WO2018228517A1 - Procédé de contrôle d'accès, dispositif de réseau et dispositif terminal - Google Patents

Procédé de contrôle d'accès, dispositif de réseau et dispositif terminal Download PDF

Info

Publication number
WO2018228517A1
WO2018228517A1 PCT/CN2018/091436 CN2018091436W WO2018228517A1 WO 2018228517 A1 WO2018228517 A1 WO 2018228517A1 CN 2018091436 W CN2018091436 W CN 2018091436W WO 2018228517 A1 WO2018228517 A1 WO 2018228517A1
Authority
WO
WIPO (PCT)
Prior art keywords
network
information
network slice
ran
mapping rule
Prior art date
Application number
PCT/CN2018/091436
Other languages
English (en)
Chinese (zh)
Inventor
娄崇
毕皓
韩锋
晋英豪
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2018228517A1 publication Critical patent/WO2018228517A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions
    • H04W48/04Access restriction performed under specific conditions based on user or terminal location or mobility data, e.g. moving direction, speed
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions
    • H04W48/06Access restriction performed under specific conditions based on traffic conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/18Selecting a network or a communication service

Definitions

  • the present application relates to the field of communications, and in particular, to a method for access control, a network device, and a terminal device.
  • the fifth generation mobile communication system such as new radio (NR)
  • 5G new radio
  • NR new radio
  • SDN software defined network
  • NFV network function virtualization
  • NFV technology can realize the virtualization of the underlying physical resources and load the virtual network function (network function).
  • NF network function
  • the end-to-end service chain is configured through a dynamic connection between the radio access network (RAN) and the NF of the core network (CN) to construct a network slice.
  • Operators can form a specific set of network functions and the network resources needed to run these network functions according to the requirements of key performance indicators (KPIs) such as capacity, coverage, rate, delay, and reliability for each specific business use case.
  • KPIs key performance indicators
  • the third generation partnership project (3GPP) divides the main types of 5G network slicing into the following three categories: enhanced mobile broadband (eMBB), massive machine type connection service (massive) Machine type communication (mMTC) and ultra-reliable and low latency communications (URLLC).
  • eMBB is mainly for terminals with high demand for speed and mobility, such as mobile phones and multimedia devices.
  • mMTC is mainly for IoT devices, with large-scale, low mobility and low speed requirements.
  • URLLC mainly refers to the types of services and equipment that have strict requirements on delay and reliability, such as car networking and security information.
  • a mobile phone user can access an eMBB type network slice for high-speed download or watch 4K high-definition video, and the sensor device can access the mMTC network slice for small data packet transmission and system configuration update.
  • User equipment can simultaneously access one or more or all network slices to meet business needs and achieve a better user experience.
  • the access control or user service (UE) access connection or service request can be restricted by access control, thereby managing network load and alleviating network congestion.
  • LTE Long Term Evolution
  • the LTE system adopts the Access Barring Check (ABC) method.
  • ABSC Access Barring Check
  • the current access control scheme has problems such as complex access control, poor compatibility, and relatively large system overhead.
  • the embodiment of the present application provides a method for access control, a network device, and a terminal device, which are used to reduce the complexity of network slice access control.
  • the wireless communication system to which the embodiment of the present application is applied may include a first network device, a terminal device, and a second network device.
  • the terminal device is described by using the UE, the first network device in the RAN, and the second network device as the CN.
  • the wireless communication system may include a Radio Access Network (RAN) device, a Core Network (CN) device, and a User Equipment (UE).
  • the communication system of the embodiment of the present application supports a network slicing architecture.
  • the core network network slice in the communication system may share the core network device and/or the core network resource, or may monopolize the core network device and/or the core network resource.
  • the UE accesses one or more RAN network slices or CN network slices through the RAN device.
  • the RAN device selects the AMF for the UE according to the information provided by the UE and the Access and Mobility Management Function (AMF) information configured or acquired.
  • AMF Access and Mobility Management Function
  • a first aspect of the present application provides a method for access control, which may include: a first network device sends a first message to a terminal device, where the first message includes a first mapping rule, where the first mapping rule includes at least Information of a radio access network RAN network slice; the first network device sends access control information to the terminal device.
  • the first mapping rule sent by the RAN to the UE includes at least one RAN network slice information, and
  • the configuration content of the first mapping rule in the embodiment of the present application is smaller, and the complexity is relatively low.
  • the first mapping rule and the access control information are used to perform access control on the terminal device.
  • the first mapping rule and the access control information that are sent by the RAN to the UE may be used for the UE to perform access control and initiate access of the network slice.
  • the first mapping rule includes information about at least one RAN network slice, because the information of the RAN network slice is generally one-to-many relationship with the CN network slice information, so the configuration content of the second mapping rule is smaller than the existing one. Configuration content, low complexity.
  • the method may further include: receiving, by the first network device a second message from the second network device, the second message includes a second mapping rule, the second mapping rule includes at least one CN access category, and the first mapping rule further includes the at least one RAN network A mapping relationship between the sliced information and the at least one CN access category.
  • at least one CN access category may be understood as a corresponding connection of at least one factor (such as an access level of the UE, information of at least one CN network slice, an application, a service category, and the like) included in the mapping rule. The index into the control information.
  • the information of the at least one RAN network slice is determined according to at least one access category, because the RAN holds a mapping relationship between the information of the preset RAN network slice and the information of the CN network slice.
  • the RAN may determine information of the at least one CN network slice according to information of the currently available CN network slice, where the information of the at least one CN network slice corresponds to the at least one CN category, so the second mapping rule may include information of at least one RAN network slice.
  • the mapping relationship of the at least one CN access category An optional implementation manner of the second mapping rule is provided, where the first mapping rule further includes a mapping relationship between the information of the at least one RAN network slice and the at least one CN access category, which is added to the solution. Flexibility.
  • the method may further include: receiving, by the first network device a third message from the second network device, the third message including a network slice selection assistance information Allowed NSSAI list allowed by the CN network, the first mapping rule further including information of the at least one RAN network slice and the CN Allowed The mapping relationship of NSSAI lists.
  • the information of the at least one CN network slice is determined according to the CN Allowed NSSAI list, and the RAN saves the mapping relationship between the preset RAN network slice information and the CN network slice information, so that at least one may be
  • the information of the CN network slice determines information for at least one RAN network slice.
  • An optional implementation manner of the second mapping rule is provided.
  • the first mapping rule may further include a mapping relationship between the information of the at least one RAN network slice and the CN Allowed NSSAI list, which increases the flexibility of the solution.
  • the method may further include: receiving, by the first network device a fourth message from the second network device, the fourth message including a second mapping rule and a network slice selection assistance information Allowed NSSAI list allowed by the CN network, the second mapping rule including at least one CN access category, The first mapping rule further includes information of the at least one RAN network slice, a mapping relationship between the at least one CN access category and the CN Allowed NSSAI list.
  • the information of the at least one CN network slice is determined according to the CN Allowed NSSAI list, and the RAN saves the mapping relationship between the preset RAN network slice information and the CN network slice information, so that at least one may be
  • the CN network slice information determines information for at least one RAN network slice, and at least one CN access class corresponds to the CN Allowed NSSAI list.
  • An optional implementation manner of the second mapping rule is provided, where the first mapping rule further includes information about the at least one RAN network slice, a mapping relationship between the CN Allowed NSSAI list and at least one CN access category, and The flexibility of the solution of the present application.
  • the CN may select at least one CN that the UE is allowed to access in the current registration area according to the network slice selection assistance information (CN NSSAI) allowed by the UE, the subscription information of the UE, the local policy, the availability of the network slice, and the like.
  • the information of the network slice, the information of the at least one CN network slice may be presented in the form of a list, and may be referred to as a CN allowed NSSAI (CN Allowed NSSAI) list, and may also be represented in other manners, which is not limited.
  • the first mapping rule further includes A mapping relationship between information of the at least one RAN network slice and information of currently available CN network slices.
  • the information of the at least one CN network slice is determined by the RAN according to the currently available information of the CN network slice, and another implementation manner of the second mapping rule is provided, which increases the flexibility of the solution. Sex.
  • the first mapping rule further includes information about the at least one RAN network slice, A mapping relationship between currently available CN network slice information and at least one CN access category.
  • the information of the at least one CN network slice is determined by the RAN according to the currently available information of the CN network slice, and another implementation manner of the second mapping rule is provided, which increases the flexibility of the solution. Sex.
  • the first mapping rule further includes A mapping relationship between the information of the at least one RAN network slice and the at least one RAN access category.
  • the at least one RAN access category is an access category of the RAN reconfiguration, which may be understood as searching for at least one factor (for example, information of at least one RAN network slice, etc.) included in the second mapping rule. Index of access control information.
  • Another alternative implementation of the second mapping rule is provided, which increases the flexibility of the solution of the present application.
  • the first mapping rule further includes The information of the at least one RAN network slice, the mapping relationship between the CN Allowed NSSAI list and the RAN access category.
  • the information of the at least one CN network slice is determined by the RAN according to the CN Allowed NSSAI list, and another implementation manner of the second mapping rule is provided, which increases the flexibility of the solution.
  • the first mapping rule further includes The information of the at least one RAN network slice, the information of the currently available CN network slice, and the mapping relationship of the RAN access category.
  • the information of the at least one CN network slice is determined by the RAN according to the currently available information of the CN network slice, and another implementation manner of the second mapping rule is provided, which increases the flexibility of the solution. Sex.
  • the information of the at least one RAN network slice included in the second mapping rule may be related to the at least one RAN access category, or the CN Allowed NSSAI list.
  • the CN Allowed NSSAI list has a mapping relationship with at least one RAN access category, or information of currently available CN network slices, or at least one CN access category.
  • the second mapping rule may also not include at least one RAN access category, or a CN Allowed NSSAI list, or a CN Allowed NSSAI list and at least one RAN access category, or information of currently available CN network slices.
  • at least one CN access category the RAN only needs to know that they have a mapping relationship, and is not limited.
  • a second aspect of the present application provides a method for access control, which may include: receiving, by a terminal device, a first message from a first network device, where the first message includes a first mapping rule, and the first mapping rule Information including at least one radio access network RAN network slice; the terminal device receiving access control information from the first network device.
  • the first mapping rule sent by the RAN to the UE includes at least one RAN network slice information.
  • the configuration content of the first mapping rule in the embodiment of the present application is smaller, and the complexity is relatively low.
  • the method further includes: the terminal device according to the first mapping rule and the access control information Perform access control.
  • the UE may perform an access control check according to information of at least one RAN network slice, because the information of the RAN network slice is generally one-to-many relationship with the information of the CN network slice, so the second mapping rule
  • the configuration content is smaller than the existing configuration content, and the complexity is low. Control of the RAN network slice granularity is also achieved.
  • the case where the information of the CN network slice requested by the UE is inconsistent with the information of the allocated CN network slice is also solved, because the information of the different CN network slices of the same service type is mostly the same in the RAN network slice information of the RAN.
  • the first mapping rule further includes the at least one RAN network The mapping relationship between the sliced information and at least one RAN access category.
  • the UE may perform access control check according to information of at least one RAN network slice or at least one RAN access category, which improves the selectivity and flexibility of the technical solution of the present application, because the RAN network slice information Generally, the information of the CN network slice is a one-to-many relationship. Therefore, the configuration content of the second mapping rule is smaller than the existing configuration content, and the complexity is low. Control of the RAN network slice granularity is also achieved.
