WO2019223658A1 - 一种确定背景流量传输策略的方法及装置 - Google Patents
一种确定背景流量传输策略的方法及装置 Download PDFInfo
- Publication number
- WO2019223658A1 WO2019223658A1 PCT/CN2019/087653 CN2019087653W WO2019223658A1 WO 2019223658 A1 WO2019223658 A1 WO 2019223658A1 CN 2019087653 W CN2019087653 W CN 2019087653W WO 2019223658 A1 WO2019223658 A1 WO 2019223658A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- network element
- information
- background traffic
- terminal device
- traffic transmission
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W28/00—Network traffic management; Network resource management
- H04W28/02—Traffic management, e.g. flow control or congestion control
- H04W28/04—Error control
Definitions
- the present application relates to the field of communication technologies, and in particular, to a method and an apparatus for determining a background traffic transmission strategy.
- Background traffic can also be called background data (BD), which is usually defined as non-real-time interactive traffic, such as traffic transmitted by software update packages, software notification messages, and vehicle map information.
- BD background data
- the policy control network element Before the background traffic is transmitted, for the transmission of background traffic, the policy control network element usually formulates a background traffic transmission policy for the service network element, so that the terminal equipment corresponding to the subsequent service network element performs the background traffic according to the background traffic transmission policy. transmission.
- different service network elements will request different background traffic transmission policies from different policy control network elements, and different policy control network elements can only formulate corresponding background traffic based on the requests of their own service network elements. Transmission strategy. This usually results in conflicts in background traffic transmission strategies between different service network elements, and subsequently causes background traffic transmission to fail.
- the background traffic transmission policies of multiple service network elements instruct their respective terminal devices to transmit background traffic between 1 AM and 2 AM. In this way, the transmission of background traffic by multiple terminal devices in the same period may cause the network Slow, which may cause background traffic to fail.
- the present application provides a method and device for determining a background traffic transmission strategy, which are used to resolve conflicts between background traffic transmission strategies formulated by different policy control network elements for different service network elements in the prior art, and subsequently cause background traffic transmission.
- the problem of failure is used to resolve conflicts between background traffic transmission strategies formulated by different policy control network elements for different service network elements in the prior art, and subsequently cause background traffic transmission.
- the present application provides a method for determining a background traffic transmission strategy.
- the method includes:
- the first policy control network element receives first information from the requesting device, and the first information is used to request a background traffic transmission policy of the first terminal device; the first policy control network element analyzes the data according to the first information.
- the network element for example, NWDAF network element
- sends second information the second information is used to request the background traffic of the first terminal device to transmit the data analysis result; the first policy control network element receives the background of the first terminal device from the data analysis network element Traffic transmission data analysis result.
- the background traffic transmission data analysis result of the first terminal device is determined by the data analysis network element based on the target background traffic transmission policy of the second terminal device.
- the second terminal device is different from the first terminal device.
- the target background traffic transmission policy of the two terminal devices is used for the background traffic transmission of the second terminal device.
- the first policy controls the network element to send the background traffic transmission policy of the first terminal device to the requesting device.
- the background traffic transmission policy of the first terminal device is The first policy control network element determines according to the third information, and the third information includes the background flow of the first terminal device. Analysis results of the transmission data.
- the data analysis result of the background traffic transmission data of the first terminal device determined by the data analysis network element based on the target background traffic transmission policy of the other terminal device can further enable the first policy to control the network element.
- a background traffic transmission policy of the first terminal device is determined, so that the background traffic transmission policy of the first terminal device determined by the first policy control network element refers to other terminal devices, so that the first policy control network element can determine the first terminal device.
- the background traffic transmission strategy of the device does not conflict with the background traffic transmission strategy of other terminal devices, thereby solving the problem of background traffic transmission failure.
- the third information further includes: a background traffic transmission query result of the first terminal device and / or a local background traffic transmission policy of the first terminal device. This can make the background traffic transmission policy of the first terminal device determined by the first policy control network element more accurate.
- the method further includes: when the third information further includes a background traffic transmission query result of the first terminal device, the first policy control network element obtains the background traffic transmission query result of the first terminal device from the database network element. Or when the third information further includes a local background traffic transmission policy of the first terminal device, the first policy control network element obtains the local background traffic transmission policy of the first terminal device from the first policy control network element; or, when the first information
- the three pieces of information also include a background traffic transmission query result of the first terminal device and a local background traffic transmission policy of the first terminal device, the first policy control network element obtains a background traffic transmission query result of the first terminal device from the database network element, and The first policy control network element obtains a local background traffic transmission policy of the first terminal device from the first policy control network element.
- the first policy control network element can subsequently accurately determine the background traffic transmission policy of the first terminal device according to the third information.
- the first policy control network element determines that the background traffic transmission policy of the first terminal device is a target background traffic transmission policy of the first terminal device.
- the target background traffic transmission policy of a terminal device is used for the background traffic transmission of the first terminal device; after that, the first policy control network element sends the target background traffic transmission policy of the first terminal device to the data analysis network element; or the first policy control The network element sends the target background traffic transmission policy of the first terminal device to the database network element; or the first policy control network element sends the target background traffic transmission policy of the first terminal device to both the data analysis network element and the database network element.
- the data analysis network element can save the target background traffic transmission policy of the first terminal device, and then after other terminal devices request the data analysis network element for the corresponding background traffic transmission data analysis result, the data analysis network element can refer to The target background traffic transmission policy of the first terminal device determines the analysis results of background traffic transmission data of other terminal devices for other terminal devices, so that subsequent background traffic transmission policies of other terminal devices and the target background traffic transmission policy of the first terminal device are in between. This can reduce conflicts, which in turn can successfully transmit background traffic from other terminal devices.
- the database network element may save the target background traffic transmission policy of the first terminal device, so that subsequent data analysis network elements may obtain the target background traffic transmission policy of the first terminal device from the database network element, thereby achieving the foregoing beneficial effects.
- the first policy controls the network element to receive the target background traffic transmission policy of the first terminal device from the requesting device, and the target background of the first terminal device.
- the traffic transmission policy is selected by the requesting device according to the background traffic transmission policy of the first terminal device; after that, the first policy control network element sends the target background traffic transmission policy of the first terminal device to the data analysis network element; or the first policy control network The element sends the target background traffic transmission policy of the first terminal device to the database network element; or the first policy control network element sends the target background traffic transmission policy of the first terminal device to both the data analysis network element and the database network element.
- the data analysis network element can save the target background traffic transmission policy of the first terminal device, and then after other terminal devices request the data analysis network element for the corresponding background traffic transmission data analysis result, the data analysis network element can refer to The target background traffic transmission policy of the first terminal device determines the analysis results of background traffic transmission data of other terminal devices for other terminal devices, so that subsequent background traffic transmission policies of other terminal devices and the target background traffic transmission policy of the first terminal device are in between. This can reduce conflicts, which in turn can successfully transmit background traffic from other terminal devices.
- the database network element may save the target background traffic transmission policy of the first terminal device, so that subsequent data analysis network elements may obtain the target background traffic transmission policy of the first terminal device from the database network element, thereby achieving the foregoing beneficial effects.
- the requesting device is a first terminal device or a service network element serving the first terminal device. In this way, both the request for the uplink background traffic transmission strategy and the request for the downlink background traffic transmission strategy can be realized, and the request for the background traffic transmission strategy can be more flexible.
- the analysis result of the background traffic transmission data includes: the first data value of the transmission time window of the background traffic; the analysis result of the background traffic transmission data analysis further includes: the first data value of the background traffic transmission bandwidth, the first terminal At least one of location information of the device and an identifier of the first terminal device.
- the first policy control network element can determine the background traffic transmission policy of the first terminal device by using the content included in the analysis result of the background traffic transmission data.
- the location information of the first terminal device may be one or more of the following information: a network area, a RAN device ID, a cell ID, and a global positioning system (GPS).
- GPS global positioning system
- the identifier of the first terminal device may be one or more of the following: an Internet Protocol address (IP), a permanent identifier (subscription identifier) (SUPI), and a permanent equipment identifier (permanent equipment identifier).
- IP Internet Protocol address
- SUPI subscription identifier
- a permanent equipment identifier permanent equipment identifier
- PEI general public subscription identifier
- IMSI international mobile subscriber identifier
- IMEI international mobile equipment identity
- MSISDN mobile station international integrated service digital network number
- the background traffic transmission strategy includes: the second data value of the transmission time window of the background traffic; the background traffic transmission strategy further includes: the second data value of the transmission bandwidth of the background traffic, and the location information of the first terminal device And at least one of the identities of the first terminal device.
- the first terminal device can subsequently be used to perform background traffic transmission through the background traffic transmission policy.
- the second information includes the magnitude of the background traffic of the first terminal device; the second information also includes the identity of the first policy control network element, the identity of the requesting device, and the background traffic of the first terminal device At least one of the third data value of the transmission time window, the location information of the first terminal device, and the identifier of the first terminal device.
- the data analysis network element can accurately determine the analysis result of the background traffic transmission data of the first terminal device in combination with the content included in the second information.
- the first information includes the magnitude of the background traffic of the first terminal device; the first information further includes an identifier of the requesting device, and a third data value of the transmission time window of the background traffic of the first terminal device. At least one of location information of the first terminal device and an identifier of the first terminal device.
- the first policy control network element can learn the requirements of the first terminal device by using the content included in the first information, so that subsequent background traffic transmission policies that satisfy the requirements are requested for the first terminal device.
- the query result of the background traffic transmission includes: the fourth data value of the transmission time window of the background traffic; the query result of the background traffic transmission further includes: the fourth data value of the transmission bandwidth of the background traffic, the At least one of location information and an identifier of the first terminal device.
- the transmission strategy of the local background traffic includes: a fifth data value of a transmission time window of the background traffic; the transmission result of the local background traffic further includes: a fifth data value of a transmission bandwidth of the background traffic, a At least one of location information and an identifier of the first terminal device.
- the first policy control network element when the first policy control network element sends the background traffic transmission policy of the first terminal device to the requesting device, the first policy control network element may also send identification information to the requesting device, and the identification information is used to identify the first A target background traffic transmission policy for a terminal device.
- the target background traffic of the first terminal device can be determined from the background traffic of the first terminal device by using the identification information.
- the first policy control network element when the first policy control network element sends the target background traffic transmission policy of the first terminal device to the data analysis network element, the first policy control network element may also send identification information and a request to the data analysis network element. At least one of the identifier of the device and the identifier of the first policy control network element; or when the first policy control network element sends the target background traffic transmission policy of the first terminal device to the data analysis network element, the first policy control network element It may also send at least one of the identification information, the identification of the requesting device, and the identification of the first policy control network element to the database network element; or the first policy control network element sends the first terminal to the data analysis network element and the database network element. When the target background traffic of the device transmits a policy, the first policy control network element may also send at least one of identification information, a requesting device identification, and an identification of the first policy control network element to the data analysis network element and the database network element.
- the data analysis network element can determine that the target background traffic transmission policy of the first terminal device is formulated for the requesting device or the first policy control network element, so that subsequent data analysis network elements are the requesting device, other requesting devices, and the first policy.
- a control network element or other policy controlling terminal device on the network element that is different from the first terminal device formulates a target background traffic transmission policy.
- the database network element stores the target background traffic transmission strategy and identification information of the first terminal device, so that when the requesting device wants to transmit background traffic, the identification information can be queried from the database network element to obtain the first terminal device corresponding to the identification information.
- Target background traffic transmission strategy is the target background traffic transmission strategy.
- the first policy network element may further receive identification information from the requesting device.
- the first policy control network element can query the target background traffic transmission policy of the first terminal device from the database network element through the identification information, and then send the target background traffic transmission policy of the first terminal device to the first terminal device, and the wireless access device At least one of a network access element, a user plane function network element, and a service network element.
- the present application provides a method for determining a background traffic transmission strategy.
- the method includes:
- the data analysis network element receives the second information from the first policy control network element.
- the second information is used to request the background traffic of the first terminal device to transmit the data analysis result.
- the second information is received by the first policy control network element from the first device.
- An information is determined, the first information is used to request a background traffic transmission policy of the first terminal device; the data analysis network element sends the background traffic transmission data analysis result of the first terminal device to the first policy control network element, and the background of the first terminal device
- the traffic transmission data analysis result is determined by the data analysis network element based on the target background traffic transmission policy of the second terminal device.
- the second terminal device is different from the first terminal device.
- the target background traffic transmission policy of the second terminal device is used for the second terminal.
- the device transmits background traffic.
- the data analysis network element determines the background traffic transmission data analysis result of the first terminal device based on the target background traffic transmission policy of the other terminal device (that is, the second terminal device), so that the first policy control network element can determine the The background traffic transmission policy of the first terminal device, so that the background traffic transmission policy of the first terminal device determined by the first policy control network element refers to other terminal devices, so that the first policy device can control the first terminal device determined by the network element.
- the background traffic transmission strategy of the device does not conflict with the background traffic transmission strategy of other terminal devices, thereby solving the problem of background traffic transmission failure.
- the background traffic transmission data analysis result of the first terminal device may be further analyzed by the data analysis network element based on the target background traffic transmission policy and the second information of the second terminal device, and the load information and functions of the functional network element. It is determined by at least one of two items of capacity information of the network element.
- the analysis result of the background traffic transmission data of the first terminal device analyzed by the data analysis network element can be more reliable.
- the data analysis network element cannot obtain the target background traffic transmission policy of any terminal device.
- the first The analysis result of the background traffic transmission data of a terminal device may be determined by the data analysis network element based on at least one of the second information, the load information of the functional network element, and the capacity information of the functional network element.
- the initial background traffic transmission data analysis result of the first terminal device can be accurately analyzed by the data analysis network element, so that the background traffic transmission policy of the first terminal device can be obtained subsequently.
- the data analysis network element may also obtain a target background traffic transmission policy of the second terminal device.
- the data analysis network element can accurately determine the background traffic transmission data analysis result of the first terminal device based on the target background traffic transmission policy of the second terminal device.
- the data analysis network element acquiring the target background traffic transmission policy of the second terminal device may specifically include: the data analysis network element receiving the target background traffic transmission policy of the second terminal device from the first device, where the first The device is any one or more of the following: a second terminal device, a first policy control network element, a second policy control network element, a second service network element, and a second database network element, wherein the first policy control network element, The second policy control network element, the second service network element, and the second database network element serve the second terminal device.
- the data analysis network element can successfully obtain the target background traffic transmission policy of the second terminal device in multiple ways, so that the subsequent data analysis network element determines the analysis result of the background traffic transmission data of the first terminal device.
- the data analysis network element may also obtain the load information of the function network element; or, the data analysis network element may also obtain the capacity information of the function network element; or the data analysis network element may also obtain the load of the function network element Information and capacity information of functional network elements.
- the data analysis network element can determine the accuracy of the first terminal device more accurately based on the load information of the function network element, or the capacity information of the function network element, or the load information of the function network element and the capacity information of the function network element. Analysis results of background traffic transmission data.
- the data analysis network element obtaining the load information of the functional network element may specifically include: the data analysis network element receiving the load information of the function network element from the function network element or the operation management and maintenance network element; or the data analysis network element obtaining
- the capacity information of the functional network element may specifically include: the data analysis network element receives the capacity information of the function network element from the function network element or the operation management and maintenance network element; or the data analysis network element obtains the load information of the function network element and the capacity of the function network element
- the information may specifically include: the data analysis network element receives the load information of the function network element and the capacity information of the function network element from the function network element or the operation management and maintenance network element.
- the data analysis network element can successfully obtain the load information of the function network element, or the capacity information of the function network element, or the load information of the function network element and the capacity information of the function network element, in order to enable subsequent data.
- the analysis network element accurately determines the background traffic transmission data analysis result of the first terminal device.
- the functional network element includes a first policy control network element serving the first terminal device, a session management function network element, a radio access network network element, an access and mobility management function network element, and a user plane. At least one of the functional network elements.
- the data analysis network element may further receive a target background traffic transmission policy of the first terminal device, where the first terminal device performs background traffic transmission according to the target background traffic transmission policy of the first terminal device.
- the data analysis network element can save the target background traffic transmission policy of the first terminal device, and then after other terminal devices request the corresponding background traffic transmission data analysis result from the data analysis network element, the data analysis network element can refer to the first
- the target background traffic transmission policy of a terminal device determines the analysis results of the background traffic transmission data of other terminal devices for other terminal devices, so that subsequent background traffic transmission policies of other terminal devices and the target background traffic transmission policy of the first terminal device can be Reducing conflicts can in turn cause background traffic of other terminal devices to be transmitted successfully.
- the data analysis network element receiving the target background traffic transmission policy of the first terminal device may specifically include: the data analysis network element receiving the target background traffic transmission policy of the first terminal device from the second device, wherein the first The two devices are any one or more of the following: a first terminal device, a first policy control network element, a first service network element, and a first database network element, wherein the first policy control network element, the first service network element, The first database network element serves a first terminal device.
- the data analysis network element can obtain the target background traffic transmission policy of the first terminal device in multiple ways, so that the data analysis network element can save the target background traffic transmission policy of the first terminal device, and then other terminals later
- the data analysis network element may refer to the target background traffic transmission policy of the first terminal device to determine the other terminal device ’s background traffic transmission data analysis result for other terminal devices. Conflicts between subsequent background traffic transmission policies of other terminal devices and the target background traffic transmission policy of the first terminal device can be reduced, and the background traffic transmission of other terminal devices can be successful.
- the data analysis network element when the data analysis network element receives the target background traffic transmission policy of the first terminal device, the data analysis network element may also receive the identity of the requesting device, or may also receive the identity of the first policy control network element, Alternatively, the identifier of the requesting device and the identifier of the first policy control network element may also be received.
- the data analysis network element can determine that the target background traffic transmission policy of the first terminal device is formulated for the requesting device or the first policy control network element, which is convenient for the data analysis network element to be the requesting device, other requesting devices, and the first policy control network.
- An element or other policy controls a terminal device on the network element that is different from the first terminal device to formulate a target background traffic transmission policy.
- the analysis result of the background traffic transmission data includes: the first data value of the transmission time window of the background traffic; the analysis result of the background traffic transmission data analysis further includes: the first data value of the background traffic transmission bandwidth, and the first terminal. At least one of location information of the device and an identifier of the first terminal device.
- the first policy control network element can determine the background traffic transmission policy of the first terminal device by using the content included in the analysis result of the background traffic transmission data.
- the background traffic transmission strategy includes: the second data value of the transmission time window of the background traffic; the background traffic transmission strategy further includes: the second data value of the transmission bandwidth of the background traffic, and the location information of the first terminal device And at least one of the identities of the first terminal device.
- the first terminal device can subsequently be used to perform background traffic transmission through the background traffic transmission policy.
- the second information includes the size of the background traffic of the first terminal device; the second information also includes the identification of the first policy control network element, the identification of the requesting device, and the background traffic of the first terminal device. At least one of a third data value of the transmission time window, location information of the first terminal device, and an identifier of the first terminal device.
- the data analysis network element can accurately determine the background traffic transmission data analysis result of the first terminal device in combination with the content included in the second information.
- the first information includes the magnitude of the background traffic of the first terminal device; the first information further includes a request device identifier, a third data value of a transmission time window of the background traffic of the first terminal device, At least one of location information of the first terminal device and an identifier of the first terminal device.
- the first policy control network element can learn the requirements of the first terminal device through the content included in the first information, so that the data analysis network element can subsequently request the data analysis result of the background traffic of the first terminal device from the data analysis network element.
- the present application provides a method for determining a background traffic transmission strategy.
- the method includes:
- the first terminal device sends first information to the first policy control network element, and the first information is used to request a background traffic transmission policy of the first terminal device; the first terminal device receives the background of the first terminal device from the first policy control network element A traffic transmission policy, where the background traffic transmission policy of the first terminal device is determined by the first policy control network element according to the third information, and the third information includes a background traffic transmission data analysis result of the first terminal device from the data analysis network element.
- the background traffic transmission policy of the first terminal device is determined by the first policy control network element according to the third information, and the third information includes the analysis result of the background traffic transmission data of the first terminal device from the data analysis network element.
- the background traffic transmission policy of the first terminal device determined by the first policy control network element refers to other terminal devices, so that the background traffic transmission policy of the first terminal device and the background traffic transmission policy between other terminal devices do not conflict. This can solve the problem of background traffic transmission failure.
- a request for an uplink background traffic transmission policy of the first terminal device can also be implemented.
- the third information further includes: a background traffic transmission query result of the first terminal device and / or a local background traffic transmission policy of the first terminal device.
- the first policy control network element can subsequently accurately determine the background traffic transmission policy of the first terminal device according to the third information.
- the method further includes: the first terminal device determines that the background traffic transmission policy of the first terminal device is a target background traffic transmission policy of the first terminal device The first terminal device sends a target background traffic transmission policy of the first terminal device to the data analysis network element.
- the data analysis network element can save the target background traffic transmission policy of the first terminal device, and then after other terminal devices request the data analysis network element for the corresponding background traffic transmission data analysis result, the data analysis network element can refer to The target background traffic transmission policy of the first terminal device determines the analysis results of background traffic transmission data of other terminal devices for other terminal devices, so that subsequent background traffic transmission policies of other terminal devices and the target background traffic transmission policy of the first terminal device are in between. This can reduce conflicts, which in turn can successfully transmit background traffic from other terminal devices.
- the method when there are multiple background traffic transmission policies of the first terminal device, the method further includes: the first terminal device selects the target background traffic transmission of the first terminal device according to the background traffic transmission policies of the first terminal device Policy; the first terminal sends a target background traffic transmission policy of the first terminal device to the first policy control network element.
- the first policy control network element when it receives the target background traffic transmission policy of the first terminal device, it can send the target background traffic transmission policy of the first terminal device to the data analysis network element, so that the data analysis network element
- the data analysis network element may refer to the target background traffic transmission policy of the first terminal device. Determining the background traffic transmission data analysis results of other terminal equipment for other terminal equipment, so that the subsequent background traffic transmission strategy of other terminal equipment and the target background traffic transmission strategy of the first terminal equipment can reduce conflicts, and can be other terminal equipment Background traffic was transmitted successfully.
- the first terminal device may further send a target background traffic transmission policy of the first terminal device to the data analysis network element.
- the data analysis network element can save the target background traffic transmission policy of the first terminal device, and then after other terminal devices request the data analysis network element for the corresponding background traffic transmission data analysis result, the data analysis network element can refer to The target background traffic transmission policy of the first terminal device determines the analysis results of background traffic transmission data of other terminal devices for other terminal devices, so that subsequent background traffic transmission policies of other terminal devices and the target background traffic transmission policy of the first terminal device are in between. This can reduce conflicts, which in turn can successfully transmit background traffic from other terminal devices.
- the analysis result of the background traffic transmission data includes: the first data value of the transmission time window of the background traffic; the analysis result of the background traffic transmission data analysis further includes: the first data value of the background traffic transmission bandwidth, and the first terminal. At least one of location information of the device and an identifier of the first terminal device.
- the first policy control network element can determine the background traffic transmission policy of the first terminal device by using the content included in the analysis result of the background traffic transmission data.
- the background traffic transmission strategy includes: the second data value of the transmission time window of the background traffic; the background traffic transmission strategy further includes: the second data value of the transmission bandwidth of the background traffic, and the location information of the first terminal device And at least one of the identities of the first terminal device.
- the first terminal device can subsequently be used to perform background traffic transmission through the background traffic transmission policy.
- the first information includes the magnitude of the background traffic of the first terminal device; the first information further includes the third data value of the transmission time window of the background traffic of the first terminal device, the location information, At least one of the logos.
- the first policy control network element can learn the requirements of the first terminal device by using the content included in the first information, so that subsequent background traffic transmission policies that satisfy the requirements are requested for the first terminal device.
- the query result of the background traffic transmission includes: the fourth data value of the transmission time window of the background traffic; the query result of the background traffic transmission further includes: the fourth data value of the transmission bandwidth of the background traffic, the At least one of location information and an identifier of the first terminal device.
- the transmission strategy of the local background traffic includes: a fifth data value of a transmission time window of the background traffic; the transmission result of the local background traffic further includes: a fifth data value of a transmission bandwidth of the background traffic, a At least one of location information and an identifier of the first terminal device.
- the first terminal device when the first terminal device receives the background traffic transmission policy of the first terminal device from the first policy control network element, the first terminal device may further receive identification information from the first policy control network element. The identification information is used for Identifies a target background traffic transmission policy of the first terminal device.
- the first terminal device when the first terminal device wants to transmit background traffic and receives the background traffic transmission policy of the first terminal device, the first terminal device can determine the identity of the first terminal device in the background traffic transmission policy of the first terminal device by using the identification information. Target background traffic transmission strategy.
- the first terminal device may further send identification information to the first policy control network element.
- the first policy control network element can query the target background traffic transmission policy of the first terminal device from the database network element through the identification information, and subsequently send the target background traffic transmission policy of the first terminal device to the wireless access network.
- the method before the first terminal device sends the first information to the first policy control network element, the method further includes: the first terminal device acquires the first terminal device from the first service network element: the size of the background traffic; The first terminal device further obtains, from the first service network element, at least one of the third data value, location information, and identifier of the transmission time window of the background traffic of the first terminal device.
- the first terminal device can obtain a downlink background traffic transmission requirement from the first service network element, so that a subsequent first terminal device requests a downlink background traffic transmission policy.
- the present application provides a method for determining a background traffic transmission policy.
- the method includes:
- the first service network element sends first information to the first policy control network element, and the first information is used to request a background traffic transmission policy of the first terminal device; the first service network element receives the first terminal device from the first policy control network element Background traffic transmission strategy, wherein the background traffic transmission strategy of the first terminal device is determined by the first policy control network element according to the third information, and the third information includes the background traffic transmission data analysis of the first terminal device from the data analysis network element result.
- the background traffic transmission policy of the first terminal device is determined by the first policy control network element according to the third information, and the third information includes the analysis result of the background traffic transmission data of the first terminal device from the data analysis network element.
- the background traffic transmission policy of the first terminal device determined by the first policy control network element refers to other terminal devices, so that the background traffic transmission policy of the first terminal device and the background traffic transmission policy between other terminal devices do not conflict. This can solve the problem of background traffic transmission failure.
- the third information further includes: a background traffic transmission query result of the first terminal device and / or a local background traffic transmission policy of the first terminal device. This can make the background traffic transmission policy of the first terminal device determined by the first policy control network element more accurate.
- the method further includes: the first service network element determines that the background traffic transmission policy of the first terminal device is a target background traffic transmission of the first terminal device. Policy; the first service network element sends a target background traffic transmission policy of the first terminal device to the data analysis network element.
- the data analysis network element can save the target background traffic transmission policy of the first terminal device, and then after other terminal devices request the data analysis network element for the corresponding background traffic transmission data analysis result, the data analysis network element can refer to The target background traffic transmission policy of the first terminal device determines the analysis results of background traffic transmission data of other terminal devices for other terminal devices, so that subsequent background traffic transmission policies of other terminal devices and the target background traffic transmission policy of the first terminal device are in between. This can reduce conflicts, which in turn can successfully transmit background traffic from other terminal devices.
- the method when there are multiple background traffic transmission policies of the first terminal device, the method further includes: the first service network element selects the target background traffic of the first terminal device according to the background traffic transmission policies of the first terminal device Transmission policy: The first service network element sends a target background traffic transmission policy of the first terminal device to the first policy control network element.
- the first policy control network element when it receives the target background traffic transmission policy of the first terminal device, it can send the target background traffic transmission policy of the first terminal device to the data analysis network element, so that the data analysis network element
- the data analysis network element may refer to the target background traffic transmission policy of the first terminal device. Determining the background traffic transmission data analysis results of other terminal equipment for other terminal equipment, so that the subsequent background traffic transmission strategy of other terminal equipment and the target background traffic transmission strategy of the first terminal equipment can reduce conflicts, and can be other terminal equipment Background traffic was transmitted successfully.
- the first service network element may further send a target background traffic transmission policy of the first terminal device to the data analysis network element.
- the data analysis network element can save the target background traffic transmission policy of the first terminal device, and then after other terminal devices request the data analysis network element for the corresponding background traffic transmission data analysis result, the data analysis network element can refer to The target background traffic transmission policy of the first terminal device determines the analysis results of background traffic transmission data of other terminal devices for other terminal devices, so that subsequent background traffic transmission policies of other terminal devices and the target background traffic transmission policy of the first terminal device are in between. This can reduce conflicts, which in turn can successfully transmit background traffic from other terminal devices.
- the analysis result of the background traffic transmission data includes: the first data value of the transmission time window of the background traffic; the analysis result of the background traffic transmission data analysis further includes: the first data value of the background traffic transmission bandwidth, and the first terminal. At least one of location information of the device and an identifier of the first terminal device.
- the first policy control network element can determine the background traffic transmission policy of the first terminal device by using the content included in the analysis result of the background traffic transmission data.
- the background traffic transmission strategy includes: the second data value of the transmission time window of the background traffic; the background traffic transmission strategy further includes: the second data value of the transmission bandwidth of the background traffic, and the location information of the first terminal device And at least one of the identities of the first terminal device.
- the first terminal device can subsequently be used to perform background traffic transmission through the background traffic transmission policy.
