WO2020042848A1 - Network slice management method and apparatus - Google Patents

Network slice management method and apparatus Download PDF

Info

Publication number
WO2020042848A1
WO2020042848A1 PCT/CN2019/098153 CN2019098153W WO2020042848A1 WO 2020042848 A1 WO2020042848 A1 WO 2020042848A1 CN 2019098153 W CN2019098153 W CN 2019098153W WO 2020042848 A1 WO2020042848 A1 WO 2020042848A1
Authority
WO
WIPO (PCT)
Prior art keywords
network slice
slice
access network
proxy
request
Prior art date
Application number
PCT/CN2019/098153
Other languages
French (fr)
Chinese (zh)
Inventor
武绍芸
苏偌宇
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2020042848A1 publication Critical patent/WO2020042848A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0893Assignment of logical groups to network elements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/16Central resource management; Negotiation of resources or communication parameters, e.g. negotiating bandwidth or QoS [Quality of Service]

Definitions

  • the present application relates to the field of communications technologies, and in particular, to a network slice management method and device.
  • the 5th-generation (5G) mobile communication system introduces network slicing technology to cope with the difference in network performance requirements of different communication services.
  • a slice that can be implemented to provide a terminal with an end-to-end network service from an access network (AN) to a core network (CN) is called an end-to-end network slice.
  • AN and CN are collectively referred to as a subnet.
  • the end-to-end network slice may include a subnet slice, such as a core network slice and an access network slice.
  • an end-to-end network slice is managed by a network slice management function (NSMF).
  • NSMF network slice management function
  • an end-to-end network slice can be created, updated, or destroyed through NSMF.
  • NSMF can send network slice creation requests to the network slice subnet management function (NSSMF) deployed in the subnet.
  • NSSMF network slice subnet management function
  • the NSSMF in each subnet is based on the network slice.
  • the creation request creates a subnet slice, thereby realizing the creation of an end-to-end network slice.
  • the embodiments of the present application provide a network slice management method and device, which are used to optimize the management of end-to-end network slices.
  • a network slice management method is provided.
  • the execution body of the method may be a proxy node.
  • the proxy node may be a newly added node in the CN, or it may be integrated on the NSSMF in the CN.
  • the steps of the specific method may be as follows: receiving a network slice creation request from NSMF, the network slice creation request is used to request the creation of a first end-to-end network slice that shares resources with the created end-to-end network slice, the The first end-to-end network slice includes a first core network slice and a first access network slice, and the first core network slice is created according to the network slice creation request, and the first core network slice and the created second
  • the core network slice shares resources and sends an access network slice creation request to an access network device that supports a network slice proxy, where the access network slice creation request is used to request creation of the first access network slice, and the access network
  • the slice creation request carries first indication information, and the first indication information is used to instruct the first core network slice and the second core
  • the NSMF can use this proxy node to send network slice management messages (such as network slice creation requests) to access network devices that support network slice agents in the AN to achieve end-to-end network slice management.
  • network slice management messages such as network slice creation requests
  • the NSMF no longer sends network slice management messages to the AN and CN separately as in the prior art. Instead, the network slice management message is first sent to the proxy node in the CN.
  • the network slicing management message makes a decision, and then the proxy node sends a network slicing management message to the access network device supporting the network slicing proxy in the AN, and the proxy node notifies the decision made by the access network device CN side so that The access network equipment on the AN side can refer to the decision made by the CN side, and then make a decision consistent with the CN side.
  • the network slice management method provided by the embodiment of the present application is exemplified by an example.
  • the NSMF sends a network slice creation request to the proxy node, requesting to create an end-to-end network slice 3 that shares resources with the created end-to-end network slice.
  • the end-to-end network slice 3 may include core network slice 3 and access network slice 3.
  • the created end-to-end network slice includes end-to-end network slice 1 and end-to-end network slice 2
  • end-to-end network slice 1 includes core network slice 1 and access network slice 1
  • end-to-end network slice 2 includes Core network slice 2 and access network slice 2.
  • the NSMF can send core network slice creation requests to the NSSMF in the CN, requesting to create a core network slice 3 that shares resources with the created core network slice.
  • the NSSMF in the AN sends an access network slice creation request to request the creation of an access network slice 3 that shares resources with the created access network slice.
  • the NSSMF in the CN can create and create the core network according to the core network slice creation request.
  • Slice 1 or core network slice 2 shares the core network slice 3 of the resource.
  • the NSSMF in the AN can create an access network that shares resources with the created access network slice 1 or access network slice 2 according to the access network slice creation request.
  • Slice 3 may cause NSSMF in CN to create core network slice 3 that shares resources with the created core network slice 1, while NSSMF in AN creates access network slice 3 that shares resources with the created access network slice 2.
  • the subnet slices created in AN and CN do not belong to the same end-to-end network slice, which may cause subsequent errors when using end-to-end network slice 3.
  • the NSMF cannot send an access network slice creation request to the AN, and thus cannot create an end-to-end network slice.
  • the NSMF can send a network slice creation request to a proxy node in the CN.
  • the proxy node creates a core network slice 3 that shares resources with the created core network slice 1 according to the network slice creation request, and Send an access network slice creation request to an access network device in the AN that supports a network slice proxy, and the access network slice creation request carries instruction information to instruct core network slice 1 and core network slice 3 to share resources.
  • the support The access network device of the network slice proxy can create an access network slice 3 that shares resources with the created access network slice 1 according to the access network slice creation request, so that the subnet slices created in the AN and CN belong to the same end End-to-end network slicing can avoid errors when using end-to-end network slicing 3.
  • the network slice creation request may carry the identity of the second end-to-end network slice. At this time, the network slice creation request may be used to request creation of a shared resource with the second end-to-end network slice.
  • the first end-to-end network slice That is, the network slice creation request can be used to request the creation of a first end-to-end network slice that shares resources with a particular end-to-end network slice.
  • the following describes how a proxy node creates the first core network slice.
  • the proxy node receives a network slice creation request from NSMF, and the network slice creation request carries an identifier of a second end-to-end network slice and is used to request creation of the second end-to-end network slice.
  • the proxy node may create the first core according to the network slice creation request and resource sharing slice information of a core network to which the proxy node belongs.
  • the resource sharing slice information of the core network to which the proxy node belongs includes information about core network slices that have been created in the core network and support resource sharing. In this way, the proxy node can learn the implementation details of the core network control plane according to the resource sharing slice information of the core network to which the proxy node belongs, and then can relatively accurately create the first core network slice in combination with the implementation details of the core network control plane.
  • the following describes how a proxy node creates the first core network slice according to the network slice creation request and resource sharing slice information of a core network to which the proxy node belongs.
  • the resource shared slice information of the core network to which the proxy node belongs may include information of a core network slice that has been created and supports resource sharing, and the information of the core network slice includes the core network slice. Identification and resource usage.
  • the proxy node may create the first core network slice in the following manner: the proxy node determines the core network slice with the lowest resource occupation rate in the core network slice as the second core network slice, and The network slice creation request and the identity of the second core network slice create the first core network slice.
  • the agent node creates and shares the first core network slice of the resource with the created core network slice with the lowest resource occupancy according to the resource consumption of the core network slice, so as to optimize the resource sharing effect. .
  • the resource sharing of network slices can only be determined by NSMF.
  • NSMF cannot accurately sense the resource consumption of subnet slices in the core network and the access network. Therefore, when creating a new network slice, NSMF cannot accurately Determine the network slice to be created and which network slice has been created to perform the best resource sharing.
  • the method of the present application can optimize the management of network slices.
  • the network slice creation request carries an identifier of a second end-to-end network slice, and resource sharing slice information of a core network to which the proxy node belongs includes the second end-to-end network slice.
  • the information of the core network slice, and the information of the core network slice includes an identifier of the core network slice and a resource occupation rate.
  • the proxy node may create the first core network slice in the following manner: When the resource occupation rate of the core network slice in the second end-to-end network slice is less than a preset value, the proxy node will The core network slice in the second end-to-end network slice is determined to be the second core network slice, and the first core network slice is created according to the network slice creation request and the identity of the second core network slice. . In this method, the proxy node creates the core network slice in the second end-to-end network slice only when the resource occupancy rate of the core network slice in the second end-to-end network slice is less than a preset value. The first core network slice of the resource is shared to optimize the resource sharing effect.
  • the preset value may be set according to an actual application scenario.
  • the principle for setting the preset value may be that after a core network slice with a resource occupancy rate less than the preset value shares resources with the first core network slice, the two core network slices sharing the resource can be used normally.
  • the proxy node may send an access network slice creation request to an access network device supporting a network slice proxy through a default access and mobility management entity (AMF).
  • AMF access and mobility management entity
  • the proxy node may further receive a first list from the default AMF.
  • the creation result may be the creation success or failure.
  • the proxy node may also interact with the access network device supporting the network slice proxy through other AMF (different from the default AMF), which is not limited in this application.
  • the proxy node may further send the first list to the NSMF. Then, the NSMF can make subsequent decisions according to the first list. For example, if the creation results included in the first list are all created successfully, the NSMF need not perform other operations. If there is a creation failure in the creation result included in the first list, the NSMF may re-initiate the slice creation process for the slice that failed to be created.
  • an access network device that supports a network slice proxy can be understood as that an access network slice in the access network device can be managed by the proxy node.
  • the ability of the proxy node to manage the access network slice in the access network device may be predetermined by the proxy node, the NSMF, and the access network device, or it may be the proxy. It is determined in real time through negotiation among the node, the NSMF, and the access network device.
  • the proxy node may negotiate in the following manner: the proxy node receives a slice management proxy request from a default AMF, and the slice management proxy request may carry the information of the access network to which the access network device belongs. It is identified that the slice management proxy request may be used to request the proxy node to perform a network slice proxy for an access network device in the access network. After receiving the slice management proxy request, the proxy node may further send the slice management proxy request to the NSMF.
  • NSSMF when NSSMF is not deployed in the access network, it can be determined through negotiation that the proxy node manages the access network slice in the access network to assist the NSMF to achieve the management of the end-to-end network slice. Optimize management of end-to-end network slices.
  • the proxy node sends an access network slice update request to the access network device supporting the network slice proxy, and the access network slice update request may carry second instruction information, where The second instruction information is used to indicate that the first core network slice and the created third core network slice share resources.
  • the access network device can update the resource sharing relationship between the first access network slice and the created access network slice according to the second instruction information, and ensure that the AN side and the CN side make consistent decisions. For example, if the proxy node updates the shared resources of the first core network slice and the created second core network slice to the shared resources of the first core network slice and the created third core network slice, the update content can be passed through the update
  • the second instruction information informs the AN side access network device.
  • the access network device may also update the resource sharing relationship of the first access network slice according to the decision of the CN side.
  • a network slicing management method may be performed by an access network device that supports a network slicing agent.
  • the steps of the specific method may be described as follows: receiving a connection from an agent node.
  • a network slice creation request, the access network slice creation request is used to request the creation of a first access network slice, and the access network slice creation request may carry first instruction information, where the first instruction information is used to indicate The first core network slice and the second core network slice share resources, and create the first access network slice according to the access network slice creation request, the first access network slice and the created second access Network slice shared resources, wherein the first core network slice and the first access network slice belong to a first end-to-end network slice, and the second core network slice and the second access network slice belong to The second end-to-end network slice created.
  • the access network device may learn the decision made by the CN side according to the first instruction information, and then may refer to the decision made by the CN side to make a decision consistent with the CN side.
  • the AN and the CN The created subnet slices belong to the same end-to-end network slice, which can prevent subsequent errors when using the end-to-end network slice.
  • the access network device may receive an access network slice creation request from a proxy node through a default AMF.
  • the access network device may further send a slice management proxy request to the default AMF, and the slice management proxy request carries a support slice.
  • a proxy flag bit and an identification of the access network device, and the support slice proxy flag bit is used to indicate that the access network device supports a network slice proxy.
  • the proxy node can manage the access network slice in the access network to assist the NSMF to implement the end Management of end-to-end network slices.
  • a network slice management method is provided.
  • the execution body of the method may be a default AMF.
  • the steps of the specific method may be described as follows: receiving an access network slice creation request from a proxy node, and the access network slice creation The request is used to request the creation of an access network slice, and the access network slice creation request carries first instruction information, where the first instruction information is used to indicate that the first core network slice and the second core network slice share resources, and The default AMF and the proxy node belong to the same core network, and send the access network slice to the access network device supporting the network slice proxy in the access network according to a pre-stored identifier of the access network device supporting the network slice proxy. Create request.
  • the default AMF after the default AMF sends the access network slice creation request to an access network device that supports a network slice proxy in the access network, it may further receive a response message from the access network device.
  • the response message includes the creation result of the access network slice, and a first list is sent to the proxy node according to the response message, where the first list includes the response message received by the default AMF within a preset time and includes Result of the creation of the access network slice.
  • the default AMF may further receive a first slice management proxy request from the access network device, the first slice
  • the management proxy request carries a support slice proxy flag and an identification of the access network device, and the support slice proxy flag is used to indicate that the access network device supports a network slice proxy.
  • the first ratio is greater than a first threshold
  • the default AMF sends a second slice management agent request to the proxy node according to the first slice management agent request, wherein the first ratio is to the access network to the access point within a preset time.
  • the second slice management proxy request is used to request the proxy node to perform a network slice proxy for the access network device in the access network.
  • a network slice management method is provided.
  • the execution body of the method may be NSSF.
  • the steps of the specific method may be as follows: receiving a slice management agent request from an agent node, and the slice management agent request carries access The network identification and the identity of the proxy node, the slice management proxy request is used to request the proxy node to perform a network slice proxy for the access network device in the access network, and send the proxy node to the proxy node to carry the proxy node
  • the identified network slice creation request is used to request the creation of an end-to-end network slice that shares resources with the created end-to-end network slice.
  • the end-to-end network slice includes a core network slice and an access. Net slice.
  • the NSMF receives a first list from the proxy node, and the first list includes a creation result of the access network slice.
  • a network slicing management device has a function of implementing the behavior of a proxy node in any of the first aspect and the first possible design of the first aspect.
  • the functions may be implemented by hardware, and may also be implemented by hardware executing corresponding software.
  • the hardware or software includes one or more modules corresponding to the functions described above.
  • the device may be a chip or an integrated circuit.
  • the device includes a memory and a processor.
  • the memory stores a set of programs.
  • the processor is configured to execute the programs stored in the memory.
  • the device may execute the first aspect and the first aspect. The method described in any of the possible designs.
  • the device further includes a transceiver for communication between the device and other network elements.
  • the device is a proxy node
  • the proxy node may be a newly added node in the CN or may be integrated on the NSSMF in the CN.
  • a network slicing management device has a function of implementing the behavior of an access network device in any one of the second aspect and the second possible design of the second aspect.
  • the functions may be implemented by hardware, and may also be implemented by hardware executing corresponding software.
  • the hardware or software includes one or more modules corresponding to the functions described above.
  • the device may be a chip or an integrated circuit.
  • the device includes a memory and a processor.
  • the memory stores a set of programs.
  • the processor is configured to execute the programs stored in the memory.
  • the device may execute the second aspect and the second aspect. The method described in any of the possible designs.
  • the device further includes a transceiver for communication between the device and other network elements.
  • the device is an access network device.
  • a network slicing management device has a function of implementing the default AMF behavior in any of the foregoing third aspect and the third possible design.
  • the functions may be implemented by hardware, and may also be implemented by hardware executing corresponding software.
  • the hardware or software includes one or more modules corresponding to the functions described above.
  • the device may be a chip or an integrated circuit.
  • the device includes a memory and a processor.
  • the memory stores a set of programs.
  • the processor is configured to execute the programs stored in the memory.
  • the device may execute the third aspect and the third aspect. The method described in any of the possible designs.
  • the device further includes a transceiver for communication between the device and other network elements.
  • the device is the default AMF.
  • a network slicing management device has a function of realizing the NSMF behavior in any one of the foregoing fourth aspect and the fourth possible design.
  • the functions may be implemented by hardware, and may also be implemented by hardware executing corresponding software.
  • the hardware or software includes one or more modules corresponding to the functions described above.
  • the device may be a chip or an integrated circuit.
  • the device includes a memory and a processor.
  • the memory stores a set of programs.
  • the processor is configured to execute the programs stored in the memory.
  • the device may execute the fourth aspect and the fourth aspect. The method described in any of the possible designs.
  • the device further includes a transceiver for communication between the device and other network elements.
  • the device is NSMF.
  • a chip is provided, the chip is connected to a memory or the chip includes a memory for reading and executing a software program stored in the memory, so as to implement the first, second, and third aspects as described above.
  • the fourth aspect any possible design of the first aspect, any possible design of the second aspect, any possible design of the third aspect, and any possible design of the fourth aspect Methods.
  • a communication system includes the devices described in any two aspects or any two or more of the first to fourth aspects.
  • a computer storage medium storing a computer program, the computer program including instructions for performing the foregoing aspects and any possible design method in each aspect.
  • a computer program product is provided.
  • the computer reads and executes the computer program product, the computer is caused to execute the method described in the foregoing aspects and any possible design of each aspect.
  • FIG. 1 is a schematic diagram of a system architecture according to an embodiment of the present application.
  • FIG. 2 is a second schematic diagram of a system architecture according to an embodiment of the present application.
  • 3a is a third schematic diagram of a system architecture provided by an embodiment of the present application.
  • 3b is a fourth schematic diagram of a system architecture according to an embodiment of the present application.
  • FIG. 4 is a flowchart of a network slice management method according to an embodiment of the present application.
  • FIG. 5 is a flowchart of another network slice management method according to an embodiment of the present application.
  • 6a is a fifth schematic diagram of a system architecture according to an embodiment of the present application.
  • 6b is a sixth schematic diagram of a system architecture according to an embodiment of the present application.
  • FIG. 7 is a flowchart of another network slice management method according to an embodiment of the present application.
  • FIG. 8 is a flowchart of another network slice management method according to an embodiment of the present application.
  • FIG. 9 is a flowchart of still another network slice management method according to an embodiment of the present application.
  • FIG. 10 is a flowchart of still another network slice management method according to an embodiment of the present application.
  • FIG. 11 is a flowchart of another network slice management method according to an embodiment of the present application.
  • FIG. 12 is one of the schematic structural diagrams of a network slice management apparatus according to an embodiment of the present application.
  • FIG. 13 is a second schematic structural diagram of a network slice management device according to an embodiment of the present application.
  • FIG. 14 is a third schematic structural diagram of a network slice management device according to an embodiment of the present application.
  • FIG. 15 is a fourth schematic structural diagram of a network slice management apparatus according to an embodiment of the present application.
  • FIG. 16 is a fifth schematic structural diagram of a network slice management apparatus according to an embodiment of the present application.
  • the present application provides a network slice management method and device, which are used to assist NSMF to optimize end-to-end network slice management through a proxy node.
  • the method and device are based on the same or similar concept of the same invention. Since the principle of the method and the device to solve the problem is similar, the implementation of the device and the method can be referred to each other, and the duplicates will not be repeated.
  • "and / or” describes the association relationship of the associated objects, and indicates that there can be three kinds of relationships. For example, A and / or B can mean: A exists alone, A and B exist simultaneously, and There are three cases of B.
  • the character "/" generally indicates that the related objects are an "or" relationship.
  • At least one involved in this application means one or more; multiple means two or more.
  • the words “first” and “second” are used only for the purpose of distinguishing descriptions, and cannot be understood as indicating or implying relative importance, nor as indicating Or imply order.
  • At least one means one or more; “at least one” means one or more; multiple means two or more.
  • the network slice management method provided in the embodiment of the present application may be applicable to a 5G communication system, and may also be applicable to a new communication system in the future (such as the 6th-generation (6G) mobile communication system, etc.). .
  • FIG. 1 exemplarily shows a schematic diagram of a system architecture applicable to the embodiment of the present application, and the embodiment of the present application is not limited to be applied to the system architecture shown in FIG. 1.
  • Each network element shown in FIG. 1 may be hardware, software divided in function, or a combination of the two.
  • the system architecture provided in the embodiment of the present application includes a terminal, an access network (AN) device, and an access and mobility management network element (also referred to as: access and mobility management functions).
  • the terminal establishes communication with the DN through the access network equipment and the user plane network element.
  • the network elements involved in the embodiments of the present application may also be referred to as functions or functional entities.
  • the network slice management network element may also be referred to as a network slice management function or a network slice management function entity, access and mobility.
  • the mobility management network element may be referred to as an access and mobility management function or an access and mobility management function entity.
  • the names of the various network elements are not limited in this application. Those skilled in the art may change the names of the above network elements to other names and perform the same functions, which all fall within the protection scope of this application.
  • system architecture shown in FIG. 1 may be the 5G system architecture shown in FIG. 2.
  • the functions of each network element or device are described below.
  • Terminals also known as user equipment (UE), mobile stations (MS), mobile terminals (MT), terminal equipment, etc.
  • UE user equipment
  • MS mobile stations
  • MT mobile terminals
  • terminal equipment etc.
  • the terminal includes a handheld device having a wireless connection function, a vehicle-mounted device, and the like.
  • the terminals can be: mobile phones, tablet computers, laptops, palmtop computers, mobile internet devices (MID), wearable devices, virtual reality (VR) devices, augmented reality (augmented) Reality (AR) equipment, wireless terminals in industrial control, wireless terminals in self-driving, wireless terminals in remote medical surgery, wireless in smart grid Terminals, wireless terminals in transportation safety, wireless terminals in smart cities, or wireless terminals in smart homes.
  • MID mobile internet devices
  • VR virtual reality
  • AR augmented reality
  • wireless terminals in industrial control wireless terminals in self-driving
  • wireless terminals in remote medical surgery wireless in smart grid Terminals
  • wireless terminals in transportation safety wireless terminals in smart cities, or wireless terminals in smart homes.
  • the access network equipment (also called AN equipment) is responsible for the wireless side access of the terminal.
  • Possible deployment forms include: a centralized unit (CU) and distributed unit (DU) separation scenario; and Single-site scenario.
  • Single site includes gNB / NR-NB, transmission receiving point (TRP), evolved Node B (eNB), radio network controller (RNC), and node B (Node B) NB), base station controller (BSC), base transceiver station (BTS), home base station (e.g., home NodeB, or home NodeB, HNB), baseband unit (base band unit, BBU), or wireless fidelity (Wifi) access point (AP).
  • TRP transmission receiving point
  • eNB evolved Node B
  • RNC radio network controller
  • Node B Node B
  • BSC base station controller
  • BTS base transceiver station
  • home base station e.g., home NodeB, or home NodeB, HNB
  • baseband unit base band unit, BBU
  • AP wireless
  • the CU supports radio resource control (radio resource control, RRC), packet data convergence protocol (PDCP), service data adaptation protocol (service data adaptation protocol, SDAP) and other protocols.
  • CUs are generally deployed at central offices and have relatively abundant computing resources.
  • DU mainly supports radio link control layer (radio link control, RLC), media access control layer (media access control, MAC) and physical layer (PHY) protocols.
  • DUs are generally deployed in a distributed manner. In general, more than one DU is connected to a CU.
  • the gNB has the functions of CU and DU, and is usually deployed as a single site.
  • the access and mobility management network element may be an access and mobility management function (AMF) in 5G.
  • AMF access and mobility management function
  • the access and mobility management network element is responsible for terminal access and mobility management in the mobile network.
  • the user plane network element may be a user plane function (UPF) in a 5G architecture, as shown in FIG. 2.
  • the UPF is responsible for message processing and forwarding.
  • DN which provides data transmission services for terminals
  • PDN network such as the Internet (Internet), IP Multi-media Service (IMS), and so on.
  • Internet Internet
  • IMS IP Multi-media Service
  • the network slice management network element may be a network slice management function (NSMF) in the 5G architecture, which is used to manage the network slice of the entire network.
  • NSMF network slice management function
  • the network slice subnet management network element can be a network slice subnet management function (NSSMF) in the 5G architecture. It can be deployed in each subnet, for example, it can be deployed in the CN and AN for management. Network slices within a subnet.
  • the NSSMF deployed in the CN may be referred to as the NSSMF in the CN or the NSSMF in the CN domain.
  • the NSSMF deployed in the AN may be referred to as the NSSMF in the AN or the NSSMF in the AN domain.
  • the name of the NSSMF deployed in the subnet is not limited in this application.
  • the system architecture shown in FIG. 1 may also be a 5G system architecture shown in FIG. 3a.
  • Figure 3a illustrates the deployment of NSSMF in AN and CN respectively as an example.
  • end-to-end network slices can be managed through NSMF.
  • end-to-end network slices can be created, updated, or destroyed through NSMF.
  • the NSMF can send network slice creation requests to the NSSMF in the AN and the NSSMF in the CN, respectively.
  • the NSSMF in the AN creates the access network slice according to the network slice creation request, and the NSSMF in the CN according to the network.
  • the slice creation request creates a core network slice, thereby completing the creation of an end-to-end network slice.
  • the NSMF does not understand the implementation details of the core and access network control planes, the NSMF may not be able to make accurate decisions.
  • an embodiment of the present application provides a network slice management method for optimizing management of an end-to-end network slice.
  • FIG. 4 it is a flowchart of a network slice management method according to an embodiment of the present application.
  • the method includes the following processing flow.
  • the proxy node receives a network slice creation request from the NSMF.
  • the network slice creation request may be used to request to create a first end-to-end network slice that shares resources with the created end-to-end network slice.
  • the first end-to-end network slice may include a first core network slice and a first Access network slicing.
  • shared resources may refer to sharing virtual machines or containers.
  • the proxy node may be a newly added node in the CN, or it may be integrated on the NSSMF in the CN. In the embodiment of the present application, the proxy node is a newly added node in the CN.
  • the network slice creation request may also be referred to as an end-to-end network slice creation request or a slice creation request.
  • the end-to-end network slice can be a slice that provides end-to-end network services from AN to CN for the terminal, and can also be called a network slice or slice.
  • the end-to-end network slice may include a network slice in a core network and a network slice in an access network.
  • the network slice in the core network can also be referred to as the network slice in the CN domain or the core network slice, and the network slice in the access network can also be called the network slice or access network slice in the AN domain.
  • AN and CN may be collectively referred to as a subnet, and may also be referred to as a subnetwork or a subdomain.
  • the network slices in the core network and the network slices in the access network may be collectively referred to as a sub-network slice, a sub-network slice, or a sub-domain slice.
  • the proxy node creates a first core network slice according to the network slice creation request.
  • the first core network slice shares resources with the created second core network slice.
  • the network slice creation request may carry the identity of the second end-to-end network slice.
  • the network slice creation request may be used to request the creation of a first end-to-end network slice that shares resources with the second end-to-end network slice. That is, the NSMF can request the creation of a first end-to-end network slice that shares resources with a particular end-to-end network slice.
  • the proxy node itself can determine that the first end-to-end network slice to be created shares resources with a particular created end-to-end network slice. The following section describes how the agent node creates the first core network slice in detail.
  • the proxy node can create a first end-to-end network slice that shares the resource with a second end-to-end network slice specified by NSMF, or it can create an The end-to-end network slice shares the first end-to-end network slice of the resource. Detailed examples are given below for different situations.
  • the proxy node sends an access network slice creation request to an access network device that supports a network slice proxy.
  • the access network slice creation request may be used to request creation of a first access network slice, and the access network slice creation request may carry first indication information, where the first indication information is used to indicate the first core network slice and the second core network slice.
  • Core network slices share resources.
