WO2019024747A1 - 通信方法、设备及系统 - Google Patents
通信方法、设备及系统 Download PDFInfo
- Publication number
- WO2019024747A1 WO2019024747A1 PCT/CN2018/097138 CN2018097138W WO2019024747A1 WO 2019024747 A1 WO2019024747 A1 WO 2019024747A1 CN 2018097138 W CN2018097138 W CN 2018097138W WO 2019024747 A1 WO2019024747 A1 WO 2019024747A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- terminal
- mobility management
- management entity
- entity
- group
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/02—Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]; Transfer of mobility data, e.g. between HLR, VLR or external networks
- H04W8/08—Mobility data transfer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W24/00—Supervisory, monitoring or testing arrangements
- H04W24/04—Arrangements for maintaining operational condition
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W36/00—Hand-off or reselection arrangements
- H04W36/0005—Control or signalling for completing the hand-off
- H04W36/0011—Control or signalling for completing the hand-off for data sessions of end-to-end connection
- H04W36/0033—Control or signalling for completing the hand-off for data sessions of end-to-end connection with transfer of context information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W36/00—Hand-off or reselection arrangements
- H04W36/12—Reselecting a serving backbone network switching or routing node
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W60/00—Affiliation to network, e.g. registration; Terminating affiliation with the network, e.g. de-registration
- H04W60/04—Affiliation to network, e.g. registration; Terminating affiliation with the network, e.g. de-registration using triggered events
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
- H04W76/19—Connection re-establishment
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/02—Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]; Transfer of mobility data, e.g. between HLR, VLR or external networks
- H04W8/06—Registration at serving network Location Register, VLR or user mobility server
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/18—Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
- H04W8/186—Processing of subscriber group data
Definitions
- the present application relates to the field of communications technologies, and in particular, to a communication method, device, and system.
- an access and mobility management function (AMF) entity determines that the terminal is no longer served, the AMF entity provides a radio access network (RAN) device and other core networks.
- a network functional entity such as a session management function (SMF) entity, sends an "unavailable" indication that the AMF entity is marked as invalid by the RAN device and other core network functional entities.
- SMF session management function
- the AMF entity is no longer considered when subsequently selecting an AMF entity.
- the AMF fails and the context of the terminal being served by the failed AMF entity is not backed up, the network connection of these terminals will be lost, and the subsequent re-registration process needs to be initiated.
- one method is to back up the context of the terminal to an unstructured data storage function (UDSF) entity, so that when the AMF entity fails, the RAN device or other core network function entity reselects one.
- the non-failed target AMF entity continues to serve the terminal, and the target AMF entity reads the context of the terminal from the UDSF entity so that the terminal can continue to be served without requiring the terminal to initiate a re-registration procedure.
- UDSF unstructured data storage function
- the above solution relies on the UDSF entity, thus restricting a group of AMF entities that are mutually backup relationships from the same vendor.
- the AMF entities that are in the backup relationship are from different vendors, the data format between the AMF entity and the UDSF entity of different vendors is not standardized, which may result in the loss of the context of the terminal being served by the failed AMF entity, thereby triggering the re-registration of the terminal. Process.
- the embodiment of the present application provides a communication method, device, and system, which can prevent a re-registration process of a terminal from being triggered due to a context loss of a terminal being served when the mobility management entity fails.
- the embodiment of the present application provides the following technical solutions:
- the first aspect provides a communication method, where the method includes: acquiring, by the communication device, a first group identifier of a terminal group where the first terminal of the first mobility management entity service is located; and if the first mobility management entity is abnormal, The communication device sends the first terminal related message to the second mobility management entity according to the first group identity, where the second mobility management entity is a mobility management entity that has the context of the first terminal. Based on the solution, the first mobility management entity may synchronize the context of the first terminal of the service to the second mobility management entity, and in the case that the first mobility management entity is abnormal, may be based on the first group of the terminal group where the first terminal is located.
- the group identifier sends a message related to the first terminal to the second mobility management entity, so that if the first mobility management entity is abnormal, the process of re-registering the terminal may be avoided due to the context loss of the terminal being served.
- the current process of maintaining the terminal being served is not interrupted.
- the first group identifier is a primary group identifier configured in the first mobility management entity, and a backup group identifier configured in the second mobility management entity.
- the primary group identifier in the embodiment of the present application is used to indicate that, in the case that the mobility management entity that configures the primary group identifier is not abnormal, the group identifier of the terminal group where the terminal is located is the primary group identifier.
- the identified mobility management entity provides the service; the backup group identifier in the embodiment of the present application is used to indicate that the group identity of the terminal group where the terminal is located is the abnormality when the mobility management entity configured with the backup group identifier is configured as the primary group identifier
- the terminal identified by the backup group is served by the mobility management entity that configures the backup group identifier as the backup group identifier.
- the method further includes: the communication device receiving the first indication message, where the first indication message is used to indicate that the terminal in the terminal group corresponding to the first group identifier is served by the second mobility management entity .
- the receiving, by the communications device, the first indication message includes: the communications device receiving the first indication message from the second mobility management entity, wherein the first indication message is determined by the second mobility management entity A transmission management entity sends an exception to the communication device. That is to say, the second mobility management entity notifies the communication device that the terminal in the terminal group corresponding to the first group identifier is served by the second mobility management entity, if the first mobility management entity determines that the first mobility management entity is abnormal. In this way, the communications device can send the first terminal related message to the second mobility management entity according to the first indication message and the first group identifier.
- the method further includes: the communication device receiving the first indication message, where the first indication message is used to indicate that the first group of identifiers corresponds to the first mobility management entity The terminal in the terminal group is served by the second mobility management entity.
- the receiving, by the communications device, the first indication message includes: before the first mobility management entity generates an abnormality, the communications device receives the first indication message; if an abnormality occurs in the first mobility management entity, Sending, by the communication device, the message related to the first terminal to the second mobility management entity, according to the first group identifier, the communication device determining that the first mobility management entity is abnormal; the communication device according to the first group identifier
- the second mobility management entity sends the message related to the first terminal. That is, before the first mobility management entity is abnormal, the communication device may know in advance that the terminal in the terminal group corresponding to the first group identifier is managed by the second mobility in the case that the first mobility management entity is abnormal. The entity provides the service. In this way, in the case that the first mobility management entity is abnormal, the communication device may send the first terminal related message to the second mobility management entity according to the first indication message and the first group identifier.
- the first indication message may be notified by the second mobility management entity to the communication device, or may be notified by the first mobility management entity or the network management to the communication device, and the embodiment of the present application does not specifically limited.
- the communication device acquires the first group identifier of the terminal group where the first terminal of the first mobility management entity service is located, where the communication device receives the message related to the first terminal, where the first terminal is related to the message.
- the first group of identifiers of the terminal group in which the first terminal is located is carried; or the communication device determines, from the context of the first terminal, the first group of identifiers of the terminal group in which the first terminal is located.
- the communication device can obtain the group identifier of the terminal group where the first terminal of the first mobility management entity service is located.
- the method further includes: acquiring, by the communications device, a second group identifier of the terminal group where the second terminal of the first mobility management entity service is located; if the first mobility management entity is abnormal, the communication device is configured according to the The second group of identifiers sends a message related to the second terminal to the third mobility management entity, where the third mobility management entity is a mobility management entity that has a context of the second terminal.
- the first mobility management entity may also synchronize the context of the second terminal of the service to the third mobility management entity, and in the case that the first mobility management entity is abnormal, may be based on the terminal where the second terminal is located.
- the second group of identifiers of the group sends the second terminal related message to the third mobility management entity, so that if the first mobility management entity is abnormal, the terminal may be prevented from re-registering due to the context loss of the terminal being served.
- the process that is, the current process of the terminal being served can be kept uninterrupted; on the other hand, since the first mobility management entity can group the terminals, the contexts of the terminals in different terminal groups can be separately backed up to multiple different mobility management entities. That is to say, one-to-many backup can be achieved.
- the first mobility management entity is abnormal
- one or more terminal groups of the first mobility management entity are respectively taken over by a plurality of different mobility management entities, thereby reducing the single node due to the abnormality of the first mobility management entity.
- the impact of the mobile management entity saves resources compared to the traditional 1+1 backup, and at the same time compensates for the context loss problem in the traditional mobility management entity MME pool.
- the communication device comprises an access device or a session management entity.
- a communication method comprising: a second mobility management entity receiving a context of a first terminal of the first mobility management entity service from a first mobility management entity; the second mobility management entity determining the An abnormality occurs in a mobility management entity; the second mobility management entity sends a first indication message to the communication device, where the first indication message is used to indicate that the terminal in the terminal group corresponding to the first group identifier is served by the second mobility management entity
- the first group identifier is a group identifier of the terminal group where the first terminal is located.
- the terminal in the terminal group corresponding to the group identifier is served by the second mobility management entity, where the first group identifier is a group identifier of the terminal group where the first terminal is located. Therefore, the communication device may send, according to the first indication message and the first group identifier, a message related to the first terminal to the second mobility management entity, so that, in case the abnormality occurs in the first mobility management entity, the communication device may be avoided.
- the context of the terminal is lost and the re-registration process of the terminal is triggered, that is, the current process of the terminal being served can be kept uninterrupted.
- the method further includes: the second mobility management entity receiving the message related to the first terminal from the communications device. Based on the solution, the second mobility management entity may obtain the message related to the first terminal.
- the method includes: the second mobility management entity receives a context of a second terminal served by the third mobility management entity of the third mobility management entity; the second mobility management entity determines that the third mobility management entity occurs The second mobility management entity sends a second indication message to the communication device, where the second indication message is used to indicate that the terminal in the terminal group corresponding to the second group identifier is served by the second mobility management entity, where The second group identifier is a group identifier of the terminal group where the second terminal is located.
- the second mobility management entity can notify the communication if the third mobility management entity is abnormal.
- the terminal in the terminal group corresponding to the second group identifier of the device is served by the second mobility management entity, where the second group identifier is the group identifier of the terminal group where the second terminal is located. Therefore, the communication device may send the second terminal related message to the second mobility management entity according to the second indication message and the second group identifier, so that, in case the abnormality occurs in the third mobility management entity, the The context of the terminal is lost and the re-registration process of the terminal is triggered, that is, the current process of the terminal being served can be kept uninterrupted.
- the second mobility management entity can back up the first mobility management entity and the third mobility management entity respectively, one-to-many backup can be implemented, thereby saving resources compared to the conventional 1+1 backup.
- a communication device having the functionality to implement the method of the first aspect described above.
- This function can be implemented in hardware or in hardware by executing the corresponding software.
- the hardware or software includes one or more modules corresponding to the functions described above.
- a fourth aspect provides a communication device, including: a processor, a memory, a bus, and a communication interface; the memory is configured to store a computer to execute an instruction, and the processor is connected to the memory through the bus, when the communication device is running, The processor executes the computer-executable instructions stored by the memory to cause the communication device to perform the communication method of any of the first aspects above.
- a fifth aspect a computer readable storage medium having stored therein instructions that, when run on a computer, cause the computer to perform the communication method of any of the above first aspects .
- a computer program product comprising instructions which, when run on a computer, cause the computer to perform the communication method of any of the above first aspects.
- a chip system comprising a processor for supporting a communication device to implement the functions involved in the foregoing aspects, for example, in case the abnormality occurs in the first mobility management entity, according to the first mobility management
- the chip system further includes a memory for holding program instructions and data necessary for the communication device.
- the chip system can be composed of chips, and can also include chips and other discrete devices.
- a second mobility management entity having the functionality to implement the method of the second aspect described above.
- This function can be implemented in hardware or in hardware by executing the corresponding software.
- the hardware or software includes one or more modules corresponding to the functions described above.
- a ninth aspect provides a second mobility management entity, including: a processor, a memory, a bus, and a communication interface; the memory is configured to store a computer execution instruction, and the processor is connected to the memory through the bus, and the second When the mobility management entity is running, the processor executes the computer execution instructions stored by the memory to cause the second mobility management entity to perform the communication method as described in any of the above second aspects.
- a computer readable storage medium having stored therein instructions that, when run on a computer, cause the computer to perform the business session establishing method of any of the above second aspects .
- a computer program product comprising instructions which, when run on a computer, cause the computer to perform the communication method of any of the above second aspects.
- a chip system comprising a processor for supporting a second mobility management entity to implement the functions involved in the above aspects, such as receiving a first mobility management entity from a first mobility management entity The context of the first terminal of the service.
- the chip system further includes a memory for storing necessary program instructions and data of the second mobility management entity.
- the chip system can be composed of chips, and can also include chips and other discrete devices.
- a communications system comprising a first mobility management entity, a second mobility management entity, and a communication device; wherein the first mobility management entity is configured to send to the second mobility management entity a context of the first terminal served by the first mobility management entity; the second mobility management entity is configured to receive a context of the first terminal from the first mobility management entity; the communication device is configured to acquire the first terminal a first group identifier of the terminal group, and in the case that the first mobility management entity is abnormal, sending, according to the first group identifier, the first terminal related message to the second mobility management entity; the second mobile The management entity is further configured to receive a message related to the first terminal from the communication device.