  • the situation that the information of the CN network slice requested by the UE is inconsistent with the information of the CN network slice allocated by the CN is also solved, because the information of the different CN network slices of the same service type is mapped in the RAN network, and the information of the RAN network slice is the same in most cases. .
  • the first mapping rule further includes the at least one RAN network The mapping relationship between the sliced information and at least one CN access category.
  • the UE may perform access control check according to information of at least one RAN network slice or at least one CN access category, which improves the selectivity and flexibility of the technical solution of the present application, because the RAN network slice information Generally, the information of the CN network slice is a one-to-many relationship. Therefore, the configuration content of the second mapping rule is smaller than the existing configuration content, and the complexity is low. Control of the RAN network slice granularity is also achieved.
  • the situation that the information of the CN network slice requested by the UE is inconsistent with the information of the CN network slice allocated by the CN is also solved, because the information of the different CN network slices of the same service type is mapped in the RAN network, and the information of the RAN network slice is the same in most cases. .
  • the first mapping rule further includes the at least one RAN network The mapping relationship between the sliced information and the information of at least one CN network slice.
  • the UE may perform an access control check according to the information of the at least one RAN network slice or the information of the at least one CN network slice, which improves the selectivity and flexibility of the technical solution of the present application, because the RAN network is sliced.
  • the information is generally one-to-many relationship with the CN network slice information. Therefore, the configuration content of the second mapping rule is smaller than the existing configuration content, and the complexity is low.
  • Control of the RAN network slice granularity is also achieved.
  • the situation that the information of the CN network slice requested by the UE is inconsistent with the information of the CN network slice allocated by the CN is also solved, because the information of the different CN network slices of the same service type is mapped in the RAN network, and the information of the RAN network slice is the same in most cases. .
  • the first mapping rule further includes the at least one RAN network The sliced information, the mapping of the information of the at least one CN network slice to the at least one RAN access category.
  • at least one CN network slice information is determined by the RAN according to a CN Allowed NSSAI list or a currently available CN network slice.
  • the UE may perform the access control check of the RAN network slice according to the at least one RAN network slice, or may perform the access control check of the RAN network slice according to the at least one CN access category. .
  • the information of the RAN network slice is generally one-to-many relationship with the information of the CN network slice, the control of the RAN network slice granularity is implemented, and the information of the CN network slice requested by the UE is inconsistent with the information of the CN network slice allocated by the CN. In the case, since the information of different CN network slices of the same service type is mapped in the RAN, the information of the RAN network slice is the same in most cases.
  • the first mapping rule further includes the at least one RAN network The information of the slice, the mapping of the information of the at least one CN network slice to the at least one CN access category.
  • the UE may perform an access control check of the RAN network slice according to the information of the at least one RAN network slice, or may perform an access control check of the CN network slice according to the information of the at least one CN network slice, and improve the The selectivity and flexibility of the technical solution of the present application.
  • the control of the RAN network slice granularity is also implemented, and the information of the CN network slice requested by the UE is inconsistent with the information of the CN network slice allocated by the CN, because the information of different CN network slices of the same service type is mapped in the RAN RAN network.
  • the sliced information is mostly the same.
  • a third aspect of the present application provides a method for access control, which may include: the second network device sends a second message to the first network device, where the second message includes a second mapping rule, and the second mapping rule Includes at least one CN access category.
  • the second mapping rule includes at least one CN access category, which may be used by the RAN to identify at least one according to a mapping relationship between the preset RAN network slice information and the CN network slice information.
  • CN network slice information provides an achievable way.
  • the second message includes a CN network slice selection auxiliary information Allowed NSSAI list.
  • the RAN may directly determine the information of the at least one CN network slice according to the CN Allowed NSSAI list, thereby determining the second mapping rule.
  • the information of at least one RAN network slice provides an achievable way.
  • the second mapping rule includes the at least one CN access category.
  • a fourth aspect of the embodiments of the present application provides a network device, which has the function of reducing the complexity of network slice access control. This function can be implemented in hardware or in hardware by executing the corresponding software.
  • the hardware or software includes one or more modules corresponding to the functions described above.
  • a fifth aspect of the embodiments of the present application provides a terminal device, which has the function of reducing the complexity of network slice access control.
  • This function can be implemented in hardware or in hardware by executing the corresponding software.
  • the hardware or software includes one or more modules corresponding to the functions described above.
  • a sixth aspect of the embodiments of the present application provides a network device, which has the function of reducing the complexity of network slice access control. This function can be implemented in hardware or in hardware by executing the corresponding software.
  • the hardware or software includes one or more modules corresponding to the functions described above.
  • a seventh aspect of the present application provides a network device, which may include:
  • a memory, a transceiver, the memory and the transceiver are connected by a bus;
  • the memory is configured to store an operation instruction
  • the transceiver is configured to send, by using the operation instruction, a first message to a terminal device, where the first message includes a first mapping rule, where the first mapping rule includes information of at least one RAN network slice;
  • the terminal device sends access control information.
  • the eighth aspect of the embodiments of the present application provides a wireless communication apparatus, which may include:
  • At least one processor a memory, a transceiver circuit and a bus system, the processor, the memory, the transceiver circuit coupled by the bus system, the wireless communication device communicating with the terminal device through the transceiver circuit,
  • the memory is for storing program instructions
  • the at least one processor is configured to execute the program instructions stored in the memory, such that the wireless communication device performs the method according to any one of the first aspects of the embodiments of the present application The portion of the operation of the first network device.
  • the wireless communication device may be a network device or a system chip that applies a corresponding function in a network side device.
  • a ninth aspect of the present application provides a wireless communication apparatus, which may include:
  • At least one processor a memory, a transceiver circuit and a bus system, the processor, the memory, the transceiver circuit coupled by the bus system, the wireless communication device communicating with a network side device through the transceiver circuit,
  • the memory is for storing program instructions
  • the at least one processor is configured to execute the program instructions stored in the memory, such that the wireless communication device performs the method according to any one of the second aspects of the embodiments of the present application The part of the terminal device operation.
  • the wireless communication device can be either a terminal device or a system chip that applies a corresponding function in the terminal device.
  • a tenth aspect of the present application provides a communication system, where the communication system includes a first network device, a terminal device, and a second network device, where the first network device is optional to perform the first aspect or the first aspect of the present application.
  • the first network device in the implementation manner; the terminal device is the terminal device in the optional implementation manner of the second aspect or the second aspect of the application; the second network device is configured to perform the third aspect or the The second network device of any of the alternative implementations of the three aspects.
  • the eleventh aspect of the present application provides a storage medium. It should be noted that the technical solution of the present invention may contribute to the prior art or all or part of the technical solution may be implemented by software.
  • the computer software product is stored in a storage medium for storing computer software instructions for use in the above apparatus, comprising: the first network device for performing the first aspect, the second aspect or the third aspect A program designed by a terminal device or a second network device.
  • the storage medium includes: a U disk, a mobile hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disk, and the like, which can store program codes.
  • a twelfth aspect of the embodiments of the present application provides a computer program product comprising instructions, when executed on a computer, causing a computer to perform the method as described in the first aspect of the present application or any of the alternative implementations of the first aspect .
  • a thirteenth aspect of the embodiments of the present application provides a computer program product comprising instructions, when executed on a computer, causing the computer to perform the method as described in the second aspect or any alternative implementation of the second aspect of the present application .
  • a fourteenth aspect of the embodiments of the present application provides a computer program product comprising instructions, when executed on a computer, causing the computer to perform the method as described in any of the optional implementations of the third aspect or the third aspect of the present application. .
  • the embodiments of the present application have the following advantages:
  • An embodiment of the present application sends a first message to a terminal device by using a first network device, where the first message includes a first mapping rule, where the first mapping rule includes information of at least one RAN network slice; the first network device sends The terminal device sends access control information. Because the information of the RAN network slice and the information of the CN network slice are usually one-to-many mapping relationship, the first mapping rule sent by the RAN to the UE includes information of at least one RAN network slice, which is compared with the prior art.
  • the configuration content of the first mapping rule in the embodiment of the present application is smaller and the complexity is relatively low.
  • FIG. 1 is a schematic diagram of 3GPP supporting multiple network slices in the embodiment of the present application
  • FIG. 2A is a schematic diagram of a scenario applied in an embodiment of the present application.
  • 2B is a schematic structural diagram of a wireless communication system applied in an embodiment of the present application.
  • FIG. 3 is a schematic diagram of an embodiment of a method for access control according to an embodiment of the present application.
  • FIG. 4 is a schematic diagram of another embodiment of a method for access control in an embodiment of the present application.
  • FIG. 5A is a schematic diagram of an embodiment of a network device according to an embodiment of the present application.
  • FIG. 5B is a schematic diagram of another embodiment of a network device according to an embodiment of the present application.
  • 6A is a schematic diagram of an embodiment of a terminal device according to an embodiment of the present application.
  • 6B is a schematic diagram of another embodiment of a terminal device according to an embodiment of the present application.
  • FIG. 7 is a schematic diagram of another embodiment of a network device according to an embodiment of the present application.
  • FIG. 8 is a schematic diagram of another embodiment of a terminal device according to an embodiment of the present application.
  • the embodiment of the present application provides a method for access control, a network device, and a terminal device, which are used to reduce the complexity of network slice access control.
  • the embodiments of the present application relate to a radio access network device, a terminal device, and a core network device.
  • the access network device which may also be referred to as a base station, is a device deployed in the radio access network to provide wireless communication functions for the terminal device, including but not limited to: various forms of macro base stations, micro base stations (also It is called a small station, a relay station, a Transmission Reception Point (TRP), an evolved Node B (eNB), a radio network controller (RNC), and a Node B (Node B, NB).
  • the names of wireless access network devices with similar wireless communication capabilities may vary.
  • the foregoing apparatus for providing a wireless communication function for a terminal device is collectively referred to as a radio access network device.
  • the terminal device is also referred to as a user equipment (UE) or a mobile station (MS) in the wireless communication standard.
  • the terminal device involved in the embodiment of the present application is a wireless transceiver function.
  • the equipment can be deployed on land, indoors or outdoors, hand-held or on-board; it can also be deployed on the water (such as ships); it can also be deployed in the air (such as airplanes, balloons, satellites, etc.).
  • the terminal device may include various types of mobile phones, tablets, computers with wireless transceiver functions, wireless data cards, virtual reality (VR) terminal devices, and augmented reality (Augmented Reality, AR) terminal equipment, terminal equipment of machine type communication (MTC), terminal equipment in industrial control, terminal equipment in self driving, and remote medical Terminal equipment, terminal equipment in smart grid, terminal equipment in transportation safety, terminal equipment in smart city, smart home (home equipment with wireless communication function, such as refrigerator, TV, washing machine or furniture, etc., as well as wearable devices (such as smart watches, smart bracelets, pedometers, etc.) and so on.
  • the terminal device referred to in the present application can also be set to a fixed position, and has a device similar to the wireless communication function of the foregoing terminal device. In a system using a different wireless access technology, the name of the terminal device having a similar wireless communication function may be different.