- the first information includes the magnitude of the background traffic of the first terminal device; the first information also includes the identifier of the first service network element, and the first time of the transmission time window of the background traffic of the first terminal device. At least one of three data values, location information of the first terminal device, and an identifier of the first terminal device.
- the first policy control network element can learn the requirements of the first terminal device by using the content included in the first information, so that subsequent background traffic transmission policies that satisfy the requirements are requested for the first terminal device.
- the query result of the background traffic transmission includes: the fourth data value of the transmission time window of the background traffic; the query result of the background traffic transmission further includes: the fourth data value of the transmission bandwidth of the background traffic, the At least one of location information and an identifier of the first terminal device.
- the transmission strategy of the local background traffic includes: a fifth data value of a transmission time window of the background traffic; the transmission result of the local background traffic further includes: a fifth data value of a transmission bandwidth of the background traffic, a At least one of location information and an identifier of the first terminal device.
- the first service network element when the first service network element receives the background traffic transmission policy of the first terminal device from the first policy control network element, the first service network element may further receive identification information from the first policy control network element, and the identification The information is used to identify a target background traffic transmission policy of the first terminal device.
- the target background traffic of the first terminal device can be determined from the background traffic of the first terminal device by using the identification information.
- the first service network element may further send identification information to the first policy control network element.
- the first policy control network element can query the target background traffic transmission policy of the first terminal device from the database network element through the identification information, and then send the target background traffic transmission policy of the first terminal device to the first terminal device, and the wireless access device At least one of an incoming network element and a user plane function network element.
- the method before the first service network element sends the first information to the first policy control network element, the method further includes: the first service network element obtains the first terminal device from the first terminal device: the size of the background traffic ; The first service network element further obtains the identifier of the first service network element, the third data value of the transmission time window of the background traffic of the first terminal device, the location information of the first terminal device, and the first terminal device from the first terminal device; At least one of the logos.
- the first service network element may obtain the uplink background traffic transmission requirement from the first terminal device, so that the subsequent first service network element requests the uplink background traffic transmission policy for the first terminal device.
- the present application further provides a communication device for determining a background traffic transmission policy.
- the communication device has a function of implementing the first policy control network element in the foregoing method example.
- the functions may be implemented by hardware, and may also be implemented by hardware executing corresponding software.
- the hardware or software includes one or more modules corresponding to the functions described above.
- the structure of the communication device includes a receiving module and a transmitting module.
- the communication device may further include a processing module. These modules may perform the corresponding functions in the foregoing method examples. For details, see the detailed description in the method examples. , I won't go into details here.
- the structure of the communication device includes a transceiver and a processor.
- the communication device may also include a memory.
- the transceiver is used to send and receive data, and communicates and interacts with other devices in the communication system.
- the processor is configured to support the first policy control network element to perform a corresponding function in the above method.
- the memory is coupled to the processor and stores program instructions and data necessary for the communication device.
- the present application further provides a communication device for determining a background traffic transmission policy, and the communication device has a function of implementing a data analysis network element in the foregoing method example.
- the functions may be implemented by hardware, and may also be implemented by hardware executing corresponding software.
- the hardware or software includes one or more modules corresponding to the functions described above.
- the structure of the communication device includes a receiving module and a sending module, and these modules can perform corresponding functions in the foregoing method examples.
- a receiving module and a sending module can perform corresponding functions in the foregoing method examples.
- the structure of the communication device includes a transceiver and a processor.
- the communication device may also include a memory.
- the transceiver is used to send and receive data, and communicates and interacts with other devices in the communication system.
- the processor is configured to support the data analysis network element to perform a corresponding function in the above method.
- the memory is coupled to the processor and stores program instructions and data necessary for the communication device.
- the present application further provides a communication device for determining a background traffic transmission policy, and the communication device has a function of implementing the first terminal device in the foregoing method example.
- the functions may be implemented by hardware, and may also be implemented by hardware executing corresponding software.
- the hardware or software includes one or more modules corresponding to the functions described above.
- the structure of the communication device includes a receiving module and a transmitting module.
- the communication device may further include a processing module. These modules may perform the corresponding functions in the foregoing method examples. For details, see the detailed description in the method examples. , I won't go into details here.
- the structure of the communication device includes a transceiver and a processor.
- the communication device may also include a memory.
- the transceiver is used to send and receive data, and communicates and interacts with other devices in the communication system.
- the processor is configured to support the first terminal device to perform a corresponding function in the foregoing method.
- the memory is coupled to the processor and stores program instructions and data necessary for the communication device.
- the present application further provides a communication device for determining a background traffic transmission policy, and the communication device has a function of implementing the first service network element in the foregoing method example.
- the functions may be implemented by hardware, and may also be implemented by hardware executing corresponding software.
- the hardware or software includes one or more modules corresponding to the functions described above.
- the structure of the communication device includes a receiving module and a transmitting module.
- the communication device may further include a processing module. These modules may perform the corresponding functions in the foregoing method examples. For details, see the detailed description in the method examples. , I won't go into details here.
- the structure of the communication device includes a transceiver and a processor.
- the communication device may also include a memory.
- the transceiver is used to send and receive data, and communicates and interacts with other devices in the communication system.
- the processor is configured to support the first service network element to perform a corresponding function in the foregoing method.
- the memory is coupled to the processor and stores program instructions and data necessary for the communication device.
- the present application further provides a communication system, which may include a first policy control network element, a data analysis network element, and a requesting device (such as a first terminal device and / Service network element) and so on.
- a communication system which may include a first policy control network element, a data analysis network element, and a requesting device (such as a first terminal device and / Service network element) and so on.
- the present application further provides a computer storage medium, where the computer storage medium stores computer-executable instructions, and the computer-executable instructions are used to cause the computer to perform the foregoing tasks when called by the computer. a way.
- the present application also provides a computer program product containing instructions, which when executed on a computer, causes the computer to execute any one of the above methods.
- the present application further provides a chip, which is connected to a memory and is used to read and execute program instructions stored in the memory to implement any one of the foregoing methods.
- the present application provides a method for determining a background traffic transmission policy.
- the method includes:
- the first policy control network element acquires at least one first information, and determines a background traffic transmission policy of at least one second terminal device according to the second information; wherein the first information includes at least one first terminal device Identification, first time, first location, and first network element status; second information includes at least one first information; at least one first terminal device is part or all of at least one second terminal device; at least one first The terminal device resides in the first position at the first time and has a first network element state.
- the first policy control network element may consider the movement trajectory (including the first time and the first position) and the first position of each second terminal device when formulating the background traffic transmission policy of at least one second terminal device. State of the first network element on the network, so that the background traffic transmission policy of at least one second terminal device formulated by the first policy control network element is more accurate.
- the first policy control network element before the first policy control network element obtains the at least one first information, the first policy control network element receives the fifth information from the requesting device, and the fifth information is used to request the background of the at least one second terminal device. Traffic transmission policy.
- the requesting device provides services for the at least one second terminal device
- the fifth information may include an identifier of the requesting device and one or more of the following: the number of the second terminal device, and the number of each The size of the background traffic and the time window.
- the fifth information may further include a network area (Tracking Area List (TA List) or Routing Area List (RA List)) where the at least one second terminal device is located.
- TA List Track Area List
- RA List Routing Area List
- the first policy control network element can be triggered to initiate a process of acquiring at least one first information, thereby obtaining information required for determining a background traffic transmission policy of the second terminal device.
- the method further includes: the first policy control network element receives the identity of the at least one second terminal device from the requesting device, and the requesting device provides services for the at least one second terminal device; or the first policy control network element The identifier of the requesting device is received from the requesting device, and the identifier of the at least one second terminal device is obtained from the first policy control network element or the database network element according to the identifier of the requesting device.
- the first policy control network element can be caused to request at least one first information according to an identifier of at least one second terminal device.
- the first policy control network element obtains at least one first information
- the specific method may be: the first policy control network element obtains at least one first information from the data analysis network element; or the first policy control network element Acquire at least one first information saved locally. In this way, the first policy control network element can accurately obtain at least one first information.
- the first policy control network element obtains at least one first information from the data analysis network element.
- the specific method may be: the first policy control network element sends the sixth information to the data analysis network element, and the sixth information is used for For requesting at least one first information, the sixth information includes an identifier of at least one second terminal device; the first policy control network element receives at least one first information from the data analysis network element.
- the first policy control network element can accurately obtain at least one first information from the data analysis network element, and then determine the background traffic transmission policy of the second terminal device.
- the first policy control network element may store at least one seventh information corresponding to at least one third terminal device, and the seventh information includes an identifier of the at least one fourth terminal device, the first time, First position and first network element status.
- the at least one fourth terminal device is part or all of the at least one third terminal device, and the at least one third terminal device includes at least one second terminal device.
- the first policy control network element determines at least one first information among the stored at least one seventh information.
- the first policy control network element determines at least one first information from the stored at least one seventh information.
- the specific method may be: the first policy control network element selects the second terminal device from the at least one seventh information.
- the information corresponding to the same fourth terminal device is identified, so as to filter out at least one first information.
- the first policy control network element can accurately obtain at least one first information from the data analysis network element, and then determine a background traffic transmission policy of at least one second terminal device.
- the source of the at least one seventh information stored locally by the first policy control network element may also be obtained by the first policy control network element from the data analysis network element.
- the state of the first network element includes one or more of the following: a first load, a first capacity, and a first available bandwidth; wherein the first load is a value of the first network element corresponding to the first position Load, the first network element serves the first terminal device; the first capacity is the capacity of the first network element corresponding to the first location; the first available bandwidth is the bandwidth of the first network element corresponding to the first location.
- the first terminal device resides in the first position at the first time.
- the first network element may be a user plane network element (for example, RAN or UPF, etc.) or a control plane network element (for example, AMF or SMF, etc.) serving the first terminal device.
- a user plane network element for example, RAN or UPF, etc.
- a control plane network element for example, AMF or SMF, etc.
- an AMF network element or an SMF network element may also be used as a user plane network element for transmitting background traffic.
- the first policy control network element after the first policy control network element determines the background traffic transmission policy of the at least one second terminal device according to the second information, the first policy control network element sends the background traffic of the at least one second terminal device to the requesting device. Transmission strategy. In this way, the requesting device can send the background traffic transmission policy of the second terminal device to the corresponding second terminal device.
- the first policy control network element determines that the background traffic transmission policy of the second terminal device is a target background traffic transmission policy of the second terminal device;
- a policy control network element sends a target background traffic transmission policy of the second terminal device to the data analysis network element.
- the data analysis network element can save the target background traffic transmission policy of the second terminal device. In this way, the next time the requesting device requests the background traffic policy of other new terminal devices, the data analysis network element is serving these new terminals.
- the device determines the movement trajectory (including time and location) and the network element status of the corresponding network element on the movement trajectory, the target background traffic transmission policy of the second terminal device that has been saved can be referred to, so that the network element status result is more accurate.
- the first policy controls the network element to receive the target background traffic transmission policy of the second terminal device from the requesting device, and the target background of the second terminal device.
- the traffic transmission policy is selected by the requesting device according to the background traffic transmission policy of the second terminal device; the first policy controls the network element to send the target background traffic transmission policy of the second terminal device to the data analysis network element.
- the data analysis network element can save the target background traffic transmission policy of the second terminal device. In this way, the next time the requesting device requests the background traffic policy of other new terminal devices, the data analysis network element is serving these new terminals.
- the device determines the movement trajectory (including time and location) and the network element status of the corresponding network element on the movement trajectory, the target background traffic transmission policy of the second terminal device that has been saved can be referred to, so that the network element status result is more accurate.
- the background traffic transmission strategy of the second terminal device includes: a first data value of a transmission time window of the background traffic; the background traffic transmission strategy of the second terminal device further includes one or more of the following: background traffic The first data value of the transmission bandwidth, the location information of the second terminal device, and the identifier of the second terminal device.
- the present application provides a method for determining a background traffic transmission policy.
- the method includes:
- the data analysis network element determines at least one first information, and then sends the at least one first information to the first policy control network element;
- the first information includes an identifier of the at least one first terminal device, a first time, a first location, and a first Network element status;
- at least one first terminal device is part or all of at least one second terminal device;
- at least one first terminal device resides in a first position at a first time and has a first network element status;
- the first policy control network element may consider the movement trajectory (including the first time and the first position) and the first time of each second terminal device when formulating the background traffic transmission policy of at least one second terminal device.
- the status of the first network element at a location which will make the background traffic transmission policy of at least one second terminal device formulated by the first policy control network element more accurate.
- the data analysis network element determines at least one first information.
- the specific method may be: the data analysis network element obtains at least one third information of at least one second terminal device on the third network element, and the data analysis network The element determines at least one first information according to at least one third information of the at least one second terminal device; the third information includes an identifier of the second terminal device, a second time, a second location, and a state of the second network element; the second terminal device It resides in the second position at the second time and has the state of the second network element.
- the data analysis can accurately obtain at least one first information, and then send it to the first policy control network element, so that the first policy control network element refers to the at least one first information to formulate the background traffic transmission of the second terminal device.
- the third network element may be one or more of an access device, a functional network element in 5G, and an OAM.
- the data analysis network element may obtain at least one of the third network element from the OAM network element At least one third information of the second terminal device.
- the state of the second network element includes one or more of the following: a second load, a second capacity, and a second available bandwidth; wherein the second load is a value of the corresponding second network element at the second position.
- the second network element serves the second terminal device;
- the second capacity is the capacity of the corresponding second network element at the second location;
- the second bandwidth is the bandwidth of the corresponding second network element at the second location.
- the second terminal device resides in the second position at the second time.
- the state of the first network element includes one or more of the following: a first load, a first capacity, and a first available bandwidth; wherein the first load is a value of the first network element corresponding to the first position Load; the first network element serves the first terminal device; the first capacity is the capacity of the first network element corresponding to the first location; the first available bandwidth is the bandwidth of the first network element corresponding to the first location.
- the first terminal device resides in the first position at the first time.
- the first network element may be a user plane network element (for example, RAN or UPF, etc.) or a control plane network element (for example, AMF or SMF, etc.) serving the first terminal device.
- a user plane network element for example, RAN or UPF, etc.
- a control plane network element for example, AMF or SMF, etc.
- an AMF network element or an SMF network element may also be used as a user plane network element for transmitting background traffic.
- the first network element may be any one of the third network elements.
- the present application further provides a communication device for determining a background traffic transmission policy.
- the communication device has a function of implementing the first policy control network element in the method example of the thirteenth aspect.
- the functions may be implemented by hardware, and may also be implemented by hardware executing corresponding software.
- the hardware or software includes one or more modules corresponding to the functions described above.
- the structure of the communication device includes an acquisition module and a processing module.
- the communication device may further include a sending module.
- These modules may perform the corresponding functions in the method example of the thirteenth aspect. For details, see the method example The detailed description is not described here.
- the structure of the communication device includes a transceiver and a processor.
- the communication device may also include a memory.
- the transceiver is used to send and receive data, and communicates and interacts with other devices in the communication system.
- the processor is configured to support the first policy control network element to perform a corresponding function in the method of the thirteenth aspect.
- the memory is coupled to the processor and stores program instructions and data necessary for the communication device.
- the present application further provides a communication device for determining a background traffic transmission policy, and the communication device has a function of implementing a data analysis network element in the method example of the fourteenth aspect.
- the functions may be implemented by hardware, and may also be implemented by hardware executing corresponding software.
- the hardware or software includes one or more modules corresponding to the functions described above.
- the structure of the communication device includes a processing module and a sending module, and these modules can perform the corresponding functions in the method example of the fourteenth aspect described above.
- these modules can perform the corresponding functions in the method example of the fourteenth aspect described above.
- the structure of the communication device includes a processing module and a sending module, and these modules can perform the corresponding functions in the method example of the fourteenth aspect described above.
- these modules can perform the corresponding functions in the method example of the fourteenth aspect described above.
- the structure of the communication device includes a processing module and a sending module, and these modules can perform the corresponding functions in the method example of the fourteenth aspect described above.
- the detailed description in the method example To repeat.
- the structure of the communication device includes a transceiver and a processor.
- the communication device may also include a memory.
- the transceiver is used to send and receive data, and communicates and interacts with other devices in the communication system.
- the processor is configured to support the data analysis network element to perform a corresponding function in the method of the fourteenth aspect.
- the memory is coupled to the processor and stores program instructions and data necessary for the communication device.
- the present application further provides a computer storage medium, where the computer storage medium stores computer-executable instructions, and the computer-executable instructions are used to cause the computer to execute the foregoing when called by the computer Either the thirteenth aspect or the fourteenth aspect.
- the present application also provides a computer program product containing instructions that, when run on a computer, causes the computer to execute any one of the thirteenth aspect and the fourteenth aspect.
- the present application also provides a chip, which is connected to a memory and is used to read and execute program instructions stored in the memory to implement any one of the thirteenth and fourteenth aspects method.
- the present application also provides a method for determining network performance information, including:
- the first network element sends first information to the data analysis network element, where the first information is used to request network performance information, and the first information includes one or more of the following: area information of the first area, an identifier of the requesting device, or Terminal device group identification; then, the first network element receives network performance information from the data analysis network element, and the network performance information includes area information and second information of the second region, and the second information includes one or more of the following: Load information of the network in the second region, service experience information of services in the second region, or the number of terminal devices in the second region; where the second region is a sub-region of the first region; and finally, the first network element is based on the network performance information Determine the first strategy.
- the first network element After the first network element obtains network performance information from the data analysis network element, it can formulate a policy based on the area information of the divided sub-region, thereby making the formulated policy more accurate.
- the first strategy includes a background traffic transmission strategy, wherein the background traffic transmission strategy is a background traffic transmission strategy of at least one terminal device.
- the background traffic transmission strategy is a background traffic transmission strategy of at least one terminal device.
- the first network element receives third information from the requesting device, and the third information is used to request a background traffic transmission policy.
- the third information includes one or more of the following: area information of the first area, and a terminal.
- the device group identifier or the identifier of the requesting device; the first network element sends a background traffic transmission policy to the requesting device.
- the requesting device can obtain an accurate background traffic transmission policy from the first network element.
- the background traffic transmission policy includes area information of the second area. In this way, the background traffic transmission strategy is more accurate.
- the first network element sends area information of the second area to the requesting device. This can make the background traffic transmission policy requested by the requesting device more accurate.
- the background traffic transmission policy also includes one or more of the following information: recommended time window, rate, and maximum aggregated bit rate.
- the first network element is a policy control function network element.
- this application provides a method for determining network performance information, including:
- the data analysis network element receives the first information from the first network element, and the first information is used to request network performance information; the first information includes one or more of the following: area information of the first area, an identifier of the requesting device, or a terminal device Group identification; then, the data analysis network element determines network performance information according to the first information, and the network performance information includes area information and second information of the second area, and the second information includes one or more of the following: Network load information, service experience information of services in the second area, or the number of terminal devices in the second area; where the second area is a sub-area of the first area; and finally, the data analysis network element sends the first network element Network performance information.
- the first network element After the first network element obtains network performance information from the data analysis network element, it can formulate a policy according to the area information of the divided sub-region, thereby making the formulated policy more accurate.
- the data analysis network element determines the network performance information according to the first information, including:
- the data analysis network element obtains the area information of the second area based on the area information of the first area
- the data analysis network element determines one or more of the following: load information of the network in the second region, service experience information of services in the second region, or the number of terminal devices in the second region.
- the data analysis network element can accurately determine network performance information, so that the first network element can accurately formulate a policy.
- the data analysis network element determines the network performance information according to the first information, including:
- the data analysis network element determines area information of the second area according to the terminal device group identifier and / or the requesting device identifier;
- the data analysis network element determines one or more of the following: load information of the network in the second region, service experience information of services in the second region, or the number of terminal devices in the second region.
- the data analysis network element can accurately determine network performance information, so that the first network element can accurately formulate a policy.
- the data analysis network element determines the area information of the second area according to the terminal device group identifier and / or the requesting device identifier, including:
- the data analysis network element determines the area information of the first area according to the terminal device group identifier and / or the requesting device identifier;
- the data analysis network element obtains the area information of the second area based on the area information of the first area.
- the data analysis network element can accurately determine the area information of the second area, so that the data analysis network element can accurately determine the network performance information.
- the data analysis network element obtains the area information of the second area based on the area information of the first area, including:
- the data analysis network element obtains the area information of the second area that is stored locally based on the area information of the first area; or
- the data analysis network element obtains the area information of the second area from the operation management and maintenance network element or the access and mobility management function network element based on the area information of the first area.
- the data analysis network element can accurately determine the area information of the second area, so that the data analysis network element can accurately determine the network performance information.
- the data analysis network element determines the load information of the network in the second area, including:
- the data analysis network element obtains load information of the network in the second area from the network management network element or the operation management and maintenance network element.
- the data analysis network element can accurately determine the load information of the network in the second area, and then the data analysis network element can accurately determine the network performance information.
- the first network element is a policy control function network element.
- this application provides a method for determining a background traffic transmission policy, including:
- the requesting device sends third information to the first network element.
- the third information is used to request a background traffic transmission policy.
- the third information includes one or more of the following: area information of the first area, an identifier of the requesting device, or a terminal device group. Group identification; then request the device to receive the background traffic transmission policy from the first network element, the background traffic transmission policy includes the area information of the second area, and the second area is a sub-area of the first area.
- the requesting device can accurately obtain the background traffic policy.
- the background traffic transmission policy is a background traffic transmission policy of at least one terminal device.
- the requesting device serves at least one terminal device.
- the background traffic transmission strategy includes one or more of the following information: recommended time window, rate, maximum aggregate bit rate.
- the first network element is a policy control function network element.
- the present application further provides a communication device for determining network performance information, and the communication device has a function of implementing the first network element in the method example of the twentieth aspect.
- the functions may be implemented by hardware, and may also be implemented by hardware executing corresponding software.
- the hardware or software includes one or more modules corresponding to the functions described above.
- the structure of the communication device includes a sending module, a receiving module, and a processing module. These modules can perform the corresponding functions in the method example of the twentieth aspect described above. For details, refer to the detailed description in the method example. I won't go into details here.
- the structure of the communication device includes a transceiver and a processor.
- the communication device may also include a memory.
- the transceiver is used to send and receive data, and communicates and interacts with other devices in the communication system.
- the processor is configured to support the first network element to perform a corresponding function in the method of the twentieth aspect.
- the memory is coupled to the processor and stores program instructions and data necessary for the communication device.
- the present application further provides a communication device for determining network performance information.
- the communication device has a function of implementing a data analysis network element in the method example of the twenty-first aspect.
- the functions may be implemented by hardware, and may also be implemented by hardware executing corresponding software.
- the hardware or software includes one or more modules corresponding to the functions described above.
- the structure of the communication device includes a sending module, a receiving module, and a processing module. These modules can perform the corresponding functions in the method example of the twenty-first aspect described above. For details, refer to the detailed description in the method example. I won't go into details here.
- the structure of the communication device includes a transceiver and a processor.
- the communication device may also include a memory.
- the transceiver is used to send and receive data, and communicates and interacts with other devices in the communication system.
- the processor is configured to support the data analysis network element to perform a corresponding function in the method of the twenty-first aspect.
- the memory is coupled to the processor and stores program instructions and data necessary for the communication device.
- the present application further provides a communication device for determining a background traffic transmission policy, and the communication device has a function of implementing the requesting device in the method example of the twenty-second aspect.
- the functions may be implemented by hardware, and may also be implemented by hardware executing corresponding software.
- the hardware or software includes one or more modules corresponding to the above functions.
- the structure of the communication device includes a receiving module and a sending module, and these modules can perform corresponding functions in the method example of the twenty-second aspect described above.
- these modules can perform corresponding functions in the method example of the twenty-second aspect described above.
- the structure of the communication device includes a receiving module and a sending module, and these modules can perform corresponding functions in the method example of the twenty-second aspect described above.
- these modules can perform corresponding functions in the method example of the twenty-second aspect described above.
- the structure of the communication device includes a receiving module and a sending module, and these modules can perform corresponding functions in the method example of the twenty-second aspect described above.
- the detailed description in the method example To repeat.
- the structure of the communication device includes a transceiver and a processor.
- the communication device may also include a memory.
- the transceiver is used to send and receive data, and communicates and interacts with other devices in the communication system.
- the processor is configured to support a requesting device to perform a corresponding function in the method of the twenty-second aspect.
- the memory is coupled to the processor and stores program instructions and data necessary for the communication device.
- the present application further provides a computer storage medium, where the computer storage medium stores computer-executable instructions, and the computer-executable instructions are used to cause the computer to execute when called by the computer
- the present application also provides a computer program product containing instructions, which when executed on a computer, causes the computer to execute any one of the methods in the twentieth aspect to the twenty-second aspect.
- the present application also provides a chip, which is connected to a memory and is used to read and execute program instructions stored in the memory to implement any of the foregoing twentieth to twenty-second aspects. a way.
- FIG. 1 is a schematic architecture diagram of a communication system provided by this application.
- FIG. 2 is a flowchart of a method for determining a background traffic transmission policy provided by the present application
- FIG. 3 is a flowchart of another method for determining a background traffic transmission policy provided by this application.
- FIG. 4 is a flowchart of another method for determining a background traffic transmission policy provided by the present application.
- FIG. 5 is a flowchart of an example of a method for determining a background traffic transmission policy provided by this application
- FIG. 6 is a flowchart of another example of a method for determining a background traffic transmission policy provided by the present application.
- FIG. 7 is a schematic structural diagram of a communication device for determining a background traffic transmission policy provided by the present application.
- FIG. 8 is a schematic structural diagram of another communication device for determining a background traffic transmission policy provided by the present application.
- FIG. 9 is a structural diagram of a communication device for determining a background traffic transmission policy provided by the present application.
- FIG. 10 is a flowchart of another method for determining a background traffic transmission policy provided by this application.
- FIG. 11 is a flowchart of another method for determining a background traffic transmission policy provided by this application.
- FIG. 12 is a flowchart of another example of a method for determining a background traffic transmission policy provided by the present application.
- FIG. 13 is a schematic structural diagram of another communication device for determining a background traffic transmission policy provided by the present application.
- FIG. 14 is a schematic structural diagram of another communication device for determining a background traffic transmission policy provided by the present application.
- 15 is a flowchart of a method for determining network performance information provided by this application.
- FIG. 16 is a flowchart of another example of a method for determining a background traffic transmission policy provided by the present application.
- the embodiments of the present application provide a method and a device for determining a background traffic transmission strategy, which are used to resolve conflicts between background traffic transmission policies formulated by different policy control network elements for different service network elements in the prior art, and subsequently cause background Traffic transmission failed.
- the methods and devices described in this application are based on the same inventive concept. Since the principles of the methods and devices for solving problems are similar, the implementation of the devices and methods can be referred to each other, and duplicated details will not be repeated.
- Background traffic is usually defined as non-real-time interactive traffic, which can be specifically divided into uplink background traffic and downlink background traffic.
- the downstream background traffic may be traffic transmitted by video caching, file downloading, software update packages, software notification messages, and so on;
- the upstream background traffic may be traffic transmitted by vehicles that save driving map information and the like.
- the data analysis network element is a network element device capable of performing big data analysis. It may be, but is not limited to, a network data analysis function network element.
- the network data analysis function network element may be NWDAF (network data analysis function).
- NWDAF network data analysis function
- the data analysis network element can analyze target background traffic transmission policies of all terminal devices to determine a background traffic transmission data analysis result of a terminal device that needs a background traffic transmission policy, so that Background traffic transmission strategy.
- the service network element may be an application network element, and the specific application network element may be, but is not limited to, an application function (AF) network element of an operator, a terminal device, and a third-party device, such as a non-operator AF network element (also referred to as a third-party AF network element), etc .; the AF network element of the operator may be, but is not limited to, an operator's business management server; the third-party AF network element may be Not limited to being a third-party business server.
- AF application function
- the AF network element of the operator may be, but is not limited to, an operator's business management server;
- the third-party AF network element may be Not limited to being a third-party business server.
- a possible communication system architecture applicable to the method for determining a background traffic transmission policy provided in the embodiment of the present application may include: a network open function network element, a policy control function network element, a database network element, a service network element, and an authentication server.
- Function network element, access and mobility management function network element, session management function network element, data analysis network element, terminal device, access network device, user plane function network element, and data network may include: a network open function network element, a policy control function network element, a database network element, a service network element, and an authentication server.
- FIG. 1 shows a possible example of the architecture of the communication system.
- the architecture of the communication system includes: network open function (NEF) network element, policy control function (PCF) ) Network element, unified data warehouse (UDR) network element, third-party AF network element, AF network element, authentication server function (AUSF) network element, access and mobility management functions (access and mobility (AMF) network element, session management function (SMF) network element, network data analysis function (NWDAF) network element, UE, radio access network (radio access network) (RAN) equipment, user plane function (UPF) network elements, and data network (DN).
- NEF network open function
- PCF policy control function
- UDR unified data warehouse
- AF authentication server function
- AMF access and mobility management functions
- SMS session management function
- NWDAF network data analysis function
- UE radio access network
- RAN radio access network
- UPF user plane function
- DN data network
- the AMF network element and the UE can be connected through the N1 interface
- the AMF and the AN device can be connected through the N2 interface
- the AN device and the UPF can be connected through the N3 interface
- the SMF and the UPF can be connected through the N4 interface.