- the second mobility management entity is further configured to determine that the first mobility management entity is abnormal; the second mobility management entity is further configured to send a first indication message to the communications device, where the An indication message is used to indicate that the terminal in the terminal group corresponding to the first group identifier is served by the second mobility management entity; the communication device is further configured to receive the first indication message.
- the communication device is further configured to: before the first mobility management entity generates an abnormality, receive a first indication message, where the first indication message is used to indicate that an abnormality occurs in the first mobility management entity.
- the communication device is further configured to determine that the first mobility management entity is abnormal.
- FIG. 1 is a schematic structural diagram of a communication system according to an embodiment of the present application.
- FIG. 2 is a schematic structural diagram of a 5G network according to an embodiment of the present application.
- FIG. 3 is a schematic structural diagram of hardware of a network device according to an embodiment of the present disclosure.
- FIG. 4 is a schematic flowchart 1 of a communication method according to an embodiment of the present application.
- FIG. 5 is a second schematic flowchart of a communication method according to an embodiment of the present disclosure.
- FIG. 6 is a second schematic flowchart of a communication method according to an embodiment of the present disclosure.
- FIG. 7 is a schematic structural diagram 1 of a communication device according to an embodiment of the present disclosure.
- FIG. 8 is a schematic structural diagram 2 of a communication device according to an embodiment of the present disclosure.
- FIG. 9 is a schematic structural diagram 1 of a second mobility management entity according to an embodiment of the present application.
- FIG. 10 is a schematic structural diagram 2 of a second mobility management entity according to an embodiment of the present application.
- the words “first”, “second”, and the like are used to distinguish the same items or similar items whose functions and functions are substantially the same.
- the words “first”, “second” and the like do not limit the number and execution order, and the words “first”, “second” and the like are not necessarily limited.
- the second mobility management entity and the third mobility management entity in the embodiment of the present application may be the same mobility management entity, or may be different mobility management entities, which is not specifically limited in this embodiment of the present application.
- the network architecture and the service scenario described in the embodiments of the present application are for the purpose of more clearly illustrating the technical solutions of the embodiments of the present application, and do not constitute a limitation of the technical solutions provided by the embodiments of the present application.
- the technical solutions provided by the embodiments of the present application are equally applicable to similar technical problems.
- FIG. 1 is a schematic structural diagram of a communication system 10 according to an embodiment of the present application.
- the communication system 10 includes a communication device 101 and a mobility management entity group 102.
- the mobility management entity group 102 includes at least two mobility management entities that are mutually backup relationships, such as the first mobility management entity 102a and the second mobility management entity 102b in FIG.
- the mobility management entity group 102 in FIG. 1 may further include other mobility management entities, such as a third mobility management entity, which is not specifically limited in this embodiment of the present application.
- the first mobility management entity 102a is configured to send the context of the first terminal served by the first mobility management entity 102a to the second mobility management entity 102b.
- the communication device 101 is configured to acquire a first group identifier of the terminal group where the first terminal is located, and send an error to the second mobility management entity 102b according to the first group identity.
- the first terminal related message is configured to acquire a first group identifier of the terminal group where the first terminal is located, and send an error to the second mobility management entity 102b according to the first group identity. The first terminal related message.
- the second mobility management entity 102b is configured to receive a message related to the first terminal from the communication device 101.
- the first mobility management entity 102a, the second mobility management entity 102b, and the communication device 101 in FIG. 1 may directly communicate with each other, and may also perform communication through forwarding of other devices, which is not specifically limited in this embodiment of the present application. .
- the communication device 102 in FIG. 1 may include an access device or a session management function entity, etc., which is not specifically limited in this embodiment of the present application.
- the message related to the first terminal is an uplink message related to the first terminal; if the communication device 102 is a session management function entity, the message related to the first terminal is related to the first terminal.
- the downlink message is uniformly explained here, and will not be described below.
- the abnormality of the mobility management entity in the embodiment of the present application includes a fault or an overload of the mobility management entity, and is uniformly described herein, and details are not described herein.
- the first mobility management entity may synchronize the context of the first terminal of the service to the second mobility management entity, and may be based on the first terminal if the first mobility management entity is abnormal.
- the first group identifier of the terminal group is sent to the second mobility management entity to send a message related to the first terminal, so that if the first mobility management entity is abnormal, the terminal may be prevented from being triggered due to the context loss of the terminal being served.
- the current process of the terminal being served can be kept uninterrupted.
- the synchronization of the context may be the synchronization of the context triggering context, or a timer may be set, and the synchronization of the context is triggered after the timer expires. Specifically limited.
- the foregoing communication system 10 can be applied to a 5th generation (5th generation, 5G) network, and other networks in the future, which are not specifically limited in this embodiment of the present application.
- 5G 5th generation
- the network element or entity corresponding to the communication device may be an access device or an SMF entity; the network element or entity corresponding to the mobility management entity may be connected.
- Access and Mobility Management Function (AMF) entities For example, the network element or entity corresponding to the first mobility management entity 102a may be the first AMF entity; the network element or entity corresponding to the second mobility management entity 102b may be the second AMF entity.
- AMF Access and Mobility Management Function
- the 5G network may further include a user plane function (UPF) entity, a unified data management (UDM) entity, and an authentication server function (AUSF) entity. , policy control function (PCF) entity, etc.
- the 5G network may further include a UDSF entity.
- the terminal accesses the network through the access device, and communicates with the first AMF entity and the second AMF entity through a next generation (N)1 interface (N1); the first AMF entity Communicating with the second AMF entity through the N14 interface (N14 for short); the first AMF entity and the second AMF entity both communicate with the access device through the N2 interface (N2 for short); the first AMF entity and the second AMF entity both pass the N18 interface.
- N next generation
- N18 for short communicating with the UDSF entity; the first AMF entity and the second AMF entity both communicate with the AUSF entity through the N12 interface (N12 for short); the first AMF entity and the second AMF entity both pass the N8 interface (referred to as N8) and the UDM
- the first AMF entity and the second AMF entity communicate with the SMF entity through the N11 interface (N11 for short); the first AMF entity and the second AMF entity communicate with the PCF entity through the N15 interface (N15 for short); the AUSF entity passes
- the N13 interface (N13 for short) communicates with the UDM entity; the SMF entity communicates with the UPF entity through the N4 interface (N4 for short); the UPF entity communicates through the N6 interface (N6) data network (DN).
- the name of the interface between the network elements in FIG. 2 is only an example. In the specific implementation, the interface name may be another name, which is not specifically limited in this embodiment of the present application.
- the access device, the first AMF entity, the second AMF entity, the SMF entity, the UDSF entity, the AUSF entity, the UDM entity, the UPF entity, and the PCF entity of FIG. 2 are only one name, and the name is not for the device itself.
- the composition is limited.
- the network element or entity corresponding to the access device, the first AMF entity, the second AMF entity, the SMF entity, the UDSF entity, the AUSF entity, the UDM entity, the UPF entity, and the PCF entity may also be used in the 5G network and other networks in the future.
- Other names are not specifically limited in the embodiment of the present application.
- the UDM entity may be replaced by a home subscriber server (HSS) or a user subscription database (USD) or a database entity, etc., and is hereby described in a unified manner, and details are not described herein.
- the terminal involved in the embodiment of the present application may include various handheld devices having wireless communication functions, in-vehicle devices, wearable devices, computing devices, or other processing devices connected to the wireless modem; Including user unit (subscriber unit), cellular phone, smart phone, wireless data card, personal digital assistant (PDA) computer, tablet computer, wireless modem (modem), handheld device Handheld, laptop computer, cordless phone or wireless local loop (WLL) station, machine type communication (MTC) terminal, user equipment (user equipment) , UE), mobile station (MS), terminal device, etc.
- PDA personal digital assistant
- WLL wireless local loop
- MTC machine type communication
- user equipment user equipment
- UE user equipment
- MS mobile station
- the access device involved in the embodiment of the present application refers to a device that accesses the core network, and may be, for example, a base station, a broadband network gateway (BNG), an aggregation switch, and a non-third generation. 3rd generation partnership project (3GPP) access equipment, etc.
- the base station may include various forms of base stations, such as macro base stations, micro base stations (also referred to as small stations), relay stations, access points, and the like.
- the function of the first AMF entity involved in the embodiment of the present application may be referred to the function of the first mobility management entity in FIG. 1 .
- the function of the second AMF entity involved in the embodiment of the present application may be referred to.
- the functions of the second mobility management entity in FIG. 1 are not described herein again.
- the first AMF entity and the second AMF entity may also be responsible for the functions of registration management, mobility management, and lawful interception, which are not specifically limited in this embodiment of the present application.
- the SMF entity involved in the embodiment of the present application is used for session management, including: session establishment, session modification, session release, and internet protocol (IP) address allocation between the terminals of the network.
- IP internet protocol
- the UPF entity involved in the embodiment of the present application may be responsible for processing, such as forwarding, statistics, and the like of the terminal.
- the UPF entity may implement a user plane function of a serving gateway (SGW) and a packet data network gateway (PGW).
- SGW serving gateway
- PGW packet data network gateway
- the UPF entity may also be a software-defined network (SDN) switch (Switch), which is not specifically limited in this embodiment.
- SDN software-defined network
- the AUSF entity involved in the embodiment of the present application is used to authenticate the terminal based on the subscription data of the terminal.
- the UDM entity involved in the embodiment of the present application is used to store data for subscription.
- the UDM entity further includes the functions of the authentication, the processing of the user identifier, the contract management, and the like, which are not specifically limited in this embodiment of the present application.
- the PCF entity involved in the embodiment of the present application provides a policy rule, and supports a policy-related function such as a unified policy architecture management network behavior.
- the UDSF entity provided in this embodiment is used to save unstructured data of the network entity.
- the first mobility management entity or the communication device in FIG. 1 may be implemented by one physical device, or may be implemented by multiple physical devices, or may be a logical function module in a physical device. This is not specifically limited.
- FIG. 3 is a schematic diagram showing the hardware structure of a network device according to an embodiment of the present application.
- Network device 300 includes at least one processor 301, communication bus 302, memory 303, and at least one communication interface 304.
- the processor 301 can be a general central processing unit (CPU), a microprocessor, an application-specific integrated circuit (ASIC), or one or more for controlling the execution of the program of the present application. integrated circuit.
- CPU central processing unit
- ASIC application-specific integrated circuit
- Communication bus 302 can include a path for communicating information between the components described above.
- the communication interface 304 uses a device such as any transceiver for communicating with other devices or communication networks, such as Ethernet, radio access network (RAN), wireless local area networks (WLAN), etc. .
- a device such as any transceiver for communicating with other devices or communication networks, such as Ethernet, radio access network (RAN), wireless local area networks (WLAN), etc. .
- RAN radio access network
- WLAN wireless local area networks
- the memory 303 can be a read-only memory (ROM) or other type of static storage device that can store static information and instructions, a random access memory (RAM) or other type that can store information and instructions.
- the dynamic storage device can also be an electrically erasable programmable read-only memory (EEPROM), a compact disc read-only memory (CD-ROM) or other optical disc storage, and a disc storage device. (including compact discs, laser discs, optical discs, digital versatile discs, Blu-ray discs, etc.), magnetic disk storage media or other magnetic storage devices, or can be used to carry or store desired program code in the form of instructions or data structures and can be Any other media accessed, but not limited to this.
- the memory can exist independently and be connected to the processor via a bus.
- the memory can also be integrated with the processor.
- the memory 303 is used to store application code for executing the solution of the present application, and is controlled by the processor 301 for execution.
- the processor 301 is configured to execute the application code stored in the memory 303, thereby implementing the communication method provided by the following embodiments of the present application.
- processor 301 may include one or more CPUs, such as CPU0 and CPU1 in FIG.
- network device 300 can include multiple processors, such as processor 301 and processor 308 in FIG. Each of these processors can be a single-CPU processor or a multi-core processor.
- a processor herein may refer to one or more devices, circuits, and/or processing cores for processing data, such as computer program instructions.
- the network device 300 may further include an output device 305 and an input device 306.
- Output device 305 is in communication with processor 301 and can display information in a variety of ways.
- the output device 305 can be a liquid crystal display (LCD), a light emitting diode (LED) display device, a cathode ray tube (CRT) display device, or a projector. Wait.
- Input device 306 is in communication with processor 301 and can accept user input in a variety of ways.
- input device 306 can be a mouse, keyboard, touch screen device, or sensing device, and the like.
- the network device 300 described above may be a general purpose device or a dedicated device.
- the network device 300 can be a desktop computer, a portable computer, a network server, a personal digital assistant (PDA), a mobile phone, a tablet computer, a wireless terminal device, an embedded device, or the like in FIG. device.