  • the device having the wireless communication function is collectively referred to as a terminal. device.
  • the core network device may be a device having an access and mobility management network function, a session management network function (SMF), a user plane network function, an authentication management network function, and an AMF.
  • SMF session management network function
  • AMF authentication management network function
  • 5G introduces the concept of network slicing to cope with the difference in network performance requirements of different communication services.
  • a complete network slice includes but is not limited to RAN network slices and CN network slices to jointly build an end-to-end network slice architecture.
  • CN network slices pass through a set of customized NFs, including access and mobility management functions (Access and Mobility Management). Function, AMF), Session Management Function (SMF), User Plane Function (UPF), etc.
  • the RAN network slice is configured by scheduling and a set of different first protocol layer 1 (such as physical layer), second protocol layer 2 (such as media access control layer, radio link control layer, data packet aggregation layer, etc.) Implement different RAN network slices.
  • the implementation form of the specific RAN network slice is not limited herein, and may be implemented by atomization, modularization, or by software, instantiation, or the like.
  • the CN network slice is different according to the tenant and the service type, and the number of RAN network slices is small due to factors such as limited air interface resources.
  • the CN network slice and the RAN network slice are many-to-one or many-to-many. Relationships, extreme situations can reach a one-to-one ratio.
  • network slice selection is to select a suitable network slice for the UE, and associate the UE with a specific network slice, thereby establishing a control plane CP corresponding to the network slice. (control plane, CP) and / or user plane UP (user plane, UP) connection.
  • control plane, CP control plane
  • UP user plane
  • Network slicing can be regarded as a logically independent virtual network. Different network slicing needs to ensure the isolation requirement. Therefore, when the load of one network slice is too heavy, it is necessary to avoid negative impact on other network slicing, so the network slice based connection Incoming control can effectively ensure the isolation of network slices, so as to meet the business requirements signed by operators and network slicing customers, or the requirements of Service Level Agreement (SLA).
  • SLA Service Level Agreement
  • the access control may limit the proportion of the UE accessing the network, for example, designing an access restriction parameter, including an access factor, an access back-off, and the like, thereby limiting the network access of the UE proportionally.
  • an access restriction parameter including an access factor, an access back-off, and the like.
  • different access restriction parameters can be set for different services, thereby implementing service-specific access control, and restricting access of certain users according to different user access levels.
  • the LTE system supports multiple access control technologies, and the following implementation methods are known:
  • ABS Ordinary Access Barring Check
  • PLMN Public Land Mobile Network
  • EAB Extended Access Barring
  • ACDC Application Specific Congestion Control for Data Communication
  • SBC Service Specific Access Control
  • Multimedia Telephony Multimedia Telephony
  • the existing ABC scheme of LTE is applied to network slicing, that is, the RAN uses the CN network slice supported by the network as a separate ABC category, and broadcasts access control information applicable to each CN network slice, thereby implementing CN network slice access control; RAN broadcast CN network slice applicable access control information, such as CN network slice 1 access control information, CN network slice 2 access control information; UE reads system information in each CN network The slice access control information is combined with the CN network slice to initiate the connection, and the corresponding access control information is saved; the UE performs an access control check to determine whether a Radio Resource Control (RRC) connection request needs to be initiated.
  • RRC Radio Resource Control
  • the above technology only adds the category of the CN network slice based on the existing LTE.
  • the excessive number of CN network slices causes the technical overhead and the backward compatibility to be poor.
  • the CN may configure an access category applicable to the UE, and the configuration includes a mapping rule, for example, mapping the access level of the UE, the information of the CN network slice, the application, the service category, and the like to a specific access category ( Access category), which can be called the CN access category.
  • the CN access category may be understood as an index of the access control information corresponding to at least one factor (for example, an access level of the UE, information of at least one CN network slice, an application, a service category, and the like) included in the mapping rule.
  • the mapping rule may be sent by the CN to the UE through a non-access stratum (NAS) message, and is transmitted during registration or registration area update.
  • NAS non-access stratum
  • the mapping rules can be presented in the form of a table, as shown in Table 1 below.
  • the UE may trigger the network access, and according to the obtained configuration information, the configuration information may include a mapping rule, and determine the CN access category corresponding to the access.
  • the RAN indicates the CN access control information corresponding to the CN access category through the system message, for example, the access restriction ratio and the restricted time, or the bit map may be used to indicate whether the UE access needs to be restricted or the like.
  • the UE performs the access restriction check again, that is, before initiating the access attempt, the UE first uses the determined CN access category to determine whether the access can be initiated; if the UE determines that the access is not restricted, the access attempt is initiated.
  • the scheme is controlled by the CN, but the number of CN network slices is too large.
  • the NAS configuration table is too large and complex. High; and the CN network slice requested by the UE may be different from the CN network slice allocated by the network. For example, the CN network slice of a tenant requested by the UE is unavailable in the current area, and the CN allocates an identical CN network slice of another tenant that can be replaced or a CN network slice of the same service type.
  • the granularity of the RAN access control is different from that of the CN network slice, resulting in poor access control flexibility of the RAN based on the network slice.
  • FIG. 2A is a schematic diagram of a scenario applied to an embodiment of the present application.
  • the LTE system is used as an example.
  • the UE is located in the coverage of one or more cells (carriers) provided by the macro base station or the small base station, and the number of cells serving the UE may be one or more.
  • the UE may work according to carrier aggregation (CA) or dual connectivity (DC) or coordinated multiple point transmission (CoMP), at least one of which
  • the cell provides more than one air interface technology format, such as more than one transmission time interval (TTI), more than one subcarrier spacing width, more than one cyclic prefix length, etc. Transmission characteristics while providing wireless resources to the UE.
  • the present application is also applicable to a Universal Mobile Telecommunications System (UMTS) system, a Code Division Multiple Access (CDMA) system, a wireless local area network (WLAN), or a future 5G (the fifth generation). ) Wireless communication systems, etc.
  • UMTS Universal Mobile Telecommunications System
  • CDMA
  • FIG. 2B is a schematic structural diagram of a wireless communication system applied to an embodiment of the present application.
  • the first network device, the terminal device, and the second network device may be included.
  • the terminal device is described by using the UE, the first network device in the RAN, and the second network device as the CN.
  • the wireless communication system may include a Radio Access Network (RAN) device 110, a Core Network (CN) device 120, and a User Equipment (UE) 130.
  • RAN Radio Access Network
  • CN Core Network
  • UE User Equipment
  • the communication system of the embodiment of the present application supports a network slicing architecture in which core network network slices can share core network equipment and/or core network resources, and can also monopolize core network equipment and/or core network resources. As shown in FIG.
  • the UE 130 accesses one or more RAN network slices or CN network slices through the RAN device 110. Specifically, the RAN device 110 selects the AMF for the UE 130 according to the information provided by the UE 130 and the Access and Mobility Management Function (AMF) information configured or acquired.
  • AMF Access and Mobility Management Function
  • the first network device sends a first message to the terminal device, where the first message includes a first mapping rule, where the first mapping rule includes information of at least one RAN network slice; the first network device Sending access control information to the terminal device.
  • the terminal device may perform an access control check according to the received first mapping rule and the access control information.
  • the first mapping rule sent by the RAN to the UE includes information of at least one RAN network slice, which is compared with the prior art.
  • the configuration content of the first mapping rule in the embodiment of the present application is smaller and the complexity is relatively low. The problem that the CN network slice is more, which causes the NAS level table configuration to be too large and the complexity is too high.
  • the first mapping rule may further include a mapping relationship between the information of the at least one RAN network slice and the at least one RAN access category, or the first mapping rule further includes information about the at least one RAN network slice.
  • the mapping relationship of the at least one CN access category, or the first mapping rule may further include information of the at least one RAN network slice, a mapping relationship between the at least one RAN access category and the at least one CN access category.
  • the terminal device is described by using the UE, the first network device in the RAN, and the second network device as the CN.
  • FIG. 3 it is a schematic diagram of an embodiment of the method for access control in the embodiment of the present application, including:
  • the UE sends an uplink message to the CN.
  • the UE sends an uplink message to the CN through the RAN.
  • the uplink message may be a non-access stratum (NAS) message such as a registration request or a registration area update request. That is, the UE initiates a registration management request to the CN through the RAN (for example, the CN may be an access management function, an access, and a mobility management function, etc.), requesting the UE to register with the CN, and completing functions such as identity recognition, authentication, or registration area update.
  • NAS non-access stratum
  • the NAS message may be any uplink message related to registration management, and is not limited to NAS messages such as the above-mentioned registration request or registration area update request.
  • the uplink message may carry at least one network slice selection assistance information (NSSAI) allowed by the CN network, and is used to assist the CN to select, for the UE, information about the CN network slice suitable for accessing. .
  • NSSAI network slice selection assistance information
  • the CN acquires a first mapping rule, where the first mapping rule includes at least one CN access category.
  • the CN configures the CN access category applicable to the UE, and the first mapping rule is obtained, where the first mapping rule includes at least one CN access category.
  • the first mapping rule may include an access level of the UE, information of at least one CN network slice, an application, a service category, and the like, mapped to a specific access category, which may be referred to herein as a CN access category.
  • the CN access category may be understood as an index for finding access control information corresponding to at least one factor (eg, access level of the UE, information of at least one CN network slice, application, service category, etc.) included in the first mapping rule.
  • the CN access category may be indicated by a number, a letter, a byte, or the like, and is not specifically limited in the embodiment of the present application.
  • the first mapping rule may be presented in the form of a table, where the first mapping rule does not include information about at least one CN network slice, as shown in Table 2 below:
  • information about at least one CN network slice may be included, as shown in Table 3 below:
  • the first mapping rule includes at least one CN access category, and other factors may be greater or smaller than those shown in Tables 2 and 3 above.
  • the information of the at least one CN network slice may be represented by at least one network slice selection assistance information (NSSAI) allowed by the CN network.
  • NSSAI network slice selection assistance information
  • the network slice selection auxiliary information allowed by the CN network includes but is not limited to the following related information:
  • Network slice type for example, enhanced mobile broadband service (eMBB), ultra-reliable low-latency communication (URLLC), massive machine type communication (mMTC), etc.
  • eMBB enhanced mobile broadband service
  • URLLC ultra-reliable low-latency communication
  • mMTC massive machine type communication
  • the network slice type may refer to an end-to-end network slice type, including a RAN network slice type and a CN network slice type, and may also refer to a RAN network slice type, or a CN network slice type.
  • Service type related to a specific service, such as video service, car network service, voice service, etc., indicating service characteristics or specific service information.
  • Network slice differentiation The auxiliary network slice type and service type are used to further distinguish network slice information. It can be used to distinguish network slices under the same network slice type or service type.
  • Tenant information Used to indicate the customer information for creating or renting the network slice, such as Tencent, State Grid, etc.
  • User group information Group information for indicating that users are grouped according to certain characteristics, such as the level of the user.
  • Network slice instance information used to indicate the instance ID and feature information created for the network slice.
  • the network slice instance is assigned an identifier for indicating the network slice instance, and a new identifier may be mapped on the basis of the network slice instance identifier, and the network slice instance is associated with the identifier, and the receiver may identify the representative according to the identifier. Specific network slice instance.
  • DCN Dedicated Core Network identification
  • This identifier is used to uniquely indicate a proprietary core network, such as the core network of the Internet of Things.
  • the DCN identifier may be mapped to the network slice identifier, and the network slice identifier may be mapped by the DCN identifier, and the DCN identifier may also be mapped by using the network slice identifier.
  • the CN Allowed NSSAI list is determined in such a manner that the CN can select the UE according to factors such as the network slice selection assistance information (CN NSSAI) allowed by the UE, the UE subscription information, the local policy, and the availability of the network slice.