- the UPF and the DN can be connected through the N6 interface.
- the interface name is only an example description, which is not specifically limited in the embodiment of the present application. It should be understood that the embodiments of the present application are not limited to the communication system shown in FIG. 1, and the names of the network elements shown in FIG. 1 are only used as an example here, and are not included in the communication system architecture applicable to the method of the present application. Limitation of network elements. The functions of each network element or device in the communication system are described in detail below:
- the terminal device may also be referred to as user equipment (UE), mobile station (MS), mobile terminal (MT), etc., which is a method for providing voice and / or data connectivity to users.
- sexual equipment For example, the terminal device may include a handheld device having a wireless connection function, a vehicle-mounted device, and the like.
- the terminal device may be: a mobile phone, a tablet computer, a notebook computer, a palmtop computer, a mobile internet device (MID), a wearable device, a virtual reality (VR) device, and an enhanced device.
- UE user equipment
- MS mobile station
- MT mobile terminal
- the terminal device may include a handheld device having a wireless connection function, a vehicle-mounted device, and the like.
- the terminal device may be: a mobile phone, a tablet computer, a notebook computer, a palmtop computer, a mobile internet device (MID), a wearable device, a virtual reality (VR) device, and an enhanced device.
- MID mobile internet device
- VR virtual reality
- Augmented reality (AR) equipment wireless terminals in industrial control, wireless terminals in self-driving, wireless terminals in remote medical surgery, smart grid ), Wireless terminals in transportation safety, wireless terminals in smart cities, or wireless terminals in smart homes.
- the terminal device described in FIG. 1 is shown by a UE, which is merely an example and does not limit the terminal device.
- the wireless access network may be a wireless access network (RAN) shown in FIG. 1, and provides a wireless access service to the terminal device.
- the access network device is a device that connects the terminal device to a wireless network in the communication system.
- the access network device is a node in a wireless access network, and may also be called a base station, and may also be called a radio access network (RAN) node (or device).
- RAN radio access network
- access network equipment are: gNB, transmission receiving point (TRP), evolved Node B (eNB), radio network controller (RNC), node B (Node B, NB), base station controller (BSC), base transceiver station (BTS), home base station (e.g., home NodeB, or home NodeB, HNB), baseband unit (base band unit (BBU), or wireless fidelity (Wifi) access point (AP).
- TRP transmission receiving point
- eNB evolved Node B
- RNC radio network controller
- Node B Node B
- BSC base station controller
- BTS base transceiver station
- home base station e.g., home NodeB, or home NodeB, HNB
- BBU baseband unit
- Wifi wireless fidelity
- the data network for example, the data network (DN) shown in FIG. 1, may be the Internet, an IP Multi-media Service (IMS) network, or an area network (that is, a local network, such as mobile Edge computing (mobile edge computing (MEC) network) and so on.
- IMS IP Multi-media Service
- MEC mobile Edge computing
- the data network includes an application server, and the application server provides business services to the terminal device through data transmission with the terminal device.
- the core network is used to connect the terminal device to a DN that can implement services of the terminal device.
- the functions of each network element in the core network are described below:
- the access and mobility management function network element can be used to manage access control and mobility of the terminal device. In actual applications, it includes mobile in a network framework in long term evolution (LTE)
- LTE long term evolution
- the mobility management function in the management entity (MME) and the access management function is added which can specifically be responsible for the registration of the terminal device, mobility management, tracking area update process, reachability detection, session management Selection of functional network elements, management of mobile state transition, etc.
- the access and mobility management function network element may be an AMF network element, as shown in FIG. 1; in future communications, such as 6G, the access and mobility management function network element may still be It is an AMF network element or has another name, which is not limited in this application.
- the access and mobility management function network element is an AMF network element, the AMF may provide a Namf service.
- the session management function network element may be used for session management (including establishment, modification, and release of the session) of the terminal device, selection and reselection of user plane function network elements, and Internet protocol of the terminal device. (IP) address allocation, quality of service (QoS) control, etc.
- IP Internet protocol
- QoS quality of service
- the session management function network element may be an SMF network element, as shown in FIG. 1; in future communications, such as 6G, the session management function network element may still be an SMF network element, or have other The name is not limited in this application.
- the SMF may provide an Nsmf service.
- the data analysis network element may be used to perform big data analysis (for example, in the embodiment of the present application, the background traffic transmission data analysis result of the terminal device may be analyzed).
- the data analysis network element may be an NWDAF network element, as shown in FIG. 1; in future communications, such as 6G, the data analysis network element may still be an NWDAF network element, or have another name This application is not limited.
- the NWDAF network element may provide a Nnwdaf service.
- the policy control function network element may be used to be responsible for policy control decisions (for example, in the embodiments of the present application, it may be responsible for the decision of the background traffic transmission policy), provide service data flow and application detection, gating, QoS, and flow-based Functions such as billing control.
- the policy control function network element may be a PCF network element, as shown in FIG. 1; in future communications, such as 6G, the policy control function network element may still be a PCF network element, or have other The name is not limited in this application.
- the policy control function network element is a PCF network element, the PCF network element may provide an Npcf service.
- the main function of the service network element is to provide services by interacting with the 3rd generation partnership project (3GPP) core network to influence service flow routing, access network capability opening, and policy control.
- the service network element may be an AF network element or a third-party AF (3 rd AF) network element, where the AF network element may directly communicate with an operator network element (for example, AMF NE, NE the SMF, the PCF network element, etc.) interactions, the network element needs to 3 rd AF can interact with the operator network via the open network elements NEs (e.g. NEF NE).
- 3GPP 3rd generation partnership project
- the service network element may still be an AF network element, a 3 rd AF network element, or have another name, which is not limited in this application.
- the service network element is an AF network element
- the AF network element may provide a Naf service.
- the authentication server function network element may be used to provide an authentication service.
- the authentication server function network element may be an AUSF network element, as shown in FIG. 1; in future communications, as in 6G, the authentication server function network element may still be an AUSF network element, or There are other names, which are not limited in this application.
- the AUSF network element may provide a Nausf service.
- the database network element may be used for storing data and the like.
- the database network element may be a UDR network element, as shown in FIG. 1; in future communications, such as 6G, the database network element may still be a UDR network element, or have another name. Applications are not limited.
- the UDR network element may provide a Nudr service.
- the network open function network element can be used to enable 3GPP to securely provide network service capabilities to third-party AFs (for example, Services Capability Server (SCS), Application Server (AS), etc.).
- third-party AFs for example, Services Capability Server (SCS), Application Server (AS), etc.
- the network open function network element may be an NEF network element, as shown in FIG. 1; in future communications, such as 6G, the network open function network element may still be an NEF network element, or there may be other The name is not limited in this application.
- the network open function network element is a NEF
- the NEF may provide Nnef services to other network function network elements.
- the user plane function network element may be used to forward user plane data of the terminal device.
- the main functions are data packet routing and forwarding, mobility anchors, uplink classifiers to support routing service flows to the data network, and branch points to support multi-homed packet data unit (PDU) sessions.
- PDU packet data unit
- the user plane function network element may be a UPF network element, as shown in FIG. 1; in future communications, such as 6G, the user plane function network element may still be a UPF network element, or there may be other
- the name is not limited in this application.
- Each of the above network elements in the core network can also be called a functional entity or device. It can be a network element implemented on dedicated hardware, or a software instance running on dedicated hardware, or a virtualized function on an appropriate platform.
- An example, for example, the above virtualization platform may be a cloud platform.
- FIG. 1 the architecture of the communication system shown in FIG. 1 is not limited to only the network elements shown in the figure, and may also include other devices not shown in the figure.
- the specific applications in this application are not listed here one by one. .
- each network element in the core network does not limit the distribution form of each network element in the core network.
- the distribution form shown in FIG. 1 is only exemplary, and is not limited in the present application.
- the following uses the network element shown in FIG. 1 as an example for description, and the XX network element is simply referred to as XX. It should be understood that the names of all network elements in this application are merely examples, and may be referred to as other names in future communications, or the network elements involved in this application in future communications may also be obtained by other entities or devices with the same functions. Instead, this application does not limit this. The description is unified here, and will not be repeated later.
- the communication system shown in FIG. 1 does not constitute a limitation of the communication system to which the embodiments of the present application can be applied.
- the communication system architecture shown in FIG. 1 is a 5G system architecture.
- the method in the embodiment of the present application is also applicable to various future communication systems, such as 6G or other communication networks.
- a method for determining a background traffic transmission strategy provided in the embodiment of the present application is applicable to the communication system shown in FIG. 1.
- the specific process of the method may include:
- Step 201 The first policy control network element receives first information from a requesting device, where the first information is used to request a background traffic transmission policy of the first terminal device.
- the first information may include the magnitude of the background traffic of the first terminal device; the first information may further include the identifier of the requesting device and the transmission time window of the background traffic of the first terminal device. At least one of a third data value, location information of the first terminal device, and an identifier of the first terminal device.
- the third data value of the transmission time window of the background traffic of the first terminal device may be an expected value of the transmission time window of the background traffic of the first terminal device, where the expected value may be understood as the first terminal that the requesting device expects to obtain.
- the value of the transmission time window that the device uses for background traffic may of course have other understandings, which is not limited in this application.
- the third data value of the transmission time window of the background traffic of the first terminal device may correspond to the expected value of the transmission time window of the background traffic of the first terminal device, which is not described in detail below.
- the location information of the first terminal device may be at least one or more of the following: Network area (Network area) where the first terminal device is located, Cell ((identification, ID)), and wireless access point where the first terminal device is located. RAN ID, Global Positioning System (GPS) values.
- the location information of the first terminal device involved in the subsequent application may be the Network Area where the first terminal device is located, At least one or more of the Cell ID, the RAN ID of the first terminal device, and the GPS value are not described in detail below.
- the identification of the first terminal device may be at least one or more of the following: subscription permanent identity identifier (SUPI), permanent equipment identifier (PEI), general public subscription identifier (GPSI), internet protocol address (IP) five-tuple, international mobile subscriber identifier (international mobile) subscriber identity (IMSI), international mobile equipment identity (international mobile identity) (enteridentity, IMEI), and mobile station international integrated service digital network number (MSISDN).
- SUPI subscription permanent identity identifier
- PEI permanent equipment identifier
- GPSI general public subscription identifier
- IP internet protocol address
- IMSI international mobile subscriber identifier
- IMSI international mobile equipment identity
- IMEI international mobile equipment identity
- MSISDN mobile station international integrated service digital network number
- the identification of the first terminal device involved in this application can be SUPI, PEI , GPSI, IP quintuple, IMSI, IMEI, MSISDN at least one or more, which will not be described in detail below. Through these information included in the first information, you can request to obtain the background of the first terminal device that meets the above requirements. Traffic transmission policy.
- the requesting device may be a first terminal device.
- the requesting device is the first terminal device, it can be divided into the following two scenarios:
- Scenario a1 When the first terminal device decides to transmit uplink background traffic to the first service network element serving itself, it can initiate a packet data unit session ((packet data unit) (PDU) Session) modification process and request the background of the first terminal device. Traffic transmission policy.
- PDU packet data unit
- the specific process in which the first terminal device sends the first information to the first policy control network element may be: the first terminal device sends the first information to the access and mobility management function network element,
- the first terminal device may send the first information to the access and mobility management function network element through the N1 message, for example, the N1 message may be a PDU Session Modification Request; and then, access and mobility The performance management function network element forwards the first information to the session management function network element.
- the access and mobility management function network element may send the first information to the session management function network element by calling the Nsmf_PDUSession_UpdateSMContext service; finally, the session management The functional network element forwards the first information to the first policy control network element.
- the session management function network element may send the first information to the first policy control network element by calling the Npcf_SMPolicyControl_Update service. In this way, through the above method, the first terminal device can send the first information to the first policy control network element.
- the terminal device may first obtain the information required to request the background traffic transmission policy from the first service network element serving the first terminal device.
- the first terminal device A service network element acquires the size of the background traffic of the first terminal device; the first terminal device further obtains, from the first service network element, the identifier of the first service network element, the third time window of the transmission time window of the background traffic of the first terminal device, At least one of a data value, location information of the first terminal device, and an identifier of the first terminal device.
- the first terminal device may carry the obtained information in the first information and send it to the first policy control network element to request the background traffic transmission policy of the first terminal device.
- the requesting device may be a first service network element serving a first terminal device.
- the requesting device is the first service network element, it can be divided into the following two scenarios:
- Scenario b1 When the first service network element decides to transmit downlink background traffic to the first terminal device, the first service network element initiates a PDUSession modification process and requests a background traffic transmission policy of the first terminal device.
- the first service network element sending the first information to the first policy control network element may specifically be: the first service network element sends the first information to the first policy control network element by calling the Npcf_PolicyAuthorization_Create / Update service.
- the first service network element may send the first information to the first policy control network element through the network open function network element.
- the above process may specifically be: the first service network element sends the first information to the network open function network element, optionally, the first service network element may send the first information to the network open function network element by calling the Nnef_BDTPNegotiation_Create request service; then the network The open function network element forwards the first information to the first policy control network element.
- the network open function network element may send the first information to the first policy control network element by calling the Npcf_BDTPolicyControl_Create request service.
- the first service network element obtains, from the first terminal device, information required to request a background traffic transmission policy of the first terminal device, for example, the first service network element Acquiring the first terminal device from the first terminal device: the size of the background traffic; the first service network element further acquiring the first terminal device from the first terminal device: the third data value of the transmission time window of the background traffic, the location information, At least one of the logos.
- the first service network element may carry the obtained information in the first information and send it to the first policy control network element to request a background traffic transmission policy of the first terminal device.
- both the request for the uplink background traffic transmission policy and the request for the downlink background traffic transmission policy can be realized.
- the first service network element may simultaneously request background traffic transmission policies of multiple terminal devices through the first information, where the first terminal device may Is any one of multiple terminal devices.
- the first information may include the size of the background traffic of each terminal device of the multiple terminal devices; the first information also includes the third data value, location information, and identification of the transmission time window of the background traffic of each terminal device. At least one.
- Step 202 The first policy control network element sends second information to the data analysis network element according to the first information, and the second information is used to request the background traffic of the first terminal device to transmit a data analysis result.
- the first policy control network element after the first policy control network element receives the first information, the first policy control network element sends the second information to the data analysis network element according to the content of the first information request, so that the data analysis network Meta performs step 203.
- the second information may include the magnitude of the background traffic of the first terminal device; and the second information may further include the third data of the transmission time window of the background traffic of the first terminal device. At least one of value, location information, and identification.
- the data analysis network element can return a background traffic transmission data analysis result that meets the content contained in the second information.
- the content included in the second information may be determined according to the content included in the first information.
- the first policy control network element may process the second information into the same information as the first information, that is, the second information.
- the content contained is the same as the content contained in the first information; for another example, the first policy control network element may process the second information into information different from the first information.
- the content contained in the second information may be Other information is added to the content contained in the first information, or part of the information contained in the first information is selected as the content in the second information, which is not limited in this application.
- the second information may be sent to the data analysis network element by calling the Nnwdaf_AnalyticsInfo_Request service.
- the first policy control network element may simultaneously request the background traffic transmission data analysis result of multiple terminal devices through the second information, where the first terminal device is any one of the multiple terminal devices.
- the second information may include the size of the background traffic of each terminal device among the multiple terminal devices; the second information may further include the identification of the first policy function network element, the identification of the requesting device, and each terminal device At least one of the third data value of the transmission time window of the background traffic, the location information of each terminal device, and the identity of each terminal device.
- the first policy control network element may collect multiple requests for background traffic transmission policies for terminal devices within a preset time period, and then simultaneously request the analysis results of background traffic transmission data for multiple terminal devices through the second information.
- multiple requests for the background traffic transmission policy of the terminal device may be multiple different terminal devices sending the first information request, or a service network element may request the same information through the first information at the same time. It may be requested by at least one terminal device for the at least one terminal device through the first information request and one service network element through the first information, or it may be multiple service network elements for the at least one terminal device through the respective first information.
- the first policy control network element may collect a request for a background traffic transmission policy of a preset number of terminal devices, and then simultaneously request the analysis results of the background traffic transmission data of multiple terminal devices through the second information.
- a background traffic transmission policy of multiple (that is, a preset number of) terminal devices in this scenario refer to the related description in scenario c1, and details are not described herein again.
- the second information may further include an identifier of the first service network element.
- the identifier of the first service network element may be an application service provider identifier ((application) service provider (ASP) identifier).
- ASP application service provider
- the ASP identifier may be stored in the first policy control network element, or may be from the first service network element.
- Step 203 The data analysis network element sends the background traffic transmission data analysis result of the first terminal device to the first policy control network element, and the background traffic transmission data analysis result of the first terminal device is analyzed by the data analysis network element based on the target of the second terminal device. It is determined by the background traffic transmission policy that the second terminal device is different from the first terminal device, and the target background traffic transmission policy of the second terminal device is used for background traffic transmission by the second terminal device.
- the data analysis network element determines the background traffic transmission data analysis result of the first terminal device based on the second information and the target background traffic transmission policy of the second terminal device. .
- the background traffic transmission data analysis result of the first terminal device may be further analyzed by the data analysis network element based on the target background traffic transmission policy and the second information of the second terminal device, and the load of the functional network element. Determined by the information and / or capacity information of the functional network element. In this way, the analysis result of the background traffic transmission data of the first terminal device analyzed by the data analysis network element can be more reliable.
- the analysis result of the background traffic transmission data may include: the first data value of the transmission time window of the background traffic; the analysis result of the background traffic transmission data analysis may further include: the first data value of the background traffic transmission bandwidth, and the first terminal device. At least one of location information of the mobile terminal and the identifier of the first terminal device.
- the first data value of the transmission time window of the background traffic of the first terminal device may be a data analysis value of the transmission time window of the background traffic of the first terminal device.
- the first data value of the transmission time window of the background traffic of the first terminal device that is subsequently referred to in this application may correspond to the data analysis value of the transmission time window of the background traffic of the first terminal device, and details are not described below.
- the first data value of the transmission bandwidth of the background traffic of the first terminal device may be a data analysis value of the transmission bandwidth of the background traffic of the first terminal device. It should be noted that the first data value of the transmission bandwidth of the background traffic of the first terminal device that is subsequently referred to in this application may correspond to the data analysis value of the transmission bandwidth of the background traffic of the first terminal device, and details are not described below.
- the second terminal device may refer to at least one terminal device.
- the second terminal device is a general term for a terminal device that currently performs background traffic transmission.
- the second terminal device may be a terminal device under a first policy control network element, or a terminal device under a second policy control network element, or may be a first policy control network element and a second policy Control the terminal equipment under the network element.
- the second policy control network element may be a policy control network element other than the first policy control network element in the communication system, or the second policy control network element may be in the same location area as the first policy control network element ( For example, one of a tracking area (TA), a tracking area list (TA), a routing area (RA), a routing area list (RA, List, etc.).
- the data analysis network element determines the background traffic transmission data analysis result of the first terminal device through the target transmission policy of the terminal device currently performing the background traffic transmission, so that the background traffic transmission policy of the first terminal device determined subsequently can be compared with other
- the background device's background traffic transmission policies reduce the possibility of conflicts, which can make background traffic successfully transmitted.
- the data analysis network element before the data analysis network element sends the background traffic transmission data analysis result of the first terminal device to the first policy control network element, the data analysis network element needs to be based on the target background of the second terminal device.
- the traffic transmission policy determines a background traffic transmission data analysis result of the first terminal device.
- the data analysis network element may also obtain the target background traffic transmission policy of the second terminal device. .
- the data analysis network element obtains the target background traffic transmission policy of the second terminal device by using the following method: the data analysis network element receives the target background traffic transmission policy of the second terminal device from the first device, where
- the first device may be any one or a combination of the following: a second terminal device, a first policy control network element, a second policy control network element, a second service network element, a second database network element, and the like.
- the target background traffic transmission policy of the second terminal device may include: a sixth data value of a transmission time window of the background traffic; the target background traffic transmission policy of the second terminal device may further include: a background At least one of a sixth data value of a transmission bandwidth of the traffic, location information of the second terminal device, and an identifier of the second terminal device.
- the target background traffic transmission policy of any terminal device may not be obtained in the data analysis network element. That is, at this time, the first terminal device is the first terminal device that needs a background traffic data transmission policy.
- the data analysis network element may first based on the second information, the load information of the function network element, and the function network element. At least one of the capacity information determines a background traffic transmission data analysis result of the first terminal device.
- the data analysis network element determines the background traffic of the first terminal device to transmit the data analysis result based on the load information of the function network element and / or capacity information of the function network element
- the data analysis network element returns The load information of the functional network element and / or the capacity information of the functional network element may be obtained first.
- the functional network element may be at least one of a first policy control network element, a session management function network element, a radio access network network element, an access and mobility management function network element, and a user plane function network element. .
- the data analysis network element obtains the load information of the functional network element and / or the capacity information of the functional network element by using the following method:
- the data analysis network element is obtained from the functional network element or operation management and maintenance (operation, administration) and maintenance (OAM) network elements receive load information of functional network elements and / or capacity information of functional network elements.
- OAM operation management and maintenance
- the OAM network element collects the load information of the function network element from the function network element And / or capacity information of functional network elements.
- the data analysis network element determines the first terminal based on the target background traffic transmission policy and the second information of the second terminal device, and the load information of the functional network element and / or the capacity information of the functional network element.
- the analysis results of the background traffic transmission data of the device may be: the data analysis network element combines the content included in the target background traffic transmission policy of the second terminal device, the content included in the second information, and the background information maintained by the data analysis network element.
- the traffic transmission information (for example, the congestion level or no congestion indication during background traffic transmission at a certain location, etc.) collectively analyzes the background traffic transmission data analysis result of the first terminal device.
- the functional network element when the data analysis network element combines the content included in the target background traffic transmission policy of the second terminal device, the content included in the second information, and the maintained information about the background traffic transmission, the functional network element (such as a wireless access point)
- the load information of the network access element (ie, the base station) and the capacity information of the functional network element (such as the radio access network element (ie, the base station)) are used to analyze the background traffic transmission data analysis result of the first terminal device. But not limited to:
- Step 1 The data analysis network element can perform offline analysis based on the above-mentioned content to obtain each cell or base station (corresponding to Cell ID or RAN) in a certain area (such as any of TA, TA List, RA, and RA List). ID) for the first total throughput (ie, the first total bandwidth) for background traffic transmission.
- each cell or base station corresponding to Cell ID or RAN
- a certain area such as any of TA, TA List, RA, and RA List.
- ID for the first total throughput (ie, the first total bandwidth) for background traffic transmission.
- the congestion level 9 according to the operator's policy, it is the maximum congestion level (critical point) that a cell or base station can withstand.
- the data analysis network element counts all terminal devices in the cell or base station at this time.
- the transmission bandwidth of the background traffic (optional, which can be counted multiple times and averaged) to obtain the first total throughput of the cell or base station for background traffic transmission.
- Step 2 The data analysis network element determines the second total throughput for background traffic transmission in the current cell or base station where the first terminal device is located.
- the specific method may be: the data analysis network element obtains the location information of the first terminal device, that is, Obtain the cell ID or base station ID (RAN ID) of the first terminal device, and then according to the first terminal device's cell ID or base station ID, obtain the first total throughput of multiple cells or base stations in step 1. Query the second total throughput (that is, the second total bandwidth) of the current cell or base station where the first terminal device is located.
- the data analysis network element if the data analysis network element does not find the location information of the first terminal device from the second information from the first policy control network element, that is, the cell ID or the base station ID (Cell ID IDor RAN ID), but when the identity of the first terminal device (such as A) is found, the data analysis network element can operate, manage, and maintain (OAM) network elements, AMF, PCF, RAN through A direction Any one of the queries obtains the location information of the first terminal device.
- OAM manage, and maintain
- Step 3 The data analysis network element is based on the current background traffic requested by the first terminal device and the expected value of the transmission time window of the background traffic (that is, the third data value of the transmission time window of the background traffic.
- the second information carries This information
- the expected value of the transmission bandwidth of the background traffic of the first terminal device and the second total throughput, the first data value that determines the transmission time of the background traffic of the first terminal device and the background traffic transmission bandwidth of the first terminal device
- the specific method can be as follows:
- the data analysis network element first obtains the nodes or cells in the base station where the first terminal device is located, the transmission time window desired by the first terminal device (that is, the expected value of the background traffic transmission time window of the first terminal device), Timestamp), which is the sum of the transmission bandwidth of the second terminal device that is transmitting the background traffic in the cell or base station where the first terminal device is located, and the time node, plus the transmission bandwidth of the background traffic of the first terminal device.
- the first data value of the transmission time of the background traffic of the first terminal device and the first data value of the background traffic transmission bandwidth of the first terminal device may be specifically divided into the following two cases:
- Case e1 When the third total bandwidth at all time nodes is less than or equal to the second total throughput, the data analysis network element may use the expected value of the transmission time window of the background traffic of the first terminal device as the value of the first terminal device. The first data value of the transmission time window of the background traffic; and the data analysis network element may use the expected value of the transmission bandwidth of the background traffic of the first terminal device as the first data value of the transmission bandwidth of the background traffic of the first terminal device.
- the data analysis network element may have many variable measures, such as:
- Example 1 The data analysis network element does not change the time window size, but moves the entire time window backward or forward by the transmission time interval (TTI), and counts the third data value of the transmission time window of the first terminal device.
- TTI transmission time interval
- Timestamp the real-time throughput of different time nodes
- the magnitude relationship between the quantities determines the first data value of the transmission time of the background traffic of the first terminal device and the first data value of the background traffic transmission bandwidth of the first terminal device.
- the data analysis network element adds the expected value of the transmission time window of the background traffic of the first terminal device plus TTI as the first terminal device's The first data value of the transmission time window of the background traffic; and the data analysis network element determines that the first data value of the transmission bandwidth of the background traffic of the first terminal device is the size of the background traffic of the first terminal device divided by the first terminal
- Example 2 The data analysis network element changes the time window size, such as reducing the entire time window. Assuming that the expected value of the transmission time window of the background traffic of the first terminal device is [T3, T4], the updated time window size can be [T3 + t, T4], move the starting time backward t, and enlarge the average transmission bandwidth of each time point in the time window, use the new time window and bandwidth for transmission, and determine if the requirements can be met, then data analysis The network element may determine that the first data value of the transmission time window of the background traffic of the first terminal device is [T3 + t, T4]; and the data analysis network element may determine the first data of the transmission bandwidth of the background traffic of the first terminal device The value is the size of the background traffic of the first terminal device divided by (T4- (T3 + t)).
- NWDAF can also obtain the background traffic transmission data analysis result of the first terminal device based on the target background traffic transmission policy of the second terminal device in other ways, which is not limited in this solution.
- the data analysis network element when the data analysis network element sends the background traffic transmission data analysis result of the first terminal device to the first policy control network element, the data analysis network element may control the first policy by calling the Nnwdaf_AnalyticsInfo_Request response service The network element sends the analysis result of the background traffic transmission data of the first terminal device.
- Step 204 The first policy control network element sends the background traffic transmission policy of the first terminal device to the requesting device.
- the background traffic transmission policy of the first terminal device is determined by the first policy control network element according to the third information, and the third information includes the first information. Analysis results of background traffic transmission data of a terminal device.
- the third information may further include: a background traffic transmission query result of the first terminal device and / or a local background traffic transmission policy of the first terminal device.
- the background traffic transmission query result may include: a fourth data value of a transmission time window of the background traffic; the background traffic transmission query result may further include: a fourth data value of the background traffic transmission bandwidth, and the first terminal device At least one of location information of the mobile terminal and the identifier of the first terminal device.
- the fourth data value of the transmission time window of the background traffic of the first terminal device may be a database query value of the transmission time window of the background traffic of the first terminal device.
- the fourth data value of the transmission time window of the background traffic of the first terminal device that is subsequently referred to in this application may correspond to the database query value of the transmission time window of the background traffic of the first terminal device, which is not described in detail below.
- the fourth data value of the transmission bandwidth of the background traffic of the first terminal device may be a database query value of the transmission bandwidth of the background traffic of the first terminal device. It should be noted that the fourth data value of the transmission bandwidth of the background traffic of the first terminal device that is subsequently referred to in this application may correspond to the database query value of the transmission bandwidth of the background traffic of the first terminal device, and details are not described below.
- the local background traffic transmission strategy may include: the fifth data value of the transmission time window of the background traffic; the local background traffic transmission result may further include: the fifth data value of the background traffic transmission bandwidth, the location information of the first terminal device, the first At least one of the terminal device identifications.
- the fifth data value of the transmission time window of the background traffic of the first terminal device may be a local query value of the transmission time window of the background traffic of the first terminal device. It should be noted that the fifth data value of the transmission time window of the background traffic of the first terminal device that is subsequently referred to in this application may correspond to the local query value of the transmission time window of the background traffic of the first terminal device, which is not described in detail below.
- the fifth data value of the transmission bandwidth of the background traffic of the first terminal device may be a local query value of the transmission bandwidth of the background traffic of the first terminal device. It should be noted that the fifth data value of the transmission bandwidth of the background traffic of the first terminal device that is subsequently referred to in this application may be a local query value corresponding to the transmission bandwidth of the background traffic of the first terminal device, which is not described in detail below.
