terminal device according to the identifier of the terminal device in the first network slice access request, and determines protocol configuration information corresponding to the default network slice according to the default network slice.
  • S406 The SDPC sends the second protocol configuration information to the slice manager, and the slice manager receives the second protocol configuration information.
  • the slice manager sends the second protocol configuration information to the terminal device, where the terminal device receives the second protocol configuration information.
  • the slice manager may send the second protocol configuration information to the end by using the MME and the source network slice. End device.
  • S408 The terminal device performs protocol configuration according to the second protocol configuration information.
  • the terminal device performs protocol configuration according to the second protocol configuration information, and has the following two implementation manners:
  • the first implementation manner only one basic protocol configuration information is stored on the terminal device, and after receiving the second protocol configuration information, the terminal device performs configuration on the basis of the basic protocol configuration information to ensure that the protocol stack of the terminal device can Matches the default network slice.
  • the second implementation manner is: the terminal device stores a plurality of different protocol configuration information, and after receiving the second protocol configuration information, the terminal device selects the protocol configuration information that is the same as the second protocol configuration information to complete the configuration.
  • S409 Establish a bearer and a connection between the terminal device and the source network slice.
  • the MME may trigger the establishment of a bearer and a connection between the terminal device and the source network slice. It is also possible that the slice manager triggers the bearer and connection between the establishment of the terminal device and the source network slice.
  • the MME triggers the establishment of the bearer and the connection after receiving the second protocol configuration information sent by the slice manager.
  • the MME establishes bearers and connections between the terminal device and the source network slice by generating the identity, QoS, and maintenance amount associated with the bearer.
  • the slice manager triggers the establishment of the bearer and the connection after receiving the second protocol configuration information sent by the SDPC.
  • the slice manager establishes bearers and connections between the terminal device and the source network slice by generating the identity, QoS, and maintenance amount associated with the bearer.
  • the terminal device sends a configuration completion message to the slice manager, and after receiving the configuration completion message, the slice manager triggers establishment of a bearer and a connection between the terminal device and the source network slice.
  • the terminal device sends a network slice processing request to the slice manager, and the slice manager receives the network slice processing request sent by the terminal device.
  • the network slice processing request includes a target identifier. Similar to S202, the target identifier may be an identifier of the target network slice or an identifier of the target service type.
  • the network slice processing request may further include the identifier of the terminal device and the protocol configuration capability information.
  • the terminal device supports the protocol configuration by “1”, and the “0” indicates that the terminal device does not support the protocol configuration.
  • the slice manager performs, according to the network slice processing request, the target network slice access authorization corresponding to the target identifier of the terminal device.
  • the S411 further includes: the slice manager may further determine, according to the protocol configuration capability information of the terminal device, whether the terminal device supports protocol reconfiguration. S411 is executed only when the terminal device supports protocol reconfiguration.
  • S412 The slice manager sends a network slice processing request to the SDPC.
  • the SDPC determines the first protocol configuration information according to the network slice processing request.
  • the first protocol configuration information may include protocol stack configuration information corresponding to the target network slice that the terminal device needs to adopt.
  • the SDPC when the target identifier in the network slice processing request is the identifier of the target network slice, the SDPC stores the mapping of the identifier of the target network slice and the protocol configuration information corresponding to the identifier. relationship. The SDPC determines protocol configuration information corresponding to the identifier according to the identifier of the target network slice in the network slice processing request.
  • the target identifier in the network slice processing request is the identifier of the target service type
  • the identifier of the target service type and the identifier of the target network slice corresponding to the identifier of the target service type are stored in the SDPC.
  • the SDPC determines the identifier of the target network slice corresponding to the identifier of the target service type according to the identifier of the target service type in the network slice processing request, and determines the protocol configuration information corresponding to the identifier according to the identifier of the target network slice.
  • S414 The SDPC sends first protocol configuration information to the slice manager, and the slice manager receives the first protocol configuration information.
  • S415 The slice manager sends the first protocol configuration information to the terminal device, where the terminal device receives the first protocol configuration information.
  • S416 The terminal device performs protocol configuration according to the first protocol configuration information.
  • the first implementation manner is: only one basic protocol configuration information is stored on the terminal device, and after receiving the first protocol configuration information, the terminal device performs configuration on the basis of the basic protocol configuration information to ensure its own The protocol stack can match the target network slice.
  • the second implementation manner is: the terminal device stores a plurality of different protocol configuration information, and after receiving the first protocol configuration information, the terminal device selects the protocol configuration information that is the same as the first protocol configuration information to complete the configuration.
  • S417 Establish a bearer and a connection between the terminal device and the target network slice.
  • processing request type corresponding to the identifier of the processing request type is a network slice switching request
  • S418 The slice manager removes the bearer and connection between the terminal device and the source network slice.
  • the bearer and the connection between the terminal device and the target network slice are first established, and then the bearer between the terminal device and the source network slice is removed. This ensures that the services on the terminal device are not interrupted.