- PDA personal digital assistant
- the embodiment of the present application does not limit the type of the network device 300.
- the communication system shown in FIG. 1 is applied to the 5G network shown in FIG. 2 as an example.
- a group identity of the terminal group and an AMF entity group are first introduced as follows.
- the AMF entity may group all the terminals served by the AMF entity according to a local policy or other factors, and configure corresponding group identifiers for each group of terminals to facilitate management.
- an AMF entity may correspond to one or more globally unique AMF identifiers (GUAMIs), which are identified by a public land mobile network (PLMN) identifier (ID) and an AMF entity.
- GUIs globally unique AMF identifiers
- PLMN public land mobile network
- ID an AMF entity.
- AMF pointer multiple GUAMIs of one AMF entity can be distinguished by AMF pointer, that is, AMF pointers in different GUAMIs are different.
- the group identifier of the terminal group in the embodiment of the present application may be an AMF pointer in GUAMI or GUAMI; when an AMF entity corresponds to a GUAMI, the terminal group in the embodiment of the present application
- the group identifier may be the high N bit of the AMF pointer+ terminal temporary identifier, that is, the high N bits of the terminal temporary identifier may be used to identify different terminal groups. For example, taking the highest 2 bits for identifying the terminal group as an example, all terminals that provide services by one AMF entity can be divided into four groups, and the terminal temporary identifiers of the four groups of terminals start with 00, 01, 10, and 11, respectively.
- the AMF entity needs to notify the access device and the core network device how to intercept the group identifier from the identifier of the terminal. For example, the AMF entity notifies the access device and the core network device of the length of the group identifier of the terminal group. Unified instructions, the details are not described below.
- the following embodiment of the present application replaces the group identifier of the terminal group in which the terminal is located with the group identifier of the terminal, and is uniformly described herein, and details are not described herein again.
- the AMF entity group includes multiple AMF entities that are mutually backup relationships. Each AMF entity can be configured with m primary group identifiers and n backup group identifiers.
- the AMF entity provides a service for the terminal whose identity is the primary group identifier corresponding to the AMF entity, and the AMF entity saves the context of the terminal whose identity is the backup group identifier corresponding to the AMF entity.
- the AMF entity takes over the terminals and provides services for the terminals.
- the AMF entity is a 1+1 backup, that is, it is assumed that the AMF entity group includes two AMF entities, such as AMF entity 1 and AMF entity 2, respectively, and the two AMF entities are backup relationships with each other, and each AMF entity Configure three primary group IDs and three backup group IDs, as shown in Table 1:
- AMF entity Primary group identification Backup group ID AMF entity 1 Logo 1, logo 2, logo 3 Mark 4, logo 5, logo 6 AMF entity 2 Mark 4, logo 5, logo 6 Logo 1, logo 2, logo 3
- the AMF entity 1 when the AMF entity 1 does not have an abnormality, the AMF entity 1 provides services for the terminals whose group identifiers are the identifier 1, the identifier 2, and the identifier 3. At the same time, the AMF entity 1 stores the terminal whose group identifier is the identifier 4, the identifier 5, and the identifier 6. Context.
- the AMF entity 1 takes over the terminal identified as the identifier 4, the identifier 5, and the identifier 6, and provides services for the terminals. .
- the AMF entity 2 When the AMF entity 2 does not have an abnormality, the AMF entity 2 provides services for the terminals whose group identification is the identifier 4, the identifier 5, and the identifier 6; meanwhile, the AMF entity 2 stores the context of the terminal whose group identifier is the identifier 1, the identifier 2, and the identifier 3. .
- the AMF entity 2 takes over the terminal whose identity is identified as the identifier 1, the identifier 2, and the identifier 3, and provides services for the terminals. .
- the AMF entity is a 1+N backup, and N is an integer greater than 1, that is, it is assumed that the AMF entity group includes more than two AMF entities, including, for example, AMF entity 1, AMF entity 2, AMF entity 3, and AMF.
- the entity 4 has a total of four AMF entities.
- the four AMF entities are in a backup relationship.
- Each AMF entity is configured with three primary group identifiers and three backup group identifiers, as shown in Table 2:
- AMF entity Primary group identification Backup group ID AMF entity 1 Logo 1, logo 2, logo 3 Mark 4, logo 7, logo 10 AMF entity 2 Mark 4, logo 5, logo 6 Logo 1, logo 8, logo 11 AMF entity 3 Logo 7, logo 8, logo 9 Logo 2, logo 5, logo 12 AMF entity 4 Logo 10, logo 11, logo 12 Logo 3, logo 6, logo 9
- the AMF entity 1 when the AMF entity 1 does not have an abnormality, the AMF entity 1 provides services for the terminals whose group identifiers are the identifier 1, the identifier 2, and the identifier 3; meanwhile, the AMF entity 1 stores the group identifiers as the identifiers of the identifier 4, the identifier 7, and the identifier 10. Context.
- the AMF entity 1 takes over the terminal identified as the identifier 4 to provide services for the terminals; and provides services for the terminal whose group identifier is the identifier 7.
- the AMF entity 1 takes over the terminal identified by the group as the identifier 7 to provide services for the terminals; and when the AMF entity 4 serving the terminal whose group identifier is the identifier 10 is abnormal, the AMF entity 1 Take over the group of terminals identified as ID 10 to provide services for these terminals.
- the AMF entity 2 When the AMF entity 2 does not have an abnormality, the AMF entity 2 provides services for the terminals whose group identification is the identifier 4, the identifier 5, and the identifier 6; meanwhile, the AMF entity 2 stores the context of the terminal whose group identifier is the identifier 1, the identifier 8, and the identifier 11. .
- the AMF entity 2 When an abnormality occurs in the AMF entity 1 that serves the terminal whose group ID is the identifier 1, the AMF entity 2 takes over the terminal whose identity is identified as the identifier 1, and provides services for the terminals; when the terminal is identified as the identifier of the group 8 When an abnormality occurs in the AMF entity 3, the AMF entity 2 takes over the terminal identified as the identifier 8 to provide services for the terminals; and when the AMF entity 4 serving the terminal whose group identifier is the identifier 11 is abnormal, the AMF entity 2 Take over the group of terminals identified as identifiers 11 to provide services for these terminals.
- the AMF entity 3 When the AMF entity 3 does not have an abnormality, the AMF entity 3 provides services for the terminals whose group identification is the identifier 7, the identifier 8 and the identifier 9; meanwhile, the AMF entity 3 stores the context of the terminal whose group identifier is the identifier 2, the identifier 5, and the identifier 12. .
- the AMF entity 3 takes over the terminal identified as the identifier 2 to provide services for the terminals; and provides services for the terminal whose group identifier is the identifier 5.
- the AMF entity 3 takes over the terminal identified by the group as the identifier 5 to provide services for the terminals; and when the AMF entity 4 serving the terminal whose group identifier is the identifier 12 is abnormal, the AMF entity 3 Take over the group of terminals identified as identifiers 12 to provide services for these terminals.
- the AMF entity 4 When the AMF entity 4 does not have an abnormality, the AMF entity 4 provides services for the terminals whose group identification is the identifier 10, the identifier 11 and the identifier 12; meanwhile, the AMF entity 4 stores the context of the terminal whose group identifier is the identifier 3, the identifier 6 and the identifier 9. .
- the AMF entity 4 takes over the terminal identified as the identifier 3 to provide services for the terminals; and provides services for the terminal whose identifier is the identifier of the group 6.
- the AMF entity 4 takes over the terminal identified as the identifier 6 to provide services for the terminals; and when the AMF entity 3 serving the terminal whose group identifier is the identifier 9 is abnormal, the AMF entity 4 Take over the group of terminals identified as identification 9 to provide services for these terminals.
- the backup group identifier of an AMF entity is responsible for the average of other AMF entities in the AMF entity group.
- the backup relationship may not be equal.
- the configured backup relationship can be as shown in Table 3.
- the AMF entity 1 when the AMF entity 1 does not have an abnormality, the AMF entity 1 provides services for the terminals whose group identifiers are the identifier 1, the identifier 2, and the identifier 3; meanwhile, the AMF entity 1 stores the group identifiers as the identifiers of the identifier 7, the identifier 8, and the identifier 9. Context.
- the AMF entity 1 takes over the terminal identified as the identifier 7, the identifier 8 and the identifier 9 to provide services for the terminals. .
- the AMF entity 2 When the AMF entity 2 does not have an abnormality, the AMF entity 2 provides services for the terminals whose group identification is the identifier 4, the identifier 5, and the identifier 6; meanwhile, the AMF entity 2 stores the context of the terminal whose group identifier is the identifier 10, the identifier 11, and the identifier 12. .
- the AMF entity 2 takes over the terminal identified as the identifier 10, the identifier 11, and the identifier 12, and provides services for the terminals. .
- the AMF entity 3 When the AMF entity 3 does not have an abnormality, the AMF entity 3 provides services for the terminal whose identity is the identifier of the group 7, the identifier 8, the identifier 9, the identifier 10, the identifier 11, and the identifier 12. At the same time, the AMF entity 3 saves the group identifier as the identifier 1. The context of the identity of the identity 2, the identity 3, the identity 4, the identity 5 and the identity 6.
- the AMF entity 3 takes over the terminal whose identity is identified as the identifier 1, the identifier 2, and the identifier 3, and provides services for the terminals.
- the AMF entity 3 takes over the terminal identified as the identifier 4, the identifier 5, and the identifier 6 to provide the terminals. service.
- the embodiment of the present application does not specifically limit the backup relationship of each AMF entity in the AMF entity group, and can be flexibly configured according to actual requirements.
- the primary group identifier and the backup group identifier may not be configured in the AMF entity, but only the group identifier of the terminal served when the primary AMF entity does not have an abnormality is configured in the primary AMF entity. And when the primary AMF entity is abnormal, the information of the backup AMF entity of the terminal identified by the group identity is respectively taken over.
- the backup relationship between two AMF entities in an AMF entity group is as shown in Table 1, the backup relationship can also be represented by Table 4:
- AMF entity 2 Mark 4, logo 5, logo 6 AMF entity 1
- the backup relationship of four AMF entities in the AMF entity group is as shown in Table 2, the backup relationship may also be represented by Table 5:
- the backup relationship of four AMF entities in the AMF entity group is as shown in Table 3, the backup relationship may also be represented by Table 6:
- the characterization form of the backup relationship of each AMF entity in the AMF entity group is not specifically limited in this embodiment.
- the communication system shown in FIG. 1 is applied to the 5G network shown in FIG. 2, and the configuration of the AMF entity group is as shown in Table 2, assuming that the AMF entity 1 is the first AMF entity and the AMF entity 2 is the second.
- the AMF entity, the AMF entity 3 is the third AMF entity, and the AMF entity 4 is the fourth AMF entity.
- the communication method provided by the embodiment of the present application may be as shown in FIG. 4, and includes the following steps:
- the first AMF entity sends the primary group identifier configured in the first AMF entity to the access device, so that the access device receives the primary group identifier configured in the first AMF entity from the first AMF entity.
- the primary group identifier configured in the first AMF entity includes the identifier 1, the identifier 2, and the identifier 3.
- the primary group identifier is used to indicate that the terminal in the corresponding terminal group is served by the first AMF entity.
- the mapping between the information of the first AMF entity and the primary group identifier configured in the first AMF entity may be saved.
- the access device may select a corresponding AMF entity according to the corresponding relationship, which is not specifically limited in this embodiment.
- the second AMF entity sends the primary group identifier configured in the second AMF entity to the access device, so that the access device receives the primary group identifier configured in the second AMF entity from the second AMF entity.
- the primary group identifier configured in the second AMF entity includes the identifier 4, the identifier 5, and the identifier 6.
- the primary group identifier is used to indicate that the terminal in the corresponding terminal group is served by the second AMF entity.
- the mapping between the information of the second AMF entity and the primary group identifier configured in the second AMF entity may be saved.
- the access device may select a corresponding AMF entity according to the corresponding relationship, which is not specifically limited in this embodiment.
- the third AMF entity sends the primary group identifier configured in the third AMF entity to the access device, so that the access device receives the primary group identifier configured in the third AMF entity from the third AMF entity.
- the primary group identifier configured in the third AMF entity includes the identifier 7, the identifier 8, and the identifier 9.
- the primary group identifier is used to indicate that the terminal in the corresponding terminal group is served by the third mobility management entity.
- the mapping between the information of the third AMF entity and the primary group identifier configured in the third AMF entity may be saved.
- the access device may select a corresponding AMF entity according to the corresponding relationship, which is not specifically limited in this embodiment.
- the fourth AMF entity sends the primary group identifier configured in the fourth AMF entity to the access device, so that the access device receives the primary group identifier configured in the fourth AMF entity from the fourth AMF entity.