  • the proxy node may send an access network slice creation request to the access network device through control plane signaling.
  • the following describes in detail how the proxy node creates the first end-to-end network slice.
  • the network slice creation request carries an identifier of a second end-to-end network slice
  • the second end-to-end network slice includes a second core network slice
  • the proxy node may carry the identifier in the network slice creation request. Identification of the second end-to-end network slice, to determine the second core network slice included in the second end-to-end network slice corresponding to the identification, and then to create a second core network slice included in the second end-to-end network slice
  • the first core network slice of the shared resource That is, the proxy node may create a first core network slice that shares resources with the core network slice included in the second end-to-end network slice according to the identity of the second end-to-end network slice.
  • the second end-to-end network slice includes a second core network slice. It can also be understood that the second core network slice belongs to the second end-to-end network slice.
  • the proxy node may create a first core network slice according to the network slice creation request and resource sharing slice information of a core network to which the proxy node belongs.
  • the resource sharing slice information of the core network to which the proxy node belongs may include information of a core network slice that has been created in the core network to which the proxy node belongs and supports resource sharing.
  • the information of the core network slice may include an identifier of the core network slice, a resource occupation rate, and the like.
  • the resource occupation rate of the core network slice in this application may include the resource occupation rate of a virtual machine or a container in which the core network slice is deployed.
  • the following uses core network slice information including the identifier of the core network slice or the identifier of the core network slice and the resource occupancy rate as an example to the proxy node according to the network slice creation request and the resources of the core network to which the proxy node belongs. Share slice information and create a first core network slice for illustration.
  • the resource sharing slice information of the core network to which the proxy node belongs may include the one that has been created, Moreover, the identifier of the core network slice supporting resource sharing is supported, and the proxy node may create a first core network slice of the core network slice shared resource corresponding to the identifier according to the identifier.
  • the resource sharing slice information of the core network to which the proxy node belongs may include at least two The identifier of the core network slice that has been created and supports resource sharing and the resource occupancy rate.
  • the proxy node may determine the core network slice with the lowest resource occupancy among at least two core network slices included in the core network to which the proxy node belongs, and create a second core network slice according to the network slice creation request and the first The identification of the two core network slices creates a first core network slice that shares resources with the second core network slice.
  • the core network to which the proxy node belongs includes three core network slices that have been created, namely core network slice A, core network slice B, and core network slice C
  • the resource sharing slice of the core network to which the proxy node belongs The information may include the identification and resource occupancy of core network slice A, core network slice B, and core network slice C. It is further assumed that the identification of core network slice A is identification A, the resource occupancy rate is 30%, and the identification of core network slice B is Identity B, resource occupancy rate is 70%, core network slice C is identity C, and resource occupancy rate is 50%.
  • the proxy node After receiving the network slice creation request from NSMF, the proxy node can determine the need to create and The first end-to-end network slice of the created end-to-end network slice sharing resources can be further determined to create a first core network slice that shares resources with the created core network slice. In order to ensure that the created first core network slice has With sufficient resources, the proxy node can root to create a first core network slice that shares resources with the core network slice A that has the lowest resource usage. With the method provided by this example, the proxy node can create a first core network slice that shares resources with the core network slice that has been created and has the lowest resource usage according to the resource consumption of the core network slice in the core network to which the proxy node belongs. In order to optimize the effect of resource sharing. It solves the problem of low resource utilization caused by NSMF in the prior art because it cannot sense the resource consumption of subnet slices in the core network and access network. Obviously, the method of the present application can optimize the management of network slices.
  • the network slice creation request carries the identity of the second end-to-end network slice
  • the resource sharing slice information of the core network to which the proxy node belongs includes the identity of the core network slice in the second end-to-end network slice.
  • resource usage when the proxy node determines that the resource occupation rate of the core network slice in the second end-to-end network slice is less than a preset value, the proxy node determines the core network slice in the second end-to-end network slice as the second core Network slice, and create a first core network slice according to the network slice creation request and the identity of the second core network slice.
  • a first core network slice that shares resources with the created core network slice may be created.
  • the requirements of the end-to-end network slicing may include delay requirements, isolation requirements, and the like.
  • the resource sharing slice information of the core network to which the proxy node belongs includes the identity 22 of the core network slice in the second end-to-end network slice.
  • the resource occupancy rate is 40%, assuming the preset value is 50%, after receiving the network slice creation request from NSMF, the proxy node can determine the need to create a share with the created second end-to-end network slice according to the request.
  • the first end-to-end network slice of the resource can further determine the need to create a first core network slice that shares the resource with the core network slice in the second end-to-end network slice, and the proxy node can further determine the second end-to-end network slice
  • the resource occupancy rate of the core network slice of 40% is less than a preset value of 50%, so that a first core network slice that shares resources with the core network slice in the second end-to-end network slice can be created.
  • the proxy node creates a first shared resource with the core network slice in the second end-to-end network slice when the resource occupation rate of the core network slice in the second end-to-end network slice is less than a preset value.
  • a core network slice to optimize resource sharing.
  • the preset value can be set according to the actual application scenario.
  • the principle for setting the preset value may be that after the core network slice with the resource occupancy rate less than the preset value shares resources with the first core network slice, the two core network slices sharing the resource can be used normally.
  • the network slicing management method provided by the embodiment of the present application is described in more detail below with reference to the flow shown in FIG. 4. As shown in FIG. 5, the flow of the network slice management method is as follows. The description of the new node in the CN is based on the proxy node.
  • S501-S503 can refer to the descriptions of S401-S403, which will not be repeated here.
  • the proxy node may receive the network slice creation request from the NSMF through the NSSMF in the CN, see S501a and S501b in FIG. 5.
  • the proxy node sends an access network slice creation request to an access network device supporting a network slice proxy through a default AMF, as shown in S503a-S503c in FIG. 5.
  • the AMF After receiving the access network slice creation request from the proxy node by default, the AMF sends the access to the access network device supporting the network slice proxy in the access network according to the pre-stored identification of the access network device supporting the network slice proxy. Net slice creation request.
  • the access network device in FIG. 5 refers to an access network device that supports a network slicing agent.
  • the proxy node may also interact with the access network device supporting the network slice proxy through another AMF (different from the default AMF), which is not limited in this application.
  • the terminal when the terminal is not sure to access a specific AMF after registering to the network, it chooses to access the default AMF.
  • steps marked with a solid line in FIG. 5 are all steps that must be performed, such as S501, S502, and S503, and the steps marked with a dotted line are optional steps, such as S503a, S503c, S501a and S501b.
  • steps marked with a solid line in the drawings involved in this application are all steps that must be performed, and steps marked with a dotted line are optional steps.
  • the access network device supporting the network slice proxy in the access network After the access network device supporting the network slice proxy in the access network receives the access network slice creation request sent by the proxy node, it may execute S504.
  • S504 The access network device supporting the network slice proxy in the access network creates a first access network slice according to the access network slice creation request.
  • an access network device that supports a network slice proxy in the access network may create a first access network slice according to a delay requirement, an isolation requirement, etc. carried in the access network slice creation request.
  • the first access network slice and the created second access network slice share resources.
  • the second core network slice and the second access network slice belong to the created second end-to-end network slice.
  • S505 The access network device supporting the network slice proxy in the access network sends a response message to the default AMF.
  • the response message may include the creation result of the access network slice.
  • the creation result may be the creation success or failure.
  • S506 The default AMF sends the first list to the proxy node according to the response message.
  • the first list may include the creation result of the access network slice included in the response message received by the default AMF within a preset time. For example, suppose that there are 500 access network devices in the access network that support network slicing agents. Each access network device that supports the network slicing agent can create the first access network slice according to the access network slice creation request. Send a response message including the creation result of the access network slice to the default AMF, but each access network device that supports the network slice agent may not send a response message to the default AMF at the same time, the default AMF can receive each support within a preset time The response message sent by the access network device of the network slicing agent.
  • the 450 response messages can be included in the response message.
  • the creation result of the access network slice forms a first list, and sends the first list to the proxy node.
  • S507 The proxy node receives the first list from the default AMF.
  • the proxy node After the proxy node receives the first list sent by the default AMF, it can be processed by the proxy node in the CN domain. For example, if the creation result included in the first list does not include the creation failure, the first list is ignored. If the included creation result includes a creation failure, the creation process can be re-initiated for the access network slice that failed to be created.
  • S508 may be executed.
  • S508 The proxy node sends the first list to the NSMF.
  • the NSMF performs subsequent processing after receiving the first list. For example, if the creation result included in the first list does not include the creation failure, the first list is ignored, and if the creation result included in the first list includes the creation failure, the creation process may be re-initiated for the slice that failed to be created.
  • the proxy node may send the first list to the NSMF through the NSSMF in the CN in step S508, see S508a and S508b in FIG. 5.
  • an access network device supporting a network slice proxy can be understood as that an access network slice in the access network device can be managed by a proxy node.
  • the ability of the proxy node to manage the access network slice in the access network device may be predetermined by the proxy node, NSMF, and access network device, or it may be real-time negotiation between the proxy node, NSMF, and access network device. definite.
  • the capability of the proxy node to manage the access network slice in the access network device is negotiated, see S500a-S500f in FIG. 5.
  • S500a The access network device sends a first slice management proxy request to the default AMF.
  • the first slice management proxy request is used to request a network slice proxy for the access network device.
  • the first slice management agent request may carry the identifier of the access network device.
  • the first slice management agent request may further carry a slice agent support flag.
  • the support slice proxy flag bit is used to indicate that the access network device supports a network slice proxy.
  • the support slice proxy flag can be one or more bits.
  • the AMF may further confirm the first slice management agent request, and may further send an acknowledgement to the access network device to receive the first slice management agent. Requested confirmation message.
  • the number of the access network devices may be one or more.
  • the default AMF forwards the first slice management agent request to the proxy node after receiving the first slice management agent request sent by the access network device.
  • the default AMF may execute S500b after receiving the first slice management agent request sent by the access network device.
  • S500b When the first ratio is greater than the first threshold, the default AMF sends a second slice management agent request to the proxy node according to the first slice management agent request.
  • the second slice management agent request may carry the identifier of the access network to which the access network device supporting the network slice agent belongs.
  • the second slice management proxy request is used to request the proxy node to perform a network slice proxy for an access network device in the access network.
  • the second slice management proxy request may also carry the identity of the proxy node.
  • the proxy node may further confirm the second slice management agent request, and may further send a confirmation message to the default AMF to confirm receipt of the second slice management agent request .
  • the first threshold may be an empirical value, and may be preset in a default AMF. For different application scenarios, the first threshold may be different.
  • the proxy node sends the third slice management proxy request to the NSMF according to the received second slice management proxy request.
  • the NSMF can learn that the above-mentioned proxy node can manage the access network slice in the access network, and will no longer manage the access network slice in the access network through NSMF. .
  • subsequent messages that the NSMF needs to send to the access network device in the access network may be sent by the proxy node.
  • the third slice management agent request may carry the identifier of the access network to which the access network device supporting the network slice agent belongs and the identifier of the proxy node.
  • the third slice management proxy request is used to request the proxy node to perform a network slice proxy for an access network device in the access network.
  • the proxy node may send the third slice management proxy request to the NSMF through the NSSMF in the CN, refer to S500e and S500f in FIG. 5.
  • the proxy node sends the third slice management proxy request to the NSSMF in the CN.
  • S500f The NSSMF in the CN sends the third slice management agent request to the NSMF.
  • the NSMF can learn that the above-mentioned proxy node can manage the access network slice in the access network, and will no longer manage the access network slice in the access network through NSMF. .
  • the NSMF may further confirm the third slice management agent request, and may further send a confirmation message to the proxy node to confirm receipt of the third slice management agent request.
  • the following uses the proxy node and NSMF to interact with the NSSMF in the CN, the proxy node and the access network device to interact with the default AMF, the network slice creation request to carry the identity of the second end-to-end network slice, and the proxy node is receiving the network from the NSMF
  • the ability of the proxy node to manage the access network slice in the access network device is taken as an example.
  • the message names involved, the network elements involved, and the main messages The types of cells, interfaces, and protocols carried are described in Table 1.
  • a proxy node can be added in the CN through the method of the above embodiment of the application.
  • the NSMF can send a network slice creation request to the proxy node in the CN first.
  • the agent node After the agent node creates the core network slice according to the network slice creation request, the agent node sends an access network slice creation request to the access network device supporting the network slice agent in the AN, and the agent node notifies the access network device CN
  • the decision made by the side is to make the AN side refer to the decision made by the CN side, and then make a decision consistent with the CN side.
  • a proxy node can be added in the CN through the method of the above embodiment of the application.
  • the NSMF can support the network slice proxy in the AN through the proxy node
  • the access network device sends a network slice creation request to implement the creation of an end-to-end network slice.
  • the AN side can also refer to the decision made by the CN side, and then make a decision consistent with the CN side.
  • FIG. 7 is a flowchart of another network slice management method according to an embodiment of the present application.
  • Figure 7 illustrates the integration of a proxy node on the NSSMF in the CN.
  • the operations performed by the proxy node can be understood as being performed by the NSSMF in the CN.
  • the operations performed by S700a-S700d in FIG. 7 can be referred to S500a-S500d in FIG. 5.
  • S701-S708 in FIG. 7 refer to S501-S508 in FIG. 5, and details are not described herein again.
  • the difference is that the operations performed by the proxy node in FIG. 5 are all performed by the NSSMF in the CN in FIG. 7.
  • the third slice management agent request in FIG. 7 may carry the identifier of the NSSMF in the CN.
  • network slice creation is used as an example for description.
  • the network slice update may also use the foregoing method embodiments, as shown in FIG. 8 and FIG. 9.
  • the operations performed by S800a-S800f can be referred to S500a-S500f in FIG. 5, and the operations performed by S900a-S900d can be referred to S500a-S500d in FIG. 5, and the proxy node in FIG. 8
  • the NSSMF in the CN can also send an access network slice update request to an access network device that supports a network slice agent.
  • the access network slice update request carries second instruction information, and the second instruction information is used to indicate the first core.
  • the network slice and the created third core network slice share resources. In this way, the access network device may update the sharing relationship between the first access network slice and the created access network slice according to the second instruction information.
  • the proxy node shares resources with the first core network slice and the second core network slice. , Updating to share resources between the first core network slice and the third core network slice, and the third core network slice and the third access network slice belong to the third end-to-end network slice, and the proxy node sends the second to the access network device Instruction information to enable the access network device to share resources of the first access network slice and the second access network slice to update the first access network slice and the third access network slice to share resources, so that after updating the network slice
  • the AN and CN subnet slices belong to the same end-to-end network slice.
  • the response message in S805 in FIG. 8 and the response message in S905 in FIG. 9 may carry the update result of the access network slice, such as the update success or failure.
  • the second lists in FIG. 8 and FIG. 9 may include the update results of the access network slices fed back by multiple access network devices.
  • the proxy node and NSMF interact through the NSSMF in the CN
  • the proxy node and the access network device interact through the default AMF
  • the ability of the proxy node to manage the access network slice in the access network device is the proxy node, NSMF, and access network device.
  • Pre-agreed and the identification of the third end-to-end network slice carried in the network slice update request is taken as an example.
  • the message names involved, the network elements involved, and the messages that are mainly carried in the message Cells, interfaces / protocol types are described in Table 2.
  • network slice destruction may also use the foregoing method embodiments, as shown in FIG. 10 and FIG. 11.
  • the operations performed by S1000a-S1000f can be referred to S500a-S500f in FIG. 5, and the operations performed by S1100a-S1100d can be referred to S500a-S500d in FIG. 5, and the proxy node in FIG. 10
  • the NSSMF in the CN may also send an access network slice destruction request to an access network device that supports a network slice agent, and the access network slice destruction request may carry the identifier of the first access network slice. For example, assuming that the proxy node destroys the first core network slice, the proxy node sends the identification of the first access network slice to the access network device, so that the access network device destroys the first access network slice.
  • the response message in S1005 in FIG. 10 and the response message in S1105 in FIG. 11 may carry the destruction result of the access network slice, such as the destruction success or failure.
  • the third list in FIG. 10 and FIG. 11 may include the destruction result of the access network slice fed back by multiple access network devices.
  • the proxy node and NSMF interact through the NSSMF in the CN
  • the proxy node and the access network device interact through the default AMF
  • the ability of the proxy node to manage the access network slice in the access network device is the proxy node, NSMF, and access network device.
  • Pre-agreed, and the identification of the first end-to-end network slice carried in the network slice destruction request is taken as an example.
  • the message names involved, the network elements involved, and the messages that are mainly carried in the message Cells, interfaces / protocol types are described in Table 3.
  • an embodiment of the present application further provides a network slice management device 1200, which is configured to perform an operation performed by a proxy node in the foregoing network slice management method.
  • the device 1200 may include a receiving unit 1201, a processing unit 1202, and a sending unit 1203.
  • a receiving unit 1201 is configured to receive a network slice creation request from the NSMF, where the network slice creation request is used to request the creation of a first end-to-end network slice that shares resources with the created end-to-end network slice, the first end
  • the end-to-end network slice includes a first core network slice and a first access network slice;
  • a processing unit 1202 configured to create the first core network slice according to the network slice creation request, and the first core network slice and the created second core network slice share resources;
  • a sending unit 1203 is configured to send an access network slice creation request to an access network device supporting a network slice proxy, where the access network slice creation request is used to request creation of the first access network slice, and the access network
  • the slice creation request carries first indication information, and the first indication information is used to instruct the first core network slice and the second core network slice to share resources.
  • the network slice creation request carries an identifier of a second end-to-end network slice, and the network slice creation request is used to request creation of a resource that is shared with the second end-to-end network slice.
  • the second end-to-end network slice includes the second core network slice.
  • the processing unit 1202 is configured to create the first core network slice according to the network slice creation request and resource sharing slice information of a core network to which the proxy node belongs, and the proxy
  • the resource sharing slice information of the core network to which the node belongs includes information of a core network slice that has been created in the core network and supports resource sharing.
  • the resource sharing slice information of the core network to which the proxy node belongs includes information of a core network slice that has been created and supports resource sharing, and the information of the core network slice includes information of the core network slice. Identification and resource usage.
  • the processing unit 1202 is configured to determine a core network slice with the lowest resource occupancy rate among the core network slices as the second core network slice; and create the request according to the network slice and the network slice. The identification of the second core network slice creates the first core network slice.
  • the network slice creation request carries an identifier of a second end-to-end network slice
  • resource sharing slice information of a core network to which the proxy node belongs includes the second end-to-end network slice.
  • Information of the core network slice, and the information of the core network slice includes an identifier of the core network slice and a resource occupation rate.
  • the processing unit 1202 is configured to, when the resource occupation rate of the core network slice in the second end-to-end network slice is less than a preset value, change the core in the second end-to-end network slice.
  • the network slice is determined as the second core network slice; and the first core network slice is created according to the network slice creation request and the identity of the second core network slice.
  • the sending unit 1203 sends an access network slice creation request to an access network device that supports a network slice proxy through a default AMF.
  • the receiving unit 1201 is further configured to receive a first list from the default AMF, and the first A list includes the creation result of the first access network slice by the access network device supporting the network slice proxy.
  • the sending unit 1203 is further configured to send the first list to the NSMF.
  • the receiving unit 1201 before receiving the network slice creation request from NSMF, is further configured to receive a slice management agent request from a default AMF, where the slice management agent request carries the access network.
  • the identifier of the access network to which the device belongs is used to request the proxy node to perform a network slice proxy for the access network device in the access network; the sending unit 1203 is further configured to send the slice management to the NSMF Proxy request.
  • the sending unit 1203 is further configured to send an access network slice update request to the access network device supporting the network slice proxy, and the access network slice update request carries a second instruction.
  • Information, and the second indication information is used to indicate that the first core network slice and the created third core network slice share resources.
  • an embodiment of the present application further provides a network slice management apparatus 1300 for performing operations performed by an access network device in the foregoing network slice management method.
  • the apparatus 1300 may include a receiving unit 1301 and a processing unit 1302.
  • it may further include a sending unit 1303.
  • a receiving unit 1301 is configured to receive an access network slice creation request from a proxy node.
  • the access network slice creation request is used to request creation of a first access network slice, and the access network slice creation request carries a first instruction.
  • Information, the first indication information is used to indicate that the first core network slice and the second core network slice share resources, and the access network device supports a network slice agent;
  • a processing unit 1302 is configured to create the first access network slice according to the access network slice creation request, and the first access network slice and the created second access network slice share resources;
  • the first core network slice and the first access network slice belong to a first end-to-end network slice, and the second core network slice and the second access network slice belong to a created second end-to-end network slice.
  • the receiving unit 1301 receives an access network slice creation request from a proxy node through a default AMF.
  • the sending unit 1303 is configured to send a slice management proxy request to the default AMF, and the slice management proxy request carries a support for a slice proxy flag Bit and the identifier of the access network device, and the support slice proxy flag bit is used to indicate that the access network device supports a network slice proxy.
  • an embodiment of the present application further provides a network slice management device 1400, which is configured to perform an operation performed by a default AMF in the foregoing network slice management method.
  • the apparatus 1400 may include a receiving unit 1401 and a sending unit 1402. Optionally, it may further include a processing unit 1403.
  • the receiving unit 1401 is configured to receive an access network slice creation request from a proxy node, where the access network slice creation request is used to request creation of an access network slice, and the access network slice creation request carries first indication information, The first indication information is used to indicate that the first core network slice and the second core network slice share resources, and the default AMF and the proxy node belong to the same core network;
  • the sending unit 1402 is configured to send the access network slice creation request to an access network device that supports the network slice proxy in the access network according to a pre-stored identifier of the access network device that supports the network slice proxy.
  • the receiving unit 1401 is further configured to receive a request from the receiving unit 1401.
  • the sending unit 1402 is configured to send a first list to the proxy node according to the received response message, and the first list
  • the creation result of the access network slice included in the response message received by the default AMF within a preset time is included.
  • the receiving unit 1401 before the receiving unit 1401 is configured to receive an access network slice creation request from a proxy node, it may also be configured to receive a first slice management proxy request from the access network device.
  • the first slice management agent request carries a support slice agent flag bit and an identifier of the access network device, and the support slice agent flag bit is used to indicate that the access network device supports a network slice agent;
  • the sending unit 1402 is further configured to send a second slice management agent request to the proxy node according to the first slice management agent request when the first ratio is greater than a first threshold, where the first ratio is within a preset time A ratio of the number of access network devices in the access network that sends the first slice management agent request to the default AMF to the number of all access network devices included in the access network, the first The two-slice management agent request carries the identifier of the access network, and is used to request the proxy node to perform a network slice proxy for the access network device in the access network.
  • an embodiment of the present application further provides a network slice management device 1500 for performing operations performed by the NSMF in the foregoing network slice management method.
  • the apparatus 1500 may include a receiving unit 1501 and a sending unit 1502.
  • a receiving unit 1501 is configured to receive a slice management proxy request from an agent node, where the slice management proxy request carries an identifier of an access network and the identity of the proxy node, and the slice management proxy request is used to request the proxy node Performing a network slice proxy for an access network device in the access network;
  • a sending unit 1502 is configured to send a network slice creation request carrying the identifier of the proxy node to the proxy node, where the network slice creation request is used to request the creation of an end-to-end shared resource with the created end-to-end network slice A network slice, which includes a core network slice and an access network slice.
  • the receiving unit 1501 is further configured to receive a first list from the proxy node, where the first list includes a creation result of the access network slice.
  • an embodiment of the present application further provides a network slice management device 1600, which is used to implement the proxy node and access in the method provided by the above embodiment.
  • the operations performed by network equipment, default AMF, or NSMF are for brief description.
  • the schematic diagram of the possible physical devices of each network element is illustrated by referring to FIG. 16. It can be understood that FIG. 16 is only a schematic diagram and can be applied to each of the foregoing. Different network elements.
  • the network slice management device 1600 includes a transceiver 1601, a processor 1602, and a memory 1603.
  • the processor 1602 is configured to call a group of programs, and when the programs are executed, cause the processor 1602 to perform operations performed by the proxy node, the access network device, the default AMF, or the NSMF in one of the methods provided by the foregoing embodiments.
  • the memory 1603 is configured to store a program executed by the processor 1602.
  • the above-mentioned sending unit and receiving unit in FIG. 11 to FIG. 14 may be implemented by the transceiver 1601, and the processing unit may be implemented by the processor 1602.
  • the processor 1602 may be a central processing unit (CPU), a network processor (NP), or a combination of a CPU and an NP.
  • CPU central processing unit
  • NP network processor
  • the processor 1602 may further include a hardware chip.
  • the hardware chip may be an application-specific integrated circuit (ASIC), a programmable logic device (PLD), or a combination thereof.
  • the PLD may be a complex programmable logic device (CPLD), a field-programmable gate array (FPGA), a generic array logic (GAL), or any combination thereof.
  • the memory 1603 may include volatile memory (for example, random-access memory (RAM); the memory 1603 may also include non-volatile memory (for example, flash memory) memory), hard disk (HDD) or solid-state drive (SSD); the memory 1603 may also include a combination of the above types of memory.
  • volatile memory for example, random-access memory (RAM)
  • non-volatile memory for example, flash memory
  • HDD hard disk
  • SSD solid-state drive
  • the memory 1603 may also include a combination of the above types of memory.
  • an embodiment of the present application further provides a chip, including a processor, for supporting the device to implement functions related to the method provided in the foregoing embodiment.
  • the chip is connected to a memory or the chip includes a memory, and the memory is used to store program instructions and data necessary for the device.
  • An embodiment of the present application provides a computer storage medium storing a computer program, where the computer program includes instructions for executing the method provided by the foregoing embodiment.
  • the embodiment of the present application provides a computer program product containing instructions, which when run on a computer, causes the computer to execute the method provided by the foregoing embodiment.
  • this application may be provided as a method, a system, or a computer program product. Therefore, this application may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Moreover, this application may take the form of a computer program product implemented on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, etc.) containing computer-usable program code.
  • computer-usable storage media including, but not limited to, disk storage, CD-ROM, optical storage, etc.
  • These computer program instructions may also be stored in a computer-readable memory capable of directing a computer or other programmable data processing device to work in a particular manner such that the instructions stored in the computer-readable memory produce a manufactured article including an instruction device, the instructions
  • the device implements the functions specified in one or more flowcharts and / or one or more blocks of the block diagram.
  • These computer program instructions can also be loaded on a computer or other programmable data processing device, so that a series of steps can be performed on the computer or other programmable device to produce a computer-implemented process, which can be executed on the computer or other programmable device.
  • the instructions provide steps for implementing the functions specified in one or more flowcharts and / or one or more blocks of the block diagrams.