  • the difference between the network slice processing method provided in this embodiment and the network slice method shown in FIG. 3 is that the slice manager and the SDPC in the network manager in this embodiment are separately set, and if the first protocol configuration information is determined, The slice manager performs the target network slice access authorization corresponding to the target identifier of the terminal device, and the slice manager sends a network slice processing request to the SDPC, and the SDPC determines the protocol configuration information according to the network slice processing request, and the slice manager receives the protocol sent by the SDPC.
  • the configuration information is determined and determined as the first protocol configuration information.
  • the slice manager and the SDPC in the network manager in the embodiment provided in FIG. 2 and FIG. 3 are integrated, and the first protocol configuration information can be directly obtained according to the network slice processing request.
  • the terminal device sends a network slice processing request to the slice manager, and the slice manager receives the network slice processing request sent by the terminal device, and the slice manager performs target identification on the terminal device according to the network slice processing request.
  • the slice manager sends a network slice processing request to the SDPC, the SDPC determines the first protocol configuration information according to the network slice processing request, and the SDPC sends the first protocol configuration information to the slice manager, and the slice manager receives the first Protocol configuration letter
  • the first protocol configuration information is determined by the SDPC, and the slice manager authorizes the access of the terminal device, and the SDPC determines the first protocol configuration information after the authorization is passed, thereby enabling the terminal device to be switched to the high efficiency efficiently.
  • the target network is sliced or simultaneously accesses the target network slice.
  • FIG. 5 is a schematic structural diagram of Embodiment 1 of a network manager according to the present application.
  • the network manager 50 provided by the present application includes:
  • Transceiver 501 The memory 502 is configured to store instructions.
  • the processor 503 is respectively connected to the memory 502 and the transceiver 501 for executing an instruction to perform the following steps when executing the instruction:
  • the network slice processing request sent by the terminal device is received by the transceiver 501.
  • the network slice processing request includes a target identifier, and the terminal device has accessed the source network slice. And performing, according to the network slice processing request, the target network slice access authorization corresponding to the target identifier, and acquiring the first protocol configuration information corresponding to the target network slice.
  • the first protocol configuration information is sent to the terminal device by using the transceiver 501, where the first protocol configuration information is used to instruct the terminal device to perform protocol configuration according to the first protocol configuration information to access the target network slice.
  • the target identifier is an identifier of the target network slice.
  • the network slice processing request also includes an identification of the terminal device.
  • the processor 503 is configured to: perform, according to the network slice processing request, the target network slice access authorization corresponding to the target identifier of the terminal device, the processor 503 is configured to:
  • the subscription information corresponding to the identifier of the terminal device is obtained from the HSS or the PCRF according to the identifier of the terminal device. If it is determined that the terminal device can access the target network slice according to the subscription information and the identifier of the target network slice, the target device performs the target network slice access authorization corresponding to the identifier of the target network slice.
  • the target identifier is an identifier of the target service type
  • the network slice processing request further includes an identifier of the terminal device.
  • the processor 503 is configured to: perform, according to the network slice processing request, the target network slice access authorization corresponding to the target identifier of the terminal device, the processor 503 is configured to:
  • the subscription information corresponding to the identifier of the terminal device is obtained from the HSS or the PCRF according to the identifier of the terminal device. If it is determined that the terminal device can access the target network slice according to the identifier information and the identifier of the target service type, the target device performs the target network slice access authorization corresponding to the identifier of the target service type.
  • the network slice processing request further includes protocol configuration capability information of the terminal device.
  • the processor 503 is further configured to:
  • the terminal device If it is determined that the terminal device supports the protocol reconfiguration according to the protocol configuration capability information of the terminal device, determining to perform the operation of performing the target network slice access authorization corresponding to the target identifier of the terminal device according to the network slice processing request.
  • the source network slice is the default network slice.
  • the processor 503 Before receiving the network slice processing request sent by the terminal device through the transceiver 501, the processor 503 is further configured to:
  • the first network slice access request sent by the terminal device is received by the transceiver 501.
  • the first network slice access request includes an identifier of the terminal device. And obtaining, according to the first network slice access request, a default network slice corresponding to the identifier of the terminal device, and performing default network slice access authorization on the terminal device.
  • the second protocol configuration information is sent to the terminal device by the transceiver 501, where the second protocol configuration information is used to instruct the terminal device to perform protocol configuration according to the second protocol configuration information to access the default network slice.
  • the source network slice is a slice to be accessed by the network.
  • the processor 503 is further configured to:
  • the second network slice access request sent by the terminal device is received by the transceiver 501.
  • the second network slice access request includes an identifier to be accessed.
  • Corresponding to the to-be-accessed identifier of the terminal device according to the second network slice access request The network slice access authorization is to be accessed, and the third protocol configuration information corresponding to the to-be-accessed network slice is obtained.
  • the third protocol configuration information is sent to the terminal device by the transceiver 501, where the third protocol configuration information is used to instruct the terminal device to perform protocol configuration according to the third protocol configuration information to access the network slice to be accessed.
  • the to-be-accessed identifier is an identifier of a network slice to be accessed.
  • the second network slice access request further includes an identifier of the terminal device.