- the primary group identifier configured in the fourth AMF entity includes the identifier 10, the identifier 11, and the identifier 12.
- the primary group identifier is used to indicate that the terminal in the corresponding terminal group is served by the fourth mobility management entity.
- the mapping between the information of the fourth AMF entity and the primary group identifier configured in the fourth AMF entity may be saved.
- the access device may select a corresponding AMF entity according to the corresponding relationship, which is not specifically limited in this embodiment.
- each AMF entity needs to notify the access device of the length of the primary group identifier.
- the length of the primary group identifier may be represented by a number of digits, or may be represented by a mask, which is not specifically limited in this embodiment of the present application.
- the first AMF entity may further send the primary group identifier configured in the first AMF entity to the SMF entity; the second AMF entity may further send the primary group configured in the second AMF entity to the SMF entity.
- the third AMF entity may also send the primary group identifier configured in the third AMF entity to the SMF entity; the fourth AMF entity may further send the primary group identifier configured in the fourth AMF entity to the SMF entity.
- the SMF entity can store the correspondence between the information of each AMF entity and the primary group identifier configured in the corresponding AMF entity, and the SMF entity can subsequently select the corresponding AMF entity according to the corresponding relationship.
- the group identifier of the terminal and the information of the AMF entity that it serves may be sent to the SMF entity when the packet data unit (PDU) session is established, which is not specifically limited in this embodiment of the present application.
- the terminal registers with the network.
- the access device selects an AMF entity for the terminal.
- An embodiment of the present application is described by using the first AMF entity as an example.
- the first AMF entity receives the registration request of the terminal, the first AMF entity randomly selects one of the primary group identifiers configured in the first AMF entity.
- the primary group ID is used as the group ID of the terminal.
- the first AMF entity selects the identifier 1 as the group identifier of the terminal, proceeding to step S403a;
- step S403c is continued.
- the first AMF entity sends the context of the terminal to the second AMF entity after the terminal completes registration or at other occasions, such as when the timer expires, so that the second AMF entity receives the terminal from the first AMF entity. Context.
- the VRRP group identifier configured in the second AMF entity includes the identifier 1 in the second AMF entity. That is, when an abnormality occurs in the first AMF entity serving the terminal whose group identity is the identifier 1, the second AMF entity can take over the terminals, and provide services for the terminals whose identity is identified as the identifier 1, and thus the first AMF entity
- the context of the terminal identified as the identity of the group 1 needs to be synchronized to the second AMF entity.
- the first AMF entity sends the context of the terminal to the third AMF entity after the terminal completes registration or at other occasions, such as when the timer expires, so that the third AMF entity receives the terminal from the first AMF entity. Context.
- the VRRP group identifier configured in the third AMF entity includes the identifier 2, as shown in Table 2. That is, when an abnormality occurs in the first AMF entity serving the terminal identified as the identity of the group 2, the third AMF entity can take over the terminals, and provide services for the terminals whose identity is identified as the identity 2, and thus the first AMF entity The context of the terminal identified as the identity of the group 2 needs to be synchronized to the third AMF entity.
- the first AMF entity sends the context of the terminal to the fourth AMF entity after the terminal completes registration or at other occasions, such as when the timer expires, so that the fourth AMF entity receives the terminal from the first AMF entity. Context.
- the VRRP group identifier configured in the fourth AMF entity includes the identifier 3, as shown in Table 2. That is, when an abnormality occurs in the first AMF entity serving the terminal identified as the identity of the group 3, the fourth AMF entity can take over the terminals, and provide services for the terminals whose identity is identified as the identifier 4, and thus the first AMF entity The context of the terminal identified as the identity of the group 3 needs to be synchronized to the fourth AMF entity.
- S404 An abnormality occurs in the first AMF entity.
- the access device performs steps S405a and S406a; the second AMF entity performs steps S405b-S407b; the third AMF entity performs steps S405c-S407c; and the fourth AMF entity performs steps S405d-S407d;
- the SMF entity performs steps S405e and S406e, as described in the following steps.
- the access device detects that the first AMF entity is abnormal.
- the access device identifies the first AMF entity as unavailable, and the new AMF entity does not select the first AMF entity when accessing the new terminal.
- S405b The second AMF entity detects that an abnormality occurs in the first AMF entity.
- the second AMF entity sends an indication message 1 to the SMF entity, so that the SMF entity receives the indication message 1 from the second AMF entity.
- the indication message 1 is used to indicate that the terminal in the terminal group corresponding to the identifier 1 is served by the second AMF entity.
- the SMF entity may save the correspondence between the information of the second AMF entity and the identifier 1.
- the SMF entity may release the SMF entity to the N11 interface of the first AMF entity.
- the second AMF entity may be selected according to the corresponding relationship, and the SMF entity is sent to the N11 interface of the second AMF entity, and the downlink message is sent by the second AMF entity. This is not specifically limited.
- the second AMF entity sends an indication message 1 to the access device, so that the access device receives the indication message 1 from the second AMF entity.
- the indication message 1 is used to indicate that the terminal in the terminal group corresponding to the identifier 1 is served by the second AMF entity.
- the access device may save the correspondence between the information of the second AMF entity and the identifier 1.
- the access device may release the access device to the N2 interface of the first AMF entity.
- the second AMF entity may be selected according to the corresponding relationship, and the N2 interface of the access device to the second AMF entity is established, and the second AMF entity sends an uplink message.
- the embodiment does not specifically limit this.
- S405c The third AMF entity detects that an abnormality occurs in the first AMF entity.
- the third AMF entity sends an indication message 2 to the SMF entity, so that the SMF entity receives the indication message 2 from the third AMF entity.
- the indication message 2 is used to indicate that the terminal in the terminal group corresponding to the identifier 2 is served by the third AMF entity.
- the SMF entity may save the correspondence between the information of the third AMF entity and the identifier 2.
- the SMF entity may release the SMF entity to the N11 interface of the first AMF entity.
- the third AMF entity may be selected according to the corresponding relationship, and the NMF interface of the SMF entity to the third AMF entity is established, and the downlink message is sent by the third AMF entity. This is not specifically limited.
- the third AMF entity sends an indication message 2 to the access device, so that the access device receives the indication message 2 from the third AMF entity.
- the indication message 2 is used to indicate that the terminal in the terminal group corresponding to the identifier 2 is served by the third AMF entity.
- the access device may save the correspondence between the information of the third AMF entity and the identifier 2.
- the access device may release the access device to the N2 interface of the first AMF entity.
- the third AMF entity may be selected according to the corresponding relationship, and the N2 interface of the access device to the third AMF entity is established, and the third AMF entity sends an uplink message.
- the embodiment does not specifically limit this.
- the fourth AMF entity detects that an abnormality occurs in the first AMF entity.
- the fourth AMF entity sends an indication message 3 to the SMF entity, so that the SMF entity receives the indication message 3 from the fourth AMF entity.
- the indication message 3 is used to indicate that the terminal in the terminal group corresponding to the identifier 3 is served by the fourth AMF entity.
- the SMF entity may save the correspondence between the information of the fourth AMF entity and the identifier 3.
- the SMF entity may release the SMF entity to the N11 interface of the first AMF entity.
- the fourth AMF entity may be selected according to the corresponding relationship, and the NMF interface of the SMF entity to the fourth AMF entity is established, and the downlink message is sent by the fourth AMF entity. This is not specifically limited.
- the fourth AMF entity sends an indication message 3 to the access device, so that the access device receives the indication message 3 from the fourth AMF entity.
- the indication message 3 is used to indicate that the terminal in the terminal group corresponding to the identifier 3 is served by the fourth AMF entity.
- the access device may save the correspondence between the information of the fourth AMF entity and the identifier 3.
- the access device may release the access device to the N2 interface of the first AMF entity.
- the fourth AMF entity may be selected according to the corresponding relationship, and the N2 interface of the access device to the fourth AMF entity is established, and the fourth AMF entity sends an uplink message.
- the embodiment does not specifically limit this.
- the SMF entity detects that an abnormality occurs in the first AMF entity.
- the SMF entity identifies the first AMF entity as unavailable, and then does not send the downlink message to the first AMF entity.
- the exemplary interaction between the AMF entity and the SMF entity on the core network side is taken as an example for description.
- the SMF entity in the embodiment of the present application may be replaced with other core network devices.
- each AMF entity performs the foregoing interaction with the UDM entity or the AUSF entity, which is not specifically limited in this embodiment.
- the following descriptions are respectively taken from the access device to obtain the terminal-related uplink message and the SMF entity to obtain the terminal-related downlink message, which respectively include the following steps S408-S409 and steps S410-S411.
- the access device acquires an uplink message related to the terminal.
- the uplink message related to the terminal may be an uplink message sent to the target AMF entity, such as an uplink N2 message, when the access device needs to initiate an N2 message related to the terminal, or may be sent by the terminal to the terminal.
- the uplink message of the target AMF entity such as the non-access stratum (NAS) message, is not specifically limited in this embodiment of the present application.
- the access device may obtain the group identifier of the terminal from the uplink message related to the terminal that is sent by the terminal to the access device, or the access device may determine the group identifier of the terminal from the context of the terminal. This is not specifically limited.
- the terminal related uplink message includes a system architecture evolution (SAE) temporary mobile subscriber identity (S-TMSI)
- SAE system architecture evolution
- S-TMSI temporary mobile subscriber identity
- the S-TMSI is temporarily configured by the AMF pointer and the terminal.
- the identifier component is configured. If the group identifier of the terminal group is the high N bit of the temporary identifier of the AMF pointer+ terminal, the access device can read the digits of the corresponding length from the upper digit of the S-TMSI according to the length of the group identifier, and obtain the corresponding group identifier.
- SAE system architecture evolution
- S-TMSI temporary mobile subscriber identity
- the access device continues to perform step S409a;
- the access device proceeds to step S409b;
- the access device proceeds to step S409c.
- the access device sends, according to the group identifier 1, a terminal-related uplink message to the second AMF entity, so that the second AMF entity receives the uplink message related to the terminal from the access device.
- the access device may determine, according to the indication message 1 received in step S407b and the group identifier 1 obtained in step S408, that the AMF entity corresponding to the group identifier 1 is the second AMF entity, and further to the second AMF entity. Send the uplink message related to the terminal.
- the access device sends, according to the group identifier 2, a terminal-related uplink message to the third AMF entity, so that the third AMF entity receives the uplink message related to the terminal from the access device.
- the access device may determine, according to the indication message 2 received in step S407c and the group identifier 2 obtained in step S408, that the AMF entity corresponding to the group identifier 2 is the third AMF entity, and further to the third AMF entity. Send the uplink message related to the terminal.
- S409c The access device sends, according to the group identifier 3, a terminal-related uplink message to the fourth AMF entity, so that the fourth AMF entity receives the uplink message related to the terminal from the access device.
- the access device may determine, according to the indication message 3 received in step S407d and the group identifier 3 obtained in step S408, that the AMF entity corresponding to the group identifier 3 is the fourth AMF entity, and further to the fourth AMF entity. Send the uplink message related to the terminal.
- the SMF entity acquires a downlink message related to the terminal.
- the downlink message related to the terminal may be a downlink message sent by the SMF entity to the access device, and the following is an N2 message; or may be a downlink message sent by the SMF entity to the terminal, as follows: It may also be a downlink message sent by the SMF entity to the target AMF entity, which is not specifically limited in this embodiment of the present application.
- the SMF entity may obtain the group identifier of the terminal from the downlink message related to the terminal sent by the other device to the SMF entity; or the SMF entity may determine the group identifier of the terminal from the context of the terminal. This is not specifically limited.
- the S-TMSI is composed of the AMF pointer and the temporary identifier of the terminal, and if the group identifier of the terminal group is the high N-bit of the AMF pointer+ terminal temporary identifier, the SMF entity The value of the corresponding number of bits can be read from the upper part of the S-TMSI according to the length of the group identifier, and the corresponding group identifier is obtained, which is not specifically limited in this embodiment of the present application.
- the SMF entity continues to perform step S411a;
- the SMF entity continues to perform step S411b;
- the SMF entity proceeds to step S411c.
- the SMF entity sends a terminal-related downlink message to the second AMF entity according to the group identifier 1, so that the second AMF entity receives the downlink message related to the terminal from the SMF entity.
- the SMF entity may determine, according to the indication message 1 received in step S406b and the group identifier 1 obtained in step S410, that the AMF entity corresponding to the group identifier 1 is the second AMF entity, and further to the second AMF entity. Send a downlink message related to the terminal.
- the SMF entity sends a terminal-related downlink message to the third AMF entity according to the group identifier 2, so that the third AMF entity receives the terminal-related downlink message from the SMF entity.
- the SMF entity may determine, according to the indication message 2 received in step S406c and the group identifier 2 obtained in step S410, that the AMF entity corresponding to the group identifier 2 is the third AMF entity, and then sends the third AMF entity to the third AMF entity. Terminal related downlink messages.