  • CN NSSAI network slice selection assistance information
  • Information of at least one CN network slice that is allowed to be accessed in the current registration area, the information of the at least one CN network slice may be presented in the form of a list, which may be referred to as a CN allowed NSSAI (CN Allowed NSSAI) list, or may be other The way is expressed, the specific is not limited.
  • the CN sends the first downlink message to the RAN.
  • the CN sends a first downlink message to the RAN, and the RAN receives the first downlink message from the CN.
  • the first downlink message may include a first mapping rule and a CN Allowed NSSAI list, where the first mapping rule includes at least one CN access category; or the first downlink message may include a first mapping rule, where the first mapping rule includes at least one The CN access category; or the first downlink message may include a CN Allowed NSSAI list.
  • the first downlink message may include the first mapping rule, and the CN Allowed NSSAI list may also be sent to the RAN by another downlink message.
  • the first downlink message may be a NAS message, and is sent to the RAN through the CN and the RAN interface.
  • the CN sends the first downlink message to the RAN through the N2 interface.
  • the RAN acquires a second mapping rule, where the second mapping rule includes information of at least one RAN network slice.
  • the RAN receives the first downlink message sent by the CN.
  • the first downlink message may include a first mapping rule and a CN Allowed NSSAI list, where the first mapping rule includes at least one CN access category; or the first downlink message may include a first mapping rule, where the first mapping rule includes at least one The CN access category; or the first downlink message may include a CN Allowed NSSAI list.
  • the RAN acquires a second mapping rule, where the second mapping rule includes information of at least one RAN network slice.
  • the first downlink message received by the RAN may include a first mapping rule, and another received downlink message may include a CN Allowed NSSAI list.
  • the information of the at least one RAN network slice has a mapping relationship with the CN Allowed NSSAI list
  • the second mapping rule may include the at least one RAN network slice.
  • the information is related to the CN Allowed NSSAI list; if the CN Allowed NSSAI list is not included in the downlink message received by the RAN, the information of the at least one RAN network slice is mapped to the currently available CN network slice information, and the second mapping is performed.
  • the rules may include information of the at least one RAN network slice and information of currently available CN network slices.
  • the RAN saves the mapping relationship between the information of the preset RAN network slice and the information of the CN network slice.
  • the mapping relationship may be pre-configured by the network management or through the CN device through the interface information between the CN and the RAN. Configuration.
  • the information of one or more CN network slices may correspond to information of a RAN network slice, as shown in Table 4 below:
  • RAN Network slice access network network slice information CN Network slice, core network network slice information 1 1,2 2 3,4 3 5,6,7,8 4 9,10,11,12 5 13,14 6 15,16 7 17,18,19 8 20, 21, 22 9 23,24 10 25,26
  • the second mapping rule may be found according to the mapping relationship between the preset RAN network slice information and the CN network slice information, as shown in Table 4 above.
  • the information of the at least one RAN network slice corresponding to the allowed NSSAI list is used as the second mapping rule.
  • the information of the at least one RAN network slice is mapped to a specific access category, which may be referred to as a RAN access category.
  • the access category may use a RAN network slice ID or a new access category to determine a second mapping rule.
  • the RAN access category may be understood as an index for finding access control information corresponding to at least one factor (for example, information of at least one RAN network slice, etc.) included in the second mapping rule.
  • the CN Allowed NSSAI list is a representation of information of at least one CN network slice allowed to be accessed in the current registration area of the UE, so the CN Allowed NSSAI list is at least one CN network.
  • the sliced information for example: CN Allowed NSSAI list is shown in Table 5:
  • 9, 17, and 20 may be identifiers of CN network slices, or may be network slice type, service type, network slice division, tenant information, user group information, network slice instance information, and proprietary core network. Indicators and other indications are used to distinguish different CN network slices, which are not limited.
  • the second mapping rule may include information of at least one RAN network slice, and the information of the at least one RAN network slice is found through the list shown in Table 5 in the above Table 4, because CN
  • the Allowed NSSAI list is information of at least one CN network slice, so it can be searched by the mapping relationship between the preset RAN network slice information and the CN network slice information.
  • the information of the RAN network slice may be indicated by the RAN network slice identifier, as follows:
  • the UE may perform an access control check according to information of at least one RAN network slice, because the information of the RAN network slice is generally one-to-many relationship with the CN network slice information, so the second mapping
  • the configuration content of the rule is smaller than the existing configuration content, and the complexity is low. Control of the RAN network slice granularity is also achieved.
  • the situation that the information of the CN network slice requested by the UE is inconsistent with the information of the CN network slice allocated by the CN is also solved, because the information of the different CN network slices of the same service type is mapped in the RAN network, and the information of the RAN network slice is the same in most cases. .
  • the second mapping rule may include a mapping relationship between information of at least one RAN network slice and at least one RAN access category, as follows:
  • the UE may perform access control check according to information of at least one RAN network slice or at least one RAN access category, which improves the selectivity and flexibility of the technical solution of the present application. Because the information of the RAN network slice is generally one-to-many relationship with the information of the CN network slice, the configuration content of the second mapping rule is smaller than the existing configuration content, and the complexity is low. The control of the RAN network slice granularity is realized.
  • the situation that the information of the CN network slice requested by the UE is inconsistent with the information of the CN network slice allocated by the CN is also solved, because the information of the different CN network slices of the same service type is mapped in the RAN network, and the information of the RAN network slice is the same in most cases. .
  • the second mapping rule may include a mapping relationship between information of at least one RAN network slice and information of at least one CN network slice, as follows:
  • the UE may perform an access control check of the RAN network slice according to the information of the at least one RAN network slice, or may perform an access control check of the CN network slice according to the information of the at least one CN network slice.
  • the selectivity and flexibility of the technical solution of the present application are improved. Because the information of the RAN network slice is generally one-to-many relationship with the information of the CN network slice, the configuration content of the second mapping rule is smaller than the existing configuration content, and the complexity is low. The control of the RAN network slice granularity is realized.
  • the situation that the information of the CN network slice requested by the UE is inconsistent with the information of the CN network slice allocated by the CN is also solved, because the information of the different CN network slices of the same service type is mapped in the RAN network, and the information of the RAN network slice is the same in most cases. .
  • the second mapping rule may include information of at least one RAN network slice, information of at least one CN network slice, and a mapping relationship of at least one RAN access category, as follows:
  • the UE may perform an access control check of the RAN network slice according to the information of the at least one RAN network slice, or may perform an access control check of the CN network slice according to the information of the at least one CN network slice.
  • the access control check of the RAN network slice may be performed according to the at least one RAN access category, which improves the selectivity and flexibility of the technical solution of the present application. Because the information of the RAN network slice is generally one-to-many relationship with the information of the CN network slice, the configuration content of the second mapping rule is smaller than the existing configuration content, and the complexity is low. The control of the RAN network slice granularity is realized.
  • the situation that the information of the CN network slice requested by the UE is inconsistent with the information of the CN network slice allocated by the CN is also solved, because the information of the different CN network slices of the same service type is mapped in the RAN network, and the information of the RAN network slice is the same in most cases. .
  • At least one RAN network slice information may be associated with at least one RAN access category, or a CN Allowed NSSAI list, or a CN Allowed NSSAI list and At least one RAN access category has a mapping relationship, but the second mapping rule may also not include at least one RAN access category, or a CN Allowed NSSAI list, or a CN Allowed NSSAI list and at least one RAN access category, The RAN knows their mapping relationship, which is not limited.
  • the second mapping rule may be found according to the mapping relationship between the preset RAN network slice information and the CN network slice information, as shown in Table 4 above.
  • the current RAN or the information of the at least one CN network slice allowed by the entire network that is, the information of the at least one RAN network slice corresponding to the currently available CN network slice information is used as the second mapping rule.
  • the information of the at least one RAN network slice is mapped to a specific access category, which may be referred to as a RAN access category.
  • the access category may use a RAN network slice identifier (NSRPI), or a new access category may be used to determine the second mapping rule.
  • the RAN access category may be understood as an index that searches for access control information corresponding to at least one factor (eg, information of at least one RAN network slice, etc.) included in the second mapping rule.
  • the second mapping rule may include information of at least one RAN network slice, or may include information of at least one RAN network slice and at least one RAN.
  • a mapping relationship of the access category or may include a mapping relationship between information of the at least one RAN network slice and information of the at least one CN network slice, or may include information of at least one RAN network slice, information of at least one CN network slice, and A mapping relationship of at least one RAN access category.
  • the determined information of the at least one CN network slice is determined by the RAN according to information of the currently available CN network slice, and the determined quantity of information of the at least one CN network slice may be The number of pieces of information of at least one CN network slice determined by the manner of (1) above.
  • the RAN is information of at least one CN network slice determined according to information of currently available CN network slices.
  • the information of the at least one RAN network slice may be related to at least one RAN access category, or the information of the currently available CN network slice, or the currently available CN.
  • the information of the network slice has a mapping relationship with the at least one RAN access category, but the second mapping rule may also not include at least one RAN access category, information of the currently available CN network slice, or the currently available CN network.
  • the sliced information, and at least one RAN access category are not specifically limited.
  • the information of the at least one RAN network slice mentioned above, the information of the at least one CN network slice, the at least one CN access category, and other factors may also be included.
  • the specific is not limited.
  • the information of at least one RAN network slice may be represented by a self-defined identifier that has a mapping relationship with at least one CN network slice, and may also use a RAN network slice identifier and a RAN network slice type.
  • Information, RAN service type, RAN network slice classification, RAN tenant information, RAN network slice instance information, etc. are used to distinguish different RAN network slices, which are not limited.
  • the RAN only plays the role of forwarding, that is, the first mapping rule is forwarded to the UE.
  • the RAN access category may be indicated by a number, a letter, a byte, etc., and is not specifically limited in the embodiment of the present application.
  • the RAN sends the second downlink message to the UE, where the second downlink message includes a second mapping rule.
  • the RAN may send second downlink information to the UE, where the second downlink information includes a second mapping rule, where the second mapping rule includes information of at least one RAN network slice.
  • the UE receives the second downlink message from the RAN.
  • the second downlink message may be an AS message such as a radio resource control (RRC).
  • RRC radio resource control
  • the second downlink message may further include a first mapping rule, where the first mapping rule includes at least one CN access category, or the RAN sends the first mapping rule to the UE by using another downlink message, where the first mapping rule may be Refer to Table 2 and Table 3 above for details, and details are not described here.
  • the UE determines information about at least one RAN network slice according to the second mapping rule.
  • the UE receives the second downlink message sent by the RAN, where the second downlink message includes a second mapping rule, where the second mapping rule includes information of at least one RAN network slice.
  • the second mapping rule reference may be made to any of the foregoing Table 6, Table 7, Table 8, and Table 9, and details are not described herein again.
  • the second mapping rule includes a first mapping rule, or the UE receives another downlink message, and the other downlink message includes a first mapping rule, where the first mapping rule includes at least one CN access category.
  • the RAN sends the access control information to the UE.
  • the RAN sends RAN access control information to the UE, and the UE receives RAN access control information from the RAN.
  • the RAN access control information may be access control information of information of all RAN network slices, or may be access control information of information of at least one RAN network slice.
  • the RAN sends CN access control information to the UE, and the UE receives CN access control information from the RAN.
  • the CN access control information may be access control information of information of all CN network slices, or may be access control information of information of at least one CN network slice.