  • the processor 503 is configured to: perform, according to the second network slice access request, the access device to access the network slice access authorization corresponding to the to-be-accessed identifier, the processor 503 is configured to:
  • the subscription information corresponding to the identifier of the terminal device is obtained from the HSS or the PCRF according to the identifier of the terminal device. If it is determined that the terminal device can access the network slice to be accessed according to the information of the subscription information and the identifier of the network slice to be accessed, the terminal device performs the access network access authorization corresponding to the identifier of the network slice to be accessed.
  • the processor 503 is further configured to:
  • the terminal device If it is determined that the terminal device cannot access the network slice to be accessed according to the subscription information and the identifier of the network slice to be accessed, the default network slice corresponding to the identifier of the terminal device is obtained, and the default network slice access authorization is performed on the terminal device.
  • the fourth protocol configuration information is sent to the terminal device by using the transceiver 501, where the fourth protocol configuration information is used to instruct the terminal device to perform protocol configuration according to the fourth protocol configuration information to access the default network slice.
  • the network slice processing request further includes an identifier for processing the request type. If the processing request type corresponding to the identifier of the processing request type is a network slice switching request, the processor 503 is further configured to:
  • the bearer and connection between the terminal device and the slice to be accessed are removed.
  • the network manager provided by this embodiment is used to perform the operations performed by the network manager in the method embodiment shown in FIG. 2 to FIG. 4, and the technical principles and technical effects thereof are similar, and details are not described herein again.
  • FIG. 6 is a schematic structural diagram of Embodiment 1 of a terminal device provided by the present application.
  • the terminal device 60 provided by the present application includes:
  • the memory 602 is configured to store an instruction.
  • the processor 603 is respectively connected to the memory 602 and the transceiver 601 for executing instructions to perform the following steps when executing the instructions:
  • a network slice processing request is sent to the network manager through the transceiver 601.
  • the network slice processing request includes a target identifier.
  • the network slice processing request is used to instruct the network manager to perform the target network slice access authorization corresponding to the target identifier of the terminal device according to the network slice processing request, and acquire the first protocol configuration information corresponding to the target network slice.
  • the first protocol configuration information sent by the network manager is received by the transceiver 601. Protocol configuration is performed according to the first protocol configuration information to access the target network slice.
  • the target identifier is an identifier of the target network slice.
  • the network slice processing request also includes an identification of the terminal device.
  • the network slice processing request is used to instruct the network manager to obtain the subscription information corresponding to the identifier of the terminal device from the HSS or the PCRF according to the identifier of the terminal device, and if the network manager determines, according to the subscription information and the identifier of the target network slice, the terminal device can After accessing the target network slice, the terminal device performs the target network slice access authorization corresponding to the identifier of the target network slice.
  • the target identifier is an identifier of the target service type.
  • the network slice processing request also includes an identification of the terminal device.
  • the network slice processing request is used to instruct the network manager to obtain the subscription information corresponding to the identifier of the terminal device from the HSS or the PCRF according to the identifier of the terminal device, and if the network manager determines, according to the subscription information and the identifier of the target service type, the terminal device can After accessing the target network slice, the terminal device performs the target network slice access authorization corresponding to the identifier of the target service type.
  • the network slice processing request further includes protocol configuration capability information of the terminal device.
  • the protocol configuration capability information is used to indicate that if the network manager determines that the terminal device supports protocol reconfiguration according to the protocol configuration capability information of the terminal device, the network manager determines to perform the target network slice connection corresponding to the target identifier of the terminal device according to the network slice processing request. Enter the authorized operation.
  • the source network slice is the default network slice.
  • the processor 603 is configured to:
  • a first network slice access request is sent by the transceiver 601 to the network manager.
  • the first network slice access request includes an identifier of the terminal device.
  • the first network slice access request is used to instruct the network manager to obtain a default network slice corresponding to the identifier of the terminal device according to the first network slice access request, and perform default network slice access authorization on the terminal device to acquire the default network.
  • the corresponding second protocol configuration information is sliced.
  • the second protocol configuration information sent by the network manager is received by the transceiver 601. Protocol configuration is performed according to the second protocol configuration information to access the default network slice.
  • the source network slice is a slice to be accessed by the network.
  • the processor 603 is configured to:
  • a second network slice access request is sent by the transceiver 601 to the network manager.
  • the second network slice access request includes an identifier to be accessed.
  • the second network slice access request is used to instruct the network manager to perform the access network slice access authorization corresponding to the to-be-accessed identifier of the terminal device according to the second network slice access request, and obtain the corresponding access network slice corresponding to the network segment to be accessed.
  • the third protocol configuration information is received by the transceiver 601. The protocol is configured according to the third protocol configuration information to access the network slice to be accessed.
  • the to-be-accessed identifier is an identifier of a network slice to be accessed.
  • the second network slice access request further includes an identifier of the terminal device.
  • the second network slice access request is used to instruct the network manager to obtain the subscription information corresponding to the identifier of the terminal device from the HSS or the PCRF according to the identifier of the terminal device, if the network manager is based on the subscription information and the slice to be accessed by the network
