WO2019223658A1 - 一种确定背景流量传输策略的方法及装置 - Google Patents

一种确定背景流量传输策略的方法及装置 Download PDF

Info

Publication number
WO2019223658A1
WO2019223658A1 PCT/CN2019/087653 CN2019087653W WO2019223658A1 WO 2019223658 A1 WO2019223658 A1 WO 2019223658A1 CN 2019087653 W CN2019087653 W CN 2019087653W WO 2019223658 A1 WO2019223658 A1 WO 2019223658A1
Authority
WO
WIPO (PCT)
Prior art keywords
network element
information
background traffic
terminal device
traffic transmission
Prior art date
Application number
PCT/CN2019/087653
Other languages
English (en)
French (fr)
Inventor
辛阳
吴晓波
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from CN201910256749.5A external-priority patent/CN110519795B/zh
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to EP19806844.7A priority Critical patent/EP3817449B1/en
Priority to BR112020023725-6A priority patent/BR112020023725A2/pt
Priority to EP23164108.5A priority patent/EP4271027A1/en
Priority to AU2019272327A priority patent/AU2019272327B2/en
Priority to CA3100862A priority patent/CA3100862C/en
Publication of WO2019223658A1 publication Critical patent/WO2019223658A1/zh
Priority to US17/100,208 priority patent/US11601849B2/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/04Error control