- the first policy control network element may determine the background traffic transmission policy of the first terminal device according to the third information.
- the background traffic transmission policy of the first terminal device may be one or more.
- the background traffic transmission strategy of the first terminal device may include: a second data value of a transmission time window of the background traffic; the background traffic transmission strategy may further include: a second data value of a transmission bandwidth of the background traffic, the first terminal device At least one of location information of the mobile terminal and the identifier of the first terminal device.
- the second data value of the transmission time window of the background traffic of the first terminal device may be a recommended value of the transmission time window of the background traffic of the first terminal device. It should be noted that the second data value of the transmission time window of the background traffic of the first terminal device that is subsequently referred to in this application may correspond to the recommended value of the transmission time window of the background traffic of the first terminal device, which is not described in detail below.
- the second data value of the transmission bandwidth of the background traffic of the first terminal device may be a recommended value of the transmission bandwidth of the background traffic of the first terminal device. It should be noted that the second data value of the transmission bandwidth of the background traffic of the first terminal device that is subsequently referred to in this application may correspond to the recommended value of the transmission bandwidth of the background traffic of the first terminal device, which is not described in detail below.
- the first policy control network element may perform the following three operations before determining the background traffic transmission policy of the first terminal device according to the third information. Either of the following:
- the first policy control network element obtains a background traffic transmission query result of the first terminal device from the database network element.
- the first policy control network element obtains the local background traffic transmission policy of the first terminal device from the first policy control network element.
- the third information further includes a query result of the background traffic transmission of the first terminal device and a local background traffic transmission policy of the first terminal device
- the first policy controls the network element to obtain the information of the first terminal device from the database network element.
- the background traffic transmission query result, and the first policy control network element obtains the local background traffic transmission policy of the first terminal device from the first policy control network element.
- the first policy control network element determines the background traffic transmission policy of the first terminal device according to the third information.
- the specific process can be:
- the first policy control network element may determine the second data value of the transmission time window of the background traffic in the background traffic transmission policy of the first terminal device according to the first data value of the transmission time window of the background traffic in the analysis result of the background traffic transmission data. ; The first policy control network element may further perform at least one of the following operations: the first policy control network element determines the background traffic transmission of the first terminal device according to the first data value of the transmission bandwidth of the background traffic in the analysis result of the background traffic transmission data The second data value of the transmission bandwidth of the background traffic in the policy; the first policy controls the network element to include the location information of the first terminal device in the analysis result of the background traffic transmission data in the background traffic transmission policy of the first terminal device; A policy control network element includes the identification of the first terminal device in the analysis result of the background traffic transmission data in the background traffic transmission policy of the first terminal device.
- the first policy controls the network element according to the third information. Determine the background traffic transmission policy of the first terminal device.
- the specific process may be:
- the first policy control network element may according to the first data value of the transmission time window of the background traffic in the analysis result of the background traffic transmission data and the fourth data of the transmission time window of the background traffic in the background traffic transmission query result of the first terminal device. Value, determines the second data value of the transmission time window of the background traffic in the background traffic transmission policy of the first terminal device; the first policy control network element may also perform at least one of the following operations: the first policy controls the network element according to the background traffic The first data value of the transmission bandwidth of the background traffic in the analysis result of the transmission data and the fourth data value of the transmission bandwidth of the background traffic in the background traffic transmission query result of the first terminal device determine the background traffic transmission strategy of the first terminal device.
- the second data value of the transmission bandwidth of the background traffic in the first policy; the first policy control network element includes the location information of the first terminal device in the background traffic transmission data analysis result and the first terminal device ’s background traffic transmission query result in the In the background traffic transmission policy of the first terminal device, the first policy controls the network element to transmit the background flow.
- the identification of the first terminal device in the analysis result of the volume transmission data and the background traffic transmission query result of the first terminal device is included in the background traffic transmission policy of the first terminal device.
- the first policy controls the network element according to the third information. Determine the background traffic transmission policy of the first terminal device.
- the specific process may be:
- the first policy control network element may according to the first data value of the transmission time window of the background traffic in the analysis result of the background traffic transmission data and the fifth data of the transmission time window of the background traffic in the local background traffic transmission policy of the first terminal device. Value, determines the second data value of the transmission time window of the background traffic in the background traffic transmission policy of the first terminal device; the first policy control network element may also perform at least one of the following operations: the first policy controls the network element according to the background traffic The first data value of the transmission bandwidth of the background traffic in the analysis result of the transmission data and the fifth data value of the transmission bandwidth of the background traffic in the local background traffic transmission strategy of the first terminal device determine the background traffic transmission strategy of the first terminal device The second data value of the transmission bandwidth of the background traffic in the first policy; the first policy control network element includes the location information of the first terminal device in the analysis result of the background traffic transmission data and the local background traffic transmission policy of the first terminal device in the In the background traffic transmission policy of the first terminal device, the first policy controls the network element to transmit the background flow. And
- the third information includes a background traffic transmission data analysis result of the first terminal device, a background traffic transmission query result of the first terminal device, and a local background traffic transmission policy of the first terminal device
- the first policy control network element determines the background traffic transmission policy of the first terminal device according to the third information.
- the specific process may be:
- the first policy control network element may according to the first data value of the transmission time window of the background traffic in the analysis result of the background traffic transmission data, and the fourth data of the transmission time window of the background traffic in the background traffic transmission query result of the first terminal device.
- the value and the fifth data value of the transmission time window of the background traffic in the local background traffic transmission policy of the first terminal device to determine the second data value of the transmission time window of the background traffic in the background traffic transmission policy of the first terminal device;
- the first policy control network element may also perform at least one of the following operations: the first policy control network element transmits a first data value of the transmission bandwidth of the background traffic in the analysis result of the background traffic transmission data, and the background traffic transmission query of the first terminal device The fourth data value of the transmission bandwidth of the background traffic in the result and the fifth data value of the transmission bandwidth of the background traffic in the local background traffic transmission policy of the first terminal device determine the background in the background traffic transmission policy of the first terminal device The second data value of the transmission bandwidth of the traffic; the first policy controls the network element to transmit the
- the data analysis network element when the first policy control network element requests the background traffic transmission data analysis result of multiple terminal devices, the data analysis network element returns the background traffic transmission of multiple terminal devices to the first policy control network element.
- the third information may include a background traffic transmission data analysis result of some of the multiple terminal devices.
- the first policy control network element when the first policy control network element sends a background traffic transmission policy of the first terminal device to the requesting device, the first policy control network element may further send identification information to the requesting device, and the identification information is used It is used to identify the target background traffic transmission strategy of the first terminal device. In this way, the subsequent requesting device may determine the target background traffic transmission policy of the first terminal device in the background traffic transmission policy of the first terminal device by using the identification information.
- the background traffic transmission policy of the first terminal device may be one or multiple, it may be specifically classified according to the number of background traffic transmission policies of the first terminal device. The following two situations:
- the first policy control network element may execute:
- the first policy control network element determines that the background traffic transmission policy of the first terminal device is the target background traffic transmission policy of the first terminal device; after that, the first policy control network element sends the target background traffic of the first terminal device to the data analysis network element. Transmission strategy; or the first policy controls the network element to send the target background traffic transmission policy of the first terminal device to the database network element; or the first policy controls the network element to send the target background traffic transmission of the first terminal device to the data analysis network element and the database Strategy.
- the first policy control network element may also perform the following operations:
- the first policy control network element receives the target background traffic transmission policy of the first terminal device from the requesting device, and the target background traffic transmission policy of the first terminal device is selected by the requesting device according to the background traffic transmission policy of the first terminal device;
- the policy control network element sends the target background traffic transmission policy of the first terminal device to the data analysis network element; or the first policy control network element sends the target background traffic transmission policy of the first terminal device to the database network element; or the first policy control network
- the metadata sends a target background traffic transmission policy of the first terminal device to the data analysis network element and the database.
- the first policy control network element when the first policy control network element sends the target background traffic transmission policy of the first terminal device to the data analysis network element and / or the database network element, the first policy control The network element may also send at least one of identification information, an identification of the requesting device, and an identification of the first policy control network element to the data analysis network element and / or the database network element.
- the data analysis network element and / or the database network element receives the target background traffic transmission policy of the first terminal device and saves it, and updates the target background traffic transmission policy of the plurality of maintained terminal devices.
- the first policy control network element finally transmits the target background traffic transmission policy of the first terminal device, and the identification information, the identifier of the requesting device, and the first policy control network element.
- the data analysis network element may receive the first policy control network element or other policy control network element to request the background traffic transmission data analysis result for other terminal devices, and may also combine the first Analyze the target background traffic transmission policy of a terminal device, and the target background traffic transmission policy of the terminal device corresponding to the requesting device and / or the target background traffic transmission policy of the terminal device corresponding to the first policy control network element, and further analyze It is possible to prevent conflicts between the background traffic transmission policies of other terminal devices that are finally determined and the background traffic transmission policies of the terminal devices (including the first terminal device) currently performing background traffic transmission.
- the database network element when the database network element receives the target background traffic query request of the first terminal device of the first policy control network element, the database network element can query and obtain the target background traffic transmission policy of the first terminal device according to the identification information carried in the query request. And return to the first policy control network element, and send the first policy control network element to at least one of the first terminal device, the radio access network element, the user plane function network element, and the first service network element.
- the background traffic transmission policy of the first terminal device when the background traffic transmission policy of the first terminal device is one, when the requesting device receives the background traffic transmission policy of the first terminal device sent by the first policy control network element, the requesting device determines the first The background traffic transmission policy of the terminal device is the target background traffic transmission policy of the first terminal device; and then the target background traffic transmission policy of the first terminal device is sent to the data analysis network element.
- the requesting device selects a target background traffic transmission policy of the first terminal device according to the background traffic transmission policies of the first terminal device, and then sends the The policy control network element sends a target background traffic transmission policy of the first terminal device.
- the foregoing operations may be performed after the requesting device receives the background traffic transmission policy of the first terminal device sent by the first policy control network element.
- the requesting device may further send the first terminal device to the data analysis network element.
- Target background traffic transmission strategy After the requesting device confirms the target background traffic transmission policy of the first terminal device according to the background traffic transmission policy of the first terminal device, the requesting device may further send the first terminal device to the data analysis network element. Target background traffic transmission strategy.
- any operation performed by the requesting device may be performed instead by the first terminal device or the first service network element serving the first terminal device.
- the execution process after replacement is not described in detail here.
- the target background traffic transmission policy and / or identification information of the first terminal device may also be sent to A database network element, and the identification information is used to identify a target background traffic transmission policy of the first terminal device.
- the data analysis network element can obtain the target background traffic transmission policy of the first terminal device from the database network element.
- the first policy control network element can obtain the target background traffic transmission policy of the first terminal device from the database network element by querying the identification information.
- the first policy control network element when the first policy control network element sends the background traffic transmission policy of the first terminal device to the requesting device, according to different situations where the requesting device may be the first terminal device or the first service network element Can be divided into the following two scenarios:
- the first policy control network element sends a background traffic transmission policy of the first terminal device to the first terminal device.
- the specific process may be: the first policy controls the network element
- the background traffic transmission policy of the terminal device is sent to the session management network element through the PDU session modification process.
- the first policy control network element can send the background traffic transmission policy of the first terminal device to the session management network element by calling the Npcf_SMPolicy Control_Update service.
- the session management network element sends the background traffic transmission policy of the first terminal device to the access and mobility management function network element, optionally, the session management network element may carry the background traffic transmission policy of the first terminal device in the session
- the PDU session update response (response of Nsmf_PDU Session_Update SMContext) sent by the management network element to the access and mobility management function network element; then the access and mobility management function network element sends the background traffic transmission policy of the first terminal device to Access network equipment serving the first terminal equipment, optional, access and mobile
- the mobility management function network element may send the background traffic transmission policy of the first terminal device to the access network device through the N2 message.
- the N2 message may be an N2 session request (N2 Session Request); finally, the access network device sends the first terminal device
- the background traffic transmission policy is sent to the first terminal device.
- the access network device may carry the background traffic transmission policy of the first terminal device with a specific resource modification (AN_specificresourse) sent by the access network device to the first terminal device. modification) message (that is, PDU session modification command / Ack).
- the first policy control network element when the first policy control network element sends the background traffic transmission policy of the first terminal device to the first terminal device, it may also send identification information to the first terminal device.
- the information is used to identify a target background traffic transmission policy of the first terminal device.
- For the process of sending the identification information by the first policy control network element to the first terminal device refer to the foregoing process of sending the background traffic transmission policy of the first terminal device by the first policy control network element to the first terminal device. To repeat.
- the identification information when the first terminal device decides to transmit the background traffic policy, the identification information is sent to the first policy control network element through a PDU session modification process.
- the first policy control network element passes the identification The information queries the database network element to obtain the target background traffic transmission strategy of the first terminal device, and further sends the target background traffic transmission policy to at least one of the radio access network element, the user plane function network element, and the first service network element.
- the target background traffic transmission policy to at least one of the radio access network element, the user plane function network element, and the first service network element.
- Element at least one of a user plane functional network element and a first service network element.
- the first policy control network element sends the background traffic transmission policy of the first terminal device to the first service network element.
- the specific process may be: the first policy controls the network element to pass through the network.
- the open function network element sends the background traffic transmission policy of the first terminal device to the first service network element.
- the first policy control network element sends the background traffic transmission policy of the first terminal device to the network open function network element.
- the first policy control network element may open the function to the network by calling the Npcf_BDT Policy Control_Create response service The network element sends the background traffic transmission policy of the first terminal device; then the network open function network element sends the background traffic transmission policy of the first terminal device to the first service network element.
- the network open function network element may call Nnef_BDTPNegotiation_Create The response service sends a background traffic transmission policy of the first terminal device to the first service network element.
- the first policy control network element when the first policy control network element sends the background traffic transmission policy of the first terminal device to the first service network element, it may also send identification information to the first service network element.
- the identification information is used to identify a target background traffic transmission policy of the first terminal device.
- For the process of the first policy control network element sending the identification information to the first service network element refer to the foregoing process of the first policy control network element sending the background traffic transmission policy of the first terminal device to the first service network element. Specifically, here No longer.
- the identification information is sent to the first policy control network element through a PDU session modification process. Further, the first policy control network element passes the The identification information queries the database network element to obtain the target background traffic transmission policy of the first terminal device, and further sends the target background traffic transmission policy to at least one of the first terminal device, the radio access network element, and the user plane function network element.
- the first policy control network element sends the background traffic transmission policy of the first terminal device to the first terminal device, which may be, but is not limited to, the above-mentioned PDU session modification process.
- the first policy control network element may also use a PDU session establishment procedure (PDU Establishment procedure), a registration procedure (Registration procedure), a service request procedure (Service Request procedure), a terminal configuration update procedure (UE Configuration Configuration Update), etc.
- PDU Establishment procedure PDU Establishment procedure
- Registration procedure Registration procedure
- Service Request procedure Service Request procedure
- UE Configuration Configuration Update a terminal configuration update procedure
- the first policy control network element may place the background traffic transmission policy of the first terminal device in the terminal routing policy (UESP) of the first terminal device.
- UESP terminal routing policy
- the first policy control network element sends the second information to the data analysis network element after receiving the first information requesting the background traffic transmission policy of the first terminal device from the requesting device.
- the information is used to request the background traffic transmission data analysis result of the first terminal device, and after receiving the data analysis result of the first terminal device from the data analysis network element, send the background traffic transmission policy of the first terminal device to the requesting device;
- the data analysis result of a terminal device is determined by the data analysis network element based on the target background traffic transmission policy of the second terminal device.
- the second terminal device is different from the first terminal device.
- the target background traffic transmission policy of the second terminal device is used for the first terminal device.
- the two terminal devices transmit background traffic; the background traffic transmission policy of the first terminal device is determined by the first policy control network element according to the third information, and the third information includes the analysis result of the background traffic transmission data of the first terminal device.
- the data analysis network element may determine a background traffic transmission data analysis result of the first terminal device based on a target background traffic transmission policy of another terminal device (that is, the second terminal device), so that the first policy may control the network element.
- a background traffic transmission policy of the first terminal device is determined, so that the background traffic transmission policy of the first terminal device determined by the first policy control network element refers to other terminal devices, etc., so that the first policy controls the first terminal determined by the network element.
- the background traffic transmission policy of the device does not conflict with the background traffic transmission policy of other terminal devices, which can solve the problem of background traffic transmission failure.
- the embodiment of the present application further provides a method for determining a background traffic transmission policy.
- the first terminal device directly requests the background traffic transmission policy of the first terminal device as a requesting device, and the method is also applicable.
- the specific process of the method may include:
- Step 301 The first terminal device sends first information to a first policy control network element, where the first information is used to request a background traffic transmission policy of the first terminal device.
- the specific process of the first terminal device sending the first information to the first policy control network element can refer to the related descriptions in the scenario a1 and the scenario a2 in the embodiment shown in FIG. .
- the content included in the first information is the same as the content included in the first information in the embodiment shown in FIG. 2, and can be referred to each other, and details are not described herein again.
- Step 302 The first policy control network element sends second information to the data analysis network element according to the first information, and the second information is used to request the background traffic of the first terminal device to transmit a data analysis result.
- step 302 For a detailed description of step 302, reference may be made to the description in step 202 in the foregoing embodiment, and details are not described herein again.
- Step 303 The data analysis network element sends the background traffic transmission data analysis result of the first terminal device to the first policy control network element, where the background traffic transmission data analysis result of the first terminal device is that the data analysis network element is based on the second terminal device. It is determined by the target background traffic transmission policy that the second terminal device is different from the first terminal device, and the target background traffic transmission policy of the second terminal device is used for background traffic transmission by the second terminal device.
- step 303 For a detailed description of step 303, reference may be made to the description in step 203 in the foregoing embodiment, and details are not described herein again.
- Step 304 The first terminal device receives the background traffic transmission policy of the first terminal device from the first policy control network element.
- the background traffic transmission policy of the first terminal device is determined by the first policy control network element according to the third information.
- the three pieces of information include analysis results of background traffic transmission data of the first terminal device.
- the first terminal device when the first terminal device receives the background traffic transmission policy of the first terminal device from the first policy control network element, the first terminal device may further receive identification information, and the identification information is used to identify a target of the first terminal device. Background traffic transmission strategy. In this way, the first terminal device can determine the target background traffic transmission policy of the first terminal device in the background traffic transmission policy of the first terminal device by using the identification information.
- the first terminal device may further send identification information to the first policy control network element.
- the first policy control network element can query the target background traffic transmission policy of the first terminal device from the database network element through the identification information, and subsequently send the target background traffic transmission policy of the first terminal device to the wireless access network.
- the first terminal device may send the identification information to the first policy control network element through the session management function network element through the PDU session modification process initiated by the first terminal device.
- the first policy control network element may use the identification information from the database
- the network element query obtains the target background traffic transmission policy of the first terminal device, and then the first policy control network element can send the target background traffic transmission policy of the first terminal device to the wireless access network element and the user through the remaining PDU Session modification process.
- the first terminal device may further execute: the first terminal device determines that the background traffic transmission policy of the first terminal device is the first terminal. The target background traffic transmission strategy of the device; the first terminal device sends the target background traffic transmission strategy of the first terminal device to the data analysis network element.
- the first terminal device may further execute: the first terminal device selects the first terminal device according to the background traffic transmission policy of the first terminal device.
- a target background traffic transmission policy of a terminal device the first terminal device sends a target background traffic transmission policy of the first terminal device to the first policy control network element.
- the first terminal device may further send the data of the first terminal device to the data analysis network element.
- Target background traffic transmission strategy may be
- the second information involved, the background traffic transmission strategy of the first terminal device, the analysis result of the background traffic transmission data of the first terminal device, and the target background traffic transmission strategy of the second terminal device can all refer to the figure. Relevant description in the embodiment shown in 2.
- an uplink background traffic transmission strategy can be determined based on the foregoing, which can solve the problem that the uplink background traffic transmission strategy cannot be determined in the prior art.
- an embodiment of the present application further provides a method for determining a background traffic transmission policy.
- a first service network element serving a first terminal device directly requests the first terminal device background as a requesting device.
- Traffic transmission strategy this method is also applicable to the communication system shown in Figure 1. Referring to FIG. 4, the specific process of the method may include:
- Step 401 The first service network element sends first information to the first policy control network element, where the first information is used to request a background traffic transmission policy of the first terminal device.
- the specific process of the first service network element sending the first information to the first policy control network element can refer to the related descriptions in scenario b1 and scenario b2 in the embodiment shown in FIG. To repeat.
- the content included in the first information is the same as the content included in the first information in the embodiment shown in FIG. 2, and can be referred to each other, and details are not described herein again.
- Step 402 The first policy control network element sends second information to the data analysis network element according to the first information, and the second information is used to request the background traffic of the first terminal device to transmit a data analysis result.
- step 402 For a detailed description of step 402, reference may be made to the description in step 202 in the foregoing embodiment, and details are not described herein again.
- Step 403 The data analysis network element sends a background traffic transmission data analysis result of the first terminal device to the first policy control network element, wherein the background traffic transmission data analysis result of the first terminal device is that the data analysis network element is based on the second terminal device. It is determined by the target background traffic transmission policy that the second terminal device is different from the first terminal device, and the target background traffic transmission policy of the second terminal device is used for background traffic transmission by the second terminal device.
- step 403 For a detailed description of step 403, reference may be made to the description in step 203 in the foregoing embodiment, and details are not repeatedly described herein.
- Step 404 The first service network element receives the background traffic transmission policy of the first terminal device from the first policy control network element, where the background traffic transmission policy of the first terminal device is determined by the first policy control network element according to the third information.
- the third information includes a background traffic analysis data analysis result of the first terminal device.
- the first service network element receives the background traffic transmission policy of the first terminal device from the first policy control network element
- the first service network element when the first service network element receives the background traffic transmission policy of the first terminal device from the first policy control network element, it may further receive identification information, and the identification information is used to identify the first terminal device. Target background traffic transmission strategy. In this way, the first service network element can determine the target background traffic transmission policy of the first terminal device in the background traffic transmission policy of the first terminal device by using the identification information.
- the first service network element may further send an identifier to the first policy control network element. information.
- the first policy control network element can query the target background traffic transmission policy of the first terminal device from the database network element through the identification information, and subsequently send the target background traffic transmission policy of the first terminal device to the first terminal device.
- the first service network element may send the identification information to the first policy control network element through the PDU session modification process initiated by the first terminal device, and the first policy control network element may query the database network element to obtain the first information through the identification information.
- the target background traffic transmission policy of a terminal device and then the first policy control network element can send the target background traffic transmission policy of the first terminal device to the first terminal device, the wireless access network element, and the user through the remaining PDU Session modification process. At least one of the area network elements.
- the first service network element may further execute: the first service network element determines that the background traffic transmission policy of the first terminal device is the first A target background traffic transmission policy of a terminal device; the first service network element sends a target background traffic transmission policy of the first terminal device to the data analysis network element.
- the first service network element may further execute: the first service network element performs the background traffic transmission policy according to the first terminal device. A target background traffic transmission strategy of the first terminal device is selected; the first service network element sends the target background traffic transmission strategy of the first terminal device to the first policy control network element.
- the first service network element may further send the first terminal device to the data analysis network element.
- Target background traffic transmission strategy may be used.
- the second information involved, the background traffic transmission strategy of the first terminal device, the analysis result of the background traffic transmission data of the first terminal device, and the target background traffic transmission strategy of the second terminal device can all refer to the figure. Relevant description in the embodiment shown in 2.
- FIG. 5 and FIG. 6 are based on the foregoing embodiments, and take a specific example to describe in detail a method for determining a background traffic transmission policy provided by an embodiment of the present application.
- an embodiment of the present application provides an example of a method for determining a background traffic transmission policy.
- the first terminal device directly requests the background traffic transmission policy of the first terminal, and the terminal device is specifically a UE.
- the policy control network element is a PCF and the data analysis network element is a NWDAF.
- the specific process of this example can include:
- Step 501 The UE sends first information to the AMF, and the first information is used to request a background traffic transmission policy of the UE.
- AMF is an example of an access and mobility management function network element.
- the AMF can also be replaced with other access and mobility management function network elements, which is not limited in this application.
- the UE may send the first information to the AMF through the N1 message.
- Step 502 The AMF sends the first information to the SMF.
- the SMF is an example of a session management function network element.
- the SMF may also be replaced with another session management function network element, which is not limited in this application.
- the AMF may send the first information to the SMF by calling the Nsmf_PDU Session_UpdateSMContext service.
- Step 503 The SMF sends the first information to the PCF.
- the SMF may send the first information to the PCF by calling the Npcf_SMPolicy Control_Update service.
- Step 504 The PCF sends second information to the NWDAF according to the first information, and the second information is used to request the background traffic transmission data analysis result of the UE.
- Step 505 The NWDAF determines the background traffic transmission data analysis result of the UE based on the target background traffic transmission policies of other UEs.
- the NWDAF determines the analysis result of the background traffic transmission data of the UE based on the second information and the target background traffic transmission policy of the other UE.
- Step 506 The NWDAF sends the analysis result of the background traffic transmission data of the UE to the PCF.
- Step 507 The PCF determines the background traffic transmission policy of the UE according to the third information, and the third information includes a result of analyzing the background traffic transmission data of the UE.
- Step 508 The PCF sends the background traffic transmission policy of the UE to the SMF.
- the PCF can send the background traffic transmission policy of the UE to the SMF by calling the Npcf_SMPolicy Control_Update service.
- the PCF when the PCF sends the background traffic transmission policy of the UE to the SMF, it also sends identification information to the SMF, where the identification information is used to identify the target background traffic transmission policy of the first terminal device.
- Step 509 The SMF sends the background traffic transmission policy of the UE to the AMF.
- the SMF can send the UE's background traffic transmission policy to the AMF through the response of Nsmf_PDU, Session_Update, and SMContext.
- Step 510 The AMF sends the background traffic transmission policy of the UE to the RAN.
- the RAN is an example of an access network device.
- the RAN may also be replaced with another access network device, which is not limited in this application.
- the AMF may send the background traffic transmission policy of the UE to the RAN through the N2 message.
- Step 511 The RAN sends the background traffic transmission policy of the UE to the UE.
- the RAN may send the background traffic transmission policy of the UE to the UE through AN_specific response modification (ie, PDU session modification command / Ack).
- AN_specific response modification ie, PDU session modification command / Ack.
- the PCF may perform steps 512 and 513, as follows:
- Step 512 The PCF determines that the background traffic transmission policy of the UE is the target background traffic transmission policy of the UE.
- Step 513 The PCF sends the target background traffic transmission policy of the UE to the NWDAF.
- the PCF when the PCF sends the target background traffic transmission policy of the UE to the NWDAF, at least one of the identification information, the identity of the PCF, and the identity of the UE may be sent to the NWDAF.
- step 512 may be omitted, and the PCF may directly send the background traffic transmission policy of the UE to NWDAF, which is not described in detail here.
- step 511 when there are multiple background traffic transmission policies of the UE, after step 511, there may be the following steps:
- Step 514 The UE selects a target background traffic transmission policy of the UE according to the background traffic transmission policy of the UE.
- Step 515 The UE sends a target background traffic transmission policy of the UE to the AMF.
- the UE may send a target background traffic transmission policy of the UE to the AMF through a PDU Session Modification Request message.
- Step 516 The AMF sends a target background traffic transmission policy of the UE to the SMF.
- the AMF may call the Nsmf_PDUSession_UpdateSMContex service to send the target background traffic transmission policy of the UE to the SMF.
- Step 517 The SMF sends a target background traffic transmission policy of the UE to the PCF.
- the SMF can call the Npcf_SMPolicyControl_Update request service to send the target background traffic transmission policy of the UE to the PCF.
- the UE may also send the target background traffic transmission policy of the UE to the NWDAF.
- the UE may also send the target background traffic transmission policy of the UE to the database network element (for example, UDR). Specifically, FIG. 5 is not shown again.
- Step 518 The PCF sends the target background traffic transmission policy of the UE to the NWDAF.
- the PCF when the PCF sends the target background traffic transmission policy of the UE to the NWDAF, at least one of the identification information, the identity of the PCF, and the identity of the UE may be sent to the NWDAF.
- step 518 and step 513 are the same steps.
- two possible implementation manners are shown in terms of two aspects.
- this embodiment of the present application provides another example of a method for determining a background traffic transmission policy.
- a first service network element serving a first terminal device requests a background traffic transmission from the first terminal.
- the policy is specifically described by taking the first service network element as the AF, the terminal device as the UE, the policy control network element as the PCF, and the data analysis network element as the NWDAF.
- the specific process of this example can include:
- Step 601 The AF sends first information to the NEF, where the first information is used to request a background traffic transmission policy of the UE.
- NEF is an example of a network element with an open function.
- NEF can also be replaced with another network element with an open function, which is not limited in this application.
- the AF may send the first information to the NEF by calling the Nnef_BDTPNegotiation_Create request or Nnef_Trigger_Delivery request service.
- Step 602 The NEF sends the first information to the PCF.