Abstract

A network slice management method and apparatus, for optimizing end-to-end network slice management. Said method comprises: a proxy node receiving a network slice creation request from an NSMF, the network slice creation request being used to request for the creation of a first end-to-end network slice sharing resources with a created end-to-end network slice, the first end-to-end network slice including a first core network slice and a first access network slice; creating the first core network slice according to the network slice creation request, the first core network slice sharing resources with a created second core network slice; and sending an access network slice creation request to an access network device supporting a network slice proxy, the access network slice creation request being used to request for the creation of the first access network slice, the access network slice creation request carrying first instruction information, the first instruction information being used to instruct the first core network slice and the second core network slice to share resources.

Description

一种网络切片管理方法及装置Network slice management method and device
本申请要求于2018年8月31日提交中国国家知识产权局、申请号为201811010266.9、发明名称为“一种网络切片管理方法及装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。This application claims the priority of a Chinese patent application filed with the State Intellectual Property Office of China on August 31, 2018, with application number 201811010266.9, and the invention name is "A Method and Device for Network Slice Management", the entire contents of which are incorporated by reference In this application.
技术领域Technical field
本申请涉及通信技术领域,尤其涉及一种网络切片管理方法及装置。The present application relates to the field of communications technologies, and in particular, to a network slice management method and device.
背景技术Background technique
第五代(the 5th-generation,5G)移动通信系统中引入网络切片技术,以应对不同通信业务对网络性能需求的差异。相关技术中,将可实现为终端提供从接入网(access network,AN)到核心网(core network,CN)的端到端网络服务的切片,称为端到端网络切片。以下将AN和CN统称为子网。其中端到端网络切片可包括子网切片,例如核心网切片、接入网切片等。The 5th-generation (5G) mobile communication system introduces network slicing technology to cope with the difference in network performance requirements of different communication services. In the related art, a slice that can be implemented to provide a terminal with an end-to-end network service from an access network (AN) to a core network (CN) is called an end-to-end network slice. Hereinafter, AN and CN are collectively referred to as a subnet. The end-to-end network slice may include a subnet slice, such as a core network slice and an access network slice.
现有技术中,通过网络切片管理功能(network slice management function,NSMF)来管理端到端网络切片,例如,可通过NSMF创建、更新或者销毁端到端网络切片。以创建端到端网络切片为例,NSMF可分别向子网内部署的网络切片子网管理功能(network slice subnet management function,NSSMF)发送网络切片创建请求,各个子网内的NSSMF分别根据网络切片创建请求创建子网切片,进而实现端到端网络切片的创建。In the prior art, an end-to-end network slice is managed by a network slice management function (NSMF). For example, an end-to-end network slice can be created, updated, or destroyed through NSMF. Taking the creation of an end-to-end network slice as an example, NSMF can send network slice creation requests to the network slice subnet management function (NSSMF) deployed in the subnet. The NSSMF in each subnet is based on the network slice. The creation request creates a subnet slice, thereby realizing the creation of an end-to-end network slice.
早期的网络切片研究主要集中在核心网,对接入网切片的研究比较匮乏,针对AN内的NSSMF部署较晚,可能存在AN内未部署NSSMF的场景,这种场景下,NSMF无法实现对接入网切片进行管理,进而也无法实现对端到端网络切片的管理。Earlier research on network slicing mainly focused on the core network, and research on access network slicing was relatively scarce. For the NSSMF deployment in the AN was late, there may be scenarios where the NSSMF is not deployed in the AN. In this scenario, the NSMF cannot be connected. The network slice is managed, and the end-to-end network slice cannot be managed.
此外,即使AN内已部署NSSMF,由于NSMF对各个子网控制面的实现细节不了解,也可能导致各个子网内的NSSMF管理子网切片时做出不一致的决策。In addition, even if NSSMF has been deployed in the AN, because NSMF does not understand the implementation details of the control plane of each subnet, it may lead to inconsistent decisions made by NSSMF in each subnet when managing the subnet slicing.
发明内容Summary of the Invention
本申请实施例提供一种网络切片管理方法及装置,用以优化端到端网络切片的管理。The embodiments of the present application provide a network slice management method and device, which are used to optimize the management of end-to-end network slices.
本申请实施例提供的具体技术方案如下:The specific technical solutions provided in the embodiments of the present application are as follows:
第一方面,提供一种网络切片管理方法,该方法的执行主体可以是代理节点,代理节点可以是CN内新增的节点,也可以集成在CN内的NSSMF上。具体方法的步骤可以如下所述:接收来自NSMF的网络切片创建请求,所述网络切片创建请求用于请求创建与已创建的端到端网络切片共享资源的第一端到端网络切片,所述第一端到端网络切片包括第一核心网切片和第一接入网切片,根据所述网络切片创建请求创建所述第一核心网切片,所述第一核心网切片和已创建的第二核心网切片共享资源,向支持网络切片代理的接入网设备发送接入网切片创建请求,所述接入网切片创建请求用于请求创建所述第一接入网切片,所述接入网切片创建请求中携带第一指示信息,所述第一指示信息用于指示所述第一核心网切片和所述第二核心网切片共享资源。在AN内未部署NSSMF的场景下,NSMF可通过该代理节点向AN内支持网络切片代理的接入网设备发送网络切片管理消息(例如网络切片创建请求),以实现端到端网 络切片的管理。在AN内部署NSSMF的场景下,NSMF不再像现有技术一样分别向AN和CN发送网络切片管理消息,而是将该网络切片管理消息先发送给CN内的代理节点,待代理节点根据该网络切片管理消息做出决策,再由代理节点向AN内支持网络切片代理的接入网设备发送网络切片管理消息,并由代理节点通知该接入网设备CN侧所做出的决策,以使AN侧的接入网设备可参考CN侧所做出的决策,进而做出与CN侧一致的决策。In a first aspect, a network slice management method is provided. The execution body of the method may be a proxy node. The proxy node may be a newly added node in the CN, or it may be integrated on the NSSMF in the CN. The steps of the specific method may be as follows: receiving a network slice creation request from NSMF, the network slice creation request is used to request the creation of a first end-to-end network slice that shares resources with the created end-to-end network slice, the The first end-to-end network slice includes a first core network slice and a first access network slice, and the first core network slice is created according to the network slice creation request, and the first core network slice and the created second The core network slice shares resources and sends an access network slice creation request to an access network device that supports a network slice proxy, where the access network slice creation request is used to request creation of the first access network slice, and the access network The slice creation request carries first indication information, and the first indication information is used to instruct the first core network slice and the second core network slice to share resources. In the scenario where NSSMF is not deployed in the AN, the NSMF can use this proxy node to send network slice management messages (such as network slice creation requests) to access network devices that support network slice agents in the AN to achieve end-to-end network slice management. . In the scenario where NSSMF is deployed in the AN, the NSMF no longer sends network slice management messages to the AN and CN separately as in the prior art. Instead, the network slice management message is first sent to the proxy node in the CN. The network slicing management message makes a decision, and then the proxy node sends a network slicing management message to the access network device supporting the network slicing proxy in the AN, and the proxy node notifies the decision made by the access network device CN side so that The access network equipment on the AN side can refer to the decision made by the CN side, and then make a decision consistent with the CN side.
示例性地,以一个实例对本申请实施例提供的网络切片管理方法进行举例说明。假设NSMF向代理节点发送网络切片创建请求,请求创建与已创建的端到端网络切片共享资源的端到端网络切片3,端到端网络切片3可包括核心网切片3和接入网切片3,其中已创建的端到端网络切片包括端到端网络切片1和端到端网络切片2,端到端网络切片1包括核心网切片1和接入网切片1,端到端网络切片2包括核心网切片2和接入网切片2。若采用现有的方法,在AN内已部署NSSMF的场景下,NSMF可以分别向CN内的NSSMF发送核心网切片创建请求,请求创建与已创建的核心网切片共享资源的核心网切片3,向AN内的NSSMF发送接入网切片创建请求,请求创建与已创建的接入网切片共享资源的接入网切片3,CN内的NSSMF可根据该核心网切片创建请求创建与已创建的核心网切片1或核心网切片2共享资源的核心网切片3,AN内的NSSMF可根据该接入网切片创建请求创建与已创建的接入网切片1或接入网切片2共享资源的接入网切片3,可能导致CN内的NSSMF创建与已创建的核心网切片1共享资源的核心网切片3,而AN内的NSSMF创建与已创建的接入网切片2共享资源的接入网切片3。这样,AN和CN内创建的子网切片不属于同一端到端网络切片,可能导致后续使用端到端网络切片3时出错。若采用现有的方法,在AN内未部署NSSMF的场景下,NSMF无法将接入网切片创建请求发送给AN,进而无法创建端到端网络切片。而采用本申请实施例提供的方法,NSMF可以向CN内的代理节点发送网络切片创建请求,代理节点根据该网络切片创建请求创建与已创建的核心网切片1共享资源的核心网切片3,并向AN内支持网络切片代理的接入网设备发送接入网切片创建请求,在该接入网切片创建请求中携带指示信息,指示核心网切片1和核心网切片3共享资源,这样,该支持网络切片代理的接入网设备可根据该接入网切片创建请求,创建与已创建的接入网切片1共享资源的接入网切片3,使得AN和CN内创建的子网切片属于同一端到端网络切片,可避免后续使用端到端网络切片3时出错。Exemplarily, the network slice management method provided by the embodiment of the present application is exemplified by an example. Suppose the NSMF sends a network slice creation request to the proxy node, requesting to create an end-to-end network slice 3 that shares resources with the created end-to-end network slice. The end-to-end network slice 3 may include core network slice 3 and access network slice 3. Among them, the created end-to-end network slice includes end-to-end network slice 1 and end-to-end network slice 2, end-to-end network slice 1 includes core network slice 1 and access network slice 1, and end-to-end network slice 2 includes Core network slice 2 and access network slice 2. If the existing method is adopted, in the scenario where the NSSMF is deployed in the AN, the NSMF can send core network slice creation requests to the NSSMF in the CN, requesting to create a core network slice 3 that shares resources with the created core network slice. The NSSMF in the AN sends an access network slice creation request to request the creation of an access network slice 3 that shares resources with the created access network slice. The NSSMF in the CN can create and create the core network according to the core network slice creation request. Slice 1 or core network slice 2 shares the core network slice 3 of the resource. The NSSMF in the AN can create an access network that shares resources with the created access network slice 1 or access network slice 2 according to the access network slice creation request. Slice 3 may cause NSSMF in CN to create core network slice 3 that shares resources with the created core network slice 1, while NSSMF in AN creates access network slice 3 that shares resources with the created access network slice 2. In this way, the subnet slices created in AN and CN do not belong to the same end-to-end network slice, which may cause subsequent errors when using end-to-end network slice 3. If the existing method is adopted, in a scenario where NSSMF is not deployed in the AN, the NSMF cannot send an access network slice creation request to the AN, and thus cannot create an end-to-end network slice. By using the method provided in the embodiment of the present application, the NSMF can send a network slice creation request to a proxy node in the CN. The proxy node creates a core network slice 3 that shares resources with the created core network slice 1 according to the network slice creation request, and Send an access network slice creation request to an access network device in the AN that supports a network slice proxy, and the access network slice creation request carries instruction information to instruct core network slice 1 and core network slice 3 to share resources. In this way, the support The access network device of the network slice proxy can create an access network slice 3 that shares resources with the created access network slice 1 according to the access network slice creation request, so that the subnet slices created in the AN and CN belong to the same end End-to-end network slicing can avoid errors when using end-to-end network slicing 3.
在一种可能的设计中,网络切片创建请求中可以携带第二端到端网络切片的标识,此时所述网络切片创建请求可以用于请求创建与所述第二端到端网络切片共享资源的所述第一端到端网络切片。也就是说,网络切片创建请求可以用于请求创建与某一特定端到端网络切片共享资源的第一端到端网络切片。In a possible design, the network slice creation request may carry the identity of the second end-to-end network slice. At this time, the network slice creation request may be used to request creation of a shared resource with the second end-to-end network slice. The first end-to-end network slice. That is, the network slice creation request can be used to request the creation of a first end-to-end network slice that shares resources with a particular end-to-end network slice.
本申请实施例中,以下描述代理节点如何创建所述第一核心网切片。In the embodiment of the present application, the following describes how a proxy node creates the first core network slice.
在一种可能的设计中,代理节点接收来自NSMF的网络切片创建请求,该网络切片创建请求中携带第二端到端网络切片的标识,用于请求创建与所述第二端到端网络切片共享资源的所述第一端到端网络切片,所述第二端到端网络切片包括所述第二核心网切片,代理节点创建所述第一核心网切片,所述第一核心网切片与所述第二端到端网络切片包括的所述第二核心网切片共享资源。In a possible design, the proxy node receives a network slice creation request from NSMF, and the network slice creation request carries an identifier of a second end-to-end network slice and is used to request creation of the second end-to-end network slice. The first end-to-end network slice of the shared resource, the second end-to-end network slice includes the second core network slice, the proxy node creates the first core network slice, and the first core network slice and the The second core network slice included in the second end-to-end network slice shares resources.
在一种可能的设计中,代理节点接收到来自NSMF的网络切片创建请求后,可根据所述网络切片创建请求以及所述代理节点所属的核心网的资源共享切片信息,创建所述第一核心网切片,所述代理节点所属的核心网的资源共享切片信息包括所述核心网中已创建的、且支持资源共享的核心网切片的信息。这样,代理节点可根据所述代理节点所属的核心网的资源共 享切片信息获知核心网控制面的实现细节,进而可结合核心网控制面的实现细节相对准确的创建所述第一核心网切片。In a possible design, after receiving the network slice creation request from the NSMF, the proxy node may create the first core according to the network slice creation request and resource sharing slice information of a core network to which the proxy node belongs. For network slices, the resource sharing slice information of the core network to which the proxy node belongs includes information about core network slices that have been created in the core network and support resource sharing. In this way, the proxy node can learn the implementation details of the core network control plane according to the resource sharing slice information of the core network to which the proxy node belongs, and then can relatively accurately create the first core network slice in combination with the implementation details of the core network control plane.
本申请实施例中,以下描述代理节点如何根据所述网络切片创建请求以及所述代理节点所属的核心网的资源共享切片信息,创建所述第一核心网切片。In the embodiment of the present application, the following describes how a proxy node creates the first core network slice according to the network slice creation request and resource sharing slice information of a core network to which the proxy node belongs.
在一种可能的设计中,所述代理节点所属的核心网的资源共享切片信息可包括已创建的、且支持资源共享的核心网切片的信息,所述核心网切片的信息包括核心网切片的标识和资源占用率。在该种设计中,代理节点可采用如下方式创建所述第一核心网切片:代理节点将所述核心网切片中资源占用率最低的核心网切片确定为所述第二核心网切片,并根据所述网络切片创建请求以及所述第二核心网切片的标识,创建所述第一核心网切片。在该种方式中,代理节点根据核心网切片的资源消耗情况,创建与已创建的、资源占用率最低的核心网切片,共享资源的所述第一核心网切片,以使资源共享效果最优。而现有技术中只能由NSMF来决策网络切片的资源共享,NSMF无法确切感知核心网和接入网中子网切片的资源消耗情况,因此当创建某个新的网络切片时,NSMF无法准确确定待创建的网络切片与已创建的哪个网络切片做资源共享的效果最优。显然,采用本申请的方法可优化网络切片的管理。In a possible design, the resource shared slice information of the core network to which the proxy node belongs may include information of a core network slice that has been created and supports resource sharing, and the information of the core network slice includes the core network slice. Identification and resource usage. In this design, the proxy node may create the first core network slice in the following manner: the proxy node determines the core network slice with the lowest resource occupation rate in the core network slice as the second core network slice, and The network slice creation request and the identity of the second core network slice create the first core network slice. In this method, the agent node creates and shares the first core network slice of the resource with the created core network slice with the lowest resource occupancy according to the resource consumption of the core network slice, so as to optimize the resource sharing effect. . However, in the prior art, the resource sharing of network slices can only be determined by NSMF. NSMF cannot accurately sense the resource consumption of subnet slices in the core network and the access network. Therefore, when creating a new network slice, NSMF cannot accurately Determine the network slice to be created and which network slice has been created to perform the best resource sharing. Obviously, the method of the present application can optimize the management of network slices.
在一种可能的设计中,所述网络切片创建请求中携带第二端到端网络切片的标识,所述代理节点所属的核心网的资源共享切片信息包括所述第二端到端网络切片中核心网切片的信息,且所述核心网切片的信息包括核心网切片的标识和资源占用率。在该种设计中,代理节点可采用如下方式创建所述第一核心网切片:当所述第二端到端网络切片中核心网切片的资源占用率小于预设值时,所述代理节点将所述第二端到端网络切片中核心网切片确定为所述第二核心网切片,并根据所述网络切片创建请求以及所述第二核心网切片的标识,创建所述第一核心网切片。在该种方式中,代理节点在所述第二端到端网络切片中核心网切片的资源占用率小于预设值的情况下,才创建与所述第二端到端网络切片中核心网切片共享资源的所述第一核心网切片,以使资源共享效果最优。In a possible design, the network slice creation request carries an identifier of a second end-to-end network slice, and resource sharing slice information of a core network to which the proxy node belongs includes the second end-to-end network slice. The information of the core network slice, and the information of the core network slice includes an identifier of the core network slice and a resource occupation rate. In this design, the proxy node may create the first core network slice in the following manner: When the resource occupation rate of the core network slice in the second end-to-end network slice is less than a preset value, the proxy node will The core network slice in the second end-to-end network slice is determined to be the second core network slice, and the first core network slice is created according to the network slice creation request and the identity of the second core network slice. . In this method, the proxy node creates the core network slice in the second end-to-end network slice only when the resource occupancy rate of the core network slice in the second end-to-end network slice is less than a preset value. The first core network slice of the resource is shared to optimize the resource sharing effect.
需要说明的是,所述预设值可根据实际应用场景设置。设置所述预设值的原则可以是,使得资源占用率小于预设值的核心网切片与所述第一核心网切片共享资源之后,两个共享资源的核心网切片可以正常使用。It should be noted that the preset value may be set according to an actual application scenario. The principle for setting the preset value may be that after a core network slice with a resource occupancy rate less than the preset value shares resources with the first core network slice, the two core network slices sharing the resource can be used normally.
在一种可能的设计中,所述代理节点可通过默认接入和移动性管理实体(access and mobility management function,AMF)向支持网络切片代理的接入网设备发送接入网切片创建请求。该种设计中,所述代理节点通过默认AMF向支持网络切片代理的接入网设备发送接入网切片创建请求之后,还可接收来自所述默认AMF的第一列表,所述第一列表中包括所述支持网络切片代理的接入网设备对所述第一接入网切片的创建结果。例如,所述创建结果可以是创建成功或失败。In a possible design, the proxy node may send an access network slice creation request to an access network device supporting a network slice proxy through a default access and mobility management entity (AMF). In this design, after the proxy node sends an access network slice creation request to an access network device that supports a network slice proxy through the default AMF, the proxy node may further receive a first list from the default AMF. A creation result of the first access network slice by the access network device supporting the network slice proxy. For example, the creation result may be the creation success or failure.
需要说明的是,在其它可能的设计中,所述代理节点也可通过其它AMF(不同于所述默认AMF)与支持网络切片代理的接入网设备进行交互,本申请对此不做限定。It should be noted that, in other possible designs, the proxy node may also interact with the access network device supporting the network slice proxy through other AMF (different from the default AMF), which is not limited in this application.
在一种可能的设计中,所述代理节点接收来自所述默认AMF的第一列表之后,还可向所述NSMF发送所述第一列表。进而使得所述NSMF可根据所述第一列表做出后续决策。例如,若第一列表中包括的创建结果均为创建成功,则NSMF不必执行其它操作。若第一列表中包括的创建结果中存在创建失败,则NSMF可针对创建失败的切片重新发起切片创建过程。In a possible design, after receiving the first list from the default AMF, the proxy node may further send the first list to the NSMF. Then, the NSMF can make subsequent decisions according to the first list. For example, if the creation results included in the first list are all created successfully, the NSMF need not perform other operations. If there is a creation failure in the creation result included in the first list, the NSMF may re-initiate the slice creation process for the slice that failed to be created.
本申请实施例中,支持网络切片代理的接入网设备,可以理解为所述接入网设备中的接入网切片可由所述代理节点管理。其中,由所述代理节点管理所述接入网设备中的接入网切 片的能力,可以是所述代理节点、所述NSMF以及所述接入网设备预先约定的,也可以是所述代理节点、所述NSMF以及所述接入网设备之间实时协商确定的。In the embodiment of the present application, an access network device that supports a network slice proxy can be understood as that an access network slice in the access network device can be managed by the proxy node. The ability of the proxy node to manage the access network slice in the access network device may be predetermined by the proxy node, the NSMF, and the access network device, or it may be the proxy. It is determined in real time through negotiation among the node, the NSMF, and the access network device.
在一种可能的设计中,所述代理节点接收来自NSMF的网络切片创建请求之前,可协商由所述代理节点管理所述接入网设备中的接入网切片的能力。该种设计中,所述代理节点可通过如下方式协商:所述代理节点接收来自默认AMF的切片管理代理请求,所述切片管理代理请求中可携带所述接入网设备所属的接入网的标识,所述切片管理代理请求可以用于请求所述代理节点为所述接入网中的接入网设备进行网络切片代理。代理节点接收到所述切片管理代理请求后,还可向所述NSMF发送所述切片管理代理请求。这样,在接入网中未部署NSSMF的情况下,可通过协商确定由所述代理节点管理接入网中的接入网切片,以协助所述NSMF实现端到端网络切片的管理,进而可优化端到端网络切片的管理。In a possible design, before the proxy node receives the network slice creation request from the NSMF, the capability of the proxy node to manage the access network slice in the access network device may be negotiated. In this design, the proxy node may negotiate in the following manner: the proxy node receives a slice management proxy request from a default AMF, and the slice management proxy request may carry the information of the access network to which the access network device belongs. It is identified that the slice management proxy request may be used to request the proxy node to perform a network slice proxy for an access network device in the access network. After receiving the slice management proxy request, the proxy node may further send the slice management proxy request to the NSMF. In this way, when NSSMF is not deployed in the access network, it can be determined through negotiation that the proxy node manages the access network slice in the access network to assist the NSMF to achieve the management of the end-to-end network slice. Optimize management of end-to-end network slices.
在一种可能的设计中,所述代理节点向所述支持网络切片代理的接入网设备发送接入网切片更新请求,所述接入网切片更新请求中可以携带第二指示信息,所述第二指示信息用于指示所述第一核心网切片和已创建的第三核心网切片共享资源。这样,所述接入网设备可根据所述第二指示信息更新第一接入网切片与已创建的接入网切片的资源共享关系,保证AN侧与CN侧决策一致。例如,代理节点若将第一核心网切片和已创建的第二核心网切片共享资源,更新为第一核心网切片和已创建的第三核心网切片共享资源,可将该更新内容通过所述第二指示信息告知AN侧接入网设备,相应的,所述接入网设备也可根据CN侧的决策更新第一接入网切片的资源共享关系。In a possible design, the proxy node sends an access network slice update request to the access network device supporting the network slice proxy, and the access network slice update request may carry second instruction information, where The second instruction information is used to indicate that the first core network slice and the created third core network slice share resources. In this way, the access network device can update the resource sharing relationship between the first access network slice and the created access network slice according to the second instruction information, and ensure that the AN side and the CN side make consistent decisions. For example, if the proxy node updates the shared resources of the first core network slice and the created second core network slice to the shared resources of the first core network slice and the created third core network slice, the update content can be passed through the update The second instruction information informs the AN side access network device. Correspondingly, the access network device may also update the resource sharing relationship of the first access network slice according to the decision of the CN side.
第二方面,提供一种网络切片管理方法,该方法的执行主体可以是接入网设备,所述接入网设备支持网络切片代理,具体方法的步骤可以如下所述:接收来自代理节点的接入网切片创建请求,所述接入网切片创建请求用于请求创建第一接入网切片,所述接入网切片创建请求中可携带第一指示信息,所述第一指示信息用于指示第一核心网切片和第二核心网切片共享资源,并根据所述接入网切片创建请求创建所述第一接入网切片,所述第一接入网切片和已创建的第二接入网切片共享资源,其中,所述第一核心网切片和所述第一接入网切片属于第一端到端网络切片,所述第二核心网切片和所述第二接入网切片属于已创建的第二端到端网络切片。所述接入网设备可根据所述第一指示信息获知CN侧所做出的决策,进而可参考CN侧所做出的决策,做出与CN侧一致的决策,例如,使得AN和CN内创建的子网切片属于同一端到端网络切片,这样可避免后续使用端到端网络切片时出错。In a second aspect, a network slicing management method is provided. The method may be performed by an access network device that supports a network slicing agent. The steps of the specific method may be described as follows: receiving a connection from an agent node. A network slice creation request, the access network slice creation request is used to request the creation of a first access network slice, and the access network slice creation request may carry first instruction information, where the first instruction information is used to indicate The first core network slice and the second core network slice share resources, and create the first access network slice according to the access network slice creation request, the first access network slice and the created second access Network slice shared resources, wherein the first core network slice and the first access network slice belong to a first end-to-end network slice, and the second core network slice and the second access network slice belong to The second end-to-end network slice created. The access network device may learn the decision made by the CN side according to the first instruction information, and then may refer to the decision made by the CN side to make a decision consistent with the CN side. For example, the AN and the CN The created subnet slices belong to the same end-to-end network slice, which can prevent subsequent errors when using the end-to-end network slice.
在一种可能的设计中,所述接入网设备可通过默认AMF接收来自代理节点的接入网切片创建请求。该种设计中,所述接入网设备通过默认AMF接收来自代理节点的接入网切片创建请求之前,还可向所述默认AMF发送切片管理代理请求,所述切片管理代理请求中携带支持切片代理标志位和所述接入网设备的标识,所述支持切片代理标志位用于指示所述接入网设备支持网络切片代理。以使所述默认AMF向代理节点订阅网络切片代理,在接入网中未部署NSSMF的情况下,可通过所述代理节点管理接入网中的接入网切片,以协助所述NSMF实现端到端网络切片的管理。In a possible design, the access network device may receive an access network slice creation request from a proxy node through a default AMF. In this design, before the access network device receives the access network slice creation request from the proxy node through the default AMF, it may further send a slice management proxy request to the default AMF, and the slice management proxy request carries a support slice. A proxy flag bit and an identification of the access network device, and the support slice proxy flag bit is used to indicate that the access network device supports a network slice proxy. In order to enable the default AMF to subscribe to a network slice proxy from a proxy node, if NSSMF is not deployed in the access network, the proxy node can manage the access network slice in the access network to assist the NSMF to implement the end Management of end-to-end network slices.
第三方面,提供一种网络切片管理方法,该方法的执行主体可以是默认AMF,具体方法的步骤可以如下所述:接收来自代理节点的接入网切片创建请求,所述接入网切片创建请求用于请求创建接入网切片,所述接入网切片创建请求中携带第一指示信息,所述第一指示信息用于指示第一核心网切片和第二核心网切片共享资源,所述默认AMF和所述代理节点属于同一核心网,并根据预先存储的支持网络切片代理的接入网设备的标识,向接入网中支持网 络切片代理的接入网设备发送所述接入网切片创建请求。In a third aspect, a network slice management method is provided. The execution body of the method may be a default AMF. The steps of the specific method may be described as follows: receiving an access network slice creation request from a proxy node, and the access network slice creation The request is used to request the creation of an access network slice, and the access network slice creation request carries first instruction information, where the first instruction information is used to indicate that the first core network slice and the second core network slice share resources, and The default AMF and the proxy node belong to the same core network, and send the access network slice to the access network device supporting the network slice proxy in the access network according to a pre-stored identifier of the access network device supporting the network slice proxy. Create request.
在一种可能的设计中,所述默认AMF向接入网中支持网络切片代理的接入网设备发送所述接入网切片创建请求之后,还可接收来自所述接入网设备的响应消息,所述响应消息中包括接入网切片的创建结果,根据该响应消息向代理节点发送第一列表,所述第一列表中包括所述默认AMF在预设时间内接收到的响应消息中包括的接入网切片的创建结果。In a possible design, after the default AMF sends the access network slice creation request to an access network device that supports a network slice proxy in the access network, it may further receive a response message from the access network device. The response message includes the creation result of the access network slice, and a first list is sent to the proxy node according to the response message, where the first list includes the response message received by the default AMF within a preset time and includes Result of the creation of the access network slice.
在一种可能的设计中,所述默认AMF接收来自代理节点的接入网切片创建请求之前,还可接收来自所述接入网设备的第一切片管理代理请求,所述第一切片管理代理请求中携带支持切片代理标志位和所述接入网设备的标识,所述支持切片代理标志位用于指示所述接入网设备支持网络切片代理,当第一比值大于第一阈值时,所述默认AMF根据所述第一切片管理代理请求向所述代理节点发送第二切片管理代理请求,其中,所述第一比值为在预设时间内所述接入网中向所述默认AMF发送所述第一切片管理代理请求的接入网设备的数量与所述接入网中包括的全部接入网设备的数量的比值,所述第二切片管理代理请求中携带所述接入网的标识,第二切片管理代理请求用于请求所述代理节点为所述接入网中的接入网设备进行网络切片代理。In a possible design, before the default AMF receives an access network slice creation request from a proxy node, it may further receive a first slice management proxy request from the access network device, the first slice The management proxy request carries a support slice proxy flag and an identification of the access network device, and the support slice proxy flag is used to indicate that the access network device supports a network slice proxy. When the first ratio is greater than a first threshold , The default AMF sends a second slice management agent request to the proxy node according to the first slice management agent request, wherein the first ratio is to the access network to the access point within a preset time. The ratio of the number of access network devices requested by the first slice management agent to the total number of all access network devices included in the access network by default, and the second slice management agent request carries the The identification of the access network. The second slice management proxy request is used to request the proxy node to perform a network slice proxy for the access network device in the access network.