Definitions

  • the present application relates to the field of communication technologies, and in particular, to a method and an apparatus for determining a background traffic transmission strategy.
  • Background traffic can also be called background data (BD), which is usually defined as non-real-time interactive traffic, such as traffic transmitted by software update packages, software notification messages, and vehicle map information.
  • BD background data
  • the policy control network element Before the background traffic is transmitted, for the transmission of background traffic, the policy control network element usually formulates a background traffic transmission policy for the service network element, so that the terminal equipment corresponding to the subsequent service network element performs the background traffic according to the background traffic transmission policy. transmission.
  • different service network elements will request different background traffic transmission policies from different policy control network elements, and different policy control network elements can only formulate corresponding background traffic based on the requests of their own service network elements. Transmission strategy. This usually results in conflicts in background traffic transmission strategies between different service network elements, and subsequently causes background traffic transmission to fail.
  • the background traffic transmission policies of multiple service network elements instruct their respective terminal devices to transmit background traffic between 1 AM and 2 AM. In this way, the transmission of background traffic by multiple terminal devices in the same period may cause the network Slow, which may cause background traffic to fail.
  • the present application provides a method and device for determining a background traffic transmission strategy, which are used to resolve conflicts between background traffic transmission strategies formulated by different policy control network elements for different service network elements in the prior art, and subsequently cause background traffic transmission.
  • the problem of failure is used to resolve conflicts between background traffic transmission strategies formulated by different policy control network elements for different service network elements in the prior art, and subsequently cause background traffic transmission.
  • the present application provides a method for determining a background traffic transmission strategy.
  • the method includes:
  • the first policy control network element receives first information from the requesting device, and the first information is used to request a background traffic transmission policy of the first terminal device; the first policy control network element analyzes the data according to the first information.
  • the network element for example, NWDAF network element
  • sends second information the second information is used to request the background traffic of the first terminal device to transmit the data analysis result; the first policy control network element receives the background of the first terminal device from the data analysis network element Traffic transmission data analysis result.
  • the background traffic transmission data analysis result of the first terminal device is determined by the data analysis network element based on the target background traffic transmission policy of the second terminal device.
  • the second terminal device is different from the first terminal device.
  • the target background traffic transmission policy of the two terminal devices is used for the background traffic transmission of the second terminal device.
  • the first policy controls the network element to send the background traffic transmission policy of the first terminal device to the requesting device.
  • the background traffic transmission policy of the first terminal device is The first policy control network element determines according to the third information, and the third information includes the background flow of the first terminal device. Analysis results of the transmission data.
  • the data analysis result of the background traffic transmission data of the first terminal device determined by the data analysis network element based on the target background traffic transmission policy of the other terminal device can further enable the first policy to control the network element.
  • a background traffic transmission policy of the first terminal device is determined, so that the background traffic transmission policy of the first terminal device determined by the first policy control network element refers to other terminal devices, so that the first policy control network element can determine the first terminal device.
  • the background traffic transmission strategy of the device does not conflict with the background traffic transmission strategy of other terminal devices, thereby solving the problem of background traffic transmission failure.
  • the third information further includes: a background traffic transmission query result of the first terminal device and / or a local background traffic transmission policy of the first terminal device. This can make the background traffic transmission policy of the first terminal device determined by the first policy control network element more accurate.
  • the method further includes: when the third information further includes a background traffic transmission query result of the first terminal device, the first policy control network element obtains the background traffic transmission query result of the first terminal device from the database network element. Or when the third information further includes a local background traffic transmission policy of the first terminal device, the first policy control network element obtains the local background traffic transmission policy of the first terminal device from the first policy control network element; or, when the first information
  • the three pieces of information also include a background traffic transmission query result of the first terminal device and a local background traffic transmission policy of the first terminal device, the first policy control network element obtains a background traffic transmission query result of the first terminal device from the database network element, and The first policy control network element obtains a local background traffic transmission policy of the first terminal device from the first policy control network element.
  • the first policy control network element can subsequently accurately determine the background traffic transmission policy of the first terminal device according to the third information.
  • the first policy control network element determines that the background traffic transmission policy of the first terminal device is a target background traffic transmission policy of the first terminal device.
  • the target background traffic transmission policy of a terminal device is used for the background traffic transmission of the first terminal device; after that, the first policy control network element sends the target background traffic transmission policy of the first terminal device to the data analysis network element; or the first policy control The network element sends the target background traffic transmission policy of the first terminal device to the database network element; or the first policy control network element sends the target background traffic transmission policy of the first terminal device to both the data analysis network element and the database network element.
  • the data analysis network element can save the target background traffic transmission policy of the first terminal device, and then after other terminal devices request the data analysis network element for the corresponding background traffic transmission data analysis result, the data analysis network element can refer to The target background traffic transmission policy of the first terminal device determines the analysis results of background traffic transmission data of other terminal devices for other terminal devices, so that subsequent background traffic transmission policies of other terminal devices and the target background traffic transmission policy of the first terminal device are in between. This can reduce conflicts, which in turn can successfully transmit background traffic from other terminal devices.
  • the database network element may save the target background traffic transmission policy of the first terminal device, so that subsequent data analysis network elements may obtain the target background traffic transmission policy of the first terminal device from the database network element, thereby achieving the foregoing beneficial effects.
  • the first policy controls the network element to receive the target background traffic transmission policy of the first terminal device from the requesting device, and the target background of the first terminal device.
  • the traffic transmission policy is selected by the requesting device according to the background traffic transmission policy of the first terminal device; after that, the first policy control network element sends the target background traffic transmission policy of the first terminal device to the data analysis network element; or the first policy control network The element sends the target background traffic transmission policy of the first terminal device to the database network element; or the first policy control network element sends the target background traffic transmission policy of the first terminal device to both the data analysis network element and the database network element.
  • the data analysis network element can save the target background traffic transmission policy of the first terminal device, and then after other terminal devices request the data analysis network element for the corresponding background traffic transmission data analysis result, the data analysis network element can refer to The target background traffic transmission policy of the first terminal device determines the analysis results of background traffic transmission data of other terminal devices for other terminal devices, so that subsequent background traffic transmission policies of other terminal devices and the target background traffic transmission policy of the first terminal device are in between. This can reduce conflicts, which in turn can successfully transmit background traffic from other terminal devices.
  • the database network element may save the target background traffic transmission policy of the first terminal device, so that subsequent data analysis network elements may obtain the target background traffic transmission policy of the first terminal device from the database network element, thereby achieving the foregoing beneficial effects.
  • the requesting device is a first terminal device or a service network element serving the first terminal device. In this way, both the request for the uplink background traffic transmission strategy and the request for the downlink background traffic transmission strategy can be realized, and the request for the background traffic transmission strategy can be more flexible.
  • the analysis result of the background traffic transmission data includes: the first data value of the transmission time window of the background traffic; the analysis result of the background traffic transmission data analysis further includes: the first data value of the background traffic transmission bandwidth, the first terminal At least one of location information of the device and an identifier of the first terminal device.
  • the first policy control network element can determine the background traffic transmission policy of the first terminal device by using the content included in the analysis result of the background traffic transmission data.
  • the location information of the first terminal device may be one or more of the following information: a network area, a RAN device ID, a cell ID, and a global positioning system (GPS).
  • GPS global positioning system
  • the identifier of the first terminal device may be one or more of the following: an Internet Protocol address (IP), a permanent identifier (subscription identifier) (SUPI), and a permanent equipment identifier (permanent equipment identifier).
  • IP Internet Protocol address
  • SUPI subscription identifier
  • a permanent equipment identifier permanent equipment identifier
  • PEI general public subscription identifier
  • IMSI international mobile subscriber identifier
  • IMEI international mobile equipment identity
  • MSISDN mobile station international integrated service digital network number
  • the background traffic transmission strategy includes: the second data value of the transmission time window of the background traffic; the background traffic transmission strategy further includes: the second data value of the transmission bandwidth of the background traffic, and the location information of the first terminal device And at least one of the identities of the first terminal device.
  • the first terminal device can subsequently be used to perform background traffic transmission through the background traffic transmission policy.
  • the second information includes the magnitude of the background traffic of the first terminal device; the second information also includes the identity of the first policy control network element, the identity of the requesting device, and the background traffic of the first terminal device At least one of the third data value of the transmission time window, the location information of the first terminal device, and the identifier of the first terminal device.
  • the data analysis network element can accurately determine the analysis result of the background traffic transmission data of the first terminal device in combination with the content included in the second information.
  • the first information includes the magnitude of the background traffic of the first terminal device; the first information further includes an identifier of the requesting device, and a third data value of the transmission time window of the background traffic of the first terminal device. At least one of location information of the first terminal device and an identifier of the first terminal device.
  • the first policy control network element can learn the requirements of the first terminal device by using the content included in the first information, so that subsequent background traffic transmission policies that satisfy the requirements are requested for the first terminal device.
  • the query result of the background traffic transmission includes: the fourth data value of the transmission time window of the background traffic; the query result of the background traffic transmission further includes: the fourth data value of the transmission bandwidth of the background traffic, the At least one of location information and an identifier of the first terminal device.
  • the transmission strategy of the local background traffic includes: a fifth data value of a transmission time window of the background traffic; the transmission result of the local background traffic further includes: a fifth data value of a transmission bandwidth of the background traffic, a At least one of location information and an identifier of the first terminal device.
  • the first policy control network element when the first policy control network element sends the background traffic transmission policy of the first terminal device to the requesting device, the first policy control network element may also send identification information to the requesting device, and the identification information is used to identify the first A target background traffic transmission policy for a terminal device.
  • the target background traffic of the first terminal device can be determined from the background traffic of the first terminal device by using the identification information.
  • the first policy control network element when the first policy control network element sends the target background traffic transmission policy of the first terminal device to the data analysis network element, the first policy control network element may also send identification information and a request to the data analysis network element. At least one of the identifier of the device and the identifier of the first policy control network element; or when the first policy control network element sends the target background traffic transmission policy of the first terminal device to the data analysis network element, the first policy control network element It may also send at least one of the identification information, the identification of the requesting device, and the identification of the first policy control network element to the database network element; or the first policy control network element sends the first terminal to the data analysis network element and the database network element. When the target background traffic of the device transmits a policy, the first policy control network element may also send at least one of identification information, a requesting device identification, and an identification of the first policy control network element to the data analysis network element and the database network element.
  • the data analysis network element can determine that the target background traffic transmission policy of the first terminal device is formulated for the requesting device or the first policy control network element, so that subsequent data analysis network elements are the requesting device, other requesting devices, and the first policy.
  • a control network element or other policy controlling terminal device on the network element that is different from the first terminal device formulates a target background traffic transmission policy.
  • the database network element stores the target background traffic transmission strategy and identification information of the first terminal device, so that when the requesting device wants to transmit background traffic, the identification information can be queried from the database network element to obtain the first terminal device corresponding to the identification information.
  • Target background traffic transmission strategy is the target background traffic transmission strategy.
  • the first policy network element may further receive identification information from the requesting device.
  • the first policy control network element can query the target background traffic transmission policy of the first terminal device from the database network element through the identification information, and then send the target background traffic transmission policy of the first terminal device to the first terminal device, and the wireless access device At least one of a network access element, a user plane function network element, and a service network element.
  • the present application provides a method for determining a background traffic transmission strategy.
  • the method includes:
  • the data analysis network element receives the second information from the first policy control network element.
  • the second information is used to request the background traffic of the first terminal device to transmit the data analysis result.
  • the second information is received by the first policy control network element from the first device.
  • An information is determined, the first information is used to request a background traffic transmission policy of the first terminal device; the data analysis network element sends the background traffic transmission data analysis result of the first terminal device to the first policy control network element, and the background of the first terminal device
  • the traffic transmission data analysis result is determined by the data analysis network element based on the target background traffic transmission policy of the second terminal device.
  • the second terminal device is different from the first terminal device.
  • the target background traffic transmission policy of the second terminal device is used for the second terminal.
  • the device transmits background traffic.
  • the data analysis network element determines the background traffic transmission data analysis result of the first terminal device based on the target background traffic transmission policy of the other terminal device (that is, the second terminal device), so that the first policy control network element can determine the The background traffic transmission policy of the first terminal device, so that the background traffic transmission policy of the first terminal device determined by the first policy control network element refers to other terminal devices, so that the first policy device can control the first terminal device determined by the network element.
  • the background traffic transmission strategy of the device does not conflict with the background traffic transmission strategy of other terminal devices, thereby solving the problem of background traffic transmission failure.
  • the background traffic transmission data analysis result of the first terminal device may be further analyzed by the data analysis network element based on the target background traffic transmission policy and the second information of the second terminal device, and the load information and functions of the functional network element. It is determined by at least one of two items of capacity information of the network element.
  • the analysis result of the background traffic transmission data of the first terminal device analyzed by the data analysis network element can be more reliable.
  • the data analysis network element cannot obtain the target background traffic transmission policy of any terminal device.
  • the first The analysis result of the background traffic transmission data of a terminal device may be determined by the data analysis network element based on at least one of the second information, the load information of the functional network element, and the capacity information of the functional network element.
  • the initial background traffic transmission data analysis result of the first terminal device can be accurately analyzed by the data analysis network element, so that the background traffic transmission policy of the first terminal device can be obtained subsequently.
  • the data analysis network element may also obtain a target background traffic transmission policy of the second terminal device.
  • the data analysis network element can accurately determine the background traffic transmission data analysis result of the first terminal device based on the target background traffic transmission policy of the second terminal device.
  • the data analysis network element acquiring the target background traffic transmission policy of the second terminal device may specifically include: the data analysis network element receiving the target background traffic transmission policy of the second terminal device from the first device, where the first The device is any one or more of the following: a second terminal device, a first policy control network element, a second policy control network element, a second service network element, and a second database network element, wherein the first policy control network element, The second policy control network element, the second service network element, and the second database network element serve the second terminal device.
  • the data analysis network element can successfully obtain the target background traffic transmission policy of the second terminal device in multiple ways, so that the subsequent data analysis network element determines the analysis result of the background traffic transmission data of the first terminal device.
  • the data analysis network element may also obtain the load information of the function network element; or, the data analysis network element may also obtain the capacity information of the function network element; or the data analysis network element may also obtain the load of the function network element Information and capacity information of functional network elements.
  • the data analysis network element can determine the accuracy of the first terminal device more accurately based on the load information of the function network element, or the capacity information of the function network element, or the load information of the function network element and the capacity information of the function network element. Analysis results of background traffic transmission data.
  • the data analysis network element obtaining the load information of the functional network element may specifically include: the data analysis network element receiving the load information of the function network element from the function network element or the operation management and maintenance network element; or the data analysis network element obtaining
  • the capacity information of the functional network element may specifically include: the data analysis network element receives the capacity information of the function network element from the function network element or the operation management and maintenance network element; or the data analysis network element obtains the load information of the function network element and the capacity of the function network element
  • the information may specifically include: the data analysis network element receives the load information of the function network element and the capacity information of the function network element from the function network element or the operation management and maintenance network element.
  • the data analysis network element can successfully obtain the load information of the function network element, or the capacity information of the function network element, or the load information of the function network element and the capacity information of the function network element, in order to enable subsequent data.
  • the analysis network element accurately determines the background traffic transmission data analysis result of the first terminal device.
  • the functional network element includes a first policy control network element serving the first terminal device, a session management function network element, a radio access network network element, an access and mobility management function network element, and a user plane. At least one of the functional network elements.
  • the data analysis network element may further receive a target background traffic transmission policy of the first terminal device, where the first terminal device performs background traffic transmission according to the target background traffic transmission policy of the first terminal device.
  • the data analysis network element can save the target background traffic transmission policy of the first terminal device, and then after other terminal devices request the corresponding background traffic transmission data analysis result from the data analysis network element, the data analysis network element can refer to the first
  • the target background traffic transmission policy of a terminal device determines the analysis results of the background traffic transmission data of other terminal devices for other terminal devices, so that subsequent background traffic transmission policies of other terminal devices and the target background traffic transmission policy of the first terminal device can be Reducing conflicts can in turn cause background traffic of other terminal devices to be transmitted successfully.
  • the data analysis network element receiving the target background traffic transmission policy of the first terminal device may specifically include: the data analysis network element receiving the target background traffic transmission policy of the first terminal device from the second device, wherein the first The two devices are any one or more of the following: a first terminal device, a first policy control network element, a first service network element, and a first database network element, wherein the first policy control network element, the first service network element, The first database network element serves a first terminal device.
  • the data analysis network element can obtain the target background traffic transmission policy of the first terminal device in multiple ways, so that the data analysis network element can save the target background traffic transmission policy of the first terminal device, and then other terminals later
  • the data analysis network element may refer to the target background traffic transmission policy of the first terminal device to determine the other terminal device ’s background traffic transmission data analysis result for other terminal devices. Conflicts between subsequent background traffic transmission policies of other terminal devices and the target background traffic transmission policy of the first terminal device can be reduced, and the background traffic transmission of other terminal devices can be successful.
  • the data analysis network element when the data analysis network element receives the target background traffic transmission policy of the first terminal device, the data analysis network element may also receive the identity of the requesting device, or may also receive the identity of the first policy control network element, Alternatively, the identifier of the requesting device and the identifier of the first policy control network element may also be received.
  • the data analysis network element can determine that the target background traffic transmission policy of the first terminal device is formulated for the requesting device or the first policy control network element, which is convenient for the data analysis network element to be the requesting device, other requesting devices, and the first policy control network.
  • An element or other policy controls a terminal device on the network element that is different from the first terminal device to formulate a target background traffic transmission policy.
  • the analysis result of the background traffic transmission data includes: the first data value of the transmission time window of the background traffic; the analysis result of the background traffic transmission data analysis further includes: the first data value of the background traffic transmission bandwidth, and the first terminal. At least one of location information of the device and an identifier of the first terminal device.
  • the first policy control network element can determine the background traffic transmission policy of the first terminal device by using the content included in the analysis result of the background traffic transmission data.
  • the background traffic transmission strategy includes: the second data value of the transmission time window of the background traffic; the background traffic transmission strategy further includes: the second data value of the transmission bandwidth of the background traffic, and the location information of the first terminal device And at least one of the identities of the first terminal device.
  • the first terminal device can subsequently be used to perform background traffic transmission through the background traffic transmission policy.
  • the second information includes the size of the background traffic of the first terminal device; the second information also includes the identification of the first policy control network element, the identification of the requesting device, and the background traffic of the first terminal device. At least one of a third data value of the transmission time window, location information of the first terminal device, and an identifier of the first terminal device.
  • the data analysis network element can accurately determine the background traffic transmission data analysis result of the first terminal device in combination with the content included in the second information.
  • the first information includes the magnitude of the background traffic of the first terminal device; the first information further includes a request device identifier, a third data value of a transmission time window of the background traffic of the first terminal device, At least one of location information of the first terminal device and an identifier of the first terminal device.
  • the first policy control network element can learn the requirements of the first terminal device through the content included in the first information, so that the data analysis network element can subsequently request the data analysis result of the background traffic of the first terminal device from the data analysis network element.
  • the present application provides a method for determining a background traffic transmission strategy.
  • the method includes:
  • the first terminal device sends first information to the first policy control network element, and the first information is used to request a background traffic transmission policy of the first terminal device; the first terminal device receives the background of the first terminal device from the first policy control network element A traffic transmission policy, where the background traffic transmission policy of the first terminal device is determined by the first policy control network element according to the third information, and the third information includes a background traffic transmission data analysis result of the first terminal device from the data analysis network element.
  • the background traffic transmission policy of the first terminal device is determined by the first policy control network element according to the third information, and the third information includes the analysis result of the background traffic transmission data of the first terminal device from the data analysis network element.
  • the background traffic transmission policy of the first terminal device determined by the first policy control network element refers to other terminal devices, so that the background traffic transmission policy of the first terminal device and the background traffic transmission policy between other terminal devices do not conflict. This can solve the problem of background traffic transmission failure.
  • a request for an uplink background traffic transmission policy of the first terminal device can also be implemented.
  • the third information further includes: a background traffic transmission query result of the first terminal device and / or a local background traffic transmission policy of the first terminal device.
  • the first policy control network element can subsequently accurately determine the background traffic transmission policy of the first terminal device according to the third information.
  • the method further includes: the first terminal device determines that the background traffic transmission policy of the first terminal device is a target background traffic transmission policy of the first terminal device The first terminal device sends a target background traffic transmission policy of the first terminal device to the data analysis network element.
  • the data analysis network element can save the target background traffic transmission policy of the first terminal device, and then after other terminal devices request the data analysis network element for the corresponding background traffic transmission data analysis result, the data analysis network element can refer to The target background traffic transmission policy of the first terminal device determines the analysis results of background traffic transmission data of other terminal devices for other terminal devices, so that subsequent background traffic transmission policies of other terminal devices and the target background traffic transmission policy of the first terminal device are in between. This can reduce conflicts, which in turn can successfully transmit background traffic from other terminal devices.
  • the method when there are multiple background traffic transmission policies of the first terminal device, the method further includes: the first terminal device selects the target background traffic transmission of the first terminal device according to the background traffic transmission policies of the first terminal device Policy; the first terminal sends a target background traffic transmission policy of the first terminal device to the first policy control network element.
  • the first policy control network element when it receives the target background traffic transmission policy of the first terminal device, it can send the target background traffic transmission policy of the first terminal device to the data analysis network element, so that the data analysis network element
  • the data analysis network element may refer to the target background traffic transmission policy of the first terminal device. Determining the background traffic transmission data analysis results of other terminal equipment for other terminal equipment, so that the subsequent background traffic transmission strategy of other terminal equipment and the target background traffic transmission strategy of the first terminal equipment can reduce conflicts, and can be other terminal equipment Background traffic was transmitted successfully.
  • the first terminal device may further send a target background traffic transmission policy of the first terminal device to the data analysis network element.
  • the data analysis network element can save the target background traffic transmission policy of the first terminal device, and then after other terminal devices request the data analysis network element for the corresponding background traffic transmission data analysis result, the data analysis network element can refer to The target background traffic transmission policy of the first terminal device determines the analysis results of background traffic transmission data of other terminal devices for other terminal devices, so that subsequent background traffic transmission policies of other terminal devices and the target background traffic transmission policy of the first terminal device are in between. This can reduce conflicts, which in turn can successfully transmit background traffic from other terminal devices.
  • the analysis result of the background traffic transmission data includes: the first data value of the transmission time window of the background traffic; the analysis result of the background traffic transmission data analysis further includes: the first data value of the background traffic transmission bandwidth, and the first terminal. At least one of location information of the device and an identifier of the first terminal device.
  • the first policy control network element can determine the background traffic transmission policy of the first terminal device by using the content included in the analysis result of the background traffic transmission data.
  • the background traffic transmission strategy includes: the second data value of the transmission time window of the background traffic; the background traffic transmission strategy further includes: the second data value of the transmission bandwidth of the background traffic, and the location information of the first terminal device And at least one of the identities of the first terminal device.
  • the first terminal device can subsequently be used to perform background traffic transmission through the background traffic transmission policy.
  • the first information includes the magnitude of the background traffic of the first terminal device; the first information further includes the third data value of the transmission time window of the background traffic of the first terminal device, the location information, At least one of the logos.
  • the first policy control network element can learn the requirements of the first terminal device by using the content included in the first information, so that subsequent background traffic transmission policies that satisfy the requirements are requested for the first terminal device.
  • the query result of the background traffic transmission includes: the fourth data value of the transmission time window of the background traffic; the query result of the background traffic transmission further includes: the fourth data value of the transmission bandwidth of the background traffic, the At least one of location information and an identifier of the first terminal device.
  • the transmission strategy of the local background traffic includes: a fifth data value of a transmission time window of the background traffic; the transmission result of the local background traffic further includes: a fifth data value of a transmission bandwidth of the background traffic, a At least one of location information and an identifier of the first terminal device.
  • the first terminal device when the first terminal device receives the background traffic transmission policy of the first terminal device from the first policy control network element, the first terminal device may further receive identification information from the first policy control network element. The identification information is used for Identifies a target background traffic transmission policy of the first terminal device.
  • the first terminal device when the first terminal device wants to transmit background traffic and receives the background traffic transmission policy of the first terminal device, the first terminal device can determine the identity of the first terminal device in the background traffic transmission policy of the first terminal device by using the identification information. Target background traffic transmission strategy.
  • the first terminal device may further send identification information to the first policy control network element.
  • the first policy control network element can query the target background traffic transmission policy of the first terminal device from the database network element through the identification information, and subsequently send the target background traffic transmission policy of the first terminal device to the wireless access network.
  • the method before the first terminal device sends the first information to the first policy control network element, the method further includes: the first terminal device acquires the first terminal device from the first service network element: the size of the background traffic; The first terminal device further obtains, from the first service network element, at least one of the third data value, location information, and identifier of the transmission time window of the background traffic of the first terminal device.
  • the first terminal device can obtain a downlink background traffic transmission requirement from the first service network element, so that a subsequent first terminal device requests a downlink background traffic transmission policy.
  • the present application provides a method for determining a background traffic transmission policy.
  • the method includes:
  • the first service network element sends first information to the first policy control network element, and the first information is used to request a background traffic transmission policy of the first terminal device; the first service network element receives the first terminal device from the first policy control network element Background traffic transmission strategy, wherein the background traffic transmission strategy of the first terminal device is determined by the first policy control network element according to the third information, and the third information includes the background traffic transmission data analysis of the first terminal device from the data analysis network element result.
  • the background traffic transmission policy of the first terminal device is determined by the first policy control network element according to the third information, and the third information includes the analysis result of the background traffic transmission data of the first terminal device from the data analysis network element.
  • the background traffic transmission policy of the first terminal device determined by the first policy control network element refers to other terminal devices, so that the background traffic transmission policy of the first terminal device and the background traffic transmission policy between other terminal devices do not conflict. This can solve the problem of background traffic transmission failure.
  • the third information further includes: a background traffic transmission query result of the first terminal device and / or a local background traffic transmission policy of the first terminal device. This can make the background traffic transmission policy of the first terminal device determined by the first policy control network element more accurate.
  • the method further includes: the first service network element determines that the background traffic transmission policy of the first terminal device is a target background traffic transmission of the first terminal device. Policy; the first service network element sends a target background traffic transmission policy of the first terminal device to the data analysis network element.
  • the data analysis network element can save the target background traffic transmission policy of the first terminal device, and then after other terminal devices request the data analysis network element for the corresponding background traffic transmission data analysis result, the data analysis network element can refer to The target background traffic transmission policy of the first terminal device determines the analysis results of background traffic transmission data of other terminal devices for other terminal devices, so that subsequent background traffic transmission policies of other terminal devices and the target background traffic transmission policy of the first terminal device are in between. This can reduce conflicts, which in turn can successfully transmit background traffic from other terminal devices.
  • the method when there are multiple background traffic transmission policies of the first terminal device, the method further includes: the first service network element selects the target background traffic of the first terminal device according to the background traffic transmission policies of the first terminal device Transmission policy: The first service network element sends a target background traffic transmission policy of the first terminal device to the first policy control network element.
  • the first policy control network element when it receives the target background traffic transmission policy of the first terminal device, it can send the target background traffic transmission policy of the first terminal device to the data analysis network element, so that the data analysis network element
  • the data analysis network element may refer to the target background traffic transmission policy of the first terminal device. Determining the background traffic transmission data analysis results of other terminal equipment for other terminal equipment, so that the subsequent background traffic transmission strategy of other terminal equipment and the target background traffic transmission strategy of the first terminal equipment can reduce conflicts, and can be other terminal equipment Background traffic was transmitted successfully.
  • the first service network element may further send a target background traffic transmission policy of the first terminal device to the data analysis network element.
  • the data analysis network element can save the target background traffic transmission policy of the first terminal device, and then after other terminal devices request the data analysis network element for the corresponding background traffic transmission data analysis result, the data analysis network element can refer to The target background traffic transmission policy of the first terminal device determines the analysis results of background traffic transmission data of other terminal devices for other terminal devices, so that subsequent background traffic transmission policies of other terminal devices and the target background traffic transmission policy of the first terminal device are in between. This can reduce conflicts, which in turn can successfully transmit background traffic from other terminal devices.
  • the analysis result of the background traffic transmission data includes: the first data value of the transmission time window of the background traffic; the analysis result of the background traffic transmission data analysis further includes: the first data value of the background traffic transmission bandwidth, and the first terminal. At least one of location information of the device and an identifier of the first terminal device.
  • the first policy control network element can determine the background traffic transmission policy of the first terminal device by using the content included in the analysis result of the background traffic transmission data.
  • the background traffic transmission strategy includes: the second data value of the transmission time window of the background traffic; the background traffic transmission strategy further includes: the second data value of the transmission bandwidth of the background traffic, and the location information of the first terminal device And at least one of the identities of the first terminal device.
  • the first terminal device can subsequently be used to perform background traffic transmission through the background traffic transmission policy.
  • the first information includes the magnitude of the background traffic of the first terminal device; the first information also includes the identifier of the first service network element, and the first time of the transmission time window of the background traffic of the first terminal device. At least one of three data values, location information of the first terminal device, and an identifier of the first terminal device.
  • the first policy control network element can learn the requirements of the first terminal device by using the content included in the first information, so that subsequent background traffic transmission policies that satisfy the requirements are requested for the first terminal device.
  • the query result of the background traffic transmission includes: the fourth data value of the transmission time window of the background traffic; the query result of the background traffic transmission further includes: the fourth data value of the transmission bandwidth of the background traffic, the At least one of location information and an identifier of the first terminal device.
  • the transmission strategy of the local background traffic includes: a fifth data value of a transmission time window of the background traffic; the transmission result of the local background traffic further includes: a fifth data value of a transmission bandwidth of the background traffic, a At least one of location information and an identifier of the first terminal device.
  • the first service network element when the first service network element receives the background traffic transmission policy of the first terminal device from the first policy control network element, the first service network element may further receive identification information from the first policy control network element, and the identification The information is used to identify a target background traffic transmission policy of the first terminal device.
  • the target background traffic of the first terminal device can be determined from the background traffic of the first terminal device by using the identification information.
  • the first service network element may further send identification information to the first policy control network element.
  • the first policy control network element can query the target background traffic transmission policy of the first terminal device from the database network element through the identification information, and then send the target background traffic transmission policy of the first terminal device to the first terminal device, and the wireless access device At least one of an incoming network element and a user plane function network element.
  • the method before the first service network element sends the first information to the first policy control network element, the method further includes: the first service network element obtains the first terminal device from the first terminal device: the size of the background traffic ; The first service network element further obtains the identifier of the first service network element, the third data value of the transmission time window of the background traffic of the first terminal device, the location information of the first terminal device, and the first terminal device from the first terminal device; At least one of the logos.
  • the first service network element may obtain the uplink background traffic transmission requirement from the first terminal device, so that the subsequent first service network element requests the uplink background traffic transmission policy for the first terminal device.
  • the present application further provides a communication device for determining a background traffic transmission policy.
  • the communication device has a function of implementing the first policy control network element in the foregoing method example.
  • the functions may be implemented by hardware, and may also be implemented by hardware executing corresponding software.
  • the hardware or software includes one or more modules corresponding to the functions described above.
  • the structure of the communication device includes a receiving module and a transmitting module.
  • the communication device may further include a processing module. These modules may perform the corresponding functions in the foregoing method examples. For details, see the detailed description in the method examples. , I won't go into details here.
  • the structure of the communication device includes a transceiver and a processor.
  • the communication device may also include a memory.
  • the transceiver is used to send and receive data, and communicates and interacts with other devices in the communication system.
  • the processor is configured to support the first policy control network element to perform a corresponding function in the above method.
  • the memory is coupled to the processor and stores program instructions and data necessary for the communication device.
  • the present application further provides a communication device for determining a background traffic transmission policy, and the communication device has a function of implementing a data analysis network element in the foregoing method example.
  • the functions may be implemented by hardware, and may also be implemented by hardware executing corresponding software.
  • the hardware or software includes one or more modules corresponding to the functions described above.
  • the structure of the communication device includes a receiving module and a sending module, and these modules can perform corresponding functions in the foregoing method examples.
  • a receiving module and a sending module can perform corresponding functions in the foregoing method examples.
  • the structure of the communication device includes a transceiver and a processor.
  • the communication device may also include a memory.
  • the transceiver is used to send and receive data, and communicates and interacts with other devices in the communication system.
  • the processor is configured to support the data analysis network element to perform a corresponding function in the above method.
  • the memory is coupled to the processor and stores program instructions and data necessary for the communication device.
  • the present application further provides a communication device for determining a background traffic transmission policy, and the communication device has a function of implementing the first terminal device in the foregoing method example.
  • the functions may be implemented by hardware, and may also be implemented by hardware executing corresponding software.
  • the hardware or software includes one or more modules corresponding to the functions described above.
  • the structure of the communication device includes a receiving module and a transmitting module.
  • the communication device may further include a processing module. These modules may perform the corresponding functions in the foregoing method examples. For details, see the detailed description in the method examples. , I won't go into details here.
  • the structure of the communication device includes a transceiver and a processor.
  • the communication device may also include a memory.
  • the transceiver is used to send and receive data, and communicates and interacts with other devices in the communication system.
  • the processor is configured to support the first terminal device to perform a corresponding function in the foregoing method.
  • the memory is coupled to the processor and stores program instructions and data necessary for the communication device.
  • the present application further provides a communication device for determining a background traffic transmission policy, and the communication device has a function of implementing the first service network element in the foregoing method example.
  • the functions may be implemented by hardware, and may also be implemented by hardware executing corresponding software.
  • the hardware or software includes one or more modules corresponding to the functions described above.
  • the structure of the communication device includes a receiving module and a transmitting module.
  • the communication device may further include a processing module. These modules may perform the corresponding functions in the foregoing method examples. For details, see the detailed description in the method examples. , I won't go into details here.
  • the structure of the communication device includes a transceiver and a processor.
  • the communication device may also include a memory.
  • the transceiver is used to send and receive data, and communicates and interacts with other devices in the communication system.
  • the processor is configured to support the first service network element to perform a corresponding function in the foregoing method.
  • the memory is coupled to the processor and stores program instructions and data necessary for the communication device.
  • the present application further provides a communication system, which may include a first policy control network element, a data analysis network element, and a requesting device (such as a first terminal device and / Service network element) and so on.
  • a communication system which may include a first policy control network element, a data analysis network element, and a requesting device (such as a first terminal device and / Service network element) and so on.
  • the present application further provides a computer storage medium, where the computer storage medium stores computer-executable instructions, and the computer-executable instructions are used to cause the computer to perform the foregoing tasks when called by the computer. a way.
  • the present application also provides a computer program product containing instructions, which when executed on a computer, causes the computer to execute any one of the above methods.
  • the present application further provides a chip, which is connected to a memory and is used to read and execute program instructions stored in the memory to implement any one of the foregoing methods.
  • the present application provides a method for determining a background traffic transmission policy.
  • the method includes:
  • the first policy control network element acquires at least one first information, and determines a background traffic transmission policy of at least one second terminal device according to the second information; wherein the first information includes at least one first terminal device Identification, first time, first location, and first network element status; second information includes at least one first information; at least one first terminal device is part or all of at least one second terminal device; at least one first The terminal device resides in the first position at the first time and has a first network element state.
  • the first policy control network element may consider the movement trajectory (including the first time and the first position) and the first position of each second terminal device when formulating the background traffic transmission policy of at least one second terminal device. State of the first network element on the network, so that the background traffic transmission policy of at least one second terminal device formulated by the first policy control network element is more accurate.
  • the first policy control network element before the first policy control network element obtains the at least one first information, the first policy control network element receives the fifth information from the requesting device, and the fifth information is used to request the background of the at least one second terminal device. Traffic transmission policy.
  • the requesting device provides services for the at least one second terminal device
  • the fifth information may include an identifier of the requesting device and one or more of the following: the number of the second terminal device, and the number of each The size of the background traffic and the time window.
  • the fifth information may further include a network area (Tracking Area List (TA List) or Routing Area List (RA List)) where the at least one second terminal device is located.
  • TA List Track Area List
  • RA List Routing Area List
  • the first policy control network element can be triggered to initiate a process of acquiring at least one first information, thereby obtaining information required for determining a background traffic transmission policy of the second terminal device.
  • the method further includes: the first policy control network element receives the identity of the at least one second terminal device from the requesting device, and the requesting device provides services for the at least one second terminal device; or the first policy control network element The identifier of the requesting device is received from the requesting device, and the identifier of the at least one second terminal device is obtained from the first policy control network element or the database network element according to the identifier of the requesting device.
  • the first policy control network element can be caused to request at least one first information according to an identifier of at least one second terminal device.
  • the first policy control network element obtains at least one first information
  • the specific method may be: the first policy control network element obtains at least one first information from the data analysis network element; or the first policy control network element Acquire at least one first information saved locally. In this way, the first policy control network element can accurately obtain at least one first information.
  • the first policy control network element obtains at least one first information from the data analysis network element.
  • the specific method may be: the first policy control network element sends the sixth information to the data analysis network element, and the sixth information is used for For requesting at least one first information, the sixth information includes an identifier of at least one second terminal device; the first policy control network element receives at least one first information from the data analysis network element.
  • the first policy control network element can accurately obtain at least one first information from the data analysis network element, and then determine the background traffic transmission policy of the second terminal device.
  • the first policy control network element may store at least one seventh information corresponding to at least one third terminal device, and the seventh information includes an identifier of the at least one fourth terminal device, the first time, First position and first network element status.
  • the at least one fourth terminal device is part or all of the at least one third terminal device, and the at least one third terminal device includes at least one second terminal device.
  • the first policy control network element determines at least one first information among the stored at least one seventh information.
  • the first policy control network element determines at least one first information from the stored at least one seventh information.
  • the specific method may be: the first policy control network element selects the second terminal device from the at least one seventh information.
  • the information corresponding to the same fourth terminal device is identified, so as to filter out at least one first information.
  • the first policy control network element can accurately obtain at least one first information from the data analysis network element, and then determine a background traffic transmission policy of at least one second terminal device.
  • the source of the at least one seventh information stored locally by the first policy control network element may also be obtained by the first policy control network element from the data analysis network element.
  • the state of the first network element includes one or more of the following: a first load, a first capacity, and a first available bandwidth; wherein the first load is a value of the first network element corresponding to the first position Load, the first network element serves the first terminal device; the first capacity is the capacity of the first network element corresponding to the first location; the first available bandwidth is the bandwidth of the first network element corresponding to the first location.
  • the first terminal device resides in the first position at the first time.
  • the first network element may be a user plane network element (for example, RAN or UPF, etc.) or a control plane network element (for example, AMF or SMF, etc.) serving the first terminal device.
  • a user plane network element for example, RAN or UPF, etc.
  • a control plane network element for example, AMF or SMF, etc.
  • an AMF network element or an SMF network element may also be used as a user plane network element for transmitting background traffic.
  • the first policy control network element after the first policy control network element determines the background traffic transmission policy of the at least one second terminal device according to the second information, the first policy control network element sends the background traffic of the at least one second terminal device to the requesting device. Transmission strategy. In this way, the requesting device can send the background traffic transmission policy of the second terminal device to the corresponding second terminal device.
  • the first policy control network element determines that the background traffic transmission policy of the second terminal device is a target background traffic transmission policy of the second terminal device;
  • a policy control network element sends a target background traffic transmission policy of the second terminal device to the data analysis network element.
  • the data analysis network element can save the target background traffic transmission policy of the second terminal device. In this way, the next time the requesting device requests the background traffic policy of other new terminal devices, the data analysis network element is serving these new terminals.
  • the device determines the movement trajectory (including time and location) and the network element status of the corresponding network element on the movement trajectory, the target background traffic transmission policy of the second terminal device that has been saved can be referred to, so that the network element status result is more accurate.
  • the first policy controls the network element to receive the target background traffic transmission policy of the second terminal device from the requesting device, and the target background of the second terminal device.
  • the traffic transmission policy is selected by the requesting device according to the background traffic transmission policy of the second terminal device; the first policy controls the network element to send the target background traffic transmission policy of the second terminal device to the data analysis network element.
  • the data analysis network element can save the target background traffic transmission policy of the second terminal device. In this way, the next time the requesting device requests the background traffic policy of other new terminal devices, the data analysis network element is serving these new terminals.
  • the device determines the movement trajectory (including time and location) and the network element status of the corresponding network element on the movement trajectory, the target background traffic transmission policy of the second terminal device that has been saved can be referred to, so that the network element status result is more accurate.
  • the background traffic transmission strategy of the second terminal device includes: a first data value of a transmission time window of the background traffic; the background traffic transmission strategy of the second terminal device further includes one or more of the following: background traffic The first data value of the transmission bandwidth, the location information of the second terminal device, and the identifier of the second terminal device.
  • the present application provides a method for determining a background traffic transmission policy.
  • the method includes:
  • the data analysis network element determines at least one first information, and then sends the at least one first information to the first policy control network element;
  • the first information includes an identifier of the at least one first terminal device, a first time, a first location, and a first Network element status;
  • at least one first terminal device is part or all of at least one second terminal device;
  • at least one first terminal device resides in a first position at a first time and has a first network element status;
  • the first policy control network element may consider the movement trajectory (including the first time and the first position) and the first time of each second terminal device when formulating the background traffic transmission policy of at least one second terminal device.
  • the status of the first network element at a location which will make the background traffic transmission policy of at least one second terminal device formulated by the first policy control network element more accurate.
  • the data analysis network element determines at least one first information.
  • the specific method may be: the data analysis network element obtains at least one third information of at least one second terminal device on the third network element, and the data analysis network The element determines at least one first information according to at least one third information of the at least one second terminal device; the third information includes an identifier of the second terminal device, a second time, a second location, and a state of the second network element; the second terminal device It resides in the second position at the second time and has the state of the second network element.
  • the data analysis can accurately obtain at least one first information, and then send it to the first policy control network element, so that the first policy control network element refers to the at least one first information to formulate the background traffic transmission of the second terminal device.
  • the third network element may be one or more of an access device, a functional network element in 5G, and an OAM.
  • the data analysis network element may obtain at least one of the third network element from the OAM network element At least one third information of the second terminal device.
  • the state of the second network element includes one or more of the following: a second load, a second capacity, and a second available bandwidth; wherein the second load is a value of the corresponding second network element at the second position.
  • the second network element serves the second terminal device;
  • the second capacity is the capacity of the corresponding second network element at the second location;
  • the second bandwidth is the bandwidth of the corresponding second network element at the second location.
  • the second terminal device resides in the second position at the second time.
  • the state of the first network element includes one or more of the following: a first load, a first capacity, and a first available bandwidth; wherein the first load is a value of the first network element corresponding to the first position Load; the first network element serves the first terminal device; the first capacity is the capacity of the first network element corresponding to the first location; the first available bandwidth is the bandwidth of the first network element corresponding to the first location.
  • the first terminal device resides in the first position at the first time.
  • the first network element may be a user plane network element (for example, RAN or UPF, etc.) or a control plane network element (for example, AMF or SMF, etc.) serving the first terminal device.
  • a user plane network element for example, RAN or UPF, etc.
  • a control plane network element for example, AMF or SMF, etc.
  • an AMF network element or an SMF network element may also be used as a user plane network element for transmitting background traffic.
  • the first network element may be any one of the third network elements.
  • the present application further provides a communication device for determining a background traffic transmission policy.
  • the communication device has a function of implementing the first policy control network element in the method example of the thirteenth aspect.
  • the functions may be implemented by hardware, and may also be implemented by hardware executing corresponding software.
  • the hardware or software includes one or more modules corresponding to the functions described above.
  • the structure of the communication device includes an acquisition module and a processing module.
  • the communication device may further include a sending module.
  • These modules may perform the corresponding functions in the method example of the thirteenth aspect. For details, see the method example The detailed description is not described here.
  • the structure of the communication device includes a transceiver and a processor.
  • the communication device may also include a memory.
  • the transceiver is used to send and receive data, and communicates and interacts with other devices in the communication system.
  • the processor is configured to support the first policy control network element to perform a corresponding function in the method of the thirteenth aspect.
  • the memory is coupled to the processor and stores program instructions and data necessary for the communication device.
  • the present application further provides a communication device for determining a background traffic transmission policy, and the communication device has a function of implementing a data analysis network element in the method example of the fourteenth aspect.
  • the functions may be implemented by hardware, and may also be implemented by hardware executing corresponding software.
  • the hardware or software includes one or more modules corresponding to the functions described above.
  • the structure of the communication device includes a processing module and a sending module, and these modules can perform the corresponding functions in the method example of the fourteenth aspect described above.
  • these modules can perform the corresponding functions in the method example of the fourteenth aspect described above.
  • the structure of the communication device includes a processing module and a sending module, and these modules can perform the corresponding functions in the method example of the fourteenth aspect described above.
  • these modules can perform the corresponding functions in the method example of the fourteenth aspect described above.
  • the structure of the communication device includes a processing module and a sending module, and these modules can perform the corresponding functions in the method example of the fourteenth aspect described above.
  • the detailed description in the method example To repeat.
  • the structure of the communication device includes a transceiver and a processor.
  • the communication device may also include a memory.
  • the transceiver is used to send and receive data, and communicates and interacts with other devices in the communication system.
  • the processor is configured to support the data analysis network element to perform a corresponding function in the method of the fourteenth aspect.
  • the memory is coupled to the processor and stores program instructions and data necessary for the communication device.
  • the present application further provides a computer storage medium, where the computer storage medium stores computer-executable instructions, and the computer-executable instructions are used to cause the computer to execute the foregoing when called by the computer Either the thirteenth aspect or the fourteenth aspect.
  • the present application also provides a computer program product containing instructions that, when run on a computer, causes the computer to execute any one of the thirteenth aspect and the fourteenth aspect.
  • the present application also provides a chip, which is connected to a memory and is used to read and execute program instructions stored in the memory to implement any one of the thirteenth and fourteenth aspects method.
  • the present application also provides a method for determining network performance information, including:
  • the first network element sends first information to the data analysis network element, where the first information is used to request network performance information, and the first information includes one or more of the following: area information of the first area, an identifier of the requesting device, or Terminal device group identification; then, the first network element receives network performance information from the data analysis network element, and the network performance information includes area information and second information of the second region, and the second information includes one or more of the following: Load information of the network in the second region, service experience information of services in the second region, or the number of terminal devices in the second region; where the second region is a sub-region of the first region; and finally, the first network element is based on the network performance information Determine the first strategy.
  • the first network element After the first network element obtains network performance information from the data analysis network element, it can formulate a policy based on the area information of the divided sub-region, thereby making the formulated policy more accurate.
  • the first strategy includes a background traffic transmission strategy, wherein the background traffic transmission strategy is a background traffic transmission strategy of at least one terminal device.
  • the background traffic transmission strategy is a background traffic transmission strategy of at least one terminal device.
  • the first network element receives third information from the requesting device, and the third information is used to request a background traffic transmission policy.
  • the third information includes one or more of the following: area information of the first area, and a terminal.
  • the device group identifier or the identifier of the requesting device; the first network element sends a background traffic transmission policy to the requesting device.
  • the requesting device can obtain an accurate background traffic transmission policy from the first network element.
  • the background traffic transmission policy includes area information of the second area. In this way, the background traffic transmission strategy is more accurate.
  • the first network element sends area information of the second area to the requesting device. This can make the background traffic transmission policy requested by the requesting device more accurate.
  • the background traffic transmission policy also includes one or more of the following information: recommended time window, rate, and maximum aggregated bit rate.
  • the first network element is a policy control function network element.
  • this application provides a method for determining network performance information, including:
  • the data analysis network element receives the first information from the first network element, and the first information is used to request network performance information; the first information includes one or more of the following: area information of the first area, an identifier of the requesting device, or a terminal device Group identification; then, the data analysis network element determines network performance information according to the first information, and the network performance information includes area information and second information of the second area, and the second information includes one or more of the following: Network load information, service experience information of services in the second area, or the number of terminal devices in the second area; where the second area is a sub-area of the first area; and finally, the data analysis network element sends the first network element Network performance information.
  • the first network element After the first network element obtains network performance information from the data analysis network element, it can formulate a policy according to the area information of the divided sub-region, thereby making the formulated policy more accurate.
  • the data analysis network element determines the network performance information according to the first information, including:
  • the data analysis network element obtains the area information of the second area based on the area information of the first area
  • the data analysis network element determines one or more of the following: load information of the network in the second region, service experience information of services in the second region, or the number of terminal devices in the second region.
  • the data analysis network element can accurately determine network performance information, so that the first network element can accurately formulate a policy.
  • the data analysis network element determines the network performance information according to the first information, including:
  • the data analysis network element determines area information of the second area according to the terminal device group identifier and / or the requesting device identifier;
  • the data analysis network element determines one or more of the following: load information of the network in the second region, service experience information of services in the second region, or the number of terminal devices in the second region.
  • the data analysis network element can accurately determine network performance information, so that the first network element can accurately formulate a policy.
  • the data analysis network element determines the area information of the second area according to the terminal device group identifier and / or the requesting device identifier, including:
  • the data analysis network element determines the area information of the first area according to the terminal device group identifier and / or the requesting device identifier;
  • the data analysis network element obtains the area information of the second area based on the area information of the first area.
  • the data analysis network element can accurately determine the area information of the second area, so that the data analysis network element can accurately determine the network performance information.
  • the data analysis network element obtains the area information of the second area based on the area information of the first area, including:
  • the data analysis network element obtains the area information of the second area that is stored locally based on the area information of the first area; or
  • the data analysis network element obtains the area information of the second area from the operation management and maintenance network element or the access and mobility management function network element based on the area information of the first area.
  • the data analysis network element can accurately determine the area information of the second area, so that the data analysis network element can accurately determine the network performance information.
  • the data analysis network element determines the load information of the network in the second area, including:
  • the data analysis network element obtains load information of the network in the second area from the network management network element or the operation management and maintenance network element.
  • the data analysis network element can accurately determine the load information of the network in the second area, and then the data analysis network element can accurately determine the network performance information.
  • the first network element is a policy control function network element.
  • this application provides a method for determining a background traffic transmission policy, including:
  • the requesting device sends third information to the first network element.
  • the third information is used to request a background traffic transmission policy.
  • the third information includes one or more of the following: area information of the first area, an identifier of the requesting device, or a terminal device group. Group identification; then request the device to receive the background traffic transmission policy from the first network element, the background traffic transmission policy includes the area information of the second area, and the second area is a sub-area of the first area.
  • the requesting device can accurately obtain the background traffic policy.
  • the background traffic transmission policy is a background traffic transmission policy of at least one terminal device.
  • the requesting device serves at least one terminal device.
  • the background traffic transmission strategy includes one or more of the following information: recommended time window, rate, maximum aggregate bit rate.
  • the first network element is a policy control function network element.
  • the present application further provides a communication device for determining network performance information, and the communication device has a function of implementing the first network element in the method example of the twentieth aspect.
  • the functions may be implemented by hardware, and may also be implemented by hardware executing corresponding software.
  • the hardware or software includes one or more modules corresponding to the functions described above.
  • the structure of the communication device includes a sending module, a receiving module, and a processing module. These modules can perform the corresponding functions in the method example of the twentieth aspect described above. For details, refer to the detailed description in the method example. I won't go into details here.
  • the structure of the communication device includes a transceiver and a processor.
  • the communication device may also include a memory.
  • the transceiver is used to send and receive data, and communicates and interacts with other devices in the communication system.
  • the processor is configured to support the first network element to perform a corresponding function in the method of the twentieth aspect.
  • the memory is coupled to the processor and stores program instructions and data necessary for the communication device.
  • the present application further provides a communication device for determining network performance information.
  • the communication device has a function of implementing a data analysis network element in the method example of the twenty-first aspect.
  • the functions may be implemented by hardware, and may also be implemented by hardware executing corresponding software.
  • the hardware or software includes one or more modules corresponding to the functions described above.
  • the structure of the communication device includes a sending module, a receiving module, and a processing module. These modules can perform the corresponding functions in the method example of the twenty-first aspect described above. For details, refer to the detailed description in the method example. I won't go into details here.
  • the structure of the communication device includes a transceiver and a processor.
  • the communication device may also include a memory.
  • the transceiver is used to send and receive data, and communicates and interacts with other devices in the communication system.
  • the processor is configured to support the data analysis network element to perform a corresponding function in the method of the twenty-first aspect.
  • the memory is coupled to the processor and stores program instructions and data necessary for the communication device.
  • the present application further provides a communication device for determining a background traffic transmission policy, and the communication device has a function of implementing the requesting device in the method example of the twenty-second aspect.
  • the functions may be implemented by hardware, and may also be implemented by hardware executing corresponding software.
  • the hardware or software includes one or more modules corresponding to the above functions.
  • the structure of the communication device includes a receiving module and a sending module, and these modules can perform corresponding functions in the method example of the twenty-second aspect described above.
  • these modules can perform corresponding functions in the method example of the twenty-second aspect described above.
  • the structure of the communication device includes a receiving module and a sending module, and these modules can perform corresponding functions in the method example of the twenty-second aspect described above.
  • these modules can perform corresponding functions in the method example of the twenty-second aspect described above.
  • the structure of the communication device includes a receiving module and a sending module, and these modules can perform corresponding functions in the method example of the twenty-second aspect described above.
  • the detailed description in the method example To repeat.
  • the structure of the communication device includes a transceiver and a processor.
  • the communication device may also include a memory.
  • the transceiver is used to send and receive data, and communicates and interacts with other devices in the communication system.
  • the processor is configured to support a requesting device to perform a corresponding function in the method of the twenty-second aspect.
  • the memory is coupled to the processor and stores program instructions and data necessary for the communication device.
  • the present application further provides a computer storage medium, where the computer storage medium stores computer-executable instructions, and the computer-executable instructions are used to cause the computer to execute when called by the computer
  • the present application also provides a computer program product containing instructions, which when executed on a computer, causes the computer to execute any one of the methods in the twentieth aspect to the twenty-second aspect.
  • the present application also provides a chip, which is connected to a memory and is used to read and execute program instructions stored in the memory to implement any of the foregoing twentieth to twenty-second aspects. a way.
  • FIG. 1 is a schematic architecture diagram of a communication system provided by this application.
  • FIG. 2 is a flowchart of a method for determining a background traffic transmission policy provided by the present application
  • FIG. 3 is a flowchart of another method for determining a background traffic transmission policy provided by this application.
  • FIG. 4 is a flowchart of another method for determining a background traffic transmission policy provided by the present application.
  • FIG. 5 is a flowchart of an example of a method for determining a background traffic transmission policy provided by this application
  • FIG. 6 is a flowchart of another example of a method for determining a background traffic transmission policy provided by the present application.
  • FIG. 7 is a schematic structural diagram of a communication device for determining a background traffic transmission policy provided by the present application.
  • FIG. 8 is a schematic structural diagram of another communication device for determining a background traffic transmission policy provided by the present application.
  • FIG. 9 is a structural diagram of a communication device for determining a background traffic transmission policy provided by the present application.
  • FIG. 10 is a flowchart of another method for determining a background traffic transmission policy provided by this application.
  • FIG. 11 is a flowchart of another method for determining a background traffic transmission policy provided by this application.
  • FIG. 12 is a flowchart of another example of a method for determining a background traffic transmission policy provided by the present application.
  • FIG. 13 is a schematic structural diagram of another communication device for determining a background traffic transmission policy provided by the present application.
  • FIG. 14 is a schematic structural diagram of another communication device for determining a background traffic transmission policy provided by the present application.
  • 15 is a flowchart of a method for determining network performance information provided by this application.
  • FIG. 16 is a flowchart of another example of a method for determining a background traffic transmission policy provided by the present application.
  • the embodiments of the present application provide a method and a device for determining a background traffic transmission strategy, which are used to resolve conflicts between background traffic transmission policies formulated by different policy control network elements for different service network elements in the prior art, and subsequently cause background Traffic transmission failed.
  • the methods and devices described in this application are based on the same inventive concept. Since the principles of the methods and devices for solving problems are similar, the implementation of the devices and methods can be referred to each other, and duplicated details will not be repeated.
  • Background traffic is usually defined as non-real-time interactive traffic, which can be specifically divided into uplink background traffic and downlink background traffic.
  • the downstream background traffic may be traffic transmitted by video caching, file downloading, software update packages, software notification messages, and so on;
  • the upstream background traffic may be traffic transmitted by vehicles that save driving map information and the like.
  • the data analysis network element is a network element device capable of performing big data analysis. It may be, but is not limited to, a network data analysis function network element.
  • the network data analysis function network element may be NWDAF (network data analysis function).
  • NWDAF network data analysis function
  • the data analysis network element can analyze target background traffic transmission policies of all terminal devices to determine a background traffic transmission data analysis result of a terminal device that needs a background traffic transmission policy, so that Background traffic transmission strategy.
  • the service network element may be an application network element, and the specific application network element may be, but is not limited to, an application function (AF) network element of an operator, a terminal device, and a third-party device, such as a non-operator AF network element (also referred to as a third-party AF network element), etc .; the AF network element of the operator may be, but is not limited to, an operator's business management server; the third-party AF network element may be Not limited to being a third-party business server.
  • AF application function
  • the AF network element of the operator may be, but is not limited to, an operator's business management server;
  • the third-party AF network element may be Not limited to being a third-party business server.
  • a possible communication system architecture applicable to the method for determining a background traffic transmission policy provided in the embodiment of the present application may include: a network open function network element, a policy control function network element, a database network element, a service network element, and an authentication server.
  • Function network element, access and mobility management function network element, session management function network element, data analysis network element, terminal device, access network device, user plane function network element, and data network may include: a network open function network element, a policy control function network element, a database network element, a service network element, and an authentication server.
  • FIG. 1 shows a possible example of the architecture of the communication system.
  • the architecture of the communication system includes: network open function (NEF) network element, policy control function (PCF) ) Network element, unified data warehouse (UDR) network element, third-party AF network element, AF network element, authentication server function (AUSF) network element, access and mobility management functions (access and mobility (AMF) network element, session management function (SMF) network element, network data analysis function (NWDAF) network element, UE, radio access network (radio access network) (RAN) equipment, user plane function (UPF) network elements, and data network (DN).
  • NEF network open function
  • PCF policy control function
  • UDR unified data warehouse
  • AF authentication server function
  • AMF access and mobility management functions
  • SMS session management function
  • NWDAF network data analysis function
  • UE radio access network
  • RAN radio access network
  • UPF user plane function
  • DN data network
  • the AMF network element and the UE can be connected through the N1 interface
  • the AMF and the AN device can be connected through the N2 interface
  • the AN device and the UPF can be connected through the N3 interface
  • the SMF and the UPF can be connected through the N4 interface.
  • the UPF and the DN can be connected through the N6 interface.
  • the interface name is only an example description, which is not specifically limited in the embodiment of the present application. It should be understood that the embodiments of the present application are not limited to the communication system shown in FIG. 1, and the names of the network elements shown in FIG. 1 are only used as an example here, and are not included in the communication system architecture applicable to the method of the present application. Limitation of network elements. The functions of each network element or device in the communication system are described in detail below:
  • the terminal device may also be referred to as user equipment (UE), mobile station (MS), mobile terminal (MT), etc., which is a method for providing voice and / or data connectivity to users.
  • sexual equipment For example, the terminal device may include a handheld device having a wireless connection function, a vehicle-mounted device, and the like.
  • the terminal device may be: a mobile phone, a tablet computer, a notebook computer, a palmtop computer, a mobile internet device (MID), a wearable device, a virtual reality (VR) device, and an enhanced device.
  • UE user equipment
  • MS mobile station
  • MT mobile terminal
  • the terminal device may include a handheld device having a wireless connection function, a vehicle-mounted device, and the like.
  • the terminal device may be: a mobile phone, a tablet computer, a notebook computer, a palmtop computer, a mobile internet device (MID), a wearable device, a virtual reality (VR) device, and an enhanced device.
  • MID mobile internet device
  • VR virtual reality
  • Augmented reality (AR) equipment wireless terminals in industrial control, wireless terminals in self-driving, wireless terminals in remote medical surgery, smart grid ), Wireless terminals in transportation safety, wireless terminals in smart cities, or wireless terminals in smart homes.
  • the terminal device described in FIG. 1 is shown by a UE, which is merely an example and does not limit the terminal device.
  • the wireless access network may be a wireless access network (RAN) shown in FIG. 1, and provides a wireless access service to the terminal device.
  • the access network device is a device that connects the terminal device to a wireless network in the communication system.
  • the access network device is a node in a wireless access network, and may also be called a base station, and may also be called a radio access network (RAN) node (or device).
  • RAN radio access network
  • access network equipment are: gNB, transmission receiving point (TRP), evolved Node B (eNB), radio network controller (RNC), node B (Node B, NB), base station controller (BSC), base transceiver station (BTS), home base station (e.g., home NodeB, or home NodeB, HNB), baseband unit (base band unit (BBU), or wireless fidelity (Wifi) access point (AP).
  • TRP transmission receiving point
  • eNB evolved Node B
  • RNC radio network controller
  • Node B Node B
  • BSC base station controller
  • BTS base transceiver station
  • home base station e.g., home NodeB, or home NodeB, HNB
  • BBU baseband unit
  • Wifi wireless fidelity
  • the data network for example, the data network (DN) shown in FIG. 1, may be the Internet, an IP Multi-media Service (IMS) network, or an area network (that is, a local network, such as mobile Edge computing (mobile edge computing (MEC) network) and so on.
  • IMS IP Multi-media Service
  • MEC mobile Edge computing
  • the data network includes an application server, and the application server provides business services to the terminal device through data transmission with the terminal device.
  • the core network is used to connect the terminal device to a DN that can implement services of the terminal device.
  • the functions of each network element in the core network are described below:
  • the access and mobility management function network element can be used to manage access control and mobility of the terminal device. In actual applications, it includes mobile in a network framework in long term evolution (LTE)
  • LTE long term evolution
  • the mobility management function in the management entity (MME) and the access management function is added which can specifically be responsible for the registration of the terminal device, mobility management, tracking area update process, reachability detection, session management Selection of functional network elements, management of mobile state transition, etc.
  • the access and mobility management function network element may be an AMF network element, as shown in FIG. 1; in future communications, such as 6G, the access and mobility management function network element may still be It is an AMF network element or has another name, which is not limited in this application.
  • the access and mobility management function network element is an AMF network element, the AMF may provide a Namf service.
  • the session management function network element may be used for session management (including establishment, modification, and release of the session) of the terminal device, selection and reselection of user plane function network elements, and Internet protocol of the terminal device. (IP) address allocation, quality of service (QoS) control, etc.
  • IP Internet protocol
  • QoS quality of service
  • the session management function network element may be an SMF network element, as shown in FIG. 1; in future communications, such as 6G, the session management function network element may still be an SMF network element, or have other The name is not limited in this application.
  • the SMF may provide an Nsmf service.
  • the data analysis network element may be used to perform big data analysis (for example, in the embodiment of the present application, the background traffic transmission data analysis result of the terminal device may be analyzed).
  • the data analysis network element may be an NWDAF network element, as shown in FIG. 1; in future communications, such as 6G, the data analysis network element may still be an NWDAF network element, or have another name This application is not limited.
  • the NWDAF network element may provide a Nnwdaf service.
  • the policy control function network element may be used to be responsible for policy control decisions (for example, in the embodiments of the present application, it may be responsible for the decision of the background traffic transmission policy), provide service data flow and application detection, gating, QoS, and flow-based Functions such as billing control.
  • the policy control function network element may be a PCF network element, as shown in FIG. 1; in future communications, such as 6G, the policy control function network element may still be a PCF network element, or have other The name is not limited in this application.
  • the policy control function network element is a PCF network element, the PCF network element may provide an Npcf service.
  • the main function of the service network element is to provide services by interacting with the 3rd generation partnership project (3GPP) core network to influence service flow routing, access network capability opening, and policy control.
  • the service network element may be an AF network element or a third-party AF (3 rd AF) network element, where the AF network element may directly communicate with an operator network element (for example, AMF NE, NE the SMF, the PCF network element, etc.) interactions, the network element needs to 3 rd AF can interact with the operator network via the open network elements NEs (e.g. NEF NE).
  • 3GPP 3rd generation partnership project
  • the service network element may still be an AF network element, a 3 rd AF network element, or have another name, which is not limited in this application.
  • the service network element is an AF network element
  • the AF network element may provide a Naf service.
  • the authentication server function network element may be used to provide an authentication service.
  • the authentication server function network element may be an AUSF network element, as shown in FIG. 1; in future communications, as in 6G, the authentication server function network element may still be an AUSF network element, or There are other names, which are not limited in this application.
  • the AUSF network element may provide a Nausf service.
  • the database network element may be used for storing data and the like.
  • the database network element may be a UDR network element, as shown in FIG. 1; in future communications, such as 6G, the database network element may still be a UDR network element, or have another name. Applications are not limited.
  • the UDR network element may provide a Nudr service.
  • the network open function network element can be used to enable 3GPP to securely provide network service capabilities to third-party AFs (for example, Services Capability Server (SCS), Application Server (AS), etc.).
  • third-party AFs for example, Services Capability Server (SCS), Application Server (AS), etc.
  • the network open function network element may be an NEF network element, as shown in FIG. 1; in future communications, such as 6G, the network open function network element may still be an NEF network element, or there may be other The name is not limited in this application.
  • the network open function network element is a NEF
  • the NEF may provide Nnef services to other network function network elements.
  • the user plane function network element may be used to forward user plane data of the terminal device.
  • the main functions are data packet routing and forwarding, mobility anchors, uplink classifiers to support routing service flows to the data network, and branch points to support multi-homed packet data unit (PDU) sessions.
  • PDU packet data unit
  • the user plane function network element may be a UPF network element, as shown in FIG. 1; in future communications, such as 6G, the user plane function network element may still be a UPF network element, or there may be other
  • the name is not limited in this application.
  • Each of the above network elements in the core network can also be called a functional entity or device. It can be a network element implemented on dedicated hardware, or a software instance running on dedicated hardware, or a virtualized function on an appropriate platform.
  • An example, for example, the above virtualization platform may be a cloud platform.
  • FIG. 1 the architecture of the communication system shown in FIG. 1 is not limited to only the network elements shown in the figure, and may also include other devices not shown in the figure.
  • the specific applications in this application are not listed here one by one. .
  • each network element in the core network does not limit the distribution form of each network element in the core network.
  • the distribution form shown in FIG. 1 is only exemplary, and is not limited in the present application.
  • the following uses the network element shown in FIG. 1 as an example for description, and the XX network element is simply referred to as XX. It should be understood that the names of all network elements in this application are merely examples, and may be referred to as other names in future communications, or the network elements involved in this application in future communications may also be obtained by other entities or devices with the same functions. Instead, this application does not limit this. The description is unified here, and will not be repeated later.
  • the communication system shown in FIG. 1 does not constitute a limitation of the communication system to which the embodiments of the present application can be applied.
  • the communication system architecture shown in FIG. 1 is a 5G system architecture.
  • the method in the embodiment of the present application is also applicable to various future communication systems, such as 6G or other communication networks.
  • a method for determining a background traffic transmission strategy provided in the embodiment of the present application is applicable to the communication system shown in FIG. 1.
  • the specific process of the method may include:
  • Step 201 The first policy control network element receives first information from a requesting device, where the first information is used to request a background traffic transmission policy of the first terminal device.
  • the first information may include the magnitude of the background traffic of the first terminal device; the first information may further include the identifier of the requesting device and the transmission time window of the background traffic of the first terminal device. At least one of a third data value, location information of the first terminal device, and an identifier of the first terminal device.
  • the third data value of the transmission time window of the background traffic of the first terminal device may be an expected value of the transmission time window of the background traffic of the first terminal device, where the expected value may be understood as the first terminal that the requesting device expects to obtain.
  • the value of the transmission time window that the device uses for background traffic may of course have other understandings, which is not limited in this application.
  • the third data value of the transmission time window of the background traffic of the first terminal device may correspond to the expected value of the transmission time window of the background traffic of the first terminal device, which is not described in detail below.
  • the location information of the first terminal device may be at least one or more of the following: Network area (Network area) where the first terminal device is located, Cell ((identification, ID)), and wireless access point where the first terminal device is located. RAN ID, Global Positioning System (GPS) values.
  • the location information of the first terminal device involved in the subsequent application may be the Network Area where the first terminal device is located, At least one or more of the Cell ID, the RAN ID of the first terminal device, and the GPS value are not described in detail below.
  • the identification of the first terminal device may be at least one or more of the following: subscription permanent identity identifier (SUPI), permanent equipment identifier (PEI), general public subscription identifier (GPSI), internet protocol address (IP) five-tuple, international mobile subscriber identifier (international mobile) subscriber identity (IMSI), international mobile equipment identity (international mobile identity) (enteridentity, IMEI), and mobile station international integrated service digital network number (MSISDN).
  • SUPI subscription permanent identity identifier
  • PEI permanent equipment identifier
  • GPSI general public subscription identifier
  • IP internet protocol address
  • IMSI international mobile subscriber identifier
  • IMSI international mobile equipment identity
  • IMEI international mobile equipment identity
  • MSISDN mobile station international integrated service digital network number
  • the identification of the first terminal device involved in this application can be SUPI, PEI , GPSI, IP quintuple, IMSI, IMEI, MSISDN at least one or more, which will not be described in detail below. Through these information included in the first information, you can request to obtain the background of the first terminal device that meets the above requirements. Traffic transmission policy.
  • the requesting device may be a first terminal device.
  • the requesting device is the first terminal device, it can be divided into the following two scenarios:
  • Scenario a1 When the first terminal device decides to transmit uplink background traffic to the first service network element serving itself, it can initiate a packet data unit session ((packet data unit) (PDU) Session) modification process and request the background of the first terminal device. Traffic transmission policy.
  • PDU packet data unit
  • the specific process in which the first terminal device sends the first information to the first policy control network element may be: the first terminal device sends the first information to the access and mobility management function network element,
  • the first terminal device may send the first information to the access and mobility management function network element through the N1 message, for example, the N1 message may be a PDU Session Modification Request; and then, access and mobility The performance management function network element forwards the first information to the session management function network element.
  • the access and mobility management function network element may send the first information to the session management function network element by calling the Nsmf_PDUSession_UpdateSMContext service; finally, the session management The functional network element forwards the first information to the first policy control network element.
  • the session management function network element may send the first information to the first policy control network element by calling the Npcf_SMPolicyControl_Update service. In this way, through the above method, the first terminal device can send the first information to the first policy control network element.
  • the terminal device may first obtain the information required to request the background traffic transmission policy from the first service network element serving the first terminal device.
  • the first terminal device A service network element acquires the size of the background traffic of the first terminal device; the first terminal device further obtains, from the first service network element, the identifier of the first service network element, the third time window of the transmission time window of the background traffic of the first terminal device, At least one of a data value, location information of the first terminal device, and an identifier of the first terminal device.
  • the first terminal device may carry the obtained information in the first information and send it to the first policy control network element to request the background traffic transmission policy of the first terminal device.
  • the requesting device may be a first service network element serving a first terminal device.
  • the requesting device is the first service network element, it can be divided into the following two scenarios:
  • Scenario b1 When the first service network element decides to transmit downlink background traffic to the first terminal device, the first service network element initiates a PDUSession modification process and requests a background traffic transmission policy of the first terminal device.
  • the first service network element sending the first information to the first policy control network element may specifically be: the first service network element sends the first information to the first policy control network element by calling the Npcf_PolicyAuthorization_Create / Update service.
  • the first service network element may send the first information to the first policy control network element through the network open function network element.
  • the above process may specifically be: the first service network element sends the first information to the network open function network element, optionally, the first service network element may send the first information to the network open function network element by calling the Nnef_BDTPNegotiation_Create request service; then the network The open function network element forwards the first information to the first policy control network element.
  • the network open function network element may send the first information to the first policy control network element by calling the Npcf_BDTPolicyControl_Create request service.
  • the first service network element obtains, from the first terminal device, information required to request a background traffic transmission policy of the first terminal device, for example, the first service network element Acquiring the first terminal device from the first terminal device: the size of the background traffic; the first service network element further acquiring the first terminal device from the first terminal device: the third data value of the transmission time window of the background traffic, the location information, At least one of the logos.
  • the first service network element may carry the obtained information in the first information and send it to the first policy control network element to request a background traffic transmission policy of the first terminal device.