- the NEF may send the first information to the PCF by calling the Npcf_BDTPolicyControl_Create request or Npcf_Policy Authorization_Create Request service.
- Step 603 The PCF sends second information to the NWDAF according to the first information, and the second information is used to request the background traffic transmission data analysis result of the UE.
- Step 604 The NWDAF determines the background traffic transmission data analysis result of the UE based on the target background traffic transmission policies of other UEs.
- the NWDAF determines the analysis result of the background traffic transmission data of the UE based on the second information and the target background traffic transmission policy of the other UE.
- Step 605 The NWDAF sends the analysis result of the background traffic transmission data of the UE to the PCF.
- Step 606 The PCF determines the background traffic transmission policy of the UE according to the third information, and the third information includes a result of analyzing the background traffic transmission data of the UE.
- Step 607 The PCF sends the background traffic transmission policy of the UE to the NEF.
- the PCF may send the background traffic transmission policy of the UE to the NEF by calling the Npcf_BDT Policy Control Create Response or Npcf_PolicyAuthorization_Notify service.
- the PCF when the PCF sends the background traffic transmission policy of the UE to the SMF, it also sends identification information to the SMF, where the identification information is used to identify the target background traffic transmission policy of the first terminal device.
- Step 608 The NEF sends the background traffic transmission policy of the UE to the AF.
- the NEF can call the Nnef_BDT, Pnegotiation_Create response, or Nnef_Trigger_Delivery response service to send the UE's background traffic transmission policy to the AF.
- the PCF may perform steps 609 and 610, as follows:
- Step 609 The PCF determines that the background traffic transmission policy of the UE is the target background traffic transmission policy of the UE.
- Step 610 The PCF sends a target background traffic transmission policy of the UE to the NWDAF.
- the PCF when the PCF sends the target background traffic transmission policy of the UE to the NWDAF, at least one of the identification information, the identity of the PCF, and the identity of the UE may be sent to the NWDAF.
- step 609 may be omitted, and the PCF may directly send the background traffic transmission policy of the UE to NWDAF, which is not described in detail here.
- step 608 when there are multiple background traffic transmission policies of the UE, after step 608, there may be the following steps:
- Step 611 The AF selects the target background traffic transmission strategy of the UE according to the background traffic transmission strategy of the UE.
- Step 612 The AF sends a target background traffic transmission policy of the UE to the NEF.
- the AF may call the Nnef_BDTPNegotiation_Update request or Nnef_Trigger_Delivery request service to send the target background traffic transmission policy of the UE to the NEF.
- Step 613 The NEF sends the target background traffic transmission policy and / or identification information of the UE to the PCF.
- the NEF may call the Npcf_BDTPolicyControl_Update request or Npcf_PolicyAuthorization_Update Request service to send the target background traffic transmission policy of the UE to the PCF.
- the AF may also send the target background traffic transmission policy of the UE to the NWDAF, or send the target background traffic transmission policy of the UE and at least one of the following: the identity of the PCF, the identity of the AF, and identification information .
- the AF may also send the target background traffic transmission policy of the UE to the database network element (for example, UDR), or send the target background traffic transmission policy of the UE and at least one of the following: the identity of the PCF, the AF Identification, identification information.
- the database network element for example, UDR
- FIG. 5 is not shown again.
- Step 614 The PCF sends the target background traffic transmission policy of the UE to the NWDAF.
- the PCF when the PCF sends the target background traffic transmission policy of the UE to the NWDAF, at least one of the identification information, the identity of the PCF, and the identity of the UE may be sent to the NWDAF.
- step 614 and step 610 are the same steps. For convenience, two possible implementation manners are shown here.
- each solution of the method for determining a background traffic transmission policy provided in the embodiments of the present application is described from the perspective of interaction between each network element or device.
- each network element and device such as the first policy control network element, the data analysis network element, the first service network element, and the first terminal device, includes a corresponding hardware structure for performing each function. And / or software modules.
- this application can be implemented in the form of hardware or a combination of hardware and computer software. Whether a certain function is performed by hardware or computer software-driven hardware depends on the specific application and design constraints of the technical solution. A professional technician can use different methods to implement the described functions for each specific application, but such implementation should not be considered to be beyond the scope of this application.
- a communication device for determining a background traffic transmission strategy may include a receiving module 701 and a sending module 702, and optionally may further include a processing module 703. Refer to the structure diagram shown in FIG. 7.
- the communication device shown in FIG. 7 may be used to perform the operations of the first policy control network element in the embodiments shown in FIG. 2, FIG. 3, and FIG. Operation of the PCF in the illustrated embodiment.
- the receiving module 701 is configured to receive first information from a requesting device, where the first information is used to request a background traffic transmission policy of the first terminal device;
- the sending module 702 is configured to send second information to the data analysis network element according to the first information, and the second information is used to request the background traffic of the first terminal device to transmit a data analysis result;
- the receiving module 701 is further configured to receive a background traffic transmission data analysis result of the first terminal device from the data analysis network element, where the background traffic transmission data analysis result of the first terminal device is the target background of the data analysis network element based on the second terminal device. It is determined by the traffic transmission policy that the second terminal device is different from the first terminal device, and the target background traffic transmission policy of the second terminal device is used for background traffic transmission by the second terminal device;
- the sending module 702 is further configured to send a background traffic transmission policy of the first terminal device to the requesting device.
- the background traffic transmission policy of the first terminal device is determined by the first policy control network element according to the third information, and the third information includes the first terminal device. Analysis results of background traffic transmission data.
- the data analysis network element can determine the background traffic transmission data analysis result of the first terminal device based on the target background traffic transmission policies of other terminal devices (that is, the second terminal device). Furthermore, the first policy control network element can determine the background traffic transmission policy of the first terminal device, so that the background traffic transmission policy of the first terminal device determined by the first policy control network element refers to other terminal devices, so that the first policy can be made.
- the background traffic transmission policy of the first terminal device determined by the control network element does not conflict with the background traffic transmission policies of other terminal devices, so that the problem of background traffic transmission failure can be solved.
- the third information further includes a background traffic transmission query result of the first terminal device and / or a local background traffic transmission policy of the first terminal device.
- the receiving module 701 is further configured to: when the third information further includes a background traffic transmission query result of the first terminal device, obtain a background traffic transmission query result of the first terminal device from a database network element. ; Or when the third information further includes a local background traffic transmission policy of the first terminal device, obtain the local background traffic transmission policy of the first terminal device from the first policy control network element; or when the third information further includes the first terminal device The background traffic transmission query result of the first terminal device and the local background traffic transmission policy of the first terminal device, obtain the background traffic transmission query result of the first terminal device from the database network element, and obtain the first terminal device from the first policy control network element. Local background traffic transmission policy.
- the processing module 703 is configured to determine that the background traffic transmission policy of the first terminal device is a target background traffic transmission policy of the first terminal device.
- the target background traffic transmission strategy of the first terminal device is used for the background traffic transmission of the first terminal device;
- the sending module 702 is further configured to send the target background traffic transmission strategy of the first terminal device to the data analysis network element and / or the database network element. .
- the receiving module 701 is further configured to receive a target background traffic transmission policy of the first terminal device from the requesting device.
- the first terminal device The target background traffic transmission strategy is selected by the requesting device according to the background traffic transmission strategy of the first terminal device; the sending module 702 is further configured to send the target background traffic transmission strategy of the first terminal device to the data analysis network element and / or the database network element. .
- the requesting device is a first terminal device or a service network element serving the first terminal device.
- the analysis result of the background traffic transmission data includes: the first data value of the transmission time window of the background traffic; the analysis result of the background traffic transmission data analysis further includes: the first data value of the transmission bandwidth of the background traffic, At least one of location information of the first terminal device and an identifier of the first terminal device.
- the background traffic transmission strategy includes: the second data value of the transmission time window of the background traffic; the background traffic transmission strategy further includes: the second data value of the transmission bandwidth of the background traffic, and the first terminal device. At least one of location information of the mobile terminal and the identifier of the first terminal device.
- the second information includes the magnitude of the background traffic of the first terminal device; the second information further includes the identification of the first policy control network element, the identification of the requesting device, and the first terminal device. At least one of the third data value of the transmission time window of the background traffic, the location information of the first terminal device, and the identifier of the first terminal device.
- the first information includes the magnitude of the background traffic of the first terminal device; the first information further includes an identifier of the requesting device, and a first time interval of the transmission time window of the background traffic of the first terminal device. At least one of three data values, location information of the first terminal device, and an identifier of the first terminal device.
- the query result of the background traffic transmission includes: a fourth data value of the transmission time window of the background traffic; the query result of the background traffic transmission further includes: a fourth data value of the transmission bandwidth of the background traffic, the first At least one of location information of the terminal device and an identifier of the first terminal device.
- the local background traffic transmission strategy includes: a fifth data value of a transmission time window of the background traffic; the local background traffic transmission result further includes: a fifth data value of the transmission bandwidth of the background traffic, the first At least one of location information of the terminal device and an identifier of the first terminal device.
- the sending module 702 when the sending module 702 sends the background traffic transmission policy of the first terminal device to the requesting device, the sending module 702 is further configured to send identification information to the requesting device, and the identification information is used to identify the first terminal device.
- Target background traffic transmission strategy when the sending module 702 sends the background traffic transmission policy of the first terminal device to the requesting device, the sending module 702 is further configured to send identification information to the requesting device, and the identification information is used to identify the first terminal device.
- Target background traffic transmission strategy when the sending module 702 sends the background traffic transmission policy of the first terminal device to the requesting device.
- the sending module 702 when the sending module 702 sends the target background traffic transmission policy of the first terminal device to the data analysis network element and / or the database network element, the sending module 702 is further configured to send the data analysis network element and / or Or, the database network element sends at least one of identification information, an identification of the requesting device, and an identification of the first policy control network element.
- the receiving module 701 is further configured to receive the identification information from the requesting device after the sending module 702 sends the background traffic transmission policy of the first terminal device to the requesting device.
- the sending module 702 and optionally the processing module 703 in the communication device for determining a background traffic transmission policy other operations or functions of the first policy control network element in the foregoing method may be implemented. I will not repeat them here.
- the communication device shown in FIG. 7 may be further configured to perform operations of the first terminal device in the embodiment shown in FIG. 3 described above, and to perform operations of the UE in the embodiment shown in FIG. 5 described above. operating.
- the sending module 702 is configured to send first information to a first policy control network element, where the first information is used to request a background traffic transmission policy of the first terminal device;
- the receiving module 701 is configured to receive a background traffic transmission policy of a first terminal device from a first policy control network element, where the background traffic transmission policy of the first terminal device is determined by the first policy control network element according to the third information, and the third information An analysis result of background traffic transmission data including the first terminal device from the data analysis network element.
- the background traffic transmission policy of the first terminal device is determined by the first policy control network element according to the third information, and the third information includes the first terminal device from the data analysis network element.
- Analysis result of background traffic transmission data so that the background traffic transmission strategy of the first terminal device determined by the first policy control network element refers to other terminal equipment, so that the background traffic transmission strategy of the first terminal device can be transmitted to other terminal equipment.
- the background traffic transmission strategy does not conflict, which can solve the problem of background traffic transmission failure.
- the third information further includes a background traffic transmission query result of the first terminal device and / or a local background traffic transmission policy of the first terminal device.
- the processing module 703 is configured to determine that the background traffic transmission policy of the first terminal device is a target background traffic transmission policy of the first terminal device.
- the processing module 703 is further configured to select a target background traffic of the first terminal device according to the background traffic transmission policy of the first terminal device when there are multiple background traffic transmission policies of the first terminal device. Transmission policy; the sending module 702 is further configured to send a target background traffic transmission policy of the first terminal device to the first policy control network element.
- the sending module 702 is further configured to send a target background traffic transmission policy of the first terminal device to the data analysis network element.
- the analysis result of the background traffic transmission data includes: the first data value of the transmission time window of the background traffic; the analysis result of the background traffic transmission data analysis further includes: the first data value of the transmission bandwidth of the background traffic, At least one of location information of the first terminal device and an identifier of the first terminal device.
- the background traffic transmission strategy includes: the second data value of the transmission time window of the background traffic; the background traffic transmission strategy further includes: the second data value of the transmission bandwidth of the background traffic, and the first terminal device. At least one of location information of the mobile terminal and the identifier of the first terminal device.
- the first information includes the magnitude of the background traffic of the first terminal device; the first information further includes the third data value of the transmission time window of the background traffic of the first terminal device, At least one of location information and identification.
- the query result of the background traffic transmission includes: a fourth data value of the transmission time window of the background traffic; the query result of the background traffic transmission further includes: a fourth data value of the transmission bandwidth of the background traffic, the first At least one of location information of the terminal device and an identifier of the first terminal device.
- the local background traffic transmission strategy includes: a fifth data value of a transmission time window of the background traffic; the local background traffic transmission result further includes: a fifth data value of the transmission bandwidth of the background traffic, the first At least one of location information of the terminal device and an identifier of the first terminal device.
- the receiving module 701 before the sending module 702 sends the first information to the first policy control network element, the receiving module 701 is further configured to obtain the magnitude of the background traffic of the first terminal device from the first service network element: The receiving module 701 is further configured to further acquire, from the first service network element, at least one of a third data value, location information, and identifier of a transmission time window of the background traffic of the first terminal device.
- the receiving module 701 when the receiving module 701 receives the background traffic transmission policy of the first terminal device, the receiving module 701 is further configured to receive identification information from the first policy control network element, and the identification information is used to identify the first The target background traffic transmission policy of the terminal device.
- the sending module 702 is further configured to send identification information to the first policy control network element.
- the communication device shown in FIG. 7 may be further configured to perform the operation of the first service network element in the embodiment shown in FIG. 4 and to perform AF in the embodiment shown in FIG. 6. Operation.
- a sending module 702 configured to send first information to a first policy control network element, where the first information is used to request a background traffic transmission policy of the first terminal device;
- the receiving module 701 is configured to receive a background traffic transmission policy of a first terminal device from a first policy control network element.
- the background traffic transmission policy of the first terminal device is determined by the first policy control network element according to the third information.
- the information includes a background traffic transmission data analysis result from the first terminal device of the data analysis network element.
- the background traffic transmission policy of the first terminal device is determined by the first policy control network element according to the third information, and the third information includes the first terminal device from the data analysis network element.
- Analysis result of background traffic transmission data so that the background traffic transmission strategy of the first terminal device determined by the first policy control network element refers to other terminal equipment, so that the background traffic transmission strategy of the first terminal device can be transmitted to other terminal equipment.
- the background traffic transmission strategy does not conflict, which can solve the problem of background traffic transmission failure.
- the third information further includes a background traffic transmission query result of the first terminal device and / or a local background traffic transmission policy of the first terminal device.
- the processing module 703 is configured to determine that the background traffic transmission policy of the first terminal device is a target background traffic transmission policy of the first terminal device.
- the processing module 703 is further configured to select the target background traffic of the first terminal device according to the background traffic transmission policies of the first terminal device. Transmission policy; the sending module 702 is further configured to send a target background traffic transmission policy of the first terminal device to the first policy control network element.
- the sending module 702 is further configured to send a target background traffic transmission policy of the first terminal device to the data analysis network element.
- the analysis result of the background traffic transmission data includes: the first data value of the transmission time window of the background traffic; the analysis result of the background traffic transmission data analysis further includes: the first data value of the transmission bandwidth of the background traffic, At least one of location information of the first terminal device and an identifier of the first terminal device.
- the background traffic transmission strategy includes: the second data value of the transmission time window of the background traffic; the background traffic transmission strategy further includes: the second data value of the transmission bandwidth of the background traffic, and the first terminal device. At least one of location information of the mobile terminal and the identifier of the first terminal device.
- the first information includes the magnitude of the background traffic of the first terminal device; the first information further includes an identifier of the first service network element and a transmission time of the background traffic of the first terminal device. At least one of a third data value of the window, location information of the first terminal device, and an identifier of the first terminal device.
- the query result of the background traffic transmission includes: a fourth data value of the transmission time window of the background traffic; the query result of the background traffic transmission further includes: a fourth data value of the transmission bandwidth of the background traffic, the first At least one of location information of the terminal device and an identifier of the first terminal device.
- the local background traffic transmission strategy includes: a fifth data value of a transmission time window of the background traffic; the local background traffic transmission result further includes: a fifth data value of the transmission bandwidth of the background traffic, the first At least one of location information of the terminal device and an identifier of the first terminal device.
- the receiving module 701 before the sending module 702 sends the first information to the first policy control network element, the receiving module 701 is further configured to obtain the size of the background traffic of the first terminal device from the first terminal device; The receiving module 701 also obtains, from the first terminal device, the identifier of the first service network element, the third data value of the transmission time window of the background traffic of the first terminal device, the location information of the first terminal device, and the identifier of the first terminal device. At least one.
- the receiving module 701 when the receiving module 701 receives the background traffic transmission policy of the first terminal device from the first policy control network element, the receiving module 701 is further configured to receive identification information from the first policy control network element. The information is used to identify a target background traffic transmission policy of the first terminal device.
- the sending module 702 is further configured to send the identification information to the first policy control network element after the receiving module 701 receives the background traffic transmission policy of the first terminal device from the first policy control network element.
- the communication device for determining a background traffic transmission strategy may further include a receiving module 801 and a sending module 802.
- a receiving module 801 may further include a sending module 802.
- the communication device shown in FIG. 8 may be used to perform the operations of the data analysis network element in the embodiments shown in FIG. 2, FIG. 3, and FIG. 4, and may be used to perform the operations shown in FIG. 5 and FIG. 6.
- the receiving module 801 is configured to receive second information from a first policy control network element, the second information is used to request a background traffic transmission data analysis result of the first terminal device, and the second information is received by the first policy control network element from the requesting device.
- the first information determines that the first information is used to request a background traffic transmission policy of the first terminal device;
- the sending module 802 is configured to send a background traffic transmission data analysis result of the first terminal device to the first policy control network element, and the background traffic transmission data analysis result of the first terminal device is analyzed by the data analysis network element based on the target background traffic of the second terminal device.
- the transmission policy determines that the second terminal device is different from the first terminal device, and the target background traffic transmission policy of the second terminal device is used for the background traffic transmission of the second terminal device.
- the analysis result of the background traffic transmission data of the first terminal device is determined based on the target background traffic transmission policies of the other terminal devices (that is, the second terminal device), thereby enabling the first strategy
- the control network element determines a background traffic transmission policy of the first terminal device, so that the background traffic transmission policy of the first terminal device determined by the first policy control network element can refer to other terminal devices, so that the first policy control network element can determine
- the background traffic transmission policy of the first terminal device does not conflict with the background traffic transmission policies of other terminal devices, thereby solving the problem of background traffic transmission failure.
- the background traffic transmission data analysis result of the first terminal device may be further analyzed by the data analysis network element based on the target background traffic transmission policy and the second information of the second terminal device, and the load of the functional network element. Determined by the information and / or capacity information of the functional network element.
- the receiving module 801 is further configured to obtain a target background traffic transmission policy of the second terminal device.
- the receiving module 801 is specifically configured to receive the target background traffic transmission policy of the second terminal device from the first device when acquiring the target background traffic transmission policy of the second terminal device, where the first device Any one or more of the following: a second terminal device, a first policy control network element, a second policy control network element, a second service network element, and a second database network element, wherein the first policy control network element, the first The two policy control network elements, the second service network element, and the second database network element serve the second terminal device.
- the receiving module 801 is further configured to obtain load information of a functional network element; or the receiving module 801 is further configured to obtain capacity information of a functional network element; or the receiving module 801 is further configured to obtain a functional network element Element load information and functional network element capacity information.
- the receiving module 801 is specifically configured to: when receiving the load information of the functional network element: receive the load information of the functional network element from the functional network element or the operation management and maintenance network element; or the receiving module 801 is acquiring
- the capacity information of the functional network element is specifically used to receive the capacity information of the functional network element from the functional network element or the operation management and maintenance network element; or the receiving module 801 is specifically used to obtain the load information of the functional network element and the capacity information of the functional network element. It can be used to receive the load information of the functional network element and the capacity information of the functional network element from the functional network element or the operation management and maintenance network element.
- the functional network element includes a first policy control network element serving a first terminal device, a session management function network element, a radio access network network element, and an access and mobility management function network element. 2. At least one of the user plane function network elements.
- the receiving module 801 is further configured to receive a target background traffic transmission policy of the first terminal device, where the first terminal device performs background traffic transmission according to the target background traffic transmission policy of the first terminal device.
- the receiving module 801 is specifically configured to receive the target background traffic transmission policy of the first terminal device from the second device when receiving the target background traffic transmission policy of the first terminal device.
- the two devices are any one or more of the following: a first terminal device, a first policy control network element, a first service network element, and a first database network element, wherein the first policy control network element, the first service network element, The first database network element serves a first terminal device.
- the receiving module 801 when the receiving module 801 receives the target background traffic transmission policy of the first terminal device, the receiving module 801 is further configured to receive the identifier of the requesting device, or is further configured to receive the first policy control network element.
- the identification or is also used to receive the identification of the requesting device and the identification of the first policy control network element.
- the analysis result of the background traffic transmission data includes: the first data value of the transmission time window of the background traffic; the analysis result of the background traffic transmission data analysis further includes: the first data value of the transmission bandwidth of the background traffic, At least one of location information of the first terminal device and an identifier of the first terminal device.
- the background traffic transmission strategy includes: the second data value of the transmission time window of the background traffic; the background traffic transmission strategy further includes: the second data value of the transmission bandwidth of the background traffic, and the first terminal device. At least one of location information of the mobile terminal and the identifier of the first terminal device.
- the second information includes the magnitude of the background traffic of the first terminal device; the second information further includes the identity of the first policy control network element, the identity of the requesting device, and the identity of the first terminal device. At least one of a third data value of a transmission time window of the background traffic, location information of the first terminal device, and an identifier of the first terminal device.
- the first information includes the magnitude of the background traffic of the first terminal device; the first information further includes a request device identifier, and a third time window of the transmission time window of the background traffic of the first terminal device. At least one of a data value, location information of the first terminal device, and an identifier of the first terminal device.
- the division of the units or modules in the embodiments of the present application is schematic, and is only a logical function division. In actual implementation, there may be another division manner.
- the functional units in the embodiments of the present application may be integrated into one processing unit, or each of the units may exist separately physically, or two or more units may be integrated into one unit.
- the above integrated unit may be implemented in the form of hardware or in the form of software functional unit.
- the integrated unit When the integrated unit is implemented in the form of a software functional unit and sold or used as an independent product, it can be stored in a computer-readable storage medium.
- the technical solution of the present application is essentially a part that contributes to the existing technology or all or part of the technical solution can be embodied in the form of a software product, which is stored in a storage medium It includes several instructions to enable a computer device (which may be a personal computer, a server, or a network device, etc.) or a processor to perform all or part of the steps of the methods in the embodiments of the present application.
- the aforementioned storage media include: U disks, mobile hard disks, read-only memories (ROM), random access memories (RAM), magnetic disks or optical disks, and other media that can store program codes .
- the communication device for determining a background traffic transmission strategy may include a transceiver 901 and a processor 902, and optionally may further include a memory 903.
- the communication device for determining a background traffic transmission strategy may include a transceiver 901 and a processor 902, and optionally may further include a memory 903.
- Figure 9 shows the structure.
- the processor 902 may be a central processing unit (CPU), a network processor (NP), a combination of a CPU and an NP, and so on.
- the processor 902 may further include a hardware chip.
- the above hardware chip may be an application-specific integrated circuit (ASIC), a programmable logic device (PLD), or a combination thereof.
- the PLD may be a complex programmable logic device (CPLD), a field-programmable gate array (FPGA), a generic array logic (GAL), or any combination thereof.
- CPLD complex programmable logic device
- FPGA field-programmable gate array
- GAL generic array logic
- the transceiver 901 and the processor 902 are connected to each other.
- the transceiver 901 and the processor 902 are connected to each other through a bus 904;
- the bus 904 may be a Peripheral Component Interconnect (PCI) bus or an Extended Industry Standard Architecture (EISA) bus, etc. .
- PCI Peripheral Component Interconnect
- EISA Extended Industry Standard Architecture
- the bus can be divided into an address bus, a data bus, a control bus, and the like. For ease of representation, only a thick line is used in FIG. 9, but it does not mean that there is only one bus or one type of bus.
- the communication device shown in FIG. 9 may be used to perform the operations of the first policy control network element in the embodiments shown in FIG. 2, FIG. 3, and FIG. 4, and may also be used to execute the above-mentioned FIG. 5 and FIG. The operation of the PCF in the embodiment shown in 6.
- the transceiver 901 is configured to implement communication interaction with other devices connected to the first policy control network element (such as a PCF), that is, to receive and send data;
- the first policy control network element such as a PCF
- the processor 902 is configured to control the transceiver 901 to receive first information from the requesting device, and the first information is used to request a background traffic transmission policy of the first terminal device;
- the control transceiver 901 sends second information to the data analysis network element according to the first information, and the second information is used to request the background traffic of the first terminal device to transmit a data analysis result;
- the control transceiver 901 receives the background traffic transmission data analysis result of the first terminal device from the data analysis network element, wherein the background traffic transmission data analysis result of the first terminal device is that the data analysis network element transmits the target background traffic based on the second terminal device.
- the policy determines that the second terminal device is different from the first terminal device, and the target background traffic transmission policy of the second terminal device is used for the background traffic transmission of the second terminal device;
- the control transceiver 901 sends the background traffic transmission policy of the first terminal device to the requesting device.
- the background traffic transmission policy of the first terminal device is determined by the first policy control network element according to the third information, and the third information includes the background of the first terminal device. Traffic transmission data analysis results.
- the data analysis network element can determine the background traffic transmission data analysis result of the first terminal device based on the target background traffic transmission policies of other terminal devices (that is, the second terminal device). Furthermore, the first policy control network element can determine the background traffic transmission policy of the first terminal device, so that the background traffic transmission policy of the first terminal device determined by the first policy control network element refers to other terminal devices, so that the first policy can be made.
- the background traffic transmission policy of the first terminal device determined by the control network element does not conflict with the background traffic transmission policies of other terminal devices, so that the problem of background traffic transmission failure can be solved.
- the third information further includes a background traffic transmission query result of the first terminal device and / or a local background traffic transmission policy of the first terminal device.
- processor 902 is further configured to:
- the control transceiver 901 obtains the background traffic transmission query result of the first terminal device from the database network element; or when the third information further includes the first terminal device When the local background traffic transmission policy is used, the control transceiver 901 obtains the local background traffic transmission policy of the first terminal device from the first policy control network element; or, when the third information further includes a background traffic transmission query result of the first terminal device and When the local background traffic transmission policy of the first terminal device is used, the control transceiver 901 obtains the background traffic transmission query result of the first terminal device from the database network element, and the control transceiver obtains the first terminal device from the first policy control network element. Local background traffic transmission policy.
- the processor 902 is further configured to determine that the background traffic transmission policy of the first terminal device is a target background traffic transmission of the first terminal device.
- the target background traffic transmission policy of the first terminal device is used for the background traffic transmission of the first terminal device; the control transceiver 901 sends the target background traffic transmission policy of the first terminal device to the data analysis network element and / or the database network element.
- the processor 902 is further configured to control the transceiver 901 to receive the target background traffic transmission policies of the first terminal device from the requesting device.
- the target background traffic transmission policy of the first terminal device is selected by the requesting device according to the background traffic transmission policy of the first terminal device; the control transceiver 901 sends the target background traffic of the first terminal device to the data analysis network element and / or the database network element. Transmission strategy.
- the requesting device is a first terminal device or a service network element serving the first terminal device.
- the analysis result of the background traffic transmission data includes: the first data value of the transmission time window of the background traffic; the analysis result of the background traffic transmission data analysis further includes: the first data value of the transmission bandwidth of the background traffic, At least one of location information of the first terminal device and an identifier of the first terminal device.
- the background traffic transmission strategy includes: the second data value of the transmission time window of the background traffic; the background traffic transmission strategy further includes: the second data value of the transmission bandwidth of the background traffic, and the first terminal device. At least one of location information of the mobile terminal and the identifier of the first terminal device.
- the second information includes the magnitude of the background traffic of the first terminal device; the second information further includes the identification of the first policy control network element, the identification of the requesting device, and the first terminal device. At least one of the third data value of the transmission time window of the background traffic, the location information of the first terminal device, and the identifier of the first terminal device.
- the first information includes the magnitude of the background traffic of the first terminal device; the first information further includes an identifier of the requesting device, and a first time interval of the transmission time window of the background traffic of the first terminal device. At least one of three data values, location information of the first terminal device, and an identifier of the first terminal device.
- the query result of the background traffic transmission includes: a fourth data value of the transmission time window of the background traffic; the query result of the background traffic transmission further includes: a fourth data value of the transmission bandwidth of the background traffic, the first At least one of location information of the terminal device and an identifier of the first terminal device.
- the local background traffic transmission strategy includes: a fifth data value of a transmission time window of the background traffic; the local background traffic transmission result further includes: a fifth data value of the transmission bandwidth of the background traffic, the first At least one of location information of the terminal device and an identifier of the first terminal device.