- the SMF entity sends a terminal-related downlink message to the fourth AMF entity according to the group identifier 3, so that the fourth AMF entity receives the downlink message related to the terminal from the SMF entity.
- the SMF entity may determine, according to the indication message 3 received in step S406d and the group identifier 3 obtained in step S410, that the AMF entity corresponding to the group identifier 3 is the fourth AMF entity, and further sends the fourth AMF entity to the fourth AMF entity. Terminal related downlink messages.
- the first AMF entity can synchronize the context of the served terminal to another AMF entity that configures the group identifier of the terminal
- the first AMF entity is abnormal
- the terminal related message may be sent to other AMF entities configured with the group identifier according to the group identifier, so that if the first mobility management entity is abnormal, the terminal may be prevented from being restarted due to the context loss of the terminal being served.
- the registration process that is, the current process of maintaining the terminal being served is not interrupted.
- the contexts of the terminals in different terminal groups can be separately backed up to multiple different AMF entities, that is, one-to-many backup can be implemented.
- one or more terminal groups of the first AMF entity are respectively taken over by a plurality of different AMF entities, thereby reducing the impact on the single AMF entity due to the abnormality of the first AMF entity.
- the traditional 1+1 backup it saves resources and compensates for the problem of context loss in the traditional MME pool.
- the operations of the access device, the SMF entity, and the respective AMF entities in the foregoing steps S401 to S411 can be performed by the processor 301 in the network device 300 shown in FIG. 3 by calling the application code stored in the memory 303.
- the embodiment does not impose any limitation on this.
- the communication system shown in FIG. 1 is applied to the 5G network shown in FIG. 2, and the configuration of the AMF entity group is as shown in Table 2.
- AMF entity 1 is the first AMF entity
- AMF entity 2 is The second AMF entity
- the AMF entity 3 is the third AMF entity
- the AMF entity 4 is the fourth AMF entity.
- the communication method provided by the embodiment of the present application may also be as shown in FIG. 5, including the following steps:
- S501a-S501d similar to S401a-S401d, except that the primary group identifier in the embodiment shown in FIG. 4 is used to indicate that the terminal in the corresponding terminal group is served by the AMF entity that sends the primary group identifier;
- the primary group identifier in the illustrated embodiment is used to indicate that the terminal in the corresponding terminal group is served by the first AMF entity in the case that the AMF entity that sends the primary group identifier does not have an abnormality.
- FIG. 4 The illustrated embodiment will not be described herein.
- the first AMF entity sends the backup group identifier configured in the first AMF entity to the access device, so that the access device receives the backup group identifier configured in the first AMF entity from the first AMF entity.
- the VRRP group identifier configured in the first AMF entity includes the identifier 4, the identifier 7, and the identifier 10.
- the backup group identifier is used to indicate that the terminal in the corresponding terminal group is served by the first AMF entity if the AMF entity configured with the backup group identifier is configured as the primary group identifier. For example, in the case that an abnormality occurs in the second AMF entity that configures the identifier 4 as the primary group identifier, the terminal group whose group identifier is the identifier 4 is served by the first AMF entity.
- the access device may save the correspondence between the information of the first AMF entity and the VRRP group identifier configured in the first AMF entity. In this way, the access device may select a corresponding AMF entity according to the corresponding relationship, which is not specifically limited in this embodiment.
- the second AMF entity sends the backup group identifier configured in the second AMF entity to the access device, so that the access device receives the backup group identifier configured in the second AMF entity from the second AMF entity.
- the VRRP group identifier configured in the second AMF entity includes the identifier 1, the identifier 8, and the identifier 11.
- the backup group identifier is used to indicate that the terminal in the corresponding terminal group is served by the second AMF entity in the case that an abnormality occurs in the AMF entity configured with the backup group identifier as the primary group identifier. For example, in the case that an abnormality occurs in the first AMF entity that configures the identifier 1 as the primary group identifier, the terminal whose group identifier is the identifier of the terminal group is served by the second AMF entity.
- the access device may select a corresponding AMF entity according to the corresponding relationship, which is not specifically limited in this embodiment.
- the third AMF entity sends the backup group identifier configured in the third AMF entity to the access device, so that the access device receives the backup group identifier configured in the third AMF entity from the third AMF entity.
- the VRRP group identifier configured in the third AMF entity includes the identifier 2, the identifier 5, and the identifier 12.
- the backup group identifier is used to indicate that the terminal in the corresponding terminal group is served by the third AMF entity if the AMF entity configured with the backup group identifier is configured as the primary group identifier. For example, in the case that an abnormality occurs in the first AMF entity that configures the identifier 2 as the primary group identifier, the terminal group whose group identifier is the identifier 2 is served by the third AMF entity.
- the access device may select a corresponding AMF entity according to the corresponding relationship, which is not specifically limited in this embodiment.
- the fourth AMF entity sends the backup group identifier configured in the fourth AMF entity to the access device, so that the access device receives the backup group identifier configured in the fourth AMF entity from the fourth AMF entity.
- the VRRP group identifier configured in the fourth AMF entity includes the identifier 3, the identifier 6, and the identifier 9.
- the backup group identifier is used to indicate that the terminal in the corresponding terminal group is served by the fourth AMF entity if an abnormality occurs in the AMF entity configured with the backup group identifier as the primary group identifier. For example, in a case where an abnormality occurs in the first AMF entity that configures the identifier 3 as the primary group identifier, the terminal whose group identifier is the identifier of the terminal 3 is served by the fourth AMF entity.
- the access device may select a corresponding AMF entity according to the corresponding relationship, which is not specifically limited in this embodiment.
- each AMF entity also needs to notify the access device of the length of the primary group identifier and the length of the backup group identifier.
- the length of the primary group identifier and the backup group identifier may be represented by a number of bits, or may be represented by a mask, which is not specifically limited in this embodiment of the present application.
- the primary group identifier in step S501a and the backup group identifier in step S502a may be carried in a message together to be sent to the access device, or may be separately sent to the access device by two messages.
- the embodiment of the present application does not specifically limit this.
- the primary group identifier in step S501b and the backup group identifier in step S502b may be carried in a message together to be sent to the access device, or may be separately sent to the access device by two messages;
- step S501c The primary group identifier in step S502c and the backup group identifier in step S502c may be carried in a message together to be sent to the access device, or may be separately sent to the access device through two messages;
- the primary group identifier in step S501d The VRRP group in the step S502d may be sent to the access device in a message, or may be sent to the access device by using two messages, which is not specifically limited in this embodiment.
- the first AMF entity may further send the primary group identifier and the backup group identifier configured in the first AMF entity to the SMF entity; the second AMF entity may also send the second AMF entity to the SMF entity.
- the configured primary group ID and backup group ID may be used to the SMF entity.
- the SMF entity can store the information of each AMF entity and the corresponding relationship between the primary group identifier and the backup group identifier configured in the corresponding AMF entity, and the SMF entity can subsequently select the corresponding AMF entity according to the corresponding relationship.
- the group identifier of the terminal and the information of the AMF entity that it serves may be sent to the SMF entity when the PDU session is established, which is not specifically limited in this embodiment of the present application.
- S505 An abnormality occurs in the first AMF entity.
- the access device performs steps S506a and S507a; the second AMF entity performs steps S506b-S507b; the third AMF entity performs steps S506c-S507c; and the fourth AMF entity performs steps S506d-S507d;
- the SMF entity performs steps S506e and S507e, as described in the following steps.
- the access group identifier of the first AMF entity may be identified according to the correspondence between the VRRP group identifier and the AMF entity received by 502a-502d:
- the service AMF entity of the terminal corresponding to the identifier 2 and the identifier 3 is configured as a second AMF entity, a third AMF entity, and a fourth AMF entity, which are not specifically limited in this embodiment.
- each AMF entity separately sends the primary group identifier and the backup group identifier configured in the corresponding AMF entity to the SMF entity
- the embodiment of the present application may not perform steps S506b-S507b, step S506c- S507c and steps S506d-S507d are collectively described herein, and are not described herein again.
- the SMF entity may detect that the first AMF entity is abnormal.
- the primary group identifier of the first AMF entity the service AMF entity of the terminal corresponding to the identifier 1, the identifier 2, and the identifier 3
- the second AMF entity, the third AMF entity, and the fourth AMF entity are respectively set, which is not specifically limited in this embodiment.
- the following descriptions are respectively taken from the access device acquiring the terminal-related uplink message and the SMF entity acquiring the terminal-related downlink message, which respectively include the following steps S508-S509 and steps S510-S511.
- the access device acquires an uplink message related to the terminal.
- step S508 For the related description of step S508, refer to step S408, and details are not described herein again.
- the access device continues to perform step S509a;
- the access device proceeds to step S509b;
- the access device proceeds to step S509c.
- the access device sends, according to the group identifier 1, a terminal-related uplink message to the second AMF entity, so that the second AMF entity receives the uplink message related to the terminal from the access device.
- the access device may determine, according to the VRRP group identifier received in step S502b and the group identifier 1 obtained in step S508a, that the AMF entity corresponding to the group identifier 1 is the second AMF entity, and further to the second AMF entity. Send the uplink message related to the terminal.
- S509b The access device sends, according to the group identifier 2, a terminal-related uplink message to the third AMF entity, so that the third AMF entity receives the uplink message related to the terminal from the access device.
- the access device may determine, according to the VRRP group identifier received in step S502c and the group identifier 2 obtained in step S508b, that the AMF entity corresponding to the group identifier 2 is a third AMF entity, and further to the third AMF entity. Send the uplink message related to the terminal.
- S509c The access device sends, according to the group identifier 3, a terminal-related uplink message to the fourth AMF entity, so that the fourth AMF entity receives the uplink message related to the terminal from the access device.
- the access device may determine, according to the VRRP group identifier received in step S502d and the group identifier 3 obtained in step S508c, that the AMF entity corresponding to the group identifier 3 is the fourth AMF entity, and further to the fourth AMF entity. Send the uplink message related to the terminal.
- the difference from the embodiment shown in FIG. 4 is that, in the embodiment shown in FIG. 4, when the first AMF entity is initially configured, the first AMF entity sends only the configured primary group identifier to the access device. When the other AMF entity detects that the first AMF entity is abnormal, the other AMF entity notifies the access device that the terminal corresponding to the primary group identifier is taken over by itself; and in the embodiment shown in FIG. 5, when the AMF entity is initially configured. The AMF entity can send the configured primary group identifier and backup group identifier to the access device.
- the AMF entity can take over the terminals and provide services for the terminals.
- the actions of the second AMF entity, the third AMF entity, and the fourth AMF entity are also similar to the first AMF entity, and details are not described herein again.
- the first AMF entity can synchronize the context of the served terminal to another AMF entity that configures the group identifier of the terminal
- the first AMF entity is abnormal
- the terminal related message may be sent to other AMF entities configured with the group identifier according to the group identifier, so that if the first mobility management entity is abnormal, the terminal may be prevented from being restarted due to the context loss of the terminal being served.
- the registration process that is, the current process of maintaining the terminal being served is not interrupted.
- the contexts of the terminals in different terminal groups can be separately backed up to a plurality of different AMF entities, that is, one-to-many backup can be implemented.
- one or more terminal groups of the first AMF entity are respectively taken over by a plurality of different AMF entities, thereby reducing the impact on the single AMF entity due to the abnormality of the first AMF entity.
- the traditional 1+1 backup it saves resources and compensates for the problem of context loss in the traditional MME pool.
- the operations of the access device, the SMF entity, and the respective AMF entities in the foregoing steps S501 to S511 can be performed by the processor 301 in the network device 300 shown in FIG. 3, by calling the application code stored in the memory 303.
- the embodiment does not impose any limitation on this.
- the communication system shown in FIG. 1 is applied to the 5G network shown in FIG. 2, and the configuration of the AMF entity group is as shown in Table 5.
- AMF entity 1 is the first AMF entity
- AMF entity 2 is The second AMF entity
- the AMF entity 3 is the third AMF entity
- the AMF entity 4 is the fourth AMF entity.
- the communication method provided by the embodiment of the present application may also be as shown in FIG.
- the S601a-S601d is similar to the S501a-S501d. The difference is that the primary group identifier in the embodiment shown in FIG. 5 is replaced by the group identifier in the embodiment shown in FIG. I will not repeat them here.
- the first AMF entity sends an indication message 1 to the access device, so that the access device receives the indication message 1 from the first AMF entity.
- the indication message 1 is used to indicate that in the case that an abnormality occurs in the first AMF entity, the terminal in the terminal group corresponding to the identifier 1 is served by the second AMF entity, and the terminal in the terminal group corresponding to the identifier 2 is provided by the third AMF entity.
- the service, the terminal in the terminal group corresponding to the identifier 3 is served by the fourth AMF entity.
- the access device may save the correspondence between the group identifier 1 and the first AMF entity and the second AMF entity, and the correspondence between the group identifier 2 and the first AMF entity and the third AMF entity.