  • the UE performs access control according to the second mapping rule and the access control information.
  • the UE may perform an access restriction check according to the second mapping rule and the RAN access control information. Before initiating an access attempt, the UE may perform ABC according to information of at least one RAN network slice or access control information corresponding to at least one RAN access category, thereby determining whether an access or service request can be initiated.
  • the corresponding access control information has an access restriction timer. If the access restriction timer set by the RAN network slice is running, the terminal device determines that the network access request or the service request cannot be initiated. Otherwise, the terminal device uses a random number algorithm to select a uniformly distributed random number between 0 and 1. If the random number is smaller than the corresponding access restriction factor in the access control information, the terminal device determines that the RAN network slice can be If the random number is greater than or equal to the corresponding access restriction factor, the terminal device determines that the RAN network slice is not accessible, and the terminal device starts an access restriction timer corresponding to the RAN network slice, for example, The timing of the access restriction timer may be (0.7+0.6* random number)* access restriction time.
  • the RAN access control information includes a bit map, and different bits of the bit map correspond to different RAN network slice information or different RAN access categories. For example, the corresponding bit number value is “0”, indicating that the network slice access request or service request can be initiated, otherwise it cannot be initiated.
  • the specific ABC mechanism can also refer to any ABC applicable to the LTE system or the 5G system, which is not limited herein. If not, the UE initiates an access attempt or service request to the first RAN network slice.
  • the UE may perform an access restriction check according to the first mapping rule and the CN access control information.
  • the UE may perform ABC according to information of at least one RAN network slice or access control information corresponding to at least one RAN access category, thereby determining whether an access or service request can be initiated.
  • the specific ABC mechanism can refer to any ABC applicable to the LTE system or the 5G system, which is not limited herein. If not restricted, the UE may initiate an access attempt or service request to the first CN network slice.
  • the access control check performed by the RAN according to the second mapping rule and the access control information includes, but is not limited to, the two possible implementation manners mentioned above, and the other is performed according to the second mapping rule and the access control information.
  • the manner in which the control check is entered is also within the scope of protection of the present application.
  • the RAN sends a second downlink message to the UE, where the second downlink message includes a second mapping rule, where the second mapping rule includes information of at least one RAN network slice; and the RAN sends the information to the UE.
  • the RAN accesses control information. It should be noted that the second mapping rule determined by the RAN has nothing to do with the first mapping rule sent by the RAN to receive the CN.
  • the UE may initiate an access request to the information of the first RAN network slice in the information of the at least one RAN network slice according to the RAN access control information.
  • the second mapping rule sent by the RAN to the UE includes information of at least one RAN network slice, which is compared with the prior art.
  • the configuration of the second mapping rule in the embodiment of the present application is smaller and the complexity is relatively low.
  • the problem of CN network slicing is solved, which causes the NAS level table configuration to be too large and the complexity is too high.
  • the information of the CN network slice requested by the UE is inconsistent with the information of the CN network slice allocated by the CN, because information of different CN network slices of the same service type is mapped to the RAN network slice information of the RAN. identical.
  • the access control of the RAN based on the RAN network slice granularity is also implemented.
  • FIG. 4 is a schematic diagram of another embodiment of an access control method according to an embodiment of the present application, including:
  • the UE sends an uplink message to the CN.
  • the CN acquires a first mapping rule.
  • steps 401 and 402 are similar to steps 301 and 302 shown in FIG. 3 above, and details are not described herein again.
  • the CN sends the first downlink message to the RAN, where the first downlink message includes a first mapping rule.
  • the CN sends a first downlink message to the RAN, and the RAN receives the first downlink message from the CN.
  • the first downlink message includes a first mapping rule, and the first mapping rule includes at least one CN access category, which can be referred to the foregoing Table 2 and Table 3, and details are not described herein again.
  • the first downlink message may further include a CN Allowed NSSAI list, or the CN sends the CN Allowed NSSAI list to the RAN by using another downlink message.
  • the first downlink message may be a NAS message, and is sent to the RAN through the CN and the RAN interface.
  • the CN sends the first downlink message to the RAN through the N2 interface.
  • the CN Allowed NSSAI list is determined in such a manner that the CN can select the UE according to factors such as the network slice selection assistance information (CN NSSAI) allowed by the UE, the UE subscription information, the local policy, and the availability of the network slice.
  • CN NSSAI network slice selection assistance information
  • Information of at least one CN network slice that is allowed to be accessed in the current registration area, the information of the at least one CN network slice may be presented in the form of a list, which may be referred to as a CN allowed NSSAI (CN Allowed NSSAI) list, or may be other The way is expressed, the specific is not limited.
  • the RAN acquires a second mapping rule, where the second mapping rule includes information of at least one RAN network slice.
  • the RAN receives the first downlink message sent by the CN.
  • the first downlink message includes a first mapping rule, and the first mapping rule includes at least one CN access category.
  • the first downlink message may further include a CN Allowed NSSAI list, or the RAN receives another CN downlinked NSSAI list.
  • the RAN acquires a second mapping rule, where the second mapping rule includes information of at least one RAN network slice.
  • the information of the at least one RAN network slice has a mapping relationship with the CN Allowed NSSAI list
  • the second mapping rule may include the at least one RAN network slice.
  • the information is related to the CN Allowed NSSAI list; if the CN Allowed NSSAI list is not included in the downlink message received by the RAN, the information of the at least one RAN network slice is mapped to the currently available CN network slice information, and the second mapping is performed.
  • the rules may include information of the at least one RAN network slice and information of currently available CN network slices.
  • the second mapping rule may add information of at least one RAN network slice to the first mapping rule, or the second mapping rule is determined by the RAN according to the first mapping rule and the CN Allowed NSSAI list, or The second mapping rule is determined by the RAN according to the first mapping rule and the information of the currently available CN network slice.
  • the RAN saves the mapping relationship between the information of the preset RAN network slice and the information of the CN network slice.
  • the mapping relationship may be pre-configured by the network management or through the CN device through the interface information between the CN and the RAN. Configuration.
  • the information of one or more CN network slices may correspond to information of one RAN network slice, as shown in Table 10 below:
  • RAN Network slice access network network slice information CN Network slice, core network network slice information 1 1,2 2 3,4 3 5,6,7,8 4 9,10,11,12 5 13,14 6 15,16 7 17,18,19 8 20, 21, 22 9 23,24 10 25,26
  • the CN Allowed NSSAI list is a representation of information of at least one CN network slice allowed to be accessed in the current registration area of the UE, so the CN Allowed NSSAI list is at least one CN.
  • the network slice information for example: CN Allowed NSSAI list is shown in Table 11:
  • 9, 17, and 20 may be identifiers of CN network slices, or may be network slice type, service type, network slice division, tenant information, user group information, network slice instance information, and proprietary core network. Indicators and other indications are used to distinguish different CN network slices, which are not limited.
  • the RAN may find the information of the corresponding at least one RAN network slice in the foregoing table 10 according to the CN Allowed NSSAI list, and the second mapping
  • the rule adds information of at least one RAN network slice to the first mapping rule.
  • the second mapping rule may include but is not limited to the following forms, as follows:
  • the second mapping rule adds information of at least one RAN network slice based on the first mapping rule
  • the second mapping rule may be as shown in Table 12 below:
  • the UE may perform an access control check according to information of at least one RAN network slice or at least one CN access category, because the information of the RAN network slice is generally paired with the information of the CN network slice.
  • the relationship between the RAN network slice granularity and the information of the CN network slice requested by the UE is inconsistent with the information of the CN network slice allocated by the CN, because the information mapping of different CN network slices of the same service type is The information of the RAN's RAN network slice is mostly the same.
  • the second mapping rule adds at least one RAN network slice information and at least one RAN access class generation based on the first mapping rule.
  • the RAN access category may be understood as an index for finding access control information corresponding to at least one factor (for example, information of at least one RAN network slice, etc.) included in the second mapping rule.
  • the information of at least one RAN network slice may be mapped to a specific access category, which may be referred to as a RAN access category.
  • the second mapping rule can be as shown in Table 13 below:
  • the UE may perform access control check of the RAN network slice according to at least one RAN network slice, or may perform RAN network slice access control check according to at least one RAN access category, or may be according to at least one CN access category. Perform an access control check of the RAN network slice. Because the information of the RAN network slice is generally one-to-many relationship with the information of the CN network slice, the control of the RAN network slice granularity is implemented, and the information of the CN network slice requested by the UE is inconsistent with the information of the CN network slice allocated by the CN. In the case, since the information of different CN network slices of the same service type is mapped in the RAN, the information of the RAN network slice is the same in most cases.
  • the second mapping rule adds at least one RAN network slice information and at least one CN network slice corresponding to the CN NSSAI list on the basis of the first mapping rule. Then the second mapping rule can be as shown in Table 14 below:
  • the UE may perform an access control check of the RAN network slice according to the information of the at least one RAN network slice, or may perform an access control check of the CN network slice according to the information of the at least one CN network slice.
  • the selectivity and flexibility of the technical solution of the present application are improved.
  • the control of the RAN network slice granularity is also implemented, and the information of the CN network slice requested by the UE is inconsistent with the information of the CN network slice allocated by the CN, because the information of different CN network slices of the same service type is mapped in the RAN RAN network.
  • the sliced information is mostly the same.
  • the second mapping rule adds at least one RAN network slice information, at least one RAN access category, and at least one CN network slice corresponding to the CN NSSAI list on the basis of the first mapping rule.
  • the RAN access category may be understood as an index for finding access control information corresponding to at least one factor (for example, information of at least one RAN network slice, etc.) included in the second mapping rule.
  • the information of at least one RAN network slice may be mapped to a specific access category, which may be referred to as a RAN access category.
  • the second mapping rule can be as shown in Table 15 below:
  • the UE may perform an access control check of the RAN network slice according to the information of the at least one RAN network slice, or may perform an access control check of the CN network slice according to the information of the at least one CN network slice.
  • the access control check of the RAN network slice may be performed according to the at least one RAN access category, or the access control check of the CN network slice may be performed according to the at least one CN access category, which improves the technical solution of the present application.
  • Optional and flexible are examples of the access control check of the RAN network slice according to the information of the at least one RAN network slice.
  • the control of the RAN network slice granularity is also implemented, and the information of the CN network slice requested by the UE is inconsistent with the information of the CN network slice allocated by the CN, because the information of different CN network slices of the same service type is mapped in the RAN RAN network.
  • the sliced information is mostly the same.
  • the second mapping rule adds information of at least one RAN network slice based on the first mapping rule
  • the second mapping rule may be as shown in Table 16 below:
  • the UE may perform an access control check of the RAN network slice according to the information of the at least one RAN network slice, or may perform the CN network according to the information of the at least one CN network slice or the at least one CN network slice information.
  • the access control check of the slice improves the selectivity and flexibility of the technical solution of the present application.
  • the control of the RAN network slice granularity is also implemented, and the information of the CN network slice requested by the UE is inconsistent with the information of the CN network slice allocated by the CN, because the information of different CN network slices of the same service type is mapped in the RAN RAN network.
  • the sliced information is mostly the same.
  • the second mapping rule adds at least one RAN network slice information and at least one RAN access class generation based on the first mapping rule.
  • the RAN access category may be understood as an index for finding access control information corresponding to at least one factor (for example, information of at least one RAN network slice, etc.) included in the second mapping rule.
  • the information of at least one RAN network slice may be mapped to a specific access category, which may be referred to as a RAN access category.
  • the second mapping rule can be as shown in Table 17 below:
  • the UE may perform an access control check of the RAN network slice according to the information of the at least one RAN network slice, or may perform an access control check of the CN network slice according to the information of the at least one CN network slice.
  • the access control check of the RAN network slice may be performed according to the at least one RAN access category, or the access control check of the CN network slice may be performed according to the at least one CN access category, which improves the technical solution of the present application.
  • Optional and flexible are examples of the access control check of the RAN network slice according to the information of the at least one RAN network slice.
  • the control of the RAN network slice granularity is also implemented, and the information of the CN network slice requested by the UE is inconsistent with the information of the CN network slice allocated by the CN, because the information of different CN network slices of the same service type is mapped in the RAN RAN network.
  • the sliced information is mostly the same.
  • the RAN may find the corresponding at least one RAN network slice in the foregoing table 10 according to the information of the currently available CN network slice.
  • the second mapping rule adds information of at least one RAN network slice to the first mapping rule. Then, the obtained second mapping rule can be referred to any one of the foregoing implementations of Table 12-17, and details are not described herein again.
  • the second mapping rule is determined by the RAN according to the first mapping rule and the CN Allowed NSSAI list.
  • the second mapping rule may include the implementation manner of any of the foregoing 12-17, but is not limited to the foregoing implementation manners, and may also include other implementation manners, as follows:
  • the second mapping rule may include information of at least one RAN network slice.
  • the UE may perform an access control check according to information of at least one RAN network slice, because the information of the RAN network slice is generally one-to-many relationship with the CN network slice information, so the second mapping
  • the configuration content of the rule is smaller than the existing configuration content, and the complexity is low. Control of the RAN network slice granularity is also achieved.
  • the second mapping rule may include a mapping relationship between information of at least one RAN network slice and at least one RAN access category.
  • the UE may perform access control check according to information of at least one RAN network slice or at least one RAN access category, which improves the selectivity and flexibility of the technical solution of the present application, because the RAN network slice
  • the information is generally one-to-many relationship with the CN network slice information. Therefore, the configuration content of the second mapping rule is smaller than the existing configuration content, and the complexity is low. Control of the RAN network slice granularity is also achieved.
  • the second mapping rule may include a mapping relationship between information of at least one RAN network slice and information of at least one CN network slice.
  • the UE may perform an access control check of the RAN network slice according to the information of the at least one RAN network slice, or may perform an access control check of the CN network slice according to the information of the at least one CN network slice.
  • the optionalness and flexibility of the technical solution of the present application are improved, because the information of the RAN network slice is generally one-to-many relationship with the information of the CN network slice, so the configuration content of the second mapping rule is smaller than the existing configuration content.
  • the complexity is low. Control of the RAN network slice granularity is also achieved.
  • the second mapping rule may include information of at least one RAN network slice, information of at least one CN network slice, and a mapping relationship of at least one RAN access category.
  • the UE may perform an access control check of the RAN network slice according to the information of the at least one RAN network slice, or may perform an access control check of the CN network slice according to the information of the at least one CN network slice.
  • the access control check of the RAN network slice may be performed according to the at least one RAN access category, which improves the selectivity and flexibility of the technical solution of the present application, because the information of the RAN network slice is generally one of the information of the CN network slice.
  • the configuration content of the second mapping rule is smaller than the existing configuration content, and the complexity is low. Control of the RAN network slice granularity is also achieved.
  • At least one RAN network slice information may be associated with at least one RAN access category, or a CN Allowed NSSAI list, or a CN Allowed NSSAI list and At least one RAN access category, or at least one CN access category, or at least one CN access category and at least one RAN access category, or at least one CN access category and a CN Allowed NSSAI list, a mapping relationship exists
  • the second mapping rule may also not include at least one RAN access category, or a CN Allowed NSSAI list, or a CN Allowed NSSAI list and at least one RAN access category, or at least one CN access category,
  • the at least one CN access category and the at least one RAN access category, or at least one CN access category and the CN Allowed NSSAI list the RAN knows their mapping relationship, which is not limited.
  • the second mapping rule is determined by the RAN according to the first mapping rule and the information of the currently available CN network slice.
  • the second mapping rule may refer to the implementation manner of any of the foregoing 12-21, but is not limited to the foregoing implementation manners.
  • at least one information of the CN network slice is determined by The CN Allowed NSSAI list is determined, and if the RAN does not receive the CN Allowed NSSAI list, it is determined based on the currently available CN network slice information.
  • the information of at least one RAN network slice may be represented by a self-defined identifier that has a mapping relationship with at least one CN network slice, and may also use a RAN network slice identifier and a RAN network slice type.
  • Information, RAN service type, RAN network slice classification, RAN tenant information, RAN network slice instance information, etc. are used to distinguish different RAN network slices, which are not limited.
  • the first downlink message includes the first mapping rule
  • the RAN reads the content of the first mapping rule, and then generates the second mapping rule, and then forwards the second mapping rule to the UE.
  • the RAN access category may be indicated by a number, a letter, a byte, etc., and is not specifically limited in the embodiment of the present application.
  • the RAN sends the second downlink message to the UE.
  • the RAN may send second downlink information to the UE, where the second downlink information includes a second mapping rule, where the second mapping rule includes information of at least one RAN network slice.
  • the UE receives the second downlink message from the RAN.
  • the second downlink message may be an AS message such as a radio resource control (RRC).
  • RRC radio resource control
  • the second downlink message may further include a first mapping rule, where the first mapping rule includes at least one CN access category, or the RAN sends the first mapping rule to the UE by using another downlink message, where the first mapping rule may be Refer to Table 2 and Table 3 above for details, and details are not described here.
  • the UE determines information about at least one RAN network slice according to the second mapping rule.
  • the UE receives the second downlink message sent by the RAN, where the second downlink message includes a second mapping rule, where the second mapping rule includes information of at least one RAN network slice.
  • the second mapping rule refer to any of the foregoing Tables 12-20, and details are not described herein again.
  • the second mapping rule includes a first mapping rule, or the UE receives another downlink message, and the other downlink message includes a first mapping rule, where the first mapping rule includes at least one CN access category.
  • the RAN sends the access control information to the UE.
  • the RAN sends RAN access control information to the UE, and the UE receives RAN access control information from the RAN.
  • the RAN access control information may be access control information of information of all RAN network slices, or may be access control information of information of at least one RAN network slice.
  • the RAN sends CN access control information to the UE, and the UE receives CN access control information from the RAN.
  • the CN access control information may be access control information of information of all CN network slices, or may be access control information of information of at least one CN network slice.
  • the UE performs access control according to the second mapping rule and the access control information.
  • the UE may perform an access restriction check according to the second mapping rule and the RAN access control information. Before initiating an access attempt, the UE may perform ABC according to information of at least one RAN network slice or access control information corresponding to at least one RAN access category, thereby determining whether an access or service request can be initiated.
  • the corresponding access control information has an access restriction timer. If the access restriction timer set by the RAN network slice is running, the terminal device determines that the network access request or the service request cannot be initiated. Otherwise, the terminal device uses a random number algorithm to select a uniformly distributed random number between 0 and 1. If the random number is smaller than the corresponding access restriction factor in the access control information, the terminal device determines that the RAN network slice can be If the random number is greater than or equal to the corresponding access restriction factor, the terminal device determines that the RAN network slice is not accessible, and the terminal device starts an access restriction timer corresponding to the RAN network slice, for example, The timing of the access restriction timer may be (0.7+0.6* random number)* access restriction time.
  • the RAN access control information includes a bit map, and different bits of the bit map correspond to different RAN network slice information or different RAN access categories. For example, the corresponding bit number value is “0”, indicating that the network slice access request or service request can be initiated, otherwise it cannot be initiated.
  • the specific ABC mechanism can also refer to any ABC applicable to the LTE system or the 5G system, which is not limited herein. If not, the UE initiates an access attempt or service request to the first RAN network slice.
  • the UE may perform an access restriction check according to the first mapping rule and the CN access control information.
  • the UE may perform ABC according to information of at least one RAN network slice or access control information corresponding to at least one RAN access category, thereby determining whether an access or service request can be initiated.
  • the specific ABC mechanism can refer to any ABC applicable to the LTE system or the 5G system, which is not limited herein. If not restricted, the UE may initiate an access attempt or service request to the first CN network slice.
  • the access control check performed by the RAN according to the second mapping rule and the access control information includes, but is not limited to, the two possible implementation manners mentioned above, and the other is performed according to the second mapping rule and the access control information.
  • the manner in which the control check is entered is also within the scope of protection of the present application.
  • the RAN sends a second downlink message to the UE, where the second downlink message includes a second mapping rule, where the second mapping rule includes information of at least one RAN network slice; and the RAN sends the information to the UE.
  • the RAN accesses control information.
  • the second mapping rule determined by the RAN is related to the first mapping rule sent by the RAN to the CN.
  • the UE may initiate an access request to the information of the first RAN network slice in the information of the at least one RAN network slice according to the RAN access control information.
  • the second mapping rule sent by the RAN to the UE includes information of at least one RAN network slice, which is compared with the prior art.
  • the configuration of the second mapping rule in the embodiment of the present application is smaller and the complexity is relatively low.
  • the problem of CN network slicing is solved, which causes the NAS level table configuration to be too large and the complexity is too high.
  • the information of the CN network slice requested by the UE is inconsistent with the information of the CN network slice allocated by the CN, because information of different CN network slices of the same service type is mapped to the RAN network slice information of the RAN. identical.
  • the access control of the RAN based on the RAN network slice granularity is also implemented.
  • FIG. 5A is a schematic diagram of an embodiment of the network device in the embodiment of the present application.
  • Can include:
  • the first sending module 501 is configured to send a first message to the terminal device, where the first message includes a first mapping rule, where the first mapping rule includes information of at least one radio access network network slice;
  • the second sending module 502 is configured to send access control information to the terminal device.
  • first sending module and the second sending module may be logically disposed separately or in the same module.
  • the first mapping rule and the access control information are used to perform access control on the terminal device.
  • the network device may further include:
  • the receiving module 503 is configured to receive a second message from the second network device, where the second message includes a second mapping rule, where the second mapping rule includes an access category applicable to the terminal configured by the at least one core network, where The first mapping rule further includes a mapping relationship between information of the at least one radio access network network slice and an access category applicable to the terminal configured by the at least one core network;
  • the receiving module 503 is configured to receive a second message from the second network device, where the second message includes a network-selected network slice selection assistance information Allowed NSSAI list configured by the core network, where the first mapping rule further includes the a mapping relationship between information of at least one radio access network network slice and an Allowed NSSAI list configured by the core network;
  • the receiving module 503 is configured to receive a second message from the second network device, where the second message includes a second mapping rule and a network-selected network slice selection assistance information Allowed NSSAI list configured by the core network, the second mapping The rule includes an access category applicable to the terminal configured by the at least one core network, where the first mapping rule further includes information of the at least one radio access network network slice, and an access category applicable to the terminal configured by the at least one core network. A mapping relationship with the Allowed NSSAI list of the core network configuration.
  • the first mapping rule further includes a mapping relationship between information of the at least one radio access network network slice and currently available network slice selection assistance information.