第四方面,提供一种网络切片管理方法,该方法的执行主体可以是NSSF,具体方法的步骤可以如下所述:接收来自代理节点的切片管理代理请求,所述切片管理代理请求中携带接入网的标识以及所述代理节点的标识,切片管理代理请求用于请求所述代理节点为所述接入网中的接入网设备进行网络切片代理,向所述代理节点发送携带所述代理节点的标识的网络切片创建请求,所述网络切片创建请求用于请求创建与已创建的端到端网络切片共享资源的端到端网络切片,所述端到端网络切片包括核心网切片和接入网切片。According to a fourth aspect, a network slice management method is provided. The execution body of the method may be NSSF. The steps of the specific method may be as follows: receiving a slice management agent request from an agent node, and the slice management agent request carries access The network identification and the identity of the proxy node, the slice management proxy request is used to request the proxy node to perform a network slice proxy for the access network device in the access network, and send the proxy node to the proxy node to carry the proxy node The identified network slice creation request is used to request the creation of an end-to-end network slice that shares resources with the created end-to-end network slice. The end-to-end network slice includes a core network slice and an access. Net slice.
在一种可能的设计中,所述NSMF接收来自所述代理节点的第一列表,所述第一列表中包括所述接入网切片的创建结果。In a possible design, the NSMF receives a first list from the proxy node, and the first list includes a creation result of the access network slice.
第五方面,提供一种网络切片管理装置,该装置具有实现上述第一方面和第一方面的任一种可能的设计中代理节点行为的功能。所述功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。所述硬件或软件包括一个或多个与上述功能相对应的模块。In a fifth aspect, a network slicing management device is provided. The device has a function of implementing the behavior of a proxy node in any of the first aspect and the first possible design of the first aspect. The functions may be implemented by hardware, and may also be implemented by hardware executing corresponding software. The hardware or software includes one or more modules corresponding to the functions described above.
在一种可能的设计中,该装置可以是芯片或者集成电路。In one possible design, the device may be a chip or an integrated circuit.
在一种可能的设计中,该装置包括存储器和处理器,存储器存储有一组程序,处理器用于执行存储器存储的程序,当程序被执行时,所述装置可以执行上述第一方面和第一方面的任一种可能的设计中所述的方法。In a possible design, the device includes a memory and a processor. The memory stores a set of programs. The processor is configured to execute the programs stored in the memory. When the program is executed, the device may execute the first aspect and the first aspect. The method described in any of the possible designs.
在一种可能的设计中,该装置还包括收发器,用于该装置与其它网元之间进行通信。In a possible design, the device further includes a transceiver for communication between the device and other network elements.
在一种可能的设计中,该装置为代理节点,所述代理节点可以是CN内新增的节点,也可以集成在CN内的NSSMF上。In a possible design, the device is a proxy node, and the proxy node may be a newly added node in the CN or may be integrated on the NSSMF in the CN.
第六方面,提供一种网络切片管理装置,该装置具有实现上述第二方面和第二方面的任一种可能的设计中接入网设备行为的功能。所述功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。所述硬件或软件包括一个或多个与上述功能相对应的模块。According to a sixth aspect, a network slicing management device is provided, and the device has a function of implementing the behavior of an access network device in any one of the second aspect and the second possible design of the second aspect. The functions may be implemented by hardware, and may also be implemented by hardware executing corresponding software. The hardware or software includes one or more modules corresponding to the functions described above.
在一种可能的设计中,该装置可以是芯片或者集成电路。In one possible design, the device may be a chip or an integrated circuit.
在一种可能的设计中,该装置包括存储器和处理器,存储器存储有一组程序,处理器用于执行存储器存储的程序,当程序被执行时,所述装置可以执行上述第二方面和第二方面的任一种可能的设计中所述的方法。In a possible design, the device includes a memory and a processor. The memory stores a set of programs. The processor is configured to execute the programs stored in the memory. When the program is executed, the device may execute the second aspect and the second aspect. The method described in any of the possible designs.
在一种可能的设计中,该装置还包括收发器,用于该装置与其它网元之间进行通信。In a possible design, the device further includes a transceiver for communication between the device and other network elements.
在一种可能的设计中,该装置为接入网设备。In a possible design, the device is an access network device.
第七方面,提供一种网络切片管理装置,该装置具有实现上述第三方面和第三方面的任一种可能的设计中默认AMF行为的功能。所述功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。所述硬件或软件包括一个或多个与上述功能相对应的模块。According to a seventh aspect, a network slicing management device is provided. The device has a function of implementing the default AMF behavior in any of the foregoing third aspect and the third possible design. The functions may be implemented by hardware, and may also be implemented by hardware executing corresponding software. The hardware or software includes one or more modules corresponding to the functions described above.
在一种可能的设计中,该装置可以是芯片或者集成电路。In one possible design, the device may be a chip or an integrated circuit.
在一种可能的设计中,该装置包括存储器和处理器,存储器存储有一组程序,处理器用于执行存储器存储的程序,当程序被执行时,所述装置可以执行上述第三方面和第三方面的任一种可能的设计中所述的方法。In a possible design, the device includes a memory and a processor. The memory stores a set of programs. The processor is configured to execute the programs stored in the memory. When the program is executed, the device may execute the third aspect and the third aspect. The method described in any of the possible designs.
在一种可能的设计中,该装置还包括收发器,用于该装置与其它网元之间进行通信。In a possible design, the device further includes a transceiver for communication between the device and other network elements.
在一种可能的设计中,该装置为默认AMF。In one possible design, the device is the default AMF.
第八方面,提供一种网络切片管理装置,该装置具有实现上述第四方面和第四方面的任一种可能的设计中NSMF行为的功能。所述功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。所述硬件或软件包括一个或多个与上述功能相对应的模块。According to an eighth aspect, a network slicing management device is provided. The device has a function of realizing the NSMF behavior in any one of the foregoing fourth aspect and the fourth possible design. The functions may be implemented by hardware, and may also be implemented by hardware executing corresponding software. The hardware or software includes one or more modules corresponding to the functions described above.
在一种可能的设计中,该装置可以是芯片或者集成电路。In one possible design, the device may be a chip or an integrated circuit.
在一种可能的设计中,该装置包括存储器和处理器,存储器存储有一组程序,处理器用于执行存储器存储的程序,当程序被执行时,所述装置可以执行上述第四方面和第四方面的任一种可能的设计中所述的方法。In a possible design, the device includes a memory and a processor. The memory stores a set of programs. The processor is configured to execute the programs stored in the memory. When the program is executed, the device may execute the fourth aspect and the fourth aspect. The method described in any of the possible designs.
在一种可能的设计中,该装置还包括收发器,用于该装置与其它网元之间进行通信。In a possible design, the device further includes a transceiver for communication between the device and other network elements.
在一种可能的设计中,该装置为NSMF。In one possible design, the device is NSMF.
第九方面,提供一种芯片,该芯片与存储器相连或者该芯片包括存储器,用于读取并执行所述存储器中存储的软件程序,以实现如上述第一方面、第二方面、第三方面、第四方面、第一方面的任一种可能的设计、第二方面的任一种可能的设计、第三方面的任一种可能的设计和第四方面的任一种可能的设计所述的方法。In a ninth aspect, a chip is provided, the chip is connected to a memory or the chip includes a memory for reading and executing a software program stored in the memory, so as to implement the first, second, and third aspects as described above. , The fourth aspect, any possible design of the first aspect, any possible design of the second aspect, any possible design of the third aspect, and any possible design of the fourth aspect Methods.
第十方面,提供了一种通信系统,该通信系统包括第一方面-第四方面中任意两方面或任意两方面以上的方面所述的装置。According to a tenth aspect, a communication system is provided, and the communication system includes the devices described in any two aspects or any two or more of the first to fourth aspects.
第十一方面,提供一种计算机存储介质,存储有计算机程序,该计算机程序包括用于执行上述各方面和各方面的任一可能的设计中方法的指令。According to an eleventh aspect, a computer storage medium is provided, storing a computer program, the computer program including instructions for performing the foregoing aspects and any possible design method in each aspect.
第十二方面,提供了一种计算机程序产品,当计算机读取并执行所述计算机程序产品时,使得计算机执行上述各方面和各方面的任一可能的设计中所述的方法。According to a twelfth aspect, a computer program product is provided. When the computer reads and executes the computer program product, the computer is caused to execute the method described in the foregoing aspects and any possible design of each aspect.
附图说明BRIEF DESCRIPTION OF THE DRAWINGS
图1为本申请实施例提供的系统架构示意图之一;FIG. 1 is a schematic diagram of a system architecture according to an embodiment of the present application; FIG.
图2为本申请实施例提供的系统架构示意图之二;FIG. 2 is a second schematic diagram of a system architecture according to an embodiment of the present application; FIG.
图3a为本申请实施例提供的系统架构示意图之三;3a is a third schematic diagram of a system architecture provided by an embodiment of the present application;
图3b为本申请实施例提供的系统架构示意图之四;3b is a fourth schematic diagram of a system architecture according to an embodiment of the present application;
图4为本申请实施例提供的一种网络切片管理方法流程图;4 is a flowchart of a network slice management method according to an embodiment of the present application;
图5为本申请实施例提供的另一种网络切片管理方法流程图;5 is a flowchart of another network slice management method according to an embodiment of the present application;
图6a为本申请实施例提供的系统架构示意图之五;6a is a fifth schematic diagram of a system architecture according to an embodiment of the present application;
图6b为本申请实施例提供的系统架构示意图之六;6b is a sixth schematic diagram of a system architecture according to an embodiment of the present application;
图7为本申请实施例提供的又一种网络切片管理方法流程图;7 is a flowchart of another network slice management method according to an embodiment of the present application;
图8为本申请实施例提供的又一种网络切片管理方法流程图;8 is a flowchart of another network slice management method according to an embodiment of the present application;
图9为本申请实施例提供的又一种网络切片管理方法流程图;9 is a flowchart of still another network slice management method according to an embodiment of the present application;
图10为本申请实施例提供的又一种网络切片管理方法流程图;10 is a flowchart of still another network slice management method according to an embodiment of the present application;
图11为本申请实施例提供的又一种网络切片管理方法流程图;11 is a flowchart of another network slice management method according to an embodiment of the present application;
图12为本申请实施例中网络切片管理装置结构示意图之一;FIG. 12 is one of the schematic structural diagrams of a network slice management apparatus according to an embodiment of the present application; FIG.
图13为本申请实施例中网络切片管理装置结构示意图之二;13 is a second schematic structural diagram of a network slice management device according to an embodiment of the present application;
图14为本申请实施例中网络切片管理装置结构示意图之三;14 is a third schematic structural diagram of a network slice management device according to an embodiment of the present application;
图15为本申请实施例中网络切片管理装置结构示意图之四;FIG. 15 is a fourth schematic structural diagram of a network slice management apparatus according to an embodiment of the present application; FIG.
图16为本申请实施例中网络切片管理装置结构示意图之五。FIG. 16 is a fifth schematic structural diagram of a network slice management apparatus according to an embodiment of the present application.
具体实施方式detailed description
本申请提供一种网络切片管理方法及装置,用以通过代理节点协助NSMF优化端到端网络切片的管理。其中,方法和装置是基于同一发明相同或相似构思的,由于方法及装置解决问题的原理相似,因此装置与方法的实施可以相互参见,重复之处不再赘述。本申请实施例的描述中,“和/或”,描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。字符“/”一般表示前后关联对象是一种“或”的关系。本申请中所涉及的至少一个是指一个或多个;多个,是指两个或两个以上。另外,需要理解的是,在本申请的描述中,“第一”、“第二”等词汇,仅用于区分描述的目的,而不能理解为指示或暗示相对重要性,也不能理解为指示或暗示顺序。“至少一种”是指一种或多种;“至少一个”是指一个或多个;多个是指两个或两个以上。The present application provides a network slice management method and device, which are used to assist NSMF to optimize end-to-end network slice management through a proxy node. Among them, the method and device are based on the same or similar concept of the same invention. Since the principle of the method and the device to solve the problem is similar, the implementation of the device and the method can be referred to each other, and the duplicates will not be repeated. In the description of the embodiments of the present application, "and / or" describes the association relationship of the associated objects, and indicates that there can be three kinds of relationships. For example, A and / or B can mean: A exists alone, A and B exist simultaneously, and There are three cases of B. The character "/" generally indicates that the related objects are an "or" relationship. At least one involved in this application means one or more; multiple means two or more. In addition, it should be understood that in the description of this application, the words "first" and "second" are used only for the purpose of distinguishing descriptions, and cannot be understood as indicating or implying relative importance, nor as indicating Or imply order. "At least one" means one or more; "at least one" means one or more; multiple means two or more.
下面将结合附图,对本申请实施例进行详细描述。The embodiments of the present application will be described in detail below with reference to the drawings.
本申请实施例提供的网络切片管理方法可以适用于5G通信系统,也可适用于未来新的通信系统(例如第六代(the 6th-generation,6G)移动通信系统等),本申请不做限定。The network slice management method provided in the embodiment of the present application may be applicable to a 5G communication system, and may also be applicable to a new communication system in the future (such as the 6th-generation (6G) mobile communication system, etc.). .
图1示例性示出了本申请实施例适用的一种系统架构示意图,本申请实施例并不限制应用于图1所示的系统架构中。图1所示的各个网元可以是硬件,也可以是从功能上划分的软件或者以上二者结合后的结构。如图1所示,本申请实施例提供的系统架构包括终端、接入网(access network,AN)设备、接入和移动性管理网元(也可以称之为:接入和移动性管理功能/接入和移动性管理功能实体)、用户面网元(也可以称之为:用户面功能/用户面功能实体)、网络切片管理网元(或网络切片管理功能/网络切片管理功能实体)、网络切片子网管理网元(或网络切片子网管理功能/网络切片子网管理功能实体)以及数据网络(data network,DN)。终端通过接入网设备以及用户面网元与DN建立通信。FIG. 1 exemplarily shows a schematic diagram of a system architecture applicable to the embodiment of the present application, and the embodiment of the present application is not limited to be applied to the system architecture shown in FIG. 1. Each network element shown in FIG. 1 may be hardware, software divided in function, or a combination of the two. As shown in FIG. 1, the system architecture provided in the embodiment of the present application includes a terminal, an access network (AN) device, and an access and mobility management network element (also referred to as: access and mobility management functions). / Access and mobility management function entity), user plane network element (also referred to as: user plane function / user plane function entity), network slice management network element (or network slice management function / network slice management function entity) , Network slice subnet management network element (or network slice subnet management function / network slice subnet management function entity) and data network (DN). The terminal establishes communication with the DN through the access network equipment and the user plane network element.
需要说明的是,本申请实施例中所涉及的网元还可以称为功能或功能实体,例如,网络切片管理网元还可以称为网络切片管理功能或网络切片管理功能实体,接入和移动性管理网元可以称为接入和移动性管理功能或接入和移动性管理功能实体等。It should be noted that the network elements involved in the embodiments of the present application may also be referred to as functions or functional entities. For example, the network slice management network element may also be referred to as a network slice management function or a network slice management function entity, access and mobility. The mobility management network element may be referred to as an access and mobility management function or an access and mobility management function entity.
各个网元的名称在本申请中不做限定,本领域技术人员可以将上述网元的名称更换为其它名称而执行相同的功能,均属于本申请保护的范围。The names of the various network elements are not limited in this application. Those skilled in the art may change the names of the above network elements to other names and perform the same functions, which all fall within the protection scope of this application.
示例性的,图1所示的系统架构可以是如图2所示的5G的系统架构。其中,各个网元或设备的功能如下所述。Exemplarily, the system architecture shown in FIG. 1 may be the 5G system architecture shown in FIG. 2. The functions of each network element or device are described below.
终端,又称之为用户设备(user equipment,UE)、移动台(mobile station,MS)、移动终端(mobile terminal,MT),终端设备等,是一种向用户提供语音和/或数据连通性的设 备。例如,终端包括具有无线连接功能的手持式设备、车载设备等。目前,终端可以是:手机(mobile phone)、平板电脑、笔记本电脑、掌上电脑、移动互联网设备(mobile internet device,MID)、可穿戴设备,虚拟现实(virtual reality,VR)设备、增强现实(augmented reality,AR)设备、工业控制(industrial control)中的无线终端、无人驾驶(self driving)中的无线终端、远程手术(remote medical surgery)中的无线终端、智能电网(smart grid)中的无线终端、运输安全(transportation safety)中的无线终端、智慧城市(smart city)中的无线终端,或智慧家庭(smart home)中的无线终端等。Terminals, also known as user equipment (UE), mobile stations (MS), mobile terminals (MT), terminal equipment, etc., are a means of providing voice and / or data connectivity to users device of. For example, the terminal includes a handheld device having a wireless connection function, a vehicle-mounted device, and the like. At present, the terminals can be: mobile phones, tablet computers, laptops, palmtop computers, mobile internet devices (MID), wearable devices, virtual reality (VR) devices, augmented reality (augmented) Reality (AR) equipment, wireless terminals in industrial control, wireless terminals in self-driving, wireless terminals in remote medical surgery, wireless in smart grid Terminals, wireless terminals in transportation safety, wireless terminals in smart cities, or wireless terminals in smart homes.
接入网设备(也可称为AN设备),负责终端的无线侧接入,可能的部署形态包括:集中式单元(centralized unit,CU)和分布式单元(distributed unit,DU)分离场景;以及单站点的场景。单站点包括gNB/NR-NB、传输接收点(transmission reception point,TRP)、演进型节点B(evolved Node B,eNB)、无线网络控制器(radio network control ler,RNC)、节点B(Node B,NB)、基站控制器(base station controller,BSC)、基站收发台(base transceiver station,BTS)、家庭基站(例如,home evolved NodeB,或home Node B,HNB)、基带单元(base band unit,BBU),或无线保真(wireless fidelity,Wifi)接入点(access point,AP)等。在5G通信系统中,单站点为gNB/NR-NB。其中,CU支持无线资源控制(radio resource control,RRC)、分组数据汇聚协议(packet data convergence protocol,PDCP)、业务数据适配协议(service data adaptation protocol,SDAP)等协议。CU一般会部署在中心局点,具有较为丰富的计算资源。DU主要支持无线链路控制层(radio link control,RLC)、媒体接入控制层(media access control,MAC)和物理层(PHY)协议。DU一般采用分布式部署方式,在通常情况下一个CU要连接一个以上的DU。gNB具有CU和DU的功能,并且通常作为单站点的形态部署。The access network equipment (also called AN equipment) is responsible for the wireless side access of the terminal. Possible deployment forms include: a centralized unit (CU) and distributed unit (DU) separation scenario; and Single-site scenario. Single site includes gNB / NR-NB, transmission receiving point (TRP), evolved Node B (eNB), radio network controller (RNC), and node B (Node B) NB), base station controller (BSC), base transceiver station (BTS), home base station (e.g., home NodeB, or home NodeB, HNB), baseband unit (base band unit, BBU), or wireless fidelity (Wifi) access point (AP). In a 5G communication system, a single site is gNB / NR-NB. Among them, the CU supports radio resource control (radio resource control, RRC), packet data convergence protocol (PDCP), service data adaptation protocol (service data adaptation protocol, SDAP) and other protocols. CUs are generally deployed at central offices and have relatively abundant computing resources. DU mainly supports radio link control layer (radio link control, RLC), media access control layer (media access control, MAC) and physical layer (PHY) protocols. DUs are generally deployed in a distributed manner. In general, more than one DU is connected to a CU. The gNB has the functions of CU and DU, and is usually deployed as a single site.
接入和移动性管理网元,可以是5G中的接入与移动性管理实体(access and mobility management function,AMF)。接入和移动性管理网元负责移动网络中终端的接入与移动性管理。The access and mobility management network element may be an access and mobility management function (AMF) in 5G. The access and mobility management network element is responsible for terminal access and mobility management in the mobile network.
用户面网元,可以是5G架构中的用户面功能(user plane function,UPF),如图2所示。UPF负责报文处理与转发。The user plane network element may be a user plane function (UPF) in a 5G architecture, as shown in FIG. 2. The UPF is responsible for message processing and forwarding.
DN,为终端提供数据传输服务,可以是PDN网络,如因特网(internet)、IP多媒体业务(IP Multi-media Service,IMS)等。DN, which provides data transmission services for terminals, can be a PDN network, such as the Internet (Internet), IP Multi-media Service (IMS), and so on.
网络切片管理网元,可以是5G架构中的网络切片管理功能(network slice management function,NSMF),用于管理整个网络的网络切片。The network slice management network element may be a network slice management function (NSMF) in the 5G architecture, which is used to manage the network slice of the entire network.
网络切片子网管理网元,可以是5G架构中的网络切片子网管理功能(network slice subnet management function,NSSMF),可部署在各个子网中,例如可部署在CN、AN内,用于管理子网内的网络切片。其中可将部署在CN内的NSSMF称为CN内NSSMF或者CN域的NSSMF等,类似地,可将部署在AN内的NSSMF称为AN内NSSMF或者AN域的NSSMF等。部署在子网中的NSSMF的名称在本申请中不做限定。The network slice subnet management network element can be a network slice subnet management function (NSSMF) in the 5G architecture. It can be deployed in each subnet, for example, it can be deployed in the CN and AN for management. Network slices within a subnet. The NSSMF deployed in the CN may be referred to as the NSSMF in the CN or the NSSMF in the CN domain. Similarly, the NSSMF deployed in the AN may be referred to as the NSSMF in the AN or the NSSMF in the AN domain. The name of the NSSMF deployed in the subnet is not limited in this application.
示例性的,图1所示的系统架构还可以是如图3a所示的5G的系统架构。图3a中以在AN和CN分别部署NSSMF为例说明。在图3a所示的系统架构中,可通过NSMF来管理端到端网络切片,例如,可通过NSMF创建、更新或者销毁端到端网络切片。以创建端到端网络切片为例,NSMF可分别向AN内的NSSMF和CN内的NSSMF发送网络切片创建请求,AN内的NSSMF根据网络切片创建请求创建接入网切片,CN内的NSSMF根据网络切片创建请求创建核心网切 片,进而完成端到端网络切片的创建。然而由于NSMF对核心网和接入网控制面的实现细节不了解,可能导致NSMF无法准确做出决策。Exemplarily, the system architecture shown in FIG. 1 may also be a 5G system architecture shown in FIG. 3a. Figure 3a illustrates the deployment of NSSMF in AN and CN respectively as an example. In the system architecture shown in FIG. 3a, end-to-end network slices can be managed through NSMF. For example, end-to-end network slices can be created, updated, or destroyed through NSMF. Taking the creation of an end-to-end network slice as an example, the NSMF can send network slice creation requests to the NSSMF in the AN and the NSSMF in the CN, respectively. The NSSMF in the AN creates the access network slice according to the network slice creation request, and the NSSMF in the CN according to the network. The slice creation request creates a core network slice, thereby completing the creation of an end-to-end network slice. However, because the NSMF does not understand the implementation details of the core and access network control planes, the NSMF may not be able to make accurate decisions.
此外,早期的网络切片研究主要集中在核心网,对接入网切片的研究比较匮乏,针对AN内的NSSMF部署较晚,可能存在AN内未部署NSSMF的场景,如图3b所示,在这种场景下,由于AN内未部署NSSMF,故NSMF的决策无法发送至AN,导致NSMF无法对接入网切片进行管理,进而也无法实现端到端网络切片的管理。In addition, the early research on network slicing mainly focused on the core network, and the research on access network slicing was scarce. For the NSSMF deployment in the AN was late, there may be scenarios where the NSSMF is not deployed in the AN, as shown in Figure 3b In this scenario, because NSSMF is not deployed in the AN, NSMF decisions cannot be sent to the AN. As a result, the NSMF cannot manage access network slices, and thus it cannot implement end-to-end network slice management.
基于上述存在的问题,本申请实施例提供一种网络切片管理方法,用以优化端到端网络切片的管理。Based on the aforementioned problems, an embodiment of the present application provides a network slice management method for optimizing management of an end-to-end network slice.
如图4所示,其为本申请实施例提供的一种网络切片管理方法流程图。该方法包括如下处理流程。As shown in FIG. 4, it is a flowchart of a network slice management method according to an embodiment of the present application. The method includes the following processing flow.
S401:代理节点接收来自NSMF的网络切片创建请求。S401: The proxy node receives a network slice creation request from the NSMF.
其中,该网络切片创建请求可以用于请求创建与已创建的端到端网络切片共享资源的第一端到端网络切片,该第一端到端网络切片可以包括第一核心网切片和第一接入网切片。The network slice creation request may be used to request to create a first end-to-end network slice that shares resources with the created end-to-end network slice. The first end-to-end network slice may include a first core network slice and a first Access network slicing.
本申请中共享资源可以是指共享虚拟机或容器等。In this application, shared resources may refer to sharing virtual machines or containers.
本申请中代理节点可以是CN内新增的节点,也可以集成在CN内NSSMF上,本申请实施例下面以代理节点为CN内新增节点为例说明。In this application, the proxy node may be a newly added node in the CN, or it may be integrated on the NSSMF in the CN. In the embodiment of the present application, the proxy node is a newly added node in the CN.
本申请中,网络切片创建请求还可以称之为端到端网络切片创建请求或切片创建请求。端到端网络切片可以是为终端提供从AN到CN的端到端网络服务的切片,还可以称之为网络切片或切片等。其中,端到端网络切片可包括核心网内网络切片和接入网内网络切片等。核心网内网络切片也可以称之为CN域内网络切片或核心网切片,接入网内网络切片也可以称之为AN域内网络切片或接入网切片。In this application, the network slice creation request may also be referred to as an end-to-end network slice creation request or a slice creation request. The end-to-end network slice can be a slice that provides end-to-end network services from AN to CN for the terminal, and can also be called a network slice or slice. The end-to-end network slice may include a network slice in a core network and a network slice in an access network. The network slice in the core network can also be referred to as the network slice in the CN domain or the core network slice, and the network slice in the access network can also be called the network slice or access network slice in the AN domain.
本申请中可将AN和CN统称为子网,也可以称之为子网络或子域等。相应的,可将核心网内网络切片和接入网内网络切片统称为子网切片、子网络切片或子域内切片等。In this application, AN and CN may be collectively referred to as a subnet, and may also be referred to as a subnetwork or a subdomain. Correspondingly, the network slices in the core network and the network slices in the access network may be collectively referred to as a sub-network slice, a sub-network slice, or a sub-domain slice.
S402:代理节点根据该网络切片创建请求,创建第一核心网切片。其中,第一核心网切片与已创建的第二核心网切片共享资源。S402: The proxy node creates a first core network slice according to the network slice creation request. The first core network slice shares resources with the created second core network slice.
可选的,网络切片创建请求中可以携带第二端到端网络切片的标识。当网络切片创建请求中携带第二端到端网络切片的标识时,该网络切片创建请求可以用于请求创建与第二端到端网络切片共享资源的第一端到端网络切片。也就是说,NSMF可以请求创建与某一特定端到端网络切片共享资源的第一端到端网络切片。Optionally, the network slice creation request may carry the identity of the second end-to-end network slice. When the network slice creation request carries the identity of the second end-to-end network slice, the network slice creation request may be used to request the creation of a first end-to-end network slice that shares resources with the second end-to-end network slice. That is, the NSMF can request the creation of a first end-to-end network slice that shares resources with a particular end-to-end network slice.
在一个示例中,若网络切片请求中未携带端到端网络切片的标识,也就是说,NSMF未指定待创建的第一端到端网络切片与哪个已创建的端到端网络切片共享资源,则可由代理节点自身确定待创建的第一端到端网络切片与某个特定已创建的端到端网络切片共享资源。下文中会详细描述代理节点如何创建第一核心网切片。In one example, if the identification of the end-to-end network slice is not carried in the network slice request, that is, the NSMF does not specify which end-to-end network slice the first end-to-end network slice to be created shares resources with, The proxy node itself can determine that the first end-to-end network slice to be created shares resources with a particular created end-to-end network slice. The following section describes how the agent node creates the first core network slice in detail.
在另一个示例中,若网络切片请求中携带第二端到端网络切片的标识,也就是说,NSMF指定待创建的第一端到端网络切片与已创建的第二端到端网络切片共享资源,在该示例中,代理节点可创建与NSMF指定的第二端到端网络切片共享资源的第一端到端网络切片,也可创建与不同于第二端到端网络切片的已创建的端到端网络切片共享资源的第一端到端网络切片。下文中会针对不同的情况详细举例说明。In another example, if the network slice request carries the identity of the second end-to-end network slice, that is, the NSMF specifies that the first end-to-end network slice to be created is shared with the second end-to-end network slice that has been created In this example, the proxy node can create a first end-to-end network slice that shares the resource with a second end-to-end network slice specified by NSMF, or it can create an The end-to-end network slice shares the first end-to-end network slice of the resource. Detailed examples are given below for different situations.
S403:代理节点向支持网络切片代理的接入网设备发送接入网切片创建请求。该接入网切片创建请求可以用于请求创建第一接入网切片,该接入网切片创建请求中可以携带第一指 示信息,该第一指示信息用于指示第一核心网切片和第二核心网切片共享资源。S403: The proxy node sends an access network slice creation request to an access network device that supports a network slice proxy. The access network slice creation request may be used to request creation of a first access network slice, and the access network slice creation request may carry first indication information, where the first indication information is used to indicate the first core network slice and the second core network slice. Core network slices share resources.
本申请中,代理节点可通过控制面信令向该接入网设备发送接入网切片创建请求。In this application, the proxy node may send an access network slice creation request to the access network device through control plane signaling.