- the first AMF entity is the primary AMF entity of the group identifier 1, the group identifier 2, and the group identifier 3.
- the second AMF entity is the backup AMF entity of the group identifier 1
- the third AMF entity is the backup AMF entity of the group identifier 2.
- the four AMF entities act as backup AMF entities for group identification 3. In this way, the access device may select the corresponding AMF entity according to the corresponding relationship, which is not specifically limited in this embodiment.
- the second AMF entity sends an indication message 2 to the access device, so that the access device receives the indication message 2 from the second AMF entity.
- the indication message 2 is used to indicate that, in the case that an abnormality occurs in the second AMF entity, the terminal in the terminal group corresponding to the identifier 4 is served by the first AMF entity, and the terminal in the terminal group corresponding to the identifier 5 is provided by the third AMF entity.
- the service, the terminal in the terminal group corresponding to the identifier 6 is served by the fourth AMF entity.
- the access device may save the correspondence between the group identifier 4 and the second AMF entity and the first AMF entity, and the correspondence between the group identifier 5 and the second AMF entity and the third AMF entity.
- the second AMF entity is the primary AMF entity of the group identifier 4, the group identifier 5, and the group identifier 6.
- the first AMF entity is the backup AMF entity of the group identifier 4
- the third AMF entity is the backup AMF entity of the group identifier 5.
- the four AMF entities act as backup AMF entities for group identification 6. In this way, the access device may select the corresponding AMF entity according to the corresponding relationship, which is not specifically limited in this embodiment.
- the third AMF entity sends an indication message 3 to the access device, so that the access device receives the indication message 3 from the third AMF entity.
- the indication message 3 is used to indicate that in the case that an abnormality occurs in the third AMF entity, the terminal in the terminal group corresponding to the identifier 7 is served by the first AMF entity, and the terminal in the terminal group corresponding to the identifier 8 is provided by the second AMF entity.
- the service, the terminal in the terminal group corresponding to the identifier 9 is served by the fourth AMF entity.
- the access device may save the correspondence between the group identifier 7 and the third AMF entity and the first AMF entity, and the correspondence between the group identifier 8 and the third AMF entity and the second AMF entity.
- the third AMF entity is the primary AMF entity of the group identifier 7, the group identifier 8, and the group identifier 9, the second AMF entity is the backup AMF entity of the group identifier 8, the first AMF entity is the backup AMF entity of the group identifier 7, and the first The four AMF entities act as backup AMF entities for group identification 9.
- the access device may select the corresponding AMF entity according to the corresponding relationship, which is not specifically limited in this embodiment.
- the fourth AMF entity sends an indication message 4 to the access device, so that the access device receives the indication message 4 from the fourth AMF entity.
- the indication message 4 is used to indicate that, in the case that an abnormality occurs in the fourth AMF entity, the terminal in the terminal group corresponding to the identifier 10 is served by the first AMF entity, and the terminal in the terminal group corresponding to the identifier 11 is provided by the second AMF entity.
- the service, the terminal in the terminal group corresponding to the identifier 12 is served by the third AMF entity.
- the access device may save the correspondence between the group identifier 10 and the fourth AMF entity and the first AMF entity, and the correspondence between the group identifier 11 and the fourth AMF entity and the second AMF entity.
- the fourth AMF entity is the primary AMF entity of the group identifier 10, the group identifier 11 and the group identifier 12, the second AMF entity is the backup AMF entity of the group identifier 11, the third AMF entity is the backup AMF entity of the group identifier 12, and the third An AMF entity acts as a backup AMF entity for group identification 10.
- the access device may select the corresponding AMF entity according to the corresponding relationship, which is not specifically limited in this embodiment.
- the group identifier in step S601a and the indication message 1 in step S602a may be carried in a message and sent to the access device, or may be sent separately through two messages.
- the embodiment of the present application does not specifically limit this.
- the group identifier in step S601b and the indication message 2 in step S602b may be carried in a message together to be sent to the access device, or may be separately sent to the access device through two messages; in step S601c The group identifier and the indication message 3 in step S602c may be carried in a message together to be sent to the access device, or may be separately sent to the access device by two messages; the group identifier in step S601d and step S602d
- the indication message 4 may be carried in a message and sent to the access device, or may be sent to the access device by using two messages, which is not specifically limited in this embodiment of the present application.
- the first AMF entity may further send the group identifier and the indication message 1 configured in the first AMF entity to the SMF entity; the second AMF entity may further send the configuration in the second AMF entity to the SMF entity.
- Group identification and indication message 2; the third AMF entity may also send the group identity and indication message 3 configured in the third AMF entity to the SMF entity; the fourth AMF entity may also send the group configured in the fourth AMF entity to the SMF entity Identify and indicate message 4.
- the SMF entity can save the correspondence between each group identifier and the primary AMF entity and the backup AMF entity, and the SMF entity can subsequently select the corresponding AMF entity according to the corresponding relationship.
- the group identifier of the terminal and the information of the AMF entity that it serves may be sent to the SMF entity when the PDU session is established, which is not specifically limited in this embodiment of the present application.
- the S603a-S603d is similar to the S602a-S602d. The only difference is that the access device in the S602a-S602d is replaced by the SMF entity in the S603a-S603d. For details, refer to S602a-S602d, and details are not described herein.
- S606 An abnormality occurs in the first AMF entity.
- the access device performs steps S607a and S608a; the SMF entity performs steps S607e and S608e, as described in the following steps.
- the access device may: according to the indication message received by 602a-602d, the group identifier of the first AMF entity: identifier 1, identifier 2, and identifier 3.
- the service AMF entity of the terminal is configured as a second AMF entity, a third AMF entity, and a fourth AMF entity, which are not specifically limited in this embodiment.
- the SMF entity may: according to the indication message received by the 603a-603d, the group identifier of the first AMF entity: the identifier corresponding to the identifier 1, the identifier 2, and the identifier 3.
- the service AMF entity is configured as a second AMF entity, a third AMF entity, and a fourth AMF entity, which are not specifically limited in this embodiment of the present application.
- FIG. 5 For example, the embodiment shown in FIG. 5 is omitted, and details are not described herein again.
- the S610a-S610c is similar to the S509a-S509c. The difference is that the access device in the S509a-S509c determines the AMF entity corresponding to the group identifier according to the VRRP group identifier. In this embodiment, the AMF entity corresponding to the group identifier is determined according to the indication message. Reference may be made to the embodiment shown in FIG. 5, and details are not described herein again.
- the access device may determine, according to the VRRP group identity, the AMF entity of the terminal that identifies the primary group identity managed by the AMF entity according to the VRRP identity; in the embodiment shown in FIG. 6, only in the primary AMF entity.
- the group identifier of the terminal served when the primary AMF entity does not have an abnormality is configured, and when the primary AMF entity is abnormal, the information of the backup AMF entity of the terminal identified by the group identifier is taken over.
- the access device may determine, according to the information of the backup AMF entity, the backup AMF entity that takes over the terminal identified by the group identity.
- the first AMF entity can synchronize the context of the served terminal to another AMF entity that configures the group identifier of the terminal
- the first AMF entity is abnormal
- the terminal related message may be sent to other AMF entities configured with the group identifier according to the group identifier, so that if the first mobility management entity is abnormal, the terminal may be prevented from being restarted due to the context loss of the terminal being served.
- the registration process that is, the current process of maintaining the terminal being served is not interrupted.
- the contexts of the terminals in different terminal groups can be separately backed up to a plurality of different AMF entities, that is, one-to-many backup can be implemented.
- one or more terminal groups of the first AMF entity are respectively taken over by a plurality of different AMF entities, thereby reducing the impact on the single AMF entity due to the abnormality of the first AMF entity.
- the traditional 1+1 backup it saves resources and compensates for the problem of context loss in the traditional MME pool.
- the operations of the access device, the SMF entity, and the respective AMF entities in the foregoing steps S601 to S612 can be performed by the processor 301 in the network device 300 shown in FIG. 3 calling the application code stored in the memory 303.
- the embodiment does not impose any limitation on this.
- the embodiment shown in FIG. 4 may be combined with the embodiment shown in FIG. 5, or the embodiment shown in FIG. 4 may be combined with the embodiment shown in FIG. 6.
- This embodiment of the present application does not specifically limit this.
- the solution provided by the embodiment of the present application is mainly introduced from the perspective of interaction between the network elements.
- the foregoing communication device and the second mobility management entity include corresponding hardware structures and/or software modules for performing the respective functions in order to implement the above functions.
- the present application can be implemented in a combination of hardware or hardware and computer software in combination with the elements and algorithm steps of the various examples described in the embodiments disclosed herein. Whether a function is implemented in hardware or computer software to drive hardware depends on the specific application and design constraints of the solution. A person skilled in the art can use different methods to implement the described functions for each particular application, but such implementation should not be considered to be beyond the scope of the present application.
- the embodiment of the present application may perform the division of the function module on the communication device and the second mobility management entity according to the foregoing method example.
- each function module may be divided according to each function, or two or more functions may be integrated into one process.
- the above integrated modules can be implemented in the form of hardware or in the form of software functional modules. It should be noted that the division of the module in the embodiment of the present application is schematic, and is only a logical function division, and the actual implementation may have another division manner.
- FIG. 7 shows a possible structural diagram of the communication device 70 involved in the above embodiment.
- the communication device 70 includes an acquisition module 701 and a transmission module 702.
- the obtaining module 701 is configured to obtain a first group identifier of a terminal group where the first terminal of the first mobility management entity service is located.
- the sending module 702 is configured to send, according to the first group identifier, a message related to the first terminal to the second mobility management entity, where the second mobility management entity is the first terminal.
- the context of the mobile management entity is configured to send, according to the first group identifier, a message related to the first terminal to the second mobility management entity, where the second mobility management entity is the first terminal.
- the first group identifier is a primary group identifier configured in the first mobility management entity, and a backup group identifier configured in the second mobility management entity.
- the communication device 70 further includes: a receiving module 703.
- the receiving module 703 is configured to receive a first indication message, where the first indication message is used to indicate that the terminal in the terminal group corresponding to the first group identifier is served by the second mobility management entity.
- the receiving module 703 is specifically configured to: receive the first indication message from the second mobility management entity, where the first indication message is sent to the second mobility management entity to determine that the first mobility management entity is abnormal. Communication equipment.
- the receiving module 703 is configured to receive a first indication message, where the first indication message is used to indicate that, in a case that an abnormality occurs in the first mobility management entity, the terminal group corresponding to the first group identifier is The terminal is served by the second mobility management entity.
- the receiving module 703 is specifically configured to: before the first mobility management entity generates an abnormality, receive the first indication message.
- the sending module 702 is specifically configured to: determine that an abnormality occurs in the first mobility management entity; and send, according to the first group identifier, a message related to the first terminal to the second mobility management entity.
- the obtaining module 701 is specifically configured to: receive a message related to the first terminal, where the message related to the first terminal carries the first group identifier of the terminal group where the first terminal is located; or, in the context of the first terminal Determining a first group identifier of the terminal group where the first terminal is located.
- the obtaining module 701 is further configured to obtain a second group identifier of the terminal group where the second terminal of the first mobility management entity service is located.
- the sending module 702 is further configured to send, according to the second group of identifiers, a second terminal related message to the third mobility management entity, where the first mobility management entity is abnormal, where the third mobility management entity is the second The mobile management entity of the context of the terminal.
- the communication device in the embodiment of the present application includes an access device or a session management entity.
- FIG. 8 shows a possible structural diagram of the communication device 80 involved in the above embodiment, and the communication device 80 includes a processing module 801 and a communication module 802.
- the processing module 801 can be used to perform operations that can be performed by the obtaining module 701 in FIG. 7, and the communications module 802 can be used to perform operations that can be performed by the sending module 702 in FIG.
- the communication module 802 is further configured to perform the operations that can be performed by the receiving module 703 in FIG. 7.
- the communication device is presented in the form of dividing each functional module corresponding to each function, or the communication device is presented in a form that divides each functional module in an integrated manner.
- a “module” herein may refer to an Application-Specific Integrated Circuit (ASIC), circuitry, a processor and memory that executes one or more software or firmware programs, integrated logic circuitry, and/or other functions that provide the functionality described above. Device.
- ASIC Application-Specific Integrated Circuit
- communication device 70 or communication device 80 may take the form shown in FIG.
- the obtaining module 701, the sending module 702, and the receiving module 703 in FIG. 7 can be implemented by the processor 401 and the memory 403 of FIG.
- the obtaining module 701, the sending module 702, and the receiving module 703 can be executed by using the application code stored in the memory 303 by the processor 301, which is not limited in this embodiment.
- the processing module 801 and the communication module 802 in FIG. 8 may be implemented by the processor 301 and the memory 303 of FIG.