  • the identifier determines that the terminal device can access the network slice to be accessed, and the network manager performs the access network slice access authorization corresponding to the identifier of the network slice to be accessed by the terminal device.
  • the processor 603 is further configured to:
  • the fourth protocol configuration information sent by the network manager is received by the transceiver 601.
  • the fourth protocol configuration information is protocol configuration information that is obtained by the network manager and corresponding to the default network slice.
  • the default network slice is the network slice corresponding to the identity of the terminal device obtained by the slice manager. Protocol configuration is performed according to the fourth protocol configuration information to access the default network slice.
  • the terminal device provided in this embodiment is used to perform the operations performed by the terminal device in the method embodiment shown in FIG. 2 to FIG. 4 , and the technical principles and technical effects thereof are similar, and details are not described herein again.
  • FIG. 7 is a schematic structural diagram of Embodiment 2 of a network manager according to the present application.
  • the network manager 70 provided in this embodiment includes:
  • the receiving module 701 is configured to receive a network slice processing request sent by the terminal device.
  • the network slice processing request includes a target identifier, and the terminal device has accessed the source network slice.
  • the authorization module 702 is configured to perform, according to the network slice processing request, the target network slice access authorization corresponding to the target identifier, and obtain the first protocol configuration information corresponding to the target network slice.
  • the sending module 703 is configured to send the first protocol configuration information to the terminal device, where the first protocol configuration information is used to instruct the terminal device to perform protocol configuration according to the first protocol configuration information to access the target network slice.
  • the target identifier is an identifier of the target network slice
  • the network slice processing request further includes an identifier of the terminal device.
  • the authorization module 702 is specifically configured to:
  • the subscription information corresponding to the identifier of the terminal device is obtained from the HSS or the PCRF according to the identifier of the terminal device. If it is determined that the terminal device can access the target network slice according to the subscription information and the identifier of the target network slice, the target device performs the target network slice access authorization corresponding to the identifier of the target network slice.
  • the target identifier is an identifier of the target service type
  • the network slice processing request further includes an identifier of the terminal device.
  • the authorization module 702 is specifically configured to:
  • the subscription information corresponding to the identifier of the terminal device is obtained from the HSS or the PCRF according to the identifier of the terminal device. If it is determined that the terminal device can access the target network slice according to the identifier information and the identifier of the target service type, the target device performs the target network slice access authorization corresponding to the identifier of the target service type.
  • the network slice processing request further includes protocol configuration capability information of the terminal device.
  • the network manager further includes: a determining module, configured to: when determining the terminal device support protocol reconfiguration according to the protocol configuration capability information of the terminal device, determining to perform the target network slice access authorization corresponding to the target identifier of the terminal device according to the network slice processing request Operation.
  • the source network slice is the default network slice.
  • the receiving module 701 is further configured to receive a first network slice access request sent by the terminal device.
  • the first network slice access request includes an identifier of the terminal device.
  • the authorization module 702 is further configured to acquire a default network slice corresponding to the identifier of the terminal device according to the first network slice access request, and perform default network slice access authorization on the terminal device.
  • the network manager further includes: an obtaining module, configured to acquire second protocol configuration information corresponding to the default network slice.
  • the sending module 703 is further configured to send second protocol configuration information to the terminal device.
  • the second protocol configuration information is used to instruct the terminal device to perform protocol configuration according to the second protocol configuration information to access the default network slice.
  • the source network slice is a slice to be accessed by the network.
  • the receiving module 701 is further configured to receive a second network slice access request sent by the terminal device.
  • the second network slice access request includes an identifier to be accessed.
  • the authorization module 702 is further configured to perform, according to the second network slice access request, the access device to access the network slice access authorization corresponding to the to-be-accessed identifier, and obtain the third protocol configuration information corresponding to the to-be-accessed network slice.
  • the sending module 703 is further configured to send the third protocol configuration information to the terminal device, where the third protocol configuration information is used to instruct the terminal device to perform protocol configuration according to the third protocol configuration information to access the network slice to be accessed.
  • the to-be-accessed identifier is an identifier of the network slice to be accessed
  • the second network slice access request further includes an identifier of the terminal device.
  • the authorization module 702 is specifically configured to:
  • the subscription information corresponding to the identifier of the terminal device is obtained from the HSS or the PCRF according to the identifier of the terminal device. If the terminal device can access the network slice to be accessed according to the information of the subscription information and the identifier of the network slice to be accessed, the network manager performs the access network slice access authorization corresponding to the identifier of the network slice to be accessed by the terminal device.
  • the obtaining module is further configured to: when determining, according to the subscription information and the identifier of the network slice to be accessed, that the terminal device cannot access the network slice to be accessed, obtain the default network slice corresponding to the identifier of the terminal device, and obtain the default network slice. Perform default network slice access authorization. It is also used to obtain fourth protocol configuration information corresponding to the default network slice.
  • the sending module 703 is further configured to send fourth protocol configuration information to the terminal device.