以下对代理节点如何创建第一端到端网络切片进行详细说明。The following describes in detail how the proxy node creates the first end-to-end network slice.
一种可能的实现方式中,网络切片创建请求中携带第二端到端网络切片的标识,该第二端到端网络切片包括第二核心网切片,代理节点可根据该网络切片创建请求中携带的第二端到端网络切片的标识,确定与该标识对应的第二端到端网络切片包括的第二核心网切片,进而可创建与第二端到端网络切片包括的第二核心网切片共享资源的第一核心网切片。也就是说,代理节点可根据该第二端到端网络切片的标识,创建与该第二端到端网络切片包括的核心网切片共享资源的第一核心网切片。In a possible implementation manner, the network slice creation request carries an identifier of a second end-to-end network slice, and the second end-to-end network slice includes a second core network slice, and the proxy node may carry the identifier in the network slice creation request. Identification of the second end-to-end network slice, to determine the second core network slice included in the second end-to-end network slice corresponding to the identification, and then to create a second core network slice included in the second end-to-end network slice The first core network slice of the shared resource. That is, the proxy node may create a first core network slice that shares resources with the core network slice included in the second end-to-end network slice according to the identity of the second end-to-end network slice.
其中,第二端到端网络切片包括第二核心网切片,也可以理解为第二核心网切片属于第二端到端网络切片。The second end-to-end network slice includes a second core network slice. It can also be understood that the second core network slice belongs to the second end-to-end network slice.
另一种可能的实现方式中,代理节点可根据该网络切片创建请求以及所述代理节点所属的核心网的资源共享切片信息,创建第一核心网切片。In another possible implementation manner, the proxy node may create a first core network slice according to the network slice creation request and resource sharing slice information of a core network to which the proxy node belongs.
其中,所述代理节点所属的核心网的资源共享切片信息可包括该代理节点所属的核心网中已创建的、且支持资源共享的核心网切片的信息。例如,所述核心网切片的信息可以包括核心网切片的标识、资源占用率等。本申请中核心网切片的资源占用率可包括部署该核心网切片的虚拟机或容器的资源占用率。The resource sharing slice information of the core network to which the proxy node belongs may include information of a core network slice that has been created in the core network to which the proxy node belongs and supports resource sharing. For example, the information of the core network slice may include an identifier of the core network slice, a resource occupation rate, and the like. The resource occupation rate of the core network slice in this application may include the resource occupation rate of a virtual machine or a container in which the core network slice is deployed.
本申请实施例中,下面以核心网切片的信息包括核心网切片的标识或者包括核心网切片的标识以及资源占用率为例,对代理节点根据网络切片创建请求以及代理节点所属的核心网的资源共享切片信息,创建第一核心网切片进行说明。In the embodiment of the present application, the following uses core network slice information including the identifier of the core network slice or the identifier of the core network slice and the resource occupancy rate as an example to the proxy node according to the network slice creation request and the resources of the core network to which the proxy node belongs. Share slice information and create a first core network slice for illustration.
其中,该代理节点所属的核心网中已创建的、且支持资源共享的核心网切片可以是一个或多个。There may be one or more core network slices that have been created in the core network to which the proxy node belongs and support resource sharing.
在一个示例中,当该代理节点所属的核心网中已创建的、且支持资源共享的核心网切片为一个时,该代理节点所属的核心网的资源共享切片信息可包括该一个已创建的、且支持资源共享的核心网切片的标识,代理节点可根据该标识创建与该标识对应的核心网切片共享资源的第一核心网切片。In one example, when there is one core network slice that has been created in the core network to which the proxy node belongs and supports resource sharing, the resource sharing slice information of the core network to which the proxy node belongs may include the one that has been created, Moreover, the identifier of the core network slice supporting resource sharing is supported, and the proxy node may create a first core network slice of the core network slice shared resource corresponding to the identifier according to the identifier.
在另一个示例中,当该代理节点所属的核心网中已创建的、且支持资源共享的核心网切片为至少两个时,该代理节点所属的核心网的资源共享切片信息可包括至少两个已创建的、且支持资源共享的核心网切片的标识以及资源占用率。在该示例中,代理节点可将该代理节点所属的核心网中包括的至少两个核心网切片中资源占用率最低的核心网切片确定为第二核心网切片,并根据网络切片创建请求以及第二核心网切片的标识,创建与该第二核心网切片共享资源的第一核心网切片。例如,假设该代理节点所属的核心网中包括三个已创建的核心网切片,分别为核心网切片A、核心网切片B以及核心网切片C,则该代理节点所属的核心网的资源共享切片信息可包括核心网切片A、核心网切片B以及核心网切片C的标识和资源占用率,进一步假设核心网切片A的标识为标识A、资源占用率为30%,核心网切片B的标识为标识B、资源占用率为70%,核心网切片C的标识为标识C、资源占用率为50%,则代理节点在接收到来自NSMF的网络切片创建请求后,可根据该请求确定需要创建与已创建的端到端网络切片共享资源的第一端到端网络切片,进而可确定需要创建与已创建的核心网切片共享资源的第一核心网切片,为保证创建的第一核心网切片具备足够的资源,该代理节点可根创建与资源占用率最低的核心网切片A共享资源的第一核心网切片。通过该示例提供的方法,代 理节点可根据该代理节点所属的核心网中核心网切片的资源消耗情况,创建与已创建的、资源占用率最低的核心网切片共享资源的第一核心网切片,以使资源共享效果最优。解决了现有技术中由于NSMF无法感知核心网和接入网中子网切片的资源消耗情况,导致的资源利用率低问题。显然,采用本申请的方法可优化网络切片的管理。In another example, when there are at least two core network slices that have been created in the core network to which the proxy node belongs and support resource sharing, the resource sharing slice information of the core network to which the proxy node belongs may include at least two The identifier of the core network slice that has been created and supports resource sharing and the resource occupancy rate. In this example, the proxy node may determine the core network slice with the lowest resource occupancy among at least two core network slices included in the core network to which the proxy node belongs, and create a second core network slice according to the network slice creation request and the first The identification of the two core network slices creates a first core network slice that shares resources with the second core network slice. For example, assuming that the core network to which the proxy node belongs includes three core network slices that have been created, namely core network slice A, core network slice B, and core network slice C, the resource sharing slice of the core network to which the proxy node belongs The information may include the identification and resource occupancy of core network slice A, core network slice B, and core network slice C. It is further assumed that the identification of core network slice A is identification A, the resource occupancy rate is 30%, and the identification of core network slice B is Identity B, resource occupancy rate is 70%, core network slice C is identity C, and resource occupancy rate is 50%. After receiving the network slice creation request from NSMF, the proxy node can determine the need to create and The first end-to-end network slice of the created end-to-end network slice sharing resources can be further determined to create a first core network slice that shares resources with the created core network slice. In order to ensure that the created first core network slice has With sufficient resources, the proxy node can root to create a first core network slice that shares resources with the core network slice A that has the lowest resource usage. With the method provided by this example, the proxy node can create a first core network slice that shares resources with the core network slice that has been created and has the lowest resource usage according to the resource consumption of the core network slice in the core network to which the proxy node belongs. In order to optimize the effect of resource sharing. It solves the problem of low resource utilization caused by NSMF in the prior art because it cannot sense the resource consumption of subnet slices in the core network and access network. Obviously, the method of the present application can optimize the management of network slices.
在又一个示例中,网络切片创建请求中携带第二端到端网络切片的标识,所述代理节点所属的核心网的资源共享切片信息包括该第二端到端网络切片中核心网切片的标识和资源占用率。在该示例中,当代理节点确定第二端到端网络切片中核心网切片的资源占用率小于预设值时,代理节点将该第二端到端网络切片中核心网切片确定为第二核心网切片,并根据网络切片创建请求以及第二核心网切片的标识,创建第一核心网切片。例如,可根据网络切片创建请求中携带的端到端网络切片的需求,创建与已创建的核心网切片共享资源的第一核心网切片。所述端到端网络切片的需求可以包括时延需要、隔离性需求等。In yet another example, the network slice creation request carries the identity of the second end-to-end network slice, and the resource sharing slice information of the core network to which the proxy node belongs includes the identity of the core network slice in the second end-to-end network slice. And resource usage. In this example, when the proxy node determines that the resource occupation rate of the core network slice in the second end-to-end network slice is less than a preset value, the proxy node determines the core network slice in the second end-to-end network slice as the second core Network slice, and create a first core network slice according to the network slice creation request and the identity of the second core network slice. For example, according to the requirements of the end-to-end network slice carried in the network slice creation request, a first core network slice that shares resources with the created core network slice may be created. The requirements of the end-to-end network slicing may include delay requirements, isolation requirements, and the like.
示例性地,假设网络切片创建请求中携带第二端到端网络切片的标识2,该代理节点所属的核心网的资源共享切片信息包括该第二端到端网络切片中核心网切片的标识22和资源占用率40%,假设预设值为50%,该代理节点在接收到来自NSMF的该网络切片创建请求后,可根据该请求确定需要创建与已创建的第二端到端网络切片共享资源的第一端到端网络切片,进而可确定需要创建与第二端到端网络切片中核心网切片共享资源的第一核心网切片,该代理节点可进一步确定该第二端到端网络切片中核心网切片的资源占用率40%小于预设值50%,进而可创建与该第二端到端网络切片中核心网切片共享资源的第一核心网切片。通过该示例提供的方法,代理节点在第二端到端网络切片中核心网切片的资源占用率小于预设值的情况下,创建与第二端到端网络切片中核心网切片共享资源的第一核心网切片,以使资源共享效果最优。Exemplarily, assuming that the network slice creation request carries the identity 2 of the second end-to-end network slice, the resource sharing slice information of the core network to which the proxy node belongs includes the identity 22 of the core network slice in the second end-to-end network slice. And the resource occupancy rate is 40%, assuming the preset value is 50%, after receiving the network slice creation request from NSMF, the proxy node can determine the need to create a share with the created second end-to-end network slice according to the request The first end-to-end network slice of the resource can further determine the need to create a first core network slice that shares the resource with the core network slice in the second end-to-end network slice, and the proxy node can further determine the second end-to-end network slice The resource occupancy rate of the core network slice of 40% is less than a preset value of 50%, so that a first core network slice that shares resources with the core network slice in the second end-to-end network slice can be created. With the method provided by this example, the proxy node creates a first shared resource with the core network slice in the second end-to-end network slice when the resource occupation rate of the core network slice in the second end-to-end network slice is less than a preset value. A core network slice to optimize resource sharing.
需要说明的是,该预设值可根据实际应用场景设置。设置该预设值的原则可以是,使得资源占用率小于该预设值的核心网切片与第一核心网切片共享资源之后,两个共享资源的核心网切片可以正常使用。It should be noted that the preset value can be set according to the actual application scenario. The principle for setting the preset value may be that after the core network slice with the resource occupancy rate less than the preset value shares resources with the first core network slice, the two core network slices sharing the resource can be used normally.
下面结合图4所示的流程,对本申请实施例提供的网络切片管理方法做更详细的描述。如图5所示,网络切片管理方法的流程如下所述。以代理节点为CN内新增节点说明。The network slicing management method provided by the embodiment of the present application is described in more detail below with reference to the flow shown in FIG. 4. As shown in FIG. 5, the flow of the network slice management method is as follows. The description of the new node in the CN is based on the proxy node.
其中,S501-S503可参见S401-S403的描述,此处不再赘述。Among them, S501-S503 can refer to the descriptions of S401-S403, which will not be repeated here.
一种可能的实现方式中,代理节点可通过CN内NSSMF接收来自NSMF的网络切片创建请求,参阅图5中S501a和S501b。In a possible implementation manner, the proxy node may receive the network slice creation request from the NSMF through the NSSMF in the CN, see S501a and S501b in FIG. 5.
一种可能的实现方式中,代理节点通过默认(default)AMF向支持网络切片代理的接入网设备发送接入网切片创建请求,参阅图5中S503a-S503c所示。默认AMF接收到来自代理节点的接入网切片创建请求后,根据预先存储的支持网络切片代理的接入网设备的标识,向接入网中支持网络切片代理的接入网设备发送该接入网切片创建请求。In a possible implementation manner, the proxy node sends an access network slice creation request to an access network device supporting a network slice proxy through a default AMF, as shown in S503a-S503c in FIG. 5. After receiving the access network slice creation request from the proxy node by default, the AMF sends the access to the access network device supporting the network slice proxy in the access network according to the pre-stored identification of the access network device supporting the network slice proxy. Net slice creation request.
需要说明的是,图5中接入网设备是指支持网络切片代理的接入网设备。It should be noted that the access network device in FIG. 5 refers to an access network device that supports a network slicing agent.
在其它可能的设计中,代理节点也可通过其它AMF(不同于默认AMF)与支持网络切片代理的接入网设备进行交互,本申请对此不做限定。In other possible designs, the proxy node may also interact with the access network device supporting the network slice proxy through another AMF (different from the default AMF), which is not limited in this application.
其中,当终端注册到网络后,不确定接入特定的某个AMF时,选择接入默认AMF。Among them, when the terminal is not sure to access a specific AMF after registering to the network, it chooses to access the default AMF.
需要说明的是,图5中采用实线标注的步骤均是指必须执行的步骤,例如S501、S502以及S503,而采用虚线标注的步骤均是指可选执行的步骤,例如,S503a、S503c、S501a以及S501b等。此外,本申请所涉及的附图中实线标注的步骤均是指必须执行的步骤,采用虚线 标注的步骤均是指可选执行的步骤。It should be noted that the steps marked with a solid line in FIG. 5 are all steps that must be performed, such as S501, S502, and S503, and the steps marked with a dotted line are optional steps, such as S503a, S503c, S501a and S501b. In addition, steps marked with a solid line in the drawings involved in this application are all steps that must be performed, and steps marked with a dotted line are optional steps.
接入网中支持网络切片代理的接入网设备接收到代理节点发送的接入网切片创建请求后,可执行S504。After the access network device supporting the network slice proxy in the access network receives the access network slice creation request sent by the proxy node, it may execute S504.
S504:接入网中支持网络切片代理的接入网设备根据该接入网切片创建请求,创建第一接入网切片。S504: The access network device supporting the network slice proxy in the access network creates a first access network slice according to the access network slice creation request.
例如,接入网中支持网络切片代理的接入网设备可根据接入网切片创建请求中携带的时延需要、隔离性需求等,创建第一接入网切片。For example, an access network device that supports a network slice proxy in the access network may create a first access network slice according to a delay requirement, an isolation requirement, etc. carried in the access network slice creation request.
其中,第一接入网切片和已创建的第二接入网切片共享资源。第二核心网切片和第二接入网切片属于已创建的第二端到端网络切片。The first access network slice and the created second access network slice share resources. The second core network slice and the second access network slice belong to the created second end-to-end network slice.
S505:接入网中支持网络切片代理的接入网设备向默认AMF发送响应消息。S505: The access network device supporting the network slice proxy in the access network sends a response message to the default AMF.
其中,响应消息中可以包括接入网切片的创建结果,例如,创建结果可以是创建成功或失败。The response message may include the creation result of the access network slice. For example, the creation result may be the creation success or failure.
S506:默认AMF根据响应消息,向代理节点发送第一列表。S506: The default AMF sends the first list to the proxy node according to the response message.
其中,第一列表中可以包括默认AMF在预设时间内接收到的响应消息中包括的接入网切片的创建结果。例如,假设接入网中支持网络切片代理的接入网设备有500个,每个支持网络切片代理的接入网设备在根据接入网切片创建请求创建第一接入网切片之后,都可向默认AMF发送包括接入网切片的创建结果的响应消息,但是每个支持网络切片代理的接入网设备可能不会同时向默认AMF发送响应消息,默认AMF可在预设时间内接收各个支持网络切片代理的接入网设备发送的响应消息,假设默认AMF在预设时间内接收到450个支持网络切片代理的接入网设备发送的响应消息,则可将该450个响应消息中包括的接入网切片的创建结果构成第一列表,并向代理节点发送该第一列表。The first list may include the creation result of the access network slice included in the response message received by the default AMF within a preset time. For example, suppose that there are 500 access network devices in the access network that support network slicing agents. Each access network device that supports the network slicing agent can create the first access network slice according to the access network slice creation request. Send a response message including the creation result of the access network slice to the default AMF, but each access network device that supports the network slice agent may not send a response message to the default AMF at the same time, the default AMF can receive each support within a preset time The response message sent by the access network device of the network slicing agent. Assuming that the default AMF receives the response message sent by 450 access network devices that support the network slicing agent within a preset time, the 450 response messages can be included in the response message. The creation result of the access network slice forms a first list, and sends the first list to the proxy node.
S507:代理节点接收来自默认AMF的第一列表。S507: The proxy node receives the first list from the default AMF.
代理节点接收到默认AMF发送的第一列表后,可由CN域的代理节点处理,例如,若第一列表中包括的创建结果中不包括创建失败,则忽略该第一列表,若第一列表中包括的创建结果中包括创建失败,则可针对创建失败的接入网切片重新发起创建过程。After the proxy node receives the first list sent by the default AMF, it can be processed by the proxy node in the CN domain. For example, if the creation result included in the first list does not include the creation failure, the first list is ignored. If the included creation result includes a creation failure, the creation process can be re-initiated for the access network slice that failed to be created.
当然,也可以不由CN域的代理节点处理,而是执行S508。Of course, instead of being processed by the agent node in the CN domain, S508 may be executed.
S508:代理节点向NSMF发送该第一列表。S508: The proxy node sends the first list to the NSMF.
具体地,NSMF在收到该第一列表后执行后续处理。例如,若第一列表中包括的创建结果中不包括创建失败,则忽略该第一列表,若第一列表中包括的创建结果中包括创建失败,则可针对创建失败的切片重新发起创建过程。Specifically, the NSMF performs subsequent processing after receiving the first list. For example, if the creation result included in the first list does not include the creation failure, the first list is ignored, and if the creation result included in the first list includes the creation failure, the creation process may be re-initiated for the slice that failed to be created.
一种可能的实现方式中,步骤S508中代理节点可通过CN内NSSMF向NSMF发送该第一列表,参阅图5中S508a和S508b。In a possible implementation manner, the proxy node may send the first list to the NSMF through the NSSMF in the CN in step S508, see S508a and S508b in FIG. 5.
本申请实施例中,支持网络切片代理的接入网设备,可以理解为接入网设备中的接入网切片可由代理节点管理。其中,由代理节点管理接入网设备中的接入网切片的能力,可以是代理节点、NSMF以及接入网设备预先约定的,也可以是代理节点、NSMF以及接入网设备之间实时协商确定的。In the embodiment of the present application, an access network device supporting a network slice proxy can be understood as that an access network slice in the access network device can be managed by a proxy node. Among them, the ability of the proxy node to manage the access network slice in the access network device may be predetermined by the proxy node, NSMF, and access network device, or it may be real-time negotiation between the proxy node, NSMF, and access network device. definite.
一种可能的实现方式中,代理节点接收来自NSMF的网络切片创建请求之前,协商由代理节点管理接入网设备中的接入网切片的能力,参阅图5中的S500a-S500f。In a possible implementation manner, before the proxy node receives the network slice creation request from the NSMF, the capability of the proxy node to manage the access network slice in the access network device is negotiated, see S500a-S500f in FIG. 5.
S500a:接入网设备向默认AMF发送第一切片管理代理请求。S500a: The access network device sends a first slice management proxy request to the default AMF.
其中,第一切片管理代理请求用于请求为接入网设备进行网络切片代理。其中,第一切 片管理代理请求中可以携带该接入网设备的标识。The first slice management proxy request is used to request a network slice proxy for the access network device. The first slice management agent request may carry the identifier of the access network device.
可选的,第一切片管理代理请求中还可携带支持切片代理标志位。该支持切片代理标志位用于指示该接入网设备支持网络切片代理。支持切片代理标志位可以是一个或多个比特。Optionally, the first slice management agent request may further carry a slice agent support flag. The support slice proxy flag bit is used to indicate that the access network device supports a network slice proxy. The support slice proxy flag can be one or more bits.
可选的,默认AMF收到该第一切片管理代理请求后,还可对该第一切片管理代理请求进行确认,可进一步向接入网设备发送确认收到该第一切片管理代理请求的确认消息。Optionally, after receiving the first slice management agent request by default, the AMF may further confirm the first slice management agent request, and may further send an acknowledgement to the access network device to receive the first slice management agent. Requested confirmation message.
需要说明的是,该接入网设备的数量可以是一个或多个。当接入网设备的数量为一个时,默认AMF在收到接入网设备发送的第一切片管理代理请求后,向代理节点转发该第一切片管理代理请求。当接入网设备的数量为多个时,默认AMF在收到接入网设备发送的第一切片管理代理请求后可执行S500b。It should be noted that the number of the access network devices may be one or more. When the number of access network devices is one, the default AMF forwards the first slice management agent request to the proxy node after receiving the first slice management agent request sent by the access network device. When the number of access network devices is multiple, the default AMF may execute S500b after receiving the first slice management agent request sent by the access network device.
S500b:当第一比值大于第一阈值时,默认AMF根据第一切片管理代理请求向代理节点发送第二切片管理代理请求。S500b: When the first ratio is greater than the first threshold, the default AMF sends a second slice management agent request to the proxy node according to the first slice management agent request.
其中,第一比值为在预设时间内接入网中向默认AMF发送第一切片管理代理请求的接入网设备的数量与接入网中包括的全部接入网设备的数量的比值。例如,假设接入网中有500个接入网设备,在该预设时间内向默认AMF发送第一切片管理代理请求的接入网设备的数量为450个,则该第一比值即为450/500=0.9。The first ratio is a ratio of the number of access network devices in the access network that sends the first slice management agent request to the default AMF to the number of all access network devices included in the access network within a preset time. For example, assuming that there are 500 access network devices in the access network, and the number of access network devices that sends the first slice management agent request to the default AMF within the preset time is 450, the first ratio is 450 /500=0.9.
其中,第二切片管理代理请求中可携带支持网络切片代理的接入网设备所属的接入网的标识。第二切片管理代理请求用于请求代理节点为该接入网中的接入网设备进行网络切片代理。可选的,第二切片管理代理请求中还可携带代理节点的标识。The second slice management agent request may carry the identifier of the access network to which the access network device supporting the network slice agent belongs. The second slice management proxy request is used to request the proxy node to perform a network slice proxy for an access network device in the access network. Optionally, the second slice management proxy request may also carry the identity of the proxy node.
可选的,代理节点收到该第二切片管理代理请求后,还可对该第二切片管理代理请求进行确认,可进一步向该默认AMF发送确认收到该第二切片管理代理请求的确认消息。Optionally, after receiving the second slice management agent request, the proxy node may further confirm the second slice management agent request, and may further send a confirmation message to the default AMF to confirm receipt of the second slice management agent request .
需要说明的是,第一阈值可以是经验值,可以预先设置在默认AMF中。针对不同的应用场景,该第一阈值可以不同。It should be noted that the first threshold may be an empirical value, and may be preset in a default AMF. For different application scenarios, the first threshold may be different.
S500d:代理节点根据接收到的第二切片管理代理请求向NSMF发送该第三切片管理代理请求。S500d: The proxy node sends the third slice management proxy request to the NSMF according to the received second slice management proxy request.
相应地,NSMF在接收到该第三切片管理代理请求后可获知:上述的代理节点可管理接入网中的接入网切片,后续将不再通过NSMF管理接入网中的接入网切片。例如,后续NSMF需要发送给接入网中接入网设备的消息可由代理节点发送。Correspondingly, after receiving the third slice management agent request, the NSMF can learn that the above-mentioned proxy node can manage the access network slice in the access network, and will no longer manage the access network slice in the access network through NSMF. . For example, subsequent messages that the NSMF needs to send to the access network device in the access network may be sent by the proxy node.
其中,第三切片管理代理请求中可携带支持网络切片代理的接入网设备所属的接入网的标识以及代理节点的标识。第三切片管理代理请求用于请求该代理节点为该接入网中的接入网设备进行网络切片代理。The third slice management agent request may carry the identifier of the access network to which the access network device supporting the network slice agent belongs and the identifier of the proxy node. The third slice management proxy request is used to request the proxy node to perform a network slice proxy for an access network device in the access network.
一种可能的实现方式中,代理节点可通过CN内NSSMF向NSMF发送该第三切片管理代理请求,参阅图5中S500e和S500f。In a possible implementation manner, the proxy node may send the third slice management proxy request to the NSMF through the NSSMF in the CN, refer to S500e and S500f in FIG. 5.
S500e:代理节点向CN内NSSMF发送该第三切片管理代理请求。S500e: The proxy node sends the third slice management proxy request to the NSSMF in the CN.
S500f:CN内NSSMF向NSMF发送该第三切片管理代理请求。S500f: The NSSMF in the CN sends the third slice management agent request to the NSMF.
相应地,NSMF在接收到该第三切片管理代理请求后可获知:上述的代理节点可管理接入网中的接入网切片,后续将不再通过NSMF管理接入网中的接入网切片。Correspondingly, after receiving the third slice management agent request, the NSMF can learn that the above-mentioned proxy node can manage the access network slice in the access network, and will no longer manage the access network slice in the access network through NSMF. .
可选的,NSMF收到该第三切片管理代理请求后,还可对该第三切片管理代理请求进行确认,可进一步向代理节点发送确认收到该第三切片管理代理请求的确认消息。Optionally, after receiving the third slice management agent request, the NSMF may further confirm the third slice management agent request, and may further send a confirmation message to the proxy node to confirm receipt of the third slice management agent request.
下面以代理节点和NSMF通过CN内NSSMF交互、代理节点和接入网设备通过默认AMF交互、网络切片创建请求中携带第二端到端网络切片的标识,以及,代理节点在接收来自NSMF 的网络切片创建请求之前,协商由代理节点管理接入网设备中的接入网切片的能力为例,对上述图5创建网络切片的流程中,涉及到的消息名称、涉及的网元、消息中主要携带的信元、接口/协议类型进行说明,参阅表1所示。The following uses the proxy node and NSMF to interact with the NSSMF in the CN, the proxy node and the access network device to interact with the default AMF, the network slice creation request to carry the identity of the second end-to-end network slice, and the proxy node is receiving the network from the NSMF Before the slice creation request, the ability of the proxy node to manage the access network slice in the access network device is taken as an example. For the above process of creating a network slice in FIG. 5, the message names involved, the network elements involved, and the main messages The types of cells, interfaces, and protocols carried are described in Table 1.
表1Table 1
Figure PCTCN2019098153-appb-000001
Figure PCTCN2019098153-appb-000001
Figure PCTCN2019098153-appb-000002
Figure PCTCN2019098153-appb-000002
在AN内部署NSSMF的场景下,参阅图3a,通过本申请上述实施例的方法可在CN内增设代理节点,参阅图6a所示,NSMF可将网络切片创建请求先发送给CN内代理节点,待代理节点根据该网络切片创建请求创建核心网切片后,再由代理节点向AN内支持网络切片代理的接入网设备发送接入网切片创建请求,并由代理节点通知该接入网设备CN侧所做出的决策,以使AN侧参考CN侧所做出的决策,进而做出与CN侧一致的决策。In the scenario where NSSMF is deployed in the AN, referring to FIG. 3a, a proxy node can be added in the CN through the method of the above embodiment of the application. Referring to FIG. 6a, the NSMF can send a network slice creation request to the proxy node in the CN first. After the agent node creates the core network slice according to the network slice creation request, the agent node sends an access network slice creation request to the access network device supporting the network slice agent in the AN, and the agent node notifies the access network device CN The decision made by the side is to make the AN side refer to the decision made by the CN side, and then make a decision consistent with the CN side.
在AN内未部署NSSMF的场景下,参阅图3b,通过本申请上述实施例的方法可在CN内增设代理节点,参阅图6b所示,NSMF可通过该代理节点向AN内支持网络切片代理的接入网设备发送网络切片创建请求,以实现端到端网络切片的创建。此外,AN侧同样可参考CN侧所做出的决策,进而做出与CN侧一致的决策。In the scenario where NSSMF is not deployed in the AN, referring to FIG. 3b, a proxy node can be added in the CN through the method of the above embodiment of the application. Referring to FIG. 6b, the NSMF can support the network slice proxy in the AN through the proxy node The access network device sends a network slice creation request to implement the creation of an end-to-end network slice. In addition, the AN side can also refer to the decision made by the CN side, and then make a decision consistent with the CN side.
参阅图7所示,其为本申请实施例提供的又一种网络切片管理方法流程图。图7中以代理节点集成在CN内NSSMF上说明。在图7的实现方式中,上述由代理节点执行的操作均可理解为由CN内NSSMF执行,参阅图7所示,图7中S700a-S700d所执行的操作可参见图5中S500a-S500d,图7中S701-S708所执行的操作可参见图5中S501-S508,此处不再赘述。区别在于图5中由代理节点执行的操作在图7中均由CN内NSSMF执行。Refer to FIG. 7, which is a flowchart of another network slice management method according to an embodiment of the present application. Figure 7 illustrates the integration of a proxy node on the NSSMF in the CN. In the implementation manner of FIG. 7, the operations performed by the proxy node can be understood as being performed by the NSSMF in the CN. Referring to FIG. 7, the operations performed by S700a-S700d in FIG. 7 can be referred to S500a-S500d in FIG. 5. For operations performed by S701-S708 in FIG. 7, refer to S501-S508 in FIG. 5, and details are not described herein again. The difference is that the operations performed by the proxy node in FIG. 5 are all performed by the NSSMF in the CN in FIG. 7.
需要说明的是,图7中第三切片管理代理请求中可携带CN内NSSMF的标识。It should be noted that the third slice management agent request in FIG. 7 may carry the identifier of the NSSMF in the CN.
可以理解的是,本申请上述实施例中以网络切片创建为例说明。同样的,网络切片更新也可使用上述方法实施例,参阅图8和图9所示。It can be understood that, in the foregoing embodiment of the present application, network slice creation is used as an example for description. Similarly, the network slice update may also use the foregoing method embodiments, as shown in FIG. 8 and FIG. 9.