- the processor 902 is further configured to send identification information to the requesting device when the control transceiver 901 sends the background traffic transmission policy of the first terminal device to the requesting device, and the identification information is used to identify the first A target background traffic transmission policy for a terminal device.
- the processor 902 is further configured to: when the control transceiver 901 sends the target background traffic transmission policy of the first terminal device to the data analysis network element and / or the database network element, to the data analysis network element The element and / or the database network element sends at least one of identification information, an identification of the requesting device, and an identification of the first policy control network element.
- the processor 902 is further configured to receive the identification information from the requesting device after the control transceiver 901 sends the background traffic transmission policy of the first terminal device to the requesting device.
- the memory 903 is coupled to the processor 902 and is configured to store a program and the like.
- the program may include program code, where the program code includes a computer operation instruction.
- the memory 903 may include a RAM, and may also include a non-volatile memory (non-volatile memory), for example, at least one magnetic disk memory.
- the processor 902 executes the application program stored in the memory 903 to implement the above functions, thereby implementing the method for determining a background traffic transmission policy as shown in FIG. 2, FIG. 3, FIG. 4, FIG. 5, and FIG. 6.
- the communication device shown in FIG. 9 may be used to perform the operations of the data analysis network element in the embodiments shown in FIG. 2, FIG. 3, and FIG. 4, and may also be used to execute the foregoing FIG. 5 and FIG. 6. Operation of NWDAF in the illustrated embodiment. E.g:
- the transceiver 901 is configured to implement communication interaction with other devices connected to a data analysis network element (such as NWDAF), that is, to receive and send data;
- NWDAF data analysis network element
- the processor 902 is configured to control the transceiver 901 to receive the second information from the first policy control network element, the second information is used to request the background traffic transmission data analysis result of the first terminal device, and the second information is sent by the first policy control network element from The first information received by the requesting device is determined, and the first information is used to request a background traffic transmission policy of the first terminal device;
- the control transceiver 901 sends the background traffic transmission data analysis result of the first terminal device to the first policy control network element, and the background traffic transmission data analysis result of the first terminal device is transmitted by the data analysis network element based on the target background traffic of the second terminal device.
- the policy determines that the second terminal device is different from the first terminal device, and the target background traffic transmission policy of the second terminal device is used for the background traffic transmission of the second terminal device.
- the analysis result of the background traffic transmission data of the first terminal device is determined based on the target background traffic transmission policies of the other terminal devices (that is, the second terminal device), thereby enabling the first strategy
- the control network element determines a background traffic transmission policy of the first terminal device, so that the background traffic transmission policy of the first terminal device determined by the first policy control network element can refer to other terminal devices, so that the first policy control network element can determine
- the background traffic transmission policy of the first terminal device does not conflict with the background traffic transmission policies of other terminal devices, thereby solving the problem of background traffic transmission failure.
- the background traffic transmission data analysis result of the first terminal device may be further analyzed by the data analysis network element based on the target background traffic transmission policy and the second information of the second terminal device, and the load of the functional network element. Determined by the information and / or capacity information of the functional network element.
- the processor 902 is further configured to control the transceiver 901 to obtain a target background traffic transmission policy of the second terminal device.
- the processor 902 when the processor 902 controls the transceiver 901 to obtain the target background traffic transmission policy of the second terminal device, the processor 902 is specifically configured to control the transceiver 901 to receive the target of the second terminal device from the first device.
- Background traffic transmission policy where the first device is any one or more of the following: a second terminal device, a first policy control network element, a second policy control network element, a second service network element, and a second database network element, where The first policy control network element, the second policy control network element, the second service network element, and the second database network element serve the second terminal device.
- the processor 902 is further configured to control the transceiver 901 to obtain load information of the functional network element; or it is also configured to control the transceiver 901 to obtain capacity information of the functional network element; or The control transceiver 901 obtains load information of the functional network element and capacity information of the functional network element.
- the processor 902 is specifically configured to: when controlling the transceiver 901 to obtain the load information of the functional network element, receive the load information of the functional network element from the functional network element or the operation management and maintenance network element; or The processor 902 is specifically configured to: when controlling the transceiver 901 to obtain the capacity information of the functional network element, receive the capacity information of the functional network element from the functional network element or the operation management and maintenance network element; or the processor 902 is obtained at the control transceiver 901
- the load information of the functional network element and the capacity information of the functional network element may be specifically used to receive the load information of the functional network element and the capacity information of the functional network element from the functional network element or the operation management and maintenance network element.
- the functional network element includes a first policy control network element serving a first terminal device, a session management function network element, a radio access network network element, and an access and mobility management function network element. 2. At least one of the user plane function network elements.
- the processor 902 is further configured to control the transceiver 901 to receive the target background traffic transmission policy of the first terminal device, where the first terminal device performs the background according to the target background traffic transmission policy of the first terminal device. Traffic transmission.
- the processor 902 when the processor 902 controls the transceiver 901 to receive the target background traffic transmission policy of the first terminal device, the processor 902 is specifically configured to control the transceiver 901 to receive the target of the first terminal device from the second device.
- Background traffic transmission policy where the second device is any one or more of the following: a first terminal device, a first policy control network element, a first service network element, and a first database network element, wherein the first policy control network The first service network element and the first database network element serve the first terminal device.
- the processor 902 when the processor 902 controls the transceiver 901 to receive the target background traffic transmission policy of the first terminal device, the processor 902 is further used to control the transceiver 901 to receive the identifier of the requesting device, or is also used to control the transceiver.
- the receiver 901 receives the identity of the first policy control network element, or is further configured to control the transceiver 901 to receive the identity of the requesting device and the identity of the first policy control network element.
- the analysis result of the background traffic transmission data includes: the first data value of the transmission time window of the background traffic; the analysis result of the background traffic transmission data analysis further includes: the first data value of the transmission bandwidth of the background traffic, At least one of location information of the first terminal device and an identifier of the first terminal device.
- the background traffic transmission strategy includes: the second data value of the transmission time window of the background traffic; the background traffic transmission strategy further includes: the second data value of the transmission bandwidth of the background traffic, and the first terminal device. At least one of location information of the mobile terminal and the identifier of the first terminal device.
- the second information includes the magnitude of the background traffic of the first terminal device; the second information further includes the identity of the first policy control network element, the identity of the requesting device, and the identity of the first terminal device. At least one of a third data value of a transmission time window of the background traffic, location information of the first terminal device, and an identifier of the first terminal device.
- the first information includes the magnitude of the background traffic of the first terminal device; the first information further includes a request device identifier, and a third time window of the transmission time window of the background traffic of the first terminal device. At least one of a data value, location information of the first terminal device, and an identifier of the first terminal device.
- the memory 903 is coupled to the processor 902 and is configured to store a program and the like.
- the program may include program code, where the program code includes a computer operation instruction.
- the memory 903 may include a RAM, and may also include a non-volatile memory (non-volatile memory), for example, at least one magnetic disk memory.
- the processor 902 executes the application program stored in the memory 903 to implement the above functions, thereby implementing the method for determining a background traffic transmission policy as shown in FIG. 2, FIG. 3, FIG. 4, FIG. 5, and FIG. 6.
- the communication device shown in FIG. 9 may be used to perform the operation of the first terminal device in the embodiment shown in FIG. 3 described above, and may also be used to perform the operation of the UE in the embodiment shown in FIG. 5 described above. operating.
- the transceiver 901 is configured to implement communication interaction with other devices connected to the first terminal device (for example, UE), that is, to receive and send data;
- the first terminal device for example, UE
- the processor 902 is configured to control the transceiver 901 to send first information to the first policy control network element, and the first information is used to request a background traffic transmission policy of the first terminal device;
- the control transceiver 901 receives the background traffic transmission policy of the first terminal device from the first policy control network element, where the background traffic transmission policy of the first terminal device is determined by the first policy control network element according to the third information, and the third information includes Analysis result of background traffic transmission data from the first terminal device of the data analysis network element.
- the background traffic transmission policy of the first terminal device is determined by the first policy control network element according to the third information, and the third information includes the first terminal device from the data analysis network element.
- Analysis result of background traffic transmission data so that the background traffic transmission strategy of the first terminal device determined by the first policy control network element refers to other terminal equipment, so that the background traffic transmission strategy of the first terminal device can be transmitted to other terminal equipment.
- the background traffic transmission strategy does not conflict, which can solve the problem of background traffic transmission failure.
- the third information further includes a background traffic transmission query result of the first terminal device and / or a local background traffic transmission policy of the first terminal device.
- the processor 902 is further configured to determine that the background traffic transmission policy of the first terminal device is a target background traffic transmission of the first terminal device. Policy; the control transceiver 901 sends a target background traffic transmission policy of the first terminal device to the data analysis network element.
- the processor 902 is further configured to select a target background traffic of the first terminal device according to the background traffic transmission policies of the first terminal device. Transmission policy; the control transceiver 901 sends a target background traffic transmission policy of the first terminal device to the first policy control network element.
- the processor 902 is further configured to control the transceiver to send a target background traffic transmission policy of the first terminal device to the data analysis network element.
- the analysis result of the background traffic transmission data includes: the first data value of the transmission time window of the background traffic; the analysis result of the background traffic transmission data analysis further includes: the first data value of the transmission bandwidth of the background traffic, At least one of location information of the first terminal device and an identifier of the first terminal device.
- the background traffic transmission strategy includes: the second data value of the transmission time window of the background traffic; the background traffic transmission strategy further includes: the second data value of the transmission bandwidth of the background traffic, and the first terminal device. At least one of location information of the mobile terminal and the identifier of the first terminal device.
- the first information includes the magnitude of the background traffic of the first terminal device; the first information further includes the third data value of the transmission time window of the background traffic of the first terminal device, At least one of location information and identification.
- the query result of the background traffic transmission includes: a fourth data value of the transmission time window of the background traffic; the query result of the background traffic transmission further includes: a fourth data value of the transmission bandwidth of the background traffic, the first At least one of location information of the terminal device and an identifier of the first terminal device.
- the local background traffic transmission strategy includes: a fifth data value of a transmission time window of the background traffic; the local background traffic transmission result further includes: a fifth data value of the transmission bandwidth of the background traffic, the first At least one of location information of the terminal device and an identifier of the first terminal device.
- the processor 902 before the processor 902 controls the transceiver 901 to send the first information to the first policy control network element, the processor 902 is further configured to control the transceiver 901 to obtain the first information from the first service network element.
- the control transceiver 901 For the terminal device: the size of the background traffic; the control transceiver 901 also obtains, from the first service network element, at least one of the third data value, location information, and identification of the transmission time window of the background traffic for the first terminal device.
- the processor 902 when the processor 902 controls the transceiver 901 to receive the background traffic transmission policy of the first terminal device, the processor 902 is further configured to receive identification information from the first policy control network element, and the identification information is used to identify the first A target background traffic transmission policy for a terminal device.
- the processor 902 controls the transceiver 901 to receive the background traffic transmission policy of the first terminal device from the first policy control network element, the processor 902 is further configured to send the identification information to the first policy control network element.
- the memory 903 is coupled to the processor 902 and is configured to store a program and the like.
- the program may include program code, where the program code includes a computer operation instruction.
- the memory 903 may include a RAM, and may also include a non-volatile memory (non-volatile memory), for example, at least one magnetic disk memory.
- the processor 902 executes an application program stored in the memory 903 to implement the foregoing functions, thereby implementing a method for determining a background traffic transmission policy as shown in FIG. 3 and FIG. 5.
- the communication device shown in FIG. 9 may be used to perform the operation of the first service network element in the embodiment shown in FIG. 4, and may also be used to execute the AF in the embodiment shown in FIG. 6. Operation.
- the transceiver 901 is configured to implement communication interaction with other devices connected to the first service network element (for example, AF), that is, to receive and send data;
- the first service network element for example, AF
- the processor 902 is configured to control the transceiver 901 to send first information to the first policy control network element, and the first information is used to request a background traffic transmission policy of the first terminal device; and the control transceiver 901 receives the first information from the first policy control network element.
- a background traffic transmission policy of a terminal device wherein the background traffic transmission policy of the first terminal device is determined by the first policy control network element according to the third information, and the third information includes the background traffic of the first terminal device from the data analysis network element Transfer data analysis results.
- the background traffic transmission policy of the first terminal device is determined by the first policy control network element according to the third information, and the third information includes the first terminal device from the data analysis network element.
- Analysis result of background traffic transmission data so that the background traffic transmission strategy of the first terminal device determined by the first policy control network element refers to other terminal equipment, so that the background traffic transmission strategy of the first terminal device can be transmitted to other terminal equipment.
- the background traffic transmission strategy does not conflict, which can solve the problem of background traffic transmission failure.
- the third information further includes a background traffic transmission query result of the first terminal device and / or a local background traffic transmission policy of the first terminal device.
- the processor 902 is further configured to determine that the background traffic transmission policy of the first terminal device is a target background traffic transmission of the first terminal device. Policy; the control transceiver sends a target background traffic transmission policy of the first terminal device to the data analysis network element.
- the processor 902 is further configured to select a target background traffic of the first terminal device according to the background traffic transmission policies of the first terminal device. Transmission policy; the control transceiver 901 sends a target background traffic transmission policy of the first terminal device to the first policy control network element.
- the processor 902 is further configured to control the transceiver 901 to send a target background traffic transmission policy of the first terminal device to the data analysis network element.
- the analysis result of the background traffic transmission data includes: the first data value of the transmission time window of the background traffic; the analysis result of the background traffic transmission data analysis further includes: the first data value of the transmission bandwidth of the background traffic, At least one of location information of the first terminal device and an identifier of the first terminal device.
- the background traffic transmission strategy includes: the second data value of the transmission time window of the background traffic; the background traffic transmission strategy further includes: the second data value of the transmission bandwidth of the background traffic, and the first terminal device. At least one of location information of the mobile terminal and the identifier of the first terminal device.
- the first information includes the magnitude of the background traffic of the first terminal device; the first information further includes an identifier of the first service network element and a transmission time of the background traffic of the first terminal device. At least one of a third data value of the window, location information of the first terminal device, and an identifier of the first terminal device.
- the query result of the background traffic transmission includes: a fourth data value of the transmission time window of the background traffic; the query result of the background traffic transmission further includes: a fourth data value of the transmission bandwidth of the background traffic, the first At least one of location information of the terminal device and an identifier of the first terminal device.
- the local background traffic transmission strategy includes: a fifth data value of a transmission time window of the background traffic; the local background traffic transmission result further includes: a fifth data value of the transmission bandwidth of the background traffic, the first At least one of location information of the terminal device and an identifier of the first terminal device.
- the processor 902 before the processor 902 controls the transceiver 901 to send the first information to the first policy control network element, the processor 902 is further configured to control the transceiver 901 to obtain the first terminal from the first terminal device.
- the processor 902 when the processor 902 controls the transceiver 901 to receive the background traffic transmission policy of the first terminal device from the first policy control network element, the processor 902 is further configured to receive identification information from the first policy control network element. The identification information is used to identify a target background traffic transmission policy of the first terminal device.
- the processor 902 is further configured to send the identification information to the first policy control network element after the control transceiver 901 receives the background traffic transmission policy of the first terminal device from the first policy control network element. .
- the memory 903 is coupled to the processor 902 and is configured to store a program and the like.
- the program may include program code, where the program code includes a computer operation instruction.
- the memory 903 may include a RAM, and may also include a non-volatile memory (non-volatile memory), for example, at least one magnetic disk memory.
- the processor 902 executes an application program stored in the memory 903 to implement the foregoing functions, thereby implementing a method for determining a background traffic transmission policy as shown in FIGS. 4 and 6.
- the embodiments of the present application provide a method and device for determining a background traffic transmission policy.
- the first policy control network element receives the first information requesting the background traffic transmission policy of the first terminal device from the requesting device, and sends the data to the data.
- the analysis network element requests the background traffic transmission data analysis result of the first terminal device, and after receiving the data analysis result of the first terminal device from the data analysis network element, sends the background traffic transmission policy of the first terminal device to the requesting device;
- the data analysis result of a terminal device is determined by the data analysis network element based on the target background traffic transmission policy of the second terminal device.
- the second terminal device is different from the first terminal device.
- the target background traffic transmission policy of the second terminal device is used for the first terminal device.
- the two terminal devices transmit background traffic; the background traffic transmission policy of the first terminal device is determined by the first policy control network element according to the third information, and the third information includes the analysis result of the background traffic transmission data of the first terminal device.
- the data analysis network element may determine the background traffic transmission data analysis result of the first terminal device based on the target background traffic transmission policies of all other terminal devices (that is, the second terminal device), thereby enabling the first policy control network
- the element determines the background traffic transmission policy of the first terminal device.
- the background traffic transmission policy of the first terminal device determined by the first policy control network element refers to other terminal devices, so that the first policy controls the first terminal determined by the network element.
- the background traffic transmission policy of the device does not conflict with the background traffic transmission policy of other terminal devices, which can solve the problem of background traffic transmission failure.
- An embodiment of the present application further provides a method for determining a background traffic transmission policy, and the method is also applicable to the communication system shown in FIG. 1.
- the specific process of the method may include:
- Step 1001 The first policy control network element obtains at least one piece of fourth information, and the fourth information includes at least one identifier of the first terminal device, the first time, the first position, and the state of the first network element.
- the identifier of the first terminal device may be at least one of SUPI, PEI, GPSI, IP quintuple, IMSI, IMEI, and MSISDN.
- the first time is a future time
- the first position is a predicted position where at least one terminal device resides at the first time in the future, that is, predicted trajectory information.
- the first position may be at least one first The network area (Tracking Area List (TA List) or Routing Area List (RA List)), cell (Cell ID), and radio access network (RAN ID) where a terminal device is located at the first time ), Global Satellite Positioning System (Global Positioning System, GPS), and so on.
- TA List Track Area List
- RA List Routing Area List
- RAN ID radio access network
- At least one first terminal device resides in a first position at a first time and has a first network element status. That is to say, at least one first terminal device resides in a first position at a first time, and all have a first network element status.
- the first network element state may include one or more of the following: a first load, a first capacity, and a first available bandwidth; wherein the first load is a corresponding first The load of a network element, the first network element serves the first terminal device; the first capacity is the capacity of the first network element corresponding to the first location; the first available bandwidth is the capacity of the first network element corresponding to the first location bandwidth.
- the first terminal resides in the first position at the first time.
- the first load, the first capacity, and the first available bandwidth can be used to indicate the idle or busy status of the first network element. For example, when the first load is 80%, it indicates that the first network element has 20% load. It can be used to transmit background traffic of at least one first terminal device.
- the first capacity or the first available bandwidth is 1GB (GigaByte), which means that the first network element has 1GB of capacity or bandwidth that can be used to transmit at least one first Background traffic of a terminal device.
- the first network element may be a user plane network element (for example, RAN or UPF, etc.) or a control plane network element (for example, AMF or SMF, etc.) serving the first terminal device.
- a user plane network element for example, RAN or UPF, etc.
- a control plane network element for example, AMF or SMF, etc.
- an AMF network element or an SMF network element may also be used as a user plane network element for transmitting background traffic.
- the first policy control network element receives the fifth information from the requesting device, and the fifth information is used to request at least one second terminal.
- the fifth information may include the identification of the requesting device and one or more of the following: the number of second terminal devices, the size of the background traffic that each second terminal device needs to transmit, and the time window.
- the fifth information may further include a network area (Tracking Area List (TA List) or Routing Area List (RA List)) where the at least one second terminal device is located.
- TA List Track Area List
- RA List Routing Area List
- the requesting device provides services for at least one second terminal device.
- the requesting device may be a service network element currently serving at least one second terminal device, that is, it may be the one in FIG. 1.
- AF network elements including AF network elements controlled by the operator (for example, proxy-call session control function (P-CSCF, proxy-call session control function)), or third-party AF network elements, such as a third-party service server .
- P-CSCF proxy-call session control function
- proxy-call session control function proxy-call session control function
- third-party AF network elements such as a third-party service server .
- the at least one first terminal device is part or all of the at least one second terminal device. Specifically, the at least one first terminal device is a subset of the at least one second terminal device. In an optional embodiment, when there are multiple second terminal devices, there may be multiple fourth information.
- One fourth information corresponds to a group of first terminal devices, and a group of first terminal devices is at least one. That is, multiple second terminal devices may include multiple groups of first terminal devices. Among them, a group of first terminal devices have the same first position and the same first network element status at the first time.
- the first policy control network element receives the fifth information from the requesting device.
- the service network element may send the first information to the first through the network open function network element.
- the policy control network element sends a fifth message.
- the above process may specifically be: the service network element sends the fifth information to the network open function network element.
- the service network element may send the fifth information to the network open function network element by calling the Nnef_BDTPNegotiation_Create request service; and then the network open function network element The fifth information is forwarded to the first policy control network element.
- the network open function network element may send the fifth information to the first policy control network element by calling the Npcf_BDTPolicyControl_Create request service.
- the first policy control network element can obtain at least one fourth information in the following two ways:
- the first policy control network element obtains at least one fourth information from the data analysis network element.
- the first policy controls the network element to obtain at least one fourth information stored locally.
- the first policy control network element may acquire the fifth information from the requesting device, and then acquire the fifth information from the data analysis network element.
- the first policy control network element obtains at least one fourth information from the data analysis network element.
- the specific method may be: the first policy control network element sends sixth information to the data analysis network element, and the sixth information is used to request at least A fourth message, and the sixth message includes an identifier of at least one second terminal device; the first policy control network element receives at least one fourth message from the data analysis network element.
- the sixth information further includes one or more of the following: an identifier of the requesting device, a time window, and a network area.
- the time window is used to indicate a time window corresponding to the requested at least one second terminal device
- the network area is used to indicate a network area corresponding to the requested at least one second terminal device.
- the first policy control network element may store at least one seventh information corresponding to at least one third terminal device, and the seventh information includes an identifier of the at least one fourth terminal device, the first time, the first A location and the status of the first network element.
- the at least one fourth terminal device is part or all of the at least one third terminal device, and the at least one third terminal device includes at least one second terminal device.
- the first policy control network element determines at least one fourth information among the stored at least one seventh information.
- the first policy control network element determines at least one fourth information from the stored at least one seventh information.
- the specific method may be: the first policy control network element selects the second terminal device from the at least one seventh information. The information corresponding to the same fourth terminal device is identified, so that at least one piece of fourth information is filtered out.
- the source of the at least one seventh information stored locally by the first policy control network element may also be obtained by the first policy control network element from the data analysis network element.
- the specific method may be: the first policy control network element sends the data analysis network to the data analysis network.
- the element sends eighth information, the eighth information is used to request at least one seventh information, and the eighth information includes an identifier of at least one third terminal device; the first policy controls the network element to receive at least one seventh information from the data analysis network element.
- the eighth information further includes one or more of the following: an identification of the requesting device, a time window, and a network area.
- the time window is used to indicate a time window corresponding to the requested at least one seventh information
- the network area is used to indicate a network area corresponding to the requested at least one seventh information.
- the first policy control network element obtains an identifier of at least one second terminal device.
- this operation may be performed by the first policy control network element before acquiring the at least one fourth information.
- the operation may be performed after the first policy control network element receives the fifth information and acquires at least one fourth information. Information before.
- the first policy control network element may obtain the identity of at least one second terminal device through the following two methods:
- Method g1 The first policy control network element receives the identity of at least one second terminal device from the requesting device.
- Method g2 The first policy control network element receives the identification of the requesting device from the requesting device, and obtains the identification of at least one second terminal device from the first policy control network element or the database network element according to the identification of the requesting device.
- the first policy control network element may receive the identification of at least one second terminal device by receiving the fifth information from the requesting device, that is, at this time, the fifth information includes at least one second terminal device Logo.
- the first policy control network element receives the identification of the requesting device from the requesting device from the fifth information received by the first policy control network element from the requesting device.
- the fifth information does not include at least one second terminal.
- the ID of the device may include background traffic transmission instruction information, which is used to indicate that the identifier to be queried is at least one second terminal device that needs to transmit background traffic.
- Step 1002 The first policy control network element determines a background traffic transmission policy of at least one second terminal device according to the ninth information, where the ninth information includes at least one fourth information.
- the ninth information may further include fifth information, and the ninth information may further include a background traffic transmission query result of at least one second terminal device and / or at least one second terminal device. Local background traffic transmission query results.
- the ninth information further includes a background traffic transmission query result of at least one second terminal device
- the first policy control network element obtains the background traffic of the at least one second terminal device from the database network element. Transmitting the query result; or when the ninth information further includes a local background traffic transmission policy of at least one second terminal device, the first policy control network element obtains the local background traffic of at least one second terminal device from the first policy control network element Transmission policy; or when the ninth information further includes a background traffic transmission query result of at least one second terminal device and a local background traffic transmission policy of at least one second terminal device, the first policy control network element obtains at least from a database network element A background traffic transmission query result of a second terminal device, and the first policy control network element obtains a local background traffic transmission policy of at least one second terminal device from the first policy control network element.
- the first policy control network element determines a background traffic transmission policy of at least one second terminal device according to the ninth information, and a specific method may be:
- the first policy control network element may determine the distribution in the at least one fourth information among the ninth information according to the identifier of the at least one second terminal device. That is, in step 1001, the first policy network element analyzes the network element from the data. 3 pieces of fourth information are obtained, that is, the data analysis network element divides at least one second terminal device into three categories, and each category corresponds to subset 1, subset 2, or subset 3 of at least one second terminal device;
- the first policy control network element determines, based on the first time, the first position, and the state of the first network element in each of the fourth information, that at least one of the second terminal device subset 1, subset 2, or subset 3 is in The first time will be in the first location and have the first network status on the first location;
- the first policy controls the network element to be located at the first position at the first time according to the subset 1, subset 2 or subset 3 of the at least one second terminal device, and has the first network state at the first position, and
- the size of the background traffic to be transmitted by each second terminal device determines the background traffic transmission policy of each second terminal device.
- subset 1 of the second terminal device includes 10 second terminal devices, and each second terminal needs to transmit 60 MB (MegaBit) of background traffic, all of which are located in the same cell at 00: 00-01: 00 at night, and
- the available capacity on the base station corresponding to the cell is 60MB or more
- the background traffic transmission policy formulated for the 10 second terminal devices included in the subset 1 of the second terminal device may be as follows:
- Time window 00: 00-01: 00;
- the first policy control network element obtaining at least one background traffic transmission policy of the second terminal device.
- the first policy control network element needs to refer to at least one of the ninth information.
- the first policy control network element determines the background traffic transmission policy of the at least one second terminal device according to the ninth information
- the first policy control network element sends the at least one second terminal device to the requesting device. Background traffic transmission strategy.
- the traffic flow transmission policy of any one of the at least one second terminal device may be one or more.
- the background traffic transmission policy of the second terminal device may include: a seventh data value of a transmission time window of the background traffic; the background traffic transmission policy of the second terminal device further includes one or more of the following: a transmission bandwidth of the background traffic The seventh data value, the location information of the second terminal device, and the identifier of the second terminal device.
- the first policy control network element may also perform the following operations:
- the first policy control network element determines that the background traffic transmission policy of the second terminal device is a target background traffic transmission policy of the second terminal device;
- the first policy control network element sends the target background traffic transmission policy of the second terminal device to the data analysis network element.
- the first policy control network element may also perform the following operations:
- the first policy control network element receives the target background traffic transmission policy of the second terminal device from the requesting device, and the target background traffic transmission policy of the second terminal device is selected by the requesting device according to the background traffic transmission policy of the second terminal device;
- the first policy control network element sends the target background traffic transmission policy of the second terminal device to the data analysis network element.
- the first policy control network element sends the target background traffic transmission policy of the second terminal device to the data analysis network element through the foregoing first policy control.
- the data analysis network element can save the target background traffic transmission policy of the second terminal device.
- the data analysis network element can refer to the saved first section when determining the moving trajectory (including time and location) and the network element status of the corresponding network element on the moving trajectory.
- the target background traffic transmission strategy of the second terminal device makes the network element status result more accurate.
- the first policy control network element when the requesting device is a service network element, sends at least one background traffic transmission policy of the second terminal device to the service network element.
- the specific process may be: the first policy The control network element sends the background traffic transmission policy of at least one second terminal device to the service network element through the network open function network element.
- the first policy control network element sends the background traffic transmission policy of at least one second terminal device to the network open function network element.
- the first policy control network element may send the Npcf_BDTPolicyControl_Createresponse service to the network.
- the open function network element sends a background traffic transmission policy of at least one second terminal device; and then the network open function network element sends the background traffic transmission policy of at least one second terminal device to the service network element.
- the network open function network element The Nnef_BDT_PNegotiation_Create response service can be called to send at least one background traffic transmission policy of the second terminal device to the service network element.
- the first policy controls the network element to obtain at least one fourth information, and the fourth information includes at least one identifier of the first terminal device, the first time, the first location, and The state of the first network element; the first policy control network element determines a background traffic transmission policy of at least one second terminal device according to the ninth information; wherein the ninth information includes at least one fourth information; the at least one first terminal device is at least one Part or all of the second terminal device; at least one first terminal device resides in the first position at a first time, and has a state of the first network element.
- the first policy control network element when the first policy control network element formulates a background traffic transmission policy for at least one second terminal device, it may consider the movement trajectory (including the first time and the first position) of each second terminal device and the first The status of the first network element at the location, which will make the background traffic transmission policy of at least one second terminal device formulated by the first policy control network element more accurate.