  • both the request for the uplink background traffic transmission policy and the request for the downlink background traffic transmission policy can be realized.
  • the first service network element may simultaneously request background traffic transmission policies of multiple terminal devices through the first information, where the first terminal device may Is any one of multiple terminal devices.
  • the first information may include the size of the background traffic of each terminal device of the multiple terminal devices; the first information also includes the third data value, location information, and identification of the transmission time window of the background traffic of each terminal device. At least one.
  • Step 202 The first policy control network element sends second information to the data analysis network element according to the first information, and the second information is used to request the background traffic of the first terminal device to transmit a data analysis result.
  • the first policy control network element after the first policy control network element receives the first information, the first policy control network element sends the second information to the data analysis network element according to the content of the first information request, so that the data analysis network Meta performs step 203.
  • the second information may include the magnitude of the background traffic of the first terminal device; and the second information may further include the third data of the transmission time window of the background traffic of the first terminal device. At least one of value, location information, and identification.
  • the data analysis network element can return a background traffic transmission data analysis result that meets the content contained in the second information.
  • the content included in the second information may be determined according to the content included in the first information.
  • the first policy control network element may process the second information into the same information as the first information, that is, the second information.
  • the content contained is the same as the content contained in the first information; for another example, the first policy control network element may process the second information into information different from the first information.
  • the content contained in the second information may be Other information is added to the content contained in the first information, or part of the information contained in the first information is selected as the content in the second information, which is not limited in this application.
  • the second information may be sent to the data analysis network element by calling the Nnwdaf_AnalyticsInfo_Request service.
  • the first policy control network element may simultaneously request the background traffic transmission data analysis result of multiple terminal devices through the second information, where the first terminal device is any one of the multiple terminal devices.
  • the second information may include the size of the background traffic of each terminal device among the multiple terminal devices; the second information may further include the identification of the first policy function network element, the identification of the requesting device, and each terminal device At least one of the third data value of the transmission time window of the background traffic, the location information of each terminal device, and the identity of each terminal device.
  • the first policy control network element may collect multiple requests for background traffic transmission policies for terminal devices within a preset time period, and then simultaneously request the analysis results of background traffic transmission data for multiple terminal devices through the second information.
  • multiple requests for the background traffic transmission policy of the terminal device may be multiple different terminal devices sending the first information request, or a service network element may request the same information through the first information at the same time. It may be requested by at least one terminal device for the at least one terminal device through the first information request and one service network element through the first information, or it may be multiple service network elements for the at least one terminal device through the respective first information.
  • the first policy control network element may collect a request for a background traffic transmission policy of a preset number of terminal devices, and then simultaneously request the analysis results of the background traffic transmission data of multiple terminal devices through the second information.
  • a background traffic transmission policy of multiple (that is, a preset number of) terminal devices in this scenario refer to the related description in scenario c1, and details are not described herein again.
  • the second information may further include an identifier of the first service network element.
  • the identifier of the first service network element may be an application service provider identifier ((application) service provider (ASP) identifier).
  • ASP application service provider
  • the ASP identifier may be stored in the first policy control network element, or may be from the first service network element.
  • Step 203 The data analysis network element sends the background traffic transmission data analysis result of the first terminal device to the first policy control network element, and the background traffic transmission data analysis result of the first terminal device is analyzed by the data analysis network element based on the target of the second terminal device. It is determined by the background traffic transmission policy that the second terminal device is different from the first terminal device, and the target background traffic transmission policy of the second terminal device is used for background traffic transmission by the second terminal device.
  • the data analysis network element determines the background traffic transmission data analysis result of the first terminal device based on the second information and the target background traffic transmission policy of the second terminal device. .
  • the background traffic transmission data analysis result of the first terminal device may be further analyzed by the data analysis network element based on the target background traffic transmission policy and the second information of the second terminal device, and the load of the functional network element. Determined by the information and / or capacity information of the functional network element. In this way, the analysis result of the background traffic transmission data of the first terminal device analyzed by the data analysis network element can be more reliable.
  • the analysis result of the background traffic transmission data may include: the first data value of the transmission time window of the background traffic; the analysis result of the background traffic transmission data analysis may further include: the first data value of the background traffic transmission bandwidth, and the first terminal device. At least one of location information of the mobile terminal and the identifier of the first terminal device.
  • the first data value of the transmission time window of the background traffic of the first terminal device may be a data analysis value of the transmission time window of the background traffic of the first terminal device.
  • the first data value of the transmission time window of the background traffic of the first terminal device that is subsequently referred to in this application may correspond to the data analysis value of the transmission time window of the background traffic of the first terminal device, and details are not described below.
  • the first data value of the transmission bandwidth of the background traffic of the first terminal device may be a data analysis value of the transmission bandwidth of the background traffic of the first terminal device. It should be noted that the first data value of the transmission bandwidth of the background traffic of the first terminal device that is subsequently referred to in this application may correspond to the data analysis value of the transmission bandwidth of the background traffic of the first terminal device, and details are not described below.
  • the second terminal device may refer to at least one terminal device.
  • the second terminal device is a general term for a terminal device that currently performs background traffic transmission.
  • the second terminal device may be a terminal device under a first policy control network element, or a terminal device under a second policy control network element, or may be a first policy control network element and a second policy Control the terminal equipment under the network element.
  • the second policy control network element may be a policy control network element other than the first policy control network element in the communication system, or the second policy control network element may be in the same location area as the first policy control network element ( For example, one of a tracking area (TA), a tracking area list (TA), a routing area (RA), a routing area list (RA, List, etc.).
  • the data analysis network element determines the background traffic transmission data analysis result of the first terminal device through the target transmission policy of the terminal device currently performing the background traffic transmission, so that the background traffic transmission policy of the first terminal device determined subsequently can be compared with other
  • the background device's background traffic transmission policies reduce the possibility of conflicts, which can make background traffic successfully transmitted.
  • the data analysis network element before the data analysis network element sends the background traffic transmission data analysis result of the first terminal device to the first policy control network element, the data analysis network element needs to be based on the target background of the second terminal device.
  • the traffic transmission policy determines a background traffic transmission data analysis result of the first terminal device.
  • the data analysis network element may also obtain the target background traffic transmission policy of the second terminal device. .
  • the data analysis network element obtains the target background traffic transmission policy of the second terminal device by using the following method: the data analysis network element receives the target background traffic transmission policy of the second terminal device from the first device, where
  • the first device may be any one or a combination of the following: a second terminal device, a first policy control network element, a second policy control network element, a second service network element, a second database network element, and the like.
  • the target background traffic transmission policy of the second terminal device may include: a sixth data value of a transmission time window of the background traffic; the target background traffic transmission policy of the second terminal device may further include: a background At least one of a sixth data value of a transmission bandwidth of the traffic, location information of the second terminal device, and an identifier of the second terminal device.
  • the target background traffic transmission policy of any terminal device may not be obtained in the data analysis network element. That is, at this time, the first terminal device is the first terminal device that needs a background traffic data transmission policy.
  • the data analysis network element may first based on the second information, the load information of the function network element, and the function network element. At least one of the capacity information determines a background traffic transmission data analysis result of the first terminal device.
  • the data analysis network element determines the background traffic of the first terminal device to transmit the data analysis result based on the load information of the function network element and / or capacity information of the function network element
  • the data analysis network element returns The load information of the functional network element and / or the capacity information of the functional network element may be obtained first.
  • the functional network element may be at least one of a first policy control network element, a session management function network element, a radio access network network element, an access and mobility management function network element, and a user plane function network element. .
  • the data analysis network element obtains the load information of the functional network element and / or the capacity information of the functional network element by using the following method:
  • the data analysis network element is obtained from the functional network element or operation management and maintenance (operation, administration) and maintenance (OAM) network elements receive load information of functional network elements and / or capacity information of functional network elements.
  • OAM operation management and maintenance
  • the OAM network element collects the load information of the function network element from the function network element And / or capacity information of functional network elements.
  • the data analysis network element determines the first terminal based on the target background traffic transmission policy and the second information of the second terminal device, and the load information of the functional network element and / or the capacity information of the functional network element.
  • the analysis results of the background traffic transmission data of the device may be: the data analysis network element combines the content included in the target background traffic transmission policy of the second terminal device, the content included in the second information, and the background information maintained by the data analysis network element.
  • the traffic transmission information (for example, the congestion level or no congestion indication during background traffic transmission at a certain location, etc.) collectively analyzes the background traffic transmission data analysis result of the first terminal device.
  • the functional network element when the data analysis network element combines the content included in the target background traffic transmission policy of the second terminal device, the content included in the second information, and the maintained information about the background traffic transmission, the functional network element (such as a wireless access point)
  • the load information of the network access element (ie, the base station) and the capacity information of the functional network element (such as the radio access network element (ie, the base station)) are used to analyze the background traffic transmission data analysis result of the first terminal device. But not limited to:
  • Step 1 The data analysis network element can perform offline analysis based on the above-mentioned content to obtain each cell or base station (corresponding to Cell ID or RAN) in a certain area (such as any of TA, TA List, RA, and RA List). ID) for the first total throughput (ie, the first total bandwidth) for background traffic transmission.
  • each cell or base station corresponding to Cell ID or RAN
  • a certain area such as any of TA, TA List, RA, and RA List.
  • ID for the first total throughput (ie, the first total bandwidth) for background traffic transmission.
  • the congestion level 9 according to the operator's policy, it is the maximum congestion level (critical point) that a cell or base station can withstand.
  • the data analysis network element counts all terminal devices in the cell or base station at this time.
  • the transmission bandwidth of the background traffic (optional, which can be counted multiple times and averaged) to obtain the first total throughput of the cell or base station for background traffic transmission.
  • Step 2 The data analysis network element determines the second total throughput for background traffic transmission in the current cell or base station where the first terminal device is located.
  • the specific method may be: the data analysis network element obtains the location information of the first terminal device, that is, Obtain the cell ID or base station ID (RAN ID) of the first terminal device, and then according to the first terminal device's cell ID or base station ID, obtain the first total throughput of multiple cells or base stations in step 1. Query the second total throughput (that is, the second total bandwidth) of the current cell or base station where the first terminal device is located.
  • the data analysis network element if the data analysis network element does not find the location information of the first terminal device from the second information from the first policy control network element, that is, the cell ID or the base station ID (Cell ID IDor RAN ID), but when the identity of the first terminal device (such as A) is found, the data analysis network element can operate, manage, and maintain (OAM) network elements, AMF, PCF, RAN through A direction Any one of the queries obtains the location information of the first terminal device.
  • OAM manage, and maintain
  • Step 3 The data analysis network element is based on the current background traffic requested by the first terminal device and the expected value of the transmission time window of the background traffic (that is, the third data value of the transmission time window of the background traffic.
  • the second information carries This information
  • the expected value of the transmission bandwidth of the background traffic of the first terminal device and the second total throughput, the first data value that determines the transmission time of the background traffic of the first terminal device and the background traffic transmission bandwidth of the first terminal device
  • the specific method can be as follows:
  • the data analysis network element first obtains the nodes or cells in the base station where the first terminal device is located, the transmission time window desired by the first terminal device (that is, the expected value of the background traffic transmission time window of the first terminal device), Timestamp), which is the sum of the transmission bandwidth of the second terminal device that is transmitting the background traffic in the cell or base station where the first terminal device is located, and the time node, plus the transmission bandwidth of the background traffic of the first terminal device.
  • the first data value of the transmission time of the background traffic of the first terminal device and the first data value of the background traffic transmission bandwidth of the first terminal device may be specifically divided into the following two cases:
  • Case e1 When the third total bandwidth at all time nodes is less than or equal to the second total throughput, the data analysis network element may use the expected value of the transmission time window of the background traffic of the first terminal device as the value of the first terminal device. The first data value of the transmission time window of the background traffic; and the data analysis network element may use the expected value of the transmission bandwidth of the background traffic of the first terminal device as the first data value of the transmission bandwidth of the background traffic of the first terminal device.
  • the data analysis network element may have many variable measures, such as:
  • Example 1 The data analysis network element does not change the time window size, but moves the entire time window backward or forward by the transmission time interval (TTI), and counts the third data value of the transmission time window of the first terminal device.
  • TTI transmission time interval
  • Timestamp the real-time throughput of different time nodes
  • the magnitude relationship between the quantities determines the first data value of the transmission time of the background traffic of the first terminal device and the first data value of the background traffic transmission bandwidth of the first terminal device.
  • the data analysis network element adds the expected value of the transmission time window of the background traffic of the first terminal device plus TTI as the first terminal device's The first data value of the transmission time window of the background traffic; and the data analysis network element determines that the first data value of the transmission bandwidth of the background traffic of the first terminal device is the size of the background traffic of the first terminal device divided by the first terminal
  • Example 2 The data analysis network element changes the time window size, such as reducing the entire time window. Assuming that the expected value of the transmission time window of the background traffic of the first terminal device is [T3, T4], the updated time window size can be [T3 + t, T4], move the starting time backward t, and enlarge the average transmission bandwidth of each time point in the time window, use the new time window and bandwidth for transmission, and determine if the requirements can be met, then data analysis The network element may determine that the first data value of the transmission time window of the background traffic of the first terminal device is [T3 + t, T4]; and the data analysis network element may determine the first data of the transmission bandwidth of the background traffic of the first terminal device The value is the size of the background traffic of the first terminal device divided by (T4- (T3 + t)).
  • NWDAF can also obtain the background traffic transmission data analysis result of the first terminal device based on the target background traffic transmission policy of the second terminal device in other ways, which is not limited in this solution.
  • the data analysis network element when the data analysis network element sends the background traffic transmission data analysis result of the first terminal device to the first policy control network element, the data analysis network element may control the first policy by calling the Nnwdaf_AnalyticsInfo_Request response service The network element sends the analysis result of the background traffic transmission data of the first terminal device.
  • Step 204 The first policy control network element sends the background traffic transmission policy of the first terminal device to the requesting device.
  • the background traffic transmission policy of the first terminal device is determined by the first policy control network element according to the third information, and the third information includes the first information. Analysis results of background traffic transmission data of a terminal device.
  • the third information may further include: a background traffic transmission query result of the first terminal device and / or a local background traffic transmission policy of the first terminal device.
  • the background traffic transmission query result may include: a fourth data value of a transmission time window of the background traffic; the background traffic transmission query result may further include: a fourth data value of the background traffic transmission bandwidth, and the first terminal device At least one of location information of the mobile terminal and the identifier of the first terminal device.
  • the fourth data value of the transmission time window of the background traffic of the first terminal device may be a database query value of the transmission time window of the background traffic of the first terminal device.
  • the fourth data value of the transmission time window of the background traffic of the first terminal device that is subsequently referred to in this application may correspond to the database query value of the transmission time window of the background traffic of the first terminal device, which is not described in detail below.
  • the fourth data value of the transmission bandwidth of the background traffic of the first terminal device may be a database query value of the transmission bandwidth of the background traffic of the first terminal device. It should be noted that the fourth data value of the transmission bandwidth of the background traffic of the first terminal device that is subsequently referred to in this application may correspond to the database query value of the transmission bandwidth of the background traffic of the first terminal device, and details are not described below.
  • the local background traffic transmission strategy may include: the fifth data value of the transmission time window of the background traffic; the local background traffic transmission result may further include: the fifth data value of the background traffic transmission bandwidth, the location information of the first terminal device, the first At least one of the terminal device identifications.
  • the fifth data value of the transmission time window of the background traffic of the first terminal device may be a local query value of the transmission time window of the background traffic of the first terminal device. It should be noted that the fifth data value of the transmission time window of the background traffic of the first terminal device that is subsequently referred to in this application may correspond to the local query value of the transmission time window of the background traffic of the first terminal device, which is not described in detail below.
  • the fifth data value of the transmission bandwidth of the background traffic of the first terminal device may be a local query value of the transmission bandwidth of the background traffic of the first terminal device. It should be noted that the fifth data value of the transmission bandwidth of the background traffic of the first terminal device that is subsequently referred to in this application may be a local query value corresponding to the transmission bandwidth of the background traffic of the first terminal device, which is not described in detail below.
  • the first policy control network element may determine the background traffic transmission policy of the first terminal device according to the third information.
  • the background traffic transmission policy of the first terminal device may be one or more.
  • the background traffic transmission strategy of the first terminal device may include: a second data value of a transmission time window of the background traffic; the background traffic transmission strategy may further include: a second data value of a transmission bandwidth of the background traffic, the first terminal device At least one of location information of the mobile terminal and the identifier of the first terminal device.
  • the second data value of the transmission time window of the background traffic of the first terminal device may be a recommended value of the transmission time window of the background traffic of the first terminal device. It should be noted that the second data value of the transmission time window of the background traffic of the first terminal device that is subsequently referred to in this application may correspond to the recommended value of the transmission time window of the background traffic of the first terminal device, which is not described in detail below.
  • the second data value of the transmission bandwidth of the background traffic of the first terminal device may be a recommended value of the transmission bandwidth of the background traffic of the first terminal device. It should be noted that the second data value of the transmission bandwidth of the background traffic of the first terminal device that is subsequently referred to in this application may correspond to the recommended value of the transmission bandwidth of the background traffic of the first terminal device, which is not described in detail below.
  • the first policy control network element may perform the following three operations before determining the background traffic transmission policy of the first terminal device according to the third information. Either of the following:
  • the first policy control network element obtains a background traffic transmission query result of the first terminal device from the database network element.
  • the first policy control network element obtains the local background traffic transmission policy of the first terminal device from the first policy control network element.
  • the third information further includes a query result of the background traffic transmission of the first terminal device and a local background traffic transmission policy of the first terminal device
  • the first policy controls the network element to obtain the information of the first terminal device from the database network element.
  • the background traffic transmission query result, and the first policy control network element obtains the local background traffic transmission policy of the first terminal device from the first policy control network element.
  • the first policy control network element determines the background traffic transmission policy of the first terminal device according to the third information.
  • the specific process can be:
  • the first policy control network element may determine the second data value of the transmission time window of the background traffic in the background traffic transmission policy of the first terminal device according to the first data value of the transmission time window of the background traffic in the analysis result of the background traffic transmission data. ; The first policy control network element may further perform at least one of the following operations: the first policy control network element determines the background traffic transmission of the first terminal device according to the first data value of the transmission bandwidth of the background traffic in the analysis result of the background traffic transmission data The second data value of the transmission bandwidth of the background traffic in the policy; the first policy controls the network element to include the location information of the first terminal device in the analysis result of the background traffic transmission data in the background traffic transmission policy of the first terminal device; A policy control network element includes the identification of the first terminal device in the analysis result of the background traffic transmission data in the background traffic transmission policy of the first terminal device.
  • the first policy controls the network element according to the third information. Determine the background traffic transmission policy of the first terminal device.
  • the specific process may be:
  • the first policy control network element may according to the first data value of the transmission time window of the background traffic in the analysis result of the background traffic transmission data and the fourth data of the transmission time window of the background traffic in the background traffic transmission query result of the first terminal device. Value, determines the second data value of the transmission time window of the background traffic in the background traffic transmission policy of the first terminal device; the first policy control network element may also perform at least one of the following operations: the first policy controls the network element according to the background traffic The first data value of the transmission bandwidth of the background traffic in the analysis result of the transmission data and the fourth data value of the transmission bandwidth of the background traffic in the background traffic transmission query result of the first terminal device determine the background traffic transmission strategy of the first terminal device.
  • the second data value of the transmission bandwidth of the background traffic in the first policy; the first policy control network element includes the location information of the first terminal device in the background traffic transmission data analysis result and the first terminal device ’s background traffic transmission query result in the In the background traffic transmission policy of the first terminal device, the first policy controls the network element to transmit the background flow.
  • the identification of the first terminal device in the analysis result of the volume transmission data and the background traffic transmission query result of the first terminal device is included in the background traffic transmission policy of the first terminal device.
  • the first policy controls the network element according to the third information. Determine the background traffic transmission policy of the first terminal device.
  • the specific process may be:
  • the first policy control network element may according to the first data value of the transmission time window of the background traffic in the analysis result of the background traffic transmission data and the fifth data of the transmission time window of the background traffic in the local background traffic transmission policy of the first terminal device. Value, determines the second data value of the transmission time window of the background traffic in the background traffic transmission policy of the first terminal device; the first policy control network element may also perform at least one of the following operations: the first policy controls the network element according to the background traffic The first data value of the transmission bandwidth of the background traffic in the analysis result of the transmission data and the fifth data value of the transmission bandwidth of the background traffic in the local background traffic transmission strategy of the first terminal device determine the background traffic transmission strategy of the first terminal device The second data value of the transmission bandwidth of the background traffic in the first policy; the first policy control network element includes the location information of the first terminal device in the analysis result of the background traffic transmission data and the local background traffic transmission policy of the first terminal device in the In the background traffic transmission policy of the first terminal device, the first policy controls the network element to transmit the background flow. And
  • the third information includes a background traffic transmission data analysis result of the first terminal device, a background traffic transmission query result of the first terminal device, and a local background traffic transmission policy of the first terminal device
  • the first policy control network element determines the background traffic transmission policy of the first terminal device according to the third information.
  • the specific process may be:
  • the first policy control network element may according to the first data value of the transmission time window of the background traffic in the analysis result of the background traffic transmission data, and the fourth data of the transmission time window of the background traffic in the background traffic transmission query result of the first terminal device.
  • the value and the fifth data value of the transmission time window of the background traffic in the local background traffic transmission policy of the first terminal device to determine the second data value of the transmission time window of the background traffic in the background traffic transmission policy of the first terminal device;
  • the first policy control network element may also perform at least one of the following operations: the first policy control network element transmits a first data value of the transmission bandwidth of the background traffic in the analysis result of the background traffic transmission data, and the background traffic transmission query of the first terminal device The fourth data value of the transmission bandwidth of the background traffic in the result and the fifth data value of the transmission bandwidth of the background traffic in the local background traffic transmission policy of the first terminal device determine the background in the background traffic transmission policy of the first terminal device The second data value of the transmission bandwidth of the traffic; the first policy controls the network element to transmit the
  • the data analysis network element when the first policy control network element requests the background traffic transmission data analysis result of multiple terminal devices, the data analysis network element returns the background traffic transmission of multiple terminal devices to the first policy control network element.
  • the third information may include a background traffic transmission data analysis result of some of the multiple terminal devices.
  • the first policy control network element when the first policy control network element sends a background traffic transmission policy of the first terminal device to the requesting device, the first policy control network element may further send identification information to the requesting device, and the identification information is used It is used to identify the target background traffic transmission strategy of the first terminal device. In this way, the subsequent requesting device may determine the target background traffic transmission policy of the first terminal device in the background traffic transmission policy of the first terminal device by using the identification information.
  • the background traffic transmission policy of the first terminal device may be one or multiple, it may be specifically classified according to the number of background traffic transmission policies of the first terminal device. The following two situations:
  • the first policy control network element may execute:
  • the first policy control network element determines that the background traffic transmission policy of the first terminal device is the target background traffic transmission policy of the first terminal device; after that, the first policy control network element sends the target background traffic of the first terminal device to the data analysis network element. Transmission strategy; or the first policy controls the network element to send the target background traffic transmission policy of the first terminal device to the database network element; or the first policy controls the network element to send the target background traffic transmission of the first terminal device to the data analysis network element and the database Strategy.
  • the first policy control network element may also perform the following operations:
  • the first policy control network element receives the target background traffic transmission policy of the first terminal device from the requesting device, and the target background traffic transmission policy of the first terminal device is selected by the requesting device according to the background traffic transmission policy of the first terminal device;
  • the policy control network element sends the target background traffic transmission policy of the first terminal device to the data analysis network element; or the first policy control network element sends the target background traffic transmission policy of the first terminal device to the database network element; or the first policy control network
  • the metadata sends a target background traffic transmission policy of the first terminal device to the data analysis network element and the database.
  • the first policy control network element when the first policy control network element sends the target background traffic transmission policy of the first terminal device to the data analysis network element and / or the database network element, the first policy control The network element may also send at least one of identification information, an identification of the requesting device, and an identification of the first policy control network element to the data analysis network element and / or the database network element.
  • the data analysis network element and / or the database network element receives the target background traffic transmission policy of the first terminal device and saves it, and updates the target background traffic transmission policy of the plurality of maintained terminal devices.
  • the first policy control network element finally transmits the target background traffic transmission policy of the first terminal device, and the identification information, the identifier of the requesting device, and the first policy control network element.
  • the data analysis network element may receive the first policy control network element or other policy control network element to request the background traffic transmission data analysis result for other terminal devices, and may also combine the first Analyze the target background traffic transmission policy of a terminal device, and the target background traffic transmission policy of the terminal device corresponding to the requesting device and / or the target background traffic transmission policy of the terminal device corresponding to the first policy control network element, and further analyze It is possible to prevent conflicts between the background traffic transmission policies of other terminal devices that are finally determined and the background traffic transmission policies of the terminal devices (including the first terminal device) currently performing background traffic transmission.
  • the database network element when the database network element receives the target background traffic query request of the first terminal device of the first policy control network element, the database network element can query and obtain the target background traffic transmission policy of the first terminal device according to the identification information carried in the query request. And return to the first policy control network element, and send the first policy control network element to at least one of the first terminal device, the radio access network element, the user plane function network element, and the first service network element.
  • the background traffic transmission policy of the first terminal device when the background traffic transmission policy of the first terminal device is one, when the requesting device receives the background traffic transmission policy of the first terminal device sent by the first policy control network element, the requesting device determines the first The background traffic transmission policy of the terminal device is the target background traffic transmission policy of the first terminal device; and then the target background traffic transmission policy of the first terminal device is sent to the data analysis network element.
  • the requesting device selects a target background traffic transmission policy of the first terminal device according to the background traffic transmission policies of the first terminal device, and then sends the The policy control network element sends a target background traffic transmission policy of the first terminal device.
  • the foregoing operations may be performed after the requesting device receives the background traffic transmission policy of the first terminal device sent by the first policy control network element.
  • the requesting device may further send the first terminal device to the data analysis network element.
  • Target background traffic transmission strategy After the requesting device confirms the target background traffic transmission policy of the first terminal device according to the background traffic transmission policy of the first terminal device, the requesting device may further send the first terminal device to the data analysis network element. Target background traffic transmission strategy.
  • any operation performed by the requesting device may be performed instead by the first terminal device or the first service network element serving the first terminal device.
  • the execution process after replacement is not described in detail here.
  • the target background traffic transmission policy and / or identification information of the first terminal device may also be sent to A database network element, and the identification information is used to identify a target background traffic transmission policy of the first terminal device.
  • the data analysis network element can obtain the target background traffic transmission policy of the first terminal device from the database network element.
  • the first policy control network element can obtain the target background traffic transmission policy of the first terminal device from the database network element by querying the identification information.
  • the first policy control network element when the first policy control network element sends the background traffic transmission policy of the first terminal device to the requesting device, according to different situations where the requesting device may be the first terminal device or the first service network element Can be divided into the following two scenarios:
  • the first policy control network element sends a background traffic transmission policy of the first terminal device to the first terminal device.
  • the specific process may be: the first policy controls the network element
  • the background traffic transmission policy of the terminal device is sent to the session management network element through the PDU session modification process.
  • the first policy control network element can send the background traffic transmission policy of the first terminal device to the session management network element by calling the Npcf_SMPolicy Control_Update service.
  • the session management network element sends the background traffic transmission policy of the first terminal device to the access and mobility management function network element, optionally, the session management network element may carry the background traffic transmission policy of the first terminal device in the session
  • the PDU session update response (response of Nsmf_PDU Session_Update SMContext) sent by the management network element to the access and mobility management function network element; then the access and mobility management function network element sends the background traffic transmission policy of the first terminal device to Access network equipment serving the first terminal equipment, optional, access and mobile
  • the mobility management function network element may send the background traffic transmission policy of the first terminal device to the access network device through the N2 message.
  • the N2 message may be an N2 session request (N2 Session Request); finally, the access network device sends the first terminal device
  • the background traffic transmission policy is sent to the first terminal device.
  • the access network device may carry the background traffic transmission policy of the first terminal device with a specific resource modification (AN_specificresourse) sent by the access network device to the first terminal device. modification) message (that is, PDU session modification command / Ack).
  • the first policy control network element when the first policy control network element sends the background traffic transmission policy of the first terminal device to the first terminal device, it may also send identification information to the first terminal device.
  • the information is used to identify a target background traffic transmission policy of the first terminal device.
  • For the process of sending the identification information by the first policy control network element to the first terminal device refer to the foregoing process of sending the background traffic transmission policy of the first terminal device by the first policy control network element to the first terminal device. To repeat.
  • the identification information when the first terminal device decides to transmit the background traffic policy, the identification information is sent to the first policy control network element through a PDU session modification process.
  • the first policy control network element passes the identification The information queries the database network element to obtain the target background traffic transmission strategy of the first terminal device, and further sends the target background traffic transmission policy to at least one of the radio access network element, the user plane function network element, and the first service network element.
  • the target background traffic transmission policy to at least one of the radio access network element, the user plane function network element, and the first service network element.
  • Element at least one of a user plane functional network element and a first service network element.
  • the first policy control network element sends the background traffic transmission policy of the first terminal device to the first service network element.
  • the specific process may be: the first policy controls the network element to pass through the network.
  • the open function network element sends the background traffic transmission policy of the first terminal device to the first service network element.
  • the first policy control network element sends the background traffic transmission policy of the first terminal device to the network open function network element.
  • the first policy control network element may open the function to the network by calling the Npcf_BDT Policy Control_Create response service The network element sends the background traffic transmission policy of the first terminal device; then the network open function network element sends the background traffic transmission policy of the first terminal device to the first service network element.
  • the network open function network element may call Nnef_BDTPNegotiation_Create The response service sends a background traffic transmission policy of the first terminal device to the first service network element.
  • the first policy control network element when the first policy control network element sends the background traffic transmission policy of the first terminal device to the first service network element, it may also send identification information to the first service network element.
  • the identification information is used to identify a target background traffic transmission policy of the first terminal device.
  • For the process of the first policy control network element sending the identification information to the first service network element refer to the foregoing process of the first policy control network element sending the background traffic transmission policy of the first terminal device to the first service network element. Specifically, here No longer.
  • the identification information is sent to the first policy control network element through a PDU session modification process. Further, the first policy control network element passes the The identification information queries the database network element to obtain the target background traffic transmission policy of the first terminal device, and further sends the target background traffic transmission policy to at least one of the first terminal device, the radio access network element, and the user plane function network element.
  • the first policy control network element sends the background traffic transmission policy of the first terminal device to the first terminal device, which may be, but is not limited to, the above-mentioned PDU session modification process.
  • the first policy control network element may also use a PDU session establishment procedure (PDU Establishment procedure), a registration procedure (Registration procedure), a service request procedure (Service Request procedure), a terminal configuration update procedure (UE Configuration Configuration Update), etc.
  • PDU Establishment procedure PDU Establishment procedure
  • Registration procedure Registration procedure
  • Service Request procedure Service Request procedure
  • UE Configuration Configuration Update a terminal configuration update procedure
  • the first policy control network element may place the background traffic transmission policy of the first terminal device in the terminal routing policy (UESP) of the first terminal device.
  • UESP terminal routing policy
  • the first policy control network element sends the second information to the data analysis network element after receiving the first information requesting the background traffic transmission policy of the first terminal device from the requesting device.
  • the information is used to request the background traffic transmission data analysis result of the first terminal device, and after receiving the data analysis result of the first terminal device from the data analysis network element, send the background traffic transmission policy of the first terminal device to the requesting device;
  • the data analysis result of a terminal device is determined by the data analysis network element based on the target background traffic transmission policy of the second terminal device.
  • the second terminal device is different from the first terminal device.
  • the target background traffic transmission policy of the second terminal device is used for the first terminal device.
  • the two terminal devices transmit background traffic; the background traffic transmission policy of the first terminal device is determined by the first policy control network element according to the third information, and the third information includes the analysis result of the background traffic transmission data of the first terminal device.
  • the data analysis network element may determine a background traffic transmission data analysis result of the first terminal device based on a target background traffic transmission policy of another terminal device (that is, the second terminal device), so that the first policy may control the network element.
  • a background traffic transmission policy of the first terminal device is determined, so that the background traffic transmission policy of the first terminal device determined by the first policy control network element refers to other terminal devices, etc., so that the first policy controls the first terminal determined by the network element.
  • the background traffic transmission policy of the device does not conflict with the background traffic transmission policy of other terminal devices, which can solve the problem of background traffic transmission failure.
  • the embodiment of the present application further provides a method for determining a background traffic transmission policy.
  • the first terminal device directly requests the background traffic transmission policy of the first terminal device as a requesting device, and the method is also applicable.
  • the specific process of the method may include:
  • Step 301 The first terminal device sends first information to a first policy control network element, where the first information is used to request a background traffic transmission policy of the first terminal device.
  • the specific process of the first terminal device sending the first information to the first policy control network element can refer to the related descriptions in the scenario a1 and the scenario a2 in the embodiment shown in FIG. .
  • the content included in the first information is the same as the content included in the first information in the embodiment shown in FIG. 2, and can be referred to each other, and details are not described herein again.
  • Step 302 The first policy control network element sends second information to the data analysis network element according to the first information, and the second information is used to request the background traffic of the first terminal device to transmit a data analysis result.
  • step 302 For a detailed description of step 302, reference may be made to the description in step 202 in the foregoing embodiment, and details are not described herein again.
  • Step 303 The data analysis network element sends the background traffic transmission data analysis result of the first terminal device to the first policy control network element, where the background traffic transmission data analysis result of the first terminal device is that the data analysis network element is based on the second terminal device. It is determined by the target background traffic transmission policy that the second terminal device is different from the first terminal device, and the target background traffic transmission policy of the second terminal device is used for background traffic transmission by the second terminal device.
  • step 303 For a detailed description of step 303, reference may be made to the description in step 203 in the foregoing embodiment, and details are not described herein again.
  • Step 304 The first terminal device receives the background traffic transmission policy of the first terminal device from the first policy control network element.
  • the background traffic transmission policy of the first terminal device is determined by the first policy control network element according to the third information.
  • the three pieces of information include analysis results of background traffic transmission data of the first terminal device.
  • the first terminal device when the first terminal device receives the background traffic transmission policy of the first terminal device from the first policy control network element, the first terminal device may further receive identification information, and the identification information is used to identify a target of the first terminal device. Background traffic transmission strategy. In this way, the first terminal device can determine the target background traffic transmission policy of the first terminal device in the background traffic transmission policy of the first terminal device by using the identification information.
  • the first terminal device may further send identification information to the first policy control network element.
  • the first policy control network element can query the target background traffic transmission policy of the first terminal device from the database network element through the identification information, and subsequently send the target background traffic transmission policy of the first terminal device to the wireless access network.
  • the first terminal device may send the identification information to the first policy control network element through the session management function network element through the PDU session modification process initiated by the first terminal device.
  • the first policy control network element may use the identification information from the database
  • the network element query obtains the target background traffic transmission policy of the first terminal device, and then the first policy control network element can send the target background traffic transmission policy of the first terminal device to the wireless access network element and the user through the remaining PDU Session modification process.
  • the first terminal device may further execute: the first terminal device determines that the background traffic transmission policy of the first terminal device is the first terminal. The target background traffic transmission strategy of the device; the first terminal device sends the target background traffic transmission strategy of the first terminal device to the data analysis network element.
  • the first terminal device may further execute: the first terminal device selects the first terminal device according to the background traffic transmission policy of the first terminal device.
  • a target background traffic transmission policy of a terminal device the first terminal device sends a target background traffic transmission policy of the first terminal device to the first policy control network element.
  • the first terminal device may further send the data of the first terminal device to the data analysis network element.
  • Target background traffic transmission strategy may be
  • the second information involved, the background traffic transmission strategy of the first terminal device, the analysis result of the background traffic transmission data of the first terminal device, and the target background traffic transmission strategy of the second terminal device can all refer to the figure. Relevant description in the embodiment shown in 2.
  • an uplink background traffic transmission strategy can be determined based on the foregoing, which can solve the problem that the uplink background traffic transmission strategy cannot be determined in the prior art.
  • an embodiment of the present application further provides a method for determining a background traffic transmission policy.
  • a first service network element serving a first terminal device directly requests the first terminal device background as a requesting device.
  • Traffic transmission strategy this method is also applicable to the communication system shown in Figure 1. Referring to FIG. 4, the specific process of the method may include:
  • Step 401 The first service network element sends first information to the first policy control network element, where the first information is used to request a background traffic transmission policy of the first terminal device.
  • the specific process of the first service network element sending the first information to the first policy control network element can refer to the related descriptions in scenario b1 and scenario b2 in the embodiment shown in FIG. To repeat.
  • the content included in the first information is the same as the content included in the first information in the embodiment shown in FIG. 2, and can be referred to each other, and details are not described herein again.
  • Step 402 The first policy control network element sends second information to the data analysis network element according to the first information, and the second information is used to request the background traffic of the first terminal device to transmit a data analysis result.
  • step 402 For a detailed description of step 402, reference may be made to the description in step 202 in the foregoing embodiment, and details are not described herein again.
  • Step 403 The data analysis network element sends a background traffic transmission data analysis result of the first terminal device to the first policy control network element, wherein the background traffic transmission data analysis result of the first terminal device is that the data analysis network element is based on the second terminal device. It is determined by the target background traffic transmission policy that the second terminal device is different from the first terminal device, and the target background traffic transmission policy of the second terminal device is used for background traffic transmission by the second terminal device.
  • step 403 For a detailed description of step 403, reference may be made to the description in step 203 in the foregoing embodiment, and details are not repeatedly described herein.
  • Step 404 The first service network element receives the background traffic transmission policy of the first terminal device from the first policy control network element, where the background traffic transmission policy of the first terminal device is determined by the first policy control network element according to the third information.
  • the third information includes a background traffic analysis data analysis result of the first terminal device.
  • the first service network element receives the background traffic transmission policy of the first terminal device from the first policy control network element
  • the first service network element when the first service network element receives the background traffic transmission policy of the first terminal device from the first policy control network element, it may further receive identification information, and the identification information is used to identify the first terminal device. Target background traffic transmission strategy. In this way, the first service network element can determine the target background traffic transmission policy of the first terminal device in the background traffic transmission policy of the first terminal device by using the identification information.
  • the first service network element may further send an identifier to the first policy control network element. information.
  • the first policy control network element can query the target background traffic transmission policy of the first terminal device from the database network element through the identification information, and subsequently send the target background traffic transmission policy of the first terminal device to the first terminal device.
  • the first service network element may send the identification information to the first policy control network element through the PDU session modification process initiated by the first terminal device, and the first policy control network element may query the database network element to obtain the first information through the identification information.
  • the target background traffic transmission policy of a terminal device and then the first policy control network element can send the target background traffic transmission policy of the first terminal device to the first terminal device, the wireless access network element, and the user through the remaining PDU Session modification process. At least one of the area network elements.
  • the first service network element may further execute: the first service network element determines that the background traffic transmission policy of the first terminal device is the first A target background traffic transmission policy of a terminal device; the first service network element sends a target background traffic transmission policy of the first terminal device to the data analysis network element.
  • the first service network element may further execute: the first service network element performs the background traffic transmission policy according to the first terminal device. A target background traffic transmission strategy of the first terminal device is selected; the first service network element sends the target background traffic transmission strategy of the first terminal device to the first policy control network element.
  • the first service network element may further send the first terminal device to the data analysis network element.
  • Target background traffic transmission strategy may be used.
  • the second information involved, the background traffic transmission strategy of the first terminal device, the analysis result of the background traffic transmission data of the first terminal device, and the target background traffic transmission strategy of the second terminal device can all refer to the figure. Relevant description in the embodiment shown in 2.
  • FIG. 5 and FIG. 6 are based on the foregoing embodiments, and take a specific example to describe in detail a method for determining a background traffic transmission policy provided by an embodiment of the present application.
  • an embodiment of the present application provides an example of a method for determining a background traffic transmission policy.
  • the first terminal device directly requests the background traffic transmission policy of the first terminal, and the terminal device is specifically a UE.
  • the policy control network element is a PCF and the data analysis network element is a NWDAF.
  • the specific process of this example can include:
  • Step 501 The UE sends first information to the AMF, and the first information is used to request a background traffic transmission policy of the UE.
  • AMF is an example of an access and mobility management function network element.
  • the AMF can also be replaced with other access and mobility management function network elements, which is not limited in this application.
  • the UE may send the first information to the AMF through the N1 message.
  • Step 502 The AMF sends the first information to the SMF.
  • the SMF is an example of a session management function network element.
  • the SMF may also be replaced with another session management function network element, which is not limited in this application.
  • the AMF may send the first information to the SMF by calling the Nsmf_PDU Session_UpdateSMContext service.
  • Step 503 The SMF sends the first information to the PCF.
  • the SMF may send the first information to the PCF by calling the Npcf_SMPolicy Control_Update service.
  • Step 504 The PCF sends second information to the NWDAF according to the first information, and the second information is used to request the background traffic transmission data analysis result of the UE.
  • Step 505 The NWDAF determines the background traffic transmission data analysis result of the UE based on the target background traffic transmission policies of other UEs.
  • the NWDAF determines the analysis result of the background traffic transmission data of the UE based on the second information and the target background traffic transmission policy of the other UE.
  • Step 506 The NWDAF sends the analysis result of the background traffic transmission data of the UE to the PCF.
  • Step 507 The PCF determines the background traffic transmission policy of the UE according to the third information, and the third information includes a result of analyzing the background traffic transmission data of the UE.
  • Step 508 The PCF sends the background traffic transmission policy of the UE to the SMF.
  • the PCF can send the background traffic transmission policy of the UE to the SMF by calling the Npcf_SMPolicy Control_Update service.
  • the PCF when the PCF sends the background traffic transmission policy of the UE to the SMF, it also sends identification information to the SMF, where the identification information is used to identify the target background traffic transmission policy of the first terminal device.
  • Step 509 The SMF sends the background traffic transmission policy of the UE to the AMF.
  • the SMF can send the UE's background traffic transmission policy to the AMF through the response of Nsmf_PDU, Session_Update, and SMContext.
  • Step 510 The AMF sends the background traffic transmission policy of the UE to the RAN.
  • the RAN is an example of an access network device.
  • the RAN may also be replaced with another access network device, which is not limited in this application.
  • the AMF may send the background traffic transmission policy of the UE to the RAN through the N2 message.
  • Step 511 The RAN sends the background traffic transmission policy of the UE to the UE.
  • the RAN may send the background traffic transmission policy of the UE to the UE through AN_specific response modification (ie, PDU session modification command / Ack).
  • AN_specific response modification ie, PDU session modification command / Ack.
  • the PCF may perform steps 512 and 513, as follows:
  • Step 512 The PCF determines that the background traffic transmission policy of the UE is the target background traffic transmission policy of the UE.
  • Step 513 The PCF sends the target background traffic transmission policy of the UE to the NWDAF.
  • the PCF when the PCF sends the target background traffic transmission policy of the UE to the NWDAF, at least one of the identification information, the identity of the PCF, and the identity of the UE may be sent to the NWDAF.
  • step 512 may be omitted, and the PCF may directly send the background traffic transmission policy of the UE to NWDAF, which is not described in detail here.
  • step 511 when there are multiple background traffic transmission policies of the UE, after step 511, there may be the following steps:
  • Step 514 The UE selects a target background traffic transmission policy of the UE according to the background traffic transmission policy of the UE.
  • Step 515 The UE sends a target background traffic transmission policy of the UE to the AMF.
  • the UE may send a target background traffic transmission policy of the UE to the AMF through a PDU Session Modification Request message.
  • Step 516 The AMF sends a target background traffic transmission policy of the UE to the SMF.
  • the AMF may call the Nsmf_PDUSession_UpdateSMContex service to send the target background traffic transmission policy of the UE to the SMF.
  • Step 517 The SMF sends a target background traffic transmission policy of the UE to the PCF.
  • the SMF can call the Npcf_SMPolicyControl_Update request service to send the target background traffic transmission policy of the UE to the PCF.
  • the UE may also send the target background traffic transmission policy of the UE to the NWDAF.
  • the UE may also send the target background traffic transmission policy of the UE to the database network element (for example, UDR). Specifically, FIG. 5 is not shown again.
  • Step 518 The PCF sends the target background traffic transmission policy of the UE to the NWDAF.
  • the PCF when the PCF sends the target background traffic transmission policy of the UE to the NWDAF, at least one of the identification information, the identity of the PCF, and the identity of the UE may be sent to the NWDAF.
  • step 518 and step 513 are the same steps.
  • two possible implementation manners are shown in terms of two aspects.
  • this embodiment of the present application provides another example of a method for determining a background traffic transmission policy.
  • a first service network element serving a first terminal device requests a background traffic transmission from the first terminal.
  • the policy is specifically described by taking the first service network element as the AF, the terminal device as the UE, the policy control network element as the PCF, and the data analysis network element as the NWDAF.
  • the specific process of this example can include:
  • Step 601 The AF sends first information to the NEF, where the first information is used to request a background traffic transmission policy of the UE.
  • NEF is an example of a network element with an open function.
  • NEF can also be replaced with another network element with an open function, which is not limited in this application.
  • the AF may send the first information to the NEF by calling the Nnef_BDTPNegotiation_Create request or Nnef_Trigger_Delivery request service.
  • Step 602 The NEF sends the first information to the PCF.
  • the NEF may send the first information to the PCF by calling the Npcf_BDTPolicyControl_Create request or Npcf_Policy Authorization_Create Request service.
  • Step 603 The PCF sends second information to the NWDAF according to the first information, and the second information is used to request the background traffic transmission data analysis result of the UE.
  • Step 604 The NWDAF determines the background traffic transmission data analysis result of the UE based on the target background traffic transmission policies of other UEs.
  • the NWDAF determines the analysis result of the background traffic transmission data of the UE based on the second information and the target background traffic transmission policy of the other UE.
  • Step 605 The NWDAF sends the analysis result of the background traffic transmission data of the UE to the PCF.
  • Step 606 The PCF determines the background traffic transmission policy of the UE according to the third information, and the third information includes a result of analyzing the background traffic transmission data of the UE.
  • Step 607 The PCF sends the background traffic transmission policy of the UE to the NEF.
  • the PCF may send the background traffic transmission policy of the UE to the NEF by calling the Npcf_BDT Policy Control Create Response or Npcf_PolicyAuthorization_Notify service.
  • the PCF when the PCF sends the background traffic transmission policy of the UE to the SMF, it also sends identification information to the SMF, where the identification information is used to identify the target background traffic transmission policy of the first terminal device.
  • Step 608 The NEF sends the background traffic transmission policy of the UE to the AF.
  • the NEF can call the Nnef_BDT, Pnegotiation_Create response, or Nnef_Trigger_Delivery response service to send the UE's background traffic transmission policy to the AF.
  • the PCF may perform steps 609 and 610, as follows:
  • Step 609 The PCF determines that the background traffic transmission policy of the UE is the target background traffic transmission policy of the UE.
  • Step 610 The PCF sends a target background traffic transmission policy of the UE to the NWDAF.
  • the PCF when the PCF sends the target background traffic transmission policy of the UE to the NWDAF, at least one of the identification information, the identity of the PCF, and the identity of the UE may be sent to the NWDAF.
  • step 609 may be omitted, and the PCF may directly send the background traffic transmission policy of the UE to NWDAF, which is not described in detail here.
  • step 608 when there are multiple background traffic transmission policies of the UE, after step 608, there may be the following steps:
  • Step 611 The AF selects the target background traffic transmission strategy of the UE according to the background traffic transmission strategy of the UE.
  • Step 612 The AF sends a target background traffic transmission policy of the UE to the NEF.
  • the AF may call the Nnef_BDTPNegotiation_Update request or Nnef_Trigger_Delivery request service to send the target background traffic transmission policy of the UE to the NEF.
  • Step 613 The NEF sends the target background traffic transmission policy and / or identification information of the UE to the PCF.
  • the NEF may call the Npcf_BDTPolicyControl_Update request or Npcf_PolicyAuthorization_Update Request service to send the target background traffic transmission policy of the UE to the PCF.
  • the AF may also send the target background traffic transmission policy of the UE to the NWDAF, or send the target background traffic transmission policy of the UE and at least one of the following: the identity of the PCF, the identity of the AF, and identification information .
  • the AF may also send the target background traffic transmission policy of the UE to the database network element (for example, UDR), or send the target background traffic transmission policy of the UE and at least one of the following: the identity of the PCF, the AF Identification, identification information.
  • the database network element for example, UDR
  • FIG. 5 is not shown again.
  • Step 614 The PCF sends the target background traffic transmission policy of the UE to the NWDAF.
  • the PCF when the PCF sends the target background traffic transmission policy of the UE to the NWDAF, at least one of the identification information, the identity of the PCF, and the identity of the UE may be sent to the NWDAF.
  • step 614 and step 610 are the same steps. For convenience, two possible implementation manners are shown here.
  • each solution of the method for determining a background traffic transmission policy provided in the embodiments of the present application is described from the perspective of interaction between each network element or device.
  • each network element and device such as the first policy control network element, the data analysis network element, the first service network element, and the first terminal device, includes a corresponding hardware structure for performing each function. And / or software modules.
  • this application can be implemented in the form of hardware or a combination of hardware and computer software. Whether a certain function is performed by hardware or computer software-driven hardware depends on the specific application and design constraints of the technical solution. A professional technician can use different methods to implement the described functions for each specific application, but such implementation should not be considered to be beyond the scope of this application.
  • a communication device for determining a background traffic transmission strategy may include a receiving module 701 and a sending module 702, and optionally may further include a processing module 703. Refer to the structure diagram shown in FIG. 7.
  • the communication device shown in FIG. 7 may be used to perform the operations of the first policy control network element in the embodiments shown in FIG. 2, FIG. 3, and FIG. Operation of the PCF in the illustrated embodiment.
  • the receiving module 701 is configured to receive first information from a requesting device, where the first information is used to request a background traffic transmission policy of the first terminal device;
  • the sending module 702 is configured to send second information to the data analysis network element according to the first information, and the second information is used to request the background traffic of the first terminal device to transmit a data analysis result;
  • the receiving module 701 is further configured to receive a background traffic transmission data analysis result of the first terminal device from the data analysis network element, where the background traffic transmission data analysis result of the first terminal device is the target background of the data analysis network element based on the second terminal device. It is determined by the traffic transmission policy that the second terminal device is different from the first terminal device, and the target background traffic transmission policy of the second terminal device is used for background traffic transmission by the second terminal device;
  • the sending module 702 is further configured to send a background traffic transmission policy of the first terminal device to the requesting device.
  • the background traffic transmission policy of the first terminal device is determined by the first policy control network element according to the third information, and the third information includes the first terminal device. Analysis results of background traffic transmission data.
  • the data analysis network element can determine the background traffic transmission data analysis result of the first terminal device based on the target background traffic transmission policies of other terminal devices (that is, the second terminal device). Furthermore, the first policy control network element can determine the background traffic transmission policy of the first terminal device, so that the background traffic transmission policy of the first terminal device determined by the first policy control network element refers to other terminal devices, so that the first policy can be made.
  • the background traffic transmission policy of the first terminal device determined by the control network element does not conflict with the background traffic transmission policies of other terminal devices, so that the problem of background traffic transmission failure can be solved.
  • the third information further includes a background traffic transmission query result of the first terminal device and / or a local background traffic transmission policy of the first terminal device.
  • the receiving module 701 is further configured to: when the third information further includes a background traffic transmission query result of the first terminal device, obtain a background traffic transmission query result of the first terminal device from a database network element. ; Or when the third information further includes a local background traffic transmission policy of the first terminal device, obtain the local background traffic transmission policy of the first terminal device from the first policy control network element; or when the third information further includes the first terminal device The background traffic transmission query result of the first terminal device and the local background traffic transmission policy of the first terminal device, obtain the background traffic transmission query result of the first terminal device from the database network element, and obtain the first terminal device from the first policy control network element. Local background traffic transmission policy.
  • the processing module 703 is configured to determine that the background traffic transmission policy of the first terminal device is a target background traffic transmission policy of the first terminal device.
  • the target background traffic transmission strategy of the first terminal device is used for the background traffic transmission of the first terminal device;
  • the sending module 702 is further configured to send the target background traffic transmission strategy of the first terminal device to the data analysis network element and / or the database network element. .
  • the receiving module 701 is further configured to receive a target background traffic transmission policy of the first terminal device from the requesting device.
  • the first terminal device The target background traffic transmission strategy is selected by the requesting device according to the background traffic transmission strategy of the first terminal device; the sending module 702 is further configured to send the target background traffic transmission strategy of the first terminal device to the data analysis network element and / or the database network element. .
  • the requesting device is a first terminal device or a service network element serving the first terminal device.
  • the analysis result of the background traffic transmission data includes: the first data value of the transmission time window of the background traffic; the analysis result of the background traffic transmission data analysis further includes: the first data value of the transmission bandwidth of the background traffic, At least one of location information of the first terminal device and an identifier of the first terminal device.
  • the background traffic transmission strategy includes: the second data value of the transmission time window of the background traffic; the background traffic transmission strategy further includes: the second data value of the transmission bandwidth of the background traffic, and the first terminal device. At least one of location information of the mobile terminal and the identifier of the first terminal device.
  • the second information includes the magnitude of the background traffic of the first terminal device; the second information further includes the identification of the first policy control network element, the identification of the requesting device, and the first terminal device. At least one of the third data value of the transmission time window of the background traffic, the location information of the first terminal device, and the identifier of the first terminal device.
  • the first information includes the magnitude of the background traffic of the first terminal device; the first information further includes an identifier of the requesting device, and a first time interval of the transmission time window of the background traffic of the first terminal device. At least one of three data values, location information of the first terminal device, and an identifier of the first terminal device.
  • the query result of the background traffic transmission includes: a fourth data value of the transmission time window of the background traffic; the query result of the background traffic transmission further includes: a fourth data value of the transmission bandwidth of the background traffic, the first At least one of location information of the terminal device and an identifier of the first terminal device.
  • the local background traffic transmission strategy includes: a fifth data value of a transmission time window of the background traffic; the local background traffic transmission result further includes: a fifth data value of the transmission bandwidth of the background traffic, the first At least one of location information of the terminal device and an identifier of the first terminal device.
  • the sending module 702 when the sending module 702 sends the background traffic transmission policy of the first terminal device to the requesting device, the sending module 702 is further configured to send identification information to the requesting device, and the identification information is used to identify the first terminal device.
  • Target background traffic transmission strategy when the sending module 702 sends the background traffic transmission policy of the first terminal device to the requesting device, the sending module 702 is further configured to send identification information to the requesting device, and the identification information is used to identify the first terminal device.
  • Target background traffic transmission strategy when the sending module 702 sends the background traffic transmission policy of the first terminal device to the requesting device.
  • the sending module 702 when the sending module 702 sends the target background traffic transmission policy of the first terminal device to the data analysis network element and / or the database network element, the sending module 702 is further configured to send the data analysis network element and / or Or, the database network element sends at least one of identification information, an identification of the requesting device, and an identification of the first policy control network element.
  • the receiving module 701 is further configured to receive the identification information from the requesting device after the sending module 702 sends the background traffic transmission policy of the first terminal device to the requesting device.
  • the sending module 702 and optionally the processing module 703 in the communication device for determining a background traffic transmission policy other operations or functions of the first policy control network element in the foregoing method may be implemented. I will not repeat them here.
  • the communication device shown in FIG. 7 may be further configured to perform operations of the first terminal device in the embodiment shown in FIG. 3 described above, and to perform operations of the UE in the embodiment shown in FIG. 5 described above. operating.
  • the sending module 702 is configured to send first information to a first policy control network element, where the first information is used to request a background traffic transmission policy of the first terminal device;
  • the receiving module 701 is configured to receive a background traffic transmission policy of a first terminal device from a first policy control network element, where the background traffic transmission policy of the first terminal device is determined by the first policy control network element according to the third information, and the third information An analysis result of background traffic transmission data including the first terminal device from the data analysis network element.
  • the background traffic transmission policy of the first terminal device is determined by the first policy control network element according to the third information, and the third information includes the first terminal device from the data analysis network element.
  • Analysis result of background traffic transmission data so that the background traffic transmission strategy of the first terminal device determined by the first policy control network element refers to other terminal equipment, so that the background traffic transmission strategy of the first terminal device can be transmitted to other terminal equipment.
  • the background traffic transmission strategy does not conflict, which can solve the problem of background traffic transmission failure.
  • the third information further includes a background traffic transmission query result of the first terminal device and / or a local background traffic transmission policy of the first terminal device.
  • the processing module 703 is configured to determine that the background traffic transmission policy of the first terminal device is a target background traffic transmission policy of the first terminal device.
  • the processing module 703 is further configured to select a target background traffic of the first terminal device according to the background traffic transmission policy of the first terminal device when there are multiple background traffic transmission policies of the first terminal device. Transmission policy; the sending module 702 is further configured to send a target background traffic transmission policy of the first terminal device to the first policy control network element.
  • the sending module 702 is further configured to send a target background traffic transmission policy of the first terminal device to the data analysis network element.
  • the analysis result of the background traffic transmission data includes: the first data value of the transmission time window of the background traffic; the analysis result of the background traffic transmission data analysis further includes: the first data value of the transmission bandwidth of the background traffic, At least one of location information of the first terminal device and an identifier of the first terminal device.
  • the background traffic transmission strategy includes: the second data value of the transmission time window of the background traffic; the background traffic transmission strategy further includes: the second data value of the transmission bandwidth of the background traffic, and the first terminal device. At least one of location information of the mobile terminal and the identifier of the first terminal device.
  • the first information includes the magnitude of the background traffic of the first terminal device; the first information further includes the third data value of the transmission time window of the background traffic of the first terminal device, At least one of location information and identification.
  • the query result of the background traffic transmission includes: a fourth data value of the transmission time window of the background traffic; the query result of the background traffic transmission further includes: a fourth data value of the transmission bandwidth of the background traffic, the first At least one of location information of the terminal device and an identifier of the first terminal device.
  • the local background traffic transmission strategy includes: a fifth data value of a transmission time window of the background traffic; the local background traffic transmission result further includes: a fifth data value of the transmission bandwidth of the background traffic, the first At least one of location information of the terminal device and an identifier of the first terminal device.
  • the receiving module 701 before the sending module 702 sends the first information to the first policy control network element, the receiving module 701 is further configured to obtain the magnitude of the background traffic of the first terminal device from the first service network element: The receiving module 701 is further configured to further acquire, from the first service network element, at least one of a third data value, location information, and identifier of a transmission time window of the background traffic of the first terminal device.
  • the receiving module 701 when the receiving module 701 receives the background traffic transmission policy of the first terminal device, the receiving module 701 is further configured to receive identification information from the first policy control network element, and the identification information is used to identify the first The target background traffic transmission policy of the terminal device.
  • the sending module 702 is further configured to send identification information to the first policy control network element.
  • the communication device shown in FIG. 7 may be further configured to perform the operation of the first service network element in the embodiment shown in FIG. 4 and to perform AF in the embodiment shown in FIG. 6. Operation.
  • a sending module 702 configured to send first information to a first policy control network element, where the first information is used to request a background traffic transmission policy of the first terminal device;
  • the receiving module 701 is configured to receive a background traffic transmission policy of a first terminal device from a first policy control network element.
  • the background traffic transmission policy of the first terminal device is determined by the first policy control network element according to the third information.
  • the information includes a background traffic transmission data analysis result from the first terminal device of the data analysis network element.
  • the background traffic transmission policy of the first terminal device is determined by the first policy control network element according to the third information, and the third information includes the first terminal device from the data analysis network element.
  • Analysis result of background traffic transmission data so that the background traffic transmission strategy of the first terminal device determined by the first policy control network element refers to other terminal equipment, so that the background traffic transmission strategy of the first terminal device can be transmitted to other terminal equipment.
  • the background traffic transmission strategy does not conflict, which can solve the problem of background traffic transmission failure.
  • the third information further includes a background traffic transmission query result of the first terminal device and / or a local background traffic transmission policy of the first terminal device.
  • the processing module 703 is configured to determine that the background traffic transmission policy of the first terminal device is a target background traffic transmission policy of the first terminal device.
  • the processing module 703 is further configured to select the target background traffic of the first terminal device according to the background traffic transmission policies of the first terminal device. Transmission policy; the sending module 702 is further configured to send a target background traffic transmission policy of the first terminal device to the first policy control network element.
  • the sending module 702 is further configured to send a target background traffic transmission policy of the first terminal device to the data analysis network element.
  • the analysis result of the background traffic transmission data includes: the first data value of the transmission time window of the background traffic; the analysis result of the background traffic transmission data analysis further includes: the first data value of the transmission bandwidth of the background traffic, At least one of location information of the first terminal device and an identifier of the first terminal device.
  • the background traffic transmission strategy includes: the second data value of the transmission time window of the background traffic; the background traffic transmission strategy further includes: the second data value of the transmission bandwidth of the background traffic, and the first terminal device. At least one of location information of the mobile terminal and the identifier of the first terminal device.
  • the first information includes the magnitude of the background traffic of the first terminal device; the first information further includes an identifier of the first service network element and a transmission time of the background traffic of the first terminal device. At least one of a third data value of the window, location information of the first terminal device, and an identifier of the first terminal device.
  • the query result of the background traffic transmission includes: a fourth data value of the transmission time window of the background traffic; the query result of the background traffic transmission further includes: a fourth data value of the transmission bandwidth of the background traffic, the first At least one of location information of the terminal device and an identifier of the first terminal device.
  • the local background traffic transmission strategy includes: a fifth data value of a transmission time window of the background traffic; the local background traffic transmission result further includes: a fifth data value of the transmission bandwidth of the background traffic, the first At least one of location information of the terminal device and an identifier of the first terminal device.
  • the receiving module 701 before the sending module 702 sends the first information to the first policy control network element, the receiving module 701 is further configured to obtain the size of the background traffic of the first terminal device from the first terminal device; The receiving module 701 also obtains, from the first terminal device, the identifier of the first service network element, the third data value of the transmission time window of the background traffic of the first terminal device, the location information of the first terminal device, and the identifier of the first terminal device. At least one.
  • the receiving module 701 when the receiving module 701 receives the background traffic transmission policy of the first terminal device from the first policy control network element, the receiving module 701 is further configured to receive identification information from the first policy control network element. The information is used to identify a target background traffic transmission policy of the first terminal device.
  • the sending module 702 is further configured to send the identification information to the first policy control network element after the receiving module 701 receives the background traffic transmission policy of the first terminal device from the first policy control network element.
  • the communication device for determining a background traffic transmission strategy may further include a receiving module 801 and a sending module 802.
  • a receiving module 801 may further include a sending module 802.
  • the communication device shown in FIG. 8 may be used to perform the operations of the data analysis network element in the embodiments shown in FIG. 2, FIG. 3, and FIG. 4, and may be used to perform the operations shown in FIG. 5 and FIG. 6.
  • the receiving module 801 is configured to receive second information from a first policy control network element, the second information is used to request a background traffic transmission data analysis result of the first terminal device, and the second information is received by the first policy control network element from the requesting device.
  • the first information determines that the first information is used to request a background traffic transmission policy of the first terminal device;
  • the sending module 802 is configured to send a background traffic transmission data analysis result of the first terminal device to the first policy control network element, and the background traffic transmission data analysis result of the first terminal device is analyzed by the data analysis network element based on the target background traffic of the second terminal device.
  • the transmission policy determines that the second terminal device is different from the first terminal device, and the target background traffic transmission policy of the second terminal device is used for the background traffic transmission of the second terminal device.
  • the analysis result of the background traffic transmission data of the first terminal device is determined based on the target background traffic transmission policies of the other terminal devices (that is, the second terminal device), thereby enabling the first strategy
  • the control network element determines a background traffic transmission policy of the first terminal device, so that the background traffic transmission policy of the first terminal device determined by the first policy control network element can refer to other terminal devices, so that the first policy control network element can determine
  • the background traffic transmission policy of the first terminal device does not conflict with the background traffic transmission policies of other terminal devices, thereby solving the problem of background traffic transmission failure.
  • the background traffic transmission data analysis result of the first terminal device may be further analyzed by the data analysis network element based on the target background traffic transmission policy and the second information of the second terminal device, and the load of the functional network element. Determined by the information and / or capacity information of the functional network element.
  • the receiving module 801 is further configured to obtain a target background traffic transmission policy of the second terminal device.
  • the receiving module 801 is specifically configured to receive the target background traffic transmission policy of the second terminal device from the first device when acquiring the target background traffic transmission policy of the second terminal device, where the first device Any one or more of the following: a second terminal device, a first policy control network element, a second policy control network element, a second service network element, and a second database network element, wherein the first policy control network element, the first The two policy control network elements, the second service network element, and the second database network element serve the second terminal device.
  • the receiving module 801 is further configured to obtain load information of a functional network element; or the receiving module 801 is further configured to obtain capacity information of a functional network element; or the receiving module 801 is further configured to obtain a functional network element Element load information and functional network element capacity information.
  • the receiving module 801 is specifically configured to: when receiving the load information of the functional network element: receive the load information of the functional network element from the functional network element or the operation management and maintenance network element; or the receiving module 801 is acquiring
  • the capacity information of the functional network element is specifically used to receive the capacity information of the functional network element from the functional network element or the operation management and maintenance network element; or the receiving module 801 is specifically used to obtain the load information of the functional network element and the capacity information of the functional network element. It can be used to receive the load information of the functional network element and the capacity information of the functional network element from the functional network element or the operation management and maintenance network element.
  • the functional network element includes a first policy control network element serving a first terminal device, a session management function network element, a radio access network network element, and an access and mobility management function network element. 2. At least one of the user plane function network elements.
  • the receiving module 801 is further configured to receive a target background traffic transmission policy of the first terminal device, where the first terminal device performs background traffic transmission according to the target background traffic transmission policy of the first terminal device.
  • the receiving module 801 is specifically configured to receive the target background traffic transmission policy of the first terminal device from the second device when receiving the target background traffic transmission policy of the first terminal device.
  • the two devices are any one or more of the following: a first terminal device, a first policy control network element, a first service network element, and a first database network element, wherein the first policy control network element, the first service network element, The first database network element serves a first terminal device.
  • the receiving module 801 when the receiving module 801 receives the target background traffic transmission policy of the first terminal device, the receiving module 801 is further configured to receive the identifier of the requesting device, or is further configured to receive the first policy control network element.
  • the identification or is also used to receive the identification of the requesting device and the identification of the first policy control network element.
  • the analysis result of the background traffic transmission data includes: the first data value of the transmission time window of the background traffic; the analysis result of the background traffic transmission data analysis further includes: the first data value of the transmission bandwidth of the background traffic, At least one of location information of the first terminal device and an identifier of the first terminal device.
  • the background traffic transmission strategy includes: the second data value of the transmission time window of the background traffic; the background traffic transmission strategy further includes: the second data value of the transmission bandwidth of the background traffic, and the first terminal device. At least one of location information of the mobile terminal and the identifier of the first terminal device.
  • the second information includes the magnitude of the background traffic of the first terminal device; the second information further includes the identity of the first policy control network element, the identity of the requesting device, and the identity of the first terminal device. At least one of a third data value of a transmission time window of the background traffic, location information of the first terminal device, and an identifier of the first terminal device.
  • the first information includes the magnitude of the background traffic of the first terminal device; the first information further includes a request device identifier, and a third time window of the transmission time window of the background traffic of the first terminal device. At least one of a data value, location information of the first terminal device, and an identifier of the first terminal device.
  • the division of the units or modules in the embodiments of the present application is schematic, and is only a logical function division. In actual implementation, there may be another division manner.
  • the functional units in the embodiments of the present application may be integrated into one processing unit, or each of the units may exist separately physically, or two or more units may be integrated into one unit.
  • the above integrated unit may be implemented in the form of hardware or in the form of software functional unit.
  • the integrated unit When the integrated unit is implemented in the form of a software functional unit and sold or used as an independent product, it can be stored in a computer-readable storage medium.
  • the technical solution of the present application is essentially a part that contributes to the existing technology or all or part of the technical solution can be embodied in the form of a software product, which is stored in a storage medium It includes several instructions to enable a computer device (which may be a personal computer, a server, or a network device, etc.) or a processor to perform all or part of the steps of the methods in the embodiments of the present application.
  • the aforementioned storage media include: U disks, mobile hard disks, read-only memories (ROM), random access memories (RAM), magnetic disks or optical disks, and other media that can store program codes .
  • the communication device for determining a background traffic transmission strategy may include a transceiver 901 and a processor 902, and optionally may further include a memory 903.
  • the communication device for determining a background traffic transmission strategy may include a transceiver 901 and a processor 902, and optionally may further include a memory 903.
  • Figure 9 shows the structure.
  • the processor 902 may be a central processing unit (CPU), a network processor (NP), a combination of a CPU and an NP, and so on.
  • the processor 902 may further include a hardware chip.
  • the above hardware chip may be an application-specific integrated circuit (ASIC), a programmable logic device (PLD), or a combination thereof.
  • the PLD may be a complex programmable logic device (CPLD), a field-programmable gate array (FPGA), a generic array logic (GAL), or any combination thereof.
  • CPLD complex programmable logic device
  • FPGA field-programmable gate array
  • GAL generic array logic
  • the transceiver 901 and the processor 902 are connected to each other.
  • the transceiver 901 and the processor 902 are connected to each other through a bus 904;
  • the bus 904 may be a Peripheral Component Interconnect (PCI) bus or an Extended Industry Standard Architecture (EISA) bus, etc. .
  • PCI Peripheral Component Interconnect
  • EISA Extended Industry Standard Architecture
  • the bus can be divided into an address bus, a data bus, a control bus, and the like. For ease of representation, only a thick line is used in FIG. 9, but it does not mean that there is only one bus or one type of bus.
  • the communication device shown in FIG. 9 may be used to perform the operations of the first policy control network element in the embodiments shown in FIG. 2, FIG. 3, and FIG. 4, and may also be used to execute the above-mentioned FIG. 5 and FIG. The operation of the PCF in the embodiment shown in 6.
  • the transceiver 901 is configured to implement communication interaction with other devices connected to the first policy control network element (such as a PCF), that is, to receive and send data;
  • the first policy control network element such as a PCF
  • the processor 902 is configured to control the transceiver 901 to receive first information from the requesting device, and the first information is used to request a background traffic transmission policy of the first terminal device;
  • the control transceiver 901 sends second information to the data analysis network element according to the first information, and the second information is used to request the background traffic of the first terminal device to transmit a data analysis result;
  • the control transceiver 901 receives the background traffic transmission data analysis result of the first terminal device from the data analysis network element, wherein the background traffic transmission data analysis result of the first terminal device is that the data analysis network element transmits the target background traffic based on the second terminal device.
  • the policy determines that the second terminal device is different from the first terminal device, and the target background traffic transmission policy of the second terminal device is used for the background traffic transmission of the second terminal device;
  • the control transceiver 901 sends the background traffic transmission policy of the first terminal device to the requesting device.
  • the background traffic transmission policy of the first terminal device is determined by the first policy control network element according to the third information, and the third information includes the background of the first terminal device. Traffic transmission data analysis results.
  • the data analysis network element can determine the background traffic transmission data analysis result of the first terminal device based on the target background traffic transmission policies of other terminal devices (that is, the second terminal device). Furthermore, the first policy control network element can determine the background traffic transmission policy of the first terminal device, so that the background traffic transmission policy of the first terminal device determined by the first policy control network element refers to other terminal devices, so that the first policy can be made.
  • the background traffic transmission policy of the first terminal device determined by the control network element does not conflict with the background traffic transmission policies of other terminal devices, so that the problem of background traffic transmission failure can be solved.
  • the third information further includes a background traffic transmission query result of the first terminal device and / or a local background traffic transmission policy of the first terminal device.
  • processor 902 is further configured to:
  • the control transceiver 901 obtains the background traffic transmission query result of the first terminal device from the database network element; or when the third information further includes the first terminal device When the local background traffic transmission policy is used, the control transceiver 901 obtains the local background traffic transmission policy of the first terminal device from the first policy control network element; or, when the third information further includes a background traffic transmission query result of the first terminal device and When the local background traffic transmission policy of the first terminal device is used, the control transceiver 901 obtains the background traffic transmission query result of the first terminal device from the database network element, and the control transceiver obtains the first terminal device from the first policy control network element. Local background traffic transmission policy.
  • the processor 902 is further configured to determine that the background traffic transmission policy of the first terminal device is a target background traffic transmission of the first terminal device.
  • the target background traffic transmission policy of the first terminal device is used for the background traffic transmission of the first terminal device; the control transceiver 901 sends the target background traffic transmission policy of the first terminal device to the data analysis network element and / or the database network element.
  • the processor 902 is further configured to control the transceiver 901 to receive the target background traffic transmission policies of the first terminal device from the requesting device.
  • the target background traffic transmission policy of the first terminal device is selected by the requesting device according to the background traffic transmission policy of the first terminal device; the control transceiver 901 sends the target background traffic of the first terminal device to the data analysis network element and / or the database network element. Transmission strategy.
  • the requesting device is a first terminal device or a service network element serving the first terminal device.
  • the analysis result of the background traffic transmission data includes: the first data value of the transmission time window of the background traffic; the analysis result of the background traffic transmission data analysis further includes: the first data value of the transmission bandwidth of the background traffic, At least one of location information of the first terminal device and an identifier of the first terminal device.