- the processing module 801 and the communication module 802 can be executed by using the application code stored in the memory 303 by the processor 301, which is not limited in this embodiment.
- the communication device provided by the embodiment of the present application can be used to perform the foregoing communication method. Therefore, the technical effects that can be obtained by reference to the foregoing method embodiments are not described herein.
- FIG. 9 shows a possible structural diagram of the second mobility management entity 90 involved in the above embodiment.
- the second mobility management entity 90 includes a receiving module 901, a determining module 902, and a sending module 903.
- the receiving module 901 is configured to receive a context of the first terminal that is served by the first mobility management entity of the first mobility management entity.
- the determining module 902 is configured to determine that an abnormality occurs in the first mobility management entity.
- the sending module 903 is configured to send a first indication message to the communications device, where the first indication message is used to indicate that the terminal in the terminal group corresponding to the first group identifier is served by the second mobility management entity, where the first group identifier is Group ID of the terminal group where the first terminal is located.
- the receiving module 901 is further configured to receive a message related to the first terminal from the communications device.
- the receiving module 901 is further configured to receive a context of the second terminal served by the third mobility management entity of the third mobility management entity.
- the determining module 902 is further configured to determine that an abnormality occurs in the third mobility management entity.
- the sending module 903 is further configured to send a second indication message to the communications device, where the second indication message is used to indicate that the terminal in the terminal group corresponding to the second group of identifiers is served by the second mobility management entity, where the second group identifier is The group ID of the terminal group where the second terminal is located.
- FIG. 10 is a schematic diagram showing a possible structure of the second mobility management entity 100 involved in the foregoing embodiment, where the second mobility management entity 100 includes: a processing module. 1002 and a communication module 1001.
- the processing module 1002 can be used to perform the operations that can be performed by the determining module 902 in FIG. 9.
- the communications module 1001 can be used to perform operations performed by the receiving module 901 and the sending module 903 in FIG. The embodiments of the present application are not described herein again.
- the second mobility management entity is presented in the form of dividing each function module corresponding to each function, or the second mobility management entity is presented in a form of dividing each function module in an integrated manner.
- a “module” herein may refer to an Application-Specific Integrated Circuit (ASIC), circuitry, a processor and memory that executes one or more software or firmware programs, integrated logic circuitry, and/or other functions that provide the functionality described above. Device.
- ASIC Application-Specific Integrated Circuit
- the second mobility management entity 90 or the second mobility management entity 100 may take the form shown in FIG.
- the receiving module 901, the determining module 902, and the transmitting module 903 in FIG. 9 can be implemented by the processor 301 and the memory 303 of FIG.
- the receiving module 901, the determining module 902, and the sending module 903 can be executed by calling the application code stored in the memory 303 by the processor 301, which is not limited in this embodiment.
- the processing module 1002 and the communication module 1001 in FIG. 10 may be implemented by the processor 301 and the memory 303 of FIG.
- the processing module 1002 and the communication module 1001 may be executed by calling the application code stored in the memory 303 by the processor 301, which is not limited in this embodiment.
- the second mobility management entity provided by the embodiment of the present application can be used to perform the foregoing communication method. Therefore, the technical effects that can be obtained by reference to the foregoing method embodiments are not described herein.
- the embodiment of the present application provides a chip system, where the chip system includes a processor, and is configured to support a communication device to implement the functions involved in the foregoing aspects, for example, if an abnormality occurs in the first mobility management entity, The first group identifier of the terminal group where the first terminal of the first mobility management entity service is located, and the first terminal related message is sent to the second mobility management entity.
- the chip system also includes a memory. The memory is used to store program instructions and data necessary for the communication device.
- the chip system may be composed of a chip, and may also include a chip and other discrete devices. This embodiment of the present application does not specifically limit this.
- the embodiment of the present application provides a chip system, where the chip system includes a processor, configured to support a second mobility management entity to implement the functions involved in the foregoing aspects, for example, receiving a first from a first mobility management entity.
- the chip system also includes a memory.
- the memory is used to save necessary program instructions and data of the second mobility management entity.
- the chip system may be composed of a chip, and may also include a chip and other discrete devices. This embodiment of the present application does not specifically limit this.
- the above embodiments it may be implemented in whole or in part by software, hardware, firmware, or any combination thereof.
- a software program it may be implemented in whole or in part in the form of a computer program product.
- the computer program product includes one or more computer instructions.
- the computer program instructions When the computer program instructions are loaded and executed on a computer, the processes or functions described in accordance with embodiments of the present application are generated in whole or in part.
- the computer can be a general purpose computer, a special purpose computer, a computer network, or other programmable device.
- the computer instructions can be stored in a computer readable storage medium or transferred from one computer readable storage medium to another computer readable storage medium, for example, the computer instructions can be from a website site, computer, server or data center Transmission to another website site, computer, server, or data center by wire (eg, coaxial cable, fiber optic, Digital Subscriber Line (DSL)) or wireless (eg, infrared, wireless, microwave, etc.).
- the computer readable storage medium can be any available media that can be accessed by a computer or a data storage device that includes one or more servers, data centers, etc. that can be integrated with the media.
- the usable medium may be a magnetic medium (eg, a floppy disk, a hard disk, a magnetic tape), an optical medium (eg, a DVD), or a semiconductor medium (such as a Solid State Disk (SSD)) or the like.
- a magnetic medium eg, a floppy disk, a hard disk, a magnetic tape
- an optical medium eg, a DVD
- a semiconductor medium such as a Solid State Disk (SSD)
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Databases & Information Systems (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephone Function (AREA)
Abstract
Description
AMF实体的名称 | 主组标识 | 备份组标识 |
AMF实体1 | 标识1、标识2、标识3 | 标识4、标识5、标识6 |
AMF实体2 | 标识4、标识5、标识6 | 标识1、标识2、标识3 |
AMF实体的名称 | 主组标识 | 备份组标识 |
AMF实体1 | 标识1、标识2、标识3 | 标识4、标识7、标识10 |
AMF实体2 | 标识4、标识5、标识6 | 标识1、标识8、标识11 |
AMF实体3 | 标识7、标识8、标识9 | 标识2、标识5、标识12 |
AMF实体4 | 标识10、标识11、标识12 | 标识3、标识6、标识9 |
主AMF实体的名称 | 组标识 | 备份AMF实体的名称 |
AMF实体1 | 标识1、标识2、标识3 | AMF实体2 |
AMF实体2 | 标识4、标识5、标识6 | AMF实体1 |
Claims (31)
- 一种通信方法,其特征在于,所述方法包括:通信设备获取第一移动管理实体服务的第一终端所在终端组的第一组标识;在所述第一移动管理实体发生异常的情况下,所述通信设备根据所述第一组标识,向第二移动管理实体发送所述第一终端相关的消息,其中,所述第二移动管理实体为存在所述第一终端的上下文的移动管理实体。
- 根据权利要求1所述的方法,其特征在于,所述第一组标识为配置在所述第一移动管理实体中的主组标识、配置在所述第二移动管理实体中的备份组标识。
- 根据权利要求1或2所述的方法,其特征在于,所述方法还包括:所述通信设备接收第一指示消息,所述第一指示消息用于指示所述第一组标识对应的终端组中的终端由所述第二移动管理实体提供服务。
- 根据权利要求3所述的方法,其特征在于,所述通信设备接收第一指示消息,包括:所述通信设备接收来自所述第二移动管理实体的所述第一指示消息,其中,所述第一指示消息为所述第二移动管理实体确定所述第一移动管理实体发生异常的情况下发送给所述通信设备的。
- 根据权利要求1或2所述的方法,其特征在于,所述方法还包括:所述通信设备接收第一指示消息,所述第一指示消息用于指示在所述第一移动管理实体发生异常的情况下,所述第一组标识对应的终端组中的终端由所述第二移动管理实体提供服务。
- 根据权利要求5所述的方法,其特征在于,所述通信设备接收第一指示消息,包括:在所述第一移动管理实体发生异常之前,所述通信设备接收所述第一指示消息;在所述第一移动管理实体发生异常的情况下,所述通信设备根据所述第一组标识,向第二移动管理实体发送所述第一终端相关的消息,包括:所述通信设备确定所述第一移动管理实体发生异常;所述通信设备根据所述第一组标识,向所述第二移动管理实体发送所述第一终端相关的消息。
- 根据权利要求1-6任一项所述的方法,其特征在于,所述通信设备获取第一移动管理实体服务的第一终端所在终端组的第一组标识,包括:所述通信设备接收所述第一终端相关的消息,其中,所述第一终端相关的消息中携带所述第一终端所在终端组的第一组标识;或者,所述通信设备从所述第一终端的上下文中确定所述第一终端所在终端组的第一组标识。
- 根据权利要求1-7任一项所述的方法,其特征在于,所述方法还包括:所述通信设备获取所述第一移动管理实体服务的第二终端所在终端组的第二组标识;在所述第一移动管理实体发生异常的情况下,所述通信设备根据所述第二组标识,向第三移动管理实体发送所述第二终端相关的消息,其中,所述第三移动管理实体为存在所述第二终端的上下文的移动管理实体。
- 根据权利要求1-8任一项所述的方法,其特征在于,所述通信设备包括接入设备或者会话管理实体。
- 一种通信方法,其特征在于,所述方法包括:第二移动管理实体接收来自第一移动管理实体的所述第一移动管理实体服务的第一终端的上下文;所述第二移动管理实体确定所述第一移动管理实体发生异常;所述第二移动管理实体向通信设备发送第一指示消息,所述第一指示消息用于指示第一组标识对应的终端组中的终端由所述第二移动管理实体提供服务,其中,所述第一组标识为所述第一终端所在终端组的组标识。
- 根据权利要求10所述的方法,其特征在于,所述方法还包括:所述第二移动管理实体接收来自所述通信设备的所述第一终端相关的消息。
- 根据权利要求10或11所述的方法,其特征在于,所述方法包括:所述第二移动管理实体接收来自第三移动管理实体的所述第三移动管理实体服务的第二终端的上下文;所述第二移动管理实体确定所述第三移动管理实体发生异常;所述第二移动管理实体向所述通信设备发送第二指示消息,所述第二指示消息用于指示第二组标识对应的终端组中的终端由所述第二移动管理实体提供服务,其中,所述第二组标识为所述第二终端所在终端组的组标识。
- 一种通信设备,其特征在于,所述通信设备包括:获取模块和发送模块;所述获取模块,用于获取第一移动管理实体服务的第一终端所在终端组的第一组标识;所述发送模块,用于在所述第一移动管理实体发生异常的情况下,根据所述第一组标识,向第二移动管理实体发送所述第一终端相关的消息,其中,所述第二移动管理实体为存在所述第一终端的上下文的移动管理实体。