  • the first mapping rule further includes a mapping relationship between information of the at least one radio access network network slice and at least one radio access network access category.
  • a schematic diagram of an embodiment of a terminal device in the embodiment of the present application may include:
  • the first receiving module 601 is configured to receive a first message from the first network device, where the first message includes a first mapping rule, where the first mapping rule includes information of at least one radio access network network slice;
  • the second receiving module 602 receives the access control information from the first network device.
  • first receiving module and the second receiving module may be logically disposed separately or in the same module.
  • FIG. 6B which is a schematic diagram of another embodiment of the terminal device in the embodiment of the present application, the terminal device further includes:
  • the processing module 603 is configured to perform access control according to the first mapping rule and the access control information.
  • the first mapping rule further includes a mapping relationship between information of the at least one radio access network network slice and at least one radio access network access category.
  • the first mapping rule further includes a mapping relationship between information of the at least one radio access network network slice and an access category applicable to the terminal configured by the at least one core network.
  • FIG. 7 is a schematic diagram of another embodiment of a network device according to an embodiment of the present application, including:
  • the network device may vary considerably depending on configuration or performance, and may include one or more central processing units (CPU) 722 (eg, one or more processors) and memory 732, one or one
  • the storage medium 730 (for example, one or one of the Shanghai quantity storage devices) storing the application 742 or the data 744 above.
  • the memory 732 and the storage medium 730 may be short-term storage or persistent storage.
  • the program stored on storage medium 730 may include one or more modules (not shown), each of which may include a series of instruction operations in the network device.
  • central processor 722 can be configured to communicate with storage medium 730, executing a series of instruction operations in storage medium 730 on the network device.
  • the network device may also include one or more power sources 726, one or more wired or wireless network interfaces 750, one or more input and output interfaces 758, and/or one or more operating systems 741, such as Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM and more.
  • operating systems 741 such as Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM and more.
  • the steps performed by the network device in the above embodiments may be based on the network device structure shown in FIG.
  • FIG. 8 is a schematic diagram of another embodiment of a network device in an embodiment of the present application.
  • the terminal device may be any terminal device including a mobile phone, a tablet computer, a PDA (Personal Digital Assistant), a POS (Point of Sales), an in-vehicle computer, and the terminal device is used as a mobile phone as an example:
  • FIG. 8 is a block diagram showing a partial structure of a mobile phone related to a terminal device provided by an embodiment of the present application.
  • the mobile phone includes: a radio frequency (RF) circuit 810, a memory 820, an input unit 830, a display unit 840, a sensor 850, an audio circuit 860, a wireless fidelity (WiFi) module 870, and a processor 880. And power supply 890 and other components.
  • RF radio frequency
  • the RF circuit 810 can be used for receiving and transmitting signals during the transmission or reception of information or during a call. Specifically, after receiving the downlink information of the base station, it is processed by the processor 880. In addition, the uplink data is designed to be sent to the base station. Generally, RF circuit 810 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a Low Noise Amplifier (LNA), a duplexer, and the like. In addition, RF circuitry 810 can also communicate with the network and other devices via wireless communication. The above wireless communication may use any communication standard or protocol, including but not limited to Global System of Mobile communication (GSM), General Packet Radio Service (GPRS), Code Division Multiple Access (Code Division). Multiple Access (CDMA), Wideband Code Division Multiple Access (WCDMA), Long Term Evolution (LTE), E-mail, Short Messaging Service (SMS), and the like.
  • GSM Global System of Mobile communication
  • GPRS General Packet Radio Service
  • the memory 820 can be used to store software programs and modules, and the processor 880 executes various functional applications and data processing of the mobile phone by running software programs and modules stored in the memory 820.
  • the memory 820 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application required for at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may be stored according to Data created by the use of the mobile phone (such as audio data, phone book, etc.).
  • memory 820 can include high speed random access memory, and can also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
  • the input unit 830 can be configured to receive input numeric or character information and to generate key signal inputs related to user settings and function controls of the handset.
  • the input unit 830 may include a touch panel 831 and other input devices 832.
  • the touch panel 831 also referred to as a touch screen, can collect touch operations on or near the user (such as the user using a finger, a stylus, or the like on the touch panel 831 or near the touch panel 831. Operation), and drive the corresponding connecting device according to a preset program.
  • the touch panel 831 can include two parts: a touch detection device and a touch controller.
  • the touch detection device detects the touch orientation of the user, and detects a signal brought by the touch operation, and transmits the signal to the touch controller; the touch controller receives the touch information from the touch detection device, converts the touch information into contact coordinates, and sends the touch information.
  • the processor 880 is provided and can receive commands from the processor 880 and execute them.
  • the touch panel 831 can be implemented in various types such as resistive, capacitive, infrared, and surface acoustic waves.
  • the input unit 830 may also include other input devices 832.
  • other input devices 832 may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control buttons, switch buttons, etc.), trackballs, mice, joysticks, and the like.
  • the display unit 840 can be used to display information input by the user or information provided to the user as well as various menus of the mobile phone.
  • the display unit 840 can include a display panel 841.
  • the display panel 841 can be configured in the form of a liquid crystal display (LCD), an organic light-emitting diode (OLED), or the like.
  • the touch panel 831 can cover the display panel 841. When the touch panel 831 detects a touch operation thereon or nearby, the touch panel 831 transmits to the processor 880 to determine the type of the touch event, and then the processor 880 according to the touch event. The type provides a corresponding visual output on display panel 841.
  • the touch panel 831 and the display panel 841 are two independent components to implement the input and input functions of the mobile phone, in some embodiments, the touch panel 831 can be integrated with the display panel 841. Realize the input and output functions of the phone.
  • the handset can also include at least one type of sensor 850, such as a light sensor, motion sensor, and other sensors.
  • the light sensor may include an ambient light sensor and a proximity sensor, wherein the ambient light sensor may adjust the brightness of the display panel 841 according to the brightness of the ambient light, and the proximity sensor may close the display panel 841 and/or when the mobile phone moves to the ear. Or backlight.
  • the accelerometer sensor can detect the magnitude of acceleration in all directions (usually three axes). When it is stationary, it can detect the magnitude and direction of gravity.
  • the mobile phone can be used to identify the gesture of the mobile phone (such as horizontal and vertical screen switching, related Game, magnetometer attitude calibration), vibration recognition related functions (such as pedometer, tapping), etc.; as for the mobile phone can also be configured with gyroscopes, barometers, hygrometers, thermometers, infrared sensors and other sensors, no longer Narration.
  • the gesture of the mobile phone such as horizontal and vertical screen switching, related Game, magnetometer attitude calibration
  • vibration recognition related functions such as pedometer, tapping
  • the mobile phone can also be configured with gyroscopes, barometers, hygrometers, thermometers, infrared sensors and other sensors, no longer Narration.
  • An audio circuit 860, a speaker 861, and a microphone 862 can provide an audio interface between the user and the handset.
  • the audio circuit 860 can transmit the converted electrical data of the received audio data to the speaker 861 for conversion to the sound signal output by the speaker 861; on the other hand, the microphone 862 converts the collected sound signal into an electrical signal by the audio circuit 860. After receiving, it is converted into audio data, and then processed by the audio data output processor 880, sent to the other mobile phone via the RF circuit 810, or outputted to the memory 820 for further processing.
  • WiFi is a short-range wireless transmission technology
  • the mobile phone can help users to send and receive emails, browse web pages, and access streaming media through the WiFi module 870, which provides users with wireless broadband Internet access.
  • FIG. 8 shows the WiFi module 870, it can be understood that it does not belong to the essential configuration of the mobile phone, and can be omitted as needed within the scope of not changing the essence of the invention.
  • the processor 880 is the control center of the handset, and connects various portions of the entire handset using various interfaces and lines, by executing or executing software programs and/or modules stored in the memory 820, and invoking data stored in the memory 820, executing The phone's various functions and processing data, so that the overall monitoring of the phone.
  • the processor 880 may include one or more processing units; preferably, the processor 880 may integrate an application processor and a modem processor, where the application processor mainly processes an operating system, a user interface, an application, and the like.
  • the modem processor primarily handles wireless communications. It will be appreciated that the above described modem processor may also not be integrated into the processor 880.
  • the handset also includes a power source 890 (such as a battery) that supplies power to the various components.
  • a power source 890 such as a battery
  • the power source can be logically coupled to the processor 880 through a power management system to manage functions such as charging, discharging, and power management through the power management system.
  • the mobile phone may further include a camera, a Bluetooth module, and the like, and details are not described herein again.
  • the steps performed by the terminal device in the foregoing method embodiments may be based on the terminal device structure shown in FIG. 8, and details are not described herein again.
  • the embodiment of the present application provides a wireless communication device.
  • the components of the communication device reference may be made to the network device shown in FIG. 7 .
  • the hardware structure of the communication device is required according to the embodiment of the present application, and may include:
  • At least one processor a memory, a transceiver circuit and a bus system, the processor, the memory, the transceiver circuit coupled by the bus system, the wireless communication device communicating with the terminal device through the transceiver circuit,
  • the memory is for storing program instructions
  • the at least one processor is configured to execute the program instructions stored in the memory, such that the wireless communication device performs the first network device (ie, wireless access) in the foregoing embodiments.
  • the wireless communication device may be either the wireless access network device or a system chip that performs corresponding functions in the wireless access network side device.
  • the embodiment of the present application further provides a wireless communication device, which may include:
  • At least one processor a memory, a transceiver circuit and a bus system, the processor, the memory, the transceiver circuit coupled by the bus system, the wireless communication device communicating with a network side device through the transceiver circuit,
  • the memory is for storing program instructions
  • the at least one processor is configured to execute the program instructions stored in the memory, such that the wireless communication device performs various feasible operations performed by the terminal device in the above embodiments ( For example, the operation performed by the terminal device shown in FIG. 3 or FIG. 4).
  • the wireless communication device can be either a terminal device or a system chip that applies a corresponding function in the terminal device.
  • the computer program product includes one or more computer instructions.
  • the computer can be a general purpose computer, a special purpose computer, a computer network, or other programmable device.
  • the computer instructions can be stored in a computer readable storage medium or transferred from one computer readable storage medium to another computer readable storage medium, for example, the computer instructions can be from a website site, computer, server or data center Transfer to another website site, computer, server, or data center by wire (eg, coaxial cable, fiber optic, digital subscriber line (DSL), or wireless (eg, infrared, wireless, microwave, etc.).
  • the computer readable storage medium can be any available media that can be accessed by a computer or a data storage device such as a server, data center, or the like that includes one or more available media.
  • the usable medium may be a magnetic medium (eg, a floppy disk, a hard disk, a magnetic tape), an optical medium (eg, a DVD), or a semiconductor medium (such as a solid state disk (SSD)).
  • the disclosed system, apparatus, and method may be implemented in other manners.
  • the device embodiments described above are merely illustrative.
  • the division of the unit is only a logical function division.
  • there may be another division manner for example, multiple units or components may be combined or Can be integrated into another system, or some features can be ignored or not executed.
  • the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, and may be in an electrical, mechanical or other form.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
  • each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
  • the above integrated unit can be implemented in the form of hardware or in the form of a software functional unit.
  • the integrated unit if implemented in the form of a software functional unit and sold or used as a standalone product, may be stored in a computer readable storage medium.
  • a computer readable storage medium A number of instructions are included to cause a computer device (which may be a personal computer, server, or network device, etc.) to perform all or part of the steps of the methods described in various embodiments of the present application.
  • the foregoing storage medium includes: a U disk, a mobile hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disk, and the like. .