  • the background traffic transmission strategy includes: the second data value of the transmission time window of the background traffic; the background traffic transmission strategy further includes: the second data value of the transmission bandwidth of the background traffic, and the first terminal device. At least one of location information of the mobile terminal and the identifier of the first terminal device.
  • the second information includes the magnitude of the background traffic of the first terminal device; the second information further includes the identification of the first policy control network element, the identification of the requesting device, and the first terminal device. At least one of the third data value of the transmission time window of the background traffic, the location information of the first terminal device, and the identifier of the first terminal device.
  • the first information includes the magnitude of the background traffic of the first terminal device; the first information further includes an identifier of the requesting device, and a first time interval of the transmission time window of the background traffic of the first terminal device. At least one of three data values, location information of the first terminal device, and an identifier of the first terminal device.
  • the query result of the background traffic transmission includes: a fourth data value of the transmission time window of the background traffic; the query result of the background traffic transmission further includes: a fourth data value of the transmission bandwidth of the background traffic, the first At least one of location information of the terminal device and an identifier of the first terminal device.
  • the local background traffic transmission strategy includes: a fifth data value of a transmission time window of the background traffic; the local background traffic transmission result further includes: a fifth data value of the transmission bandwidth of the background traffic, the first At least one of location information of the terminal device and an identifier of the first terminal device.
  • the processor 902 is further configured to send identification information to the requesting device when the control transceiver 901 sends the background traffic transmission policy of the first terminal device to the requesting device, and the identification information is used to identify the first A target background traffic transmission policy for a terminal device.
  • the processor 902 is further configured to: when the control transceiver 901 sends the target background traffic transmission policy of the first terminal device to the data analysis network element and / or the database network element, to the data analysis network element The element and / or the database network element sends at least one of identification information, an identification of the requesting device, and an identification of the first policy control network element.
  • the processor 902 is further configured to receive the identification information from the requesting device after the control transceiver 901 sends the background traffic transmission policy of the first terminal device to the requesting device.
  • the memory 903 is coupled to the processor 902 and is configured to store a program and the like.
  • the program may include program code, where the program code includes a computer operation instruction.
  • the memory 903 may include a RAM, and may also include a non-volatile memory (non-volatile memory), for example, at least one magnetic disk memory.
  • the processor 902 executes the application program stored in the memory 903 to implement the above functions, thereby implementing the method for determining a background traffic transmission policy as shown in FIG. 2, FIG. 3, FIG. 4, FIG. 5, and FIG. 6.
  • the communication device shown in FIG. 9 may be used to perform the operations of the data analysis network element in the embodiments shown in FIG. 2, FIG. 3, and FIG. 4, and may also be used to execute the foregoing FIG. 5 and FIG. 6. Operation of NWDAF in the illustrated embodiment. E.g:
  • the transceiver 901 is configured to implement communication interaction with other devices connected to a data analysis network element (such as NWDAF), that is, to receive and send data;
  • NWDAF data analysis network element
  • the processor 902 is configured to control the transceiver 901 to receive the second information from the first policy control network element, the second information is used to request the background traffic transmission data analysis result of the first terminal device, and the second information is sent by the first policy control network element from The first information received by the requesting device is determined, and the first information is used to request a background traffic transmission policy of the first terminal device;
  • the control transceiver 901 sends the background traffic transmission data analysis result of the first terminal device to the first policy control network element, and the background traffic transmission data analysis result of the first terminal device is transmitted by the data analysis network element based on the target background traffic of the second terminal device.
  • the policy determines that the second terminal device is different from the first terminal device, and the target background traffic transmission policy of the second terminal device is used for the background traffic transmission of the second terminal device.
  • the analysis result of the background traffic transmission data of the first terminal device is determined based on the target background traffic transmission policies of the other terminal devices (that is, the second terminal device), thereby enabling the first strategy
  • the control network element determines a background traffic transmission policy of the first terminal device, so that the background traffic transmission policy of the first terminal device determined by the first policy control network element can refer to other terminal devices, so that the first policy control network element can determine
  • the background traffic transmission policy of the first terminal device does not conflict with the background traffic transmission policies of other terminal devices, thereby solving the problem of background traffic transmission failure.
  • the background traffic transmission data analysis result of the first terminal device may be further analyzed by the data analysis network element based on the target background traffic transmission policy and the second information of the second terminal device, and the load of the functional network element. Determined by the information and / or capacity information of the functional network element.
  • the processor 902 is further configured to control the transceiver 901 to obtain a target background traffic transmission policy of the second terminal device.
  • the processor 902 when the processor 902 controls the transceiver 901 to obtain the target background traffic transmission policy of the second terminal device, the processor 902 is specifically configured to control the transceiver 901 to receive the target of the second terminal device from the first device.
  • Background traffic transmission policy where the first device is any one or more of the following: a second terminal device, a first policy control network element, a second policy control network element, a second service network element, and a second database network element, where The first policy control network element, the second policy control network element, the second service network element, and the second database network element serve the second terminal device.
  • the processor 902 is further configured to control the transceiver 901 to obtain load information of the functional network element; or it is also configured to control the transceiver 901 to obtain capacity information of the functional network element; or The control transceiver 901 obtains load information of the functional network element and capacity information of the functional network element.
  • the processor 902 is specifically configured to: when controlling the transceiver 901 to obtain the load information of the functional network element, receive the load information of the functional network element from the functional network element or the operation management and maintenance network element; or The processor 902 is specifically configured to: when controlling the transceiver 901 to obtain the capacity information of the functional network element, receive the capacity information of the functional network element from the functional network element or the operation management and maintenance network element; or the processor 902 is obtained at the control transceiver 901
  • the load information of the functional network element and the capacity information of the functional network element may be specifically used to receive the load information of the functional network element and the capacity information of the functional network element from the functional network element or the operation management and maintenance network element.
  • the functional network element includes a first policy control network element serving a first terminal device, a session management function network element, a radio access network network element, and an access and mobility management function network element. 2. At least one of the user plane function network elements.
  • the processor 902 is further configured to control the transceiver 901 to receive the target background traffic transmission policy of the first terminal device, where the first terminal device performs the background according to the target background traffic transmission policy of the first terminal device. Traffic transmission.
  • the processor 902 when the processor 902 controls the transceiver 901 to receive the target background traffic transmission policy of the first terminal device, the processor 902 is specifically configured to control the transceiver 901 to receive the target of the first terminal device from the second device.
  • Background traffic transmission policy where the second device is any one or more of the following: a first terminal device, a first policy control network element, a first service network element, and a first database network element, wherein the first policy control network The first service network element and the first database network element serve the first terminal device.
  • the processor 902 when the processor 902 controls the transceiver 901 to receive the target background traffic transmission policy of the first terminal device, the processor 902 is further used to control the transceiver 901 to receive the identifier of the requesting device, or is also used to control the transceiver.
  • the receiver 901 receives the identity of the first policy control network element, or is further configured to control the transceiver 901 to receive the identity of the requesting device and the identity of the first policy control network element.
  • the analysis result of the background traffic transmission data includes: the first data value of the transmission time window of the background traffic; the analysis result of the background traffic transmission data analysis further includes: the first data value of the transmission bandwidth of the background traffic, At least one of location information of the first terminal device and an identifier of the first terminal device.
  • the background traffic transmission strategy includes: the second data value of the transmission time window of the background traffic; the background traffic transmission strategy further includes: the second data value of the transmission bandwidth of the background traffic, and the first terminal device. At least one of location information of the mobile terminal and the identifier of the first terminal device.
  • the second information includes the magnitude of the background traffic of the first terminal device; the second information further includes the identity of the first policy control network element, the identity of the requesting device, and the identity of the first terminal device. At least one of a third data value of a transmission time window of the background traffic, location information of the first terminal device, and an identifier of the first terminal device.
  • the first information includes the magnitude of the background traffic of the first terminal device; the first information further includes a request device identifier, and a third time window of the transmission time window of the background traffic of the first terminal device. At least one of a data value, location information of the first terminal device, and an identifier of the first terminal device.
  • the memory 903 is coupled to the processor 902 and is configured to store a program and the like.
  • the program may include program code, where the program code includes a computer operation instruction.
  • the memory 903 may include a RAM, and may also include a non-volatile memory (non-volatile memory), for example, at least one magnetic disk memory.
  • the processor 902 executes the application program stored in the memory 903 to implement the above functions, thereby implementing the method for determining a background traffic transmission policy as shown in FIG. 2, FIG. 3, FIG. 4, FIG. 5, and FIG. 6.
  • the communication device shown in FIG. 9 may be used to perform the operation of the first terminal device in the embodiment shown in FIG. 3 described above, and may also be used to perform the operation of the UE in the embodiment shown in FIG. 5 described above. operating.
  • the transceiver 901 is configured to implement communication interaction with other devices connected to the first terminal device (for example, UE), that is, to receive and send data;
  • the first terminal device for example, UE
  • the processor 902 is configured to control the transceiver 901 to send first information to the first policy control network element, and the first information is used to request a background traffic transmission policy of the first terminal device;
  • the control transceiver 901 receives the background traffic transmission policy of the first terminal device from the first policy control network element, where the background traffic transmission policy of the first terminal device is determined by the first policy control network element according to the third information, and the third information includes Analysis result of background traffic transmission data from the first terminal device of the data analysis network element.
  • the background traffic transmission policy of the first terminal device is determined by the first policy control network element according to the third information, and the third information includes the first terminal device from the data analysis network element.
  • Analysis result of background traffic transmission data so that the background traffic transmission strategy of the first terminal device determined by the first policy control network element refers to other terminal equipment, so that the background traffic transmission strategy of the first terminal device can be transmitted to other terminal equipment.
  • the background traffic transmission strategy does not conflict, which can solve the problem of background traffic transmission failure.
  • the third information further includes a background traffic transmission query result of the first terminal device and / or a local background traffic transmission policy of the first terminal device.
  • the processor 902 is further configured to determine that the background traffic transmission policy of the first terminal device is a target background traffic transmission of the first terminal device. Policy; the control transceiver 901 sends a target background traffic transmission policy of the first terminal device to the data analysis network element.
  • the processor 902 is further configured to select a target background traffic of the first terminal device according to the background traffic transmission policies of the first terminal device. Transmission policy; the control transceiver 901 sends a target background traffic transmission policy of the first terminal device to the first policy control network element.
  • the processor 902 is further configured to control the transceiver to send a target background traffic transmission policy of the first terminal device to the data analysis network element.
  • the analysis result of the background traffic transmission data includes: the first data value of the transmission time window of the background traffic; the analysis result of the background traffic transmission data analysis further includes: the first data value of the transmission bandwidth of the background traffic, At least one of location information of the first terminal device and an identifier of the first terminal device.
  • the background traffic transmission strategy includes: the second data value of the transmission time window of the background traffic; the background traffic transmission strategy further includes: the second data value of the transmission bandwidth of the background traffic, and the first terminal device. At least one of location information of the mobile terminal and the identifier of the first terminal device.
  • the first information includes the magnitude of the background traffic of the first terminal device; the first information further includes the third data value of the transmission time window of the background traffic of the first terminal device, At least one of location information and identification.
  • the query result of the background traffic transmission includes: a fourth data value of the transmission time window of the background traffic; the query result of the background traffic transmission further includes: a fourth data value of the transmission bandwidth of the background traffic, the first At least one of location information of the terminal device and an identifier of the first terminal device.
  • the local background traffic transmission strategy includes: a fifth data value of a transmission time window of the background traffic; the local background traffic transmission result further includes: a fifth data value of the transmission bandwidth of the background traffic, the first At least one of location information of the terminal device and an identifier of the first terminal device.
  • the processor 902 before the processor 902 controls the transceiver 901 to send the first information to the first policy control network element, the processor 902 is further configured to control the transceiver 901 to obtain the first information from the first service network element.
  • the control transceiver 901 For the terminal device: the size of the background traffic; the control transceiver 901 also obtains, from the first service network element, at least one of the third data value, location information, and identification of the transmission time window of the background traffic for the first terminal device.
  • the processor 902 when the processor 902 controls the transceiver 901 to receive the background traffic transmission policy of the first terminal device, the processor 902 is further configured to receive identification information from the first policy control network element, and the identification information is used to identify the first A target background traffic transmission policy for a terminal device.
  • the processor 902 controls the transceiver 901 to receive the background traffic transmission policy of the first terminal device from the first policy control network element, the processor 902 is further configured to send the identification information to the first policy control network element.
  • the memory 903 is coupled to the processor 902 and is configured to store a program and the like.
  • the program may include program code, where the program code includes a computer operation instruction.
  • the memory 903 may include a RAM, and may also include a non-volatile memory (non-volatile memory), for example, at least one magnetic disk memory.
  • the processor 902 executes an application program stored in the memory 903 to implement the foregoing functions, thereby implementing a method for determining a background traffic transmission policy as shown in FIG. 3 and FIG. 5.
  • the communication device shown in FIG. 9 may be used to perform the operation of the first service network element in the embodiment shown in FIG. 4, and may also be used to execute the AF in the embodiment shown in FIG. 6. Operation.
  • the transceiver 901 is configured to implement communication interaction with other devices connected to the first service network element (for example, AF), that is, to receive and send data;
  • the first service network element for example, AF
  • the processor 902 is configured to control the transceiver 901 to send first information to the first policy control network element, and the first information is used to request a background traffic transmission policy of the first terminal device; and the control transceiver 901 receives the first information from the first policy control network element.
  • a background traffic transmission policy of a terminal device wherein the background traffic transmission policy of the first terminal device is determined by the first policy control network element according to the third information, and the third information includes the background traffic of the first terminal device from the data analysis network element Transfer data analysis results.
  • the background traffic transmission policy of the first terminal device is determined by the first policy control network element according to the third information, and the third information includes the first terminal device from the data analysis network element.
  • Analysis result of background traffic transmission data so that the background traffic transmission strategy of the first terminal device determined by the first policy control network element refers to other terminal equipment, so that the background traffic transmission strategy of the first terminal device can be transmitted to other terminal equipment.
  • the background traffic transmission strategy does not conflict, which can solve the problem of background traffic transmission failure.
  • the third information further includes a background traffic transmission query result of the first terminal device and / or a local background traffic transmission policy of the first terminal device.
  • the processor 902 is further configured to determine that the background traffic transmission policy of the first terminal device is a target background traffic transmission of the first terminal device. Policy; the control transceiver sends a target background traffic transmission policy of the first terminal device to the data analysis network element.
  • the processor 902 is further configured to select a target background traffic of the first terminal device according to the background traffic transmission policies of the first terminal device. Transmission policy; the control transceiver 901 sends a target background traffic transmission policy of the first terminal device to the first policy control network element.
  • the processor 902 is further configured to control the transceiver 901 to send a target background traffic transmission policy of the first terminal device to the data analysis network element.
  • the analysis result of the background traffic transmission data includes: the first data value of the transmission time window of the background traffic; the analysis result of the background traffic transmission data analysis further includes: the first data value of the transmission bandwidth of the background traffic, At least one of location information of the first terminal device and an identifier of the first terminal device.
  • the background traffic transmission strategy includes: the second data value of the transmission time window of the background traffic; the background traffic transmission strategy further includes: the second data value of the transmission bandwidth of the background traffic, and the first terminal device. At least one of location information of the mobile terminal and the identifier of the first terminal device.
  • the first information includes the magnitude of the background traffic of the first terminal device; the first information further includes an identifier of the first service network element and a transmission time of the background traffic of the first terminal device. At least one of a third data value of the window, location information of the first terminal device, and an identifier of the first terminal device.
  • the query result of the background traffic transmission includes: a fourth data value of the transmission time window of the background traffic; the query result of the background traffic transmission further includes: a fourth data value of the transmission bandwidth of the background traffic, the first At least one of location information of the terminal device and an identifier of the first terminal device.
  • the local background traffic transmission strategy includes: a fifth data value of a transmission time window of the background traffic; the local background traffic transmission result further includes: a fifth data value of the transmission bandwidth of the background traffic, the first At least one of location information of the terminal device and an identifier of the first terminal device.
  • the processor 902 before the processor 902 controls the transceiver 901 to send the first information to the first policy control network element, the processor 902 is further configured to control the transceiver 901 to obtain the first terminal from the first terminal device.
  • the processor 902 when the processor 902 controls the transceiver 901 to receive the background traffic transmission policy of the first terminal device from the first policy control network element, the processor 902 is further configured to receive identification information from the first policy control network element. The identification information is used to identify a target background traffic transmission policy of the first terminal device.
  • the processor 902 is further configured to send the identification information to the first policy control network element after the control transceiver 901 receives the background traffic transmission policy of the first terminal device from the first policy control network element. .
  • the memory 903 is coupled to the processor 902 and is configured to store a program and the like.
  • the program may include program code, where the program code includes a computer operation instruction.
  • the memory 903 may include a RAM, and may also include a non-volatile memory (non-volatile memory), for example, at least one magnetic disk memory.
  • the processor 902 executes an application program stored in the memory 903 to implement the foregoing functions, thereby implementing a method for determining a background traffic transmission policy as shown in FIGS. 4 and 6.
  • the embodiments of the present application provide a method and device for determining a background traffic transmission policy.
  • the first policy control network element receives the first information requesting the background traffic transmission policy of the first terminal device from the requesting device, and sends the data to the data.
  • the analysis network element requests the background traffic transmission data analysis result of the first terminal device, and after receiving the data analysis result of the first terminal device from the data analysis network element, sends the background traffic transmission policy of the first terminal device to the requesting device;
  • the data analysis result of a terminal device is determined by the data analysis network element based on the target background traffic transmission policy of the second terminal device.
  • the second terminal device is different from the first terminal device.
  • the target background traffic transmission policy of the second terminal device is used for the first terminal device.
  • the two terminal devices transmit background traffic; the background traffic transmission policy of the first terminal device is determined by the first policy control network element according to the third information, and the third information includes the analysis result of the background traffic transmission data of the first terminal device.
  • the data analysis network element may determine the background traffic transmission data analysis result of the first terminal device based on the target background traffic transmission policies of all other terminal devices (that is, the second terminal device), thereby enabling the first policy control network
  • the element determines the background traffic transmission policy of the first terminal device.
  • the background traffic transmission policy of the first terminal device determined by the first policy control network element refers to other terminal devices, so that the first policy controls the first terminal determined by the network element.
  • the background traffic transmission policy of the device does not conflict with the background traffic transmission policy of other terminal devices, which can solve the problem of background traffic transmission failure.
  • An embodiment of the present application further provides a method for determining a background traffic transmission policy, and the method is also applicable to the communication system shown in FIG. 1.
  • the specific process of the method may include:
  • Step 1001 The first policy control network element obtains at least one piece of fourth information, and the fourth information includes at least one identifier of the first terminal device, the first time, the first position, and the state of the first network element.
  • the identifier of the first terminal device may be at least one of SUPI, PEI, GPSI, IP quintuple, IMSI, IMEI, and MSISDN.
  • the first time is a future time
  • the first position is a predicted position where at least one terminal device resides at the first time in the future, that is, predicted trajectory information.
  • the first position may be at least one first The network area (Tracking Area List (TA List) or Routing Area List (RA List)), cell (Cell ID), and radio access network (RAN ID) where a terminal device is located at the first time ), Global Satellite Positioning System (Global Positioning System, GPS), and so on.
  • TA List Track Area List
  • RA List Routing Area List
  • RAN ID radio access network
  • At least one first terminal device resides in a first position at a first time and has a first network element status. That is to say, at least one first terminal device resides in a first position at a first time, and all have a first network element status.
  • the first network element state may include one or more of the following: a first load, a first capacity, and a first available bandwidth; wherein the first load is a corresponding first The load of a network element, the first network element serves the first terminal device; the first capacity is the capacity of the first network element corresponding to the first location; the first available bandwidth is the capacity of the first network element corresponding to the first location bandwidth.
  • the first terminal resides in the first position at the first time.
  • the first load, the first capacity, and the first available bandwidth can be used to indicate the idle or busy status of the first network element. For example, when the first load is 80%, it indicates that the first network element has 20% load. It can be used to transmit background traffic of at least one first terminal device.
  • the first capacity or the first available bandwidth is 1GB (GigaByte), which means that the first network element has 1GB of capacity or bandwidth that can be used to transmit at least one first Background traffic of a terminal device.
  • the first network element may be a user plane network element (for example, RAN or UPF, etc.) or a control plane network element (for example, AMF or SMF, etc.) serving the first terminal device.
  • a user plane network element for example, RAN or UPF, etc.
  • a control plane network element for example, AMF or SMF, etc.
  • an AMF network element or an SMF network element may also be used as a user plane network element for transmitting background traffic.
  • the first policy control network element receives the fifth information from the requesting device, and the fifth information is used to request at least one second terminal.
  • the fifth information may include the identification of the requesting device and one or more of the following: the number of second terminal devices, the size of the background traffic that each second terminal device needs to transmit, and the time window.
  • the fifth information may further include a network area (Tracking Area List (TA List) or Routing Area List (RA List)) where the at least one second terminal device is located.
  • TA List Track Area List
  • RA List Routing Area List
  • the requesting device provides services for at least one second terminal device.
  • the requesting device may be a service network element currently serving at least one second terminal device, that is, it may be the one in FIG. 1.
  • AF network elements including AF network elements controlled by the operator (for example, proxy-call session control function (P-CSCF, proxy-call session control function)), or third-party AF network elements, such as a third-party service server .
  • P-CSCF proxy-call session control function
  • proxy-call session control function proxy-call session control function
  • third-party AF network elements such as a third-party service server .
  • the at least one first terminal device is part or all of the at least one second terminal device. Specifically, the at least one first terminal device is a subset of the at least one second terminal device. In an optional embodiment, when there are multiple second terminal devices, there may be multiple fourth information.
  • One fourth information corresponds to a group of first terminal devices, and a group of first terminal devices is at least one. That is, multiple second terminal devices may include multiple groups of first terminal devices. Among them, a group of first terminal devices have the same first position and the same first network element status at the first time.
  • the first policy control network element receives the fifth information from the requesting device.
  • the service network element may send the first information to the first through the network open function network element.
  • the policy control network element sends a fifth message.
  • the above process may specifically be: the service network element sends the fifth information to the network open function network element.
  • the service network element may send the fifth information to the network open function network element by calling the Nnef_BDTPNegotiation_Create request service; and then the network open function network element The fifth information is forwarded to the first policy control network element.
  • the network open function network element may send the fifth information to the first policy control network element by calling the Npcf_BDTPolicyControl_Create request service.
  • the first policy control network element can obtain at least one fourth information in the following two ways:
  • the first policy control network element obtains at least one fourth information from the data analysis network element.
  • the first policy controls the network element to obtain at least one fourth information stored locally.
  • the first policy control network element may acquire the fifth information from the requesting device, and then acquire the fifth information from the data analysis network element.
  • the first policy control network element obtains at least one fourth information from the data analysis network element.
  • the specific method may be: the first policy control network element sends sixth information to the data analysis network element, and the sixth information is used to request at least A fourth message, and the sixth message includes an identifier of at least one second terminal device; the first policy control network element receives at least one fourth message from the data analysis network element.
  • the sixth information further includes one or more of the following: an identifier of the requesting device, a time window, and a network area.
  • the time window is used to indicate a time window corresponding to the requested at least one second terminal device
  • the network area is used to indicate a network area corresponding to the requested at least one second terminal device.
  • the first policy control network element may store at least one seventh information corresponding to at least one third terminal device, and the seventh information includes an identifier of the at least one fourth terminal device, the first time, the first A location and the status of the first network element.
  • the at least one fourth terminal device is part or all of the at least one third terminal device, and the at least one third terminal device includes at least one second terminal device.
  • the first policy control network element determines at least one fourth information among the stored at least one seventh information.
  • the first policy control network element determines at least one fourth information from the stored at least one seventh information.
  • the specific method may be: the first policy control network element selects the second terminal device from the at least one seventh information. The information corresponding to the same fourth terminal device is identified, so that at least one piece of fourth information is filtered out.
  • the source of the at least one seventh information stored locally by the first policy control network element may also be obtained by the first policy control network element from the data analysis network element.
  • the specific method may be: the first policy control network element sends the data analysis network to the data analysis network.
  • the element sends eighth information, the eighth information is used to request at least one seventh information, and the eighth information includes an identifier of at least one third terminal device; the first policy controls the network element to receive at least one seventh information from the data analysis network element.
  • the eighth information further includes one or more of the following: an identification of the requesting device, a time window, and a network area.
  • the time window is used to indicate a time window corresponding to the requested at least one seventh information
  • the network area is used to indicate a network area corresponding to the requested at least one seventh information.
  • the first policy control network element obtains an identifier of at least one second terminal device.
  • this operation may be performed by the first policy control network element before acquiring the at least one fourth information.
  • the operation may be performed after the first policy control network element receives the fifth information and acquires at least one fourth information. Information before.
  • the first policy control network element may obtain the identity of at least one second terminal device through the following two methods:
  • Method g1 The first policy control network element receives the identity of at least one second terminal device from the requesting device.
  • Method g2 The first policy control network element receives the identification of the requesting device from the requesting device, and obtains the identification of at least one second terminal device from the first policy control network element or the database network element according to the identification of the requesting device.
  • the first policy control network element may receive the identification of at least one second terminal device by receiving the fifth information from the requesting device, that is, at this time, the fifth information includes at least one second terminal device Logo.
  • the first policy control network element receives the identification of the requesting device from the requesting device from the fifth information received by the first policy control network element from the requesting device.
  • the fifth information does not include at least one second terminal.
  • the ID of the device may include background traffic transmission instruction information, which is used to indicate that the identifier to be queried is at least one second terminal device that needs to transmit background traffic.
  • Step 1002 The first policy control network element determines a background traffic transmission policy of at least one second terminal device according to the ninth information, where the ninth information includes at least one fourth information.
  • the ninth information may further include fifth information, and the ninth information may further include a background traffic transmission query result of at least one second terminal device and / or at least one second terminal device. Local background traffic transmission query results.
  • the ninth information further includes a background traffic transmission query result of at least one second terminal device
  • the first policy control network element obtains the background traffic of the at least one second terminal device from the database network element. Transmitting the query result; or when the ninth information further includes a local background traffic transmission policy of at least one second terminal device, the first policy control network element obtains the local background traffic of at least one second terminal device from the first policy control network element Transmission policy; or when the ninth information further includes a background traffic transmission query result of at least one second terminal device and a local background traffic transmission policy of at least one second terminal device, the first policy control network element obtains at least from a database network element A background traffic transmission query result of a second terminal device, and the first policy control network element obtains a local background traffic transmission policy of at least one second terminal device from the first policy control network element.
  • the first policy control network element determines a background traffic transmission policy of at least one second terminal device according to the ninth information, and a specific method may be:
  • the first policy control network element may determine the distribution in the at least one fourth information among the ninth information according to the identifier of the at least one second terminal device. That is, in step 1001, the first policy network element analyzes the network element from the data. 3 pieces of fourth information are obtained, that is, the data analysis network element divides at least one second terminal device into three categories, and each category corresponds to subset 1, subset 2, or subset 3 of at least one second terminal device;
  • the first policy control network element determines, based on the first time, the first position, and the state of the first network element in each of the fourth information, that at least one of the second terminal device subset 1, subset 2, or subset 3 is in The first time will be in the first location and have the first network status on the first location;
  • the first policy controls the network element to be located at the first position at the first time according to the subset 1, subset 2 or subset 3 of the at least one second terminal device, and has the first network state at the first position, and
  • the size of the background traffic to be transmitted by each second terminal device determines the background traffic transmission policy of each second terminal device.
  • subset 1 of the second terminal device includes 10 second terminal devices, and each second terminal needs to transmit 60 MB (MegaBit) of background traffic, all of which are located in the same cell at 00: 00-01: 00 at night, and
  • the available capacity on the base station corresponding to the cell is 60MB or more
  • the background traffic transmission policy formulated for the 10 second terminal devices included in the subset 1 of the second terminal device may be as follows:
  • Time window 00: 00-01: 00;
  • the first policy control network element obtaining at least one background traffic transmission policy of the second terminal device.
  • the first policy control network element needs to refer to at least one of the ninth information.
  • the first policy control network element determines the background traffic transmission policy of the at least one second terminal device according to the ninth information
  • the first policy control network element sends the at least one second terminal device to the requesting device. Background traffic transmission strategy.
  • the traffic flow transmission policy of any one of the at least one second terminal device may be one or more.
  • the background traffic transmission policy of the second terminal device may include: a seventh data value of a transmission time window of the background traffic; the background traffic transmission policy of the second terminal device further includes one or more of the following: a transmission bandwidth of the background traffic The seventh data value, the location information of the second terminal device, and the identifier of the second terminal device.
  • the first policy control network element may also perform the following operations:
  • the first policy control network element determines that the background traffic transmission policy of the second terminal device is a target background traffic transmission policy of the second terminal device;
  • the first policy control network element sends the target background traffic transmission policy of the second terminal device to the data analysis network element.
  • the first policy control network element may also perform the following operations:
  • the first policy control network element receives the target background traffic transmission policy of the second terminal device from the requesting device, and the target background traffic transmission policy of the second terminal device is selected by the requesting device according to the background traffic transmission policy of the second terminal device;
  • the first policy control network element sends the target background traffic transmission policy of the second terminal device to the data analysis network element.
  • the first policy control network element sends the target background traffic transmission policy of the second terminal device to the data analysis network element through the foregoing first policy control.
  • the data analysis network element can save the target background traffic transmission policy of the second terminal device.
  • the data analysis network element can refer to the saved first section when determining the moving trajectory (including time and location) and the network element status of the corresponding network element on the moving trajectory.
  • the target background traffic transmission strategy of the second terminal device makes the network element status result more accurate.
  • the first policy control network element when the requesting device is a service network element, sends at least one background traffic transmission policy of the second terminal device to the service network element.
  • the specific process may be: the first policy The control network element sends the background traffic transmission policy of at least one second terminal device to the service network element through the network open function network element.
  • the first policy control network element sends the background traffic transmission policy of at least one second terminal device to the network open function network element.
  • the first policy control network element may send the Npcf_BDTPolicyControl_Createresponse service to the network.
  • the open function network element sends a background traffic transmission policy of at least one second terminal device; and then the network open function network element sends the background traffic transmission policy of at least one second terminal device to the service network element.
  • the network open function network element The Nnef_BDT_PNegotiation_Create response service can be called to send at least one background traffic transmission policy of the second terminal device to the service network element.
  • the first policy controls the network element to obtain at least one fourth information, and the fourth information includes at least one identifier of the first terminal device, the first time, the first location, and The state of the first network element; the first policy control network element determines a background traffic transmission policy of at least one second terminal device according to the ninth information; wherein the ninth information includes at least one fourth information; the at least one first terminal device is at least one Part or all of the second terminal device; at least one first terminal device resides in the first position at a first time, and has a state of the first network element.
  • the first policy control network element when the first policy control network element formulates a background traffic transmission policy for at least one second terminal device, it may consider the movement trajectory (including the first time and the first position) of each second terminal device and the first The status of the first network element at the location, which will make the background traffic transmission policy of at least one second terminal device formulated by the first policy control network element more accurate.
  • the first position of the at least one first terminal device and the state of the first network element are closely related to the first time, that is, when the at least one first terminal device moves to the first position at the first time, the first A network element (first network element) at one location has a first network element status.
  • the corresponding network element status is at the other location.
  • An embodiment of the present application further provides a method for determining a background traffic transmission policy, and the method is also applicable to the communication system shown in FIG. 1.
  • the specific process of the method may include:
  • Step 1101 The data analysis network element determines at least one piece of fourth information, and the fourth information includes at least one identifier of the first terminal device, the first time, the first location, and the state of the first network element; the at least one first terminal device is at least one Part or all of a second terminal device; at least one first terminal device resides in a first position at a first time and has a first network element status.
  • At least one second terminal device is a terminal device to be transmitted background traffic, and a terminal device that needs to obtain a background traffic transmission policy.
  • the state of the first network element includes one or more of the following: a first load, a first capacity, and a first available bandwidth; wherein the first load is a load of the first network element corresponding to the first position;
  • a network element serves a first terminal device;
  • the first capacity is the capacity of the first network element corresponding to the first location;
  • the first available bandwidth is the bandwidth of the first network element corresponding to the first location.
  • the first terminal device resides in the first position at the first time.
  • the data analysis network element before the data analysis network element determines the at least one fourth information, the data analysis network element receives the sixth information from the first policy control network element, and the sixth information is used to request at least one fourth information
  • the sixth information includes an identifier of at least one second terminal device.
  • the data analysis network element determines at least one fourth information, and the specific method may be:
  • the data analysis network element obtains at least one tenth information of at least one second terminal device on the third network element, and the tenth information includes an identifier of the second terminal device, a second time, a second location, and a state of the second network element;
  • the two terminal devices reside in the second position at the second time and have the state of the second network element;
  • the third network element serves at least one second terminal device;
  • the data analysis network element determines at least one fourth information according to the at least one tenth information of the second terminal device.
  • the third network element may be one or more of an access device, a functional network element in 5G, and an OAM.
  • At least one piece of tenth information of the second terminal device refers to at least one piece of history information before the second device, and each piece of history information includes information contained in the tenth information.
  • the data analysis network element may directly obtain at least one tenth information of at least one second terminal device on the third network element from the third network element; and may also obtain at least one of the third network element from other devices. At least one tenth information of the second terminal device.
  • the data analysis network element may obtain the third network element from the OAM network element. At least one tenth information of at least one second terminal device.
  • the above process of determining at least one fourth information by the data analysis network element may be interpreted as: the data analysis network element first collects the historical action track of each second terminal device from the third network element according to the identifier of the at least one second terminal device And the historical NE status of the NEs corresponding to different locations at different times; the data analysis NE predicts the predicted trajectory of each terminal device in at least one terminal device based on the collected data, that is, each second terminal device is in The future location to be moved to in the future; afterwards, the data analysis network element groups at least one second terminal device according to the predicted running trajectory of each second terminal device, and the second terminal device in each group resides at the same time in the future At the same location, for example, a group of second terminal equipment is at least one first terminal equipment, and at least one first terminal equipment resides in the first location at the first time; finally, the data analysis network element The historical network element status of the network element corresponding to the future location where the group of second terminal equipment resides, and the prediction of each group of second terminal equipment
  • the data analysis network element obtains related information of at least a group of second terminal devices that have a specific network element status at a specific location at a specific time, that is, the data analysis network element according to at least one tenth information of each second terminal device At least one fourth message is determined.
  • the data analysis network element may use at least one piece of fourth information by using an analysis method in the foregoing embodiment.
  • the data analysis network element may aggregate at least one second terminal device according to these information.
  • Class or classification Second terminal devices of the same class correspond to the same time, location, and network element status information.
  • the state of the second network element includes one or more of the following: a second load, a second capacity, and a second available bandwidth; wherein the second load is a corresponding second at the second position
  • the load of the network element; the second network element serves the second terminal device; the second capacity is the capacity of the corresponding second network element at the second location; and the second bandwidth is the bandwidth of the second network element at the second location.
  • the second terminal device resides in the second position at the second time.
  • Step 1102 The data analysis network element sends at least one fourth message to the first policy control network element.
  • the data analysis network element determines at least one piece of fourth information, and the fourth information includes at least one identifier of the first terminal device, the first time, the first location, and the first Network element status; at least one first terminal device is part or all of at least one second terminal device; at least one first terminal device resides in a first position at a first time and has the first network element status; The data analysis network element sends at least one fourth message to the first policy control network element.
  • the data analysis network element can make the first policy control network element more accurate by sending the predicted network element status corresponding to a specific future time and location of the terminal device to be transmitted background traffic to the first policy control network element.
  • the background traffic transmission strategy of the second terminal device is determined, thereby improving the success rate of background traffic transmission.
  • the implementation of the present application also provides an example of a method for determining a background traffic transmission policy.
  • the analysis network element provides prediction information (that is, at least one piece of fourth information).
  • the service network element is AF
  • the terminal device is UE
  • the first policy control network element is PCF
  • the data analysis network element is NWDAF.
  • the specific process of this example can include:
  • Step 1201 The AF sends fifth information to the NEF, where the fifth information is used to request a background traffic transmission policy of at least one second UE.
  • NEF is an example of a network element with an open function.
  • NEF can also be replaced with another network element with an open function, which is not limited in this application.
  • the AF may send the fifth information to the NEF by calling the Nnef_BDTPNegotiation_Create request or Nnef_Trigger_Delivery request service.
  • Step 1202 the NEF sends fifth information to the PCF.
  • the NEF may send the fifth information to the PCF by calling the Npcf_BDTPolicyControl_Create request or Npcf_Policy Authorization_Create Request service.
  • Step 1203 The PCF sends sixth information to the NWDAF.
  • the sixth information is used to request at least one fourth information, and the sixth information includes an identifier of at least one second UE.
  • the PCF initiates the Nnwdaf_AnalyticsInfo_Request service operation to the NWDAF and sends the sixth information to the NWDAF.
  • Step 1204 The NWDAF determines at least one piece of fourth information, and the fourth information includes at least one identifier of the first UE, the first time, the first position, and the state of the first network element; At least one first UE resides in a first position at a first time, and has a first network element status.
  • Step 1205 The NWDAF sends at least one fourth message to the PCF.
  • the Nnwdaf_AnalyticsInfo_Request response service operation initiated by the NWDAF to the PCF returns at least one piece of fourth information.
  • Step 1206 The PCF determines a background traffic transmission policy of at least one second UE according to the ninth information, where the ninth information includes at least one fourth information.
  • Step 1207 The PCF sends the background traffic transmission policy of the at least one second UE to the NEF.
  • the PCF may send at least one background traffic transmission policy of the second UE to the NEF by calling the Npcf_BDT PolicyControlResponse or Npcf_PolicyAuthorization_Notify service.
  • Step 1208 The NEF sends the background traffic transmission policy of the at least one second UE to the AF.
  • the NEF may call the Nnef_BDT, Pnegotiation_Create response, or Nnef_Trigger_Delivery response service to send at least one background traffic transmission policy of the second UE to the AF.
  • the PCF may perform steps 1209 and 1210, as follows:
  • Step 1209 The PCF determines that the background traffic transmission strategy of the second UE is a target background traffic transmission strategy of the second UE.
  • Step 1210 The PCF sends a target background traffic transmission policy of the second UE to the NWDAF.
  • the PCF may also send a target background traffic transmission policy of the second UE to the UDR.
  • step 1209 may be omitted, and the PCF may directly send the background traffic transmission policy of the second UE to NWDAF, which is not described in detail here.
  • step 1208 when there are multiple background traffic transmission policies for the second UE, after step 1208, there may be the following steps:
  • Step 1211 The AF selects a target background traffic transmission policy of the second UE according to the background traffic transmission policy of the second UE.
  • Step 1212 The AF sends a target background traffic transmission policy of the second UE to the NEF.
  • the AF may call the Nnef_BDTPNegotiation_Update request or Nnef_Trigger_Delivery request service to send the target background traffic transmission policy of the second UE to the NEF.
  • Step 1213 The NEF sends a target background traffic transmission policy of the second UE to the PCF.
  • the NEF may call the Npcf_BDTPolicyControl_Update request or Npcf_PolicyAuthorization_Update Request service to send the target background traffic transmission policy of the second UE to the PCF.
  • Step 1214 The PCF sends a target background traffic transmission policy of the second UE to the NWDAF.
  • the PCF may also send a target background traffic transmission policy of the second UE to the UDR.
  • step 1214 and step 1210 are the same steps. In order to show two possible implementation manners here, two steps are shown.
  • step 1207, step 1208, step 1210, and step 1214 may include one or more identification information for identifying a target background traffic transmission policy of at least one second terminal device.
  • each identification information in the multiple identification information is used for identification.
  • the first policy control network element sends a background traffic transmission policy of the second terminal device to the second terminal device, which may be, but is not limited to, a PDU session modification process.
  • a PDU session modification process For a specific process, refer to Embodiment 2 in FIG. 2 .
  • the first policy control network element may also use a PDU session establishment procedure (PDU Establishment procedure), a registration procedure (Registration procedure), a service request procedure (Service Request procedure), a terminal configuration update procedure (UE Configuration Configuration Update), etc.
  • PDU Establishment procedure PDU Establishment procedure
  • Registration procedure Registration procedure
  • Service Request procedure Service Request procedure
  • UE Configuration Configuration Update UE Configuration Configuration Update
  • Various other processes send a background traffic transmission policy of the second terminal device to the second terminal device.
  • the first policy control network element may place the background traffic transmission policy of the second terminal device in the terminal routing policy (UESP) of the second terminal device.
  • UESP terminal routing policy
  • each solution of the method for determining a background traffic transmission policy provided in the embodiments of the present application is described from the perspective of interaction between each network element or device.
  • various network elements and devices such as the first policy control network element, data analysis network element, first service network element, first terminal device, and second terminal device, in order to implement the foregoing functions, include the execution of each Function corresponding hardware structure and / or software module.
  • this application can be implemented in the form of hardware or a combination of hardware and computer software. Whether a certain function is performed by hardware or computer software-driven hardware depends on the specific application and design constraints of the technical solution. A professional technician can use different methods to implement the described functions for each specific application, but such implementation should not be considered to be beyond the scope of this application.
  • the communication device used to determine the background traffic transmission strategy may include an acquisition module 1301 and a processing module 1302, and optionally may further include a sending module 1303. Refer to the structure diagram shown in FIG. 13.
  • the communication device shown in FIG. 13 may be used to perform the operations of the first policy control network element in the embodiments shown in FIG. 10 and FIG. 11, and to execute the operations in the embodiment shown in FIG. 12. PCF operation.
  • the acquiring module 1301 is configured to acquire at least one piece of fourth information, and the fourth information includes an identifier, a first time, a first position, and a state of the first network element of the at least one first terminal device;
  • a processing module 1302 is configured to determine a background traffic transmission policy of at least one second terminal device according to the ninth information; wherein the ninth information includes at least one fourth information; the at least one first terminal device is one of the at least one second terminal device. Part or all; at least one first terminal device resides in a first position at a first time and has a first network element status.
  • the movement trajectory (including the first time and the first position) of each second terminal device can be considered and The state of the first network element at the first position, which will make the background traffic transmission policy of at least one second terminal device formulated by the first policy control network element more accurate.
  • the obtaining module 1301 is further configured to receive an identifier of at least one second terminal device from a requesting device, and the requesting device provides services for the at least one second terminal device.
  • the obtaining module 1301 is further configured to receive the identification of the requesting device from the requesting device; after that, the processing module 1302 is further configured to control the network element or the database network element from the first policy according to the identification of the requesting device.
  • the query obtains an identifier of at least one second terminal device.
  • the acquiring module 1301 is specifically configured to acquire at least one fourth information from a data analysis network element when acquiring the at least one fourth information; or acquire at least one fourth information stored locally.
  • the first network element status includes one or more of the following: a first load, a first capacity, and a first available bandwidth; wherein the first load is a corresponding first at a first position
  • the load of the network element, the first network element serves the first terminal device;
  • the first capacity is the capacity of the first network element corresponding to the first position;
  • the first available bandwidth is the bandwidth of the first network element corresponding to the first position.
  • the first terminal device resides in the first position at the first time.
  • the sending module 1303 is configured to send the background traffic of the at least one second terminal device to the requesting device after the processing module 1302 determines the background traffic transmission policy of the at least one second terminal device according to the ninth information.
  • the processing module 1302 is further configured to determine that the background traffic transmission policy of the second terminal device is a target background traffic transmission of the second terminal device.
  • a policy; the sending module 1303 is further configured to send a target background traffic transmission policy of the second terminal device to the data analysis network element.
  • the obtaining module 1301 is further configured to receive a target background traffic transmission policy of the second terminal device from the requesting device.
  • the second terminal device The target background traffic transmission strategy is selected by the requesting device according to the background traffic transmission strategy of the second terminal device; the sending module 1303 is further configured to send the target background traffic transmission strategy of the second terminal device to the data analysis network element.
  • the background traffic transmission policy of the second terminal device may include: a seventh data value of a transmission time window of the background traffic; the background traffic transmission policy of the second terminal device further includes one or more of the following Item: The seventh data value of the transmission bandwidth of the background traffic, the location information of the second terminal device, and the identity of the second terminal device.
  • the communication device for determining a background traffic transmission strategy may further include a processing module 1401 and a sending module 1402.
  • a processing module 1401 may further include a sending module 1402.
  • the communication device shown in FIG. 14 may be used to perform the operations of the data analysis network element in the embodiments shown in FIG. 10 and FIG. 11, and may be used to perform the operations in the embodiment shown in FIG. 12. NWDAF operation.
  • NWDAF operation E.g:
  • the processing module 1401 is configured to determine at least one piece of fourth information, where the fourth information includes at least one identifier of the first terminal device, the first time, the first location, and the state of the first network element; the at least one first terminal device is at least one A part or all of the second terminal device; at least one first terminal device resides in a first position at a first time and has a state of a first network element;
  • the sending module 1402 is configured to send at least one fourth message to the first policy control network element.
  • the communication device based on the above-mentioned determining background traffic transmission strategy may send the predicted network element status corresponding to a specific future time and location of the terminal device to be transmitted to the background traffic to the first policy control network element, thereby enabling the first strategy
  • the control network element determines the background traffic transmission policy of the second terminal device more accurately, thereby improving the success rate of background traffic transmission.
  • the processing module 1401 is specifically configured to obtain at least one tenth information and tenth information of at least one second terminal device on a third network element when determining at least one fourth information. Including the identity of the second terminal device, the second time, the second location, and the state of the second network element; the second terminal device resides in the second location at the second time and has the state of the second network element; according to at least one second At least one piece of tenth information of the terminal device determines at least one piece of fourth information; the third network element serves at least one second terminal device.
  • the state of the second network element includes one or more of the following: a second load, a second capacity, and a second available bandwidth; wherein the second load is a corresponding second at the second position
  • the load of the network element; the second network element serves the second terminal device; the second capacity is the capacity of the corresponding second network element at the second location; and the second bandwidth is the bandwidth of the second network element at the second location.
  • the second terminal device resides in the second position at the second time.
  • the first network element status includes one or more of the following: a first load, a first capacity, and a first available bandwidth; wherein the first load is a corresponding first at a first position The load of the network element; the first network element serves the first terminal device; the first capacity is the capacity of the first network element corresponding to the first location; the first available bandwidth is the bandwidth of the first network element corresponding to the first location .
  • the first terminal device resides in the first position at the first time.
  • the communication device shown in FIG. 9 may be used to perform the operations of the first policy control network element in the embodiments shown in FIG. 10 and FIG. 11, and may also be used to execute the embodiment shown in FIG. 12. PCF operation.
  • the transceiver 901 is configured to implement communication interaction with other devices connected to the first policy control network element (such as a PCF), that is, to receive and send data;
  • the first policy control network element such as a PCF
  • the processor 902 is configured to obtain at least one piece of fourth information, where the fourth information includes an identifier, a first time, a first position, and a state of a first network element of the at least one first terminal device; and determine at least one second terminal according to the ninth information Background traffic transmission policy of the device; wherein the ninth information includes at least one fourth information; the at least one first terminal device is part or all of the at least one second terminal device; the at least one first terminal device resides at the first time It is in the first position and has the state of the first network element.
  • the movement trajectory (including the first time and the first position) of each second terminal device can be considered and The status of the first network element at the first position, and the background traffic size, time window, and network area of each second terminal device requested by the requesting device.
  • a background traffic transmission query that includes at least one second terminal device. Result and / or the query result of the local background traffic transmission of at least one second terminal device, so that the background traffic transmission policy of at least one second terminal device formulated by the first policy control network element is more accurate.
  • the processor 902 is further configured to control the transceiver 901 to receive an identifier of at least one second terminal device from the requesting device, and the requesting device provides services for the at least one second terminal device.
  • the processor 902 is further configured to control the transceiver 901 to receive the identification of the requesting device from the requesting device, and query at least the first policy control network element or database network element to obtain at least An identifier of a second terminal device.
  • the processor 902 when the processor 902 acquires at least one piece of fourth information, the processor 902 is specifically configured to: control the transceiver 901 to obtain at least one piece of fourth information from the data analysis network element; or obtain at least one piece of first information stored locally. Four messages.
  • the first network element status includes one or more of the following: a first load, a first capacity, and a first available bandwidth; wherein the first load is a corresponding first at a first position
  • the load of the network element, the first network element serves the first terminal device;
  • the first capacity is the capacity of the first network element corresponding to the first location;
  • the first available bandwidth is the bandwidth of the first network element corresponding to the first location .
  • the first terminal device resides in the first position at the first time.
  • the processor 902 is further configured to control the transceiver 901 to send the at least one second terminal device to the requesting device after determining the background traffic transmission policy of the at least one second terminal device according to the ninth information.
  • the background traffic transmission policy requests the device to serve at least one second terminal device.
  • the processor 902 when there is a background traffic transmission policy of the second terminal device, the processor 902 is further configured to determine that the background traffic transmission policy of the second terminal device is a target background traffic transmission of the second terminal device. Policy; the control transceiver 901 sends a target background traffic transmission policy of the second terminal device to the data analysis network element.
  • the processor 902 is further configured to receive a target background traffic transmission policy of the second terminal device from the requesting device, and the second terminal device The target background traffic transmission strategy is selected by the requesting device according to the background traffic transmission strategy of the second terminal device; the control transceiver 901 sends the target background traffic transmission strategy of the second terminal device to the data analysis network element.
  • the background traffic transmission policy of the second terminal device may include: a seventh data value of a transmission time window of the background traffic; the background traffic transmission policy of the second terminal device further includes one or more of the following Item: The seventh data value of the transmission bandwidth of the background traffic, the location information of the second terminal device, and the identity of the second terminal device.
  • the communication device shown in FIG. 9 may be used to perform the operations of the data analysis network element in the embodiments shown in FIG. 10 and FIG. 11, and may also be used to execute the above-mentioned embodiment shown in FIG. 12. NWDAF operation.
  • NWDAF operation E.g:
  • the transceiver 901 is configured to implement communication interaction with other devices connected to a data analysis network element (such as NWDAF), that is, to receive and send data;
  • NWDAF data analysis network element
  • the processor 902 is configured to determine at least one piece of fourth information, where the fourth information includes at least one identifier of the first terminal device, a first time, a first location, and a state of the first network element; the at least one first terminal device is at least one first Some or all of the two terminal devices; at least one first terminal device resides in a first position at a first time and has a first network element status;
  • the control transceiver 901 sends at least one fourth message to the first policy control network element.
  • the communication device based on the above-mentioned determining background traffic transmission strategy may send the predicted network element status corresponding to a specific future time and location of the terminal device to be transmitted to the background traffic to the first policy control network element, thereby enabling the first strategy
  • the control network element determines the background traffic transmission policy of the second terminal device more accurately, thereby improving the success rate of background traffic transmission.
  • the processor 902 when determining the at least one fourth information, is specifically configured to: obtain at least one tenth information of at least one second terminal device on the third network element, where the tenth information includes The identity of the second terminal device, the second time, the second location, and the state of the second network element; the third network element serves at least one second terminal device; the second terminal device resides in the second location at the second time, and Having a second network element status; determining at least one fourth information according to at least one tenth information of at least one second terminal device.
  • the state of the second network element includes one or more of the following: a second load, a second capacity, and a second available bandwidth; wherein the second load is a corresponding second at the second position
  • the load of the network element; the second network element serves the second terminal device; the second capacity is the capacity of the corresponding second network element at the second location; and the second bandwidth is the bandwidth of the second network element at the second location.
  • the second terminal device resides in the second position at the second time.
  • the first network element status includes one or more of the following: a first load, a first capacity, and a first available bandwidth; wherein the first load is a corresponding first at a first position The load of the network element; the first network element serves the first terminal device; the first capacity is the capacity of the first network element corresponding to the first location; the first available bandwidth is the bandwidth of the first network element corresponding to the first location .
  • the first terminal device resides in the first position at the first time.
  • the embodiments of the present application provide a method and device for determining a background traffic transmission policy.
  • a first policy controls a network element to obtain at least one piece of fourth information.
  • the fourth information includes at least one identifier of the first terminal device, the first Time, first position, and state of the first network element; the first policy controls the network element to determine a background traffic transmission policy of at least one second terminal device according to the ninth information; wherein the ninth information includes at least one fourth information; at least one first A terminal device is part or all of at least one second terminal device; at least one first terminal device resides in the first position at a first time and has a state of the first network element.
  • the first policy control network element when the first policy control network element formulates a background traffic transmission policy for at least one second terminal device, it may consider the movement trajectory (including the first time and the first position) of each second terminal device and the first The status of the first network element at the location, which will make the background traffic transmission policy of at least one second terminal device formulated by the first policy control network element more accurate.
  • This application also provides a method for determining network performance information, and the method is also applicable to the communication system shown in FIG. 1.
  • the specific process of the method may include:
  • Step 1501 The first network element sends first information to the data analysis network element, the first information is used to request network performance information, and the first information includes one or more of the following: area information of the first area, and an identifier of the requesting device Or terminal device group ID.
  • Step 1502 The data analysis network element determines network performance information according to the first information.
  • the network performance information includes area information and second information of the second area, and the second information includes one or more of the following: the load of the network in the second area Information, service experience information of services in the second area, or the number of terminal devices in the second area; where the second area is a sub-area of the first area.
  • each second area corresponds to a second piece of information.
  • the one or more second areas are based on the first area provided by the data analysis network element based on the first network element or the data analysis network element based on the identification of the requesting device and / or the terminal device group identification.
  • the first area is divided.
  • Step 1503 The data analysis network element sends network performance information to the first network element.
  • Step 1504 The first network element determines a first policy according to the network performance information.
  • the first network element can formulate a policy according to the area information of the divided sub-area, that is, related information, so that the formulated policy can be more accurate.
  • the divided sub-region is smaller than the first region; if the first region cannot be divided, the sub-region is equal to the first region.
  • the first network element is a policy control network element (such as a PCF), and may also be other network elements, which are not listed here one by one.
  • a policy control network element such as a PCF
  • the requesting device provides services for at least one terminal device.
  • the requesting device may be a service network element currently serving at least one terminal device, that is, an AF network element in FIG. 1, It includes AF network elements (for example, P-CSCF) controlled by the operator, and it can also be third-party AF network elements, such as a third-party service server.
  • AF network elements for example, P-CSCF
  • third-party AF network elements such as a third-party service server.
  • the first network element receives the third information from the requesting device.
  • the service network element may send the first network element to the first network element through the network open function network element. Send a third message.
  • the above process may specifically be: the service network element sends the third information to the network open function network element.
  • the service network element may send the third information to the network open function network element by calling the Nnef_BDTPNegotiation_Create request service; Forward the third information to the first network element.
  • the network open function network element may send the third information to the first network element by calling the Npcf_BDTPolicyControl_Create request service.
  • the first policy may include a background traffic transmission policy, where the background traffic transmission policy is a background traffic transmission policy of at least one terminal device.
  • the first network element receives third information from the requesting device, and the third information is used to request the background traffic transmission policy.
  • the third information includes one or more of the following: Area information, terminal device group identification, or identification of the requesting device; the first network element sends a background traffic transmission policy to the requesting device.
  • the background traffic transmission policy includes area information of the second area.
  • the first network element sends area information of the second area to the requesting device.
  • the requesting device can understand that the background traffic transmission policy is formulated for the sub-region, and can be more accurately sent to at least one terminal device, so that the terminal device executes a more accurate background traffic transmission policy.
  • the background traffic transmission policy further includes one or more of the following information: a recommended time window, a rate, a maximum aggregated bit rate, and the like.
  • the information included in the first information is generated based on the information included in the third information.
  • the data analysis network element determines network performance information according to the first information, and a specific method may be:
  • the data analysis network element obtains the area information of the second area based on the area information of the first area
  • the data analysis network element determines one or more of the following: load information of the network in the second region, service experience information of services in the second region, or the number of terminal devices in the second region.
  • the data analysis network element determines the network performance information according to the first information.
  • the specific method may be:
  • the data analysis network element determines area information of the second area according to the terminal device group identifier and / or the requesting device identifier;
  • the data analysis network element determines one or more of the following: load information of the network in the second region, service experience information of services in the second region, or the number of terminal devices in the second region.
  • the data analysis network element determining the area information of the second area according to the terminal device group identifier and / or the requesting device identifier includes:
  • the data analysis network element determines the area information of the first area according to the terminal device group identifier and / or the requesting device identifier;
  • the data analysis network element obtains the area information of the second area based on the area information of the first area.
  • the data analysis network element determines the area information of the first area according to the terminal device group identifier and / or the requesting device identifier.
  • the specific method may be:
  • the data analysis network element determines the identity of at least one terminal device according to the terminal device group identity and / or the requesting device identity, then determines the location information of all terminal devices based on the identity of the at least one terminal device, and finally determines the location information of all terminal devices Area information of the first area.
  • the location information is used to indicate a location where the terminal device resides.
  • the data analysis network element determines the identity of at least one terminal device according to the terminal device group identifier and / or the requesting device identifier.
  • the specific method may be: the data analysis network element according to the terminal device group identifier and / or the requesting device
  • the identity of the terminal device is obtained from the database network element, that is, the identity of at least one terminal device is obtained.
  • the data analysis network element determines the location information of the at least one terminal device based on the identity of the at least one terminal device.
  • the data analysis network element may be based on the identity of the at least one terminal device from the access and mobility management function network element or the access point. To obtain location information of at least one terminal device in the access device.
  • the data analysis network element mentioned above obtains the area information of the second area based on the area information of the first area, and the specific method may be:
  • the data analysis network element obtains the area information of the second area that is stored locally based on the area information of the first area; or
  • the data analysis network element obtains the area information of the second area from the operation management and maintenance network element or the access and mobility management function network element based on the area information of the first area; or
  • the data analysis network element collects location information of at least one terminal device located in the first area from the first area; the data analysis network element determines area information of the second area based on the location information of at least one terminal device located in the first area.
  • the data analysis network element determines the load information of the network in the second area.
  • the specific method may be: the data analysis network element obtains the second area from the network management network element or the operation management and maintenance network element. Network load information.
  • the data analysis network element determines the load information of the network in the second region.
  • the specific method may be: the data analysis network element determines the network information in the second region based on the service experience information of the services in the second region. Load information. For example, if the service experience Service MOS interval is [0, 5.0] and the service experience requirement is 3.0 or greater, Service MOS is [4.0, 5.0] is the load information is light load, and Service MOS is [3.0, 4.0] is the load Information is overloaded, and Service MOS is overloaded when it is 3.0 or less.
  • the data analysis network element determines service experience information of services in the second network area, and the specific method may be:
  • the data analysis network element can collect service data and network data of terminal devices in the network, as shown in Table 1 and Table 2, respectively.
  • the data analysis network element obtains training samples through association identification, that is, the service's average opinion score (Sevice), and the corresponding network data (including the QoS flow rate bit rate, packet loss rate, and packet errors). Rate, etc.).
  • the source of the association identifier is the AF network element, which is used to correlate the data on each network element of Table 1 and Table 2.
  • the source of the Application ID is the AF network element, which is the service identification of the service of the terminal device, and the purpose is to identify the service of the terminal device.
  • the source of the geographic area identifier is an AF network element, and the purpose is to identify the geographic area where the terminal device uses the service.
  • the source of Service MOS is the AF network element, whose purpose is to identify the service experience data of the terminal device.
  • the association identifier is used to associate data on each network element of Table 1 and Table 2.
  • the information is the Application ID
  • the Application ID comes from the PCF or UPF network element, and is the service identification of the service of the terminal equipment, and the purpose is to identify the service of the network terminal equipment.
  • QFI comes from the SMF or U PF network element, and is an identifier of the service quality flow of the service of the terminal device, and the purpose is to identify the service quality flow of the service of the terminal device.
  • the information is Cell ID
  • Cell ID comes from AMF or RAN, and its purpose is to identify the cell that provides the service of the terminal device.
  • Qos flow rate Qos flow rate is from UPF, and its purpose is to determine the parameter GFBR of the service quality flow of the service of the terminal device.
  • the purpose is to determine the parameter PDB of the service quality flow of the service of the terminal device.
  • the purpose is to determine the parameter PER of the service quality flow of the service of the terminal device.
  • the information is Network data X4
  • the purpose is to identify the network data X4.
  • the information is Network data X5, it comes from RAN, the purpose is to identify the network data X5.
  • the data analysis network element is trained based on the training samples to obtain a Service MOS model, which is used to characterize the correspondence between service experience information and network data.
  • a Service MOS model which is used to characterize the correspondence between service experience information and network data.
  • the representation of the Service MOS model can be as follows:
  • H (x) W0 * X0 + W1 * X1 + W2 * X2 + W3 * X3 + W4 * X4 + W5 * X5 + ... + Wn * Xn (1).
  • X1 can be Qos flow rate
  • X2 can be Qos flow Packet Error Rate
  • X3 can be Qos flow Packet Error Rate
  • X4 can be network data X
  • X5 can be network data X5.
  • Wn represents the weight of the n-th variable
  • n represents the number of variables
  • Xn represents the n-th variable.
  • n is an integer greater than or equal to 1.
  • H (x) represents the Service MOS model.
  • the data analysis network element can collect the network data corresponding to the services of the terminal equipment in the second area from the second area, and based on the above Service MOS model, the service experience information of the services in the second area can be obtained.
  • the data analysis network element determines the number of terminal devices in the second area, and the specific method may be:
  • the data analysis network element collects terminal device history information (including time, number of terminal devices) and service history information (including corresponding time, service experience information) in the second area, and then analyzes to meet the requirements of service experience
  • the number of terminal devices that can be accommodated in the second area is recorded as the number of terminal devices in the second area.
  • the number of terminal devices in the second area is specifically the number of terminal devices that can be accommodated in the second area in different time periods.
  • the second area mentioned above may be one or more, that is, one or more second areas divided into the first area.
  • the first network element receives information requesting other policies from the requesting device, and this information may also include one or more of the following: area information of the first area, terminal equipment
  • This information may also include one or more of the following: area information of the first area, terminal equipment
  • the group identifier or the identifier of the requesting device is described in the embodiment of the present application by using only the first policy as a background traffic transmission policy as an example. The case where the first policy is another policy is not described in detail here.
  • the following uses the first policy as a background traffic transmission policy as an example to describe an example of a method for determining a background traffic transmission policy provided in the embodiment of the present application.
  • a requesting device requests a background traffic transmission policy.
  • the data analysis network element divides the first area into one or more second areas, so that the policy control network element accurately formulates a background traffic transmission policy.
  • the requesting device is a service network element AF
  • the terminal device is a UE
  • the first network element is a policy control network element PCF
  • NWDAF The specific process of this example can include:
  • Step 1601 The AF sends third information to the NEF, and the third information is used to request a background traffic transmission policy.
  • the third information includes one or more of the following: area information of the first area, an identifier of the AF, or a UE group identifier.
  • NEF is an example of a network element with an open function.
  • NEF can also be replaced with another network element with an open function, which is not limited in this application.
  • the AF may send the third information to the NEF by calling the Nnef_BDTPNegotiation_Create request or Nnef_Trigger_Delivery request service.
  • Step 1602 The NEF sends third information to the PCF.
  • the NEF may send the third information to the PCF by calling the Npcf_BDTPolicyControl_Create request or Npcf_PolicyAuthorization_CreateRequest service.
  • Step 1603 The PCF sends the first information to the NWDAF, and the first information includes one or more of the following: area information of the first area, an identifier of the AF, or a UE group identifier.
  • the PCF may send the first information to the NWDAF by calling the Nnwdaf_AnalyticsSubscription_Subscribe request service.
  • Step 1604 NWDAF determines network performance information according to the first information.
  • the network performance information includes area information and second information of the second area.
  • the second information includes one or more of the following: load information of the network in the second area, Service experience information of services in the second region or the number of terminal devices in the second region; where the second region is a sub-region of the first region.
  • Step 1605 NWDAF sends network performance information to the PCF.
  • NWDAF can send network performance information to the PCF by calling the Nnwdaf_Nnwdaf_AnalyticsSubscription_SubscribeResponse service.
  • Step 1606 The PCF determines a background traffic transmission policy according to the network performance information.
  • Step 1607 The PCF sends a background traffic transmission policy to the NEF.
  • the background traffic transmission policy includes area information of the second area.
  • the PCF can send a background traffic transmission policy to the NEF by calling the Npcf_BDT Policy ControlResponse or Npcf_PolicyAuthorization_Notify service.
  • Step 1608 The NEF sends a background traffic transmission policy to the AF.
  • NEF can call Nnef_BDT, Pnegotiation_Create response, or Nnef_Trigger_Delivery response service to send background traffic transmission policy to AF.
  • the NEF may first convert the area information of the second area of the network type in the background traffic policy to the area information of the second area of the geographic area type, and then perform step 1608.
  • the PCF can formulate a background traffic transmission strategy according to the area information and related information of the divided sub-regions, so that the formulated background traffic transmission strategy can be made more accurate.
  • each solution of the method for determining a background traffic transmission policy provided in the embodiments of the present application is described from the perspective of interaction between each network element or device.
  • various network elements and devices such as the first policy control network element, data analysis network element, first service network element, first terminal device, and second terminal device, in order to implement the foregoing functions, include the execution of each Function corresponding hardware structure and / or software module.
  • this application can be implemented in the form of hardware or a combination of hardware and computer software. Whether a certain function is performed by hardware or computer software-driven hardware depends on the specific application of the technical solution and design constraints. A professional technician can use different methods to implement the described functions for each specific application, but such implementation should not be considered to be beyond the scope of this application.
  • the communication device shown in FIG. 7 may be used to perform operations of the first network element in the embodiment shown in FIG. 15 and to perform operations of the PCF in the embodiment shown in FIG. 16.
  • a sending module 702 is configured to send first information to a data analysis network element, where the first information is used to request network performance information, and the first information includes one or more of the following: area information of the first area, an identifier of the requesting device, or Terminal equipment group identification;
  • the receiving module 701 is configured to receive network performance information from a data analysis network element.
  • the network performance information includes area information and second information of the second area, and the second information includes one or more of the following: a load of the network in the second area Information, service experience information of services in the second region, or the number of terminal devices in the second region; where the second region is a sub-region of the first region;
  • the processing module 703 is configured to determine a first policy according to network performance information.
  • the formulated first strategy can be made more accurate according to the area information and related information of the divided sub-area.
  • the first policy includes a background traffic transmission policy, wherein the background traffic transmission policy is a background traffic transmission policy of at least one terminal device.
  • the receiving module 701 is further configured to receive third information from the requesting device, the third information is used to request a background traffic transmission policy, and the third information includes one or more of the following: the first The area information of the area, the identity of the terminal device group, or the identity of the requesting device;
  • the sending module 702 is further configured to send a background traffic transmission policy to the requesting device.
  • the background traffic transmission policy includes area information of the second area.
  • the sending module 702 is further configured to send the area information of the second area to the requesting device.
  • the background traffic transmission policy further includes one or more of the following information: a recommended time window, a rate, and a maximum aggregated bit rate.
  • the first network element is a policy control function network element.
  • the communication device shown in FIG. 7 may be used to perform operations of the data analysis network element in the embodiment shown in FIG. 15 and to perform operations of NWDAF in the embodiment shown in FIG. 16.
  • NWDAF NWDAF
  • the receiving module 701 is configured to receive first information from a first network element, and the first information is used to request network performance information.
  • the first information includes one or more of the following: area information of the first area, an identifier of the requesting device, or Terminal equipment group identification;
  • a processing module 703 is configured to determine network performance information according to the first information, where the network performance information includes area information and second information of the second area, and the second information includes one or more of the following: load information of the network in the second area 2. Service experience information of services in the second area or the number of terminal devices in the second area; where the second area is a sub-area of the first area;
  • the sending module 702 is configured to send network performance information to a first network element.
  • the formulated first strategy can be made more accurate according to the area information and related information of the divided sub-area.
  • the processing module when determining the network performance information according to the first information, is specifically configured to:
  • the processing module 703 when determining the network performance information according to the first information, is specifically configured to:
  • the processing module 703 is specifically configured to: when determining the area information of the second area according to the terminal device group identifier and / or the requesting device identifier, specifically:
  • the area information of the second area is acquired based on the area information of the first area.
  • the processing module 703 is specifically configured to: when obtaining the area information of the second area based on the area information of the first area:
  • the area information of the second area is obtained from the operation management and maintenance network element or the access and mobility management function network element based on the area information of the first area.
  • the processing module 703 is specifically configured to: when determining load information of a network in the second area:
  • the load information of the network in the second area is obtained from a network management network element or an operation management and maintenance network element.
  • the first network element is a policy control function network element.
  • the communication device shown in FIG. 8 may be used to perform the operation of the requesting device in the embodiment shown in FIG. 15 and the operation of the AF in the embodiment shown in FIG. 16.
  • the sending module 802 is configured to send third information to the first network element.
  • the third information is used to request a background traffic transmission policy.
  • the third information includes one or more of the following: area information of the first area, and an identifier of the requesting device. Or terminal equipment group identification;
  • the receiving module 801 is configured to receive a background traffic transmission policy from a first network element.
  • the background traffic transmission policy includes area information of a second area, and the second area is a sub-area of the first area.
  • the background traffic transmission policy requested by the requesting device to the first network element can be more accurate.
  • the background traffic transmission policy is a background traffic transmission policy of at least one terminal device.
  • the requesting device serves at least one terminal device.
  • the background traffic transmission policy includes one or more of the following information: a recommended time window, a rate, and a maximum aggregated bit rate.
  • the first network element is a policy control function network element.
  • the communication device shown in FIG. 9 may be used to perform the operation of the first network element in the embodiment shown in FIG. 15, and may also be used to perform the operation of the PCF in the embodiment shown in FIG. 16. .
  • the transceiver 901 is configured to implement communication interaction with other devices connected to the first network element (for example, a PCF), that is, to receive and send data;
  • the first network element for example, a PCF
  • the processor 902 is configured to control the transceiver 901 to receive network performance information from the data analysis network element.
  • the network performance information includes area information and second information of the second area, and the second information includes one or more of the following: The load information of the network, the service experience information of the services in the second region, or the number of terminal devices in the second region; where the second region is a sub-region of the first region; and the first policy is determined according to the network performance information.
  • the formulated first strategy can be made more accurate according to the area information and related information of the divided sub-area.
  • the first policy includes a background traffic transmission policy, wherein the background traffic transmission policy is a background traffic transmission policy of at least one terminal device.
  • the processor 902 is further configured to control the transceiver 901 to receive third information from the requesting device, the third information is used to request a background traffic transmission policy, and the third information includes one or more of the following : The area information of the first area, the terminal device group identity or the identity of the requesting device; and the control transceiver 901 sends a background traffic transmission policy to the requesting device.
  • the background traffic transmission policy includes area information of the second area.
  • the processor 902 is further configured to control the transceiver 901 to send the area information of the second area to the requesting device.
  • the background traffic transmission policy further includes one or more of the following information: a recommended time window, a rate, and a maximum aggregated bit rate.
  • the first network element is a policy control function network element.
  • the communication device shown in FIG. 9 may be used to perform the operations of the data analysis network element in the embodiment shown in FIG. 15, and may also be used to execute the NWDAF in the embodiment shown in FIG. 16. operating. E.g:
  • the transceiver 901 is configured to implement communication interaction with other devices connected to a data analysis network element (such as NWDAF), that is, to receive and send data;
  • NWDAF data analysis network element
  • the processor 902 is configured to control the transceiver 901 to receive first information from the first network element, and the first information is used to request network performance information; the first information includes one or more of the following: area information of the first area, and a requesting device Identification or terminal equipment group identification;
  • the network performance information is determined according to the first information.
  • the network performance information includes area information and second information of the second area.
  • the second information includes one or more of the following: load information of the network in the second area, and services in the second area. Service experience information or the number of terminal devices in the second area; where the second area is a sub-area of the first area;
  • the control transceiver 901 sends network performance information to the first network element.
  • the formulated first strategy can be made more accurate according to the area information and related information of the divided sub-area.
  • the processor 902 when the first information includes area information of the first area, when the processor 902 determines network performance information according to the first information, the processor 902 is specifically configured to:
  • the processor 902 is specifically configured to determine the network performance information according to the first information:
  • the processor 902 is specifically configured to: when determining the area information of the second area according to the terminal device group identifier and / or the requesting device identifier, specifically:
  • the area information of the second area is acquired based on the area information of the first area.
  • the processor 902 is specifically configured to: when acquiring the area information of the second area based on the area information of the first area:
  • the area information of the second area is obtained from the operation management and maintenance network element or the access and mobility management function network element based on the area information of the first area.
  • the processor 902 is specifically configured to: when determining load information of a network in the second area:
  • the load information of the network in the second area is obtained from a network management network element or an operation management and maintenance network element.
  • the first network element is a policy control function network element.
  • the communication device shown in FIG. 9 may be used to perform the operation of the requesting device in the embodiment shown in FIG. 15 described above, and may also be used to perform the operation of AF in the embodiment shown in FIG. 16 described above.
  • the communication device shown in FIG. 9 may be used to perform the operation of the requesting device in the embodiment shown in FIG. 15 described above, and may also be used to perform the operation of AF in the embodiment shown in FIG. 16 described above.
  • the transceiver 901 is configured to implement communication interaction with other devices connected to the requesting device (for example, AF), that is, to receive and send data;
  • AF requesting device
  • the processor 902 is configured to control the transceiver 901 to send third information to the first network element, and the third information is used to request a background traffic transmission policy.
  • the third information includes one or more of the following: area information of the first area, request Device identification or terminal device group identification;
  • the control transceiver 901 receives a background traffic transmission policy from the first network element.
  • the background traffic transmission policy includes area information of the second area, and the second area is a sub-area of the first area.
  • the background traffic transmission policy requested by the requesting device to the first network element can be more accurate.
  • the background traffic transmission policy is a background traffic transmission policy of at least one terminal device.
  • the requesting device serves at least one terminal device.
  • the background traffic transmission policy includes one or more of the following information: a recommended time window, a rate, and a maximum aggregated bit rate.
  • the first network element is a policy control function network element.
  • At least one means one or more items
  • multiple items means two or more items.
  • “And / or” describes the association relationship of related objects, and indicates that there can be three kinds of relationships, for example, A and / or B can indicate: A exists alone, A and B exist simultaneously, and B alone exists, where A, B can be singular or plural.
  • the character “/” generally indicates that the related objects are an "or” relationship.
  • “At least one or more of the following" or similar expressions refers to any combination of these items, including any combination of single or plural items. For example, at least one (a), a, b, or c can be expressed as: a, b, c, ab, ac, bc, or abc, where a, b, and c can be single or multiple .
  • this application may be provided as a method, a system, or a computer program product. Therefore, this application may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Moreover, this application may take the form of a computer program product implemented on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, etc.) containing computer-usable program code.
  • computer-usable storage media including, but not limited to, disk storage, CD-ROM, optical storage, etc.
  • These computer program instructions may also be stored in a computer-readable memory capable of directing a computer or other programmable data processing device to work in a specific manner such that the instructions stored in the computer-readable memory produce a manufactured article including an instruction device, the instructions
  • the device implements the functions specified in one or more flowcharts and / or one or more blocks of the block diagram.
  • These computer program instructions can also be loaded onto a computer or other programmable data processing device, so that a series of steps can be performed on the computer or other programmable device to produce a computer-implemented process, which can be executed on the computer or other programmable device.
  • the instructions provide steps for implementing the functions specified in one or more flowcharts and / or one or more blocks of the block diagrams.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