  • the fourth protocol configuration information is used to instruct the terminal device to perform protocol configuration according to the fourth protocol configuration information to access the default network slice.
  • the network slice processing request further includes an identifier for processing the request type. If the processing request type corresponding to the identifier of the processing request type is a network slice switching request, the network manager further includes:
  • the module is removed to remove the bearer and connection between the terminal device and the slice to be accessed.
  • the network manager provided in this embodiment is used to execute the network manager in the method embodiment shown in FIG. 2 to FIG.
  • the technical principle and technical effect of the operation are similar, and will not be described here.
  • FIG. 8 is a schematic structural diagram of Embodiment 2 of a terminal device provided by the present application.
  • the terminal device 80 provided in this embodiment includes:
  • the access module 801 is configured to access a source network slice.
  • the sending module 802 is configured to send a network slice processing request to the network manager.
  • the network slice processing request includes a target identifier, and the network slice processing request is used to instruct the network manager to perform the target network slice access authorization corresponding to the target identifier of the terminal device according to the network slice processing request, and acquire the first corresponding to the target network slice.
  • a protocol configuration information is used to instruct the network manager to perform the target network slice access authorization corresponding to the target identifier of the terminal device according to the network slice processing request, and acquire the first corresponding to the target network slice.
  • the receiving module 803 is configured to receive first protocol configuration information sent by the network manager.
  • the configuration module 804 is configured to perform protocol configuration according to the first protocol configuration information to access the target network slice.
  • the target identifier is an identifier of the target network slice.
  • the network slice processing request also includes an identification of the terminal device.
  • the network slice processing request is used to instruct the network manager to obtain the subscription information corresponding to the identifier of the terminal device from the HSS or the PCRF according to the identifier of the terminal device, and if the network manager determines, according to the subscription information and the identifier of the target network slice, the terminal device can After accessing the target network slice, the terminal device performs the target network slice access authorization corresponding to the identifier of the target network slice.
  • the target identifier is an identifier of the target service type.
  • the network slice processing request also includes an identification of the terminal device.
  • the network slice processing request is used to instruct the network manager to obtain the subscription information corresponding to the identifier of the terminal device from the HSS or the PCRF according to the identifier of the terminal device, and if the network manager determines, according to the subscription information and the identifier of the target service type, the terminal device can After accessing the target network slice, the terminal device performs the target network slice access authorization corresponding to the identifier of the target service type.
  • the network slice processing request further includes protocol configuration capability information of the terminal device.
  • the protocol configuration capability information is used to indicate that if the network manager determines that the terminal device supports protocol reconfiguration according to the protocol configuration capability information of the terminal device, the network manager determines to perform the target network slice connection corresponding to the target identifier of the terminal device according to the network slice processing request. Enter the authorized operation.
  • the source network slice is the default network slice.
  • the access module 801 is specifically configured to:
  • the first network slice access request includes an identifier of the terminal device.
  • the first network slice access request is used to instruct the network manager to obtain a default network slice corresponding to the identifier of the terminal device according to the first network slice access request, and perform default network slice access authorization on the terminal device to acquire the default network.
  • the corresponding second protocol configuration information is sliced.
  • the source network slice is a slice to be accessed by the network.
  • the access module 801 is specifically configured to:
  • the second network slice access request includes an identifier to be accessed.
  • the second network slice access request is used to instruct the network manager to perform the access network slice access authorization corresponding to the to-be-accessed identifier of the terminal device according to the second network slice access request, and obtain the corresponding access network slice corresponding to the network segment to be accessed.
  • the third protocol configuration information Receiving third protocol configuration information sent by the network manager. The protocol is configured according to the third protocol configuration information to access the network slice to be accessed.
  • the to-be-accessed identifier is an identifier of the network slice to be accessed
  • the second network slice access request further includes an identifier of the terminal device.
  • the second network slice access request is used to instruct the network manager to obtain the subscription information corresponding to the identifier of the terminal device from the HSS or the PCRF according to the identifier of the terminal device, if the network manager is configured according to the subscription information and the pending
  • the identifier of the incoming network slice determines that the terminal device can access the network slice to be accessed, and the network manager performs the access network slice access authorization corresponding to the identifier of the network slice to be accessed by the terminal device.
  • the access module is further configured to receive the fourth protocol configuration information sent by the network manager.
  • the fourth protocol configuration information is protocol configuration information that is obtained by the network manager and corresponding to the default network slice.
  • the default network slice is the network slice corresponding to the identity of the terminal device obtained by the slice manager.
  • the access module 801 is configured to perform protocol configuration according to the fourth protocol configuration information to access the default network slice.
  • the terminal device provided in this embodiment is used to perform the operations performed by the terminal device in the method embodiment shown in FIG. 2 to FIG. 4 , and the technical principles and technical effects thereof are similar, and details are not described herein again.
  • the aforementioned program can be stored in a computer readable storage medium.
  • the program when executed, performs the steps including the foregoing method embodiments; and the foregoing storage medium includes various media that can store program codes, such as a ROM, a RAM, a magnetic disk, or an optical disk.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