- the first position of the at least one first terminal device and the state of the first network element are closely related to the first time, that is, when the at least one first terminal device moves to the first position at the first time, the first A network element (first network element) at one location has a first network element status.
- the corresponding network element status is at the other location.
- An embodiment of the present application further provides a method for determining a background traffic transmission policy, and the method is also applicable to the communication system shown in FIG. 1.
- the specific process of the method may include:
- Step 1101 The data analysis network element determines at least one piece of fourth information, and the fourth information includes at least one identifier of the first terminal device, the first time, the first location, and the state of the first network element; the at least one first terminal device is at least one Part or all of a second terminal device; at least one first terminal device resides in a first position at a first time and has a first network element status.
- At least one second terminal device is a terminal device to be transmitted background traffic, and a terminal device that needs to obtain a background traffic transmission policy.
- the state of the first network element includes one or more of the following: a first load, a first capacity, and a first available bandwidth; wherein the first load is a load of the first network element corresponding to the first position;
- a network element serves a first terminal device;
- the first capacity is the capacity of the first network element corresponding to the first location;
- the first available bandwidth is the bandwidth of the first network element corresponding to the first location.
- the first terminal device resides in the first position at the first time.
- the data analysis network element before the data analysis network element determines the at least one fourth information, the data analysis network element receives the sixth information from the first policy control network element, and the sixth information is used to request at least one fourth information
- the sixth information includes an identifier of at least one second terminal device.
- the data analysis network element determines at least one fourth information, and the specific method may be:
- the data analysis network element obtains at least one tenth information of at least one second terminal device on the third network element, and the tenth information includes an identifier of the second terminal device, a second time, a second location, and a state of the second network element;
- the two terminal devices reside in the second position at the second time and have the state of the second network element;
- the third network element serves at least one second terminal device;
- the data analysis network element determines at least one fourth information according to the at least one tenth information of the second terminal device.
- the third network element may be one or more of an access device, a functional network element in 5G, and an OAM.
- At least one piece of tenth information of the second terminal device refers to at least one piece of history information before the second device, and each piece of history information includes information contained in the tenth information.
- the data analysis network element may directly obtain at least one tenth information of at least one second terminal device on the third network element from the third network element; and may also obtain at least one of the third network element from other devices. At least one tenth information of the second terminal device.
- the data analysis network element may obtain the third network element from the OAM network element. At least one tenth information of at least one second terminal device.
- the above process of determining at least one fourth information by the data analysis network element may be interpreted as: the data analysis network element first collects the historical action track of each second terminal device from the third network element according to the identifier of the at least one second terminal device And the historical NE status of the NEs corresponding to different locations at different times; the data analysis NE predicts the predicted trajectory of each terminal device in at least one terminal device based on the collected data, that is, each second terminal device is in The future location to be moved to in the future; afterwards, the data analysis network element groups at least one second terminal device according to the predicted running trajectory of each second terminal device, and the second terminal device in each group resides at the same time in the future At the same location, for example, a group of second terminal equipment is at least one first terminal equipment, and at least one first terminal equipment resides in the first location at the first time; finally, the data analysis network element The historical network element status of the network element corresponding to the future location where the group of second terminal equipment resides, and the prediction of each group of second terminal equipment
- the data analysis network element obtains related information of at least a group of second terminal devices that have a specific network element status at a specific location at a specific time, that is, the data analysis network element according to at least one tenth information of each second terminal device At least one fourth message is determined.
- the data analysis network element may use at least one piece of fourth information by using an analysis method in the foregoing embodiment.
- the data analysis network element may aggregate at least one second terminal device according to these information.
- Class or classification Second terminal devices of the same class correspond to the same time, location, and network element status information.
- the state of the second network element includes one or more of the following: a second load, a second capacity, and a second available bandwidth; wherein the second load is a corresponding second at the second position
- the load of the network element; the second network element serves the second terminal device; the second capacity is the capacity of the corresponding second network element at the second location; and the second bandwidth is the bandwidth of the second network element at the second location.
- the second terminal device resides in the second position at the second time.
- Step 1102 The data analysis network element sends at least one fourth message to the first policy control network element.
- the data analysis network element determines at least one piece of fourth information, and the fourth information includes at least one identifier of the first terminal device, the first time, the first location, and the first Network element status; at least one first terminal device is part or all of at least one second terminal device; at least one first terminal device resides in a first position at a first time and has the first network element status; The data analysis network element sends at least one fourth message to the first policy control network element.
- the data analysis network element can make the first policy control network element more accurate by sending the predicted network element status corresponding to a specific future time and location of the terminal device to be transmitted background traffic to the first policy control network element.
- the background traffic transmission strategy of the second terminal device is determined, thereby improving the success rate of background traffic transmission.
- the implementation of the present application also provides an example of a method for determining a background traffic transmission policy.
- the analysis network element provides prediction information (that is, at least one piece of fourth information).
- the service network element is AF
- the terminal device is UE
- the first policy control network element is PCF
- the data analysis network element is NWDAF.
- the specific process of this example can include:
- Step 1201 The AF sends fifth information to the NEF, where the fifth information is used to request a background traffic transmission policy of at least one second UE.
- NEF is an example of a network element with an open function.
- NEF can also be replaced with another network element with an open function, which is not limited in this application.
- the AF may send the fifth information to the NEF by calling the Nnef_BDTPNegotiation_Create request or Nnef_Trigger_Delivery request service.
- Step 1202 the NEF sends fifth information to the PCF.
- the NEF may send the fifth information to the PCF by calling the Npcf_BDTPolicyControl_Create request or Npcf_Policy Authorization_Create Request service.
- Step 1203 The PCF sends sixth information to the NWDAF.
- the sixth information is used to request at least one fourth information, and the sixth information includes an identifier of at least one second UE.
- the PCF initiates the Nnwdaf_AnalyticsInfo_Request service operation to the NWDAF and sends the sixth information to the NWDAF.
- Step 1204 The NWDAF determines at least one piece of fourth information, and the fourth information includes at least one identifier of the first UE, the first time, the first position, and the state of the first network element; At least one first UE resides in a first position at a first time, and has a first network element status.
- Step 1205 The NWDAF sends at least one fourth message to the PCF.
- the Nnwdaf_AnalyticsInfo_Request response service operation initiated by the NWDAF to the PCF returns at least one piece of fourth information.
- Step 1206 The PCF determines a background traffic transmission policy of at least one second UE according to the ninth information, where the ninth information includes at least one fourth information.
- Step 1207 The PCF sends the background traffic transmission policy of the at least one second UE to the NEF.
- the PCF may send at least one background traffic transmission policy of the second UE to the NEF by calling the Npcf_BDT PolicyControlResponse or Npcf_PolicyAuthorization_Notify service.
- Step 1208 The NEF sends the background traffic transmission policy of the at least one second UE to the AF.
- the NEF may call the Nnef_BDT, Pnegotiation_Create response, or Nnef_Trigger_Delivery response service to send at least one background traffic transmission policy of the second UE to the AF.
- the PCF may perform steps 1209 and 1210, as follows:
- Step 1209 The PCF determines that the background traffic transmission strategy of the second UE is a target background traffic transmission strategy of the second UE.
- Step 1210 The PCF sends a target background traffic transmission policy of the second UE to the NWDAF.
- the PCF may also send a target background traffic transmission policy of the second UE to the UDR.
- step 1209 may be omitted, and the PCF may directly send the background traffic transmission policy of the second UE to NWDAF, which is not described in detail here.
- step 1208 when there are multiple background traffic transmission policies for the second UE, after step 1208, there may be the following steps:
- Step 1211 The AF selects a target background traffic transmission policy of the second UE according to the background traffic transmission policy of the second UE.
- Step 1212 The AF sends a target background traffic transmission policy of the second UE to the NEF.
- the AF may call the Nnef_BDTPNegotiation_Update request or Nnef_Trigger_Delivery request service to send the target background traffic transmission policy of the second UE to the NEF.
- Step 1213 The NEF sends a target background traffic transmission policy of the second UE to the PCF.
- the NEF may call the Npcf_BDTPolicyControl_Update request or Npcf_PolicyAuthorization_Update Request service to send the target background traffic transmission policy of the second UE to the PCF.
- Step 1214 The PCF sends a target background traffic transmission policy of the second UE to the NWDAF.
- the PCF may also send a target background traffic transmission policy of the second UE to the UDR.
- step 1214 and step 1210 are the same steps. In order to show two possible implementation manners here, two steps are shown.
- step 1207, step 1208, step 1210, and step 1214 may include one or more identification information for identifying a target background traffic transmission policy of at least one second terminal device.
- each identification information in the multiple identification information is used for identification.
- the first policy control network element sends a background traffic transmission policy of the second terminal device to the second terminal device, which may be, but is not limited to, a PDU session modification process.
- a PDU session modification process For a specific process, refer to Embodiment 2 in FIG. 2 .
- the first policy control network element may also use a PDU session establishment procedure (PDU Establishment procedure), a registration procedure (Registration procedure), a service request procedure (Service Request procedure), a terminal configuration update procedure (UE Configuration Configuration Update), etc.
- PDU Establishment procedure PDU Establishment procedure
- Registration procedure Registration procedure
- Service Request procedure Service Request procedure
- UE Configuration Configuration Update UE Configuration Configuration Update
- Various other processes send a background traffic transmission policy of the second terminal device to the second terminal device.
- the first policy control network element may place the background traffic transmission policy of the second terminal device in the terminal routing policy (UESP) of the second terminal device.
- UESP terminal routing policy
- each solution of the method for determining a background traffic transmission policy provided in the embodiments of the present application is described from the perspective of interaction between each network element or device.
- various network elements and devices such as the first policy control network element, data analysis network element, first service network element, first terminal device, and second terminal device, in order to implement the foregoing functions, include the execution of each Function corresponding hardware structure and / or software module.
- this application can be implemented in the form of hardware or a combination of hardware and computer software. Whether a certain function is performed by hardware or computer software-driven hardware depends on the specific application and design constraints of the technical solution. A professional technician can use different methods to implement the described functions for each specific application, but such implementation should not be considered to be beyond the scope of this application.
- the communication device used to determine the background traffic transmission strategy may include an acquisition module 1301 and a processing module 1302, and optionally may further include a sending module 1303. Refer to the structure diagram shown in FIG. 13.
- the communication device shown in FIG. 13 may be used to perform the operations of the first policy control network element in the embodiments shown in FIG. 10 and FIG. 11, and to execute the operations in the embodiment shown in FIG. 12. PCF operation.
- the acquiring module 1301 is configured to acquire at least one piece of fourth information, and the fourth information includes an identifier, a first time, a first position, and a state of the first network element of the at least one first terminal device;
- a processing module 1302 is configured to determine a background traffic transmission policy of at least one second terminal device according to the ninth information; wherein the ninth information includes at least one fourth information; the at least one first terminal device is one of the at least one second terminal device. Part or all; at least one first terminal device resides in a first position at a first time and has a first network element status.
- the movement trajectory (including the first time and the first position) of each second terminal device can be considered and The state of the first network element at the first position, which will make the background traffic transmission policy of at least one second terminal device formulated by the first policy control network element more accurate.
- the obtaining module 1301 is further configured to receive an identifier of at least one second terminal device from a requesting device, and the requesting device provides services for the at least one second terminal device.
- the obtaining module 1301 is further configured to receive the identification of the requesting device from the requesting device; after that, the processing module 1302 is further configured to control the network element or the database network element from the first policy according to the identification of the requesting device.
- the query obtains an identifier of at least one second terminal device.
- the acquiring module 1301 is specifically configured to acquire at least one fourth information from a data analysis network element when acquiring the at least one fourth information; or acquire at least one fourth information stored locally.
- the first network element status includes one or more of the following: a first load, a first capacity, and a first available bandwidth; wherein the first load is a corresponding first at a first position
- the load of the network element, the first network element serves the first terminal device;
- the first capacity is the capacity of the first network element corresponding to the first position;
- the first available bandwidth is the bandwidth of the first network element corresponding to the first position.
- the first terminal device resides in the first position at the first time.
- the sending module 1303 is configured to send the background traffic of the at least one second terminal device to the requesting device after the processing module 1302 determines the background traffic transmission policy of the at least one second terminal device according to the ninth information.
- the processing module 1302 is further configured to determine that the background traffic transmission policy of the second terminal device is a target background traffic transmission of the second terminal device.
- a policy; the sending module 1303 is further configured to send a target background traffic transmission policy of the second terminal device to the data analysis network element.
- the obtaining module 1301 is further configured to receive a target background traffic transmission policy of the second terminal device from the requesting device.
- the second terminal device The target background traffic transmission strategy is selected by the requesting device according to the background traffic transmission strategy of the second terminal device; the sending module 1303 is further configured to send the target background traffic transmission strategy of the second terminal device to the data analysis network element.
- the background traffic transmission policy of the second terminal device may include: a seventh data value of a transmission time window of the background traffic; the background traffic transmission policy of the second terminal device further includes one or more of the following Item: The seventh data value of the transmission bandwidth of the background traffic, the location information of the second terminal device, and the identity of the second terminal device.
- the communication device for determining a background traffic transmission strategy may further include a processing module 1401 and a sending module 1402.
- a processing module 1401 may further include a sending module 1402.
- the communication device shown in FIG. 14 may be used to perform the operations of the data analysis network element in the embodiments shown in FIG. 10 and FIG. 11, and may be used to perform the operations in the embodiment shown in FIG. 12. NWDAF operation.
- NWDAF operation E.g:
- the processing module 1401 is configured to determine at least one piece of fourth information, where the fourth information includes at least one identifier of the first terminal device, the first time, the first location, and the state of the first network element; the at least one first terminal device is at least one A part or all of the second terminal device; at least one first terminal device resides in a first position at a first time and has a state of a first network element;
- the sending module 1402 is configured to send at least one fourth message to the first policy control network element.
- the communication device based on the above-mentioned determining background traffic transmission strategy may send the predicted network element status corresponding to a specific future time and location of the terminal device to be transmitted to the background traffic to the first policy control network element, thereby enabling the first strategy
- the control network element determines the background traffic transmission policy of the second terminal device more accurately, thereby improving the success rate of background traffic transmission.
- the processing module 1401 is specifically configured to obtain at least one tenth information and tenth information of at least one second terminal device on a third network element when determining at least one fourth information. Including the identity of the second terminal device, the second time, the second location, and the state of the second network element; the second terminal device resides in the second location at the second time and has the state of the second network element; according to at least one second At least one piece of tenth information of the terminal device determines at least one piece of fourth information; the third network element serves at least one second terminal device.
- the state of the second network element includes one or more of the following: a second load, a second capacity, and a second available bandwidth; wherein the second load is a corresponding second at the second position
- the load of the network element; the second network element serves the second terminal device; the second capacity is the capacity of the corresponding second network element at the second location; and the second bandwidth is the bandwidth of the second network element at the second location.
- the second terminal device resides in the second position at the second time.
- the first network element status includes one or more of the following: a first load, a first capacity, and a first available bandwidth; wherein the first load is a corresponding first at a first position The load of the network element; the first network element serves the first terminal device; the first capacity is the capacity of the first network element corresponding to the first location; the first available bandwidth is the bandwidth of the first network element corresponding to the first location .
- the first terminal device resides in the first position at the first time.
- the communication device shown in FIG. 9 may be used to perform the operations of the first policy control network element in the embodiments shown in FIG. 10 and FIG. 11, and may also be used to execute the embodiment shown in FIG. 12. PCF operation.
- the transceiver 901 is configured to implement communication interaction with other devices connected to the first policy control network element (such as a PCF), that is, to receive and send data;
- the first policy control network element such as a PCF
- the processor 902 is configured to obtain at least one piece of fourth information, where the fourth information includes an identifier, a first time, a first position, and a state of a first network element of the at least one first terminal device; and determine at least one second terminal according to the ninth information Background traffic transmission policy of the device; wherein the ninth information includes at least one fourth information; the at least one first terminal device is part or all of the at least one second terminal device; the at least one first terminal device resides at the first time It is in the first position and has the state of the first network element.
- the movement trajectory (including the first time and the first position) of each second terminal device can be considered and The status of the first network element at the first position, and the background traffic size, time window, and network area of each second terminal device requested by the requesting device.
- a background traffic transmission query that includes at least one second terminal device. Result and / or the query result of the local background traffic transmission of at least one second terminal device, so that the background traffic transmission policy of at least one second terminal device formulated by the first policy control network element is more accurate.
- the processor 902 is further configured to control the transceiver 901 to receive an identifier of at least one second terminal device from the requesting device, and the requesting device provides services for the at least one second terminal device.
- the processor 902 is further configured to control the transceiver 901 to receive the identification of the requesting device from the requesting device, and query at least the first policy control network element or database network element to obtain at least An identifier of a second terminal device.
- the processor 902 when the processor 902 acquires at least one piece of fourth information, the processor 902 is specifically configured to: control the transceiver 901 to obtain at least one piece of fourth information from the data analysis network element; or obtain at least one piece of first information stored locally. Four messages.
- the first network element status includes one or more of the following: a first load, a first capacity, and a first available bandwidth; wherein the first load is a corresponding first at a first position
- the load of the network element, the first network element serves the first terminal device;
- the first capacity is the capacity of the first network element corresponding to the first location;
- the first available bandwidth is the bandwidth of the first network element corresponding to the first location .
- the first terminal device resides in the first position at the first time.
- the processor 902 is further configured to control the transceiver 901 to send the at least one second terminal device to the requesting device after determining the background traffic transmission policy of the at least one second terminal device according to the ninth information.
- the background traffic transmission policy requests the device to serve at least one second terminal device.
- the processor 902 when there is a background traffic transmission policy of the second terminal device, the processor 902 is further configured to determine that the background traffic transmission policy of the second terminal device is a target background traffic transmission of the second terminal device. Policy; the control transceiver 901 sends a target background traffic transmission policy of the second terminal device to the data analysis network element.
- the processor 902 is further configured to receive a target background traffic transmission policy of the second terminal device from the requesting device, and the second terminal device The target background traffic transmission strategy is selected by the requesting device according to the background traffic transmission strategy of the second terminal device; the control transceiver 901 sends the target background traffic transmission strategy of the second terminal device to the data analysis network element.
- the background traffic transmission policy of the second terminal device may include: a seventh data value of a transmission time window of the background traffic; the background traffic transmission policy of the second terminal device further includes one or more of the following Item: The seventh data value of the transmission bandwidth of the background traffic, the location information of the second terminal device, and the identity of the second terminal device.
- the communication device shown in FIG. 9 may be used to perform the operations of the data analysis network element in the embodiments shown in FIG. 10 and FIG. 11, and may also be used to execute the above-mentioned embodiment shown in FIG. 12. NWDAF operation.
- NWDAF operation E.g:
- the transceiver 901 is configured to implement communication interaction with other devices connected to a data analysis network element (such as NWDAF), that is, to receive and send data;
- NWDAF data analysis network element
- the processor 902 is configured to determine at least one piece of fourth information, where the fourth information includes at least one identifier of the first terminal device, a first time, a first location, and a state of the first network element; the at least one first terminal device is at least one first Some or all of the two terminal devices; at least one first terminal device resides in a first position at a first time and has a first network element status;
- the control transceiver 901 sends at least one fourth message to the first policy control network element.
- the communication device based on the above-mentioned determining background traffic transmission strategy may send the predicted network element status corresponding to a specific future time and location of the terminal device to be transmitted to the background traffic to the first policy control network element, thereby enabling the first strategy
- the control network element determines the background traffic transmission policy of the second terminal device more accurately, thereby improving the success rate of background traffic transmission.
- the processor 902 when determining the at least one fourth information, is specifically configured to: obtain at least one tenth information of at least one second terminal device on the third network element, where the tenth information includes The identity of the second terminal device, the second time, the second location, and the state of the second network element; the third network element serves at least one second terminal device; the second terminal device resides in the second location at the second time, and Having a second network element status; determining at least one fourth information according to at least one tenth information of at least one second terminal device.
- the state of the second network element includes one or more of the following: a second load, a second capacity, and a second available bandwidth; wherein the second load is a corresponding second at the second position
- the load of the network element; the second network element serves the second terminal device; the second capacity is the capacity of the corresponding second network element at the second location; and the second bandwidth is the bandwidth of the second network element at the second location.
- the second terminal device resides in the second position at the second time.
- the first network element status includes one or more of the following: a first load, a first capacity, and a first available bandwidth; wherein the first load is a corresponding first at a first position The load of the network element; the first network element serves the first terminal device; the first capacity is the capacity of the first network element corresponding to the first location; the first available bandwidth is the bandwidth of the first network element corresponding to the first location .
- the first terminal device resides in the first position at the first time.
- the embodiments of the present application provide a method and device for determining a background traffic transmission policy.
- a first policy controls a network element to obtain at least one piece of fourth information.
- the fourth information includes at least one identifier of the first terminal device, the first Time, first position, and state of the first network element; the first policy controls the network element to determine a background traffic transmission policy of at least one second terminal device according to the ninth information; wherein the ninth information includes at least one fourth information; at least one first A terminal device is part or all of at least one second terminal device; at least one first terminal device resides in the first position at a first time and has a state of the first network element.
- the first policy control network element when the first policy control network element formulates a background traffic transmission policy for at least one second terminal device, it may consider the movement trajectory (including the first time and the first position) of each second terminal device and the first The status of the first network element at the location, which will make the background traffic transmission policy of at least one second terminal device formulated by the first policy control network element more accurate.
- This application also provides a method for determining network performance information, and the method is also applicable to the communication system shown in FIG. 1.
- the specific process of the method may include:
- Step 1501 The first network element sends first information to the data analysis network element, the first information is used to request network performance information, and the first information includes one or more of the following: area information of the first area, and an identifier of the requesting device Or terminal device group ID.
- Step 1502 The data analysis network element determines network performance information according to the first information.
- the network performance information includes area information and second information of the second area, and the second information includes one or more of the following: the load of the network in the second area Information, service experience information of services in the second area, or the number of terminal devices in the second area; where the second area is a sub-area of the first area.
- each second area corresponds to a second piece of information.
- the one or more second areas are based on the first area provided by the data analysis network element based on the first network element or the data analysis network element based on the identification of the requesting device and / or the terminal device group identification.
- the first area is divided.
- Step 1503 The data analysis network element sends network performance information to the first network element.
- Step 1504 The first network element determines a first policy according to the network performance information.
- the first network element can formulate a policy according to the area information of the divided sub-area, that is, related information, so that the formulated policy can be more accurate.
- the divided sub-region is smaller than the first region; if the first region cannot be divided, the sub-region is equal to the first region.
- the first network element is a policy control network element (such as a PCF), and may also be other network elements, which are not listed here one by one.
- a policy control network element such as a PCF
- the requesting device provides services for at least one terminal device.
- the requesting device may be a service network element currently serving at least one terminal device, that is, an AF network element in FIG. 1, It includes AF network elements (for example, P-CSCF) controlled by the operator, and it can also be third-party AF network elements, such as a third-party service server.
- AF network elements for example, P-CSCF
- third-party AF network elements such as a third-party service server.
- the first network element receives the third information from the requesting device.
- the service network element may send the first network element to the first network element through the network open function network element. Send a third message.
- the above process may specifically be: the service network element sends the third information to the network open function network element.
- the service network element may send the third information to the network open function network element by calling the Nnef_BDTPNegotiation_Create request service; Forward the third information to the first network element.
- the network open function network element may send the third information to the first network element by calling the Npcf_BDTPolicyControl_Create request service.
- the first policy may include a background traffic transmission policy, where the background traffic transmission policy is a background traffic transmission policy of at least one terminal device.
- the first network element receives third information from the requesting device, and the third information is used to request the background traffic transmission policy.
- the third information includes one or more of the following: Area information, terminal device group identification, or identification of the requesting device; the first network element sends a background traffic transmission policy to the requesting device.
- the background traffic transmission policy includes area information of the second area.
- the first network element sends area information of the second area to the requesting device.
- the requesting device can understand that the background traffic transmission policy is formulated for the sub-region, and can be more accurately sent to at least one terminal device, so that the terminal device executes a more accurate background traffic transmission policy.
- the background traffic transmission policy further includes one or more of the following information: a recommended time window, a rate, a maximum aggregated bit rate, and the like.
- the information included in the first information is generated based on the information included in the third information.
- the data analysis network element determines network performance information according to the first information, and a specific method may be:
- the data analysis network element obtains the area information of the second area based on the area information of the first area
- the data analysis network element determines one or more of the following: load information of the network in the second region, service experience information of services in the second region, or the number of terminal devices in the second region.
- the data analysis network element determines the network performance information according to the first information.
- the specific method may be:
- the data analysis network element determines area information of the second area according to the terminal device group identifier and / or the requesting device identifier;
- the data analysis network element determines one or more of the following: load information of the network in the second region, service experience information of services in the second region, or the number of terminal devices in the second region.
- the data analysis network element determining the area information of the second area according to the terminal device group identifier and / or the requesting device identifier includes:
- the data analysis network element determines the area information of the first area according to the terminal device group identifier and / or the requesting device identifier;
- the data analysis network element obtains the area information of the second area based on the area information of the first area.
- the data analysis network element determines the area information of the first area according to the terminal device group identifier and / or the requesting device identifier.
- the specific method may be:
- the data analysis network element determines the identity of at least one terminal device according to the terminal device group identity and / or the requesting device identity, then determines the location information of all terminal devices based on the identity of the at least one terminal device, and finally determines the location information of all terminal devices Area information of the first area.
- the location information is used to indicate a location where the terminal device resides.
- the data analysis network element determines the identity of at least one terminal device according to the terminal device group identifier and / or the requesting device identifier.
- the specific method may be: the data analysis network element according to the terminal device group identifier and / or the requesting device
- the identity of the terminal device is obtained from the database network element, that is, the identity of at least one terminal device is obtained.
- the data analysis network element determines the location information of the at least one terminal device based on the identity of the at least one terminal device.
- the data analysis network element may be based on the identity of the at least one terminal device from the access and mobility management function network element or the access point. To obtain location information of at least one terminal device in the access device.
- the data analysis network element mentioned above obtains the area information of the second area based on the area information of the first area, and the specific method may be:
- the data analysis network element obtains the area information of the second area that is stored locally based on the area information of the first area; or
- the data analysis network element obtains the area information of the second area from the operation management and maintenance network element or the access and mobility management function network element based on the area information of the first area; or
- the data analysis network element collects location information of at least one terminal device located in the first area from the first area; the data analysis network element determines area information of the second area based on the location information of at least one terminal device located in the first area.
- the data analysis network element determines the load information of the network in the second area.
- the specific method may be: the data analysis network element obtains the second area from the network management network element or the operation management and maintenance network element. Network load information.
- the data analysis network element determines the load information of the network in the second region.
- the specific method may be: the data analysis network element determines the network information in the second region based on the service experience information of the services in the second region. Load information. For example, if the service experience Service MOS interval is [0, 5.0] and the service experience requirement is 3.0 or greater, Service MOS is [4.0, 5.0] is the load information is light load, and Service MOS is [3.0, 4.0] is the load Information is overloaded, and Service MOS is overloaded when it is 3.0 or less.
- the data analysis network element determines service experience information of services in the second network area, and the specific method may be:
- the data analysis network element can collect service data and network data of terminal devices in the network, as shown in Table 1 and Table 2, respectively.
- the data analysis network element obtains training samples through association identification, that is, the service's average opinion score (Sevice), and the corresponding network data (including the QoS flow rate bit rate, packet loss rate, and packet errors). Rate, etc.).
- the source of the association identifier is the AF network element, which is used to correlate the data on each network element of Table 1 and Table 2.
- the source of the Application ID is the AF network element, which is the service identification of the service of the terminal device, and the purpose is to identify the service of the terminal device.
- the source of the geographic area identifier is an AF network element, and the purpose is to identify the geographic area where the terminal device uses the service.
- the source of Service MOS is the AF network element, whose purpose is to identify the service experience data of the terminal device.
- the association identifier is used to associate data on each network element of Table 1 and Table 2.
- the information is the Application ID
- the Application ID comes from the PCF or UPF network element, and is the service identification of the service of the terminal equipment, and the purpose is to identify the service of the network terminal equipment.
- QFI comes from the SMF or U PF network element, and is an identifier of the service quality flow of the service of the terminal device, and the purpose is to identify the service quality flow of the service of the terminal device.
- the information is Cell ID
- Cell ID comes from AMF or RAN, and its purpose is to identify the cell that provides the service of the terminal device.
- Qos flow rate Qos flow rate is from UPF, and its purpose is to determine the parameter GFBR of the service quality flow of the service of the terminal device.
- the purpose is to determine the parameter PDB of the service quality flow of the service of the terminal device.
- the purpose is to determine the parameter PER of the service quality flow of the service of the terminal device.
- the information is Network data X4
- the purpose is to identify the network data X4.
- the information is Network data X5, it comes from RAN, the purpose is to identify the network data X5.
- the data analysis network element is trained based on the training samples to obtain a Service MOS model, which is used to characterize the correspondence between service experience information and network data.
- a Service MOS model which is used to characterize the correspondence between service experience information and network data.