- 根据权利要求13所述的通信设备,其特征在于,所述第一组标识为配置在所述第一移动管理实体中的主组标识、配置在所述第二移动管理实体中的备份组标识。
- 根据权利要求13或14所述的通信设备,其特征在于,所述通信设备还包括:接收模块;所述接收模块,用于接收第一指示消息,所述第一指示消息用于指示所述第一组标识对应的终端组中的终端由所述第二移动管理实体提供服务。
- 根据权利要求15所述的通信设备,其特征在于,所述接收模块具体用于:接收来自所述第二移动管理实体的所述第一指示消息,其中,所述第一指示消息为所述第二移动管理实体确定所述第一移动管理实体发生异常的情况下发送给所述通信设备的。
- 根据权利要求13或14所述的通信设备,其特征在于,所述通信设备还包括:接收模块;所述接收模块,用于接收第一指示消息,所述第一指示消息用于指示在所述第一移动管理实体发生异常的情况下,所述第一组标识对应的终端组中的终端由所述第二移动管理实体提供服务。
- 根据权利要求17所述的通信设备,其特征在于,所述接收模块具体用于:在所述第一移动管理实体发生异常之前,接收所述第一指示消息;所述发送模块具体用于:确定所述第一移动管理实体发生异常;根据所述第一组标识,向所述第二移动管理实体发送所述第一终端相关的消息。
- 根据权利要求13-18任一项所述的通信设备,其特征在于,所述获取模块具体用于:接收所述第一终端相关的消息,其中,所述第一终端相关的消息中携带所述第一终端所在终端组的第一组标识;或者,从所述第一终端的上下文中确定所述第一终端所在终端组的第一组标识。
- 根据权利要求13-19任一项所述的通信设备,其特征在于,所述获取模块,还用于获取所述第一移动管理实体服务的第二终端所在终端组的第二组标识;所述发送模块,还用于在所述第一移动管理实体发生异常的情况下,根据所述第二组标识,向第三移动管理实体发送所述第二终端相关的消息,其中,所述第三移动管理实体为存在所述第二终端的上下文的移动管理实体。
- 根据权利要求13-20任一项所述的通信设备,其特征在于,所述通信设备包括接入设备或者会话管理实体。
- 一种第二移动管理实体,其特征在于,所述第二移动管理实体包括:接收模块、确定模块和发送模块;所述接收模块,用于接收来自第一移动管理实体的所述第一移动管理实体服务的第一终端的上下文;所述确定模块,用于确定所述第一移动管理实体发生异常;所述发送模块,用于向通信设备发送第一指示消息,所述第一指示消息用于指示第一组标识对应的终端组中的终端由所述第二移动管理实体提供服务,其中,所述第一组标识为所述第一终端所在终端组的组标识。
- 根据权利要求22所述的第二移动管理实体,其特征在于,所述接收模块,还用于接收来自所述通信设备的所述第一终端相关的消息。
- 根据权利要求22或23所述的第二移动管理实体,其特征在于,所述接收模块,还用于接收来自第三移动管理实体的所述第三移动管理实体服务的第二终端的上下文;所述确定模块,还用于确定所述第三移动管理实体发生异常;所述发送模块,还用于向所述通信设备发送第二指示消息,所述第二指示消息用于指示第二组标识对应的终端组中的终端由所述第二移动管理实体提供服务,其中,所述第二组标识为所述第二终端所在终端组的组标识。
- 一种通信设备,其特征在于,包括:处理器、存储器;所述存储器用于存储计算机执行指令,当所述通信设备运行时,所述处理器执行所述存储器存储的所述计算机执行指令,以使所述通信设备执行如权利要求1-9中任意一项所述的通信方法。
- 一种第二移动管理实体,其特征在于,包括:处理器、存储器;所述存储器用于存储计算机执行指令,当所述第二移动管理实体运行时,所述处理器执行所述存储器存储的所述计算机执行指令,以使所述第二移动管理实体执行如权利要求10-12中任意一项所述的通信方法。
- 一种通信系统,其特征在于,所述通信系统包括第一移动管理实体、第二移动管理实体以及通信设备;其中,所述第一移动管理实体,用于向所述第二移动管理实体发送所述第一移动管理实体服务的第一终端的上下文;所述第二移动管理实体,用于接收来自所述第一移动管理实体的所述第一终端的上下文;所述通信设备,用于获取所述第一终端所在终端组的第一组标识,并在所述第一移动管理实体发生异常的情况下,根据所述第一组标识,向所述第二移动管理实体发送所述第一终端相关的消息;所述第二移动管理实体,还用于接收来自所述通信设备的所述第一终端相关的消息。
- 根据权利要求27所述的通信系统,其特征在于,所述第二移动管理实体,还用于确定所述第一移动管理实体发生异常;所述第二移动管理实体,还用于向所述通信设备发送第一指示消息,所述第一指示消息用于指示所述第一组标识对应的终端组中的终端由所述第二移动管理实体提供服务;所述通信设备,还用于接收所述第一指示消息。
- 根据权利要求27所述的通信系统,其特征在于,所述通信设备,还用于在所述第一移动管理实体发生异常之前,接收第一指示消息,所述第一指示消息用于指示在所述第一移动管理实体发生异常的情况下,所述第一组标识对应的终端组中的终端由所述第二移动管理实体提供服务;所述通信设备,还用于确定所述第一移动管理实体发生异常。
- 一种计算机可读存储介质,该计算机可读存储介质中存储有指令,当其在计算机上运行时,使得计算机可以执行如权利要求1-9中任意一项所述的通信方法。
- 一种计算机可读存储介质,该计算机可读存储介质中存储有指令,当其在计算机上运行时,使得计算机可以执行如权利要求10-12中任意一项所述的通信方法。
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP21194902.9A EP4007437B1 (en) | 2017-07-31 | 2018-07-26 | Communication methods and access device |
EP18840816.5A EP3657869B1 (en) | 2017-07-31 | 2018-07-26 | Communication method, device and system |
BR112020002055-9A BR112020002055A2 (pt) | 2017-07-31 | 2018-07-26 | método de comunicação, dispositivo de comunicações e sistema de comunicações |
US16/748,340 US11184757B2 (en) | 2017-07-31 | 2020-01-21 | Communication method, communications device, and communications system |
US17/478,218 US11968743B2 (en) | 2017-07-31 | 2021-09-17 | Communication method, communications device, and communications system |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710640133.9A CN109327849B (zh) | 2017-07-31 | 2017-07-31 | 通信方法、设备及系统 |
CN201710640133.9 | 2017-07-31 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/748,340 Continuation US11184757B2 (en) | 2017-07-31 | 2020-01-21 | Communication method, communications device, and communications system |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2019024747A1 true WO2019024747A1 (zh) | 2019-02-07 |
Family
ID=65233507
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2018/097138 WO2019024747A1 (zh) | 2017-07-31 | 2018-07-26 | 通信方法、设备及系统 |
Country Status (6)
Country | Link |
---|---|
US (2) | US11184757B2 (zh) |
EP (2) | EP4007437B1 (zh) |
CN (2) | CN109327849B (zh) |
BR (1) | BR112020002055A2 (zh) |
ES (1) | ES2944910T3 (zh) |
WO (1) | WO2019024747A1 (zh) |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3603214A1 (en) * | 2017-03-20 | 2020-02-05 | Telefonaktiebolaget LM Ericsson (PUBL) | Methods and arrangements for transferring management of wireless devices between core network nodes of a wireless communication network |
FR3072537A1 (fr) * | 2017-10-17 | 2019-04-19 | Orange | Procede de basculement d'un equipement de gestion dans un reseau de telecommunications |
US11310662B2 (en) * | 2018-12-12 | 2022-04-19 | Bank Of America Corporation | System for 5G enabled rapid bandwidth deployment |
CN111770123B (zh) * | 2019-04-02 | 2022-01-11 | 华为技术有限公司 | 通信方法、设备及存储介质 |
CN110167052B (zh) * | 2019-04-04 | 2022-05-10 | 南京邮电大学 | 一种基于池技术的amf网元部署系统及运行方法 |
CN110366276B (zh) * | 2019-07-03 | 2022-04-12 | 中国联合网络通信集团有限公司 | 服务化架构基站 |
CN112203265B (zh) * | 2020-11-02 | 2022-08-02 | 中国联合网络通信集团有限公司 | 上下文信息重建方法、mme、msc/vlr及hss |
CN114945002B (zh) * | 2021-02-09 | 2023-07-25 | 大唐移动通信设备有限公司 | Amf选择方法、装置、网络设备及存储介质 |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101247255A (zh) * | 2007-02-13 | 2008-08-20 | 华为技术有限公司 | 一种处理故障的方法及系统 |
CN102740266A (zh) * | 2011-04-12 | 2012-10-17 | 中兴通讯股份有限公司 | 一种上下文的同步方法及系统 |
US20140219178A1 (en) * | 2012-01-20 | 2014-08-07 | Verizon Patent And Licensing Inc. | Optimizing user device context for mobility management entity (mme) resiliency |
Family Cites Families (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7099477B2 (en) * | 2004-10-21 | 2006-08-29 | International Business Machines Corporation | Method and system for backup and restore of a context encryption key for a trusted device within a secured processing system |
US20080065637A1 (en) * | 2005-04-14 | 2008-03-13 | Emc Corporation | Locating last processed data |
CN101043712B (zh) * | 2006-03-22 | 2010-05-12 | 华为技术有限公司 | 在无线通信系统中实现切换的方法及系统 |
CN101730124A (zh) * | 2008-10-29 | 2010-06-09 | 华为技术有限公司 | 恢复业务的方法、装置和系统 |
US20110235505A1 (en) * | 2010-03-29 | 2011-09-29 | Hitachi, Ltd. | Efficient deployment of mobility management entity (MME) with stateful geo-redundancy |
ES2540991T3 (es) * | 2010-05-11 | 2015-07-15 | Nec Europe Ltd. | Método para manejar el fallo de una MME en un sistema de paquetes evolucionado |
JP5664988B2 (ja) * | 2010-09-08 | 2015-02-04 | ▲ホア▼▲ウェイ▼技術有限公司 | ページング処理方法およびシステム、サービングゲートウェイ |
CN102520916B (zh) | 2011-11-28 | 2015-02-11 | 深圳中微电科技有限公司 | 在mvp处理器中消除纹理延迟和寄存器管理的方法 |
US8908603B2 (en) * | 2012-01-24 | 2014-12-09 | Telefonaktiebolaget L M Ericsson (Publ) | MME restoration |
BR112014017934A8 (pt) * | 2012-01-24 | 2017-07-11 | Ericsson Telefon Ab L M | Recuperação de mme |
US9185584B1 (en) * | 2013-06-06 | 2015-11-10 | Sprint Spectrum L.P. | Dual controller functionality in a wireless communication system |
WO2016144245A1 (en) * | 2015-03-09 | 2016-09-15 | Telefonaktiebolaget Lm Ericsson (Publ) | User equipment registration recovery upon core node failure |
US10582522B2 (en) * | 2015-09-04 | 2020-03-03 | Lg Electronics Inc. | Data transmission and reception method and device of terminal in wireless communication system |
US9608860B1 (en) * | 2016-03-28 | 2017-03-28 | Affirmed Networks Communications Technologies, Inc. | Synchronized MME pool |
WO2017175715A1 (ja) * | 2016-04-05 | 2017-10-12 | シャープ株式会社 | 端末装置、基地局装置、MME(Mobility Management Entity)及び通信制御方法 |
EP3432641B1 (en) * | 2017-01-09 | 2022-10-05 | LG Electronics Inc. | Method for interworking between networks in wireless communication system and apparatus therefor |
-
2017
- 2017-07-31 CN CN201710640133.9A patent/CN109327849B/zh active Active
- 2017-07-31 CN CN202111433177.7A patent/CN114339910A/zh active Pending
-
2018
- 2018-07-26 EP EP21194902.9A patent/EP4007437B1/en active Active
- 2018-07-26 BR BR112020002055-9A patent/BR112020002055A2/pt unknown
- 2018-07-26 EP EP18840816.5A patent/EP3657869B1/en active Active
- 2018-07-26 ES ES21194902T patent/ES2944910T3/es active Active
- 2018-07-26 WO PCT/CN2018/097138 patent/WO2019024747A1/zh unknown
-
2020
- 2020-01-21 US US16/748,340 patent/US11184757B2/en active Active
-
2021
- 2021-09-17 US US17/478,218 patent/US11968743B2/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101247255A (zh) * | 2007-02-13 | 2008-08-20 | 华为技术有限公司 | 一种处理故障的方法及系统 |
CN102740266A (zh) * | 2011-04-12 | 2012-10-17 | 中兴通讯股份有限公司 | 一种上下文的同步方法及系统 |
US20140219178A1 (en) * | 2012-01-20 | 2014-08-07 | Verizon Patent And Licensing Inc. | Optimizing user device context for mobility management entity (mme) resiliency |
Non-Patent Citations (1)
Title |
---|
See also references of EP3657869A4 |
Also Published As
Publication number | Publication date |
---|---|
BR112020002055A2 (pt) | 2020-09-08 |
CN114339910A (zh) | 2022-04-12 |
CN109327849A (zh) | 2019-02-12 |
US11968743B2 (en) | 2024-04-23 |
EP4007437B1 (en) | 2023-03-29 |
EP3657869A1 (en) | 2020-05-27 |
EP4007437A1 (en) | 2022-06-01 |
US11184757B2 (en) | 2021-11-23 |
US20220007167A1 (en) | 2022-01-06 |
ES2944910T3 (es) | 2023-06-27 |
US20200162888A1 (en) | 2020-05-21 |
EP3657869A4 (en) | 2020-08-26 |
EP3657869B1 (en) | 2021-11-17 |
CN109327849B (zh) | 2021-12-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11612013B2 (en) | Data transmission method, device, and system | |
US11812484B2 (en) | Data transmission method, device, and data transmission system | |
WO2019024747A1 (zh) | 通信方法、设备及系统 | |
CN110049485B (zh) | 一种配置ue的策略的方法、装置和系统 | |
WO2018214597A1 (zh) | 接入网类型选择方法、设备及系统 | |
US11716667B2 (en) | Handover method, device, and system | |
WO2019120073A1 (zh) | 数据传输方法、设备及系统 | |
US10897699B2 (en) | Subscription update method, device, and system | |
WO2019223702A1 (zh) | 管理pdu会话的方法、装置和系统 | |
WO2019174437A1 (zh) | 地址管理方法、设备及系统 | |
WO2018191867A1 (zh) | 终端监控信息的同步方法、设备及系统 | |
WO2019015627A1 (zh) | 切换方法、设备及系统 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 18840816 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
REG | Reference to national code |
Ref country code: BR Ref legal event code: B01A Ref document number: 112020002055 Country of ref document: BR |
|
ENP | Entry into the national phase |
Ref document number: 2018840816 Country of ref document: EP Effective date: 20200219 |
|
ENP | Entry into the national phase |
Ref document number: 112020002055 Country of ref document: BR Kind code of ref document: A2 Effective date: 20200130 |