L'invention concerne un procédé et un appareil de traitement de tranche de réseau. Le procédé comprend les étapes suivantes : un dispositif terminal accède à une tranche de réseau source ; le dispositif terminal envoie une demande de traitement de tranche de réseau à un gestionnaire de réseau ; le gestionnaire de réseau reçoit une demande de traitement de tranche de réseau envoyée par le dispositif terminal ; conformément à la demande de traitement de tranche de réseau, le gestionnaire de réseau accorde au dispositif terminal l'accès à une tranche de réseau cible correspondant à un identificateur cible, et acquiert des premières informations de configuration de protocole correspondant à la tranche de réseau cible ; et le gestionnaire de réseau envoie les premières informations de configuration de protocole au dispositif terminal. Les premières informations de configuration de protocole sont utilisées pour ordonner au dispositif terminal d'effectuer une configuration de protocole conformément aux premières informations de configuration de protocole, de manière à accéder à la tranche de réseau cible. Un dispositif terminal peut ainsi accéder correctement à une tranche de réseau cible, et le taux de réussite lorsque le dispositif terminal est commuté vers la tranche de réseau cible ou accède également à la tranche de réseau cible est amélioré.
PCT/CN2017/077376 2016-04-27 2017-03-20 Procédé et appareil de traitement de tranche de réseau WO2017185909A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610267844.1A CN107318113B (zh) 2016-04-27 2016-04-27 网络切片处理方法和装置
CN201610267844.1 2016-04-27