一种确定背景流量传输策略的方法及装置,用以解决现有技术中不同的策略控制网元为不同的业务网元制定的背景流量传输策略之间产生冲突,后续导致背景流量传输失败的问题。在该方法中,数据分析网元可以基于其他所有终端设备(即第二终端设备)的目标背景流量传输策略确定出第一终端设备的背景流量传输数据分析结果,进而可以使第一策略控制网元确定出第一终端设备背景流量传输策略,这样所述第一策略控制网元确定的所述第一终端设备的背景流量传输策略参考了其他终端设备,从而可以使所述第一策略控制网元确定的所述第一终端设备的背景流量传输策略与其他终端设备之间的背景流量传输策略不产生冲突,从而可以解决背景流量传输失败的问题。

Description

一种确定背景流量传输策略的方法及装置
本申请要求在2018年05月21日提交中国专利局、申请号为201810491483.8、发明名称为《一种确定背景流量传输策略的方法及装置》,以及在2018年06月26日提交中国专利局、申请号为201810671611.7、发明名称为《一种确定背景流量传输策略的方法及装置》,以及在2019年04月01日提交中国专利局、申请号为201910256749.5、发明名称为《一种确定背景流量传输策略的方法及装置》的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及通信技术领域,尤其涉及一种确定背景流量传输策略的方法及装置。
背景技术
背景流量(background traffic,BG)也可以称为背景数据(background data,BD),通常被定义为非实时交互性流量,例如软件更新包、软件通知消息、车载地图信息等传输的流量等等。
目前,在背景流量传输之前,针对背景流量的传输,策略控制网元通常会为业务网元制定背景流量传输策略,以使后续业务网元对应的终端设备按照所述背景流量传输策略进行背景流量传输。但是,实际中,不同的业务网元会向不同的策略控制网元请求各自的背景流量传输策略,而不同的策略控制网元只能根据接入自身的业务网元的请求制定对应的背景流量传输策略,这样通常会导致不同的业务网元之间的背景流量传输策略产生冲突,后续导致背景流量传输失败。例如,多个业务网元的背景流量传输策略均指示各自的终端设备在凌晨1点到凌晨2点之间进行背景流量的传输,这样在同一时段多个终端设备进行背景流量传输可能会导致网络缓慢,进而可能导致背景流量传输失败。
目前,不同的策略控制网元为不同的业务网元制定的背景流量传输策略之间产生冲突,后续导致背景流量传输失败的问题亟待解决。
发明内容
本申请提供一种确定背景流量传输策略的方法及装置,用以解决现有技术中不同的策略控制网元为不同的业务网元制定的背景流量传输策略之间产生冲突,后续导致背景流量传输失败的问题。
第一方面,本申请提供了一种确定背景流量传输策略的方法,该方法包括:
第一策略控制网元(例如,PCF网元)从请求设备接收第一信息,第一信息用于请求第一终端设备的背景流量传输策略;第一策略控制网元根据第一信息向数据分析网元(例如,NWDAF网元)发送第二信息,第二信息用于请求第一终端设备的背景流量传输数据分析结果;第一策略控制网元从数据分析网元接收第一终端设备的背景流量传输数据分析结果,其中,第一终端设备的背景流量传输数据分析结果是数据分析网元基于第二终端设备的目标背景流量传输策略确定的,第二终端设备与第一终端设备不同,第二终端设备的目标背景流量传输策略用于第二终端设备进行背景流量传输;第一策略控制网元向请求设 备发送第一终端设备的背景流量传输策略,第一终端设备的背景流量传输策略由第一策略控制网元根据第三信息确定,第三信息包括第一终端设备的背景流量传输数据分析结果。
通过上述方法,通过数据分析网元基于其他终端设备(即第二终端设备)的目标背景流量传输策略确定出的第一终端设备的背景流量传输数据分析结果,进而可以使第一策略控制网元确定出第一终端设备背景流量传输策略,这样第一策略控制网元确定的第一终端设备的背景流量传输策略参考了其他终端设备,从而可以使第一策略控制网元确定的第一终端设备的背景流量传输策略与其他终端设备之间的背景流量传输策略不产生冲突,从而可以解决背景流量传输失败的问题。
在一个可能的设计中,第三信息还包括:第一终端设备的背景流量传输查询结果和/或第一终端设备的本地背景流量传输策略。这样可以使第一策略控制网元确定的第一终端设备的背景流量传输策略更准确。
在一个可能的设计中,方法还包括:当第三信息还包括第一终端设备的背景流量传输查询结果时,第一策略控制网元从数据库网元获取第一终端设备的背景流量传输查询结果;或者,当第三信息还包括第一终端设备的本地背景流量传输策略时,第一策略控制网元从第一策略控制网元获取第一终端设备的本地背景流量传输策略;或者,当第三信息还包括第一终端设备的背景流量传输查询结果和第一终端设备的本地背景流量传输策略时,第一策略控制网元从数据库网元获取第一终端设备的背景流量传输查询结果,以及,第一策略控制网元从第一策略控制网元获取第一终端设备的本地背景流量传输策略。
通过上述方法,可以使第一策略控制网元后续根据第三信息准确地确定第一终端设备的背景流量传输策略。
在一个可能的设计中,当第一终端设备的背景流量传输策略为一条时,第一策略控制网元确定第一终端设备的背景流量传输策略为第一终端设备的目标背景流量传输策略,第一终端设备的目标背景流量传输策略用于第一终端设备进行背景流量传输;之后,第一策略控制网元向数据分析网元发送第一终端设备的目标背景流量传输策略;或者第一策略控制网元向数据库网元发送第一终端设备的目标背景流量传输策略;或者第一策略控制网元向数据分析网元和数据库网元均发送第一终端设备的目标背景流量传输策略。
通过上述方法,可以使数据分析网元保存第一终端设备的目标背景流量传输策略,进而在之后其他终端设备向数据分析网元请求相应的背景流量传输数据分析结果时,数据分析网元可以参考第一终端设备的目标背景流量传输策略为其他终端设备确定其他终端设备的背景流量传输数据分析结果,以使后续其他终端设备的背景流量传输策略与第一终端设备的目标背景流量传输策略之间可以降低冲突,进而可以是其他终端设备的背景流量传输成功。或者,可以使数据库网元保存第一终端设备的目标背景流量传输策略,以使后续数据分析网元可以从数据库网元中获取第一终端设备的目标背景流量传输策略,从而实现上述有益效果。
在一个可能的设计中,当第一终端设备的背景流量传输策略有多条时,第一策略控制网元从请求设备接收第一终端设备的目标背景流量传输策略,第一终端设备的目标背景流量传输策略由请求设备根据第一终端设备的背景流量传输策略选择的;之后,第一策略控制网元向数据分析网元发送第一终端设备的目标背景流量传输策略;或者第一策略控制网元向数据库网元发送第一终端设备的目标背景流量传输策略;或者第一策略控制网元向数据分析网元和数据库网元均发送第一终端设备的目标背景流量传输策略。
通过上述方法,可以使数据分析网元保存第一终端设备的目标背景流量传输策略,进而在之后其他终端设备向数据分析网元请求相应的背景流量传输数据分析结果时,数据分析网元可以参考第一终端设备的目标背景流量传输策略为其他终端设备确定其他终端设备的背景流量传输数据分析结果,以使后续其他终端设备的背景流量传输策略与第一终端设备的目标背景流量传输策略之间可以降低冲突,进而可以是其他终端设备的背景流量传输成功。或者,可以使数据库网元保存第一终端设备的目标背景流量传输策略,以使后续数据分析网元可以从数据库网元中获取第一终端设备的目标背景流量传输策略,从而实现上述有益效果。
在一个可能的设计中,请求设备为第一终端设备,或者服务于第一终端设备的业务网元。这样,既可以实现上行背景流量传输策略的请求,也可以实现下行背景流量传输策略的请求,背景流量传输策略的请求可以比较灵活。
在一个可能的设计中,背景流量传输数据分析结果包括:背景流量的传输时间窗的第一数据值;背景流量传输数据分析结果还包括:背景流量的传输带宽的第一数据值、第一终端设备的位置信息、第一终端设备的标识中的至少一项。
这样,第一策略控制网元可以通过背景流量传输数据分析结果包括的内容,确定第一终端设备的背景流量传输策略。
在一个可能的设计中,第一终端设备的位置信息可以为如下信息中的一种或者多种:网络区域、RAN设备ID、小区(Cell)ID和全球定位系统(global positioning system,GPS)。
在一个可能的设计中,第一终端设备的标识可以为以下一个或者多个:网际协议地址(internet protocol,IP)、签约永久标识(subscription permanent Identifier,SUPI)、永久设备标识(permanent equipment identifier,PEI)、通用公共签约标识(generic public subscription identifier,GPSI)、国际移动用户标识符(international mobile subscriber identifier,IMSI)、国际移动设备标识(international mobile equipment identity,IMEI)、IP五元组(5-tuple)和移动台国际综合业务数字网络号码(mobile station international integrated service digital network number,MSISDN)。
在一个可能的设计中,背景流量传输策略包括:背景流量的传输时间窗的第二数据值;背景流量传输策略还包括:背景流量的传输带宽的第二数据值、第一终端设备的位置信息、第一终端设备的标识中的至少一项。
这样,后续可以使第一终端设备通过背景流量传输策略进行背景流量传输。
在一个可能的设计中,第二信息中包括第一终端设备的:背景流量的大小;第二信息中还包括第一策略控制网元的标识、请求设备的标识、第一终端设备的背景流量的传输时间窗的第三数据值、第一终端设备的位置信息、第一终端设备的标识中的至少一项。
这样,可以使数据分析网元结合第二信息中包括的内容,准确地确定出第一终端设备的背景流量传输数据分析结果。
在一个可能的设计中,第一信息中包括第一终端设备的:背景流量的大小;第一信息中还包括请求设备的标识、第一终端设备的背景流量的传输时间窗的第三数据值、第一终端设备的位置信息、第一终端设备的标识中的至少一项。
这样,第一策略控制网元可以通过第一信息包括的内容获知第一终端设备的需求,以使后续为第一终端设备请求满足需求的背景流量传输策略。
在一个可能的设计中,背景流量传输查询结果包括:背景流量的传输时间窗的第四数 据值;背景流量传输查询结果还包括:背景流量的传输带宽的第四数据值、第一终端设备的位置信息、第一终端设备的标识中的至少一项。
在一个可能的设计中,本地背景流量传输策略包括:背景流量的传输时间窗的第五数据值;本地背景流量传输结果还包括:背景流量的传输带宽的第五数据值、第一终端设备的位置信息、第一终端设备的标识中的至少一项。
在一种可能的设计中,第一策略控制网元向请求设备发送第一终端设备的背景流量传输策略时,第一策略控制网元还可以向请求设备发送标识信息,标识信息用于标识第一终端设备的目标背景流量传输策略。
这样,当请求设备接收到第一终端设备的背景流量时,可以通过标识信息在第一终端设备的背景流量中确定第一终端设备的目标背景流量。
在一种可能的设计中,第一策略控制网元向数据分析网元发送第一终端设备的目标背景流量传输策略时,第一策略控制网元还可以向数据分析网元发送标识信息、请求设备的标识、第一策略控制网元的标识中的至少一项;或者,第一策略控制网元向数据分析网元发送第一终端设备的目标背景流量传输策略时,第一策略控制网元还可以向数据库网元发送标识信息、请求设备的标识、第一策略控制网元的标识中的至少一项;或者,第一策略控制网元向数据分析网元和数据库网元发送第一终端设备的目标背景流量传输策略时,第一策略控制网元还可以向数据分析网元和数据库网元发送标识信息、请求设备的标识、第一策略控制网元的标识中的至少一项。
这样,数据分析网元可以确定第一终端设备的目标背景流量传输策略是为请求设备或者第一策略控制网元制定的,便于后续数据分析网元为请求设备、其他请求设备上、第一策略控制网元或者其他策略控制网元上的不同于第一终端设备的终端设备制定目标背景流量传输策略。或者,数据库网元存储第一终端设备的目标背景流量传输策略以及标识信息,便于当请求设备要传输背景流量时,可以通过标识信息从数据库网元中查询得到标识信息对应的第一终端设备的目标背景流量传输策略。
在一种可能的设计中,第一策略控制网元向请求设备发送第一终端设备的背景流量传输策略之后,第一策略网元还可以从请求设备接收标识信息。
这样,第一策略控制网元可以通过标识信息从数据库网元查询得到第一终端设备的目标背景流量传输策略,后续将第一终端设备的目标背景流量传输策略发送给第一终端设备、无线接入网网元、用户面功能网元、业务网元中的至少一个。
第二方面,本申请提供了一种确定背景流量传输策略的方法,该方法包括:
数据分析网元从第一策略控制网元接收第二信息,第二信息用于请求第一终端设备的背景流量传输数据分析结果,第二信息由第一策略控制网元从请求设备接收的第一信息确定,第一信息用于请求第一终端设备的背景流量传输策略;数据分析网元向第一策略控制网元发送第一终端设备的背景流量传输数据分析结果,第一终端设备的背景流量传输数据分析结果由数据分析网元基于第二终端设备的目标背景流量传输策略所确定,第二终端设备与第一终端设备不同,第二终端设备的目标背景流量传输策略用于第二终端设备进行背景流量传输。
通过上述方法,数据分析网元基于其他终端设备(即第二终端设备)的目标背景流量传输策略确定出第一终端设备的背景流量传输数据分析结果,进而可以使第一策略控制网 元确定出第一终端设备背景流量传输策略,这样可以使第一策略控制网元确定的第一终端设备的背景流量传输策略参考了其他终端设备,从而可以使第一策略控制网元确定的第一终端设备的背景流量传输策略与其他终端设备之间的背景流量传输策略不产生冲突,从而可以解决背景流量传输失败的问题。
在一个可能的设计中,第一终端设备的背景流量传输数据分析结果还可以由数据分析网元基于第二终端设备的目标背景流量传输策略和第二信息,以及功能网元的负载信息、功能网元的容量信息两项中的至少一项所确定。
通过上述方法,数据分析网元分析出的第一终端设备的背景流量传输数据分析结果可以更加可靠。
在一个可能的设计中,当第一终端设备是通信系统中第一个需要传输背景流量的终端设备时,数据分析网元还获取不到任何终端设备的目标背景流量传输策略,此时,第一终端设备的背景流量传输数据分析结果可以由数据分析网元基于第二信息、功能网元的负载信息、功能网元的容量信息中的至少一项所确定。
通过上述方法,初始的第一终端设备的背景流量传输数据分析结果可以由数据分析网元准确分析得到,以使后续得到第一终端设备的背景流量传输策略。
在一个可能的设计中,数据分析网元还可以获取第二终端设备的目标背景流量传输策略。
通过上述方法数据分析网元才可以基于第二终端设备的目标背景流量传输策略,准确地确定第一终端设备的背景流量传输数据分析结果。
在一个可能的设计中,数据分析网元获取第二终端设备的目标背景流量传输策略,具体可以包括:数据分析网元从第一设备接收第二终端设备的目标背景流量传输策略,其中第一设备为以下任意一项或多项:第二终端设备、第一策略控制网元、第二策略控制网元、第二业务网元、第二数据库网元,其中,第一策略控制网元、第二策略控制网元、第二业务网元、第二数据库网元服务于第二终端设备。
通过上述方法,数据分析网元可以通过多种方式成功获取到第二终端设备的目标背景流量传输策略,以使后续数据分析网元确定第一终端设备的背景流量传输数据分析结果。
在一个可能的设计中,数据分析网元还可以获取功能网元的负载信息;或者,数据分析网元还可以获取功能网元的容量信息;或者数据分析网元还可以获取功能网元的负载信息和功能网元的容量信息。
通过上述方法,数据分析网元才可以基于功能网元的负载信息,或者功能网元的容量信息,或者功能网元的负载信息和功能网元的容量信息,更准确地确定第一终端设备的背景流量传输数据分析结果。
在一个可能的设计中,数据分析网元获取功能网元的负载信息具体可以包括:数据分析网元从功能网元或者运行管理维护网元接收功能网元的负载信息;或者数据分析网元获取功能网元的容量信息具体可以包括:数据分析网元从功能网元或者运行管理维护网元接收功能网元的容量信息;或者数据分析网元获取功能网元的负载信息和功能网元的容量信息具体可以包括:数据分析网元从功能网元或者运行管理维护网元接收功能网元的负载信息和功能网元的容量信息。
通过上述方法,数据分析网元可以通过多种方式成功获取到功能网元的负载信息,或者功能网元的容量信息,或者功能网元的负载信息和功能网元的容量信息,以使后续数据 分析网元准确地确定第一终端设备的背景流量传输数据分析结果。
在一个可能的设计中,功能网元包括服务于第一终端设备的第一策略控制网元、会话管理功能网元、无线接入网网元、接入与移动性管理功能网元、用户面功能网元中的至少一个。
在一个可能的设计中,数据分析网元还可以接收第一终端设备的目标背景流量传输策略,其中第一终端设备根据第一终端设备的目标背景流量传输策略进行背景流量传输。
通过上述方法,数据分析网元可以保存第一终端设备的目标背景流量传输策略,进而在之后其他终端设备向数据分析网元请求相应的背景流量传输数据分析结果时,数据分析网元可以参考第一终端设备的目标背景流量传输策略为其他终端设备确定其他终端设备的背景流量传输数据分析结果,以使后续其他终端设备的背景流量传输策略与第一终端设备的目标背景流量传输策略之间可以降低冲突,进而可以是其他终端设备的背景流量传输成功。
在一个可能的设计中,数据分析网元接收第一终端设备的目标背景流量传输策略,具体可以包括:数据分析网元从第二设备接收第一终端设备的目标背景流量传输策略,其中,第二设备为以下任意一项或多项:第一终端设备、第一策略控制网元、第一业务网元、第一数据库网元,其中,第一策略控制网元、第一业务网元、第一数据库网元服务于第一终端设备。
通过上述方法,数据分析网元可以通过多种方式获取到第一终端设备的目标背景流量传输策略,以使数据分析网元可以保存第一终端设备的目标背景流量传输策略,进而在之后其他终端设备向数据分析网元请求相应的背景流量传输数据分析结果时,数据分析网元可以参考第一终端设备的目标背景流量传输策略为其他终端设备确定其他终端设备的背景流量传输数据分析结果,以使后续其他终端设备的背景流量传输策略与第一终端设备的目标背景流量传输策略之间可以降低冲突,进而可以是其他终端设备的背景流量传输成功。
在一种可能的设计中,数据分析网元接收第一终端设备的目标背景流量传输策略时,数据分析网元还可以接收请求设备的标识,或者还可以接收第一策略控制网元的标识,或者还可以接收请求设备的标识和第一策略控制网元的标识。
这样,数据分析网元可以确定第一终端设备的目标背景流量传输策略是为请求设备或者第一策略控制网元制定的,便于数据分析网元为请求设备、其他请求设备、第一策略控制网元或者其他策略控制网元上的不同于第一终端设备的终端设备制定目标背景流量传输策略。
在一个可能的设计中,背景流量传输数据分析结果包括:背景流量的传输时间窗的第一数据值;背景流量传输数据分析结果还包括:背景流量的传输带宽的第一数据值、第一终端设备的位置信息、第一终端设备的标识中的至少一项。
这样,可以使第一策略控制网元通过背景流量传输数据分析结果包括的内容,确定第一终端设备的背景流量传输策略。
在一个可能的设计中,背景流量传输策略包括:背景流量的传输时间窗的第二数据值;背景流量传输策略还包括:背景流量的传输带宽的第二数据值、第一终端设备的位置信息、第一终端设备的标识中的至少一项。
这样,后续可以使第一终端设备通过背景流量传输策略进行背景流量传输。
在一个可能的设计中,第二信息中包括第一终端设备的:背景流量的大小;第二信息中还包括第一策略控制网元的标识、请求设备标识、第一终端设备的背景流量的传输时间窗的第三数据值、第一终端设备的位置信息、第一终端设备的标识中的至少一项。
这样,数据分析网元可以结合第二信息中包括的内容,准确地确定出第一终端设备的背景流量传输数据分析结果。
在一个可能的设计中,第一信息中包括第一终端设备的:背景流量的大小;第一信息中还包括请求设备标识、第一终端设备的背景流量的传输时间窗的第三数据值、第一终端设备的位置信息、第一终端设备的标识中的至少一项。
这样,可以使第一策略控制网元通过第一信息包括的内容获知第一终端设备的需求,以使后续向数据分析网元请求第一终端设备的背景流量传输数据分析结果。
第三方面,本申请提供了一种确定背景流量传输策略的方法,该方法包括:
第一终端设备向第一策略控制网元发送第一信息,第一信息用于请求第一终端设备的背景流量传输策略;第一终端设备从第一策略控制网元接收第一终端设备的背景流量传输策略,其中第一终端设备的背景流量传输策略是第一策略控制网元根据第三信息确定的,第三信息包括来自数据分析网元的第一终端设备的背景流量传输数据分析结果。
通过上述方法,第一终端设备的背景流量传输策略是第一策略控制网元根据第三信息确定的,第三信息包括来自数据分析网元的第一终端设备的背景流量传输数据分析结果,这样第一策略控制网元确定的第一终端设备的背景流量传输策略参考了其他终端设备,从而可以使第一终端设备的背景流量传输策略与其他终端设备之间的背景流量传输策略不产生冲突,从而可以解决背景流量传输失败的问题。并且,通过上述方法,还可以实现第一终端设备的上行背景流量传输策略的请求。
在一个可能的设计中,第三信息还包括:第一终端设备的背景流量传输查询结果和/或第一终端设备的本地背景流量传输策略。
通过上述方法,可以使第一策略控制网元后续根据第三信息准确地确定第一终端设备的背景流量传输策略。
在一个可能的设计中,当第一终端设备的背景流量传输策略为一条时,方法还包括:第一终端设备确定第一终端设备的背景流量传输策略为第一终端设备的目标背景流量传输策略;第一终端设备向数据分析网元发送第一终端设备的目标背景流量传输策略。
通过上述方法,可以使数据分析网元保存第一终端设备的目标背景流量传输策略,进而在之后其他终端设备向数据分析网元请求相应的背景流量传输数据分析结果时,数据分析网元可以参考第一终端设备的目标背景流量传输策略为其他终端设备确定其他终端设备的背景流量传输数据分析结果,以使后续其他终端设备的背景流量传输策略与第一终端设备的目标背景流量传输策略之间可以降低冲突,进而可以是其他终端设备的背景流量传输成功。
在一个可能的设计中,当第一终端设备的背景流量传输策略有多条时,方法还包括:第一终端设备根据第一终端设备的背景流量传输策略选择第一终端设备的目标背景流量传输策略;第一终端向第一策略控制网元发送第一终端设备的目标背景流量传输策略。
通过上述方法,可以使第一策略控制网元接收到第一终端设备的目标背景流量传输策略时,将第一终端设备的目标背景流量传输策略发送给数据分析网元,以使数据分析网元 保存第一终端设备的目标背景流量传输策略,进而在之后其他终端设备向数据分析网元请求相应的背景流量传输数据分析结果时,数据分析网元可以参考第一终端设备的目标背景流量传输策略为其他终端设备确定其他终端设备的背景流量传输数据分析结果,以使后续其他终端设备的背景流量传输策略与第一终端设备的目标背景流量传输策略之间可以降低冲突,进而可以是其他终端设备的背景流量传输成功。
在一个可能的设计中,第一终端设备还可以向数据分析网元发送第一终端设备的目标背景流量传输策略。
通过上述方法,可以使数据分析网元保存第一终端设备的目标背景流量传输策略,进而在之后其他终端设备向数据分析网元请求相应的背景流量传输数据分析结果时,数据分析网元可以参考第一终端设备的目标背景流量传输策略为其他终端设备确定其他终端设备的背景流量传输数据分析结果,以使后续其他终端设备的背景流量传输策略与第一终端设备的目标背景流量传输策略之间可以降低冲突,进而可以是其他终端设备的背景流量传输成功。
在一个可能的设计中,背景流量传输数据分析结果包括:背景流量的传输时间窗的第一数据值;背景流量传输数据分析结果还包括:背景流量的传输带宽的第一数据值、第一终端设备的位置信息、第一终端设备的标识中的至少一项。
这样,可以使第一策略控制网元通过背景流量传输数据分析结果包括的内容,确定第一终端设备的背景流量传输策略。
在一个可能的设计中,背景流量传输策略包括:背景流量的传输时间窗的第二数据值;背景流量传输策略还包括:背景流量的传输带宽的第二数据值、第一终端设备的位置信息、第一终端设备的标识中的至少一项。
这样,后续可以使第一终端设备通过背景流量传输策略进行背景流量传输。
在一个可能的设计中,第一信息中包括第一终端设备的:背景流量的大小;第一信息中还包括第一终端设备的:背景流量的传输时间窗的第三数据值、位置信息、标识中的至少一项。
这样,第一策略控制网元可以通过第一信息包括的内容获知第一终端设备的需求,以使后续为第一终端设备请求满足需求的背景流量传输策略。
在一个可能的设计中,背景流量传输查询结果包括:背景流量的传输时间窗的第四数据值;背景流量传输查询结果还包括:背景流量的传输带宽的第四数据值、第一终端设备的位置信息、第一终端设备的标识中的至少一项。
在一个可能的设计中,本地背景流量传输策略包括:背景流量的传输时间窗的第五数据值;本地背景流量传输结果还包括:背景流量的传输带宽的第五数据值、第一终端设备的位置信息、第一终端设备的标识中的至少一项。
在一个可能的设计中,第一终端设备从第一策略控制网元接收第一终端设备的背景流量传输策略时第一终端设备还可以从第一策略控制网元接收标识信息,标识信息用于标识第一终端设备的目标背景流量传输策略。
这样,当第一终端设备要传输背景流量,接收到第一终端设备的背景流量传输策略时,第一终端设备可以通过标识信息在第一终端设备的背景流量传输策略中确定第一终端设备的目标背景流量传输策略。
在一个可能的设计中,第一终端设备从第一策略控制网元接收第一终端设备的背景流 量传输策略之后,第一终端设备还可以向第一策略控制网元发送标识信息。
这样,可以使第一策略控制网元可以通过标识信息从数据库网元查询得到第一终端设备的目标背景流量传输策略,后续将第一终端设备的目标背景流量传输策略发送给无线接入网网元、用户面功能网元、业务网元中的至少一个。
在一个可能的设计中,第一终端设备向第一策略控制网元发送第一信息之前,方法还包括:第一终端设备从第一业务网元获取第一终端设备的:背景流量的大小;第一终端设备从第一业务网元还获取第一终端设备的:背景流量的传输时间窗的第三数据值、位置信息、标识中的至少一项。
通过上述方法,第一终端设备可以通过从第一业务网元获取下行背景流量传输需求,以使后续第一终端设备请求下行背景流量传输策略。
第四方面,本申请提供了一种确定背景流量传输策略的方法,该方法包括:
第一业务网元向第一策略控制网元发送第一信息,第一信息用于请求第一终端设备的背景流量传输策略;第一业务网元从第一策略控制网元接收第一终端设备的背景流量传输策略,其中第一终端设备的背景流量传输策略是第一策略控制网元根据第三信息确定的,第三信息包括来自数据分析网元的第一终端设备的背景流量传输数据分析结果。
通过上述方法,第一终端设备的背景流量传输策略是第一策略控制网元根据第三信息确定的,第三信息包括来自数据分析网元的第一终端设备的背景流量传输数据分析结果,这样第一策略控制网元确定的第一终端设备的背景流量传输策略参考了其他终端设备,从而可以使第一终端设备的背景流量传输策略与其他终端设备之间的背景流量传输策略不产生冲突,从而可以解决背景流量传输失败的问题。
在一个可能的设计中,第三信息还包括:第一终端设备的背景流量传输查询结果和/或第一终端设备的本地背景流量传输策略。这样可以使第一策略控制网元确定的第一终端设备的背景流量传输策略更准确。
在一个可能的设计中,当第一终端设备的背景流量传输策略为一条时,方法还包括:第一业务网元确定第一终端设备的背景流量传输策略为第一终端设备的目标背景流量传输策略;第一业务网元向数据分析网元发送第一终端设备的目标背景流量传输策略。
通过上述方法,可以使数据分析网元保存第一终端设备的目标背景流量传输策略,进而在之后其他终端设备向数据分析网元请求相应的背景流量传输数据分析结果时,数据分析网元可以参考第一终端设备的目标背景流量传输策略为其他终端设备确定其他终端设备的背景流量传输数据分析结果,以使后续其他终端设备的背景流量传输策略与第一终端设备的目标背景流量传输策略之间可以降低冲突,进而可以是其他终端设备的背景流量传输成功。
在一个可能的设计中,当第一终端设备的背景流量传输策略有多条时,方法还包括:第一业务网元根据第一终端设备的背景流量传输策略选择第一终端设备的目标背景流量传输策略;第一业务网元向第一策略控制网元发送第一终端设备的目标背景流量传输策略。
通过上述方法,可以使第一策略控制网元接收到第一终端设备的目标背景流量传输策略时,将第一终端设备的目标背景流量传输策略发送给数据分析网元,以使数据分析网元保存第一终端设备的目标背景流量传输策略,进而在之后其他终端设备向数据分析网元请 求相应的背景流量传输数据分析结果时,数据分析网元可以参考第一终端设备的目标背景流量传输策略为其他终端设备确定其他终端设备的背景流量传输数据分析结果,以使后续其他终端设备的背景流量传输策略与第一终端设备的目标背景流量传输策略之间可以降低冲突,进而可以是其他终端设备的背景流量传输成功。
在一个可能的设计中,第一业务网元还可以向数据分析网元发送第一终端设备的目标背景流量传输策略。
通过上述方法,可以使数据分析网元保存第一终端设备的目标背景流量传输策略,进而在之后其他终端设备向数据分析网元请求相应的背景流量传输数据分析结果时,数据分析网元可以参考第一终端设备的目标背景流量传输策略为其他终端设备确定其他终端设备的背景流量传输数据分析结果,以使后续其他终端设备的背景流量传输策略与第一终端设备的目标背景流量传输策略之间可以降低冲突,进而可以是其他终端设备的背景流量传输成功。
在一个可能的设计中,背景流量传输数据分析结果包括:背景流量的传输时间窗的第一数据值;背景流量传输数据分析结果还包括:背景流量的传输带宽的第一数据值、第一终端设备的位置信息、第一终端设备的标识中的至少一项。
这样,可以使第一策略控制网元通过背景流量传输数据分析结果包括的内容,确定第一终端设备的背景流量传输策略。
在一个可能的设计中,背景流量传输策略包括:背景流量的传输时间窗的第二数据值;背景流量传输策略还包括:背景流量的传输带宽的第二数据值、第一终端设备的位置信息、第一终端设备的标识中的至少一项。
这样,后续可以使第一终端设备通过背景流量传输策略进行背景流量传输。
在一个可能的设计中,第一信息中包括第一终端设备的:背景流量的大小;第一信息中还包括第一业务网元的标识、第一终端设备的背景流量的传输时间窗的第三数据值、第一终端设备的位置信息、第一终端设备的标识中的至少一项。
这样,第一策略控制网元可以通过第一信息包括的内容获知第一终端设备的需求,以使后续为第一终端设备请求满足需求的背景流量传输策略。
在一个可能的设计中,背景流量传输查询结果包括:背景流量的传输时间窗的第四数据值;背景流量传输查询结果还包括:背景流量的传输带宽的第四数据值、第一终端设备的位置信息、第一终端设备的标识中的至少一项。
在一个可能的设计中,本地背景流量传输策略包括:背景流量的传输时间窗的第五数据值;本地背景流量传输结果还包括:背景流量的传输带宽的第五数据值、第一终端设备的位置信息、第一终端设备的标识中的至少一项。
在一个可能的设计中,第一业务网元从第一策略控制网元接收第一终端设备的背景流量传输策略时,第一业务网元还可以从第一策略控制网元接收标识信息,标识信息用于标识第一终端设备的目标背景流量传输策略。
这样,当第一业务网元接收到第一终端设备的背景流量时,可以通过标识信息在第一终端设备的背景流量中确定第一终端设备的目标背景流量。
在一个可能的设计中,第一业务网元从第一策略控制网元接收第一终端设备的背景流量传输策略之后,第一业务网元还可以向第一策略控制网元发送标识信息。
这样,第一策略控制网元可以通过标识信息从数据库网元查询得到第一终端设备的目 标背景流量传输策略,后续将第一终端设备的目标背景流量传输策略发送给第一终端设备、无线接入网网元、用户面功能网元中的至少一个。
在一个可能的设计中,第一业务网元向第一策略控制网元发送第一信息之前,方法还包括:第一业务网元从第一终端设备获取第一终端设备的:背景流量的大小;第一业务网元从第一终端设备还获取第一业务网元的标识、第一终端设备的背景流量的传输时间窗的第三数据值、第一终端设备的位置信息、第一终端设备的标识中的至少一项。
通过上述方法,第一业务网元可以通过从第一终端设备获取上行背景流量传输需求,以使后续第一业务网元为第一终端设备请求上行背景流量传输策略。
第五方面,本申请还提供了一种用于确定背景流量传输策略的通信装置,该通信装置具有实现上述方法实例中第一策略控制网元的功能。所述功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。所述硬件或软件包括一个或多个与上述功能相对应的模块。
在一个可能的设计中,所述通信装置的结构中包括接收模块和发送模块,可选的还可以包括处理模块,这些模块可以执行上述方法示例中的相应功能,具体参见方法示例中的详细描述,此处不做赘述。
在一个可能的设计中,所述通信装置的结构中包括收发器和处理器,可选的还可以包括存储器,所述收发器用于收发数据,以及与通信系统中的其他设备进行通信交互,所述处理器被配置为支持所述第一策略控制网元执行上述方法中相应的功能。所述存储器与所述处理器耦合,其保存所述通信装置必要的程序指令和数据。
第六方面,本申请还提供了一种用于确定背景流量传输策略的通信装置,该通信装置具有实现上述方法实例中数据分析网元的功能。所述功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。所述硬件或软件包括一个或多个与上述功能相对应的模块。
在一个可能的设计中,所述通信装置的结构中包括接收模块和发送模块,这些模块可以执行上述方法示例中的相应功能,具体参见方法示例中的详细描述,此处不做赘述。
在一个可能的设计中,所述通信装置的结构中包括收发器和处理器,可选的还可以包括存储器,所述收发器用于收发数据,以及与通信系统中的其他设备进行通信交互,所述处理器被配置为支持所述数据分析网元执行上述方法中相应的功能。所述存储器与所述处理器耦合,其保存所述通信装置必要的程序指令和数据。
第七方面,本申请还提供了一种用于确定背景流量传输策略的通信装置,该通信装置具有实现上述方法实例中第一终端设备的功能。所述功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。所述硬件或软件包括一个或多个与上述功能相对应的模块。
在一个可能的设计中,所述通信装置的结构中包括接收模块和发送模块,可选的还可以包括处理模块,这些模块可以执行上述方法示例中的相应功能,具体参见方法示例中的详细描述,此处不做赘述。
在一个可能的设计中,所述通信装置的结构中包括收发器和处理器,可选的还可以包括存储器,所述收发器用于收发数据,以及与通信系统中的其他设备进行通信交互,所述处理器被配置为支持所述第一终端设备执行上述方法中相应的功能。所述存储器与所述处 理器耦合,其保存所述通信装置必要的程序指令和数据。
第八方面,本申请还提供了一种用于确定背景流量传输策略的通信装置,该通信装置具有实现上述方法实例中第一业务网元的功能。所述功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。所述硬件或软件包括一个或多个与上述功能相对应的模块。
在一个可能的设计中,所述通信装置的结构中包括接收模块和发送模块,可选的还可以包括处理模块,这些模块可以执行上述方法示例中的相应功能,具体参见方法示例中的详细描述,此处不做赘述。
在一个可能的设计中,所述通信装置的结构中包括收发器和处理器,可选的还可以包括存储器,所述收发器用于收发数据,以及与通信系统中的其他设备进行通信交互,所述处理器被配置为支持所述第一业务网元执行上述方法中相应的功能。所述存储器与所述处理器耦合,其保存所述通信装置必要的程序指令和数据。
第九方面,本申请还提供了一种通信系统,所述通信系统可以包括上述设计中提及的第一策略控制网元、数据分析网元、请求设备(例如第一终端设备和/第一业务网元)等。
第十方面,本申请还提供了一种计算机存储介质,所述计算机存储介质中存储有计算机可执行指令,所述计算机可执行指令在被所述计算机调用时用于使所述计算机执行上述任一种方法。
第十一方面,本申请还提供了一种包含指令的计算机程序产品,当其在计算机上运行时,使得计算机执行上述任一种方法。
第十二方面,本申请还提供了一种芯片,所述芯片与存储器相连,用于读取并执行存储器中存储的程序指令,以实现上述任一种方法。
第十三方面,本申请提供了一种确定背景流量传输策略的方法,该方法包括:
第一策略控制网元(例如,PCF网元)获取至少一个第一信息,根据第二信息确定至少一个第二终端设备的背景流量传输策略;其中,第一信息中包含至少一个第一终端设备的标识、第一时间、第一位置以及第一网元状态;第二信息包括至少一个第一信息;至少一个第一终端设备为至少一个第二终端设备中的部分或全部;至少一个第一终端设备在第一时间驻留在第一位置,且具有第一网元状态。
通过上述方法,第一策略控制网元在制定至少一个第二终端设备的背景流量传输策略时,可以考虑每个第二终端设备的移动轨迹(包括第一时间和第一位置)以及第一位置上的第一网元状态,这样会使得第一策略控制网元制定的至少一个第二终端设备的背景流量传输策略更加准确。
在一个可能的设计中,第一策略控制网元在获取至少一个第一信息之前,第一策略控制网元从请求设备接收第五信息,第五信息用于请求至少一个第二终端设备的背景流量传输策略。其中,请求设备为所述至少一个第二终端设备提供服务,第五信息可以包括请求设备的标识以及以下一项或多项:第二终端设备的个数、每个第二终端设备需要传输的背 景流量的大小、时间窗。可选的,第五信息中还可以包括至少一个第二终端设备所在的网络区域(追踪区域列表(Tracking Area List,TA List)或者路由区域列表(Routing Area List,RA List))。
通过上述方法,可以触发第一策略控制网元发起获取至少一个第一信息的流程,从而获得确定第二终端设备的背景流量传输策略所需的信息。
在一个可能的设计中,方法还包括:第一策略控制网元从请求设备接收至少一个第二终端设备的标识,请求设备为至少一个第二终端设备提供服务;或者,第一策略控制网元从请求设备接收请求设备的标识,并根据请求设备的标识,从第一策略控制网元或者数据库网元查询得到至少一个第二终端设备的标识。
通过上述方法,可以使第一策略控制网元根据至少一个第二终端设备的标识去请求至少一个第一信息。
在一个可能的设计中,第一策略控制网元获取至少一个第一信息,具体方法可以为:第一策略控制网元从数据分析网元获取至少一个第一信息;或者第一策略控制网元获取本地保存的至少一个第一信息。这样第一策略控制网元可以准确地获取到至少一个第一信息。
在一个可能的设计中,第一策略控制网元从数据分析网元获取至少一个第一信息,具体方法可以为:第一策略控制网元向数据分析网元发送第六信息,第六信息用于请求至少一个第一信息,第六信息中包括至少一个第二终端设备的标识;第一策略控制网元从数据分析网元接收至少一个第一信息。
通过上述方法,第一策略控制网元可以从数据分析网元准确地获取到至少一个第一信息,进而确定第二终端设备的背景流量传输策略。
在一个可能的设计中,第一策略控制网元中可以保存着与至少一个第三终端设备对应的至少一个第七信息,第七信息中包含至少一个第四终端设备的标识、第一时间、第一位置以及第一网元状态。其中至少一个第四终端设备为至少一个第三终端设备的部分或全部,至少一个第三终端设备包含至少一个第二终端设备。此时,第一策略控制网元在接收到请求设备的第五信息之后,在保存的至少一个第七信息中确定至少一个第一信息。具体的,第一策略控制网元在保存的至少一个第七信息中确定至少一个第一信息,具体方法可以为:第一策略控制网元在至少一个第七信息中选择与第二终端设备的标识相同的第四终端设备对应的信息,从而筛选出至少一个第一信息。
通过上述方法,第一策略控制网元可以从数据分析网元准确地获取到至少一个第一信息,进而确定至少一个第二终端设备的背景流量传输策略。
在一个可能的设计中,第一策略控制网元在本地保存的至少一个第七信息的来源,也可以是第一策略控制网元从数据分析网元获取的。
在一个可能的设计中,第一网元状态包括以下一项或多项:第一负载、第一容量和第一可用带宽;其中,第一负载是第一位置上对应的第一网元的负载,第一网元服务于第一终端设备;第一容量是第一位置上对应的第一网元的容量;第一可用带宽是第一位置上对应的第一网元的带宽。其中,第一终端设备在第一时间驻留在第一位置上。
在一个可能的设计中,第一网元可以是服务于第一终端设备的用户面网元(例如,RAN或者UPF等)或者控制面网元(例如,AMF或者SMF等)等。可选的,如果第一终端设备属于海量物联网(massive internet of thins,mIoT)类终端,AMF网元或者SMF网元也 可以作为用户面网元,用于传输背景流量。
在一个可能的设计中,第一策略控制网元根据第二信息确定至少一个第二终端设备的背景流量传输策略之后,第一策略控制网元向请求设备发送至少一个第二终端设备的背景流量传输策略。这样可以使请求设备将第二终端设备的背景流量传输策略发送给相应的第二终端设备。
在一个可能的设计中,当第二终端设备的背景流量传输策略有一条时,第一策略控制网元确定第二终端设备的背景流量传输策略为第二终端设备的目标背景流量传输策略;第一策略控制网元向数据分析网元发送第二终端设备的目标背景流量传输策略。
通过上述方法,数据分析网元能够保存第二终端设备的目标背景流量传输策略,这样,在下一次请求设备在请求其他新的终端设备的背景流量策略时,数据分析网元在为这些新的终端设备确定移动轨迹(包括时间和位置)以及移动轨迹上对应网元的网元状态时,可以参考已经保存的第二终端设备的目标背景流量传输策略,使得网元状态结果更加准确。
在一个可能的设计中,当第二终端设备的背景流量传输策略有多条时,第一策略控制网元从请求设备接收第二终端设备的目标背景流量传输策略,第二终端设备的目标背景流量传输策略由请求设备根据第二终端设备的背景流量传输策略选择的;第一策略控制网元向数据分析网元发送第二终端设备的目标背景流量传输策略。
通过上述方法,数据分析网元能够保存第二终端设备的目标背景流量传输策略,这样,在下一次请求设备在请求其他新的终端设备的背景流量策略时,数据分析网元在为这些新的终端设备确定移动轨迹(包括时间和位置)以及移动轨迹上对应网元的网元状态时,可以参考已经保存的第二终端设备的目标背景流量传输策略,使得网元状态结果更加准确。
在一个可能的设计中,第二终端设备的背景流量传输策略包括:背景流量的传输时间窗的第一数据值;第二终端设备的背景流量传输策略还包括以下一项或多项:背景流量的传输带宽的第一数据值、第二终端设备的位置信息和第二终端设备的标识。
第十四方面,本申请提供了一种确定背景流量传输策略的方法,该方法包括:
数据分析网元确定至少一个第一信息,然后向第一策略控制网元发送至少一个第一信息;第一信息中包含至少一个第一终端设备的标识、第一时间、第一位置以及第一网元状态;至少一个第一终端设备为至少一个第二终端设备中的部分或全部;至少一个第一终端设备在第一时间驻留在第一位置,且具有第一网元状态;
通过上述方法,可以使第一策略控制网元在制定至少一个第二终端设备的背景流量传输策略时,可以考虑每个第二终端设备的移动轨迹(包括第一时间和第一位置)以及第一位置上的第一网元状态,这样会使得第一策略控制网元制定的至少一个第二终端设备的背景流量传输策略更加准确。
在一个可能的设计中,数据分析网元确定至少一个第一信息,具体方法可以为:数据分析网元获取第三网元上的至少一个第二终端设备的至少一个第三信息,数据分析网元根据至少一个第二终端设备的至少一个第三信息确定至少一个第一信息;第三信息包括第二终端设备的标识、第二时间、第二位置以及第二网元状态;第二终端设备在第二时间驻留在第二位置,且具有第二网元状态。
通过上述方法可以使数据分析准确地获取到至少一个第一信息,进而发送给第一策略控制网元,以使第一策略控制网元参考至少一个第一信息制定第二终端设备的背景流量传 输策略。
在一个可能的设计中,第三网元可以是接入设备、5G中的功能网元和OAM中的一个或多个。
在一个可能的设计中,当第三网元为接入网设备、5G中的功能网元中的一个或多个时,数据分析网元可以从OAM网元获取第三网元上的至少一个第二终端设备的至少一个第三信息。
在一个可能的设计中,第二网元状态包括以下一项或多项:第二负载、第二容量和第二可用带宽;其中,第二负载是第二位置上对应的第二网元的负载;第二网元服务于第二终端设备;第二容量是第二位置上对应的第二网元的容量;第二带宽是第二位置上对应的第二网元的带宽。其中,第二终端设备在第二时间驻留在第二位置上。
在一个可能的设计中,第一网元状态包括以下一项或多项:第一负载、第一容量和第一可用带宽;其中,第一负载是第一位置上对应的第一网元的负载;第一网元服务于第一终端设备;第一容量是第一位置上对应的第一网元的容量;第一可用带宽是第一位置上对应的第一网元的带宽。其中,第一终端设备在第一时间驻留在第一位置上。
在一个可能的设计中,第一网元可以是服务于第一终端设备的用户面网元(例如,RAN或者UPF等)或者控制面网元(例如,AMF或者SMF等)等。可选的,如果第一终端设备属于mIoT类终端,AMF网元或者SMF网元也可以作为用户面网元,用于传输背景流量。
在一个可能的设计中,第一网元可以是第三网元中的任一个网元。
第十五方面,本申请还提供了一种用于确定背景流量传输策略的通信装置,该通信装置具有实现上述第十三方面方法实例中第一策略控制网元的功能。所述功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。所述硬件或软件包括一个或多个与上述功能相对应的模块。
在一个可能的设计中,所述通信装置的结构中包括获取模块和处理模块,可选的还可以包括发送模块,这些模块可以执行上述第十三方面方法示例中的相应功能,具体参见方法示例中的详细描述,此处不做赘述。
在一个可能的设计中,所述通信装置的结构中包括收发器和处理器,可选的还可以包括存储器,所述收发器用于收发数据,以及与通信系统中的其他设备进行通信交互,所述处理器被配置为支持所述第一策略控制网元执行上述第十三方面方法中相应的功能。所述存储器与所述处理器耦合,其保存所述通信装置必要的程序指令和数据。
第十六方面,本申请还提供了一种用于确定背景流量传输策略的通信装置,该通信装置具有实现上述第十四方面方法实例中数据分析网元的功能。所述功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。所述硬件或软件包括一个或多个与上述功能相对应的模块。
在一个可能的设计中,所述通信装置的结构中包括处理模块和发送模块,这些模块可以执行上述第十四方面方法示例中的相应功能,具体参见方法示例中的详细描述,此处不做赘述。
在一个可能的设计中,所述通信装置的结构中包括收发器和处理器,可选的还可以包 括存储器,所述收发器用于收发数据,以及与通信系统中的其他设备进行通信交互,所述处理器被配置为支持所述数据分析网元执行上述第十四方面方法中相应的功能。所述存储器与所述处理器耦合,其保存所述通信装置必要的程序指令和数据。
第十七方面,本申请还提供了一种计算机存储介质,所述计算机存储介质中存储有计算机可执行指令,所述计算机可执行指令在被所述计算机调用时用于使所述计算机执行上述第十三方面和第十四方面中任一种方法。
第十八方面,本申请还提供了一种包含指令的计算机程序产品,当其在计算机上运行时,使得计算机执行上述第十三方面和第十四方面中任一种方法。
第十九方面,本申请还提供了一种芯片,所述芯片与存储器相连,用于读取并执行存储器中存储的程序指令,以实现上述第十三方面和第十四方面中任一种方法。
第二十方面,本申请还提供了一种确定网络性能信息的方法,包括:
第一网元向数据分析网元发送第一信息,所述第一信息用于请求网络性能信息,第一信息中包括以下一项或多项:第一区域的区域信息、请求设备的标识或终端设备群组标识;然后,第一网元从数据分析网元接收网络性能信息,网络性能信息中包括第二区域的区域信息和第二信息,第二信息包括以下一项或多项:第二区域中网络的负载信息、第二区域中业务的业务体验信息或第二区域中的终端设备的个数;其中第二区域为第一区域的子区域;最后第一网元根据网络性能信息确定第一策略。
通过上述方法,第一网元从数据分析网元获取网络性能信息后,可以根据划分的子区域的区域信息制定策略,从而使制定的策略更准确。
在一个可能的设计中,第一策略包括背景流量传输策略,其中,背景流量传输策略为至少一个终端设备的背景流量传输策略。这样可以准确为至少一个终端设备制定背景流量传输策略。
在一个可能的设计中,第一网元从请求设备接收第三信息,第三信息用于请求背景流量传输策略,第三信息中包括以下一项或多项:第一区域的区域信息、终端设备群组标识或请求设备的标识;第一网元向请求设备发送背景流量传输策略。
通过上述方法,请求设备可以从第一网元获得准确的背景流量传输策略。
在一个可能的设计中,背景流量传输策略中包括第二区域的区域信息。这样背景流量传输策略更准确。
在一个可能的设计中,第一网元向请求设备发送第二区域的区域信息。这样可以使请求设备请求获得的背景流量传输策略更准确。
在一个可能的设计中,背景流量传输策略中还包括以下信息中的一个或多个:推荐的时间窗、费率、最大聚合比特率。
在一个可能的设计中,第一网元为策略控制功能网元。
第二十一方面,本申请提供了一种确定网络性能信息的方法,包括:
数据分析网元从第一网元接收第一信息,第一信息用于请求网络性能信息;第一信息 中包括以下一项或多项:第一区域的区域信息、请求设备的标识或终端设备群组标识;然后,数据分析网元根据第一信息确定网络性能信息,网络性能信息中包括第二区域的区域信息和第二信息,第二信息包括以下一项或多项:第二区域中网络的负载信息、第二区域中业务的业务体验信息或第二区域中的终端设备的个数;其中第二区域为第一区域的子区域;最后,数据分析网元向第一网元发送网络性能信息。
通过上述方法,可以使第一网元从数据分析网元获取网络性能信息后,可以根据划分的子区域的区域信息制定策略,从而使制定的策略更准确。
在一个可能的设计中,当第一信息中包含第一区域的区域信息时,数据分析网元根据第一信息确定网络性能信息,包括:
数据分析网元基于第一区域的区域信息获取第二区域的区域信息;
数据分析网元确定以下一项或多项:第二区域中网络的负载信息、第二区域中业务的业务体验信息或第二区域中的终端设备的个数。
通过上述方法,数据分析网元可以准确确定网络性能信息,以使第一网元准确制定策略。
在一个可能的设计中,当第一信息中包含终端设备群组标识和/或请求设备的标识时,数据分析网元根据第一信息确定网络性能信息,包括:
数据分析网元根据终端设备群组标识和/或请求设备的标识确定第二区域的区域信息;
数据分析网元确定以下一项或多项:第二区域中网络的负载信息、第二区域中业务的业务体验信息或第二区域中的终端设备的个数。
通过上述方法,数据分析网元可以准确确定网络性能信息,以使第一网元准确制定策略。
在一个可能的设计中,数据分析网元根据终端设备群组标识和/或请求设备的标识确定第二区域的区域信息,包括:
数据分析网元根据终端设备群组标识和/或请求设备的标识确定第一区域的区域信息;
数据分析网元基于第一区域的区域信息获取第二区域的区域信息。
通过上述方法,数据分析网元可以准确确定第二区域的区域信息,进而使数据分析网元准确确定网络性能信息。
在一个可能的设计中,数据分析网元基于第一区域的区域信息获取第二区域的区域信息,包括:
数据分析网元基于第一区域的区域信息获取本地保存的第二区域的区域信息;或者,
数据分析网元基于第一区域的区域信息从运行管理和维护网元或者接入和移动性管理功能网元获取第二区域的区域信息。
通过上述方法,数据分析网元可以准确确定第二区域的区域信息,进而使数据分析网元准确确定网络性能信息。
在一个可能的设计中,数据分析网元确定第二区域中网络的负载信息,包括:
数据分析网元从网络管理网元或者运行管理和维护网元获取第二区域中网络的负载信息。
通过上述方法,数据分析网元可以准确确定第二区域中网络的负载信息,进而使数据分析网元准确确定网络性能信息。
在一个可能的设计中,第一网元为策略控制功能网元。
第二十二方面,本申请提供了一种确定背景流量传输策略的方法,包括:
请求设备向第一网元发送第三信息,第三信息用于请求背景流量传输策略,第三信息中包括以下一项或多项:第一区域的区域信息、请求设备的标识或终端设备群组标识;然后请求设备从第一网元接收背景流量传输策略,背景流量传输策略包括第二区域的区域信息,第二区域为第一区域的子区域。
通过上述方法,请求设备可以准确获得背景流量策略。
在一个可能的设计中,背景流量传输策略为至少一个终端设备的背景流量传输策略。
在一个可能的设计中,请求设备为至少一个终端设备服务。
在一个可能的设计中,背景流量传输策略中包括以下信息中的一个或多个:推荐的时间窗、费率、最大聚合比特率。
在一个可能的设计中,第一网元为策略控制功能网元。
第二十三方面,本申请还提供了一种用于确定网络性能信息的通信装置,该通信装置具有实现上述第二十方面方法实例中第一网元的功能。所述功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。所述硬件或软件包括一个或多个与上述功能相对应的模块。
在一个可能的设计中,所述通信装置的结构中包括发送模块、接收模块和处理模块,这些模块可以执行上述第二十方面方法示例中的相应功能,具体参见方法示例中的详细描述,此处不做赘述。
在一个可能的设计中,所述通信装置的结构中包括收发器和处理器,可选的还可以包括存储器,所述收发器用于收发数据,以及与通信系统中的其他设备进行通信交互,所述处理器被配置为支持所述第一网元执行上述第二十方面方法中相应的功能。所述存储器与所述处理器耦合,其保存所述通信装置必要的程序指令和数据。
第二十四方面,本申请还提供了一种用于确定网络性能信息的通信装置,该通信装置具有实现上述第二十一方面方法实例中数据分析网元的功能。所述功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。所述硬件或软件包括一个或多个与上述功能相对应的模块。
在一个可能的设计中,所述通信装置的结构中包括发送模块、接收模块和处理模块,这些模块可以执行上述第二十一方面方法示例中的相应功能,具体参见方法示例中的详细描述,此处不做赘述。
在一个可能的设计中,所述通信装置的结构中包括收发器和处理器,可选的还可以包括存储器,所述收发器用于收发数据,以及与通信系统中的其他设备进行通信交互,所述处理器被配置为支持所述数据分析网元执行上述第二十一方面方法中相应的功能。所述存储器与所述处理器耦合,其保存所述通信装置必要的程序指令和数据。
第二十五方面,本申请还提供了一种用于确定背景流量传输策略的通信装置,该通信装置具有实现上述第二十二方面方法实例中请求设备的功能。所述功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。所述硬件或软件包括一个或多个与上述功能相 对应的模块。
在一个可能的设计中,所述通信装置的结构中包括接收模块和发送模块,这些模块可以执行上述第二十二方面方法示例中的相应功能,具体参见方法示例中的详细描述,此处不做赘述。
在一个可能的设计中,所述通信装置的结构中包括收发器和处理器,可选的还可以包括存储器,所述收发器用于收发数据,以及与通信系统中的其他设备进行通信交互,所述处理器被配置为支持请求设备执行上述二十二方面方法中相应的功能。所述存储器与所述处理器耦合,其保存所述通信装置必要的程序指令和数据。
第二十六方面,本申请还提供了一种计算机存储介质,所述计算机存储介质中存储有计算机可执行指令,所述计算机可执行指令在被所述计算机调用时用于使所述计算机执行上述第二十方面至第二十二方面中任一种方法。
第二十七方面,本申请还提供了一种包含指令的计算机程序产品,当其在计算机上运行时,使得计算机执行上述第二十方面至第二十二方面中任一种方法。
第二十八方面,本申请还提供了一种芯片,所述芯片与存储器相连,用于读取并执行存储器中存储的程序指令,以实现上述第二十方面至第二十二方面中任一种方法。
附图说明
图1为本申请提供的一种通信系统的架构示意图;
图2为本申请提供的一种确定背景流量传输策略的方法的流程图;
图3为本申请提供的另一种确定背景流量传输策略的方法的流程图;
图4为本申请提供的又一种确定背景流量传输策略的方法的流程图;
图5为本申请提供的一种确定背景流量传输策略的方法的示例的流程图;
图6为本申请提供的另一种确定背景流量传输策略的方法的示例的流程图;
图7为本申请提供的一种用于确定背景流量传输策略的通信装置的结构示意图;
图8为本申请提供的另一种用于确定背景流量传输策略的通信装置的结构示意图;
图9为本申请提供的一种用于确定背景流量传输策略的通信装置的结构图;
图10为本申请提供的另一种确定背景流量传输策略的方法的流程图;
图11为本申请提供的另一种确定背景流量传输策略的方法的流程图;
图12为本申请提供的另一种确定背景流量传输策略的方法的示例的流程图;
图13为本申请提供的另一种用于确定背景流量传输策略的通信装置的结构示意图;
图14为本申请提供的另一种用于确定背景流量传输策略的通信装置的结构示意图;
图15为本申请提供的一种确定网络性能信息的方法的流程图;
图16为本申请提供的另一种确定背景流量传输策略的方法的示例的流程图。
具体实施方式
下面将结合附图对本申请作进一步地详细描述。
本申请实施例提供一种确定背景流量传输策略的方法及装置,用以解决现有技术中不同的策略控制网元为不同的业务网元制定的背景流量传输策略之间产生冲突,后续导致背景流量传输失败的问题。其中,本申请所述方法和装置基于同一发明构思,由于方法及装置解决问题的原理相似,因此装置与方法的实施可以相互参见,重复之处不再赘述。
以下,对本申请中的部分用语进行解释说明,以便于本领域技术人员理解。
1)、背景流量,通常被定义为非实时交互性流量,具体可以分为上行背景流量和下行背景流量。例如,下行背景流量可以是视频缓存、文件下载、软件更新包、软件通知消息等等传输的流量;上行背景流量可以是车辆保存行驶地图信息等等传输的流量。
2)、数据分析网元,是能够进行大数据分析的网元设备,可以但不限于是网络数据分析功能网元等,例如,所述网络数据分析功能网元可以是NWDAF(network data analytic function)。在本申请实施例中,所述数据分析网元能够分析所有终端设备的目标背景流量传输策略,来确定需要背景流量传输策略的终端设备的背景流量传输数据分析结果,以使得到该终端设备的背景流量传输策略。
3)、业务网元,可以是应用网元,具体的所述应用网元可以但不限于是运营商的应用功能(application function,AF)网元、终端设备、第三方设备,例如非运营商的AF网元(也可称之为第三方的AF网元)等;其中所述运营商的AF网元可以但不限于是运营商的业务管控服务器;所述第三方的AF网元可以但不限于是第三方的业务服务器。
4)、在本申请的描述中,“第一”、“第二”等词汇,仅用于区分描述的目的,而不能理解为指示或暗示相对重要性,也不能理解为指示或暗示顺序。
5)、“和/或”,描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。字符“/”一般表示前后关联对象是一种“或”的关系。
为了更加清晰地描述本申请实施例的技术方案,下面结合附图,对本申请实施例提供的确定背景流量传输策略的方法及装置进行详细说明。
本申请实施例提供的确定背景流量传输策略的方法适用的一种可能的通信系统的架构,可以包括:网络开放功能网元、策略控制功能网元、数据库网元、业务网元、鉴权服务器功能网元、接入和移动性管理功能网元、会话管理功能网元、数据分析网元、终端设备、接入网设备、用户面功能网元和数据网络。例如,图1示出了所述通信系统的架构的一种可能的示例,所述通信系统的架构包括:网络开放功能(network exposure function,NEF)网元、策略控制功能(policy control function,PCF)网元、统一数据仓库(unified data repository,UDR)网元、第三方AF网元、AF网元、鉴权服务器功能(authentication server function,AUSF)网元、接入和移动性管理功能(access and mobility management function,AMF)网元、会话管理功能网元(session management function,SMF)网元、网络数据分析功能(network data analytic function,NWDAF)网元、UE、无线接入网(radio access network,RAN)设备、用户面功能(user plane function,UPF)网元和数据网络(data network,DN)。其中,AMF网元与UE之间可以通过N1接口相连,AMF与AN设备之间可以通过N2接口相连,AN设备与UPF之间可以通过N3接口相连,SMF与UPF之间可以通过N4接口相连,UPF与DN之间可以通过N6接口相连。接口名称只是一个示例说明,本申请实施例对此不作具体限定。应理解,本申请实施例并不限于图1所示通信系统,图1中所示的网元的名称在这里仅作为一种示例说明,并不作为对本申请的方法适用的通信系统架 构中包括的网元的限定。下面对所述通信系统中的各个网元或设备的功能进行详细描述:
所述终端设备,又可以称之为用户设备(user equipment,UE)、移动台(mobile station,MS)、移动终端(mobile terminal,MT)等,是一种向用户提供语音和/或数据连通性的设备。例如,所述终端设备可以包括具有无线连接功能的手持式设备、车载设备等。目前,所述终端设备可以是:手机(mobile phone)、平板电脑、笔记本电脑、掌上电脑、移动互联网设备(mobile internet device,MID)、可穿戴设备,虚拟现实(virtual reality,VR)设备、增强现实(augmented reality,AR)设备、工业控制(industrial control)中的无线终端、无人驾驶(self-driving)中的无线终端、远程手术(remote medical surgery)中的无线终端、智能电网(smart grid)中的无线终端、运输安全(transportation safety)中的无线终端、智慧城市(smart city)中的无线终端,或智慧家庭(smart home)中的无线终端等。其中,图1中所述终端设备以UE示出,仅作为示例,并不对终端设备进行限定。
无线接入网络可以为图1所示的无线接入网(radio access network,RAN),向所述终端设备提供无线接入服务。所述接入网设备是所述通信系统中将所述终端设备接入到无线网络的设备。所述接入网设备为无线接入网中的节点,又可以称为基站,还可以称为无线接入网(radio access network,RAN)节点(或设备)。目前,一些接入网设备的举例为:gNB、传输接收点(transmission reception point,TRP)、演进型节点B(evolved Node B,eNB)、无线网络控制器(radio network controller,RNC)、节点B(Node B,NB)、基站控制器(base station controller,BSC)、基站收发台(base transceiver station,BTS)、家庭基站(例如,home evolved NodeB,或home Node B,HNB)、基带单元(base band unit,BBU),或无线保真(wireless fidelity,Wifi)接入点(access point,AP)等。
所述数据网络,例如图1所示的数据网络(data network,DN),可以是因特网(Internet)、IP多媒体业务(IP Multi-media Service,IMS)网络、区域网络(即本地网络,例如移动边缘计算(mobile edge computing,MEC)网络)等。所述数据网络中包括应用服务器,所述应用服务器通过与所述终端设备进行数据传输,为所述终端设备提供业务服务。
核心网用于将所述终端设备接入可以实现所述终端设备的业务的DN。下面对所述核心网中各个网元的功能进行描述:
所述接入和移动性管理功能网元,可用于对所述终端设备的接入控制和移动性进行管理,在实际应用中,其包括了长期演进(long term evolution,LTE)中网络框架中移动管理实体(mobility management entity,MME)里的移动性管理功能,并加入了接入管理功能,具体可以负责所述终端设备的注册、移动性管理、跟踪区更新流程、可达性检测、会话管理功能网元的选择、移动状态转换管理等。例如,在5G中,所述接入和移动性管理功能网元可以是AMF网元,例如图1所示;在未来通信,如6G中,所述接入和移动性管理功能网元仍可以是AMF网元,或有其它的名称,本申请不做限定。当所述接入和移动性管理功能网元是AMF网元时,所述AMF可以提供Namf服务。
所述会话管理功能网元,可用于负责所述终端设备的会话管理(包括会话的建立、修改和释放),用户面功能网元的选择和重选、所述终端设备的互联网协议(internet protocol,IP)地址分配、服务质量(quality of service,QoS)控制等。例如,在5G中,所述会话管理功能网元可以是SMF网元,例如图1所示;在未来通信,如6G中,所述会话管理功能网元仍可以是SMF网元,或有其它的名称,本申请不做限定。当会话管理功能网元时SMF网元时,所述SMF可以提供Nsmf服务。
所述数据分析网元,可用于进行大数据分析(例如,在本申请实施例中可以分析终端设备的背景流量传输数据分析结果)。例如,在5G中,所述数据分析网元可以是NWDAF网元,例如图1所示;在未来通信,如6G中,所述数据分析网元仍可以是NWDAF网元,或有其它的名称,本申请不做限定。当所述数据分析网元是NWDAF网元时,所述NWDAF网元可以提供Nnwdaf服务。
所述策略控制功能网元,可用于负责策略控制决策(例如,在本申请实施例中可以负责背景流量传输策略的决策)、提供基于业务数据流和应用检测、门控、QoS和基于流的计费控制等功能等。例如,在5G中,所述策略控制功能网元可以是PCF网元,例如图1所示;在未来通信,如6G中,所述策略控制功能网元仍可以是PCF网元,或有其它的名称,本申请不做限定。当所述策略控制功能网元是PCF网元,所述PCF网元可以提供Npcf服务。
所述业务网元,主要功能是与第三代合作伙伴计划(the 3rd generation partnership project,3GPP)核心网交互来提供服务,来影响业务流路由、接入网能力开放、策略控制等。例如,在5G中,所述业务网元可以是AF网元,还可以是第三方的AF(3 rd AF)网元,其中,所述AF网元可以直接跟运营商网元(例如,AMF网元、SMF网元、PCF网元等)交互,所述3 rd AF网元需要通过网络开放功能网元(例如NEF网元)才可以跟运营商网元交互。例如图1所示;在未来通信,如6G中,所述业务网元仍可以是AF网元、3 rd AF网元,或有其它的名称,本申请不做限定。当所述业务网元是AF网元时,所述AF网元可以提供Naf服务。
所述鉴权服务器功能网元,可用于提供鉴权服务。例如,在5G中,所述鉴权服务器功能网元可以是AUSF网元,例如图1所示;在未来通信,如6G中,所述鉴权服务器功能网元仍可以是AUSF网元,或有其它的名称,本申请不做限定。当所述鉴权服务器功能网元是AUSF网元时,所述AUSF网元可以提供Nausf服务。
所述数据库网元,可用于存储数据等。例如,在5G中,所述数据库网元可以是UDR网元,例如图1所示;在未来通信,如6G中,所述数据库网元仍可以是UDR网元,或有其它的名称,本申请不做限定。当所述数据库网元是UDR网元时,所述UDR网元可以提供Nudr服务。
所述网络开放功能网元,可用于使3GPP能够安全地向第三方的AF(例如,业务能力服务器(Services Capability Server,SCS)、应用服务器(Application Server,AS)等)提供网络业务能力等。例如,在5G中,所述网络开放功能网元可以是NEF网元,例如图1所示;在未来通信,如6G中,所述网络开放功能网元仍可以是NEF网元,或有其它的名称,本申请不做限定。当所述网络开放功能网元是NEF时,所述NEF可以向其他网络功能网元提供Nnef服务。
所述用户面功能网元,可用于转发终端设备的用户面数据。主要功能是数据包路由和转发、移动性锚点、上行分类器来支持路由业务流到数据网络、分支点来支持多归属分组数据单元(Packet Data Unit,PDU)会话等。例如,在5G中,所述用户面功能网元可以是UPF网元,例如图1所示;在未来通信,如6G中,所述用户面功能网元仍可以是UPF网元,或有其它的名称,本申请不做限定。
核心网中的以上各个网元也可以称为功能实体或者设备,既可以是在专用硬件上实现的网络元件,也可以是在专用硬件上运行的软件实例,或者是在适当平台上虚拟化功能的 实例,例如,上述虚拟化平台可以为云平台。
需要说明的是,图1所示的通信系统的架构中不限于仅包含图中所示的网元,还可以包含其它未在图中表示的设备,具体本申请在此处不再一一列举。
需要说明的是,本申请实施例并不限定核心网中各个网元的分布形式,图1所示的分布形式只是示例性的,本申请不作限定。
为方便说明,本申请后续均以图1所示的网元为例进行说明,并将XX网元直接简称为XX。应理解,本申请中所有网元的名称仅仅作为示例,在未来通信中还可以称为其它名称,或者在未来通信中本申请涉及的网元还可以通过其它具有相同功能的实体或者设备等来替代,本申请对此均不作限定。这里做统一说明,后续不再赘述。
需要说明的是,图1所示的通信系统并不构成本申请实施例能够适用的通信系统的限定。图1所示的通信系统架构为5G系统架构,可选的,本申请实施例的方法还适用于未来的各种通信系统,例如6G或者其他通信网络等。
本申请实施例提供的一种确定背景流量传输策略的方法,适用于如图1所示的通信系统。参阅图2所示,该方法的具体流程可以包括:
步骤201、第一策略控制网元从请求设备接收第一信息,其中,第一信息用于请求第一终端设备的背景流量传输策略。
其中,在一种可能示例中,第一信息中可以包括第一终端设备的:背景流量的大小;第一信息中还可以包括请求设备的标识、第一终端设备的背景流量的传输时间窗的第三数据值、第一终端设备的位置信息、第一终端设备的标识中的至少一项。其中,第一终端设备的背景流量的传输时间窗的第三数据值可以是第一终端设备的背景流量的传输时间窗的期待值,其中,期待值可以理解为请求设备希望得到的第一终端设备用于背景流量的传输时间窗的值,当然还可以有其它理解,本申请对此不作限定。需要说明的是,本申请后续涉及的第一终端设备的背景流量的传输时间窗的第三数据值都可以对应第一终端设备的背景流量的传输时间窗的期待值,下文不再赘述。第一终端设备的位置信息可以是以下至少一项或多项:第一终端设备所在的网络区域(Network Area)、小区标识(Cell((identification,ID))、第一终端设备所在的无线接入网标识(RAN ID)、全球卫星定位系统(global positioning system,GPS)值。需要说明的是,本申请后续涉及的第一终端设备的位置信息都可以是第一终端设备所在的Network Area、Cell ID、第一终端设备所在的RAN ID、GPS值中的至少一项或者多项,下文不再赘述。第一终端设备的标识可以是以下至少一项或多项:签约永久标识(subscription permanent identifier,SUPI)、永久设备标识(permanent equipment identifier,PEI)、通用公共签约标识(generic public subscription identifier,GPSI)、网际协议地址(internet protocol,IP)五元组、国际移动用户标识符(international mobile subscriber identifier,IMSI)、国际移动设备标识(international mobile equipment identity,IMEI)、和移动台国际综合业务数字网络号码(mobile station international integrated service digital network number,MSISDN)。需要说明的是,本申请后续涉及的第一终端设备的标识都可以是SUPI、PEI、GPSI、IP五元组、IMSI、IMEI、MSISDN中的至少一项或多项,下文不再赘述。通过第一信息包含的这些信息,就可以请求得到满足上述需求的第一终端设备的背景流量传输策略。
在一种可选的实施方式中,请求设备可以是第一终端设备。当请求设备是第一终端设 备时,可以分为以下两种场景:
场景a1:第一终端设备决定向服务于自身的第一业务网元传输上行背景流量时,可以发起分组数据单元会话((packet data unit,PDU)Session)修改流程,请求第一终端设备的背景流量传输策略。
具体的,在此场景a1中,第一终端设备向第一策略控制网元发送第一信息的具体过程可以为:第一终端设备将第一信息发送给接入和移动性管理功能网元,可选的,第一终端设备可以通过N1消息向接入和移动性管理功能网元发送第一信息,例如,N1消息可以为PDU会话更改请求(PDU Session Modification Request);然后,接入和移动性管理功能网元将第一信息转发给会话管理功能网元,可选的,接入和移动性管理功能网元可以通过调用Nsmf_PDUSession_UpdateSMContext服务向会话管理功能网元发送第一信息;最后,会话管理功能网元将第一信息转发给第一策略控制网元,可选的,会话管理功能网元可以将通过调用Npcf_SMPolicyControl_Update服务向第一策略控制网元发送第一信息。这样,通过上述方法,第一终端设备就可以将第一信息发送给第一策略控制网元。
场景a2:第一终端设备需要传输下行背景流量时,终端设备可以先从服务于第一终端设备的第一业务网元获取请求背景流量传输策略所需的信息,例如,第一终端设备从第一业务网元获取第一终端设备的:背景流量的大小;第一终端设备从第一业务网元还获取第一业务网元的标识、第一终端设备的背景流量的传输时间窗的第三数据值、第一终端设备的位置信息、第一终端设备的标识中的至少一项。之后,第一终端设备可以将获取的上述信息携带在第一信息中,发送给第一策略控制网元,以请求第一终端设备的背景流量传输策略。
在另一种可选的实施方式中,请求设备可以是服务于第一终端设备的第一业务网元。当请求设备是第一业务网元时,可以分为以下两种场景:
场景b1:第一业务网元决定向第一终端设备传输下行背景流量时,第一业务网元发起PDU Session修改流程,请求第一终端设备的背景流量传输策略。
在此场景b1中,第一业务网元向第一策略控制网元发送第一信息具体可以为:第一业务网元通过调用Npcf_PolicyAuthorization_Create/Update服务向第一策略控制网元发送第一信息。可选的,第一业务网元可以通过网络开放功能网元向第一策略控制网元发送第一信息。上述过程具体可以为:第一业务网元向网络开放功能网元发送第一信息,可选的,第一业务网元可以通过调用Nnef_BDTPNegotiation_Create request服务向网络开放功能网元发送第一信息;然后网络开放功能网元将第一信息转发给第一策略控制网元,可选的,网络开放功能网元可以通过调用Npcf_BDTPolicyControl_Create request服务向第一策略控制网元发送第一信息。
场景b2:当第一终端设备有传输上行背景流量的需求时,第一业务网元从第一终端设备获取请求第一终端设备的背景流量传输策略所需的信息,例如,第一业务网元从第一终端设备获取第一终端设备的:背景流量的大小;第一业务网元从第一终端设备还获取第一终端设备的:背景流量的传输时间窗的第三数据值、位置信息、标识中的至少一项。之后,第一业务网元可以将获取的上述信息携带在第一信息中,发送给第一策略控制网元,以请求第一终端设备的背景流量传输策略。
通过上述场景a1、场景b2,既可以实现上行背景流量传输策略的请求,也可以实现下行背景流量传输策略的请求。
在一种可选的实施方式中,当请求设备是第一业务网元时,第一业务网元可以通过第一信息同时请求多个终端设备的背景流量传输策略,其中,第一终端设备可以是多个终端设备中的任一个。第一信息可以包括多个终端设备中每个终端设备的:背景流量的大小;第一信息中还包括每个终端设备的:背景流量的传输时间窗的第三数据值、位置信息、标识中的至少一项。
步骤202、第一策略控制网元根据第一信息向数据分析网元发送第二信息,第二信息用于请求第一终端设备的背景流量传输数据分析结果。
一种具体的实施方式中,第一策略控制网元在接收到第一信息之后,第一策略控制网元根据第一信息请求的内容向数据分析网元发送第二信息,以使数据分析网元执行步骤203。
在一种可选的实施方式中,第二信息中可以包括第一终端设备的:背景流量的大小;第二信息中还可以包括第一终端设备的:背景流量的传输时间窗的第三数据值、位置信息、标识中的至少一项。这样数据分析网元可以返回符合第二信息中包含的内容的背景流量传输数据分析结果。示例性的,第二信息中包含的内容可以根据第一信息中包含的内容确定,例如,第一策略控制网元可以将第二信息处理成与第一信息相同的信息,即第二信息中包含的内容与第一信息中包含的内容相同;又例如,第一策略控制网元可以将第二信息处理成与第一信息不相同的信息,此时,第二信息中包含的内容可以在第一信息包含的内容的基础上添加其他信息,或者在第一信息中包含的内容中选择部分信息作为第二信息中的内容,本申请对此不作限定。
在一种可选的实施方式中,第一策略控制网元向数据分析网元发送第二信息时,可以通过调用Nnwdaf_AnalyticsInfo_Request服务向数据分析网元发送第二信息。
在一种可选的实施方式中,第一策略控制网元可以通过第二信息同时请求多个终端设备的背景流量传输数据分析结果,其中第一终端设备是多个终端设备中的任一个。此时,第二信息中可以包括多个终端设备中每个终端设备的:背景流量的大小;第二信息中还可以包括第一策略功能网元的标识、请求设备的标识、每个终端设备的背景流量的传输时间窗的第三数据值、每个终端设备的位置信息、每个终端设备的标识中的至少一项。
一种示例性的实施方式,当第一策略控制网元通过第二信息同时请求多个终端设备的背景流量传输数据分析结果时,可以有如下两种场景:
场景c1:第一策略控制网元可以收集预设时长内的多个针对终端设备的背景流量传输策略的请求,然后通过第二信息同时请求多个终端设备的背景流量传输数据分析结果。可选的,多个针对终端设备的背景流量传输策略的请求,可以是多个不同的终端设备分别发送第一信息请求的,也可以是一个业务网元通过一个第一信息同时请求的,也可以是至少一个终端设备分别通过第一信息请求以及一个业务网元通过一个第一信息为至少一个终端设备请求的,还可以是多个业务网元分别通过各自的第一信息为至少一个终端设备请求的;当然,除了上述列举的几种多个针对终端设备的背景流量传输策略的请求的情况,还可以有其它情况,本申请对此不作限定。
场景c2:第一策略控制网元可以收集预设数量的终端设备的背景流量传输策略的请求,然后通过第二信息同时请求多个终端设备的背景流量传输数据分析结果。可选的,此场景中多个(即预设数量)终端设备的背景流量传输策略的情况可以参见场景c1中的相关描述,此处不再赘述。
在一种可选的实施方式中,当第一信息是来自服务于第一终端设备的第一业务网元的情况下,第二信息中还可以包括第一业务网元的标识。其中,可选的,第一业务网元的标识可以是应用服务提供商标识((application service provider,ASP)identifier)。其中,可选的,ASP identifier可以是第一策略控制网元中存储的,还可以是来自于第一业务网元的。
步骤203、数据分析网元向第一策略控制网元发送第一终端设备的背景流量传输数据分析结果,第一终端设备的背景流量传输数据分析结果由数据分析网元基于第二终端设备的目标背景流量传输策略所确定,第二终端设备与第一终端设备不同,第二终端设备的目标背景流量传输策略用于第二终端设备进行背景流量传输。
具体的,在步骤202之后,数据分析网元接收到第二信息后,数据分析网元基于第二信息和第二终端设备的目标背景流量传输策略确定第一终端设备的背景流量传输数据分析结果。
在一种可选的实施方式中,第一终端设备的背景流量传输数据分析结果还可以由数据分析网元基于第二终端设备的目标背景流量传输策略和第二信息,以及功能网元的负载信息和/或功能网元的容量信息所确定。这样数据分析网元分析出的第一终端设备的背景流量传输数据分析结果可以更加可靠。
在一种可选的实施方式中,数据分析网元确定的第一终端设备的背景流量传输数据分析结果可以有一条或者多条。可选的,背景流量传输数据分析结果可以包括:背景流量的传输时间窗的第一数据值;背景流量传输数据分析结果还可以包括:背景流量的传输带宽的第一数据值、第一终端设备的位置信息、第一终端设备的标识中的至少一项。第一终端设备的背景流量的传输时间窗的第一数据值可以是第一终端设备的背景流量的传输时间窗的数据分析值。需要说明的是,本申请后续涉及的第一终端设备的背景流量的传输时间窗的第一数据值都可以对应第一终端设备的背景流量的传输时间窗的数据分析值,下文不再赘述。第一终端设备的背景流量的传输带宽的第一数据值可以是第一终端设备的背景流量的传输带宽的数据分析值。需要说明的是,本申请后续涉及的第一终端设备的背景流量的传输带宽的第一数据值都可以对应第一终端设备的背景流量的传输带宽的数据分析值,下文不再赘述。
需要说明的是,第二终端设备可以代指至少一个终端设备,在这里,第二终端设备为当前进行背景流量传输的终端设备的总称。其中,可选的,第二终端设备可以是第一策略控制网元下的终端设备,还可以是第二策略控制网元下的终端设备,还可以是第一策略控制网元和第二策略控制网元下的终端设备。其中,第二策略控制网元可以是通信系统中除第一策略控制网元之外的策略控制网元、或者第二策略控制网元可以是与第一策略控制网元在同一个位置区域(比如追踪区域(tracking area,TA)、追踪区域列表(TA List)、路由区域(routing area,RA)、路由区域列表(RA List)等)中的一个。这样,通过数据分析网元通过当前进行背景流量传输的终端设备的目标传输策略来确定第一终端设备的背景流量传输数据分析结果,可以使后续确定的第一终端设备的背景流量传输策略与其他终端设备的背景流量传输策略之间降低冲突的可能性,可以使背景流量成功传输。
在一种可选的实施方式中,数据分析网元在向第一策略控制网元发送第一终端设备的背景流量传输数据分析结果之前,数据分析网元需要先基于第二终端设备的目标背景流量传输策略确定第一终端设备的背景流量传输数据分析结果。进一步的,数据分析网元基于第二终端设备的目标背景流量传输策略确定第一终端设备的背景流量传输数据分析结果 之前,数据分析网元还可以先获取第二终端设备的目标背景流量传输策略。
一种示例性的实施方式,数据分析网元获取第二终端设备的目标背景流量传输策略,可以通过如下方法:数据分析网元从第一设备接收第二终端设备的目标背景流量传输策略,其中第一设备可以为以下任意一项或组合:第二终端设备、第一策略控制网元、第二策略控制网元、第二业务网元、第二数据库网元等。
在一种可选的实施方式中,第二终端设备的目标背景流量传输策略可以包括:背景流量的传输时间窗的第六数据值;第二终端设备的目标背景流量传输策略还可以包括:背景流量的传输带宽的第六数据值、第二终端设备的位置信息、第二终端设备的标识中的至少一项。
在一种可选的实施方式中,当第一终端设备是通信系统中第一个需要进行背景流量传输的终端设备时,数据分析网元中可能获取不到任何终端设备的目标背景流量传输策略,也即此时第一终端设备是第一个需要背景流量数据传输策略的终端设备。此时,数据分析网元在向第一策略控制网元发送第一终端设备的背景流量传输数据分析结果之前,数据分析网元可以先基于第二信息、功能网元的负载信息、功能网元的容量信息中的至少一项确定第一终端设备的背景流量传输数据分析结果。在一种可选的实施方式中,当数据分析网元基于功能网元的负载信息和/或功能网元的容量信息确定第一终端设备的背景流量传输数据分析结果之前,数据分析网元还可以先获取功能网元的负载信息和/或功能网元的容量信息。其中,可选的,功能网元可以是第一策略控制网元、会话管理功能网元、无线接入网网元、接入与移动性管理功能网元、用户面功能网元中的至少一个。
一种示例性的实施方式,数据分析网元获取功能网元的负载信息和/或功能网元的容量信息,可以通过如下方法:数据分析网元从功能网元或者运行管理维护(operation,administration,and maintenance,OAM)网元接收功能网元的负载信息和/或功能网元的容量信息。其中,可选地,如果数据分析网元从OAM网元接收功能网元的负载信息和/或功能网元的容量信息,在这之前,OAM网元从功能网元收集功能网元的负载信息和/或功能网元的容量信息。
在一种可选的实施方式中,数据分析网元基于第二终端设备的目标背景流量传输策略和第二信息,以及功能网元的负载信息和/或功能网元的容量信息确定第一终端设备的背景流量传输数据分析结果,具体方法可以为:数据分析网元结合第二终端设备的目标背景流量传输策略中包括的内容、第二信息中包括的内容以及数据分析网元维护的关于背景流量传输的信息(例如,某位置的背景流量传输时的拥塞等级或者无拥塞指示等等),共同分析出第一终端设备的背景流量传输数据分析结果。
在一个示例中,当数据分析网元结合第二终端设备的目标背景流量传输策略中包括的内容、第二信息中包括的内容以及维护的关于背景流量传输的信息、功能网元(比如无线接入网网元,即基站)的负载信息、功能网元(比如无线接入网网元,即基站)的容量信息,对第一终端设备的背景流量传输数据分析结果进行分析时,具体过程可以但不限于为:
步骤一,数据分析网元可以基于上述涉及的内容进行离线分析,得到某个区域(例如TA、TA List、RA、RA List中的任一项)内每个小区或基站(对应Cell ID或RAN ID)的用于背景流量传输的第一总吞吐量(也即第一总带宽)。
例如,当根据运营商策略,拥塞程度(Congestion level)=9时,为某小区或基站能承受的最大拥塞等级(临界点),数据分析网元统计此时在该小区或者基站上所有终端设备 的用于背景流量的传输带宽(可选的,可以统计多次,求均值),即可得到该小区或者基站的用于背景流量传输的第一总吞吐量。
步骤二,数据分析网元确定第一终端设备所在的当前小区或基站的用于背景流量传输的第二总吞吐量,具体方法可以为:数据分析网元获取第一终端设备的位置信息,即可获得第一终端设备的所在的小区标识(Cell ID)或者基站标识(RAN ID),然后根据第一终端设备的小区标识或者基站标识在步骤一得到的多个小区或基站的第一总吞吐量中查询第一终端设备所在的当前小区或者基站的第二总吞吐量(也即第二总带宽)。
其中,在一种可选的实施方式中,如果数据分析网元从来自第一策略控制网元的第二信息中未发现第一终端设备的位置信息,即小区标识或者基站标识(Cell ID or RAN ID),但是发现第一终端设备的标识(例如A)时,则数据分析网元可以通过A向运行、管理和维护(operation,administration,and maintenance,OAM)网元、AMF、PCF、RAN中的任意一个查询得到第一终端设备的位置信息。
步骤三,数据分析网元基于当前第一终端设备请求的背景流量大小、背景流量的传输时间窗的期待值(即背景流量的传输时间窗的第三数据值,此时假设第二信息中携带该信息)、第一终端设备的背景流量的传输带宽的期待值以及第二总吞吐量,确定第一终端设备的背景流量的传输时间的第一数据值和第一终端设备的背景流量传输带宽的第一数据值。具体方法可以如下:
数据分析网元首先得到第一终端设备所在的小区或者基站上,第一终端设备所希望的传输时间窗(也即第一终端设备的背景流量传输时间窗的期待值)内,不同时间节点(Timestamp)的实时吞吐量,即将第一终端设备所在的小区或基站、时间节点上正在传输背景流量的第二终端设备的传输带宽求和,再加上第一终端设备的背景流量的传输带宽的期待值,得到不同时间节点上的第三总带宽(也即第三总吞吐量),然后数据分析网元根据不同时间节点上的第三总带宽和第二总吞吐量之间的大小关系,确定第一终端设备的背景流量的传输时间的第一数据值和第一终端设备的背景流量传输带宽的第一数据值,具体可以分为以下两种情况:
情况e1:当所有时间节点上的第三总带宽都小于或者等于第二总吞吐量时,数据分析网元可以将第一终端设备的背景流量的传输时间窗的期待值作为第一终端设备的背景流量的传输时间窗的第一数据值;以及数据分析网元可以将第一终端设备的背景流量的传输带宽的期待值作为第一终端设备的背景流量的传输带宽的第一数据值。
情况e2:当存在部分时间节点上第三总带宽大于第二总吞吐量时,则数据分析网元可以有很多可变措施,例如:
示例1:数据分析网元不更改时间窗大小,只是将整个时间窗往后或者往前移动传输时间间隔(transmission time interval,TTI),统计第一终端设备的传输时间窗的第三数据值加上TTI的时间窗内,不同时间节点(Timestamp)的实时吞吐量,也就是说将第一终端设备所在的小区或基站的时间节点上正在传输背景流量的第二终端设备的传输带宽求和,再加上第一终端设备的背景流量的传输带宽的期待值,得到移动后的时间窗内不同时间节点上第四总带宽,此时根据不同时间节点上的第四总带宽和第二总吞吐量之间的大小关系,确定第一终端设备的背景流量的传输时间的第一数据值和第一终端设备的背景流量传输带宽的第一数据值。当所有时间节点上的第四总带宽都小于或者等用户第二总吞吐量时,数据分析网元将第一终端设备的背景流量的传输时间窗的期待值加上TTI作为第一终 端设备的背景流量的传输时间窗的第一数据值;以及数据分析网元将第一终端设备的背景流量的传输带宽的第一数据值确定为是第一终端设备的背景流量的大小除以第一终端设备的背景流量的传输时间窗的第一数据值所对应的时间窗内的总时间长度,其中,假设第一终端设备的背景流量的传输时间窗的第一数据值为[T1,T2],则总时间长度等于T2-T1。
示例2:数据分析网元更改时间窗大小,比如将整个时间窗缩小,假设第一终端设备的背景流量的传输时间窗的期待值为[T3,T4],则更新后的时间窗大小可以为[T3+t,T4],即将起始时间往后移动t,而放大时间窗内每个时间点的传输平均带宽,使用新的时间窗和带宽进行传输,判定如果能够满足需求,则数据分析网元可以确定第一终端设备的背景流量的传输时间窗的第一数据值为[T3+t,T4];以及数据分析网元可以确定第一终端设备的背景流量的传输带宽的第一数据值为第一终端设备的背景流量的大小除以(T4-(T3+t))。
值得注意的是,NWDAF还可以采用其他方式基于第二终端设备的目标背景流量传输策略得到第一终端设备的背景流量传输数据分析结果,本方案不做限定。
在一种可选的实施方式中,数据分析网元向第一策略控制网元发送第一终端设备的背景流量传输数据分析结果时,数据分析网元可以通过调用Nnwdaf_AnalyticsInfo_Request response服务向第一策略控制网元发送第一终端设备的背景流量传输数据分析结果。
步骤204、第一策略控制网元向请求设备发送第一终端设备的背景流量传输策略,第一终端设备的背景流量传输策略由第一策略控制网元根据第三信息确定,第三信息包括第一终端设备的背景流量传输数据分析结果。
在一种可选的实施方式中,第三信息还可以包括:第一终端设备的背景流量传输查询结果和/或第一终端设备的本地背景流量传输策略。其中,可选的,背景流量传输查询结果可以包括:背景流量的传输时间窗的第四数据值;背景流量传输查询结果还可以包括:背景流量的传输带宽的第四数据值、第一终端设备的位置信息、第一终端设备的标识中的至少一项。第一终端设备的背景流量的传输时间窗的第四数据值可以是第一终端设备的背景流量的传输时间窗的数据库查询值。需要说明的是,本申请后续涉及的第一终端设备的背景流量的传输时间窗的第四数据值都可以对应第一终端设备的背景流量的传输时间窗的数据库查询值,下文不再赘述。第一终端设备的背景流量的传输带宽的第四数据值可以是第一终端设备的背景流量的传输带宽的数据库查询值。需要说明的是,本申请后续涉及的第一终端设备的背景流量的传输带宽的第四数据值都可以对应第一终端设备的背景流量的传输带宽的数据库查询值,下文不再赘述。本地背景流量传输策略可以包括:背景流量的传输时间窗的第五数据值;本地背景流量传输结果还可以包括:背景流量的传输带宽的第五数据值、第一终端设备的位置信息、第一终端设备标识中的至少一项。第一终端设备的背景流量的传输时间窗的第五数据值可以是第一终端设备的背景流量的传输时间窗的本地查询值。需要说明的是,本申请后续涉及的第一终端设备的背景流量的传输时间窗的第五数据值都可以对应第一终端设备的背景流量的传输时间窗的本地查询值,下文不再赘述。第一终端设备的背景流量的传输带宽的第五数据值可以是第一终端设备的背景流量的传输带宽的本地查询值。需要说明的是,本申请后续涉及的第一终端设备的背景流量的传输带宽的第五数据值都可以是对应第一终端设备的背景流量的传输带宽的本地查询值,下文不再赘述。
在具体的实施过程中,第一策略控制网元向请求设备发送第一终端设备的背景流量传输策略之前,第一策略控制网元可以根据第三信息确定第一终端设备的背景流量传输策 略。其中可选的,第一终端设备的背景流量传输策略可以为一条或者多条。具体的,第一终端设备的背景流量传输策略可以包括:背景流量的传输时间窗的第二数据值;背景流量传输策略还可以包括:背景流量的传输带宽的第二数据值、第一终端设备的位置信息、第一终端设备的标识中的至少一项。第一终端设备的背景流量的传输时间窗的第二数据值可以是第一终端设备的背景流量的传输时间窗的推荐值。需要说明的是,本申请后续涉及的第一终端设备的背景流量的传输时间窗的第二数据值都可以对应第一终端设备的背景流量的传输时间窗的推荐值,下文不再赘述。第一终端设备的背景流量的传输带宽的第二数据值可以是第一终端设备的背景流量的传输带宽的推荐值。需要说明的是,本申请后续涉及的第一终端设备的背景流量的传输带宽的第二数据值都可以对应第一终端设备的背景流量的传输带宽的推荐值,下文不再赘述。
基于上述涉及的第三信息中可以包括的内容,第一策略控制网元可以在根据第三信息确定第一终端设备的背景流量传输策略之前,第一策略控制网元还可以执以下三种操作中的任一种操作:
第一种操作:当第三信息还包括第一终端设备的背景流量传输查询结果时,第一策略控制网元从数据库网元获取第一终端设备的背景流量传输查询结果。
第二种操作:当第三信息还包括第一终端设备的本地背景流量传输策略时,第一策略控制网元从第一策略控制网元获取第一终端设备的本地背景流量传输策略。
第三种操作:当第三信息还包括第一终端设备的背景流量传输查询结果和第一终端设备的本地背景流量传输策略时,第一策略控制网元从数据库网元获取第一终端设备的背景流量传输查询结果,以及第一策略控制网元从第一策略控制网元获取第一终端设备的本地背景流量传输策略。
在一种具体的实施方式中,当第三信息中只包括第一终端设备的背景流量传输数据分析结果时,第一策略控制网元根据第三信息确定第一终端设备的背景流量传输策略,具体过程可以为:
第一策略控制网元可以根据背景流量传输数据分析结果中的背景流量的传输时间窗的第一数据值确定第一终端设备的背景流量传输策略中的背景流量的传输时间窗的第二数据值;第一策略控制网元还可以执行以下至少一项操作:第一策略控制网元根据背景流量传输数据分析结果中的背景流量的传输带宽的第一数据值确定第一终端设备的背景流量传输策略中的背景流量的传输带宽的第二数据值;第一策略控制网元将背景流量传输数据分析结果中的第一终端设备的位置信息包含在第一终端设备的背景流量传输策略中;第一策略控制网元将背景流量传输数据分析结果中的第一终端设备的标识包含在第一终端设备的背景流量传输策略中。
在另一种具体的实施方式中,当第三信息中包括第一终端设备的背景流量传输数据分析结果和第一终端设备的背景流量传输查询结果时,第一策略控制网元根据第三信息确定第一终端设备的背景流量传输策略,具体过程可以为:
第一策略控制网元可以根据背景流量传输数据分析结果中的背景流量的传输时间窗的第一数据值和第一终端设备的背景流量传输查询结果中的背景流量的传输时间窗的第四数据值,确定第一终端设备的背景流量传输策略中的背景流量的传输时间窗的第二数据值;第一策略控制网元还可以执行以下至少一项操作:第一策略控制网元根据背景流量传输数据分析结果中的背景流量的传输带宽的第一数据值和第一终端设备的背景流量传输 查询结果中的背景流量的传输带宽的第四数据值,确定第一终端设备的背景流量传输策略中的背景流量的传输带宽的第二数据值;第一策略控制网元将背景流量传输数据分析结果中和第一终端设备的背景流量传输查询结果中的第一终端设备的位置信息,包含在第一终端设备的背景流量传输策略中;第一策略控制网元将背景流量传输数据分析结果中和第一终端设备的背景流量传输查询结果中的第一终端设备的标识,包含在第一终端设备的背景流量传输策略中。
在又一种具体的实施方式中,当第三信息中包括第一终端设备的背景流量传输数据分析结果和第一终端设备的本地背景流量传输策略时,第一策略控制网元根据第三信息确定第一终端设备的背景流量传输策略,具体过程可以为:
第一策略控制网元可以根据背景流量传输数据分析结果中的背景流量的传输时间窗的第一数据值和第一终端设备的本地背景流量传输策略中的背景流量的传输时间窗的第五数据值,确定第一终端设备的背景流量传输策略中的背景流量的传输时间窗的第二数据值;第一策略控制网元还可以执行以下至少一项操作:第一策略控制网元根据背景流量传输数据分析结果中的背景流量的传输带宽的第一数据值和第一终端设备的本地背景流量传输策略中的背景流量的传输带宽的第五数据值,确定第一终端设备的背景流量传输策略中的背景流量的传输带宽的第二数据值;第一策略控制网元将背景流量传输数据分析结果中和第一终端设备的本地背景流量传输策略中的第一终端设备的位置信息,包含在第一终端设备的背景流量传输策略中;第一策略控制网元将背景流量传输数据分析结果中和第一终端设备的本地背景流量传输策略中的第一终端设备的标识,包含在第一终端设备的背景流量传输策略中。
在又一种具体的实施方式中,当第三信息中包括第一终端设备的背景流量传输数据分析结果、第一终端设备的背景流量传输查询结果和第一终端设备的本地背景流量传输策略时,第一策略控制网元根据第三信息确定第一终端设备的背景流量传输策略,具体过程可以为:
第一策略控制网元可以根据背景流量传输数据分析结果中的背景流量的传输时间窗的第一数据值、第一终端设备的背景流量传输查询结果中的背景流量的传输时间窗的第四数据值和第一终端设备的本地背景流量传输策略中的背景流量的传输时间窗的第五数据值,确定第一终端设备的背景流量传输策略中的背景流量的传输时间窗的第二数据值;第一策略控制网元还可以执行以下至少一项操作:第一策略控制网元根据背景流量传输数据分析结果中的背景流量的传输带宽的第一数据值、第一终端设备的背景流量传输查询结果中的背景流量的传输带宽的第四数据值和第一终端设备的本地背景流量传输策略中的背景流量的传输带宽的第五数据值,确定第一终端设备的背景流量传输策略中的背景流量的传输带宽的第二数据值;第一策略控制网元将背景流量传输数据分析结果中、第一终端设备的背景流量传输查询结果和第一终端设备的本地背景流量传输策略中的第一终端设备的位置信息,包含在第一终端设备的背景流量传输策略中;第一策略控制网元将背景流量传输数据分析结果中、第一终端设备的背景流量传输查询结果和第一终端设备的本地背景流量传输策略中的第一终端设备的标识,包含在第一终端设备的背景流量传输策略中。
在一种可选的实施方式中,当第一策略控制网元请求多个终端设备的背景流量传输数据分析结果,数据分析网元向第一策略控制网元返回多个终端设备的背景流量传输数据分析结果时,第三信息中可以包括多个终端设备中部分终端设备的背景流量传输数据分析结 果。
在一种可选的实施方式中,当第一策略控制网元向请求设备发送第一终端设备的背景流量传输策略时,第一策略控制网元还可以向请求设备发送标识信息,标识信息用于标识第一终端设备的目标背景流量传输策略。这样,后续请求设备可以通过标识信息在第一终端设备的背景流量传输策略中确定第一终端设备的目标背景流量传输策略。
在一种可选的实施方式中,由于第一终端设备的背景流量传输策略可以是一条,也可以是多条,因此,具体的可以根据第一终端设备的背景流量传输策略的条数分为以下两种情况:
第一种情况:当第一终端设备的背景流量传输策略为一条时,第一策略控制网元可以执行:
第一策略控制网元确定第一终端设备的背景流量传输策略为第一终端设备的目标背景流量传输策略;之后,第一策略控制网元向数据分析网元发送第一终端设备的目标背景流量传输策略;或者第一策略控制网元向数据库网元发送第一终端设备的目标背景流量传输策略;或者第一策略控制网元向数据分析网元和数据库发送第一终端设备的目标背景流量传输策略。
第二种情况:当第一终端设备的背景流量传输策略为多条时,第一策略控制网元还可以执行如下操作:
第一策略控制网元从请求设备接收第一终端设备的目标背景流量传输策略,第一终端设备的目标背景流量传输策略由请求设备根据第一终端设备的背景流量传输策略选择的;之后第一策略控制网元向数据分析网元发送第一终端设备的目标背景流量传输策略;或者第一策略控制网元向数据库网元发送第一终端设备的目标背景流量传输策略;或者第一策略控制网元向数据分析网元和数据库发送第一终端设备的目标背景流量传输策略。
在一种可选的实施方式中,上述两种情况中,第一策略控制网元向数据分析网元和/或数据库网元发送第一终端设备的目标背景流量传输策略时,第一策略控制网元还可以向数据分析网元和/或数据库网元发送标识信息、所述请求设备的标识、所述第一策略控制网元的标识中的至少一项。
在上述两种情况中,数据分析网元和/或数据库网元接收到第一终端设备的目标背景流量传输策略之后进行保存,并对维护的多个终端设备的目标背景流量传输策略进行更新。通过上述两种情况中的方法,第一策略控制网元最后将第一终端设备的目标背景流量传输策略,以及标识信息、所述请求设备的标识、所述第一策略控制网元的标识三项中的至少一项发送给数据分析网元,可以使数据分析网元接收到第一策略控制网元或者其他策略控制网元为其他终端设备请求背景流量传输数据分析结果时,还可以结合第一终端设备的目标背景流量传输策略,以及所述请求设备所对应的终端设备的目标背景流量传输策略和/或第一策略控制网元所对应的终端设备的目标背景流量传输策略进行分析,进而可以使最终确定的其他终端设备的背景流量传输策略与当前进行背景流量传输的终端设备(包括第一终端设备)的背景流量传输策略之间不产生冲突。此外,可以使数据库网元在接收第一策略控制网元的第一终端设备的目标背景流量查询请求时,可以根据查询请求中携带的标识信息查询得到第一终端设备的目标背景流量传输策略,并返回给第一策略控制网元,并由第一策略控制网元发送给第一终端设备、无线接入网网元、用户面功能网元、第一业务网元中的至少一个。
在上述第一种情况中,第一终端设备的背景流量传输策略为一条时,当请求设备接收到第一策略控制网元发送的第一终端设备的背景流量传输策略后,请求设备确定第一终端设备的背景流量传输策略为第一终端设备的目标背景流量传输策略;然后向数据分析网元发送第一终端设备的目标背景流量传输策略。
在上述第二种情况中,第一终端设备的背景流量传输策略为多条时,请求设备根据第一终端设备的背景流量传输策略选择第一终端设备的目标背景流量传输策略,然后向第一策略控制网元发送第一终端设备的目标背景流量传输策略。具体的,上述操作可以是当请求设备接收到第一策略控制网元发送的第一终端设备的背景流量传输策略之后执行的。
进一步可选的,在上述过程中,在请求设备根据第一终端设备的背景流量传输策略确认第一终端设备的目标背景流量传输策略之后,请求设备还可以向数据分析网元发送第一终端设备的目标背景流量传输策略。
具体实施时,无论在上述第一种情况,还是第二种情况中,请求设备执行的任何操作,均可以由第一终端设备或者服务于第一终端设备的第一业务网元替代执行,具体替代后的执行过程此处不再详细描述。
在一种可选的实施方式中,在第一策略控制网元得到第一终端设备的目标背景流量传输策略之后,还可以将第一终端设备的目标背景流量传输策略和/或标识信息发送给数据库网元,标识信息用于标识第一终端设备的目标背景流量传输策略。这样,一方面,数据分析网元可以从数据库网元获取第一终端设备的目标背景流量传输策略。另一方面,第一策略控制网元可以通过标识信息从数据库网元查询得到第一终端设备的目标背景流量传输策略。
在一种可选的是实施方式中,第一策略控制网元向请求设备发送第一终端设备的背景流量传输策略时,根据请求设备可以为第一终端设备或者第一业务网元的不同情况,具体可以分为以下两种场景:
场景d1:当请求设备是第一终端设备时,第一策略控制网元向第一终端设备发送第一终端设备的背景流量传输策略,具体过程可以是:第一策略控制网元先将第一终端设备的背景流量传输策略通过PDU会话修改流程发送给会话管理网元,可选的,第一策略控制网元可以通过调用Npcf_SMPolicy Control_Update服务向会话管理网元发送第一终端设备的背景流量传输策略;然后会话管理网元将第一终端设备的背景流量传输策略发送给接入和移动性管理功能网元,可选的,会话管理网元可以将第一终端设备的背景流量传输策略携带在会话管理网元向接入和移动性管理功能网元发送的PDU会话更新响应(response of Nsmf_PDU Session_Update SMContext)中;之后接入和移动性管理功能网元将第一终端设备的背景流量传输策略发送给服务于第一终端设备的接入网设备,可选的,接入和移动性管理功能网元可以通过N2消息向接入网设备发送第一终端设备的背景流量传输策略,例如N2消息可以是N2会话请求(N2 Session Request);最后接入网设备将第一终端设备的背景流量传输策略发送给第一终端设备,可选的,接入网设备可以将第一终端设备的背景流量传输策略携带在接入网设备向第一终端设备发送的特定资源修改(AN_specific resourse modification)消息(也即PDU session modification command/Ack)中。
在一种可选的实施方式中,在场景d1中,第一策略控制网元向第一终端设备发送第一终端设备的背景流量传输策略时,还可以向第一终端设备发送标识信息,标识信息用于标识第一终端设备的目标背景流量传输策略。其中,第一策略控制网元向第一终端设备发 送标识信息的流程可以参见上述第一策略控制网元向第一终端设备发送第一终端设备的背景流量传输策略的流程,具体此处不再赘述。在一种可选的实施方式中,当第一终端设备决定传输背景流量策略时,通过PDU Session修改流程将标识信息发送给第一策略控制网元,进一步地,第一策略控制网元通过标识信息向数据库网元查询得到第一终端设备的目标背景流量传输策略,并进一步发送给无线接入网网元、用户面功能网元、第一业务网元中的至少一个,无线接入网网元、用户面功能网元、第一业务网元中的至少一个。
场景d2、当请求设备是第一业务网元时,第一策略控制网元向第一业务网元发送第一终端设备的背景流量传输策略,具体过程可以是:第一策略控制网元通过网络开放功能网元向第一业务网元发送第一终端设备的背景流量传输策略。具体的,第一策略控制网元将第一终端设备的背景流量传输策略发送给网络开放功能网元,可选的,第一策略控制网元可以将通过调用Npcf_BDT Policy Control_Create response服务向网络开放功能网元发送第一终端设备的背景流量传输策略;然后网络开放功能网元将第一终端设备的背景流量传输策略发送给第一业务网元,可选的,网络开放功能网元可以调用Nnef_BDT PNegotiation_Create response服务向第一业务网元发送第一终端设备的背景流量传输策略。
在一种可选的实施方式中,在场景d2中,第一策略控制网元向第一业务网元发送第一终端设备的背景流量传输策略时,还可以向第一业务网元发送标识信息,标识信息用于标识第一终端设备的目标背景流量传输策略。其中,第一策略控制网元向第一业务网元发送标识信息的流程可以参见上述第一策略控制网元向第一业务网元发送第一终端设备的背景流量传输策略的流程,具体此处不再赘述。
在一种可选的实施方式中,当第一业务网元决定传输背景流量策略时,通过PDU Session修改流程将标识信息发送给第一策略控制网元,进一步地,第一策略控制网元通过标识信息向数据库网元查询得到第一终端设备的目标背景流量传输策略,并进一步发送给第一终端设备、无线接入网网元、用户面功能网元中的至少一个,第一终端设备、无线接入网网元、用户面功能网元中的至少一个。
需要说明的是,在场景d1和d2中,第一策略控制网元向第一终端设备发送第一终端设备的背景流量传输策略,可以但不限于采用上述PDU会话修改流程。可选的,第一策略控制网元还可以通过PDU会话建立流程(PDU Session Establishment procedure)、注册流程(Registration Procedure)、服务请求流程(Service Request Procedure)、终端配置更新流程(UE Configuration Update)等其他多种流程向第一终端设备发送第一终端设备的背景流量传输策略。可选的,当使用注册流程或者终端配置更新流程时,第一策略控制网元可以将第一终端设备的背景流量传输策略放置于第一终端设备的终端路由选择策略(UE Route Selection Policy,URSP)中发送给第一终端设备。具体的PDU会话建立流程(PDU Session Establishment procedure)、注册流程(Registration Procedure)、服务请求流程(Service Request Procedure)、终端配置更新流程(UE Configuration Update)等其他多种流程描述,此处不再详述。
采用本申请实施例提供的确定背景流量传输策略的方法,第一策略控制网元从请求设备接收到请求第一终端设备的背景流量传输策略的第一信息之后,向数据分析网元发送第二信息用于请求第一终端设备的背景流量传输数据分析结果,并在从数据分析网元接收第一终端设备的数据分析结果之后,向请求设备发送第一终端设备的背景流量传输策略;其中第一终端设备的数据分析结果为数据分析网元基于第二终端设备的目标背景流量传输 策略确定的,第二终端设备与第一终端设备不同,第二终端设备的目标背景流量传输策略用于第二终端设备进行背景流量传输;第一终端设备的背景流量传输策略由第一策略控制网元根据第三信息确定,第三信息包括第一终端设备的背景流量传输数据分析结果。在上述方法中,数据分析网元可以基于其他终端设备(即第二终端设备)的目标背景流量传输策略确定出第一终端设备的背景流量传输数据分析结果,进而可以使第一策略控制网元确定出第一终端设备背景流量传输策略,这样第一策略控制网元确定的第一终端设备的背景流量传输策略参考了其他终端设备等,从而可以使第一策略控制网元确定的第一终端设备的背景流量传输策略与其他终端设备之间的背景流量传输策略不产生冲突,从而可以解决背景流量传输失败的问题。
基于以上实施例,本申请实施例还提供了一种确定背景流量传输策略的方法,在该实施例中,第一终端设备作为请求设备直接请求第一终端设备背景流量传输策略,该方法同样适用于如图1所示的通信系统。参阅图3所示,该方法的具体流程可以包括:
步骤301、第一终端设备向第一策略控制网元发送第一信息,第一信息用于请求第一终端设备的背景流量传输策略。
其中,第一终端设备向第一策略控制网元发送第一信息的具体过程,可以参见图2所示的实施例中的场景a1和场景a2中的相关描述,重复之处此处不再赘述。
第一信息中包含的内容与图2所示的实施例中第一信息中包含的内容相同,可以相互参见,此处不再赘述。
步骤302、第一策略控制网元根据第一信息向数据分析网元发送第二信息,第二信息用于请求第一终端设备的背景流量传输数据分析结果。
具体的,对步骤302的详细描述可以参见上述实施例中步骤202中的描述,此处不再重复赘述。
步骤303、数据分析网元向第一策略控制网元发送第一终端设备的背景流量传输数据分析结果,其中,第一终端设备的背景流量传输数据分析结果是数据分析网元基于第二终端设备的目标背景流量传输策略确定的,第二终端设备与第一终端设备不同,第二终端设备的目标背景流量传输策略用于第二终端设备进行背景流量传输。
具体的,对步骤303的详细描述可以参见上述实施例中步骤203中的描述,此处不再重复赘述。
步骤304、第一终端设备从第一策略控制网元接收第一终端设备的背景流量传输策略,其中第一终端设备的背景流量传输策略是第一策略控制网元根据第三信息确定的,第三信息包括第一终端设备的背景流量传输数据分析结果。
其中,具体的,第一终端设备从第一策略控制网元接收第一终端设备的背景流量传输策略的具体过程,可以参见图2所示的实施例中场景d1的相关描述,此处不再赘述。
在一种可选的实施方式中,第一终端设备从第一策略控制网元接收第一终端设备的背景流量传输策略时,还可以接收标识信息,标识信息用于标识第一终端设备的目标背景流量传输策略。这样第一终端设备可以通过标识信息在第一终端设备的背景流量传输策略中,确定第一终端设备的目标背景流量传输策略。
在一种可选的实施方式中,第一终端设备从第一策略控制网元接收第一终端设备的背景流量传输策略之后,第一终端设备还可以向第一策略控制网元发送标识信息。这样,可 以使第一策略控制网元可以通过标识信息从数据库网元查询得到第一终端设备的目标背景流量传输策略,后续将第一终端设备的目标背景流量传输策略发送给无线接入网网元、用户面功能网元、业务网元中的至少一个。
具体地,第一终端设备可以通过第一终端设备发起的PDU Session修改流程,将标识信息通过会话管理功能网元发送给第一策略控制网元,第一策略控制网元可以通过标识信息从数据库网元查询得到第一终端设备的目标背景流量传输策略,然后第一策略控制网元可以通过剩余PDU Session修改流程将第一终端设备的目标背景流量传输策略发送给无线接入网网元、用户面功能网元、业务网元中的至少一个。
在一种可选的实施方式中,当第一终端设备的背景流量传输策略为一条时,第一终端设备还可以执行:第一终端设备确定第一终端设备的背景流量传输策略为第一终端设备的目标背景流量传输策略;第一终端设备向数据分析网元发送第一终端设备的目标背景流量传输策略。
在另一种可选的实施方式中,当第一终端设备的背景流量传输策略有多条时,第一终端设备还可以执行:第一终端设备根据第一终端设备的背景流量传输策略选择第一终端设备的目标背景流量传输策略;第一终端设备向第一策略控制网元发送第一终端设备的目标背景流量传输策略。
在一种可选的实施方式中,第一终端设备根据第一终端设备的背景流量传输策略选择第一终端设备的目标背景流量传输策略之后,还可以向数据分析网元发送第一终端设备的目标背景流量传输策略。
在本实施例中,涉及的第二信息、第一终端设备的背景流量传输策略、第一终端设备的背景流量传输数据分析结果、第二终端设备的目标背景流量传输策略等,均可以参照图2所示的实施例中的相关描述。
采用本申请实施例提供的确定背景流量传输策略的方法,同样可以实现图2所示的实施例的技术效果,此处不再重复赘述。并且,在上述基础上还可以确定上行背景流量传输策略,可以解决现有技术中无法确定上行背景流量传输策略的问题。
基于以上实施例,本申请实施例还提供了一种确定背景流量传输策略的方法,在该实施例中,服务于第一终端设备的第一业务网元作为请求设备直接请求第一终端设备背景流量传输策略,该方法同样适用于如图1所示的通信系统。参阅图4所示,该方法的具体流程可以包括:
步骤401、第一业务网元向第一策略控制网元发送第一信息,第一信息用于请求第一终端设备的背景流量传输策略。
其中,第一业务网元向第一策略控制网元发送第一信息的具体过程,可以参见图2所示的实施例中的场景b1和场景b2中的相关描述,重复之处此处不再赘述。
第一信息中包含的内容与图2所示的实施例中第一信息中包含的内容相同,可以相互参见,此处不再赘述。
步骤402、第一策略控制网元根据第一信息向数据分析网元发送第二信息,第二信息用于请求第一终端设备的背景流量传输数据分析结果。
具体的,对步骤402的详细描述可以参见上述实施例中步骤202中的描述,此处不再重复赘述。
步骤403、数据分析网元向第一策略控制网元发送第一终端设备的背景流量传输数据分析结果,其中,第一终端设备的背景流量传输数据分析结果是数据分析网元基于第二终端设备的目标背景流量传输策略确定的,第二终端设备与第一终端设备不同,第二终端设备的目标背景流量传输策略用于第二终端设备进行背景流量传输。
具体的,对步骤403的详细描述可以参见上述实施例中步骤203中的描述,此处不再重复赘述。
步骤404、第一业务网元从第一策略控制网元接收第一终端设备的背景流量传输策略,其中,第一终端设备的背景流量传输策略是第一策略控制网元根据第三信息确定的,第三信息包括第一终端设备的背景流量传输数据分析结果。
其中,具体的,第一业务网元从第一策略控制网元接收第一终端设备的背景流量传输策略的具体过程,可以参见图2所示的实施例中场景d1的相关描述,此处不再赘述。
在一种可选的实施方式中,第一业务网元从第一策略控制网元接收第一终端设备的背景流量传输策略时,还可以接收标识信息,标识信息用于标识第一终端设备的目标背景流量传输策略。这样第一业务网元可以通过标识信息在第一终端设备的背景流量传输策略中,确定第一终端设备的目标背景流量传输策略。
在一种可选的实施方式中,第一业务网元从第一策略控制网元接收第一终端设备的背景流量传输策略之后,第一业务网元还可以向第一策略控制网元发送标识信息。这样,可以使第一策略控制网元可以通过标识信息从数据库网元查询得到第一终端设备的目标背景流量传输策略,后续将第一终端设备的目标背景流量传输策略发送给第一终端设备、无线接入网网元、用户面功能网元中的至少一个。
具体地,第一业务网元可以通过第一终端设备发起的PDU Session修改流程,将标识信息发送给第一策略控制网元,第一策略控制网元可以通过标识信息从数据库网元查询得到第一终端设备的目标背景流量传输策略,然后第一策略控制网元可以通过剩余PDU Session修改流程将第一终端设备的目标背景流量传输策略发送给第一终端设备、无线接入网网元、用户面功能网元中的至少一个。
在一种可选的实施方式中,当第一终端设备的背景流量传输策略为一条时,第一业务网元还可以执行:第一业务网元确定第一终端设备的背景流量传输策略为第一终端设备的目标背景流量传输策略;第一业务网元向数据分析网元发送第一终端设备的目标背景流量传输策略。
在另一种可选的实施方式中,当第一终端设备的背景流量传输策略有多条时,第一业务网元还可以执行:第一业务网元根据第一终端设备的背景流量传输策略选择第一终端设备的目标背景流量传输策略;第一业务网元向第一策略控制网元发送第一终端设备的目标背景流量传输策略。
在一种可选的实施方式中,第一业务网元根据第一终端设备的背景流量传输策略确认第一终端设备的目标背景流量传输策略之后,还可以向数据分析网元发送第一终端设备的目标背景流量传输策略。
在本实施例中,涉及的第二信息、第一终端设备的背景流量传输策略、第一终端设备的背景流量传输数据分析结果、第二终端设备的目标背景流量传输策略等,均可以参照图2所示的实施例中的相关描述。
采用本申请实施例提供的确定背景流量传输策略的方法,同样可以实现图2所示的实 施例的技术效果,此处不再重复赘述。
下面图5,图6的实施例,为基于以上实施例,以具体的示例,对本申请实施例提供的确定背景流量传输策略的方法进行详细说明。
如图5所示,本申请实施例提供了一种确定背景流量传输策略的方法的示例,在该示例中,第一终端设备直接请求第一终端的背景流量传输策略,具体以终端设备为UE,策略控制网元为PCF,数据分析网元为NWDAF为例进行说明。该示例的具体流程可以包括:
步骤501、UE向AMF发送第一信息,第一信息用于请求UE的背景流量传输策略。
其中,具体的,AMF是一种接入和移动性管理功能网元的举例,这里AMF还可以用其他接入和移动性管理功能网元替换,本申请对此不作限定。
具体的,UE可以通过N1消息向AMF发送第一信息。
步骤502、AMF向SMF发送第一信息。
其中,具体的,SMF是一种会话管理功能网元的举例,这里SMF还可以用其他会话管理功能网元替换,本申请对此不作限定。
具体的,AMF可以通过调用Nsmf_PDU Session_UpdateSMContext服务向SMF发送第一信息。
步骤503、SMF向PCF发送第一信息。
具体的,SMF可以将通过调用Npcf_SMPolicy Control_Update服务向PCF发送第一信息。
步骤504、PCF根据第一信息向NWDAF发送第二信息,第二信息用于请求UE的背景流量传输数据分析结果。
步骤505、NWDAF基于其他UE的目标背景流量传输策略确定UE的背景流量传输数据分析结果。
具体实施时,NWDAF基于第二信息和其他UE的目标背景流量传输策略确定UE的背景流量传输数据分析结果。
步骤506、NWDAF将UE的背景流量传输数据分析结果发送给PCF。
步骤507、PCF根据第三信息确定UE的背景流量传输策略,第三信息中包括UE的背景流量传输数据分析结果。
步骤508、PCF将UE的背景流量传输策略发送给SMF。
具体的,PCF可以通过调用Npcf_SMPolicy Control_Update服务向SMF发送UE的背景流量传输策略。
可选的,PCF将UE的背景流量传输策略发送给SMF时,还将标识信息发送给SMF,其中,标识信息用于标识第一终端设备的目标背景流量传输策略。
步骤509、SMF将UE的背景流量传输策略发送给AMF。
具体的,SMF可以通过response of Nsmf_PDU Session_Update SMContext向AMF发送UE的背景流量传输策略。
步骤510、AMF将UE的背景流量传输策略发送给RAN。
其中,具体的,RAN是一种接入网设备的举例,这里RAN还可以用其他接入网设备替换,本申请对此不作限定。
具体的,AMF可以通过N2消息向RAN发送UE的背景流量传输策略。
步骤511、RAN将UE的背景流量传输策略发送给UE。
具体的,RAN可以通过AN_specific resourse modification(也即PDU session modification command/Ack)向UE发送UE的背景流量传输策略。
在一种可能的实施方式中,当UE的背景流量传输策略为一条时,在步骤511之后或者之前,PCF可以执行步骤512、步骤513,具体如下:
步骤512、PCF确定UE的背景流量传输策略为UE的目标背景流量传输策略。
步骤513、PCF向NWDAF发送UE的目标背景流量传输策略。
可选的,PCF向NWDAF发送UE的目标背景流量传输策略时,还可以将标识信息、PCF的标识、UE的标识中的至少一项发送给NWDAF。
可选的,当UE的背景流量传输策略为一条时,可以省去步骤512,PCF可以直接将UE的背景流量传输策略发送给NWDAF,此处不再详细描述。
在另一种可能的实施方式中,当UE的背景流量传输策略为多条时,在步骤511之后,还可以有如下步骤:
步骤514、UE根据UE的背景流量传输策略选择UE的目标背景流量传输策略。
步骤515、UE向AMF发送UE的目标背景流量传输策略。
具体的,UE可以通过PDU Session Modification Request消息向AMF发送UE的目标背景流量传输策略。
步骤516、AMF向SMF发送UE的目标背景流量传输策略。
具体的,AMF可以调用Nsmf_PDUSession_UpdateSMContex服务向SMF发送UE的目标背景流量传输策略。
步骤517、SMF向PCF发送UE的目标背景流量传输策略。
具体的,SMF可以调用Npcf_SMPolicyControl_Update request服务向PCF发送UE的目标背景流量传输策略。
可选的,UE执行完步骤514之后,UE还可以向NWDAF发送UE的目标背景流量传输策略。或者,UE执行完步骤514之后,UE还可以向数据库网元(例如,UDR)发送UE的目标背景流量传输策略。具体的,图5不再示出。
步骤518、PCF向NWDAF发送UE的目标背景流量传输策略。
可选的,PCF向NWDAF发送UE的目标背景流量传输策略时,还可以将标识信息、PCF的标识、UE的标识中的至少一项发送给NWDAF。
具体的,步骤518和步骤513为相同的步骤,这里为了方面示出两种可能的实现方式,用两个步骤示出。
需要说明的是,图5所示的实施例中的各个步骤的具体实施细节均可以参见上述实施例涉及的相关描述,此处不再详细赘述。
基于上述示例,同样可以实现图2、图3所示的实施例的技术效果,此处不再重复赘述。
如图6所示,本申请实施例提供了另一种确定背景流量传输策略的方法的示例,在该示例中,服务于第一终端设备的第一业务网元请求第一终端的背景流量传输策略,具体以第一业务网元为AF、终端设备为UE,策略控制网元为PCF,数据分析网元为NWDAF为例进行说明。该示例的具体流程可以包括:
步骤601、AF向NEF发送第一信息,第一信息用于请求UE的背景流量传输策略。
其中,NEF是一种网络开放功能网元的举例,这里NEF还可以用其他网络功能开放网元替换,本申请对此不作限定。
具体的,AF可以通过调用Nnef_BDTPNegotiation_Create request或者Nnef_Trigger_Delivery request服务向NEF发送第一信息。
步骤602、NEF向PCF发送第一信息。
具体的,NEF可以通过调用Npcf_BDTPolicyControl_Create request或者Npcf_Policy Authorization_Create Request服务向PCF发送第一信息。
步骤603、PCF根据第一信息向NWDAF发送第二信息,第二信息用于请求UE的背景流量传输数据分析结果。
步骤604、NWDAF基于其他UE的目标背景流量传输策略确定UE的背景流量传输数据分析结果。
具体实施时,NWDAF基于第二信息和其他UE的目标背景流量传输策略确定UE的背景流量传输数据分析结果。
步骤605、NWDAF将UE的背景流量传输数据分析结果发送给PCF。
步骤606、PCF根据第三信息确定UE的背景流量传输策略,第三信息中包括UE的背景流量传输数据分析结果。
步骤607、PCF将UE的背景流量传输策略发送给NEF。
具体的,PCF可以将通过调用Npcf_BDT Policy Control_Create response或者Npcf_PolicyAuthorization_Notify服务向NEF发送UE的背景流量传输策略。
可选的,PCF将UE的背景流量传输策略发送给SMF时,还将标识信息发送给SMF,其中,标识信息用于标识第一终端设备的目标背景流量传输策略。
步骤608、NEF将UE的背景流量传输策略发送给AF。
具体的,NEF可以调用Nnef_BDT PNegotiation_Create response或者Nnef_Trigger_Delivery response服务向AF发送UE的背景流量传输策略。
在一种可能的实施方式中,当UE的背景流量传输策略为一条时,在步骤608之后或者之前,PCF可以执行步骤609、步骤610,具体如下:
步骤609、PCF确定UE的背景流量传输策略为UE的目标背景流量传输策略。
步骤610、PCF向NWDAF发送UE的目标背景流量传输策略。
可选的,PCF向NWDAF发送UE的目标背景流量传输策略时,还可以将标识信息、PCF的标识、UE的标识中的至少一项发送给NWDAF。
可选的,当UE的背景流量传输策略为一条时,可以省去步骤609,PCF可以直接将UE的背景流量传输策略发送给NWDAF,此处不再详细描述。
在另一种可能的实施方式中,当UE的背景流量传输策略为多条时,在步骤608之后,还可以有如下步骤:
步骤611、AF根据UE的背景流量传输策略选择UE的目标背景流量传输策略。
步骤612、AF向NEF发送UE的目标背景流量传输策略。
具体的,AF可以调用Nnef_BDTPNegotiation_Update request或者Nnef_Trigger_Delivery request服务向NEF发送UE的目标背景流量传输策略。
步骤613、NEF向PCF发送UE的目标背景流量传输策略和/或标识信息。
具体的,NEF可以调用Npcf_BDTPolicyControl_Update request或者Npcf_PolicyAuth orization_Update Request服务向PCF发送UE的目标背景流量传输策略。
可选的,AF执行完步骤611之后,AF还可以向NWDAF发送UE的目标背景流量传输策略,或者发送UE的目标背景流量传输策略以及以下至少一项:PCF的标识、AF的标识、标识信息。或者,AF执行完步骤611之后,AF还可以向数据库网元(例如,UDR)发送UE的目标背景流量传输策略,或者发送UE的目标背景流量传输策略以及以下至少一项:PCF的标识、AF的标识、标识信息。具体的,图5不再示出。
步骤614、PCF向NWDAF发送UE的目标背景流量传输策略。
可选的,PCF向NWDAF发送UE的目标背景流量传输策略时,还可以将标识信息、PCF的标识、UE的标识中的至少一项发送给NWDAF。
具体的,步骤614和步骤610为相同的步骤,这里为了方便示出两种可能的实现方式,用两个步骤示出。
需要说明的是,图6所示的实施例中的各个步骤的具体实施细节均可以参见上述实施例涉及的相关描述,此处不再详细赘述。
基于上述示例,同样可以实现图2、图4所示的实施例的技术效果,此处不再重复赘述。
上述本申请提供的实施例中,分别从各个网元或者设备之间交互的角度对本申请实施例提供的确定背景流量传输策略的方法的各方案进行了介绍。可以理解的是,各个网元和设备,例如上述第一策略控制网元、数据分析网元、第一业务网元和第一终端设备为了实现上述功能,其包含了执行各个功能相应的硬件结构和/或软件模块。本领域技术人员应该很容易意识到,结合本申请中所公开的实施例描述的各示例的单元及算法步骤,本申请能够以硬件或硬件和计算机软件的结合形式来实现。某个功能究竟以硬件还是计算机软件驱动硬件的方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
例如,当上述网元或者设备通过软件模块来实现相应的功能时,用于确定背景流量传输策略的通信装置可以包括接收模块701和发送模块702,可选的还可以包括处理模块703,具体可以参考如图7所示的结构示意图。
在一个实施例中,图7所示通信装置可用于执行上述图2、图3、图4所示的实施例中的第一策略控制网元的操作,以及用于执行上述图5、图6所示的实施例中的PCF的操作。例如:
接收模块701用于从请求设备接收第一信息,第一信息用于请求第一终端设备的背景流量传输策略;
发送模块702用于根据第一信息向数据分析网元发送第二信息,第二信息用于请求第一终端设备的背景流量传输数据分析结果;
接收模块701还用于从数据分析网元接收第一终端设备的背景流量传输数据分析结果,其中,第一终端设备的背景流量传输数据分析结果是数据分析网元基于第二终端设备的目标背景流量传输策略确定的,第二终端设备与第一终端设备不同,第二终端设备的目标背景流量传输策略用于第二终端设备进行背景流量传输;
发送模块702还用于向请求设备发送第一终端设备的背景流量传输策略,第一终端设备的背景流量传输策略由第一策略控制网元根据第三信息确定,第三信息包括第一终端设备的背景流量传输数据分析结果。
因此,基于上述确定背景流量传输策略的通信装置,可以通过数据分析网元基于其他终端设备(即第二终端设备)的目标背景流量传输策略确定出第一终端设备的背景流量传输数据分析结果,进而可以使第一策略控制网元确定出第一终端设备背景流量传输策略,这样第一策略控制网元确定的第一终端设备的背景流量传输策略参考了其他终端设备,从而可以使第一策略控制网元确定的第一终端设备的背景流量传输策略与其他终端设备之间的背景流量传输策略不产生冲突,从而可以解决背景流量传输失败的问题。
在一种可选的实施方式中,第三信息还包括:第一终端设备的背景流量传输查询结果和/或第一终端设备的本地背景流量传输策略。
在一种可选的实施方式中,接收模块701还用于:当第三信息还包括第一终端设备的背景流量传输查询结果时,从数据库网元获取第一终端设备的背景流量传输查询结果;或者当第三信息还包括第一终端设备的本地背景流量传输策略时,从第一策略控制网元获取第一终端设备的本地背景流量传输策略;或者当第三信息还包括第一终端设备的背景流量传输查询结果和第一终端设备的本地背景流量传输策略时,从数据库网元获取第一终端设备的背景流量传输查询结果,以及,从第一策略控制网元获取第一终端设备的本地背景流量传输策略。
在一种可选的实施方式中,当第一终端设备的背景流量传输策略为一条时,处理模块703用于确定第一终端设备的背景流量传输策略为第一终端设备的目标背景流量传输策略,第一终端设备的目标背景流量传输策略用于第一终端设备进行背景流量传输;发送模块702还用于向数据分析网元和/或数据库网元发送第一终端设备的目标背景流量传输策略。
在一种可选的实施方式中,当第一终端设备的背景流量传输策略有多条时,接收模块701还用于从请求设备接收第一终端设备的目标背景流量传输策略,第一终端设备的目标背景流量传输策略由请求设备根据第一终端设备的背景流量传输策略选择的;发送模块702还用于向数据分析网元和/或数据库网元发送第一终端设备的目标背景流量传输策略。
在一种可选的实施方式中,请求设备为第一终端设备,或者服务于第一终端设备的业务网元。
在一种可选的实施方式中,背景流量传输数据分析结果包括:背景流量的传输时间窗的第一数据值;背景流量传输数据分析结果还包括:背景流量的传输带宽的第一数据值、第一终端设备的位置信息、第一终端设备的标识中的至少一项。
在一种可选的实施方式中,背景流量传输策略包括:背景流量的传输时间窗的第二数据值;背景流量传输策略还包括:背景流量的传输带宽的第二数据值、第一终端设备的位置信息、第一终端设备的标识中的至少一项。
在一种可选的实施方式中,第二信息中包括第一终端设备的:背景流量的大小;第二信息中还包括第一策略控制网元的标识、请求设备的标识、第一终端设备的背景流量的传输时间窗的第三数据值、第一终端设备的位置信息、第一终端设备的标识中的至少一项。
在一种可选的实施方式中,第一信息中包括第一终端设备的:背景流量的大小;第一信息中还包括请求设备的标识、第一终端设备的背景流量的传输时间窗的第三数据值、第 一终端设备的位置信息、第一终端设备的标识中的至少一项。
在一种可选的实施方式中,背景流量传输查询结果包括:背景流量的传输时间窗的第四数据值;背景流量传输查询结果还包括:背景流量的传输带宽的第四数据值、第一终端设备的位置信息、第一终端设备的标识中的至少一项。
在一种可选的实施方式中,本地背景流量传输策略包括:背景流量的传输时间窗的第五数据值;本地背景流量传输结果还包括:背景流量的传输带宽的第五数据值、第一终端设备的位置信息、第一终端设备的标识中的至少一项。
在一种可选的实施方式中,发送模块702向请求设备发送第一终端设备的背景流量传输策略时,发送模块702还用于向请求设备发送标识信息,标识信息用于标识第一终端设备的目标背景流量传输策略。
在一种可选的实施方式中,发送模块702向数据分析网元和/或数据库网元发送第一终端设备的目标背景流量传输策略时,发送模块702还用于向数据分析网元和/或数据库网元发送标识信息、请求设备的标识、第一策略控制网元的标识中的至少一项。
在一种可选的实施方式中,接收模块701还用于在发送模块702向请求设备发送第一终端设备的背景流量传输策略之后,从请求设备接收标识信息。
此外,基于用于确定背景流量传输策略的通信装置中的接收模块701、发送模块702,可选的还有处理模块703还可实现上述方法中第一策略控制网元的其他操作或功能,此处不再赘述。
在另一个实施例中,图7所示通信装置还可用于执行上述图3所示的实施例中的第一终端设备的操作,以及用于执行上述图5所示的实施例中的UE的操作。例如:
发送模块702用于向第一策略控制网元发送第一信息,第一信息用于请求第一终端设备的背景流量传输策略;
接收模块701用于从第一策略控制网元接收第一终端设备的背景流量传输策略,其中第一终端设备的背景流量传输策略是第一策略控制网元根据第三信息确定的,第三信息包括来自数据分析网元的第一终端设备的背景流量传输数据分析结果。
因此,基于上述确定背景流量传输策略的通信装置,第一终端设备的背景流量传输策略是第一策略控制网元根据第三信息确定的,第三信息包括来自数据分析网元的第一终端设备的背景流量传输数据分析结果,这样第一策略控制网元确定的第一终端设备的背景流量传输策略参考了其他终端设备,从而可以使第一终端设备的背景流量传输策略与其他终端设备之间的背景流量传输策略不产生冲突,从而可以解决背景流量传输失败的问题。
在一种可选的实施方式中,第三信息还包括:第一终端设备的背景流量传输查询结果和/或第一终端设备的本地背景流量传输策略。
在一种可选的实施方式中,当第一终端设备的背景流量传输策略为一条时,处理模块703用于确定第一终端设备的背景流量传输策略为第一终端设备的目标背景流量传输策略;发送模块702,还用于向数据分析网元发送第一终端设备的目标背景流量传输策略。
在一种可选的实施方式中,处理模块703还用于当第一终端设备的背景流量传输策略有多条时,根据第一终端设备的背景流量传输策略选择第一终端设备的目标背景流量传输策略;发送模块702还用于向第一策略控制网元发送第一终端设备的目标背景流量传输策略。
在一种可选的实施方式中,发送模块702还用于向数据分析网元发送第一终端设备的目标背景流量传输策略。
在一种可选的实施方式中,背景流量传输数据分析结果包括:背景流量的传输时间窗的第一数据值;背景流量传输数据分析结果还包括:背景流量的传输带宽的第一数据值、第一终端设备的位置信息、第一终端设备的标识中的至少一项。
在一种可选的实施方式中,背景流量传输策略包括:背景流量的传输时间窗的第二数据值;背景流量传输策略还包括:背景流量的传输带宽的第二数据值、第一终端设备的位置信息、第一终端设备的标识中的至少一项。
在一种可选的实施方式中,第一信息中包括第一终端设备的:背景流量的大小;第一信息中还包括第一终端设备的:背景流量的传输时间窗的第三数据值、位置信息、标识中的至少一项。
在一种可选的实施方式中,背景流量传输查询结果包括:背景流量的传输时间窗的第四数据值;背景流量传输查询结果还包括:背景流量的传输带宽的第四数据值、第一终端设备的位置信息、第一终端设备的标识中的至少一项。
在一种可选的实施方式中,本地背景流量传输策略包括:背景流量的传输时间窗的第五数据值;本地背景流量传输结果还包括:背景流量的传输带宽的第五数据值、第一终端设备的位置信息、第一终端设备的标识中的至少一项。
在一种可选的实施方式中,在发送模块702向第一策略控制网元发送第一信息之前,接收模块701还用于从第一业务网元获取第一终端设备的:背景流量的大小;接收模块701还用于从第一业务网元还获取第一终端设备的:背景流量的传输时间窗的第三数据值、位置信息、标识中的至少一项。
在一种可选的实施方式中,接收模块701在接收第一终端设备的背景流量传输策略时,接收模块701还用于从第一策略控制网元接收标识信息,标识信息用于标识第一终端设备的目标背景流量传输策略。
在一种可选的实施方式中,发送模块702在接收模块701从第一策略控制网元接收第一终端设备的背景流量传输策略之后,还用于向第一策略控制网元发送标识信息。
此外,基于用于确定背景流量传输策略的通信装置中的接收模块701、发送模块702,可选的还有处理模块703还可实现上述方法中第一终端设备的其他操作或功能,此处不再赘述。
在另一个实施例中,图7所示通信装置还可用于执行上述图4所示的实施例中的第一业务网元的操作,以及用于执行上述图6所示的实施例中的AF的操作。例如:
发送模块702,用于向第一策略控制网元发送第一信息,第一信息用于请求第一终端设备的背景流量传输策略;
接收模块701,用于从第一策略控制网元接收第一终端设备的背景流量传输策略,其中第一终端设备的背景流量传输策略是第一策略控制网元根据第三信息确定的,第三信息包括来自数据分析网元的第一终端设备的背景流量传输数据分析结果。
因此,基于上述确定背景流量传输策略的通信装置,第一终端设备的背景流量传输策略是第一策略控制网元根据第三信息确定的,第三信息包括来自数据分析网元的第一终端设备的背景流量传输数据分析结果,这样第一策略控制网元确定的第一终端设备的背景流 量传输策略参考了其他终端设备,从而可以使第一终端设备的背景流量传输策略与其他终端设备之间的背景流量传输策略不产生冲突,从而可以解决背景流量传输失败的问题。
在一种可选的实施方式中,第三信息还包括:第一终端设备的背景流量传输查询结果和/或第一终端设备的本地背景流量传输策略。
在一种可选的实施方式中,当第一终端设备的背景流量传输策略为一条时,处理模块703用于确定第一终端设备的背景流量传输策略为第一终端设备的目标背景流量传输策略;发送模块702,还用于向数据分析网元发送第一终端设备的目标背景流量传输策略。
在一种可选的实施方式中,当第一终端设备的背景流量传输策略有多条时,处理模块703还用于根据第一终端设备的背景流量传输策略选择第一终端设备的目标背景流量传输策略;发送模块702还用于向第一策略控制网元发送第一终端设备的目标背景流量传输策略。
在一种可选的实施方式中,发送模块702还用于向数据分析网元发送第一终端设备的目标背景流量传输策略。
在一种可选的实施方式中,背景流量传输数据分析结果包括:背景流量的传输时间窗的第一数据值;背景流量传输数据分析结果还包括:背景流量的传输带宽的第一数据值、第一终端设备的位置信息、第一终端设备的标识中的至少一项。
在一种可选的实施方式中,背景流量传输策略包括:背景流量的传输时间窗的第二数据值;背景流量传输策略还包括:背景流量的传输带宽的第二数据值、第一终端设备的位置信息、第一终端设备的标识中的至少一项。
在一种可选的实施方式中,第一信息中包括第一终端设备的:背景流量的大小;第一信息中还包括第一业务网元的标识、第一终端设备的背景流量的传输时间窗的第三数据值、第一终端设备的位置信息、第一终端设备的标识中的至少一项。
在一种可选的实施方式中,背景流量传输查询结果包括:背景流量的传输时间窗的第四数据值;背景流量传输查询结果还包括:背景流量的传输带宽的第四数据值、第一终端设备的位置信息、第一终端设备的标识中的至少一项。
在一种可选的实施方式中,本地背景流量传输策略包括:背景流量的传输时间窗的第五数据值;本地背景流量传输结果还包括:背景流量的传输带宽的第五数据值、第一终端设备的位置信息、第一终端设备的标识中的至少一项。
在一种可选的实施方式中,在发送模块702向第一策略控制网元发送第一信息之前,接收模块701还用于从第一终端设备获取第一终端设备的:背景流量的大小;接收模块701从第一终端设备还获取第一业务网元的标识、第一终端设备的背景流量的传输时间窗的第三数据值、第一终端设备的位置信息、第一终端设备的标识中的至少一项。
在一种可选的实施方式中,接收模块701从第一策略控制网元接收第一终端设备的背景流量传输策略时,接收模块701还用于从第一策略控制网元接收标识信息,标识信息用于标识第一终端设备的目标背景流量传输策略。
在一种可选的实施方式中,发送模块702还用于在接收模块701从第一策略控制网元接收第一终端设备的背景流量传输策略之后,向第一策略控制网元发送标识信息。
此外,基于用于确定背景流量传输策略的通信装置中的接收模块701、发送模块702,可选的还有处理模块703还可实现上述方法中第一业务网元的其他操作或功能,此处不再赘述。
又例如,当上述网元或者设备通过软件模块来实现相应的功能时,用于确定背景流量传输策略的通信装置还可以包括接收模块801和发送模块802,具体可以参考如图8所示的结构示意图。
在一个实施例中,图8所示的通信装置可用于执行上述图2、图3、图4所示的实施例中的数据分析网元的操作,以及可用于执行上述图5、图6所示的实施例中的NWDAF的操作。例如:
接收模块801用于从第一策略控制网元接收第二信息,第二信息用于请求第一终端设备的背景流量传输数据分析结果,第二信息由第一策略控制网元从请求设备接收的第一信息确定,第一信息用于请求第一终端设备的背景流量传输策略;
发送模块802用于向第一策略控制网元发送第一终端设备的背景流量传输数据分析结果,第一终端设备的背景流量传输数据分析结果由数据分析网元基于第二终端设备的目标背景流量传输策略所确定,第二终端设备与第一终端设备不同,第二终端设备的目标背景流量传输策略用于第二终端设备进行背景流量传输。
因此,基于上述确定背景流量传输策略的通信装置,基于其他终端设备(即第二终端设备)的目标背景流量传输策略确定出第一终端设备的背景流量传输数据分析结果,进而可以使第一策略控制网元确定出第一终端设备背景流量传输策略,这样可以使第一策略控制网元确定的第一终端设备的背景流量传输策略参考了其他终端设备,从而可以使第一策略控制网元确定的第一终端设备的背景流量传输策略与其他终端设备之间的背景流量传输策略不产生冲突,从而可以解决背景流量传输失败的问题。
在一种可选的实施方式中,第一终端设备的背景流量传输数据分析结果还可以由数据分析网元基于第二终端设备的目标背景流量传输策略和第二信息,以及功能网元的负载信息和/或功能网元的容量信息所确定。
在一种可选的实施方式中,接收模块801还用于获取第二终端设备的目标背景流量传输策略。
在一种可选的实施方式中,接收模块801在获取第二终端设备的目标背景流量传输策略时,具体用于从第一设备接收第二终端设备的目标背景流量传输策略,其中第一设备为以下任意一项或多项:第二终端设备、第一策略控制网元、第二策略控制网元、第二业务网元、第二数据库网元,其中,第一策略控制网元、第二策略控制网元、第二业务网元、第二数据库网元服务于第二终端设备。
在一种可选的实施方式中,接收模块801还用于获取功能网元的负载信息;或者,接收模块801还用于获取功能网元的容量信息;或者接收模块801还用于获取功能网元的负载信息和功能网元的容量信息。
在一种可选的实施方式中,接收模块801在获取功能网元的负载信息时具体用于:从功能网元或者运行管理维护网元接收功能网元的负载信息;或者接收模块801在获取功能网元的容量信息时具体用于:从功能网元或者运行管理维护网元接收功能网元的容量信息;或者接收模块801在获取功能网元的负载信息和功能网元的容量信息时具体可以用于:从功能网元或者运行管理维护网元接收功能网元的负载信息和功能网元的容量信息。
在一种可选的实施方式中,功能网元包括服务于第一终端设备的第一策略控制网元、会话管理功能网元、无线接入网网元、接入与移动性管理功能网元、用户面功能网元中的至少一个。
在一种可选的实施方式中,接收模块801还用于接收第一终端设备的目标背景流量传输策略,其中第一终端设备根据第一终端设备的目标背景流量传输策略进行背景流量传输。
在一种可选的实施方式中,接收模块801在接收第一终端设备的目标背景流量传输策略时,具体用于:从第二设备接收第一终端设备的目标背景流量传输策略,其中,第二设备为以下任意一项或多项:第一终端设备、第一策略控制网元、第一业务网元、第一数据库网元,其中,第一策略控制网元、第一业务网元、第一数据库网元服务于第一终端设备。
在一种可选的实施方式中,接收模块801接收第一终端设备的目标背景流量传输策略时,接收模块801还用于接收请求设备的标识,或者还用于接收第一策略控制网元的标识,或者还用于接收请求设备的标识和第一策略控制网元的标识。
在一种可选的实施方式中,背景流量传输数据分析结果包括:背景流量的传输时间窗的第一数据值;背景流量传输数据分析结果还包括:背景流量的传输带宽的第一数据值、第一终端设备的位置信息、第一终端设备的标识中的至少一项。
在一种可选的实施方式中,背景流量传输策略包括:背景流量的传输时间窗的第二数据值;背景流量传输策略还包括:背景流量的传输带宽的第二数据值、第一终端设备的位置信息、第一终端设备的标识中的至少一项。
在一种可选的实施方式中,第二信息中包括第一终端设备的:背景流量的大小;第二信息中还包括第一策略控制网元的标识、请求设备标识、第一终端设备的背景流量的传输时间窗的第三数据值、第一终端设备的位置信息、第一终端设备的标识中的至少一项。
在一种可选的实施方式中,第一信息中包括第一终端设备的:背景流量的大小;第一信息中还包括请求设备标识、第一终端设备的背景流量的传输时间窗的第三数据值、第一终端设备的位置信息、第一终端设备的标识中的至少一项。
此外,基于用于确定背景流量传输策略的通信装置中的接收模块801、发送模块802,还可实现上述方法中数据分析网元的其他操作或功能,此处不再赘述。
需要说明的是,本申请实施例中对单元或模块的划分是示意性的,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式。在本申请的实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。
集成的单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)或处理器(processor)执行本申请各个实施例方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(read-only memory,ROM)、随机存取存储器(random access memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。
又例如,当上述网元或者设备通过硬件来实现相应的功能时,用于确定背景流量传输 策略的通信装置可以包括收发器901和处理器902,可选的还可以包括存储器903,具体可以参考如图9所示结构图。
其中,处理器902可以是中央处理器(central processing unit,CPU),网络处理器(network processor,NP)或者CPU和NP的组合等等。处理器902还可以进一步包括硬件芯片。上述硬件芯片可以是专用集成电路(application-specific integrated circuit,ASIC),可编程逻辑器件(programmable logic device,PLD)或其组合。上述PLD可以是复杂可编程逻辑器件(complex programmable logic device,CPLD),现场可编程逻辑门阵列(field-programmable gate array,FPGA),通用阵列逻辑(generic array logic,GAL)或其任意组合。处理器902在实现上述功能时,可以通过硬件实现,当然也可以通过硬件执行相应的软件实现。
收发器901和处理器902之间相互连接。可选的,收发器901和处理器902通过总线904相互连接;总线904可以是外设部件互连标准(Peripheral Component Interconnect,PCI)总线或扩展工业标准结构(Extended Industry Standard Architecture,EISA)总线等。总线可以分为地址总线、数据总线、控制总线等。为便于表示,图9中仅用一条粗线表示,但并不表示仅有一根总线或一种类型的总线。
在一个实施例中,图9所示的通信装置可用于执行上述图2、图3、图4所示的实施例中的第一策略控制网元的操作,还可用于执行上述图5、图6所示的实施例中的PCF的操作。例如:
收发器901用于实现与第一策略控制网元(例如PCF)相连的其他设备进行通信交互,即用于接收和发送数据;
处理器902用于控制收发器901从请求设备接收第一信息,第一信息用于请求第一终端设备的背景流量传输策略;
控制收发器901根据第一信息向数据分析网元发送第二信息,第二信息用于请求第一终端设备的背景流量传输数据分析结果;
控制收发器901从数据分析网元接收第一终端设备的背景流量传输数据分析结果,其中,第一终端设备的背景流量传输数据分析结果是数据分析网元基于第二终端设备的目标背景流量传输策略确定的,第二终端设备与第一终端设备不同,第二终端设备的目标背景流量传输策略用于第二终端设备进行背景流量传输;
控制收发器901向请求设备发送第一终端设备的背景流量传输策略,第一终端设备的背景流量传输策略由第一策略控制网元根据第三信息确定,第三信息包括第一终端设备的背景流量传输数据分析结果。
因此,基于上述确定背景流量传输策略的通信装置,可以通过数据分析网元基于其他终端设备(即第二终端设备)的目标背景流量传输策略确定出第一终端设备的背景流量传输数据分析结果,进而可以使第一策略控制网元确定出第一终端设备背景流量传输策略,这样第一策略控制网元确定的第一终端设备的背景流量传输策略参考了其他终端设备,从而可以使第一策略控制网元确定的第一终端设备的背景流量传输策略与其他终端设备之间的背景流量传输策略不产生冲突,从而可以解决背景流量传输失败的问题。
在一种可选的实施方式中,第三信息还包括:第一终端设备的背景流量传输查询结果和/或第一终端设备的本地背景流量传输策略。
在一种可选的实施方式中,处理器902还用于:
当第三信息还包括第一终端设备的背景流量传输查询结果时,控制收发器901从数据库网元获取第一终端设备的背景流量传输查询结果;或者,当第三信息还包括第一终端设备的本地背景流量传输策略时,控制收发器901从第一策略控制网元获取第一终端设备的本地背景流量传输策略;或者,当第三信息还包括第一终端设备的背景流量传输查询结果和第一终端设备的本地背景流量传输策略时,控制收发器901从数据库网元获取第一终端设备的背景流量传输查询结果,以及,控制收发器从第一策略控制网元获取第一终端设备的本地背景流量传输策略。
在一种可选的实施方式中,当第一终端设备的背景流量传输策略为一条时,处理器902还用于确定第一终端设备的背景流量传输策略为第一终端设备的目标背景流量传输策略,第一终端设备的目标背景流量传输策略用于第一终端设备进行背景流量传输;控制收发器901向数据分析网元和/或数据库网元发送第一终端设备的目标背景流量传输策略。
在一种可选的实施方式中,当第一终端设备的背景流量传输策略有多条时,处理器902还用于控制收发器901从请求设备接收第一终端设备的目标背景流量传输策略,第一终端设备的目标背景流量传输策略由请求设备根据第一终端设备的背景流量传输策略选择的;控制收发器901向数据分析网元和/或数据库网元发送第一终端设备的目标背景流量传输策略。
在一种可选的实施方式中,请求设备为第一终端设备,或者服务于第一终端设备的业务网元。
在一种可选的实施方式中,背景流量传输数据分析结果包括:背景流量的传输时间窗的第一数据值;背景流量传输数据分析结果还包括:背景流量的传输带宽的第一数据值、第一终端设备的位置信息、第一终端设备的标识中的至少一项。
在一种可选的实施方式中,背景流量传输策略包括:背景流量的传输时间窗的第二数据值;背景流量传输策略还包括:背景流量的传输带宽的第二数据值、第一终端设备的位置信息、第一终端设备的标识中的至少一项。
在一种可选的实施方式中,第二信息中包括第一终端设备的:背景流量的大小;第二信息中还包括第一策略控制网元的标识、请求设备的标识、第一终端设备的背景流量的传输时间窗的第三数据值、第一终端设备的位置信息、第一终端设备的标识中的至少一项。
在一种可选的实施方式中,第一信息中包括第一终端设备的:背景流量的大小;第一信息中还包括请求设备的标识、第一终端设备的背景流量的传输时间窗的第三数据值、第一终端设备的位置信息、第一终端设备的标识中的至少一项。
在一种可选的实施方式中,背景流量传输查询结果包括:背景流量的传输时间窗的第四数据值;背景流量传输查询结果还包括:背景流量的传输带宽的第四数据值、第一终端设备的位置信息、第一终端设备的标识中的至少一项。
在一种可选的实施方式中,本地背景流量传输策略包括:背景流量的传输时间窗的第五数据值;本地背景流量传输结果还包括:背景流量的传输带宽的第五数据值、第一终端设备的位置信息、第一终端设备的标识中的至少一项。
在一种可选的实施方式中,处理器902,在控制收发器901向请求设备发送第一终端设备的背景流量传输策略时,还用于向请求设备发送标识信息,标识信息用于标识第一终端设备的目标背景流量传输策略。
在一种可选的实施方式中,处理器902,在控制收发器901向数据分析网元和/或数据库网元发送第一终端设备的目标背景流量传输策略时,还用于向数据分析网元和/或数据库网元发送标识信息、请求设备的标识、第一策略控制网元的标识中的至少一项。
在一种可选的实施方式中,处理器902,还用于在控制收发器901向请求设备发送第一终端设备的背景流量传输策略之后,从请求设备接收标识信息。
在一种可选的实施方式中,存储器903,与处理器902耦合,用于存放程序等。具体地,程序可以包括程序代码,该程序代码包括计算机操作指令。存储器903可能包括RAM,也可能还包括非易失性存储器(non-volatile memory),例如至少一个磁盘存储器。处理器902执行存储器903所存放的应用程序,实现上述功能,从而实现如图2、图3、图4、图5、图6所示的确定背景流量传输策略的方法。
在另一个实施例中,图9所示的通信装置可用于执行上述图2、图3、图4所示的实施例中的数据分析网元的操作,还可用于执行上述图5、图6所示的实施例中的NWDAF的操作。例如:
收发器901用于实现与数据分析网元(例如NWDAF)相连的其他设备进行通信交互,即用于接收和发送数据;