在图8和图9所示的实现方式中,S800a-S800f所执行的操作可参见图5中S500a-S500f,S900a-S900d所执行的操作可参见图5中S500a-S500d,图8中代理节点、图9中CN内NSSMF还可以向支持网络切片代理的接入网设备发送接入网切片更新请求,接入网切片更新请求中携带第二指示信息,第二指示信息用于指示第一核心网切片和已创建的第三核心网切片共享资源。这样,接入网设备可根据第二指示信息更新第一接入网切片与已创建的接入网切片的共享关系,例如,假设代理节点将第一核心网切片与第二核心网切片共享资源,更新为第一核心网切片与第三核心网切片共享资源,且第三核心网切片和第三接入网切片属于第三端到端网络切片,代理节点通过向接入网设备发送第二指示信息,以使接入网设备将第一接入网切片与第二接入网切片共享资源,更新为第一接入网切片与第三接入网切片共享资源,以实现更新网络切片后AN侧和CN侧的子网切片属于同一端到端网络切片。在该种实现方式中,图8中S805中的响应消息、图9中S905中的响应消息,可以携带接入网切片的更新结果,例如更新成功或失败。其中图8和图9中第二列表中可包括多个接入网设备反馈的接入网切片的更新结果。In the implementations shown in FIGS. 8 and 9, the operations performed by S800a-S800f can be referred to S500a-S500f in FIG. 5, and the operations performed by S900a-S900d can be referred to S500a-S500d in FIG. 5, and the proxy node in FIG. 8 In Figure 9, the NSSMF in the CN can also send an access network slice update request to an access network device that supports a network slice agent. The access network slice update request carries second instruction information, and the second instruction information is used to indicate the first core. The network slice and the created third core network slice share resources. In this way, the access network device may update the sharing relationship between the first access network slice and the created access network slice according to the second instruction information. For example, suppose the proxy node shares resources with the first core network slice and the second core network slice. , Updating to share resources between the first core network slice and the third core network slice, and the third core network slice and the third access network slice belong to the third end-to-end network slice, and the proxy node sends the second to the access network device Instruction information to enable the access network device to share resources of the first access network slice and the second access network slice to update the first access network slice and the third access network slice to share resources, so that after updating the network slice The AN and CN subnet slices belong to the same end-to-end network slice. In this implementation manner, the response message in S805 in FIG. 8 and the response message in S905 in FIG. 9 may carry the update result of the access network slice, such as the update success or failure. The second lists in FIG. 8 and FIG. 9 may include the update results of the access network slices fed back by multiple access network devices.
下面以代理节点和NSMF通过CN内NSSMF交互、代理节点和接入网设备通过默认AMF交互、由代理节点管理接入网设备中的接入网切片的能力是代理节点、NSMF以及接入网设备预先约定的,以及网络切片更新请求中携带第三端到端网络切片的标识为例,对上述图8更新 网络切片的流程中,涉及到的消息名称、涉及的网元、消息中主要携带的信元、接口/协议类型进行说明,参阅表2所示。In the following, the proxy node and NSMF interact through the NSSMF in the CN, the proxy node and the access network device interact through the default AMF, and the ability of the proxy node to manage the access network slice in the access network device is the proxy node, NSMF, and access network device. Pre-agreed and the identification of the third end-to-end network slice carried in the network slice update request is taken as an example. For the above process of updating the network slice in FIG. 8, the message names involved, the network elements involved, and the messages that are mainly carried in the message Cells, interfaces / protocol types are described in Table 2.
表2Table 2
Figure PCTCN2019098153-appb-000003
Figure PCTCN2019098153-appb-000003
可以理解的是,网络切片销毁也可使用上述方法实施例,参阅图10和图11所示。It can be understood that the network slice destruction may also use the foregoing method embodiments, as shown in FIG. 10 and FIG. 11.
在图10和图11所示的实现方式中,S1000a-S1000f所执行的操作可参见图5中S500a-S500f,S1100a-S1100d所执行的操作可参见图5中S500a-S500d,图10中代理节点、图11中CN内NSSMF还可以向支持网络切片代理的接入网设备发送接入网切片销毁请求,接入网切片销毁请求中可携带第一接入网切片的标识。例如,假设代理节点销毁第一核心网切片,代理节点通过向接入网设备发送第一接入网切片的标识,以使接入网设备销毁第一接入 网切片。在该种实现方式中,图10中S1005中的响应消息、图11中S1105中的响应消息,可以携带接入网切片的销毁结果,例如销毁成功或失败。其中图10和图11中第三列表中可包括多个接入网设备反馈的接入网切片的销毁结果。In the implementation shown in FIG. 10 and FIG. 11, the operations performed by S1000a-S1000f can be referred to S500a-S500f in FIG. 5, and the operations performed by S1100a-S1100d can be referred to S500a-S500d in FIG. 5, and the proxy node in FIG. 10 In FIG. 11, the NSSMF in the CN may also send an access network slice destruction request to an access network device that supports a network slice agent, and the access network slice destruction request may carry the identifier of the first access network slice. For example, assuming that the proxy node destroys the first core network slice, the proxy node sends the identification of the first access network slice to the access network device, so that the access network device destroys the first access network slice. In this implementation manner, the response message in S1005 in FIG. 10 and the response message in S1105 in FIG. 11 may carry the destruction result of the access network slice, such as the destruction success or failure. The third list in FIG. 10 and FIG. 11 may include the destruction result of the access network slice fed back by multiple access network devices.
下面以代理节点和NSMF通过CN内NSSMF交互、代理节点和接入网设备通过默认AMF交互、由代理节点管理接入网设备中的接入网切片的能力是代理节点、NSMF以及接入网设备预先约定的,以及网络切片销毁请求中携带第一端到端网络切片的标识为例,对上述图10销毁网络切片的流程中,涉及到的消息名称、涉及的网元、消息中主要携带的信元、接口/协议类型进行说明,参阅表3所示。In the following, the proxy node and NSMF interact through the NSSMF in the CN, the proxy node and the access network device interact through the default AMF, and the ability of the proxy node to manage the access network slice in the access network device is the proxy node, NSMF, and access network device. Pre-agreed, and the identification of the first end-to-end network slice carried in the network slice destruction request is taken as an example. For the process of destroying the network slice shown in FIG. 10, the message names involved, the network elements involved, and the messages that are mainly carried in the message Cells, interfaces / protocol types are described in Table 3.
表3table 3
Figure PCTCN2019098153-appb-000004
Figure PCTCN2019098153-appb-000004
基于上述方法实施例的同一发明构思,如图12所示,本申请实施例还提供一种网络切片管理装置1200,用于执行上述网络切片管理方法中代理节点所执行的操作。该装置1200可以包括接收单元1201、处理单元1202以及发送单元1203。Based on the same inventive concept of the foregoing method embodiments, as shown in FIG. 12, an embodiment of the present application further provides a network slice management device 1200, which is configured to perform an operation performed by a proxy node in the foregoing network slice management method. The device 1200 may include a receiving unit 1201, a processing unit 1202, and a sending unit 1203.
接收单元1201,用于接收来自NSMF的网络切片创建请求,所述网络切片创建请求用于请求创建与已创建的端到端网络切片共享资源的第一端到端网络切片,所述第一端到端网络切片包括第一核心网切片和第一接入网切片;A receiving unit 1201 is configured to receive a network slice creation request from the NSMF, where the network slice creation request is used to request the creation of a first end-to-end network slice that shares resources with the created end-to-end network slice, the first end The end-to-end network slice includes a first core network slice and a first access network slice;
处理单元1202,用于根据所述网络切片创建请求,创建所述第一核心网切片,所述第一核心网切片和已创建的第二核心网切片共享资源;A processing unit 1202, configured to create the first core network slice according to the network slice creation request, and the first core network slice and the created second core network slice share resources;
发送单元1203,用于向支持网络切片代理的接入网设备发送接入网切片创建请求,所述接入网切片创建请求用于请求创建所述第一接入网切片,所述接入网切片创建请求中携带第一指示信息,所述第一指示信息用于指示所述第一核心网切片和所述第二核心网切片共享资源。A sending unit 1203 is configured to send an access network slice creation request to an access network device supporting a network slice proxy, where the access network slice creation request is used to request creation of the first access network slice, and the access network The slice creation request carries first indication information, and the first indication information is used to instruct the first core network slice and the second core network slice to share resources.
在一种可能的实现方式中,所述网络切片创建请求中携带第二端到端网络切片的标识,所述网络切片创建请求用于请求创建与所述第二端到端网络切片共享资源的所述第一端到端网络切片。In a possible implementation manner, the network slice creation request carries an identifier of a second end-to-end network slice, and the network slice creation request is used to request creation of a resource that is shared with the second end-to-end network slice. The first end-to-end network slice.
在一种可能的实现方式中,所述第二端到端网络切片包括所述第二核心网切片。In a possible implementation manner, the second end-to-end network slice includes the second core network slice.
在一种可能的实现方式中,所述处理单元1202用于根据所述网络切片创建请求以及所述代理节点所属的核心网的资源共享切片信息,创建所述第一核心网切片,所述代理节点所属的核心网的资源共享切片信息包括所述核心网中已创建的、且支持资源共享的核心网切片的信息。In a possible implementation manner, the processing unit 1202 is configured to create the first core network slice according to the network slice creation request and resource sharing slice information of a core network to which the proxy node belongs, and the proxy The resource sharing slice information of the core network to which the node belongs includes information of a core network slice that has been created in the core network and supports resource sharing.
在一种可能的实现方式中,所述代理节点所属的核心网的资源共享切片信息包括已创建的、且支持资源共享的核心网切片的信息,所述核心网切片的信息包括核心网切片的标识和资源占用率。在该种实现方式中,所述处理单元1202用于将所述核心网切片中资源占用率最低的核心网切片确定为所述第二核心网切片;并根据所述网络切片创建请求以及所述第二核心网切片的标识,创建所述第一核心网切片。In a possible implementation manner, the resource sharing slice information of the core network to which the proxy node belongs includes information of a core network slice that has been created and supports resource sharing, and the information of the core network slice includes information of the core network slice. Identification and resource usage. In this implementation manner, the processing unit 1202 is configured to determine a core network slice with the lowest resource occupancy rate among the core network slices as the second core network slice; and create the request according to the network slice and the network slice. The identification of the second core network slice creates the first core network slice.
在一种可能的实现方式中,所述网络切片创建请求中携带第二端到端网络切片的标识,所述代理节点所属的核心网的资源共享切片信息包括所述第二端到端网络切片中核心网切片的信息,且所述核心网切片的信息包括核心网切片的标识和资源占用率。在该种实现方式中,所述处理单元1202用于当所述第二端到端网络切片中核心网切片的资源占用率小于预设值时,将所述第二端到端网络切片中核心网切片确定为所述第二核心网切片;并根据所述网络切片创建请求以及所述第二核心网切片的标识,创建所述第一核心网切片。In a possible implementation manner, the network slice creation request carries an identifier of a second end-to-end network slice, and resource sharing slice information of a core network to which the proxy node belongs includes the second end-to-end network slice. Information of the core network slice, and the information of the core network slice includes an identifier of the core network slice and a resource occupation rate. In this implementation manner, the processing unit 1202 is configured to, when the resource occupation rate of the core network slice in the second end-to-end network slice is less than a preset value, change the core in the second end-to-end network slice. The network slice is determined as the second core network slice; and the first core network slice is created according to the network slice creation request and the identity of the second core network slice.
在一种可能的实现方式中,所述发送单元1203通过默认AMF向支持网络切片代理的接入网设备发送接入网切片创建请求。在所述发送单元1203通过默认AMF向支持网络切片代理的接入网设备发送接入网切片创建请求之后,所述接收单元1201还用于接收来自所述默认AMF的第一列表,所述第一列表中包括所述支持网络切片代理的接入网设备对所述第一接入网切片的创建结果。In a possible implementation manner, the sending unit 1203 sends an access network slice creation request to an access network device that supports a network slice proxy through a default AMF. After the sending unit 1203 sends an access network slice creation request to an access network device supporting a network slice proxy through the default AMF, the receiving unit 1201 is further configured to receive a first list from the default AMF, and the first A list includes the creation result of the first access network slice by the access network device supporting the network slice proxy.
在一种可能的实现方式中,所述发送单元1203还用于向所述NSMF发送所述第一列表。In a possible implementation manner, the sending unit 1203 is further configured to send the first list to the NSMF.
在一种可能的实现方式中,所述接收单元1201接收来自NSMF的网络切片创建请求之前,还用于接收来自默认AMF的切片管理代理请求,所述切片管理代理请求中携带所述接入网设备所属的接入网的标识,用于请求所述代理节点为所述接入网中的接入网设备进行网络切片 代理;所述发送单元1203还用于向所述NSMF发送所述切片管理代理请求。In a possible implementation manner, before receiving the network slice creation request from NSMF, the receiving unit 1201 is further configured to receive a slice management agent request from a default AMF, where the slice management agent request carries the access network. The identifier of the access network to which the device belongs is used to request the proxy node to perform a network slice proxy for the access network device in the access network; the sending unit 1203 is further configured to send the slice management to the NSMF Proxy request.
在一种可能的实现方式中,所述发送单元1203还用于向所述支持网络切片代理的接入网设备发送接入网切片更新请求,所述接入网切片更新请求中携带第二指示信息,所述第二指示信息用于指示所述第一核心网切片和已创建的第三核心网切片共享资源。In a possible implementation manner, the sending unit 1203 is further configured to send an access network slice update request to the access network device supporting the network slice proxy, and the access network slice update request carries a second instruction. Information, and the second indication information is used to indicate that the first core network slice and the created third core network slice share resources.
基于上述方法实施例的同一发明构思,如图13所示,本申请实施例还提供一种网络切片管理装置1300,用于执行上述网络切片管理方法中接入网设备所执行的操作。该装置1300可以包括接收单元1301和处理单元1302。可选的,还可包括发送单元1303。Based on the same inventive concept of the foregoing method embodiments, as shown in FIG. 13, an embodiment of the present application further provides a network slice management apparatus 1300 for performing operations performed by an access network device in the foregoing network slice management method. The apparatus 1300 may include a receiving unit 1301 and a processing unit 1302. Optionally, it may further include a sending unit 1303.
接收单元1301,用于接收来自代理节点的接入网切片创建请求,所述接入网切片创建请求用于请求创建第一接入网切片,所述接入网切片创建请求中携带第一指示信息,所述第一指示信息用于指示第一核心网切片和第二核心网切片共享资源,所述接入网设备支持网络切片代理;A receiving unit 1301 is configured to receive an access network slice creation request from a proxy node. The access network slice creation request is used to request creation of a first access network slice, and the access network slice creation request carries a first instruction. Information, the first indication information is used to indicate that the first core network slice and the second core network slice share resources, and the access network device supports a network slice agent;
处理单元1302,用于根据所述接入网切片创建请求,创建所述第一接入网切片,所述第一接入网切片和已创建的第二接入网切片共享资源;其中,所述第一核心网切片和所述第一接入网切片属于第一端到端网络切片,所述第二核心网切片和所述第二接入网切片属于已创建的第二端到端网络切片。A processing unit 1302 is configured to create the first access network slice according to the access network slice creation request, and the first access network slice and the created second access network slice share resources; The first core network slice and the first access network slice belong to a first end-to-end network slice, and the second core network slice and the second access network slice belong to a created second end-to-end network slice.
在一种可能的实现方式中,所述接收单元1301通过默认AMF接收来自代理节点的接入网切片创建请求。在所述接收单元1301通过默认AMF接收来自代理节点的接入网切片创建请求之前,发送单元1303用于向所述默认AMF发送切片管理代理请求,所述切片管理代理请求中携带支持切片代理标志位和所述接入网设备的标识,所述支持切片代理标志位用于指示所述接入网设备支持网络切片代理。In a possible implementation manner, the receiving unit 1301 receives an access network slice creation request from a proxy node through a default AMF. Before the receiving unit 1301 receives an access network slice creation request from a proxy node through a default AMF, the sending unit 1303 is configured to send a slice management proxy request to the default AMF, and the slice management proxy request carries a support for a slice proxy flag Bit and the identifier of the access network device, and the support slice proxy flag bit is used to indicate that the access network device supports a network slice proxy.
基于上述方法实施例的同一发明构思,如图14所示,本申请实施例还提供一种网络切片管理装置1400,用于执行上述网络切片管理方法中默认AMF所执行的操作。该装置1400可以包括接收单元1401和发送单元1402。可选的,还可包括处理单元1403。Based on the same inventive concept of the foregoing method embodiments, as shown in FIG. 14, an embodiment of the present application further provides a network slice management device 1400, which is configured to perform an operation performed by a default AMF in the foregoing network slice management method. The apparatus 1400 may include a receiving unit 1401 and a sending unit 1402. Optionally, it may further include a processing unit 1403.
接收单元1401,用于接收来自代理节点的接入网切片创建请求,所述接入网切片创建请求用于请求创建接入网切片,所述接入网切片创建请求中携带第一指示信息,所述第一指示信息用于指示第一核心网切片和第二核心网切片共享资源,所述默认AMF和所述代理节点属于同一核心网;The receiving unit 1401 is configured to receive an access network slice creation request from a proxy node, where the access network slice creation request is used to request creation of an access network slice, and the access network slice creation request carries first indication information, The first indication information is used to indicate that the first core network slice and the second core network slice share resources, and the default AMF and the proxy node belong to the same core network;
发送单元1402,用于根据预先存储的支持网络切片代理的接入网设备的标识,向接入网中支持网络切片代理的接入网设备发送所述接入网切片创建请求。The sending unit 1402 is configured to send the access network slice creation request to an access network device that supports the network slice proxy in the access network according to a pre-stored identifier of the access network device that supports the network slice proxy.
在一种可能的实现方式中,在发送单元1402向接入网中支持网络切片代理的接入网设备发送所述接入网切片创建请求之后,所述接收单元1401还用于接收来自所述接入网设备的响应消息,所述响应消息中包括接入网切片的创建结果;发送单元1402用于根据收到的所述响应消息向所述代理节点发送第一列表,所述第一列表中包括所述默认AMF在预设时间内接收到的响应消息中包括的接入网切片的创建结果。In a possible implementation manner, after the sending unit 1402 sends the access network slice creation request to an access network device that supports a network slice proxy in an access network, the receiving unit 1401 is further configured to receive a request from the receiving unit 1401. A response message of the access network device, where the response message includes a creation result of the access network slice; the sending unit 1402 is configured to send a first list to the proxy node according to the received response message, and the first list The creation result of the access network slice included in the response message received by the default AMF within a preset time is included.
在一种可能的实现方式中,所述接收单元1401用于接收来自代理节点的接入网切片创建请求之前,还可用于接收来自所述接入网设备的第一切片管理代理请求,所述第一切片管理代理请求中携带支持切片代理标志位和所述接入网设备的标识,所述支持切片代理标志位用于指示所述接入网设备支持网络切片代理;所述发送单元1402还用于当第一比值大于第一阈值时,根据所述第一切片管理代理请求向所述代理节点发送第二切片管理代理请求,其中,所述第一比值为在预设时间内所述接入网中向所述默认AMF发送所述第一切片管理代理请求 的接入网设备的数量与所述接入网中包括的全部接入网设备的数量的比值,所述第二切片管理代理请求中携带所述接入网的标识,用于请求所述代理节点为所述接入网中的接入网设备进行网络切片代理。In a possible implementation manner, before the receiving unit 1401 is configured to receive an access network slice creation request from a proxy node, it may also be configured to receive a first slice management proxy request from the access network device. The first slice management agent request carries a support slice agent flag bit and an identifier of the access network device, and the support slice agent flag bit is used to indicate that the access network device supports a network slice agent; the sending unit 1402 is further configured to send a second slice management agent request to the proxy node according to the first slice management agent request when the first ratio is greater than a first threshold, where the first ratio is within a preset time A ratio of the number of access network devices in the access network that sends the first slice management agent request to the default AMF to the number of all access network devices included in the access network, the first The two-slice management agent request carries the identifier of the access network, and is used to request the proxy node to perform a network slice proxy for the access network device in the access network.
基于上述方法实施例的同一发明构思,如图15所示,本申请实施例还提供一种网络切片管理装置1500,用于执行上述网络切片管理方法中NSMF所执行的操作。该装置1500可以包括接收单元1501和发送单元1502。Based on the same inventive concept of the foregoing method embodiments, as shown in FIG. 15, an embodiment of the present application further provides a network slice management device 1500 for performing operations performed by the NSMF in the foregoing network slice management method. The apparatus 1500 may include a receiving unit 1501 and a sending unit 1502.
接收单元1501,用于接收来自代理节点的切片管理代理请求,所述切片管理代理请求中携带接入网的标识以及所述代理节点的标识,所述切片管理代理请求用于请求所述代理节点为所述接入网中的接入网设备进行网络切片代理;A receiving unit 1501 is configured to receive a slice management proxy request from an agent node, where the slice management proxy request carries an identifier of an access network and the identity of the proxy node, and the slice management proxy request is used to request the proxy node Performing a network slice proxy for an access network device in the access network;
发送单元1502,用于向所述代理节点发送携带所述代理节点的标识的网络切片创建请求,所述网络切片创建请求用于请求创建与已创建的端到端网络切片共享资源的端到端网络切片,所述端到端网络切片包括核心网切片和接入网切片。A sending unit 1502 is configured to send a network slice creation request carrying the identifier of the proxy node to the proxy node, where the network slice creation request is used to request the creation of an end-to-end shared resource with the created end-to-end network slice A network slice, which includes a core network slice and an access network slice.
在一种可能的实现方式中,所述接收单元1501还用于接收来自所述代理节点的第一列表,所述第一列表中包括所述接入网切片的创建结果。In a possible implementation manner, the receiving unit 1501 is further configured to receive a first list from the proxy node, where the first list includes a creation result of the access network slice.
基于与上述方法实施例的同一发明构思,如图16所示,本申请实施例还提供一种网络切片管理装置1600,该通信装置1600用于实现上述实施例提供的方法中代理节点、接入网设备、默认AMF或NSMF执行的操作,为简述示意,上述各个网元可能的实体装置的示意图通过引用图16来示意,可以理解的是,图16仅为示意图,其可以应用于上述各种不同的网元中。该网络切片管理装置1600包括:收发器1601、处理器1602以及存储器1603。处理器1602用于调用一组程序,当程序被执行时,使得处理器1602执行上述实施例提供的方法之一中代理节点、接入网设备、默认AMF或NSMF执行的操作。存储器1603用于存储处理器1602执行的程序。上述图11-图14中的发送单元和接收单元可以通过收发器1601来实现、处理单元可以通过处理器1602来实现。Based on the same inventive concept as the above method embodiment, as shown in FIG. 16, an embodiment of the present application further provides a network slice management device 1600, which is used to implement the proxy node and access in the method provided by the above embodiment. The operations performed by network equipment, default AMF, or NSMF are for brief description. The schematic diagram of the possible physical devices of each network element is illustrated by referring to FIG. 16. It can be understood that FIG. 16 is only a schematic diagram and can be applied to each of the foregoing. Different network elements. The network slice management device 1600 includes a transceiver 1601, a processor 1602, and a memory 1603. The processor 1602 is configured to call a group of programs, and when the programs are executed, cause the processor 1602 to perform operations performed by the proxy node, the access network device, the default AMF, or the NSMF in one of the methods provided by the foregoing embodiments. The memory 1603 is configured to store a program executed by the processor 1602. The above-mentioned sending unit and receiving unit in FIG. 11 to FIG. 14 may be implemented by the transceiver 1601, and the processing unit may be implemented by the processor 1602.
处理器1602可以是中央处理器(central processing unit,CPU),网络处理器(network processor,NP)或者CPU和NP的组合。The processor 1602 may be a central processing unit (CPU), a network processor (NP), or a combination of a CPU and an NP.
处理器1602还可以进一步包括硬件芯片。上述硬件芯片可以是专用集成电路(application-specific integrated circuit,ASIC),可编程逻辑器件(programmable logic device,PLD)或其组合。上述PLD可以是复杂可编程逻辑器件(complex programmable logic device,CPLD),现场可编程逻辑门阵列(field-programmable gate array,FPGA),通用阵列逻辑(generic array logic,GAL)或其任意组合。The processor 1602 may further include a hardware chip. The hardware chip may be an application-specific integrated circuit (ASIC), a programmable logic device (PLD), or a combination thereof. The PLD may be a complex programmable logic device (CPLD), a field-programmable gate array (FPGA), a generic array logic (GAL), or any combination thereof.
存储器1603可以包括易失性存储器(volatile memory),例如随机存取存储器(random-access memory,RAM);存储器1603也可以包括非易失性存储器(non-volatile memory),例如快闪存储器(flash memory),硬盘(hard disk drive,HDD)或固态硬盘(solid-state drive,SSD);存储器1603还可以包括上述种类的存储器的组合。The memory 1603 may include volatile memory (for example, random-access memory (RAM); the memory 1603 may also include non-volatile memory (for example, flash memory) memory), hard disk (HDD) or solid-state drive (SSD); the memory 1603 may also include a combination of the above types of memory.
在本申请上述实施例提供的方法中,所描述的网元或设备所执行的操作和功能中的部分或全部,可以用芯片或集成电路来完成。In the method provided by the foregoing embodiments of the present application, some or all of the operations and functions performed by the described network element or device may be completed by a chip or an integrated circuit.
为了实现上述图12-图16所述的装置的功能,本申请实施例还提供一种芯片,包括处理器,用于支持该装置实现上述实施例提供的方法所涉及的功能。在一种可能的设计中,该芯片与存储器连接或者该芯片包括存储器,该存储器用于保存该装置必要的程序指令和数据。In order to implement the functions of the device described in FIG. 12 to FIG. 16, an embodiment of the present application further provides a chip, including a processor, for supporting the device to implement functions related to the method provided in the foregoing embodiment. In a possible design, the chip is connected to a memory or the chip includes a memory, and the memory is used to store program instructions and data necessary for the device.
本申请实施例提供了一种计算机存储介质,存储有计算机程序,该计算机程序包括用于 执行上述实施例提供的方法的指令。An embodiment of the present application provides a computer storage medium storing a computer program, where the computer program includes instructions for executing the method provided by the foregoing embodiment.
本申请实施例提供了一种包含指令的计算机程序产品,当其在计算机上运行时,使得计算机执行上述实施例提供的方法。The embodiment of the present application provides a computer program product containing instructions, which when run on a computer, causes the computer to execute the method provided by the foregoing embodiment.
本领域内的技术人员应明白,本申请的实施例可提供为方法、系统、或计算机程序产品。因此,本申请可采用完全硬件实施例、完全软件实施例、或结合软件和硬件方面的实施例的形式。而且,本申请可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。Those skilled in the art should understand that the embodiments of the present application may be provided as a method, a system, or a computer program product. Therefore, this application may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Moreover, this application may take the form of a computer program product implemented on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, etc.) containing computer-usable program code.
本申请是参照根据本申请实施例的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。This application is described with reference to flowcharts and / or block diagrams of methods, devices (systems), and computer program products according to embodiments of the present application. It should be understood that each process and / or block in the flowcharts and / or block diagrams, and combinations of processes and / or blocks in the flowcharts and / or block diagrams can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general-purpose computer, special-purpose computer, embedded processor, or other programmable data processing device to produce a machine, so that the instructions generated by the processor of the computer or other programmable data processing device are used to generate Means for implementing the functions specified in one or more flowcharts and / or one or more blocks of the block diagrams.
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。These computer program instructions may also be stored in a computer-readable memory capable of directing a computer or other programmable data processing device to work in a particular manner such that the instructions stored in the computer-readable memory produce a manufactured article including an instruction device, the instructions The device implements the functions specified in one or more flowcharts and / or one or more blocks of the block diagram.
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。These computer program instructions can also be loaded on a computer or other programmable data processing device, so that a series of steps can be performed on the computer or other programmable device to produce a computer-implemented process, which can be executed on the computer or other programmable device. The instructions provide steps for implementing the functions specified in one or more flowcharts and / or one or more blocks of the block diagrams.
尽管已描述了本申请的优选实施例,但本领域内的技术人员一旦得知了基本创造性概念,则可对这些实施例作出另外的变更和修改。所以,所附权利要求意欲解释为包括优选实施例以及落入本申请范围的所有变更和修改。Although the preferred embodiments of the present application have been described, those skilled in the art can make other changes and modifications to these embodiments once they know the basic inventive concepts. Therefore, the following claims are intended to be construed to include the preferred embodiments and all changes and modifications that fall within the scope of this application.
显然,本领域的技术人员可以对本申请实施例进行各种改动和变型而不脱离本申请实施例的精神和范围。这样,倘若本申请实施例的这些修改和变型属于本申请权利要求及其等同技术的范围之内,则本申请也意图包含这些改动和变型在内。Obviously, those skilled in the art can make various modifications and variations to the embodiments of the present application without departing from the spirit and scope of the embodiments of the present application. In this way, if these modifications and variations of the embodiments of the present application fall within the scope of the claims of the present application and their equivalent technologies, the present application also intends to include these changes and variations.