Publications (1)

Publication Number Publication Date
WO2017185909A1 true WO2017185909A1 (fr) 2017-11-02

Family

ID=60161831

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/077376 WO2017185909A1 (fr) 2016-04-27 2017-03-20 Procédé et appareil de traitement de tranche de réseau

Country Status (2)

Country Link
CN (1) CN107318113B (fr)
WO (1) WO2017185909A1 (fr)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019242624A1 (fr) * 2018-06-22 2019-12-26 Huawei Technologies Co., Ltd. Gestion d'analyse de données, spécification et procédures de configuration, approvisionnement et architecture basée sur un service
WO2020035000A1 (fr) * 2018-08-14 2020-02-20 华为技术有限公司 Procédé d'acquisition d'informations de configuration de réseau, et dispositif associé
CN112600693A (zh) * 2020-12-02 2021-04-02 腾讯科技(深圳)有限公司 业务请求的处理方法、系统、电子设备及计算机存储介质
CN114679720A (zh) * 2022-03-28 2022-06-28 Oppo广东移动通信有限公司 网络切片的请求方法及装置、电子设备、存储介质

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109768875B (zh) * 2017-11-10 2021-10-15 华为技术有限公司 网络切片的策略管理方法、装置、设备及系统
CN109787796B (zh) * 2017-11-13 2022-08-09 华为技术有限公司 网络功能服务授权的方法及装置
US20200374792A1 (en) * 2017-11-20 2020-11-26 Guangdong Oppo Mobile Telecommunications Corp., Ltd. Network Slice Configuration Method and Device and Computer Storage Medium
US10924916B1 (en) * 2017-11-30 2021-02-16 Telefonaktiebolaget Lm Ericsson (Publ) Core network allocation handling
CN109996307B (zh) 2017-12-29 2021-06-01 华为技术有限公司 一种数据路由方法以及终端
CN108770016B (zh) * 2018-06-04 2019-07-05 北京邮电大学 基于模板的5g端到端网络切片生成方法及装置
CN111148165B (zh) * 2018-11-06 2021-06-01 华为技术有限公司 一种处理网络切片中用户接入的方法及装置
CN111436029B (zh) * 2019-01-11 2022-03-29 华为技术有限公司 对网络切片实例进行计费处理的方法、系统及相关设备
WO2020156488A1 (fr) * 2019-01-31 2020-08-06 华为技术有限公司 Procédé, appareil et système de communication
CN113301586B (zh) * 2020-02-24 2023-04-18 华为技术有限公司 网络选择方法及电子设备

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160029047A1 (en) * 2014-07-25 2016-01-28 Verizon Patent And Licensing Inc. On-demand load balancer and virtual live slicer server farm for program ingest
CN106060900A (zh) * 2016-05-13 2016-10-26 宇龙计算机通信科技(深圳)有限公司 网络切片的接入控制方法及装置、终端化小区和sdn控制器
CN106412905A (zh) * 2016-12-12 2017-02-15 中国联合网络通信集团有限公司 网络切片选择方法、ue、mme和系统

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102123477B (zh) * 2010-01-08 2015-06-10 中兴通讯股份有限公司 M2m核心网络的接入实现方法及装置
WO2014054768A1 (fr) * 2012-10-05 2014-04-10 日本電気株式会社 Système de communication, appareil de gestion de réseau virtuel, procédé et programme de gestion de réseau virtuel
CN103236945A (zh) * 2013-04-08 2013-08-07 北京天地互连信息技术有限公司 基于OpenFlow的FlowVisor网络系统
WO2014205786A1 (fr) * 2013-06-28 2014-12-31 华为技术有限公司 Procédé et appareil d'enregistrement et de mise en œuvre de service d'envoi à la cantonade, et dispositif et système de commutation
EP3102960B1 (fr) * 2014-02-03 2023-06-07 The U.S.A. as represented by the Secretary, Department of Health and Human Services Système et appareil pour un traitement en temps réel de données brutes d'imagerie médicale à l'aide d'informatique en nuage
CN104159240B (zh) * 2014-08-15 2018-12-25 宇龙计算机通信科技(深圳)有限公司 基于终端的通信方法和终端
CN105391568B (zh) * 2014-09-05 2019-07-23 华为技术有限公司 一种软件定义网络sdn的实现方法、装置和系统
CN104639653B (zh) * 2015-03-05 2019-04-09 北京掌中经纬技术有限公司 基于云架构的自适应方法及系统
CN105516312B (zh) * 2015-12-09 2019-02-22 重庆邮电大学 一种软件定义网络负载均衡装置与方法

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160029047A1 (en) * 2014-07-25 2016-01-28 Verizon Patent And Licensing Inc. On-demand load balancer and virtual live slicer server farm for program ingest
CN106060900A (zh) * 2016-05-13 2016-10-26 宇龙计算机通信科技(深圳)有限公司 网络切片的接入控制方法及装置、终端化小区和sdn控制器
CN106412905A (zh) * 2016-12-12 2017-02-15 中国联合网络通信集团有限公司 网络切片选择方法、ue、mme和系统