- the representation of the Service MOS model can be as follows:
- H (x) W0 * X0 + W1 * X1 + W2 * X2 + W3 * X3 + W4 * X4 + W5 * X5 + ... + Wn * Xn (1).
- X1 can be Qos flow rate
- X2 can be Qos flow Packet Error Rate
- X3 can be Qos flow Packet Error Rate
- X4 can be network data X
- X5 can be network data X5.
- Wn represents the weight of the n-th variable
- n represents the number of variables
- Xn represents the n-th variable.
- n is an integer greater than or equal to 1.
- H (x) represents the Service MOS model.
- the data analysis network element can collect the network data corresponding to the services of the terminal equipment in the second area from the second area, and based on the above Service MOS model, the service experience information of the services in the second area can be obtained.
- the data analysis network element determines the number of terminal devices in the second area, and the specific method may be:
- the data analysis network element collects terminal device history information (including time, number of terminal devices) and service history information (including corresponding time, service experience information) in the second area, and then analyzes to meet the requirements of service experience
- the number of terminal devices that can be accommodated in the second area is recorded as the number of terminal devices in the second area.
- the number of terminal devices in the second area is specifically the number of terminal devices that can be accommodated in the second area in different time periods.
- the second area mentioned above may be one or more, that is, one or more second areas divided into the first area.
- the first network element receives information requesting other policies from the requesting device, and this information may also include one or more of the following: area information of the first area, terminal equipment
- This information may also include one or more of the following: area information of the first area, terminal equipment
- the group identifier or the identifier of the requesting device is described in the embodiment of the present application by using only the first policy as a background traffic transmission policy as an example. The case where the first policy is another policy is not described in detail here.
- the following uses the first policy as a background traffic transmission policy as an example to describe an example of a method for determining a background traffic transmission policy provided in the embodiment of the present application.
- a requesting device requests a background traffic transmission policy.
- the data analysis network element divides the first area into one or more second areas, so that the policy control network element accurately formulates a background traffic transmission policy.
- the requesting device is a service network element AF
- the terminal device is a UE
- the first network element is a policy control network element PCF
- NWDAF The specific process of this example can include:
- Step 1601 The AF sends third information to the NEF, and the third information is used to request a background traffic transmission policy.
- the third information includes one or more of the following: area information of the first area, an identifier of the AF, or a UE group identifier.
- NEF is an example of a network element with an open function.
- NEF can also be replaced with another network element with an open function, which is not limited in this application.
- the AF may send the third information to the NEF by calling the Nnef_BDTPNegotiation_Create request or Nnef_Trigger_Delivery request service.
- Step 1602 The NEF sends third information to the PCF.
- the NEF may send the third information to the PCF by calling the Npcf_BDTPolicyControl_Create request or Npcf_PolicyAuthorization_CreateRequest service.
- Step 1603 The PCF sends the first information to the NWDAF, and the first information includes one or more of the following: area information of the first area, an identifier of the AF, or a UE group identifier.
- the PCF may send the first information to the NWDAF by calling the Nnwdaf_AnalyticsSubscription_Subscribe request service.
- Step 1604 NWDAF determines network performance information according to the first information.
- the network performance information includes area information and second information of the second area.
- the second information includes one or more of the following: load information of the network in the second area, Service experience information of services in the second region or the number of terminal devices in the second region; where the second region is a sub-region of the first region.
- Step 1605 NWDAF sends network performance information to the PCF.
- NWDAF can send network performance information to the PCF by calling the Nnwdaf_Nnwdaf_AnalyticsSubscription_SubscribeResponse service.
- Step 1606 The PCF determines a background traffic transmission policy according to the network performance information.
- Step 1607 The PCF sends a background traffic transmission policy to the NEF.
- the background traffic transmission policy includes area information of the second area.
- the PCF can send a background traffic transmission policy to the NEF by calling the Npcf_BDT Policy ControlResponse or Npcf_PolicyAuthorization_Notify service.
- Step 1608 The NEF sends a background traffic transmission policy to the AF.
- NEF can call Nnef_BDT, Pnegotiation_Create response, or Nnef_Trigger_Delivery response service to send background traffic transmission policy to AF.
- the NEF may first convert the area information of the second area of the network type in the background traffic policy to the area information of the second area of the geographic area type, and then perform step 1608.
- the PCF can formulate a background traffic transmission strategy according to the area information and related information of the divided sub-regions, so that the formulated background traffic transmission strategy can be made more accurate.
- each solution of the method for determining a background traffic transmission policy provided in the embodiments of the present application is described from the perspective of interaction between each network element or device.
- various network elements and devices such as the first policy control network element, data analysis network element, first service network element, first terminal device, and second terminal device, in order to implement the foregoing functions, include the execution of each Function corresponding hardware structure and / or software module.
- this application can be implemented in the form of hardware or a combination of hardware and computer software. Whether a certain function is performed by hardware or computer software-driven hardware depends on the specific application of the technical solution and design constraints. A professional technician can use different methods to implement the described functions for each specific application, but such implementation should not be considered to be beyond the scope of this application.
- the communication device shown in FIG. 7 may be used to perform operations of the first network element in the embodiment shown in FIG. 15 and to perform operations of the PCF in the embodiment shown in FIG. 16.
- a sending module 702 is configured to send first information to a data analysis network element, where the first information is used to request network performance information, and the first information includes one or more of the following: area information of the first area, an identifier of the requesting device, or Terminal equipment group identification;
- the receiving module 701 is configured to receive network performance information from a data analysis network element.
- the network performance information includes area information and second information of the second area, and the second information includes one or more of the following: a load of the network in the second area Information, service experience information of services in the second region, or the number of terminal devices in the second region; where the second region is a sub-region of the first region;
- the processing module 703 is configured to determine a first policy according to network performance information.
- the formulated first strategy can be made more accurate according to the area information and related information of the divided sub-area.
- the first policy includes a background traffic transmission policy, wherein the background traffic transmission policy is a background traffic transmission policy of at least one terminal device.
- the receiving module 701 is further configured to receive third information from the requesting device, the third information is used to request a background traffic transmission policy, and the third information includes one or more of the following: the first The area information of the area, the identity of the terminal device group, or the identity of the requesting device;
- the sending module 702 is further configured to send a background traffic transmission policy to the requesting device.
- the background traffic transmission policy includes area information of the second area.
- the sending module 702 is further configured to send the area information of the second area to the requesting device.
- the background traffic transmission policy further includes one or more of the following information: a recommended time window, a rate, and a maximum aggregated bit rate.
- the first network element is a policy control function network element.
- the communication device shown in FIG. 7 may be used to perform operations of the data analysis network element in the embodiment shown in FIG. 15 and to perform operations of NWDAF in the embodiment shown in FIG. 16.
- NWDAF NWDAF
- the receiving module 701 is configured to receive first information from a first network element, and the first information is used to request network performance information.
- the first information includes one or more of the following: area information of the first area, an identifier of the requesting device, or Terminal equipment group identification;
- a processing module 703 is configured to determine network performance information according to the first information, where the network performance information includes area information and second information of the second area, and the second information includes one or more of the following: load information of the network in the second area 2. Service experience information of services in the second area or the number of terminal devices in the second area; where the second area is a sub-area of the first area;
- the sending module 702 is configured to send network performance information to a first network element.
- the formulated first strategy can be made more accurate according to the area information and related information of the divided sub-area.
- the processing module when determining the network performance information according to the first information, is specifically configured to:
- the processing module 703 when determining the network performance information according to the first information, is specifically configured to:
- the processing module 703 is specifically configured to: when determining the area information of the second area according to the terminal device group identifier and / or the requesting device identifier, specifically:
- the area information of the second area is acquired based on the area information of the first area.
- the processing module 703 is specifically configured to: when obtaining the area information of the second area based on the area information of the first area:
- the area information of the second area is obtained from the operation management and maintenance network element or the access and mobility management function network element based on the area information of the first area.
- the processing module 703 is specifically configured to: when determining load information of a network in the second area:
- the load information of the network in the second area is obtained from a network management network element or an operation management and maintenance network element.
- the first network element is a policy control function network element.
- the communication device shown in FIG. 8 may be used to perform the operation of the requesting device in the embodiment shown in FIG. 15 and the operation of the AF in the embodiment shown in FIG. 16.
- the sending module 802 is configured to send third information to the first network element.
- the third information is used to request a background traffic transmission policy.
- the third information includes one or more of the following: area information of the first area, and an identifier of the requesting device. Or terminal equipment group identification;
- the receiving module 801 is configured to receive a background traffic transmission policy from a first network element.
- the background traffic transmission policy includes area information of a second area, and the second area is a sub-area of the first area.
- the background traffic transmission policy requested by the requesting device to the first network element can be more accurate.
- the background traffic transmission policy is a background traffic transmission policy of at least one terminal device.
- the requesting device serves at least one terminal device.
- the background traffic transmission policy includes one or more of the following information: a recommended time window, a rate, and a maximum aggregated bit rate.
- the first network element is a policy control function network element.
- the communication device shown in FIG. 9 may be used to perform the operation of the first network element in the embodiment shown in FIG. 15, and may also be used to perform the operation of the PCF in the embodiment shown in FIG. 16. .
- the transceiver 901 is configured to implement communication interaction with other devices connected to the first network element (for example, a PCF), that is, to receive and send data;
- the first network element for example, a PCF
- the processor 902 is configured to control the transceiver 901 to receive network performance information from the data analysis network element.
- the network performance information includes area information and second information of the second area, and the second information includes one or more of the following: The load information of the network, the service experience information of the services in the second region, or the number of terminal devices in the second region; where the second region is a sub-region of the first region; and the first policy is determined according to the network performance information.
- the formulated first strategy can be made more accurate according to the area information and related information of the divided sub-area.
- the first policy includes a background traffic transmission policy, wherein the background traffic transmission policy is a background traffic transmission policy of at least one terminal device.
- the processor 902 is further configured to control the transceiver 901 to receive third information from the requesting device, the third information is used to request a background traffic transmission policy, and the third information includes one or more of the following : The area information of the first area, the terminal device group identity or the identity of the requesting device; and the control transceiver 901 sends a background traffic transmission policy to the requesting device.
- the background traffic transmission policy includes area information of the second area.
- the processor 902 is further configured to control the transceiver 901 to send the area information of the second area to the requesting device.
- the background traffic transmission policy further includes one or more of the following information: a recommended time window, a rate, and a maximum aggregated bit rate.
- the first network element is a policy control function network element.
- the communication device shown in FIG. 9 may be used to perform the operations of the data analysis network element in the embodiment shown in FIG. 15, and may also be used to execute the NWDAF in the embodiment shown in FIG. 16. operating. E.g:
- the transceiver 901 is configured to implement communication interaction with other devices connected to a data analysis network element (such as NWDAF), that is, to receive and send data;
- NWDAF data analysis network element
- the processor 902 is configured to control the transceiver 901 to receive first information from the first network element, and the first information is used to request network performance information; the first information includes one or more of the following: area information of the first area, and a requesting device Identification or terminal equipment group identification;
- the network performance information is determined according to the first information.
- the network performance information includes area information and second information of the second area.
- the second information includes one or more of the following: load information of the network in the second area, and services in the second area. Service experience information or the number of terminal devices in the second area; where the second area is a sub-area of the first area;
- the control transceiver 901 sends network performance information to the first network element.
- the formulated first strategy can be made more accurate according to the area information and related information of the divided sub-area.
- the processor 902 when the first information includes area information of the first area, when the processor 902 determines network performance information according to the first information, the processor 902 is specifically configured to:
- the processor 902 is specifically configured to determine the network performance information according to the first information:
- the processor 902 is specifically configured to: when determining the area information of the second area according to the terminal device group identifier and / or the requesting device identifier, specifically:
- the area information of the second area is acquired based on the area information of the first area.
- the processor 902 is specifically configured to: when acquiring the area information of the second area based on the area information of the first area:
- the area information of the second area is obtained from the operation management and maintenance network element or the access and mobility management function network element based on the area information of the first area.
- the processor 902 is specifically configured to: when determining load information of a network in the second area:
- the load information of the network in the second area is obtained from a network management network element or an operation management and maintenance network element.
- the first network element is a policy control function network element.
- the communication device shown in FIG. 9 may be used to perform the operation of the requesting device in the embodiment shown in FIG. 15 described above, and may also be used to perform the operation of AF in the embodiment shown in FIG. 16 described above.
- the communication device shown in FIG. 9 may be used to perform the operation of the requesting device in the embodiment shown in FIG. 15 described above, and may also be used to perform the operation of AF in the embodiment shown in FIG. 16 described above.
- the transceiver 901 is configured to implement communication interaction with other devices connected to the requesting device (for example, AF), that is, to receive and send data;
- AF requesting device
- the processor 902 is configured to control the transceiver 901 to send third information to the first network element, and the third information is used to request a background traffic transmission policy.
- the third information includes one or more of the following: area information of the first area, request Device identification or terminal device group identification;
- the control transceiver 901 receives a background traffic transmission policy from the first network element.
- the background traffic transmission policy includes area information of the second area, and the second area is a sub-area of the first area.
- the background traffic transmission policy requested by the requesting device to the first network element can be more accurate.
- the background traffic transmission policy is a background traffic transmission policy of at least one terminal device.
- the requesting device serves at least one terminal device.
- the background traffic transmission policy includes one or more of the following information: a recommended time window, a rate, and a maximum aggregated bit rate.
- the first network element is a policy control function network element.
- At least one means one or more items
- multiple items means two or more items.
- “And / or” describes the association relationship of related objects, and indicates that there can be three kinds of relationships, for example, A and / or B can indicate: A exists alone, A and B exist simultaneously, and B alone exists, where A, B can be singular or plural.
- the character “/” generally indicates that the related objects are an "or” relationship.
- “At least one or more of the following" or similar expressions refers to any combination of these items, including any combination of single or plural items. For example, at least one (a), a, b, or c can be expressed as: a, b, c, ab, ac, bc, or abc, where a, b, and c can be single or multiple .
- this application may be provided as a method, a system, or a computer program product. Therefore, this application may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Moreover, this application may take the form of a computer program product implemented on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, etc.) containing computer-usable program code.
- computer-usable storage media including, but not limited to, disk storage, CD-ROM, optical storage, etc.
- These computer program instructions may also be stored in a computer-readable memory capable of directing a computer or other programmable data processing device to work in a specific manner such that the instructions stored in the computer-readable memory produce a manufactured article including an instruction device, the instructions
- the device implements the functions specified in one or more flowcharts and / or one or more blocks of the block diagram.
- These computer program instructions can also be loaded onto a computer or other programmable data processing device, so that a series of steps can be performed on the computer or other programmable device to produce a computer-implemented process, which can be executed on the computer or other programmable device.
- the instructions provide steps for implementing the functions specified in one or more flowcharts and / or one or more blocks of the block diagrams.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims (30)
- 一种确定网络性能信息的方法,其特征在于,包括:第一网元向数据分析网元发送第一信息,所述第一信息用于请求网络性能信息,所述第一信息中包括以下一项或多项:第一区域的区域信息、请求设备的标识或终端设备群组标识;所述第一网元从所述数据分析网元接收所述网络性能信息,所述网络性能信息中包括第二区域的区域信息和第二信息,所述第二信息包括以下一项或多项:所述第二区域中网络的负载信息、所述第二区域中业务的业务体验信息或所述第二区域中的终端设备的个数;其中所述第二区域为所述第一区域的子区域;所述第一网元根据所述网络性能信息确定第一策略。
- 如权利要求1所述的方法,其特征在于,所述第一策略包括背景流量传输策略,其中,所述背景流量传输策略为至少一个所述终端设备的背景流量传输策略。
- 如权利要求2所述的方法,其特征在于,所述方法还包括:所述第一网元从所述请求设备接收第三信息,所述第三信息用于请求所述背景流量传输策略,所述第三信息中包括以下一项或多项:所述第一区域的区域信息、所述终端设备群组标识或所述请求设备的标识;所述第一网元向所述请求设备发送所述背景流量传输策略。
- 如权利要求2或3所述的方法,其特征在于,所述背景流量传输策略中包括所述第二区域的区域信息。
- 如权利要求2或3所述的方法,其特征在于,所述方法还包括:所述第一网元向所述请求设备发送所述第二区域的区域信息。
- 如权利要求2-5任一项所述的方法,其特征在于,所述背景流量传输策略中还包括以下信息中的一个或多个:推荐的时间窗、费率、最大聚合比特率。
- 一种确定网络性能信息的方法,其特征在于,包括:数据分析网元从第一网元接收第一信息,所述第一信息用于请求网络性能信息,所述第一信息中包括以下一项或多项:第一区域的区域信息、请求设备的标识或终端设备群组标识;所述数据分析网元根据所述第一信息确定所述网络性能信息,所述网络性能信息中包括第二区域的区域信息和第二信息,所述第二信息包括以下一项或多项:所述第二区域中网络的负载信息、所述第二区域中业务的业务体验信息或所述第二区域中的终端设备的个数;其中所述第二区域为所述第一区域的子区域;所述数据分析网元向所述第一网元发送所述网络性能信息。
- 如权利要求7所述的方法,其特征在于,当所述第一信息中包含所述第一区域的区域信息时,所述数据分析网元根据所述第一信息确定所述网络性能信息,包括:所述数据分析网元基于所述第一区域的区域信息获取所述第二区域的区域信息;所述数据分析网元确定以下一项或多项:所述第二区域中网络的负载信息、所述第二区域中业务的业务体验信息或所述第二区域中的终端设备的个数。
- 如权利要求7所述的方法,其特征在于,当所述第一信息中包含所述终端设备群 组标识和/或所述请求设备的标识时,所述数据分析网元根据所述第一信息确定所述网络性能信息,包括:所述数据分析网元根据所述终端设备群组标识和/或所述请求设备的标识确定所述第二区域的区域信息;所述数据分析网元确定以下一项或多项:所述第二区域中网络的负载信息、所述第二区域中业务的业务体验信息或所述第二区域中的终端设备的个数。
- 如权利要求9所述的方法,其特征在于,所述数据分析网元根据所述终端设备群组标识和/或所述请求设备的标识确定所述第二区域的区域信息,包括:所述数据分析网元根据所述终端设备群组标识和/或所述请求设备的标识确定所述第一区域的区域信息;所述数据分析网元基于所述第一区域的区域信息获取所述第二区域的区域信息。
- 如权利要求8或10所述的方法,其特征在于,所述数据分析网元基于所述第一区域的区域信息获取所述第二区域的区域信息,包括:所述数据分析网元基于所述第一区域的区域信息获取本地保存的所述第二区域的区域信息;或者,所述数据分析网元基于所述第一区域的区域信息从运行管理和维护网元或者接入和移动性管理功能网元获取所述第二区域的区域信息。
- 如权利要求8-11任一项所述的方法,其特征在于,所述数据分析网元确定所述第二区域中网络的负载信息,包括:所述数据分析网元从网络管理网元或者所述运行管理和维护网元获取所述第二区域中网络的负载信息。
- 一种确定背景流量传输策略的方法,其特征在于,包括:请求设备向第一网元发送第三信息,所述第三信息用于请求背景流量传输策略,所述第三信息中包括以下一项或多项:第一区域的区域信息、所述请求设备的标识或终端设备群组标识;所述请求设备从所述第一网元接收所述背景流量传输策略,所述背景流量传输策略包括第二区域的区域信息,所述第二区域为所述第一区域的子区域。
- 如权利要求13所述的方法,其特征在于,所述背景流量传输策略为至少一个终端设备的背景流量传输策略。
- 如权利要求13或14所述的方法,其特征在于,所述背景流量传输策略中包括以下信息中的一个或多个:推荐的时间窗、费率、最大聚合比特率。
- 一种通信装置,所述通信装置为第一网元,其特征在于,包括:发送模块,用于向数据分析网元发送第一信息,所述第一信息用于请求网络性能信息,所述第一信息中包括以下一项或多项:第一区域的区域信息、请求设备的标识或终端设备群组标识;接收模块,用于从所述数据分析网元接收所述网络性能信息,所述网络性能信息中包括第二区域的区域信息和第二信息,所述第二信息包括以下一项或多项:所述第二区域中网络的负载信息、所述第二区域中业务的业务体验信息或所述第二区域中的终端设备的个 数;其中所述第二区域为所述第一区域的子区域;处理模块,用于根据所述网络性能信息确定第一策略。
- 如权利要求16所述的通信装置,其特征在于,所述第一策略包括背景流量传输策略,其中,所述背景流量传输策略为至少一个所述终端设备的背景流量传输策略。
- 如权利要求17所述的通信装置,其特征在于,所述接收模块,还用于从所述请求设备接收第三信息,所述第三信息用于请求所述背景流量传输策略,所述第三信息中包括以下一项或多项:所述第一区域的区域信息、所述终端设备群组标识或所述请求设备的标识;所述发送模块,还用于向所述请求设备发送所述背景流量传输策略。
- 如权利要求17或18所述的通信装置,其特征在于,所述背景流量传输策略中包括所述第二区域的区域信息。
- 如权利要求17或18所述的通信装置,其特征在于,所述发送模块,还用于:向所述请求设备发送所述第二区域的区域信息。
- 如权利要求17-20任一项所述的通信装置,其特征在于,所述背景流量传输策略中还包括以下信息中的一个或多个:推荐的时间窗、费率、最大聚合比特率。
- 一种通信装置,所述通信装置为数据分析网元,其特征在于,包括:接收模块,用于从第一网元接收第一信息,所述第一信息用于请求网络性能信息,所述第一信息中包括以下一项或多项:第一区域的区域信息、请求设备的标识或终端设备群组标识;处理模块,用于根据所述第一信息确定所述网络性能信息,所述网络性能信息中包括第二区域的区域信息和第二信息,所述第二信息包括以下一项或多项:所述第二区域中网络的负载信息、所述第二区域中业务的业务体验信息或所述第二区域中的终端设备的个数;其中所述第二区域为所述第一区域的子区域;发送模块,用于向所述第一网元发送所述网络性能信息。
- 如权利要求22所述的通信装置,其特征在于,当所述第一信息中包含所述第一区域的区域信息时,所述处理模块,在根据所述第一信息确定所述网络性能信息时,具体用于:基于所述第一区域的区域信息获取所述第二区域的区域信息;确定以下一项或多项:所述第二区域中网络的负载信息、所述第二区域中业务的业务体验信息或所述第二区域中的终端设备的个数。
- 如权利要求22所述的通信装置,其特征在于,当所述第一信息中包含所述终端设备群组标识和/或所述请求设备的标识时,所述处理模块,在根据所述第一信息确定所述网络性能信息时,具体用于:根据所述终端设备群组标识和/或所述请求设备的标识确定所述第二区域的区域信息;确定以下一项或多项:所述第二区域中网络的负载信息、所述第二区域中业务的业务体验信息或所述第二区域中的终端设备的个数。
- 如权利要求24所述的通信装置,其特征在于,所述处理模块,在根据所述终端设备群组标识和/或所述请求设备的标识确定所述第二区域的区域信息时,具体用于:根据所述终端设备群组标识和/或所述请求设备的标识确定所述第一区域的区域信息;基于所述第一区域的区域信息获取所述第二区域的区域信息。
- 如权利要求23或25所述的通信装置,其特征在于,所述处理模块,在基于所述第一区域的区域信息获取所述第二区域的区域信息时,具体用于:基于所述第一区域的区域信息获取本地保存的所述第二区域的区域信息;或者,基于所述第一区域的区域信息从运行管理和维护网元或者接入和移动性管理功能网元获取所述第二区域的区域信息。
- 如权利要求23-26任一项所述的通信装置,其特征在于,所述处理模块,在确定所述第二区域中网络的负载信息时,具体用于:从网络管理网元或者所述运行管理和维护网元获取所述第二区域中网络的负载信息。
- 一种通信装置,所述通信装置为请求设备,其特征在于,包括:发送模块,用于向第一网元发送第三信息,所述第三信息用于请求背景流量传输策略,所述第三信息中包括以下一项或多项:第一区域的区域信息、所述请求设备的标识或终端设备群组标识;接收模块,用于从所述第一网元接收所述背景流量传输策略,所述背景流量传输策略包括第二区域的区域信息,所述第二区域为所述第一区域的子区域。
- 如权利要求28所述的通信装置,其特征在于,所述背景流量传输策略为至少一个终端设备的背景流量传输策略。
- 如权利要求28或29所述的通信装置,其特征在于,所述背景流量传输策略中包括以下信息中的一个或多个:推荐的时间窗、费率、最大聚合比特率。
Priority Applications (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP19806844.7A EP3817449B1 (en) | 2018-05-21 | 2019-05-20 | Methods, device and computer-readable medium for determining background traffic transmission policy |
BR112020023725-6A BR112020023725A2 (pt) | 2018-05-21 | 2019-05-20 | método para determinar política de transferência de tráfego de fundo e aparelho |
EP23164108.5A EP4271027A1 (en) | 2018-05-21 | 2019-05-20 | Network performance information and communication system |
AU2019272327A AU2019272327B2 (en) | 2018-05-21 | 2019-05-20 | Method for determining background traffic transfer policy and apparatus |
CA3100862A CA3100862C (en) | 2018-05-21 | 2019-05-20 | Apparatus and method for determining background traffic transfer policy |
US17/100,208 US11601849B2 (en) | 2018-05-21 | 2020-11-20 | Method for determining background traffic transfer policy and apparatus |
Applications Claiming Priority (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810491483 | 2018-05-21 | ||
CN201810491483.8 | 2018-05-21 | ||
CN201810671611.7 | 2018-06-26 | ||
CN201810671611 | 2018-06-26 | ||
CN201910256749.5A CN110519795B (zh) | 2018-05-21 | 2019-04-01 | 一种确定背景流量传输策略的方法及装置 |
CN201910256749.5 | 2019-04-01 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US17/100,208 Continuation US11601849B2 (en) | 2018-05-21 | 2020-11-20 | Method for determining background traffic transfer policy and apparatus |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2019223658A1 true WO2019223658A1 (zh) | 2019-11-28 |
Family
ID=68617184
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2019/087653 WO2019223658A1 (zh) | 2018-05-21 | 2019-05-20 | 一种确定背景流量传输策略的方法及装置 |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2019223658A1 (zh) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8340099B2 (en) * | 2009-07-15 | 2012-12-25 | Microsoft Corporation | Control of background data transfers |
CN106797321A (zh) * | 2014-09-30 | 2017-05-31 | 华为技术有限公司 | 一种背景流量下载方法、设备及系统 |
CN106982125A (zh) * | 2016-01-18 | 2017-07-25 | 中兴通讯股份有限公司 | 策略计费控制方法、协议转换器、策略计费规则设备、系统 |
-
2019
- 2019-05-20 WO PCT/CN2019/087653 patent/WO2019223658A1/zh unknown
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8340099B2 (en) * | 2009-07-15 | 2012-12-25 | Microsoft Corporation | Control of background data transfers |
CN106797321A (zh) * | 2014-09-30 | 2017-05-31 | 华为技术有限公司 | 一种背景流量下载方法、设备及系统 |
CN106982125A (zh) * | 2016-01-18 | 2017-07-25 | 中兴通讯股份有限公司 | 策略计费控制方法、协议转换器、策略计费规则设备、系统 |
Non-Patent Citations (1)
Title |
---|
See also references of EP3817449A4 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11601849B2 (en) | Method for determining background traffic transfer policy and apparatus | |
US10397758B2 (en) | Function selection based on utilization level in 5G environments | |
US12063592B2 (en) | User plane system selection based on latency | |
US20220369204A1 (en) | Method and device for providing service to user device by using network slice in communication system | |
WO2020063335A1 (zh) | 一种切片信息处理方法及装置 | |
WO2018161850A1 (en) | System and method of network policy optimization | |
US11483732B2 (en) | Intelligent allocation of network resources | |
WO2020108002A1 (zh) | 一种传输策略确定方法、策略控制方法及装置 | |
WO2021218391A1 (zh) | 信息处理方法、装置、设备及可读存储介质 | |
CN113661724A (zh) | 网络中的基于用例的网络切片选择 | |
WO2023082878A1 (zh) | 一种通信方法及装置 | |
WO2019158034A1 (zh) | 一种资源分配方法和装置 | |
WO2019223658A1 (zh) | 一种确定背景流量传输策略的方法及装置 | |
CN117528629A (zh) | 通信方法、装置及系统 | |
WO2021164428A1 (zh) | 通信方法、装置及系统 | |
WO2023082877A1 (zh) | 一种通信方法及装置 | |
US9307471B1 (en) | Selecting an access node for wireless device communication | |
CN117641467A (zh) | 一种通信方法及装置 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 19806844 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 3100862 Country of ref document: CA |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
REG | Reference to national code |
Ref country code: BR Ref legal event code: B01A Ref document number: 112020023725 Country of ref document: BR |
|
ENP | Entry into the national phase |
Ref document number: 2019806844 Country of ref document: EP Effective date: 20201204 |
|
ENP | Entry into the national phase |
Ref document number: 2019272327 Country of ref document: AU Date of ref document: 20190520 Kind code of ref document: A |
|
ENP | Entry into the national phase |
Ref document number: 112020023725 Country of ref document: BR Kind code of ref document: A2 Effective date: 20201120 |