Claims (21)

  1. 一种网络切片管理方法,其特征在于,包括:A network slice management method is characterized in that it includes:
    代理节点接收来自网络切片管理功能NSMF的网络切片创建请求,所述网络切片创建请求用于请求创建与已创建的端到端网络切片共享资源的第一端到端网络切片,所述第一端到端网络切片包括第一核心网切片和第一接入网切片;The proxy node receives a network slice creation request from the network slice management function NSMF. The network slice creation request is used to request the creation of a first end-to-end network slice that shares resources with the created end-to-end network slice. The first end The end-to-end network slice includes a first core network slice and a first access network slice;
    所述代理节点根据所述网络切片创建请求,创建所述第一核心网切片,所述第一核心网切片和已创建的第二核心网切片共享资源;The proxy node creates the first core network slice according to the network slice creation request, and the first core network slice and the created second core network slice share resources;
    所述代理节点向支持网络切片代理的接入网设备发送接入网切片创建请求,所述接入网切片创建请求用于请求创建所述第一接入网切片,所述接入网切片创建请求中携带第一指示信息,所述第一指示信息用于指示所述第一核心网切片和所述第二核心网切片共享资源。The proxy node sends an access network slice creation request to an access network device supporting a network slice proxy, where the access network slice creation request is used to request creation of the first access network slice, and the access network slice creation The request carries first indication information, and the first indication information is used to instruct the first core network slice and the second core network slice to share resources.
  2. 如权利要求1所述的方法,其特征在于,所述网络切片创建请求中携带第二端到端网络切片的标识,所述网络切片创建请求用于请求创建与所述第二端到端网络切片共享资源的所述第一端到端网络切片。The method according to claim 1, wherein the network slice creation request carries an identifier of a second end-to-end network slice, and the network slice creation request is used to request creation of a connection with the second end-to-end network Slicing the first end-to-end network slice of a shared resource.
  3. 如权利要求2所述的方法,其特征在于,所述第二端到端网络切片包括所述第二核心网切片。The method of claim 2, wherein the second end-to-end network slice includes the second core network slice.
  4. 如权利要求1或2所述的方法,其特征在于,所述代理节点根据所述网络切片创建请求,创建所述第一核心网切片,包括:The method according to claim 1 or 2, wherein the creating, by the proxy node, the first core network slice according to the network slice creation request comprises:
    所述代理节点根据所述网络切片创建请求以及所述代理节点所属的核心网的资源共享切片信息,创建所述第一核心网切片,所述代理节点所属的核心网的资源共享切片信息包括所述核心网中已创建的、且支持资源共享的核心网切片的信息。The proxy node creates the first core network slice according to the network slice creation request and resource sharing slice information of a core network to which the proxy node belongs, and the resource sharing slice information of the core network to which the proxy node belongs includes This section describes information about core network slices that have been created in the core network and support resource sharing.
  5. 如权利要求4所述的方法,其特征在于,所述代理节点所属的核心网的资源共享切片信息包括已创建的、且支持资源共享的核心网切片的信息,所述核心网切片的信息包括核心网切片的标识和资源占用率;The method according to claim 4, wherein the resource sharing slice information of the core network to which the proxy node belongs includes information of a core network slice that has been created and supports resource sharing, and the information of the core network slice includes Identification and resource occupancy of core network slices;
    所述代理节点根据所述网络切片创建请求以及所述代理节点所属的核心网的资源共享切片信息,创建所述第一核心网切片,包括:The creating, by the proxy node, the first core network slice according to the network slice creation request and resource sharing slice information of a core network to which the proxy node belongs, includes:
    所述代理节点将所述核心网切片中资源占用率最低的核心网切片确定为所述第二核心网切片;Determining, by the proxy node, the core network slice with the lowest resource occupancy rate among the core network slices as the second core network slice;
    所述代理节点根据所述网络切片创建请求以及所述第二核心网切片的标识,创建所述第一核心网切片。The proxy node creates the first core network slice according to the network slice creation request and the identity of the second core network slice.
  6. 如权利要求4所述的方法,其特征在于,所述网络切片创建请求中携带第二端到端网络切片的标识,所述代理节点所属的核心网的资源共享切片信息包括所述第二端到端网络切片中核心网切片的信息,且所述核心网切片的信息包括核心网切片的标识和资源占用率;The method according to claim 4, wherein the network slice creation request carries an identifier of a second end-to-end network slice, and resource sharing slice information of a core network to which the proxy node belongs includes the second end Information of the core network slice in the end-to-end network slice, and the information of the core network slice includes an identifier of the core network slice and a resource occupation rate;
    所述代理节点根据所述网络切片创建请求以及所述代理节点所属的核心网的资源共享切片信息,创建所述第一核心网切片,包括:The creating, by the proxy node, the first core network slice according to the network slice creation request and resource sharing slice information of a core network to which the proxy node belongs, includes:
    当所述第二端到端网络切片中核心网切片的资源占用率小于预设值时,所述代理节点将所述第二端到端网络切片中核心网切片确定为所述第二核心网切片;When the resource occupation rate of the core network slice in the second end-to-end network slice is less than a preset value, the proxy node determines the core network slice in the second end-to-end network slice as the second core network slice;
    所述代理节点根据所述网络切片创建请求以及所述第二核心网切片的标识,创建所述第一核心网切片。The proxy node creates the first core network slice according to the network slice creation request and the identity of the second core network slice.
  7. 如权利要求1至6任一所述的方法,其特征在于,所述代理节点向支持网络切片代理 的接入网设备发送接入网切片创建请求,包括:The method according to any one of claims 1 to 6, wherein the sending, by the proxy node, an access network slice creation request to an access network device supporting a network slice proxy comprises:
    所述代理节点通过默认接入和移动性管理功能AMF向支持网络切片代理的接入网设备发送接入网切片创建请求;The proxy node sends an access network slice creation request to an access network device supporting a network slice proxy through a default access and mobility management function AMF;
    所述代理节点通过默认AMF向支持网络切片代理的接入网设备发送接入网切片创建请求之后,还包括:After the proxy node sends the access network slice creation request to the access network device supporting the network slice proxy through the default AMF, the method further includes:
    所述代理节点接收来自所述默认AMF的第一列表,所述第一列表中包括所述支持网络切片代理的接入网设备对所述第一接入网切片的创建结果。The proxy node receives a first list from the default AMF, where the first list includes a creation result of the first access network slice by the access network device supporting the network slice proxy.
  8. 如权利要求7所述的方法,其特征在于,所述方法还包括:The method according to claim 7, further comprising:
    所述代理节点向所述NSMF发送所述第一列表。The proxy node sends the first list to the NSMF.
  9. 如权利要求1至8任一所述的方法,其特征在于,所述代理节点接收来自NSMF的网络切片创建请求之前,还包括:The method according to any one of claims 1 to 8, wherein before the proxy node receives a network slice creation request from NSMF, further comprising:
    所述代理节点接收来自默认AMF的切片管理代理请求,所述切片管理代理请求中携带所述接入网设备所属的接入网的标识,用于请求所述代理节点为所述接入网中的接入网设备进行网络切片代理;The proxy node receives a slice management proxy request from a default AMF, and the slice management proxy request carries an identifier of an access network to which the access network device belongs, and is used to request the proxy node to be in the access network. Access network equipment for network slicing proxy;
    所述代理节点向所述NSMF发送所述切片管理代理请求。The proxy node sends the slice management proxy request to the NSMF.
  10. 如权利要求1至9任一所述的方法,其特征在于,还包括:The method according to any one of claims 1 to 9, further comprising:
    所述代理节点向所述支持网络切片代理的接入网设备发送接入网切片更新请求,所述接入网切片更新请求中携带第二指示信息,所述第二指示信息用于指示所述第一核心网切片和已创建的第三核心网切片共享资源。Sending, by the proxy node, an access network slice update request to an access network device that supports a network slice proxy, where the access network slice update request carries second instruction information, and the second instruction information is used to indicate the The first core network slice and the created third core network slice share resources.
  11. 一种网络切片管理方法,其特征在于,包括:A network slice management method is characterized in that it includes:
    接入网设备接收来自代理节点的接入网切片创建请求,所述接入网切片创建请求用于请求创建第一接入网切片,所述接入网切片创建请求中携带第一指示信息,所述第一指示信息用于指示第一核心网切片和第二核心网切片共享资源,所述接入网设备支持网络切片代理;The access network device receives an access network slice creation request from a proxy node, where the access network slice creation request is used to request creation of a first access network slice, and the access network slice creation request carries first instruction information, The first indication information is used to indicate that the first core network slice and the second core network slice share resources, and the access network device supports a network slice agent;
    所述接入网设备根据所述接入网切片创建请求,创建所述第一接入网切片,所述第一接入网切片和已创建的第二接入网切片共享资源;The access network device creates the first access network slice according to the access network slice creation request, and the first access network slice and the created second access network slice share resources;
    其中,所述第一核心网切片和所述第一接入网切片属于第一端到端网络切片,所述第二核心网切片和所述第二接入网切片属于已创建的第二端到端网络切片。The first core network slice and the first access network slice belong to a first end-to-end network slice, and the second core network slice and the second access network slice belong to a created second end. End-to-end network slicing.
  12. 如权利要求11所述的方法,其特征在于,所述接入网设备接收来自代理节点的接入网切片创建请求,包括:The method according to claim 11, wherein the access network device receiving an access network slice creation request from a proxy node comprises:
    所述接入网设备通过默认接入和移动性管理功能AMF接收来自代理节点的接入网切片创建请求;The access network device receives an access network slice creation request from a proxy node through a default access and mobility management function AMF;
    所述接入网设备接收来自代理节点的接入网切片创建请求之前,还包括:Before the access network device receives an access network slice creation request from a proxy node, the method further includes:
    所述接入网设备向所述默认AMF发送切片管理代理请求,所述切片管理代理请求中携带支持切片代理标志位和所述接入网设备的标识,所述支持切片代理标志位用于指示所述接入网设备支持网络切片代理。The access network device sends a slice management proxy request to the default AMF. The slice management proxy request carries a support slice proxy flag and an identifier of the access network device, and the support slice proxy flag is used to indicate The access network device supports a network slicing agent.
  13. 一种网络切片管理方法,其特征在于,包括:A network slice management method is characterized in that it includes:
    默认接入和移动性管理功能AMF接收来自代理节点的接入网切片创建请求,所述接入网切片创建请求用于请求创建接入网切片,所述接入网切片创建请求中携带第一指示信息,所述第一指示信息用于指示第一核心网切片和第二核心网切片共享资源,所述默认AMF和所述代理节点属于同一核心网;The default access and mobility management function AMF receives an access network slice creation request from a proxy node, the access network slice creation request is used to request the creation of an access network slice, and the access network slice creation request carries a first Instruction information, where the first instruction information is used to indicate that the first core network slice and the second core network slice share resources, and the default AMF and the proxy node belong to the same core network;
    所述默认AMF根据预先存储的支持网络切片代理的接入网设备的标识,向接入网中支持网络切片代理的接入网设备发送所述接入网切片创建请求。The default AMF sends the access network slice creation request to the access network device supporting the network slice proxy in the access network according to a pre-stored identifier of the access network device supporting the network slice proxy.
  14. 如权利要求13所述的方法,其特征在于,所述默认AMF向接入网中支持网络切片代理的接入网设备发送所述接入网切片创建请求之后,还包括:The method according to claim 13, wherein after the default AMF sends the access network slice creation request to an access network device that supports a network slice proxy in the access network, further comprising:
    所述默认AMF接收来自所述接入网设备的响应消息,所述响应消息中包括接入网切片的创建结果;Receiving, by the default AMF, a response message from the access network device, where the response message includes a creation result of the access network slice;
    所述默认AMF根据所述响应消息向所述代理节点发送第一列表,所述第一列表中包括所述默认AMF在预设时间内接收到的响应消息中包括的接入网切片的创建结果。The default AMF sends a first list to the proxy node according to the response message, where the first list includes a creation result of an access network slice included in a response message received by the default AMF within a preset time. .
  15. 如权利要求13或14所述的方法,其特征在于,所述默认AMF接收来自代理节点的接入网切片创建请求之前,还包括:The method according to claim 13 or 14, before the default AMF receiving an access network slice creation request from a proxy node, further comprising:
    所述默认AMF接收来自所述接入网设备的第一切片管理代理请求,所述第一切片管理代理请求中携带支持切片代理标志位和所述接入网设备的标识,所述支持切片代理标志位用于指示所述接入网设备支持网络切片代理;The default AMF receives a first slice management proxy request from the access network device, and the first slice management proxy request carries a support for a slice proxy flag and an identifier of the access network device, and the support The slice proxy flag bit is used to indicate that the access network device supports a network slice proxy;
    当第一比值大于第一阈值时,所述默认AMF根据所述第一切片管理代理请求向所述代理节点发送第二切片管理代理请求;When the first ratio is greater than the first threshold, the default AMF sends a second slice management proxy request to the proxy node according to the first slice management proxy request;
    其中,所述第一比值为在预设时间内所述接入网中向所述默认AMF发送所述第一切片管理代理请求的接入网设备的数量与所述接入网中包括的全部接入网设备的数量的比值,所述第二切片管理代理请求中携带所述接入网的标识,所述第二切片管理代理请求用于请求所述代理节点为所述接入网中的接入网设备进行网络切片代理。The first ratio is the number of access network devices in the access network that sends the first slice management agent request to the default AMF within a preset time and the number of access network devices included in the access network. Ratio of the number of all access network devices, the second slice management agent request carries the identity of the access network, and the second slice management agent request is used to request the proxy node to be in the access network Access network device performs network slicing proxy.
  16. 一种网络切片管理方法,其特征在于,包括:A network slice management method is characterized in that it includes:
    网络切片管理功能NSMF接收来自代理节点的切片管理代理请求,所述切片管理代理请求中携带接入网的标识以及所述代理节点的标识,用于请求所述代理节点为所述接入网中的接入网设备进行网络切片代理;The network slice management function NSMF receives a slice management proxy request from a proxy node, and the slice management proxy request carries an identification of the access network and the identity of the proxy node, and is used to request the proxy node to be in the access network Access network equipment for network slicing proxy;
    所述NSMF向所述代理节点发送携带所述代理节点的标识的网络切片创建请求,所述网络切片创建请求用于请求创建与已创建的端到端网络切片共享资源的端到端网络切片,所述端到端网络切片包括核心网切片和接入网切片。Sending, by the NSMF to the proxy node, a network slice creation request carrying the identity of the proxy node, the network slice creation request is used to request creation of an end-to-end network slice that shares resources with the created end-to-end network slice, The end-to-end network slice includes a core network slice and an access network slice.
  17. 如权利要求16所述的方法,其特征在于,还包括:The method according to claim 16, further comprising:
    所述NSMF接收来自所述代理节点的第一列表,所述第一列表中包括所述接入网切片的创建结果。The NSMF receives a first list from the proxy node, and the first list includes a creation result of the access network slice.
  18. 一种网络切片管理装置,其特征在于,包括:处理器,所述处理器与存储器耦合;A network slice management device, comprising: a processor, the processor being coupled to a memory;
    存储器,用于存储计算机程序;Memory for storing computer programs;
    处理器,用于执行所述存储器中存储的计算机程序,以使得所述装置执行如权利要求1-10中任一项所述的方法。A processor for executing a computer program stored in the memory, so that the apparatus executes the method according to any one of claims 1-10.
  19. 一种网络切片管理装置,其特征在于,包括:处理器,所述处理器与存储器耦合;A network slice management device, comprising: a processor, the processor being coupled to a memory;
    存储器,用于存储计算机程序;Memory for storing computer programs;
    处理器,用于执行所述存储器中存储的计算机程序,以使得所述装置执行如权利要求11-12中任一项所述的方法。A processor for executing a computer program stored in the memory, so that the apparatus executes the method according to any one of claims 11-12.
  20. 一种网络切片管理装置,其特征在于,包括:处理器,所述处理器与存储器耦合;A network slice management device, comprising: a processor, the processor being coupled to a memory;
    存储器,用于存储计算机程序;Memory for storing computer programs;
    处理器,用于执行所述存储器中存储的计算机程序,以使得所述装置执行如权利要求 13-15中任一项所述的方法。A processor for executing a computer program stored in the memory, so that the apparatus executes the method according to any one of claims 13-15.
  21. 一种网络切片管理装置,其特征在于,包括:处理器,所述处理器与存储器耦合;A network slice management device, comprising: a processor, the processor being coupled to a memory;
    存储器,用于存储计算机程序;Memory for storing computer programs;
    处理器,用于执行所述存储器中存储的计算机程序,以使得所述装置执行如权利要求16-17中任一项所述的方法。A processor for executing a computer program stored in the memory, so that the apparatus executes the method according to any one of claims 16-17.
PCT/CN2019/098153 2018-08-31 2019-07-29 Network slice management method and apparatus WO2020042848A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201811010266.9A CN110875827B (en) 2018-08-31 2018-08-31 Network slice management method and device
CN201811010266.9 2018-08-31