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
ERICSSON: "Solution for selection of a network slice instance with initial bootstrap", 3GPP DRAFT; S2-161481_SELECTION_E2E-SLICE, 5 April 2016 (2016-04-05), XP051086484 *
ORANGE: "New solution for Key Issue 1: Network slice selection based on rules provided by the network", SA WG2 MEETING #114 S 2-161453, 5 April 2016 (2016-04-05), XP051086474 *

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019242624A1 (fr) * 2018-06-22 2019-12-26 Huawei Technologies Co., Ltd. Gestion d'analyse de données, spécification et procédures de configuration, approvisionnement et architecture basée sur un service
US10917800B2 (en) 2018-06-22 2021-02-09 Huawei Technologies Co., Ltd. Data analytics management (DAM), configuration specification and procedures, provisioning, and service based architecture (SBA)
US11611891B2 (en) 2018-06-22 2023-03-21 Huawei Technologies Co., Ltd. Data analytics management (DAM), configuration specification and procedures, provisioning, and service based architecture (SBA)
WO2020035000A1 (fr) * 2018-08-14 2020-02-20 华为技术有限公司 Procédé d'acquisition d'informations de configuration de réseau, et dispositif associé
CN112600693A (zh) * 2020-12-02 2021-04-02 腾讯科技(深圳)有限公司 业务请求的处理方法、系统、电子设备及计算机存储介质
CN112600693B (zh) * 2020-12-02 2023-11-07 腾讯科技(深圳)有限公司 业务请求的处理方法、系统、电子设备及计算机存储介质
CN114679720A (zh) * 2022-03-28 2022-06-28 Oppo广东移动通信有限公司 网络切片的请求方法及装置、电子设备、存储介质

Also Published As

Publication number Publication date
CN107318113B (zh) 2021-09-21
CN107318113A (zh) 2017-11-03

Similar Documents

Publication Publication Date Title
WO2017185909A1 (fr) Procédé et appareil de traitement de tranche de réseau
US11678259B2 (en) Network slice selection method, terminal device, and network device
US20240049067A1 (en) Inter-Network Change Method and Apparatus, and Related Device
CN108713327B (zh) 用于实现通信网络中的通信的网络节点和在网络节点中执行的方法
JP6651633B2 (ja) データスケジューリング方法、基地局およびシステム
JP6700434B2 (ja) 無線通信方法及びデバイス
WO2020057401A1 (fr) Procédé et appareil de sélection d'élément de réseau
US20230103085A1 (en) Network connection configuration method and apparatus
WO2018202138A1 (fr) Procédé de communication et dispositif associé
KR20180100381A (ko) 무선 단말, 무선국, 및 이들의 방법
WO2013082984A1 (fr) Procédé pour le rattachement à un réseau e-utran et entité de gestion de la mobilité correspondante
TWI629908B (zh) Method, device and base station for switching terminal equipment to target cell
JP7389225B2 (ja) セキュリティ保護モードを決定するための方法および装置
WO2019024816A1 (fr) Procédé et appareil permettant de transmettre des informations
JP2019525629A (ja) 切替シナリオでのQoSパラメータ処理方法および機器
EP3648525A1 (fr) Procédé et système de gestion de réseau
EP3445081B1 (fr) Procédé et dispositif de gestion de porteuse à base de flux
US10602404B2 (en) Data offloading method and base station
WO2018135992A1 (fr) Systèmes et procédés de mise en correspondance d'une tranche de réseau
WO2015103780A1 (fr) Procédé et dispositif pour supporter un service vocal de domaine à commutation de circuits
US20200344725A1 (en) Data transmission method and apparatus, and computer storage medium
WO2019020037A1 (fr) Procédé et appareil de détermination de liste de zones d'enregistrement
WO2020192387A1 (fr) Procédé de traitement de demande et appareil et système associés
WO2019196963A1 (fr) Procédé et dispositif d'accès à une tranche de réseau, support de stockage, et dispositif électronique
CN107920372B (zh) 一种信息指示方法及装置

Legal Events

Date Code Title Description
NENP Non-entry into the national phase

Ref country code: DE

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17788562

Country of ref document: EP

Kind code of ref document: A1

122 Ep: pct application non-entry in european phase

Ref document number: 17788562

Country of ref document: EP

Kind code of ref document: A1