处理器902用于控制收发器901从第一策略控制网元接收第二信息,第二信息用于请求第一终端设备的背景流量传输数据分析结果,第二信息由第一策略控制网元从请求设备接收的第一信息确定,第一信息用于请求第一终端设备的背景流量传输策略;
控制收发器901向第一策略控制网元发送第一终端设备的背景流量传输数据分析结果,第一终端设备的背景流量传输数据分析结果由数据分析网元基于第二终端设备的目标背景流量传输策略所确定,第二终端设备与第一终端设备不同,第二终端设备的目标背景流量传输策略用于第二终端设备进行背景流量传输。
因此,基于上述确定背景流量传输策略的通信装置,基于其他终端设备(即第二终端设备)的目标背景流量传输策略确定出第一终端设备的背景流量传输数据分析结果,进而可以使第一策略控制网元确定出第一终端设备背景流量传输策略,这样可以使第一策略控制网元确定的第一终端设备的背景流量传输策略参考了其他终端设备,从而可以使第一策略控制网元确定的第一终端设备的背景流量传输策略与其他终端设备之间的背景流量传输策略不产生冲突,从而可以解决背景流量传输失败的问题。
在一种可选的实施方式中,第一终端设备的背景流量传输数据分析结果还可以由数据分析网元基于第二终端设备的目标背景流量传输策略和第二信息,以及功能网元的负载信息和/或功能网元的容量信息所确定。
在一种可选的实施方式中,处理器902还用于控制收发器901获取第二终端设备的目标背景流量传输策略。
在一种可选的实施方式中,处理器902在控制收发器901获取第二终端设备的目标背景流量传输策略时,具体用于:控制收发器901从第一设备接收第二终端设备的目标背景流量传输策略,其中第一设备为以下任意一项或多项:第二终端设备、第一策略控制网元、第二策略控制网元、第二业务网元、第二数据库网元,其中,第一策略控制网元、第二策略控制网元、第二业务网元、第二数据库网元服务于第二终端设备。
在一种可选的实施方式中,处理器902,还用于控制收发器901获取功能网元的负载 信息;或者,还用于控制收发器901获取功能网元的容量信息;或者还用于控制收发器901获取功能网元的负载信息和功能网元的容量信息。
在一种可选的实施方式中,处理器902,在控制收发器901获取功能网元的负载信息时具体用于:从功能网元或者运行管理维护网元接收功能网元的负载信息;或者处理器902,在控制收发器901获取功能网元的容量信息时具体用于:从功能网元或者运行管理维护网元接收功能网元的容量信息;或者处理器902,在控制收发器901获取功能网元的负载信息和功能网元的容量信息时具体可以用于:从功能网元或者运行管理维护网元接收功能网元的负载信息和功能网元的容量信息。
在一种可选的实施方式中,功能网元包括服务于第一终端设备的第一策略控制网元、会话管理功能网元、无线接入网网元、接入与移动性管理功能网元、用户面功能网元中的至少一个。
在一种可选的实施方式中,处理器902还用于控制收发器901接收第一终端设备的目标背景流量传输策略,其中第一终端设备根据第一终端设备的目标背景流量传输策略进行背景流量传输。
在一种可选的实施方式中,处理器902在控制收发器901接收第一终端设备的目标背景流量传输策略时,具体用于:控制收发器901从第二设备接收第一终端设备的目标背景流量传输策略,其中,第二设备为以下任意一项或多项:第一终端设备、第一策略控制网元、第一业务网元、第一数据库网元,其中,第一策略控制网元、第一业务网元、第一数据库网元服务于第一终端设备。
在一种可选的实施方式中,处理器902在控制收发器901接收第一终端设备的目标背景流量传输策略时,还用于控制收发器901接收请求设备的标识,或者还用于控制收发器901接收第一策略控制网元的标识,或者还用于控制收发器901接收请求设备的标识和第一策略控制网元的标识。
在一种可选的实施方式中,背景流量传输数据分析结果包括:背景流量的传输时间窗的第一数据值;背景流量传输数据分析结果还包括:背景流量的传输带宽的第一数据值、第一终端设备的位置信息、第一终端设备的标识中的至少一项。
在一种可选的实施方式中,背景流量传输策略包括:背景流量的传输时间窗的第二数据值;背景流量传输策略还包括:背景流量的传输带宽的第二数据值、第一终端设备的位置信息、第一终端设备的标识中的至少一项。
在一种可选的实施方式中,第二信息中包括第一终端设备的:背景流量的大小;第二信息中还包括第一策略控制网元的标识、请求设备标识、第一终端设备的背景流量的传输时间窗的第三数据值、第一终端设备的位置信息、第一终端设备的标识中的至少一项。
在一种可选的实施方式中,第一信息中包括第一终端设备的:背景流量的大小;第一信息中还包括请求设备标识、第一终端设备的背景流量的传输时间窗的第三数据值、第一终端设备的位置信息、第一终端设备的标识中的至少一项。
在一种可选的实施方式中,存储器903,与处理器902耦合,用于存放程序等。具体地,程序可以包括程序代码,该程序代码包括计算机操作指令。存储器903可能包括RAM,也可能还包括非易失性存储器(non-volatile memory),例如至少一个磁盘存储器。处理器902执行存储器903所存放的应用程序,实现上述功能,从而实现如图2、图3、图4、图5、图6所示的确定背景流量传输策略的方法。
在另一个实施例中,图9所示的通信装置可用于执行上述图3所示的实施例中的第一终端设备的操作,还可用于执行上述图5所示的实施例中的UE的操作。例如:
收发器901用于实现与第一终端设备(例如UE)相连的其他设备进行通信交互,即用于接收和发送数据;
处理器902用于控制收发器901向第一策略控制网元发送第一信息,第一信息用于请求第一终端设备的背景流量传输策略;
控制收发器901从第一策略控制网元接收第一终端设备的背景流量传输策略,其中第一终端设备的背景流量传输策略是第一策略控制网元根据第三信息确定的,第三信息包括来自数据分析网元的第一终端设备的背景流量传输数据分析结果。
因此,基于上述确定背景流量传输策略的通信装置,第一终端设备的背景流量传输策略是第一策略控制网元根据第三信息确定的,第三信息包括来自数据分析网元的第一终端设备的背景流量传输数据分析结果,这样第一策略控制网元确定的第一终端设备的背景流量传输策略参考了其他终端设备,从而可以使第一终端设备的背景流量传输策略与其他终端设备之间的背景流量传输策略不产生冲突,从而可以解决背景流量传输失败的问题。
在一种可选的实施方式中,第三信息还包括:第一终端设备的背景流量传输查询结果和/或第一终端设备的本地背景流量传输策略。
在一种可选的实施方式中,当第一终端设备的背景流量传输策略为一条时,处理器902还用于确定第一终端设备的背景流量传输策略为第一终端设备的目标背景流量传输策略;控制收发器901向数据分析网元发送第一终端设备的目标背景流量传输策略。
在一种可选的实施方式中,当第一终端设备的背景流量传输策略有多条时,处理器902还用于根据第一终端设备的背景流量传输策略选择第一终端设备的目标背景流量传输策略;控制收发器901向第一策略控制网元发送第一终端设备的目标背景流量传输策略。
在一种可选的实施方式中,处理器902还用于控制收发器向数据分析网元发送第一终端设备的目标背景流量传输策略。
在一种可选的实施方式中,背景流量传输数据分析结果包括:背景流量的传输时间窗的第一数据值;背景流量传输数据分析结果还包括:背景流量的传输带宽的第一数据值、第一终端设备的位置信息、第一终端设备的标识中的至少一项。
在一种可选的实施方式中,背景流量传输策略包括:背景流量的传输时间窗的第二数据值;背景流量传输策略还包括:背景流量的传输带宽的第二数据值、第一终端设备的位置信息、第一终端设备的标识中的至少一项。
在一种可选的实施方式中,第一信息中包括第一终端设备的:背景流量的大小;第一信息中还包括第一终端设备的:背景流量的传输时间窗的第三数据值、位置信息、标识中的至少一项。
在一种可选的实施方式中,背景流量传输查询结果包括:背景流量的传输时间窗的第四数据值;背景流量传输查询结果还包括:背景流量的传输带宽的第四数据值、第一终端设备的位置信息、第一终端设备的标识中的至少一项。
在一种可选的实施方式中,本地背景流量传输策略包括:背景流量的传输时间窗的第五数据值;本地背景流量传输结果还包括:背景流量的传输带宽的第五数据值、第一终端设备的位置信息、第一终端设备的标识中的至少一项。
在一种可选的实施方式中,在处理器902控制收发器901向第一策略控制网元发送第 一信息之前,处理器902还用于控制收发器901从第一业务网元获取第一终端设备的:背景流量的大小;控制收发器901从第一业务网元还获取第一终端设备的:背景流量的传输时间窗的第三数据值、位置信息、标识中的至少一项。
在一种可选的实施方式中,处理器902在控制收发器901接收第一终端设备的背景流量传输策略时,还用于从第一策略控制网元接收标识信息,标识信息用于标识第一终端设备的目标背景流量传输策略。
在一种可选的实施方式中,处理器902在控制收发器901从第一策略控制网元接收第一终端设备的背景流量传输策略之后,还用于向第一策略控制网元发送标识信息。
在一种可选的实施方式中,存储器903,与处理器902耦合,用于存放程序等。具体地,程序可以包括程序代码,该程序代码包括计算机操作指令。存储器903可能包括RAM,也可能还包括非易失性存储器(non-volatile memory),例如至少一个磁盘存储器。处理器902执行存储器903所存放的应用程序,实现上述功能,从而实现如图3、图5所示的确定背景流量传输策略的方法。
在另一个实施例中,图9所示的通信装置可用于执行上述图4所示的实施例中的第一业务网元的操作,还可用于执行上述图6所示的实施例中的AF的操作。例如:
收发器901用于实现与第一业务网元(例如AF)相连的其他设备进行通信交互,即用于接收和发送数据;
处理器902用于控制收发器901向第一策略控制网元发送第一信息,第一信息用于请求第一终端设备的背景流量传输策略;控制收发器901从第一策略控制网元接收第一终端设备的背景流量传输策略,其中第一终端设备的背景流量传输策略是第一策略控制网元根据第三信息确定的,第三信息包括来自数据分析网元的第一终端设备的背景流量传输数据分析结果。
因此,基于上述确定背景流量传输策略的通信装置,第一终端设备的背景流量传输策略是第一策略控制网元根据第三信息确定的,第三信息包括来自数据分析网元的第一终端设备的背景流量传输数据分析结果,这样第一策略控制网元确定的第一终端设备的背景流量传输策略参考了其他终端设备,从而可以使第一终端设备的背景流量传输策略与其他终端设备之间的背景流量传输策略不产生冲突,从而可以解决背景流量传输失败的问题。
在一种可选的实施方式中,第三信息还包括:第一终端设备的背景流量传输查询结果和/或第一终端设备的本地背景流量传输策略。
在一种可选的实施方式中,当第一终端设备的背景流量传输策略为一条时,处理器902还用于确定第一终端设备的背景流量传输策略为第一终端设备的目标背景流量传输策略;控制收发器向数据分析网元发送第一终端设备的目标背景流量传输策略。
在一种可选的实施方式中,当第一终端设备的背景流量传输策略有多条时,处理器902还用于根据第一终端设备的背景流量传输策略选择第一终端设备的目标背景流量传输策略;控制收发器901向第一策略控制网元发送第一终端设备的目标背景流量传输策略。
在一种可选的实施方式中,处理器902还用于控制收发器901向数据分析网元发送第一终端设备的目标背景流量传输策略。
在一种可选的实施方式中,背景流量传输数据分析结果包括:背景流量的传输时间窗的第一数据值;背景流量传输数据分析结果还包括:背景流量的传输带宽的第一数据值、 第一终端设备的位置信息、第一终端设备的标识中的至少一项。
在一种可选的实施方式中,背景流量传输策略包括:背景流量的传输时间窗的第二数据值;背景流量传输策略还包括:背景流量的传输带宽的第二数据值、第一终端设备的位置信息、第一终端设备的标识中的至少一项。
在一种可选的实施方式中,第一信息中包括第一终端设备的:背景流量的大小;第一信息中还包括第一业务网元的标识、第一终端设备的背景流量的传输时间窗的第三数据值、第一终端设备的位置信息、第一终端设备的标识中的至少一项。
在一种可选的实施方式中,背景流量传输查询结果包括:背景流量的传输时间窗的第四数据值;背景流量传输查询结果还包括:背景流量的传输带宽的第四数据值、第一终端设备的位置信息、第一终端设备的标识中的至少一项。
在一种可选的实施方式中,本地背景流量传输策略包括:背景流量的传输时间窗的第五数据值;本地背景流量传输结果还包括:背景流量的传输带宽的第五数据值、第一终端设备的位置信息、第一终端设备的标识中的至少一项。
在一种可选的实施方式中,在处理器902控制收发器901向第一策略控制网元发送第一信息之前,处理器902还用于控制收发器901从第一终端设备获取第一终端设备的:背景流量的大小;控制收发器901从第一终端设备还获取第一业务网元的标识、第一终端设备的背景流量的传输时间窗的第三数据值、第一终端设备的位置信息、第一终端设备的标识中的至少一项。
在一种可选的实施方式中,处理器902在控制收发器901从第一策略控制网元接收第一终端设备的背景流量传输策略时,还用于从第一策略控制网元接收标识信息,标识信息用于标识第一终端设备的目标背景流量传输策略。
在一种可选的实施方式中,处理器902还用于在控制收发器901从第一策略控制网元接收第一终端设备的背景流量传输策略之后,向第一策略控制网元发送标识信息。
在一种可选的实施方式中,存储器903,与处理器902耦合,用于存放程序等。具体地,程序可以包括程序代码,该程序代码包括计算机操作指令。存储器903可能包括RAM,也可能还包括非易失性存储器(non-volatile memory),例如至少一个磁盘存储器。处理器902执行存储器903所存放的应用程序,实现上述功能,从而实现如图4、图6所示的确定背景流量传输策略的方法。
综上,通过本申请实施例提供一种确定背景流量传输策略的方法及装置,第一策略控制网元从请求设备接收到请求第一终端设备的背景流量传输策略的第一信息之后,向数据分析网元请求第一终端设备的背景流量传输数据分析结果,并在从数据分析网元接收第一终端设备的数据分析结果之后,向请求设备发送第一终端设备的背景流量传输策略;其中第一终端设备的数据分析结果为数据分析网元基于第二终端设备的目标背景流量传输策略确定的,第二终端设备与第一终端设备不同,第二终端设备的目标背景流量传输策略用于第二终端设备进行背景流量传输;第一终端设备的背景流量传输策略由第一策略控制网元根据第三信息确定,第三信息包括第一终端设备的背景流量传输数据分析结果。在上述方法中,数据分析网元可以基于其他所有终端设备(即第二终端设备)的目标背景流量传输策略确定出第一终端设备的背景流量传输数据分析结果,进而可以使第一策略控制网元确定出第一终端设备背景流量传输策略,这样第一策略控制网元确定的第一终端设备的背 景流量传输策略参考了其他终端设备,从而可以使第一策略控制网元确定的第一终端设备的背景流量传输策略与其他终端设备之间的背景流量传输策略不产生冲突,从而可以解决背景流量传输失败的问题。
本申请实施例还提供了一种确定背景流量传输策略的方法,该方法同样适用于如图1所示的通信系统。参阅图10所示,该方法的具体流程可以包括:
步骤1001、第一策略控制网元获取至少一个第四信息,第四信息中包含至少一个第一终端设备的标识、第一时间、第一位置以及第一网元状态。
可选的,第一终端设备的标识可以是SUPI、PEI、GPSI、IP五元组、IMSI、IMEI和MSISDN中的至少一项。
其中,第一时间为将来的时刻,第一位置为预测的在将来的第一时间至少一个终端设备驻留的位置,即预测的轨迹信息,其中可选的,第一位置可以是至少一个第一终端设备在第一时间所在的网络区域(追踪区域列表(Tracking Area List,TA List)或者路由区域列表(Routing Area List,RA List))、小区(Cell ID)、无线接入网(RAN ID)、全球卫星定位系统(Global Position System,GPS)等等。
具体的,至少一个第一终端设备在第一时间驻留在第一位置,且具有第一网元状态。也就是说至少一个第一终端设备在第一时间均驻留在第一位置上,且均具有第一网元状态。
在一种可选的实施方式中,第一网元状态可以包括以下一项或多项:第一负载、第一容量和第一可用带宽;其中,第一负载是第一位置上对应的第一网元的负载,第一网元服务于第一终端设备;第一容量是第一位置上对应的第一网元的容量;第一可用带宽是第一位置上对应的第一网元的带宽。其中,第一终端在第一时间驻留在第一位置上。具体的,第一负载、第一容量和第一可用带宽都可以用于指示第一网元的空闲或者繁忙状态,比如第一负载为80%时,表示第一网元还有20%的负载可以用于传输至少一个第一终端设备的背景流量,再比如第一容量或者第一可用带宽为1GB(Giga Byte),表示第一网元还有1GB的容量或者带宽可以用于传输至少一个第一终端设备的背景流量。
可选的,第一网元可以是服务于第一终端设备的用户面网元(例如,RAN或者UPF等)或者控制面网元(例如,AMF或者SMF等)等。可选的,如果第一终端设备属于海量物联网(massive internet of thins,mIoT)类终端,AMF网元或者SMF网元也可以作为用户面网元,用于传输背景流量。
在一种可选的实施方式中,第一策略控制网元在获取至少一个第四信息之前,第一策略控制网元从请求设备接收第五信息,第五信息用于请求至少一个第二终端设备的背景流量传输策略。其中,第五信息可以包括请求设备的标识以及以下一项或多项:第二终端设备的个数、每个第二终端设备需要传输的背景流量的大小、时间窗。可选的,第五信息中还可以包括至少一个第二终端设备所在的网络区域(追踪区域列表(Tracking Area List,TA List)或者路由区域列表(Routing Area List,RA List))。
在一种可选的实施方式中,请求设备为至少一个第二终端设备提供服务,具体的,请求设备可以是当前服务于至少一个第二终端设备的业务网元,即可以是图1中的AF网元,包括运营商控制的AF网元(比如,代理呼叫会话控制功能网元(P-CSCF,proxy-call session control function)),也可以是第三方AF网元,比如第三方业务服务器。
其中,至少一个第一终端设备为至少一个第二终端设备中的部分或全部。具体的,至少一个第一终端设备是至少一个第二终端设备的子集。在一个可选的实施方式中,当有多个第二终端设备时,可以有多个第四信息,一个第四信息对应一组第一终端设备,一组第一终端设备为至少一个,也即多个第二终端设备可以包括多组第一终端设备。其中,一组第一终端设备在第一时间具有相同的第一位置,具有相同的第一网元状态。
在一种可选的实施方式中,当请求设备是业务网元时,第一策略控制网元从请求设备接收第五信息,具体可以为:业务网元可以通过网络开放功能网元向第一策略控制网元发送第五信息。上述过程具体可以为:业务网元向网络开放功能网元发送第五信息,可选的,业务网元可以通过调用Nnef_BDTPNegotiation_Create request服务向网络开放功能网元发送第五信息;然后网络开放功能网元将第五信息转发给第一策略控制网元,可选的,网络开放功能网元可以通过调用Npcf_BDTPolicyControl_Create request服务向第一策略控制网元发送第五信息。
在一种可选的实施方式中,第一策略控制网元获取至少一个第四信息,可以有以下两种方式:
f1:第一策略控制网元从数据分析网元获取至少一个第四信息。
f2:第一策略控制网元获取本地保存的至少一个第四信息。
可选的,在上述f1中,可以是第一策略控制网元在接收到请求设备的第五信息之后,向数据分析网元实施获取的。可选的,第一策略控制网元从数据分析网元获取至少一个第四信息,具体方法可以为:第一策略控制网元向数据分析网元发送第六信息,第六信息用于请求至少一个第四信息,第六信息中包括至少一个第二终端设备的标识;第一策略控制网元从数据分析网元接收至少一个第四信息。
在一种可选的实施方式中,第六信息中还包括以下一项或多项:请求设备的标识、时间窗、网络区域。其中,时间窗用于指示请求的至少一个第二终端设备对应的时间窗,网络区域用于指示请求的至少一个第二终端设备对应的网络区域。
可选的,在上述f2中,可以是第一策略控制网元在接收到请求设备的第五信息之前,已经提前将至少一个第四信息保存在本地的。其中,可选的,第一策略控制网元中可以保存着与至少一个第三终端设备对应的至少一个第七信息,第七信息中包含至少一个第四终端设备的标识、第一时间、第一位置以及第一网元状态。其中至少一个第四终端设备为至少一个第三终端设备的部分或全部,至少一个第三终端设备包含至少一个第二终端设备。此时,第一策略控制网元在接收到请求设备的第五信息之后,在保存的至少一个第七信息中确定至少一个第四信息。具体的,第一策略控制网元在保存的至少一个第七信息中确定至少一个第四信息,具体方法可以为:第一策略控制网元在至少一个第七信息中选择与第二终端设备的标识相同的第四终端设备对应的信息,从而筛选出至少一个第四信息。
其中,可选的,第一策略控制网元在本地保存的至少一个第七信息的来源,也可以是第一策略控制网元从数据分析网元获取的。其中,可选的,在此场景中,第一策略控制网元从数据分析网元获取需要保存在本地的至少一个第七信息时,具体方法可以为:第一策略控制网元向数据分析网元发送第八信息,第八信息用于请求至少一个第七信息,第八信息中包括至少一个第三终端设备的标识;第一策略控制网元从数据分析网元接收至少一个第七信息。在一种可选的实施方式中,第八信息中还包括以下一项或多项:请求设备的标识、时间窗、网络区域。其中,时间窗用于指示请求的至少一个第七信息对应的时间窗, 网络区域用于指示请求的至少一个第七信息对应的网络区域。
在一种可选的实施方式中,还执行以下操作:第一策略控制网元获取至少一个第二终端设备的标识。其中可选的,该操作可以是第一策略控制网元在获取至少一个第四信息之前执行的,具体的,可以是在第一策略控制网元接收到第五信息之后,获取至少一个第四信息之前执行的。
其中,可选的,第一策略控制网元可以通过以下两种方法获取至少一个第二终端设备的标识:
方法g1:第一策略控制网元从请求设备接收至少一个第二终端设备的标识。
方法g2:第一策略控制网元从请求设备接收请求设备的标识,并根据请求设备的标识,从第一策略控制网元或者数据库网元查询得到至少一个第二终端设备的标识。
在上述方法g1中,第一策略控制网元可以通过从请求设备接收第五信息,来接收至少一个第二终端设备的标识,也就是说此时,第五信息中包含至少一个第二终端设备的标识。
在上述方法g2中,第一策略控制网元从请求设备接收请求设备的标识来自第一策略控制网元从请求设备接收的第五信息中,此时第五信息中未包含至少一个第二终端设备的标识。可选的,查询时,可以在查询请求中包括背景流量传输指示信息,用于指示要查询的是需要传输背景流量的至少一个第二终端设备的标识。
步骤1002、第一策略控制网元根据第九信息确定至少一个第二终端设备的背景流量传输策略;其中,第九信息包括至少一个第四信息。
在一种可选的实施方式中,第九信息中还可以包括第五信息,以及第九信息中还可以包括至少一个第二终端设备的背景流量传输查询结果和/或至少一个第二终端设备的本地背景流量传输查询结果。
在一种可选的实施方式中,当第九信息还包括至少一个第二终端设备的背景流量传输查询结果时,第一策略控制网元从数据库网元获取至少一个第二终端设备的背景流量传输查询结果;或者,当第九信息还包括至少一个第二终端设备的本地背景流量传输策略时,第一策略控制网元从第一策略控制网元获取至少一个第二终端设备的本地背景流量传输策略;或者,当第九信息还包括至少一个第二终端设备的背景流量传输查询结果和至少一个第二终端设备的本地背景流量传输策略时,第一策略控制网元从数据库网元获取至少一个第二终端设备的背景流量传输查询结果,以及,第一策略控制网元从第一策略控制网元获取至少一个第二终端设备的本地背景流量传输策略。
在一种可选的实施方式中,第一策略控制网元根据第九信息确定至少一个第二终端设备的背景流量传输策略,具体方法可以为:
首先,第一策略控制网元可以根据至少一个第二终端设备的标识确定在第九信息中至少一个第四信息中的分布,即,假设步骤1001中,第一策略网元从数据分析网元得到3个第四信息,即数据分析网元将至少一个第二终端设备划分到了三个类别中,每个类别中对应至少一个第二终端设备的子集1、子集2或者子集3;
然后,第一策略控制网元根据每个第四信息中第一时间、第一位置以及第一网元状态,确定至少一个第二终端设备的子集1、者子集2或者子集3在第一时间将位于第一位置,并且在第一位置上具有第一网络状态;
最后,第一策略控制网元根据至少一个第二终端设备的子集1、子集2或者子集3在 第一时间将位于第一位置,并且在第一位置上具有第一网络状态,以及每个第二终端设备所要传输背景流量的大小确定每个第二终端设备的背景流量传输策略。比如,第二终端设备的子集1中包括10个第二终端设备,每个第二终端需要传输60MB(MegaBit)的背景流量,都在夜间00:00-01:00位于同一个小区,且小区对应的基站上的可用容量为60MB或者60MB以上,则为第二终端设备的子集1中包括的10个第二终端设备制定的背景流量传输策略可以如下:
1)时间窗:00:00-01:00;
2)带宽:1MB/s。
需要注意的是,以上只是第一策略控制网元得到至少一个第二终端设备的背景流量传输策略的示例,具体实施过程中,第一策略控制网元需要参考第九信息中的至少一个第四信息、第五信息,以及至少一个第二终端设备的背景流量传输查询结果和/或至少一个第二终端设备的本地背景流量传输策略背景流量传输查询结果。
在一种可选的实施方式中,第一策略控制网元根据第九信息确定至少一个第二终端设备的背景流量传输策略之后,第一策略控制网元向请求设备发送至少一个第二终端设备的背景流量传输策略。
在一种可选的实施方式中,至少一个第二终端设备中的任一个第二终端设备的景流量传输策略可以为一条或者多条。具体的,第二终端设备的背景流量传输策略可以包括:背景流量的传输时间窗的第七数据值;第二终端设备的背景流量传输策略还包括以下一项或多项:背景流量的传输带宽的第七数据值、第二终端设备的位置信息和第二终端设备的标识。
可选的,当第二终端设备的背景流量传输策略有一条时,第一策略控制网元还可以执行以下操作:
第一策略控制网元确定第二终端设备的背景流量传输策略为第二终端设备的目标背景流量传输策略;
第一策略控制网元向数据分析网元发送第二终端设备的目标背景流量传输策略。
可选的,当第二终端设备的背景流量传输策略有多条时,第一策略控制网元还可以执行以下操作:
第一策略控制网元从请求设备接收第二终端设备的目标背景流量传输策略,第二终端设备的目标背景流量传输策略由请求设备根据第二终端设备的背景流量传输策略选择的;
第一策略控制网元向数据分析网元发送第二终端设备的目标背景流量传输策略。
通过上述第一策略控制网元向数据分析网元发送第二终端设备的目标背景流量传输策略,数据分析网元能够保存第二终端设备的目标背景流量传输策略,这样,在下一次请求设备在请求其他新的终端设备的背景流量策略时,数据分析网元在为这些新的终端设备确定移动轨迹(包括时间和位置)以及移动轨迹上对应网元的网元状态时,可以参考已经保存的第二终端设备的目标背景流量传输策略,使得网元状态结果更加准确。
在一种可选的实施方式中,当请求设备是业务网元时,第一策略控制网元向业务网元发送至少一个第二终端设备的背景流量传输策略,具体过程可以是:第一策略控制网元通过网络开放功能网元向业务网元发送至少一个第二终端设备的背景流量传输策略。具体的,第一策略控制网元将至少一个第二终端设备的背景流量传输策略发送给网络开放功能网元,可选的,第一策略控制网元可以将通过调用Npcf_BDT Policy Control_Create response 服务向网络开放功能网元发送至少一个第二终端设备的背景流量传输策略;然后网络开放功能网元将至少一个第二终端设备的背景流量传输策略发送给业务网元,可选的,网络开放功能网元可以调用Nnef_BDT PNegotiation_Create response服务向业务网元发送至少一个第二终端设备的背景流量传输策略。
采用本申请实施例提供的确定背景流量传输策略的方法,第一策略控制网元获取至少一个第四信息,第四信息中包含至少一个第一终端设备的标识、第一时间、第一位置以及第一网元状态;第一策略控制网元根据第九信息确定至少一个第二终端设备的背景流量传输策略;其中,第九信息包括至少一个第四信息;至少一个第一终端设备为至少一个第二终端设备中的部分或全部;至少一个第一终端设备在第一时间驻留在所述第一位置,且具有所述第一网元状态。在上述方法中,第一策略控制网元在制定至少一个第二终端设备的背景流量传输策略时,可以考虑每个第二终端设备的移动轨迹(包括第一时间和第一位置)以及第一位置上的第一网元状态,这样会使得第一策略控制网元制定的至少一个第二终端设备的背景流量传输策略更加准确。
需要注意的是,至少一个第一终端设备的第一位置和第一网元状态都是跟第一时间紧密相关的,即至少一个第一终端设备在第一时间移动到第一位置时,第一位置上的网元(第一网元)具有第一网元状态,当至少一个第一终端设备在其他时间移动到另一个位置时,对应的是另一个位置上的网元的网元状态。
本申请实施例还提供了一种确定背景流量传输策略的方法,该方法同样适用于如图1所示的通信系统。参阅图11所示,该方法的具体流程可以包括:
步骤1101:数据分析网元确定至少一个第四信息,第四信息中包含至少一个第一终端设备的标识、第一时间、第一位置以及第一网元状态;至少一个第一终端设备为至少一个第二终端设备中的部分或全部;至少一个第一终端设备在第一时间驻留在第一位置,且具有第一网元状态。
其中,至少一个第二终端设备为待传输背景流量,需要获得背景流量传输策略的终端设备。
可选的,第一网元状态包括以下一项或多项:第一负载、第一容量和第一可用带宽;其中,第一负载是第一位置上对应的第一网元的负载;第一网元服务于第一终端设备;第一容量是第一位置上对应的第一网元的容量;第一可用带宽是第一位置上对应的第一网元的带宽。其中,第一终端设备在第一时间驻留在第一位置。
其中具体的,第一终端设备、第二终端设备、第一网元以及第四信息中包含的内容的详细介绍可以参见图10所述的实施例中涉及的相关内容,此处不再赘述。
在一种可选的实施方式中,数据分析网元在确定至少一个第四信息之前,数据分析网元从第一策略控制网元接收第六信息,第六信息用于请求至少一个第四信息,第六信息中包括至少一个第二终端设备的标识。
在一种可选的实施方式中,数据分析网元确定至少一个第四信息,具体方法可以为:
数据分析网元获取第三网元上的至少一个第二终端设备的至少一个第十信息,第十信息包括第二终端设备的标识、第二时间、第二位置以及第二网元状态;第二终端设备在第二时间驻留在第二位置,且具有第二网元状态;第三网元服务于至少一个第二终端设备;
数据分析网元根据第二终端设备的至少一个第十信息确定至少一个第四信息。
具体的,上述第三网元可以是接入设备、5G中的功能网元和OAM中的一个或多个。第二终端设备的至少一个第十信息是指的第二设备之前的至少一个历史信息,每个历史信息中包含第十信息中包含的信息。
可选的,数据分析网元可以直接从第三网元获取第三网元上的至少一个第二终端设备的至少一个第十信息;还可以从其他设备上获取第三网元上的至少一个第二终端设备的至少一个第十信息。例如,从其他设备上获取时,当第三网元是为接入网设备、5G中的功能网元中的一个或多个时,数据分析网元可以从OAM网元获取第三网元上的至少一个第二终端设备的至少一个第十信息。
具体的,上述数据分析网元确定至少一个第四信息的过程可以解释为:数据分析网元先根据至少一个第二终端设备的标识从第三网元收集每个第二终端设备的历史行动轨迹,以及在不同时间不同位置对应的网元的历史网元状态;数据分析网元基于收集的数据,预测至少一个终端设备中每个终端设备的预测运行轨迹,也即每个第二终端设备在未来时间移动到的未来位置;之后数据分析网元根据每个第二终端设备的预测运行轨迹,对至少一个第二终端设备分组,每组中的第二终端设备在未来的同一个时间驻留在相同的位置,例如,一组第二终端设备为至少一个第一终端设备,至少一个第一终端设备均在第一时间驻留在第一位置;最后,数据分析网元根据分组后的每组第二终端设备驻留的未来的位置分别对应的网元的历史网元状态,预测每组第二终端设备驻留的位置对应的网元在未来时间的网元状态,例如,一组第二终端设备的在第一时间驻留在第一位置上具有第一网元状态。这样,数据分析网元就得到了至少一组第二终端设备的特定时间在特定位置具有特定网元状态的相关信息,也即数据分析网元根据每个第二终端设备的至少一个第十信息确定了至少一个第四信息。
需要说明的是,在实际实施过程中,数据分析网元可以使用不限于上述实施方式中的分析方法来确定至少一个第四信息。示例性的,数据分析网元收集到每个第二终端设备的历史行动轨迹以及在不同时间不同位置对应的网元的历史网元状态之后,可以根据这些信息对至少一个第二终端设备进行聚类或者分类,相同类别的第二终端设备对应相同的时间、位置和网元状态信息。
在一种可选的实施方式中,第二网元状态包括以下一项或多项:第二负载、第二容量和第二可用带宽;其中,第二负载是第二位置上对应的第二网元的负载;第二网元服务于第二终端设备;第二容量是第二位置上对应的第二网元的容量;第二带宽是第二位置上对应的第二网元的带宽。其中,第二终端设备在第二时间驻留在第二位置。
步骤1102:数据分析网元向第一策略控制网元发送至少一个第四信息。
采用本申请实施例提供的确定背景流量传输策略的方法,数据分析网元确定至少一个第四信息,第四信息中包含至少一个第一终端设备的标识、第一时间、第一位置以及第一网元状态;至少一个第一终端设备为至少一个第二终端设备中的部分或全部;至少一个第一终端设备在第一时间驻留在第一位置,且具有所述第一网元状态;数据分析网元向第一策略控制网元发送至少一个第四信息。通过上述方法,数据分析网元可以通过将待传输背景流量的终端设备的预测的未来特定时间、位置对应的网元状态发送给第一策略控制网元,可以使第一策略控制网元更准确地确定第二终端设备的背景流量传输策略,从而可以提高背景流量传输的成功率。
基于以上实施例,本申请实施还提供了一种确定背景流量传输策略的方法的示例,如图12所示,在该示例中,业务网元请求至少一个第二终端设备的过程中,由数据分析网元提供预测信息(即至少一个第四信息),具体以业务网元为AF、终端设备为UE、第一策略控制网元为PCF、数据分析网元为NWDAF为例进行说明。该示例的具体流程可以包括:
步骤1201、AF向NEF发送第五信息,第五信息用于请求至少一个第二UE的背景流量传输策略。
其中,NEF是一种网络开放功能网元的举例,这里NEF还可以用其他网络功能开放网元替换,本申请对此不作限定。
具体的,AF可以通过调用Nnef_BDTPNegotiation_Create request或者Nnef_Trigger_Delivery request服务向NEF发送第五信息。
步骤1202、NEF向PCF发送第五信息。
具体的,NEF可以通过调用Npcf_BDTPolicyControl_Create request或者Npcf_Policy Authorization_Create Request服务向PCF发送第五信息。
步骤1203、PCF向NWDAF发送第六信息,第六信息用于请求至少一个第四信息,第六信息中包括至少一个第二UE的标识。
具体的,PCF发起到NWDAF的Nnwdaf_AnalyticsInfo_Request服务操作向NWDAF发送第六信息。
步骤1204、NWDAF确定至少一个第四信息,第四信息中包含至少一个第一UE的标识、第一时间、第一位置以及第一网元状态;至少一个第一UE为至少一个第二UE中的部分或全部;至少一个第一UE在第一时间驻留在第一位置,且具有第一网元状态。
步骤1205、NWDAF向PCF发送至少一个第四信息。
具体的,NWDAF发起到PCF的Nnwdaf_AnalyticsInfo_Request response服务操作返回至少一个第四信息。
步骤1206、PCF根据第九信息确定至少一个第二UE的背景流量传输策略;其中,第九信息包括至少一个第四信息。
步骤1207、PCF将至少一个第二UE的背景流量传输策略发送给NEF。
具体的,PCF可以将通过调用Npcf_BDT Policy Control_Create response或者Npcf_PolicyAuthorization_Notify服务向NEF发送至少一个第二UE的背景流量传输策略。
步骤1208、NEF将至少一个第二UE的背景流量传输策略发送给AF。
具体的,NEF可以调用Nnef_BDT PNegotiation_Create response或者Nnef_Trigger_Delivery response服务向AF发送至少一个第二UE的背景流量传输策略。
在一种可能的实施方式中,当第二UE的背景流量传输策略为一条时,在步骤1208之后或者之前,PCF可以执行步骤1209、步骤1210,具体如下:
步骤1209、PCF确定第二UE的背景流量传输策略为第二UE的目标背景流量传输策略。
步骤1210、PCF向NWDAF发送第二UE的目标背景流量传输策略。
可选的,PCF还可以向UDR发送第二UE的目标背景流量传输策略。
可选的,当第二UE的背景流量传输策略为一条时,可以省去步骤1209,PCF可以直接将第二UE的背景流量传输策略发送给NWDAF,此处不再详细描述。
在另一种可能的实施方式中,当第二UE的背景流量传输策略为多条时,在步骤1208之后,还可以有如下步骤:
步骤1211、AF根据第二UE的背景流量传输策略选择第二UE的目标背景流量传输策略。
步骤1212、AF向NEF发送第二UE的目标背景流量传输策略。
具体的,AF可以调用Nnef_BDTPNegotiation_Update request或者Nnef_Trigger_Delivery request服务向NEF发送第二UE的目标背景流量传输策略。
步骤1213、NEF向PCF发送第二UE的目标背景流量传输策略。
具体的,NEF可以调用Npcf_BDTPolicyControl_Update request或者Npcf_PolicyAuth orization_Update Request服务向PCF发送第二UE的目标背景流量传输策略。
步骤1214、PCF向NWDAF发送第二UE的目标背景流量传输策略。
可选的,PCF还可以向UDR发送第二UE的目标背景流量传输策略。
具体的,步骤1214和步骤1210为相同的步骤,这里为了方便示出两种可能的实现方式,用两个步骤示出。
需要说明的是,图12所示的实施例中的各个步骤的具体实施细节均可以参见上述图10、图11所示的实施例涉及的相关描述,此处不再详细赘述。
需要说明的是,步骤1207、步骤1208、步骤1210、步骤1214中可以包括一个或多个标识信息,用于标识至少一个第二终端设备的目标背景流量传输策略。
1)当标识信息有一个时,表示至少一个第二终端设备的中每个终端设备的目标背景流量传输策略一样;
2)当标识信息中有多个时,表示存在至少一个第二终端设备中部分终端设备的目标背景流量传输策略不一样的情形,此时,多个标识信息中的每个标识信息用于标识一个目标背景流量传输策略,该目标背景流量传输策略对应一个或多个第二终端设备。
需要说明的是,步骤1214之后,第一策略控制网元向第二终端设备发送第二终端设备的背景流量传输策略,可以但不限于PDU会话修改流程,具体流程参考图2中的实施例2。可选的,第一策略控制网元还可以通过PDU会话建立流程(PDU Session Establishment procedure)、注册流程(Registration Procedure)、服务请求流程(Service Request Procedure)、终端配置更新流程(UE Configuration Update)等其他多种流程向第二终端设备发送第二终端设备的背景流量传输策略。可选的,当使用注册流程或者终端配置更新流程时,第一策略控制网元可以将第二终端设备的背景流量传输策略放置于第二终端设备的终端路由选择策略(UE Route Selection Policy,URSP)中发送给第二终端设备。具体的PDU会话建立流程(PDU Session Establishment procedure)、注册流程(Registration Procedure)、服务请求流程(Service Request Procedure)、终端配置更新流程(UE Configuration Update)等其他多种流程描述,此处不再详述。
上述本申请提供的实施例中,分别从各个网元或者设备之间交互的角度对本申请实施例提供的确定背景流量传输策略的方法的各方案进行了介绍。可以理解的是,各个网元和设备,例如上述第一策略控制网元、数据分析网元、第一业务网元、第一终端设备和第二终端设备为了实现上述功能,其包含了执行各个功能相应的硬件结构和/或软件模块。本领域技术人员应该很容易意识到,结合本申请中所公开的实施例描述的各示例的单元及算法 步骤,本申请能够以硬件或硬件和计算机软件的结合形式来实现。某个功能究竟以硬件还是计算机软件驱动硬件的方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
例如,当上述网元或者设备通过软件模块来实现相应的功能时,用于确定背景流量传输策略的通信装置可以包括获取模块1301和处理模块1302,可选的还可以包括发送模块1303,具体可以参考如图13所示的结构示意图。
在一个实施例中,图13所示通信装置可用于执行上述图10、图11所示的实施例中的第一策略控制网元的操作,以及用于执行上述图12所示的实施例中的PCF的操作。例如:
获取模块1301,用于获取至少一个第四信息,第四信息中包含至少一个第一终端设备的标识、第一时间、第一位置以及第一网元状态;
处理模块1302,用于根据第九信息确定至少一个第二终端设备的背景流量传输策略;其中,第九信息包括至少一个第四信息;至少一个第一终端设备为至少一个第二终端设备中的部分或全部;至少一个第一终端设备在第一时间驻留在第一位置,且具有第一网元状态。
因此,基于上述确定背景流量传输策略的通信装置,在制定至少一个第二终端设备的背景流量传输策略时,可以考虑每个第二终端设备的移动轨迹(包括第一时间和第一位置)以及第一位置上的第一网元状态,这样会使得第一策略控制网元制定的至少一个第二终端设备的背景流量传输策略更加准确。
在一种可选的实施方式中,获取模块1301还用于从请求设备接收至少一个第二终端设备的标识,请求设备为至少一个第二终端设备提供服务。
在一种可选的实施方式中,获取模块1301还用于从请求设备接收请求设备的标识;之后,处理模块1302还用于根据请求设备的标识,从第一策略控制网元或者数据库网元查询得到至少一个第二终端设备的标识。
在一种可选的实施方式中,获取模块1301,在获取至少一个第四信息时,具体用于:从数据分析网元获取至少一个第四信息;或者获取本地保存的至少一个第四信息。
在一种可选的实施方式中,第一网元状态包括以下一项或多项:第一负载、第一容量和第一可用带宽;其中,第一负载是第一位置上对应的第一网元的负载,第一网元服务于第一终端设备;第一容量是第一位置上对应的第一网元的容量;第一可用带宽第一位置上对应的第一网元的带宽。其中,第一终端设备在第一时间驻留在第一位置。
在一种可选的实施方式中,发送模块1303用于在处理模块1302根据第九信息确定至少一个第二终端设备的背景流量传输策略之后,向请求设备发送至少一个第二终端设备的背景流量传输策略,请求设备服务于至少一个第二终端设备。
在一种可选的实施方式中,当第二终端设备的背景流量传输策略有一条时,处理模块1302还用于确定第二终端设备的背景流量传输策略为第二终端设备的目标背景流量传输策略;发送模块1303还用于向数据分析网元发送第二终端设备的目标背景流量传输策略。
在一种可选的实施方式中,当第二终端设备的背景流量传输策略有多条时,获取模块1301还用于从请求设备接收第二终端设备的目标背景流量传输策略,第二终端设备的目标背景流量传输策略由请求设备根据第二终端设备的背景流量传输策略选择的;发送模块1303还用于向数据分析网元发送第二终端设备的目标背景流量传输策略。
在一种可选的实施方式中,第二终端设备的背景流量传输策略可以包括:背景流量的传输时间窗的第七数据值;第二终端设备的背景流量传输策略还包括以下一项或多项:背景流量的传输带宽的第七数据值、第二终端设备的位置信息和第二终端设备的标识。
又例如,当上述网元或者设备通过软件模块来实现相应的功能时,用于确定背景流量传输策略的通信装置还可以包括处理模块1401和发送模块1402,具体可以参考如图14所示的结构示意图。
在一个实施例中,图14所示的通信装置可用于执行上述图10、图11所示的实施例中的数据分析网元的操作,以及可用于执行上述图12所示的实施例中的NWDAF的操作。例如:
处理模块1401,用于确定至少一个第四信息,第四信息中包含至少一个第一终端设备的标识、第一时间、第一位置以及第一网元状态;至少一个第一终端设备为至少一个第二终端设备中的部分或全部;至少一个第一终端设备在第一时间驻留在第一位置,且具有第一网元状态;
发送模块1402,用于向第一策略控制网元发送至少一个第四信息。
因此,基于上述确定背景流量传输策略的通信装置,可以通过将待传输背景流量的终端设备的预测的未来特定时间、位置对应的网元状态发送给第一策略控制网元,可以使第一策略控制网元更准确地确定第二终端设备的背景流量传输策略,从而可以提高背景流量传输的成功率。
在一种可选的实施方式中,处理模块1401,在确定至少一个第四信息时,具体用于:获取第三网元上的至少一个第二终端设备的至少一个第十信息,第十信息包括第二终端设备的标识、第二时间、第二位置以及第二网元状态;第二终端设备在第二时间驻留在第二位置,且具有第二网元状态;根据至少一个第二终端设备的至少一个第十信息确定至少一个第四信息;第三网元服务于至少一个第二终端设备。
在一种可选的实施方式中,第二网元状态包括以下一项或多项:第二负载、第二容量和第二可用带宽;其中,第二负载是第二位置上对应的第二网元的负载;第二网元服务于第二终端设备;第二容量是第二位置上对应的第二网元的容量;第二带宽是第二位置上对应的第二网元的带宽。其中,第二终端设备在第二时间驻留在第二位置。
在一种可选的实施方式中,第一网元状态包括以下一项或多项:第一负载、第一容量和第一可用带宽;其中,第一负载是第一位置上对应的第一网元的负载;第一网元服务于第一终端设备;第一容量是第一位置上对应的第一网元的容量;第一可用带宽是第一位置上对应的第一网元的带宽。其中,第一终端设备在第一时间驻留在第一位置。
在一个实施例中,图9所示的通信装置可用于执行上述图10、图11所示的实施例中的第一策略控制网元的操作,还可用于执行上述图12所示的实施例中的PCF的操作。例如:
收发器901用于实现与第一策略控制网元(例如PCF)相连的其他设备进行通信交互,即用于接收和发送数据;
处理器902用于获取至少一个第四信息,第四信息中包含至少一个第一终端设备的标识、第一时间、第一位置以及第一网元状态;根据第九信息确定至少一个第二终端设备的 背景流量传输策略;其中,第九信息包括至少一个第四信息;至少一个第一终端设备为至少一个第二终端设备中的部分或全部;至少一个第一终端设备在第一时间驻留在第一位置,且具有第一网元状态。
因此,基于上述确定背景流量传输策略的通信装置,在制定至少一个第二终端设备的背景流量传输策略时,可以考虑每个第二终端设备的移动轨迹(包括第一时间和第一位置)以及第一位置上的第一网元状态,以及请求设备上报的每个第二终端设备的背景流量大小、时间窗、网络区域,可选的,考虑包括至少一个第二终端设备的背景流量传输查询结果和/或至少一个第二终端设备的本地背景流量传输查询结果,这样会使得第一策略控制网元制定的至少一个第二终端设备的背景流量传输策略更加准确。
在一种可选的实施方式中,处理器902还用于控制收发器901从请求设备接收至少一个第二终端设备的标识,请求设备为至少一个第二终端设备提供服务。
在一种可选的实施方式中,处理器902还用于控制收发器901从请求设备接收请求设备的标识,并根据请求设备的标识,从第一策略控制网元或者数据库网元查询得到至少一个第二终端设备的标识。
在一种可选的实施方式中,处理器902在获取至少一个第四信息时,具体用于:控制收发器901从数据分析网元获取至少一个第四信息;或者获取本地保存的至少一个第四信息。
在一种可选的实施方式中,第一网元状态包括以下一项或多项:第一负载、第一容量和第一可用带宽;其中,第一负载是第一位置上对应的第一网元的负载,第一网元服务于第一终端设备;第一容量是第一位置上对应的第一网元的容量;第一可用带宽是第一位置上对应的第一网元的带宽。其中,第一终端设备在第一时间驻留在第一位置。
在一种可选的实施方式中,处理器902还用于在根据第九信息确定至少一个第二终端设备的背景流量传输策略之后,控制收发器901向请求设备发送至少一个第二终端设备的背景流量传输策略,请求设备服务于至少一个第二终端设备。
在一种可选的实施方式中,当第二终端设备的背景流量传输策略有一条时,处理器902还用于确定第二终端设备的背景流量传输策略为第二终端设备的目标背景流量传输策略;控制收发器901向数据分析网元发送第二终端设备的目标背景流量传输策略。
在一种可选的实施方式中,当第二终端设备的背景流量传输策略有多条时,处理器902还用于从请求设备接收第二终端设备的目标背景流量传输策略,第二终端设备的目标背景流量传输策略由请求设备根据第二终端设备的背景流量传输策略选择的;控制收发器901向数据分析网元发送第二终端设备的目标背景流量传输策略。
在一种可选的实施方式中,第二终端设备的背景流量传输策略可以包括:背景流量的传输时间窗的第七数据值;第二终端设备的背景流量传输策略还包括以下一项或多项:背景流量的传输带宽的第七数据值、第二终端设备的位置信息和第二终端设备的标识。
在另一个实施例中,图9所示的通信装置可用于执行上述图10、图11所示的实施例中的数据分析网元的操作,还可用于执行上述图12所示的实施例中的NWDAF的操作。例如:
收发器901用于实现与数据分析网元(例如NWDAF)相连的其他设备进行通信交互,即用于接收和发送数据;
处理器902用于确定至少一个第四信息,第四信息中包含至少一个第一终端设备的标识、第一时间、第一位置以及第一网元状态;至少一个第一终端设备为至少一个第二终端设备中的部分或全部;至少一个第一终端设备在第一时间驻留在第一位置,且具有第一网元状态;
控制收发器901向第一策略控制网元发送至少一个第四信息。
因此,基于上述确定背景流量传输策略的通信装置,可以通过将待传输背景流量的终端设备的预测的未来特定时间、位置对应的网元状态发送给第一策略控制网元,可以使第一策略控制网元更准确地确定第二终端设备的背景流量传输策略,从而可以提高背景流量传输的成功率。
在一种可选的实施方式中,处理器902在确定至少一个第四信息时,具体用于:获取第三网元上的至少一个第二终端设备的至少一个第十信息,第十信息包括第二终端设备的标识、第二时间、第二位置以及第二网元状态;第三网元服务于至少一个第二终端设备;第二终端设备在第二时间驻留在第二位置,且具有第二网元状态;根据至少一个第二终端设备的至少一个第十信息确定至少一个第四信息。
在一种可选的实施方式中,第二网元状态包括以下一项或多项:第二负载、第二容量和第二可用带宽;其中,第二负载是第二位置上对应的第二网元的负载;第二网元服务于第二终端设备;第二容量是第二位置上对应的第二网元的容量;第二带宽是第二位置上对应的第二网元的带宽。其中,第二终端设备在第二时间驻留在第二位置。
在一种可选的实施方式中,第一网元状态包括以下一项或多项:第一负载、第一容量和第一可用带宽;其中,第一负载是第一位置上对应的第一网元的负载;第一网元服务于第一终端设备;第一容量是第一位置上对应的第一网元的容量;第一可用带宽是第一位置上对应的第一网元的带宽。其中,第一终端设备在第一时间驻留在第一位置。
综上,通过本申请实施例提供一种确定背景流量传输策略的方法及装置,第一策略控制网元获取至少一个第四信息,第四信息中包含至少一个第一终端设备的标识、第一时间、第一位置以及第一网元状态;第一策略控制网元根据第九信息确定至少一个第二终端设备的背景流量传输策略;其中,第九信息包括至少一个第四信息;至少一个第一终端设备为至少一个第二终端设备中的部分或全部;至少一个第一终端设备在第一时间驻留在所述第一位置,且具有所述第一网元状态。在上述方法中,第一策略控制网元在制定至少一个第二终端设备的背景流量传输策略时,可以考虑每个第二终端设备的移动轨迹(包括第一时间和第一位置)以及第一位置上的第一网元状态,这样会使得第一策略控制网元制定的至少一个第二终端设备的背景流量传输策略更加准确。
本申请还提供了一种确定网络性能信息的方法,该方法同样适用于如图1所示的通信系统。参阅图15所示,该方法的具体流程可以包括:
步骤1501:第一网元向数据分析网元发送第一信息,第一信息用于请求网络性能信息,第一信息中包括以下一项或多项:第一区域的区域信息、请求设备的标识或终端设备群组标识。
步骤1502:数据分析网元根据第一信息确定网络性能信息,网络性能信息中包括第二区域的区域信息和第二信息,第二信息包括以下一项或多项:第二区域中网络的负载信息、 第二区域中业务的业务体验信息或第二区域中的终端设备的个数;其中第二区域为第一区域的子区域。
应理解,上述第二区域的个数可以为一个或者多个。其中,每个第二区域分别对应有一个第二信息。一个或多个第二区域由数据分析网元基于第一网元提供的第一区域或者数据分析网元基于请求设备的标识和/或终端设备群组标识对应的终端设备所在的区域(可以是第一区域)划分而来。
步骤1503:数据分析网元向第一网元发送网络性能信息。
步骤1504:第一网元根据网络性能信息确定第一策略。
通过上述方法,第一网元可以根据划分的子的区域的区域信息即相关信息来制定策略,从而可以使制定的策略更加准确。其中,如果第一区域可以划分,则划分后的子区域比第一区域要小;如果第一区域不可以划分,则子区域等于第一区域。
在一种可选的实施方式中,第一网元为策略控制网元(例如PCF),还可以为其他网元,此处不再一一列举。
在一种可选的实施方式中,请求设备为至少一个终端设备提供服务,具体的,请求设备可以是当前服务于至少一个终端设备的业务网元,即可以是图1中的AF网元,包括运营商控制的AF网元(比如,P-CSCF),也可以是第三方AF网元,比如第三方业务服务器。
在一种可选的实施方式中,当请求设备是业务网元时,第一网元从请求设备接收第三信息,具体可以为:业务网元可以通过网络开放功能网元向第一网元发送第三信息。上述过程具体可以为:业务网元向网络开放功能网元发送第三信息,可选的,业务网元可以通过调用Nnef_BDTPNegotiation_Create request服务向网络开放功能网元发送第三信息;然后网络开放功能网元将第三信息转发给第一网元。可选的,网络开放功能网元可以通过调用Npcf_BDTPolicyControl_Create request服务向第一网元发送第三信息。
具体的,第一策略可以包括背景流量传输策略,其中,背景流量传输策略为至少一个终端设备的背景流量传输策略。
当第一策略包括背景流量传输策略时,第一网元从请求设备接收第三信息,第三信息用于请求背景流量传输策略,第三信息中包括以下一项或多项:第一区域的区域信息、终端设备群组标识或请求设备的标识;第一网元向请求设备发送背景流量传输策略。
在一种可选的实施方式中,背景流量传输策略中包括第二区域的区域信息。
在另一种可选的实施方式中,第一网元向请求设备发送第二区域的区域信息。
通过上述方法,请求设备可以了解背景流量传输策略是针对子区域制定的,可以更准确地发送给至少一个终端设备,使终端设备执行更准确的背景流量传输策略。
在一种可选的实施方式中,背景流量传输策略中还包括以下信息中的一个或多个:推荐的时间窗、费率、最大聚合比特率等等。
其中,在一种实施方式中,第一信息中包括的信息是基于第三信息中包括的信息生成的。
在一种可选的实施方式中,当第一信息中包含第一区域的区域信息时,数据分析网元根据第一信息确定网络性能信息,具体方法可以为:
数据分析网元基于第一区域的区域信息获取第二区域的区域信息;
数据分析网元确定以下一项或多项:第二区域中网络的负载信息、第二区域中业务的业务体验信息或第二区域中的终端设备的个数。
在另一种可选的实施方式中,当第一信息中包含终端设备群组标识和/或请求设备的标识时,数据分析网元根据第一信息确定网络性能信息,具体方法可以为:
数据分析网元根据终端设备群组标识和/或请求设备的标识确定第二区域的区域信息;
数据分析网元确定以下一项或多项:第二区域中网络的负载信息、第二区域中业务的业务体验信息或第二区域中的终端设备的个数。
在一种示例中,数据分析网元根据终端设备群组标识和/或请求设备的标识确定第二区域的区域信息,包括:
数据分析网元根据终端设备群组标识和/或请求设备的标识确定第一区域的区域信息;
数据分析网元基于第一区域的区域信息获取第二区域的区域信息。
可选的,数据分析网元根据终端设备群组标识和/或请求设备的标识确定第一区域的区域信息,具体方法可以为:
数据分析网元根据终端设备群组标识和/或请求设备的标识确定至少一个终端设备的标识,然后基于至少一个终端设备的标识确定所有终端设备的位置信息,最后根据所有终端设备的位置信息确定第一区域的区域信息。其中,该位置信息用于指示终端设备驻留的位置。
其中可选的,数据分析网元根据终端设备群组标识和/或请求设备的标识确定至少一个终端设备的标识,具体方法可以为:数据分析网元根据终端设备群组标识和/或请求设备的标识从数据库网元获取终端设备的标识列表,也即得到至少一个终端设备的标识。
其中可选的,数据分析网元基于至少一个终端设备的标识确定至少一个终端设备的位置信息,可以是数据分析网元基于至少一个终端设备的标识从接入和移动性管理功能网元或者接入设备中获取至少一个终端设备的位置信息。
在一种可选的实施方式中,上述涉及的数据分析网元基于第一区域的区域信息获取第二区域的区域信息,具体方法可以为:
数据分析网元基于第一区域的区域信息获取本地保存的第二区域的区域信息;或者
数据分析网元基于第一区域的区域信息从运行管理和维护网元或者接入和移动性管理功能网元获取第二区域的区域信息;或者
数据分析网元从第一区域中收集位于第一区域的至少一个终端设备的位置信息;数据分析网元基于位于第一区域的至少一个终端设备的位置信息确定第二区域的区域信息。
在一种可选的实施方式中,数据分析网元确定第二区域中网络的负载信息,具体方法可以为:数据分析网元从网络管理网元或者运行管理和维护网元获取第二区域中网络的负载信息。
在一种可选的实施方式中,数据分析网元确定第二区域中网络的负载信息,具体方法可以为:数据分析网元根据第二区域中业务的业务体验信息确定第二区域中网络的负载信息。比如,业务体验Service MOS区间为[0,5.0],业务体验要求为大于等于3.0的情况下,Service MOS为[4.0,5.0]是负载信息为轻载,Service MOS为[3.0,4.0]是负载信息为中载,Service MOS为小于等于3.0时为重载。
在一种可选的实施方式中,数据分析网元确定第二网络区域中业务的业务体验信息,具体方法可以为:
首先,数据分析网元可以收集网络中终端设备的业务数据和网络数据,分别如表1和表2所示。数据分析网元通过关联标识得到训练样本,即业务的业务体验平均意见分(Se rvice(mean opinion score,MOS))以及对应的网络数据(包括QoS flow级别的比特率、丢包率、包错误率等)。
表1 来自租户业务体验数据的业务数据
Figure PCTCN2019087653-appb-000001
其中,表1中,当信息是关联标识时,关联标识的来源的是AF网元,用于关联表1与表2各个网元上的数据。当信息是应用标识(Application ID)时,Application ID的来源的是AF网元,是终端设备的业务的业务标识,用途是用于标识终端设备的业务。当信息是地理区域标识时,地理区域标识的来源的是AF网元,用途是用于标识终端设备使用业务时所在的地理区域。当信息是Service MOS时。Service MOS的来源的是AF网元,用途是用于标识终端设备的业务体验数据。
表2 源自5G NF的网络数据
Figure PCTCN2019087653-appb-000002
其中,表2中,当信息是关联标识时,关联标识用于关联表1与表2各个网元上的数据。当信息是Application ID时,Application ID来自PCF或UPF网元,是终端设备的业务的业务标识,用途是用于标识网终端设备的业务。当信息是QFI时,QFI来自SMF或U PF网元,是终端设备的业务的服务质量流的标识,用途是用于标识终端设备的业务的服务质量流。当信息是Cell ID时,Cell ID来自AMF或RAN,用途是用于标识提供终端设备的业务的小区。当信息是Qos flow bit rate时,Qos flow bit rate来自UPF,用途是确定终端设备的业务的服务质量流的参数GFBR。当信息是QoS flow Packet Delay Budget时,来自UPF,用途是确定终端设备的业务的服务质量流的参数PDB。当信息是Qos flow Packet Error Rate时,来自UPF,用途是确定终端设备的业务的服务质量流的参数PER。当信息是Network data X4时,来自RAN,用途是标识网络数据X4。当信息是Network data X5时,来自RAN,用途是标识网络数据X5。
然后,数据分析网元基于训练样本训练得到Service MOS模型,用于表征业务体验信息与网络数据的对应关系。例如,Service MOS模型的表示可以如下:
H(x)=W0*X0+W1*X1+W2*X2+W3*X3+W4*X4+W5*X5+......+Wn*Xn     (1)。
结合表2,其中,X为变量,X1可以为Qos flow bit rate、X2可以为Qos flow Packet Error Rate、X3可以为Qos flow Packet Error Rate、X4可以为网络数据X4、X5可以为网络数据X5。其中,Wn表示第n变量的权值,n表示变量的数量,Xn表示第n个变量。n为大于或等于1的整数。H(x)表示Service MOS模型。
最后,数据分析网元可以从第二区域中收集第二区域中终端设备的业务对应的网络数据,基于上述Service MOS模型,就可以得到第二区域中业务的业务体验信息。
在一种可选的实施方式中,数据分析网元确定第二区域中终端设备的个数,具体方法可以为:
数据分析网元收集第二区域中的终端设备历史信息(包括时间、终端设备个数)以及第二区域中业务历史信息(包括对应时间、业务体验信息),然后分析得到满足业务体验要求情况下该第二区域中可以容纳的终端设备的个数,记为第二区域中终端设备的个数。
其中,第二区域中终端设备的个数具体为第二区域中在不同时间段可以容纳的终端设备的个数。
需要说明的是,上面涉及的第二区域可以为一个或者多个,也就说将第一区域划分成的一个或者多个第二区域。
需要说明的是,当第一策略为其他策略时,第一网元从请求设备接收请求其他策略的信息,该信息中同样可以包括以下一项或多项:第一区域的区域信息、终端设备群组标识或请求设备的标识,本申请实施例中仅以第一策略为背景流量传输策略为例进行说明,第一策略为其他策略的情况此处不再详细赘述。
下面,以第一策略为背景流量传输策略为例,说明本申请实施例提供的确定背景流量传输策略的方法的示例,如图16所示,在该示例中,请求设备请求背景流量传输策略的过程中,由数据分析网元将第一区域划分成一个或多个第二区域,以使策略控制网元准确制定背景流量传输策略。具体的,以请求设备是业务网元AF、终端设备为UE、第一网元为策略控制网元PCF、数据分析网元为NWDAF为例进行说明。该示例的具体流程可以包括:
步骤1601:AF向NEF发送第三信息,第三信息用于请求背景流量传输策略。第三信息中包括以下一项或多项:第一区域的区域信息、AF的标识或UE群组标识。
其中,NEF是一种网络开放功能网元的举例,这里NEF还可以用其他网络功能开放网元替换,本申请对此不作限定。
具体的,AF可以通过调用Nnef_BDTPNegotiation_Create request或者Nnef_Trigger_Delivery request服务向NEF发送第三信息。
步骤1602:NEF向PCF发送第三信息。
具体的,NEF可以通过调用Npcf_BDTPolicyControl_Create request或者Npcf_Policy Authorization_Create Request服务向PCF发送第三信息。
步骤1603:PCF向NWDAF发送第一信息,第一信息中包括以下一项或多项:第一区域的区域信息、AF的标识或UE群组标识。
其中,PCF可以通过调用Nnwdaf_AnalyticsSubscription_Subscribe request服务向NWDAF发送第一信息。
步骤1604:NWDAF根据第一信息确定网络性能信息,网络性能信息中包括第二区域的区域信息和第二信息,第二信息包括以下一项或多项:第二区域中网络的负载信息、第二区域中业务的业务体验信息或第二区域中的终端设备的个数;其中第二区域为第一区域的子区域。
其中,NWDAF根据第一信息确定网络性能信息的具体方法可以参考上述图15所示的实施例中涉及的相关内容,具体的此处不再详细赘述。
步骤1605:NWDAF向PCF发送网络性能信息。
其中,NWDAF可以通过调用Nnwdaf_Nnwdaf_AnalyticsSubscription_Subscribe Response服务向PCF发送网络性能信息。
步骤1606:PCF根据网络性能信息确定背景流量传输策略。
其中,背景流量传输策略的相关描述参见上述实施例,此处不再详细描述。
步骤1607:PCF向NEF发送背景流量传输策略。背景流量传输策略包括第二区域的区域信息。
其中,PCF可以将通过调用Npcf_BDT Policy Control_Create response或者Npcf_PolicyAuthorization_Notify服务向NEF发送背景流量传输策略。
步骤1608:NEF向AF发送背景流量传输策略。
其中,NEF可以调用Nnef_BDT PNegotiation_Create response或者Nnef_Trigger_Delivery response服务向AF发送背景流量传输策略。
可选的,NEF可以先将背景流量策略中的网络类型的第二区域的区域信息转换成地理区域类型的第二区域的区域信息,然后再执行步骤1608。
通过上述方法,PCF可以根据划分的子区域的区域信息及相关信息制定背景流量传输策略,这样可以使制定的背景流量传输策略更准确。
上述本申请提供的实施例中,分别从各个网元或者设备之间交互的角度对本申请实施例提供的确定背景流量传输策略的方法的各方案进行了介绍。可以理解的是,各个网元和设备,例如上述第一策略控制网元、数据分析网元、第一业务网元、第一终端设备和第二终端设备为了实现上述功能,其包含了执行各个功能相应的硬件结构和/或软件模块。本领域技术人员应该很容易意识到,结合本申请中所公开的实施例描述的各示例的单元及算法步骤,本申请能够以硬件或硬件和计算机软件的结合形式来实现。某个功能究竟以硬件还 是计算机软件驱动硬件的方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
在一个实施例中,图7所示通信装置可用于执行上述图15所示的实施例中的第一网元的操作,以及用于执行上述图16所示的实施例中的PCF的操作。例如:
发送模块702,用于向数据分析网元发送第一信息,第一信息用于请求网络性能信息,第一信息中包括以下一项或多项:第一区域的区域信息、请求设备的标识或终端设备群组标识;
接收模块701,用于从数据分析网元接收网络性能信息,网络性能信息中包括第二区域的区域信息和第二信息,第二信息包括以下一项或多项:第二区域中网络的负载信息、第二区域中业务的业务体验信息或第二区域中的终端设备的个数;其中第二区域为第一区域的子区域;
处理模块703,用于根据网络性能信息确定第一策略。
因此,基于上述通信装置,通过第一网元向数据分析网元请求网络性能信息后,根据划分的子区域的区域信息及相关信息,可以使制定的第一策略更准确。
在一种可选的实施方式中,第一策略包括背景流量传输策略,其中,背景流量传输策略为至少一个终端设备的背景流量传输策略。
在一种可选的实施方式中,接收模块701,还用于从请求设备接收第三信息,第三信息用于请求背景流量传输策略,第三信息中包括以下一项或多项:第一区域的区域信息、终端设备群组标识或请求设备的标识;
发送模块702,还用于向请求设备发送背景流量传输策略。
在一种可选的实施方式中,背景流量传输策略中包括第二区域的区域信息。
在一种可选的实施方式中,发送模块702,还用于:向请求设备发送第二区域的区域信息。
在一种可选的实施方式中,背景流量传输策略中还包括以下信息中的一个或多个:推荐的时间窗、费率、最大聚合比特率。
在一种可选的实施方式中,第一网元为策略控制功能网元。
在一个实施例中,图7所示通信装置可用于执行上述图15所示的实施例中的数据分析网元的操作,以及用于执行上述图16所示的实施例中的NWDAF的操作。例如:
接收模块701,用于从第一网元接收第一信息,第一信息用于请求网络性能信息;第一信息中包括以下一项或多项:第一区域的区域信息、请求设备的标识或终端设备群组标识;
处理模块703,用于根据第一信息确定网络性能信息,网络性能信息中包括第二区域的区域信息和第二信息,第二信息包括以下一项或多项:第二区域中网络的负载信息、第二区域中业务的业务体验信息或第二区域中的终端设备的个数;其中第二区域为第一区域的子区域;
发送模块702,用于向第一网元发送网络性能信息。
因此,基于上述通信装置,通过第一网元向数据分析网元请求网络性能信息后,根据 划分的子区域的区域信息及相关信息,可以使制定的第一策略更准确。
在一种可选的实施方式中,当第一信息中包含第一区域的区域信息时,处理模块,在根据第一信息确定网络性能信息时,具体用于:
基于第一区域的区域信息获取第二区域的区域信息;
确定以下一项或多项:第二区域中网络的负载信息、第二区域中业务的业务体验信息或第二区域中的终端设备的个数。
在一种可选的实施方式中,当第一信息中包含终端设备群组标识和/或请求设备的标识时,处理模块703,在根据第一信息确定网络性能信息时,具体用于:
根据终端设备群组标识和/或请求设备的标识确定第二区域的区域信息;
确定以下一项或多项:第二区域中网络的负载信息、第二区域中业务的业务体验信息或第二区域中的终端设备的个数。
在一种可选的实施方式中,处理模块703,在根据终端设备群组标识和/或请求设备的标识确定第二区域的区域信息时,具体用于:
根据终端设备群组标识和/或请求设备的标识确定第一区域的区域信息;
基于第一区域的区域信息获取第二区域的区域信息。
在一种可选的实施方式中,处理模块703,在基于第一区域的区域信息获取第二区域的区域信息时,具体用于:
基于第一区域的区域信息获取本地保存的第二区域的区域信息;或者,
基于第一区域的区域信息从运行管理和维护网元或者接入和移动性管理功能网元获取第二区域的区域信息。
在一种可选的实施方式中,处理模块703,在确定第二区域中网络的负载信息时,具体用于:
从网络管理网元或者运行管理和维护网元获取第二区域中网络的负载信息。
在一种可选的实施方式中,第一网元为策略控制功能网元。
在一个实施例中,图8所示通信装置可用于执行上述图15所示的实施例中的请求设备的操作,以及用于执行上述图16所示的实施例中的AF的操作。例如:
发送模块802,用于向第一网元发送第三信息,第三信息用于请求背景流量传输策略,第三信息中包括以下一项或多项:第一区域的区域信息、请求设备的标识或终端设备群组标识;
接收模块801,用于从第一网元接收背景流量传输策略,背景流量传输策略包括第二区域的区域信息,第二区域为第一区域的子区域。
因此,基于上述通信装置,请求设备向第一网元请求的背景流量传输策略,可以更加准确。
在一种可选的实施方式中,背景流量传输策略为至少一个终端设备的背景流量传输策略。
在一种可选的实施方式中,请求设备为至少一个终端设备服务。
在一种可选的实施方式中,背景流量传输策略中包括以下信息中的一个或多个:推荐的时间窗、费率、最大聚合比特率。
在一种可选的实施方式中,第一网元为策略控制功能网元。
在一个实施例中,图9所示的通信装置可用于执行上述图15所示的实施例中的第一网元的操作,还可用于执行上述图16所示的实施例中的PCF的操作。例如:
收发器901用于实现与第一网元(例如PCF)相连的其他设备进行通信交互,即用于接收和发送数据;
处理器902用于控制收发器901从数据分析网元接收网络性能信息,网络性能信息中包括第二区域的区域信息和第二信息,第二信息包括以下一项或多项:第二区域中网络的负载信息、第二区域中业务的业务体验信息或第二区域中的终端设备的个数;其中第二区域为第一区域的子区域;根据网络性能信息确定第一策略。
因此,基于上述通信装置,通过第一网元向数据分析网元请求网络性能信息后,根据划分的子区域的区域信息及相关信息,可以使制定的第一策略更准确。
在一种可选的实施方式中,第一策略包括背景流量传输策略,其中,背景流量传输策略为至少一个终端设备的背景流量传输策略。
在一种可选的实施方式中,处理器902还用于控制收发器901从请求设备接收第三信息,第三信息用于请求背景流量传输策略,第三信息中包括以下一项或多项:第一区域的区域信息、终端设备群组标识或请求设备的标识;以及控制收发器901向请求设备发送背景流量传输策略。
在一种可选的实施方式中,背景流量传输策略中包括第二区域的区域信息。
在一种可选的实施方式中,处理器902还用于控制收发器901向请求设备发送第二区域的区域信息。
在一种可选的实施方式中,背景流量传输策略中还包括以下信息中的一个或多个:推荐的时间窗、费率、最大聚合比特率。
在一种可选的实施方式中,第一网元为策略控制功能网元。
在另一个实施例中,图9所示的通信装置可用于执行上述图15所示的实施例中的数据分析网元的操作,还可用于执行上述图16所示的实施例中的NWDAF的操作。例如:
收发器901用于实现与数据分析网元(例如NWDAF)相连的其他设备进行通信交互,即用于接收和发送数据;
处理器902用于控制收发器901从第一网元接收第一信息,第一信息用于请求网络性能信息;第一信息中包括以下一项或多项:第一区域的区域信息、请求设备的标识或终端设备群组标识;
根据第一信息确定网络性能信息,网络性能信息中包括第二区域的区域信息和第二信息,第二信息包括以下一项或多项:第二区域中网络的负载信息、第二区域中业务的业务体验信息或第二区域中的终端设备的个数;其中第二区域为第一区域的子区域;
控制收发器901向第一网元发送网络性能信息。
因此,基于上述通信装置,通过第一网元向数据分析网元请求网络性能信息后,根据划分的子区域的区域信息及相关信息,可以使制定的第一策略更准确。
在一种可选的实施方式中,当第一信息中包含第一区域的区域信息时,处理器902在根据第一信息确定网络性能信息时,具体用于:
基于第一区域的区域信息获取第二区域的区域信息;
确定以下一项或多项:第二区域中网络的负载信息、第二区域中业务的业务体验信息 或第二区域中的终端设备的个数。
在一种可选的实施方式中,当第一信息中包含终端设备群组标识和/或请求设备的标识时,处理器902在根据第一信息确定网络性能信息时,具体用于:
根据终端设备群组标识和/或请求设备的标识确定第二区域的区域信息;
确定以下一项或多项:第二区域中网络的负载信息、第二区域中业务的业务体验信息或第二区域中的终端设备的个数。
在一种可选的实施方式中,处理器902,在根据终端设备群组标识和/或请求设备的标识确定第二区域的区域信息时,具体用于:
根据终端设备群组标识和/或请求设备的标识确定第一区域的区域信息;
基于第一区域的区域信息获取第二区域的区域信息。
在一种可选的实施方式中,处理器902,在基于第一区域的区域信息获取第二区域的区域信息时,具体用于:
基于第一区域的区域信息获取本地保存的第二区域的区域信息;或者,
基于第一区域的区域信息从运行管理和维护网元或者接入和移动性管理功能网元获取第二区域的区域信息。
在一种可选的实施方式中,处理器902,在确定第二区域中网络的负载信息时,具体用于:
从网络管理网元或者运行管理和维护网元获取第二区域中网络的负载信息。
在一种可选的实施方式中,第一网元为策略控制功能网元。
在另一个实施例中,图9所示的通信装置可用于执行上述图15所示的实施例中的请求设备的操作,还可用于执行上述图16所示的实施例中的AF的操作。例如:
收发器901用于实现与请求设备(例如AF)相连的其他设备进行通信交互,即用于接收和发送数据;
处理器902用于控制收发器901向第一网元发送第三信息,第三信息用于请求背景流量传输策略,第三信息中包括以下一项或多项:第一区域的区域信息、请求设备的标识或终端设备群组标识;
控制收发器901从第一网元接收背景流量传输策略,背景流量传输策略包括第二区域的区域信息,第二区域为第一区域的子区域。
因此,基于上述通信装置,请求设备向第一网元请求的背景流量传输策略,可以更加准确。
在一种可选的实施方式中,背景流量传输策略为至少一个终端设备的背景流量传输策略。
在一种可选的实施方式中,请求设备为至少一个终端设备服务。
在一种可选的实施方式中,背景流量传输策略中包括以下信息中的一个或多个:推荐的时间窗、费率、最大聚合比特率。
在一种可选的实施方式中,第一网元为策略控制功能网元。
本申请中,“至少一项”是指一项或者多项,“多项”是指两项或两项以上。“和/或”,描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在 A,同时存在A和B,单独存在B的情况,其中A,B可以是单数或者复数。字符“/”一般表示前后关联对象是一种“或”的关系。“以下至少一项(个)”或其类似表达,是指的这些项中的任意组合,包括单项(个)或复数项(个)的任意组合。例如,a,b,或c中的至少一项(个),可以表示:a,b,c,a-b,a-c,b-c,或a-b-c,其中a,b,c可以是单个,也可以是多个。
本领域内的技术人员应明白,本申请的实施例可提供为方法、系统、或计算机程序产品。因此,本申请可采用完全硬件实施例、完全软件实施例、或结合软件和硬件方面的实施例的形式。而且,本申请可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。
本申请是参照根据本申请实施例的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。
显然,本领域的技术人员可以对本申请实施例进行各种改动和变型而不脱离本申请实施例的范围。这样,倘若本申请实施例的这些修改和变型属于本申请权利要求及其等同技术的范围之内,则本申请也意图包含这些改动和变型在内。