Publications (1)

Publication Number Publication Date
WO2020042848A1 true WO2020042848A1 (en) 2020-03-05

Family

ID=69644739

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/098153 WO2020042848A1 (en) 2018-08-31 2019-07-29 Network slice management method and apparatus

Country Status (2)

Country Link
CN (1) CN110875827B (en)
WO (1) WO2020042848A1 (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112532445B (en) * 2020-11-26 2022-12-30 国网江苏省电力有限公司信息通信分公司 Network slicing method for network equipment without virtualization capability, system and storage medium thereof
CN115551029A (en) * 2021-06-29 2022-12-30 华为技术有限公司 Network switching method, system and related equipment
CN114158078B (en) * 2021-12-15 2023-06-16 中国联合网络通信集团有限公司 Network slice management method, device and computer readable storage medium
CN114338387A (en) * 2021-12-29 2022-04-12 中国电信股份有限公司 Slice configuration method and device, electronic equipment and computer readable storage medium
CN114500283B (en) * 2022-01-05 2023-07-21 阿里巴巴(中国)有限公司 Method and system for processing slices of core network

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090205046A1 (en) * 2008-02-13 2009-08-13 Docomo Communications Laboratories Usa, Inc. Method and apparatus for compensating for and reducing security attacks on network entities
CN106549806A (en) * 2016-10-26 2017-03-29 清华大学 A kind of network section manager and its management method
CN107317712A (en) * 2017-06-30 2017-11-03 广东工业大学 A kind of creation method and device of network section
CN108023757A (en) * 2016-11-03 2018-05-11 华为技术有限公司 Manage the methods, devices and systems of network section example

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10536946B2 (en) * 2015-12-08 2020-01-14 Huawei Technologies Co., Ltd. Method and system for performing network slicing in a radio access network
CN108307423B (en) * 2016-08-26 2023-03-24 中兴通讯股份有限公司 Wireless access network slice selection method and device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090205046A1 (en) * 2008-02-13 2009-08-13 Docomo Communications Laboratories Usa, Inc. Method and apparatus for compensating for and reducing security attacks on network entities
CN106549806A (en) * 2016-10-26 2017-03-29 清华大学 A kind of network section manager and its management method
CN108023757A (en) * 2016-11-03 2018-05-11 华为技术有限公司 Manage the methods, devices and systems of network section example
CN107317712A (en) * 2017-06-30 2017-11-03 广东工业大学 A kind of creation method and device of network section

Also Published As

Publication number Publication date
CN110875827A (en) 2020-03-10
CN110875827B (en) 2021-05-18

Similar Documents

Publication Publication Date Title
JP7401575B2 (en) Communication methods, access network devices, and core network devices
WO2020042848A1 (en) Network slice management method and apparatus
JP6923655B2 (en) Information transmission method and equipment
US10405246B2 (en) Method and apparatus for managing mobility of MPTCP connection
EP3836577B1 (en) Session management method and device for user groups
WO2019196811A1 (en) Communication method and related apparatus
US20220070748A1 (en) Data transmission method and related device
WO2018202138A1 (en) Communication method and related device
WO2019185062A1 (en) Communication method and device
US11963131B2 (en) Notification method, apparatus, and communications system
WO2019029520A1 (en) Paging message sending method and related device
US20190253895A1 (en) Control signaling processing method, device, and system
WO2019201017A1 (en) Negotiation method and apparatus for security algorithm
WO2020001562A1 (en) Communication method and apparatus
JP2023025025A (en) Data transmission method and apparatus
JP7389225B2 (en) Method and apparatus for determining security protection mode
WO2021243837A1 (en) Application data routing method based on ursp rule, and user equipment
WO2020001257A1 (en) Data transmission method and device
US20200296575A1 (en) Method and apparatus for determining status of terminal device, and device
WO2019223702A1 (en) Pdu session management method, apparatus and system
US20220369401A1 (en) Method and apparatus for admission control of sessions based on priority
US10448362B2 (en) Paging message sending method and device
US11497071B2 (en) Association handling method and device
CN110719611B (en) Message sending method and device
US9756597B1 (en) User equipment (UE) attachment to multiple mobility management entities (MMES) for multiple data services

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19854650

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19854650

Country of ref document: EP

Kind code of ref document: A1