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Un mode de réalisation de la présente invention concerne un procédé de contrôle d'accès, qui est utilisé pour réduire la complexité de contrôle d'accès à une tranche de réseau. Le procédé du mode de réalisation de la présente invention comprend les étapes suivantes consistant : à envoyer, par un premier dispositif de réseau, un premier message à un dispositif terminal, le premier message comprenant une première règle de mise en correspondance, et la première règle de mise en correspondance comprenant les informations d'au moins une tranche de réseau d'un réseau d'accès radio ; et à envoyer, par le premier dispositif de réseau, des informations de contrôle d'accès au dispositif terminal. Les modes de réalisation de la présente invention concernent également un dispositif de réseau et un dispositif terminal.
PCT/CN2018/091436 2017-06-16 2018-06-15 Procédé de contrôle d'accès, dispositif de réseau et dispositif terminal WO2018228517A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710459461.9A CN109151950B (zh) 2017-06-16 2017-06-16 一种接入控制的方法、网络设备以及终端设备
CN201710459461.9 2017-06-16

Publications (1)

Publication Number Publication Date
WO2018228517A1 true WO2018228517A1 (fr) 2018-12-20

Family

ID=64659678

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/091436 WO2018228517A1 (fr) 2017-06-16 2018-06-15 Procédé de contrôle d'accès, dispositif de réseau et dispositif terminal

Country Status (2)

Country Link
CN (1) CN109151950B (fr)
WO (1) WO2018228517A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020221351A1 (fr) * 2019-05-02 2020-11-05 Mediatek Inc. Amélioration pour groupes d'accès fermés

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113228743B (zh) * 2019-04-01 2023-04-11 Oppo广东移动通信有限公司 用户设备及其通过接入分类的接入控制的方法
CN111866989A (zh) * 2019-04-28 2020-10-30 华为技术有限公司 通信方法、装置及系统
CN112351470B (zh) * 2019-08-07 2022-04-05 华为技术有限公司 一种接入限制检测方法和装置
CN113596948B (zh) * 2020-04-30 2024-01-16 维沃移动通信有限公司 信息上报方法、发送方法、选择方法和相关设备
CN114039738B (zh) * 2020-07-21 2023-02-03 华为技术有限公司 一种防火墙规则配置方法及其系统、介质和电子设备
CN114760663A (zh) * 2020-12-28 2022-07-15 中国移动通信有限公司研究院 信息传输方法、装置、相关设备及存储介质

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106412905A (zh) * 2016-12-12 2017-02-15 中国联合网络通信集团有限公司 网络切片选择方法、ue、mme和系统
WO2017059829A2 (fr) * 2016-11-04 2017-04-13 Telefonaktiebolaget Lm Ericsson (Publ) Procédés, station de base et équipement utilisateur
CN106851589A (zh) * 2016-12-30 2017-06-13 北京小米移动软件有限公司 无线网络接入方法、装置及系统

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112996087B (zh) * 2016-09-28 2023-03-10 华为技术有限公司 一种网络切片选择方法、终端设备及网络设备

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017059829A2 (fr) * 2016-11-04 2017-04-13 Telefonaktiebolaget Lm Ericsson (Publ) Procédés, station de base et équipement utilisateur
CN106412905A (zh) * 2016-12-12 2017-02-15 中国联合网络通信集团有限公司 网络切片选择方法、ue、mme和系统
CN106851589A (zh) * 2016-12-30 2017-06-13 北京小米移动软件有限公司 无线网络接入方法、装置及系统

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
ZTE ET AL.: "Consideration on the Impact of NW Slicing on RAN", 3GPP TSG-RAN WG2 MEETING #95BIS, R2-166344, 14 October 2016 (2016-10-14) *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020221351A1 (fr) * 2019-05-02 2020-11-05 Mediatek Inc. Amélioration pour groupes d'accès fermés
CN112243594A (zh) * 2019-05-02 2021-01-19 联发科技股份有限公司 封闭存取群的增强机制
US11206602B2 (en) 2019-05-02 2021-12-21 Mediatek Inc. Enhancement for closed access groups
CN112243594B (zh) * 2019-05-02 2022-10-28 联发科技股份有限公司 封闭存取群的处理方法及其装置

Also Published As

Publication number Publication date
CN109151950B (zh) 2021-09-07
CN109151950A (zh) 2019-01-04

Similar Documents

Publication Publication Date Title
US11606834B2 (en) Network slice selection in a mobile communication network
WO2018228517A1 (fr) Procédé de contrôle d'accès, dispositif de réseau et dispositif terminal
US10979887B2 (en) Access method, network device, terminal device, and AMF device
US11627486B2 (en) Data sending method and apparatus, and device
US11258708B2 (en) Communication method and communications apparatus
WO2018201938A1 (fr) Procédé de mappage de ressources, dispositif réseau et dispositif terminal
WO2020025015A1 (fr) Procédé d'indication de capacité, et terminal et élément de réseau côté réseau
EP3852405A1 (fr) Procédé et dispositif de communication
US20210289434A1 (en) Method for controlling network access and communications device
CN110679194A (zh) 数据调度方法及相关设备
CN111800794A (zh) 解调参考信号位置的确定方法及设备
TWI678903B (zh) 一種上行資料傳輸方法及終端
WO2023221831A1 (fr) Procédé de traitement, dispositif de communication, et support de stockage
WO2023051288A1 (fr) Procédé, dispositif et système de gestion de tunnel
WO2022067544A1 (fr) Procédé de communication sans fil, dispositif de terminal et dispositif de réseau
WO2021109141A1 (fr) Procédé et appareil de configuration de connexion de communication, et dispositif de communication et support de stockage
WO2022141426A1 (fr) Procédé d'indication d'informations de découpage, dispositif terminal et dispositif de réseau
WO2022205254A1 (fr) Procédé et dispositif de détermination d'un serveur de configuration de bordure
WO2024109221A1 (fr) Procédé et appareil de mise en correspondance de tranches de réseau
CN114946215A (zh) 一种业务流的处理方法及设备

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18817325

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18817325

Country of ref document: EP

Kind code of ref document: A1