Claims (30)

  1. 一种确定网络性能信息的方法,其特征在于,包括:
    第一网元向数据分析网元发送第一信息,所述第一信息用于请求网络性能信息,所述第一信息中包括以下一项或多项:第一区域的区域信息、请求设备的标识或终端设备群组标识;
    所述第一网元从所述数据分析网元接收所述网络性能信息,所述网络性能信息中包括第二区域的区域信息和第二信息,所述第二信息包括以下一项或多项:所述第二区域中网络的负载信息、所述第二区域中业务的业务体验信息或所述第二区域中的终端设备的个数;其中所述第二区域为所述第一区域的子区域;
    所述第一网元根据所述网络性能信息确定第一策略。
  2. 如权利要求1所述的方法,其特征在于,所述第一策略包括背景流量传输策略,其中,所述背景流量传输策略为至少一个所述终端设备的背景流量传输策略。
  3. 如权利要求2所述的方法,其特征在于,所述方法还包括:
    所述第一网元从所述请求设备接收第三信息,所述第三信息用于请求所述背景流量传输策略,所述第三信息中包括以下一项或多项:所述第一区域的区域信息、所述终端设备群组标识或所述请求设备的标识;
    所述第一网元向所述请求设备发送所述背景流量传输策略。
  4. 如权利要求2或3所述的方法,其特征在于,所述背景流量传输策略中包括所述第二区域的区域信息。
  5. 如权利要求2或3所述的方法,其特征在于,所述方法还包括:
    所述第一网元向所述请求设备发送所述第二区域的区域信息。
  6. 如权利要求2-5任一项所述的方法,其特征在于,所述背景流量传输策略中还包括以下信息中的一个或多个:推荐的时间窗、费率、最大聚合比特率。
  7. 一种确定网络性能信息的方法,其特征在于,包括:
    数据分析网元从第一网元接收第一信息,所述第一信息用于请求网络性能信息,所述第一信息中包括以下一项或多项:第一区域的区域信息、请求设备的标识或终端设备群组标识;
    所述数据分析网元根据所述第一信息确定所述网络性能信息,所述网络性能信息中包括第二区域的区域信息和第二信息,所述第二信息包括以下一项或多项:所述第二区域中网络的负载信息、所述第二区域中业务的业务体验信息或所述第二区域中的终端设备的个数;其中所述第二区域为所述第一区域的子区域;
    所述数据分析网元向所述第一网元发送所述网络性能信息。
  8. 如权利要求7所述的方法,其特征在于,当所述第一信息中包含所述第一区域的区域信息时,所述数据分析网元根据所述第一信息确定所述网络性能信息,包括:
    所述数据分析网元基于所述第一区域的区域信息获取所述第二区域的区域信息;
    所述数据分析网元确定以下一项或多项:所述第二区域中网络的负载信息、所述第二区域中业务的业务体验信息或所述第二区域中的终端设备的个数。
  9. 如权利要求7所述的方法,其特征在于,当所述第一信息中包含所述终端设备群 组标识和/或所述请求设备的标识时,所述数据分析网元根据所述第一信息确定所述网络性能信息,包括:
    所述数据分析网元根据所述终端设备群组标识和/或所述请求设备的标识确定所述第二区域的区域信息;
    所述数据分析网元确定以下一项或多项:所述第二区域中网络的负载信息、所述第二区域中业务的业务体验信息或所述第二区域中的终端设备的个数。
  10. 如权利要求9所述的方法,其特征在于,所述数据分析网元根据所述终端设备群组标识和/或所述请求设备的标识确定所述第二区域的区域信息,包括:
    所述数据分析网元根据所述终端设备群组标识和/或所述请求设备的标识确定所述第一区域的区域信息;
    所述数据分析网元基于所述第一区域的区域信息获取所述第二区域的区域信息。
  11. 如权利要求8或10所述的方法,其特征在于,所述数据分析网元基于所述第一区域的区域信息获取所述第二区域的区域信息,包括:
    所述数据分析网元基于所述第一区域的区域信息获取本地保存的所述第二区域的区域信息;或者,
    所述数据分析网元基于所述第一区域的区域信息从运行管理和维护网元或者接入和移动性管理功能网元获取所述第二区域的区域信息。
  12. 如权利要求8-11任一项所述的方法,其特征在于,所述数据分析网元确定所述第二区域中网络的负载信息,包括:
    所述数据分析网元从网络管理网元或者所述运行管理和维护网元获取所述第二区域中网络的负载信息。
  13. 一种确定背景流量传输策略的方法,其特征在于,包括:
    请求设备向第一网元发送第三信息,所述第三信息用于请求背景流量传输策略,所述第三信息中包括以下一项或多项:第一区域的区域信息、所述请求设备的标识或终端设备群组标识;
    所述请求设备从所述第一网元接收所述背景流量传输策略,所述背景流量传输策略包括第二区域的区域信息,所述第二区域为所述第一区域的子区域。
  14. 如权利要求13所述的方法,其特征在于,所述背景流量传输策略为至少一个终端设备的背景流量传输策略。
  15. 如权利要求13或14所述的方法,其特征在于,所述背景流量传输策略中包括以下信息中的一个或多个:推荐的时间窗、费率、最大聚合比特率。
  16. 一种通信装置,所述通信装置为第一网元,其特征在于,包括:
    发送模块,用于向数据分析网元发送第一信息,所述第一信息用于请求网络性能信息,所述第一信息中包括以下一项或多项:第一区域的区域信息、请求设备的标识或终端设备群组标识;
    接收模块,用于从所述数据分析网元接收所述网络性能信息,所述网络性能信息中包括第二区域的区域信息和第二信息,所述第二信息包括以下一项或多项:所述第二区域中网络的负载信息、所述第二区域中业务的业务体验信息或所述第二区域中的终端设备的个 数;其中所述第二区域为所述第一区域的子区域;
    处理模块,用于根据所述网络性能信息确定第一策略。
  17. 如权利要求16所述的通信装置,其特征在于,所述第一策略包括背景流量传输策略,其中,所述背景流量传输策略为至少一个所述终端设备的背景流量传输策略。
  18. 如权利要求17所述的通信装置,其特征在于,
    所述接收模块,还用于从所述请求设备接收第三信息,所述第三信息用于请求所述背景流量传输策略,所述第三信息中包括以下一项或多项:所述第一区域的区域信息、所述终端设备群组标识或所述请求设备的标识;
    所述发送模块,还用于向所述请求设备发送所述背景流量传输策略。
  19. 如权利要求17或18所述的通信装置,其特征在于,所述背景流量传输策略中包括所述第二区域的区域信息。
  20. 如权利要求17或18所述的通信装置,其特征在于,所述发送模块,还用于:
    向所述请求设备发送所述第二区域的区域信息。
  21. 如权利要求17-20任一项所述的通信装置,其特征在于,所述背景流量传输策略中还包括以下信息中的一个或多个:推荐的时间窗、费率、最大聚合比特率。
  22. 一种通信装置,所述通信装置为数据分析网元,其特征在于,包括:
    接收模块,用于从第一网元接收第一信息,所述第一信息用于请求网络性能信息,所述第一信息中包括以下一项或多项:第一区域的区域信息、请求设备的标识或终端设备群组标识;
    处理模块,用于根据所述第一信息确定所述网络性能信息,所述网络性能信息中包括第二区域的区域信息和第二信息,所述第二信息包括以下一项或多项:所述第二区域中网络的负载信息、所述第二区域中业务的业务体验信息或所述第二区域中的终端设备的个数;其中所述第二区域为所述第一区域的子区域;
    发送模块,用于向所述第一网元发送所述网络性能信息。
  23. 如权利要求22所述的通信装置,其特征在于,当所述第一信息中包含所述第一区域的区域信息时,所述处理模块,在根据所述第一信息确定所述网络性能信息时,具体用于:
    基于所述第一区域的区域信息获取所述第二区域的区域信息;
    确定以下一项或多项:所述第二区域中网络的负载信息、所述第二区域中业务的业务体验信息或所述第二区域中的终端设备的个数。
  24. 如权利要求22所述的通信装置,其特征在于,当所述第一信息中包含所述终端设备群组标识和/或所述请求设备的标识时,所述处理模块,在根据所述第一信息确定所述网络性能信息时,具体用于:
    根据所述终端设备群组标识和/或所述请求设备的标识确定所述第二区域的区域信息;
    确定以下一项或多项:所述第二区域中网络的负载信息、所述第二区域中业务的业务体验信息或所述第二区域中的终端设备的个数。
  25. 如权利要求24所述的通信装置,其特征在于,所述处理模块,在根据所述终端设备群组标识和/或所述请求设备的标识确定所述第二区域的区域信息时,具体用于:
    根据所述终端设备群组标识和/或所述请求设备的标识确定所述第一区域的区域信息;
    基于所述第一区域的区域信息获取所述第二区域的区域信息。
  26. 如权利要求23或25所述的通信装置,其特征在于,所述处理模块,在基于所述第一区域的区域信息获取所述第二区域的区域信息时,具体用于:
    基于所述第一区域的区域信息获取本地保存的所述第二区域的区域信息;或者,
    基于所述第一区域的区域信息从运行管理和维护网元或者接入和移动性管理功能网元获取所述第二区域的区域信息。
  27. 如权利要求23-26任一项所述的通信装置,其特征在于,所述处理模块,在确定所述第二区域中网络的负载信息时,具体用于:
    从网络管理网元或者所述运行管理和维护网元获取所述第二区域中网络的负载信息。
  28. 一种通信装置,所述通信装置为请求设备,其特征在于,包括:
    发送模块,用于向第一网元发送第三信息,所述第三信息用于请求背景流量传输策略,所述第三信息中包括以下一项或多项:第一区域的区域信息、所述请求设备的标识或终端设备群组标识;
    接收模块,用于从所述第一网元接收所述背景流量传输策略,所述背景流量传输策略包括第二区域的区域信息,所述第二区域为所述第一区域的子区域。
  29. 如权利要求28所述的通信装置,其特征在于,所述背景流量传输策略为至少一个终端设备的背景流量传输策略。
  30. 如权利要求28或29所述的通信装置,其特征在于,所述背景流量传输策略中包括以下信息中的一个或多个:推荐的时间窗、费率、最大聚合比特率。
PCT/CN2019/087653 2018-05-21 2019-05-20 一种确定背景流量传输策略的方法及装置 WO2019223658A1 (zh)

Priority Applications (6)

Application Number Priority Date Filing Date Title
EP19806844.7A EP3817449B1 (en) 2018-05-21 2019-05-20 Methods, device and computer-readable medium for determining background traffic transmission policy
BR112020023725-6A BR112020023725A2 (pt) 2018-05-21 2019-05-20 método para determinar política de transferência de tráfego de fundo e aparelho
EP23164108.5A EP4271027A1 (en) 2018-05-21 2019-05-20 Network performance information and communication system
AU2019272327A AU2019272327B2 (en) 2018-05-21 2019-05-20 Method for determining background traffic transfer policy and apparatus
CA3100862A CA3100862C (en) 2018-05-21 2019-05-20 Apparatus and method for determining background traffic transfer policy
US17/100,208 US11601849B2 (en) 2018-05-21 2020-11-20 Method for determining background traffic transfer policy and apparatus

Applications Claiming Priority (6)

Application Number Priority Date Filing Date Title
CN201810491483 2018-05-21
CN201810491483.8 2018-05-21
CN201810671611.7 2018-06-26
CN201810671611 2018-06-26
CN201910256749.5A CN110519795B (zh) 2018-05-21 2019-04-01 一种确定背景流量传输策略的方法及装置
CN201910256749.5 2019-04-01

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US17/100,208 Continuation US11601849B2 (en) 2018-05-21 2020-11-20 Method for determining background traffic transfer policy and apparatus

Publications (1)

Publication Number Publication Date
WO2019223658A1 true WO2019223658A1 (zh) 2019-11-28

Family

ID=68617184

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/087653 WO2019223658A1 (zh) 2018-05-21 2019-05-20 一种确定背景流量传输策略的方法及装置

Country Status (1)

Country Link
WO (1) WO2019223658A1 (zh)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8340099B2 (en) * 2009-07-15 2012-12-25 Microsoft Corporation Control of background data transfers
CN106797321A (zh) * 2014-09-30 2017-05-31 华为技术有限公司 一种背景流量下载方法、设备及系统
CN106982125A (zh) * 2016-01-18 2017-07-25 中兴通讯股份有限公司 策略计费控制方法、协议转换器、策略计费规则设备、系统

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8340099B2 (en) * 2009-07-15 2012-12-25 Microsoft Corporation Control of background data transfers
CN106797321A (zh) * 2014-09-30 2017-05-31 华为技术有限公司 一种背景流量下载方法、设备及系统
CN106982125A (zh) * 2016-01-18 2017-07-25 中兴通讯股份有限公司 策略计费控制方法、协议转换器、策略计费规则设备、系统

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP3817449A4 *

Similar Documents

Publication Publication Date Title
US11601849B2 (en) Method for determining background traffic transfer policy and apparatus
US10397758B2 (en) Function selection based on utilization level in 5G environments
US12063592B2 (en) User plane system selection based on latency
US20220369204A1 (en) Method and device for providing service to user device by using network slice in communication system
WO2020063335A1 (zh) 一种切片信息处理方法及装置
WO2018161850A1 (en) System and method of network policy optimization
US11483732B2 (en) Intelligent allocation of network resources
WO2020108002A1 (zh) 一种传输策略确定方法、策略控制方法及装置
WO2021218391A1 (zh) 信息处理方法、装置、设备及可读存储介质
CN113661724A (zh) 网络中的基于用例的网络切片选择
WO2023082878A1 (zh) 一种通信方法及装置
WO2019158034A1 (zh) 一种资源分配方法和装置
WO2019223658A1 (zh) 一种确定背景流量传输策略的方法及装置
CN117528629A (zh) 通信方法、装置及系统
WO2021164428A1 (zh) 通信方法、装置及系统
WO2023082877A1 (zh) 一种通信方法及装置
US9307471B1 (en) Selecting an access node for wireless device communication
CN117641467A (zh) 一种通信方法及装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19806844

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 3100862

Country of ref document: CA

NENP Non-entry into the national phase

Ref country code: DE

REG Reference to national code

Ref country code: BR

Ref legal event code: B01A

Ref document number: 112020023725

Country of ref document: BR

ENP Entry into the national phase

Ref document number: 2019806844

Country of ref document: EP

Effective date: 20201204

ENP Entry into the national phase

Ref document number: 2019272327

Country of ref document: AU

Date of ref document: 20190520

Kind code of ref document: A

ENP Entry into the national phase

Ref document number: 112020023725

Country of ref document: BR

Kind code of ref document: A2

Effective date: 20201120