WO2020042848A1 - Procédé et appareil de gestion de tranches de réseau - Google Patents

Procédé et appareil de gestion de tranches de réseau Download PDF

Info

Publication number
WO2020042848A1
WO2020042848A1 PCT/CN2019/098153 CN2019098153W WO2020042848A1 WO 2020042848 A1 WO2020042848 A1 WO 2020042848A1 CN 2019098153 W CN2019098153 W CN 2019098153W WO 2020042848 A1 WO2020042848 A1 WO 2020042848A1
Authority
WO
WIPO (PCT)
Prior art keywords
network slice
slice
access network
proxy
request
Prior art date
Application number
PCT/CN2019/098153
Other languages
English (en)
Chinese (zh)
Inventor
武绍芸
苏偌宇
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2020042848A1 publication Critical patent/WO2020042848A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0893Assignment of logical groups to network elements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/16Central resource management; Negotiation of resources or communication parameters, e.g. negotiating bandwidth or QoS [Quality of Service]

Definitions

  • the present application relates to the field of communications technologies, and in particular, to a network slice management method and device.
  • the 5th-generation (5G) mobile communication system introduces network slicing technology to cope with the difference in network performance requirements of different communication services.
  • a slice that can be implemented to provide a terminal with an end-to-end network service from an access network (AN) to a core network (CN) is called an end-to-end network slice.
  • AN and CN are collectively referred to as a subnet.
  • the end-to-end network slice may include a subnet slice, such as a core network slice and an access network slice.
  • an end-to-end network slice is managed by a network slice management function (NSMF).
  • NSMF network slice management function
  • an end-to-end network slice can be created, updated, or destroyed through NSMF.
  • NSMF can send network slice creation requests to the network slice subnet management function (NSSMF) deployed in the subnet.
  • NSSMF network slice subnet management function
  • the NSSMF in each subnet is based on the network slice.
  • the creation request creates a subnet slice, thereby realizing the creation of an end-to-end network slice.
  • the embodiments of the present application provide a network slice management method and device, which are used to optimize the management of end-to-end network slices.
  • a network slice management method is provided.
  • the execution body of the method may be a proxy node.
  • the proxy node may be a newly added node in the CN, or it may be integrated on the NSSMF in the CN.
  • the steps of the specific method may be as follows: receiving a network slice creation request from NSMF, the network slice creation request is used to request the creation of a first end-to-end network slice that shares resources with the created end-to-end network slice, the The first end-to-end network slice includes a first core network slice and a first access network slice, and the first core network slice is created according to the network slice creation request, and the first core network slice and the created second
  • the core network slice shares resources and sends an access network slice creation request to an access network device that supports a network slice proxy, where the access network slice creation request is used to request creation of the first access network slice, and the access network
  • the slice creation request carries first indication information, and the first indication information is used to instruct the first core network slice and the second core
  • the NSMF can use this proxy node to send network slice management messages (such as network slice creation requests) to access network devices that support network slice agents in the AN to achieve end-to-end network slice management.
  • network slice management messages such as network slice creation requests
  • the NSMF no longer sends network slice management messages to the AN and CN separately as in the prior art. Instead, the network slice management message is first sent to the proxy node in the CN.
  • the network slicing management message makes a decision, and then the proxy node sends a network slicing management message to the access network device supporting the network slicing proxy in the AN, and the proxy node notifies the decision made by the access network device CN side so that The access network equipment on the AN side can refer to the decision made by the CN side, and then make a decision consistent with the CN side.
  • the network slice management method provided by the embodiment of the present application is exemplified by an example.
  • the NSMF sends a network slice creation request to the proxy node, requesting to create an end-to-end network slice 3 that shares resources with the created end-to-end network slice.
  • the end-to-end network slice 3 may include core network slice 3 and access network slice 3.
  • the created end-to-end network slice includes end-to-end network slice 1 and end-to-end network slice 2
  • end-to-end network slice 1 includes core network slice 1 and access network slice 1
  • end-to-end network slice 2 includes Core network slice 2 and access network slice 2.
  • the NSMF can send core network slice creation requests to the NSSMF in the CN, requesting to create a core network slice 3 that shares resources with the created core network slice.
  • the NSSMF in the AN sends an access network slice creation request to request the creation of an access network slice 3 that shares resources with the created access network slice.
  • the NSSMF in the CN can create and create the core network according to the core network slice creation request.
  • Slice 1 or core network slice 2 shares the core network slice 3 of the resource.
  • the NSSMF in the AN can create an access network that shares resources with the created access network slice 1 or access network slice 2 according to the access network slice creation request.
  • Slice 3 may cause NSSMF in CN to create core network slice 3 that shares resources with the created core network slice 1, while NSSMF in AN creates access network slice 3 that shares resources with the created access network slice 2.
  • the subnet slices created in AN and CN do not belong to the same end-to-end network slice, which may cause subsequent errors when using end-to-end network slice 3.
  • the NSMF cannot send an access network slice creation request to the AN, and thus cannot create an end-to-end network slice.
  • the NSMF can send a network slice creation request to a proxy node in the CN.
  • the proxy node creates a core network slice 3 that shares resources with the created core network slice 1 according to the network slice creation request, and Send an access network slice creation request to an access network device in the AN that supports a network slice proxy, and the access network slice creation request carries instruction information to instruct core network slice 1 and core network slice 3 to share resources.
  • the support The access network device of the network slice proxy can create an access network slice 3 that shares resources with the created access network slice 1 according to the access network slice creation request, so that the subnet slices created in the AN and CN belong to the same end End-to-end network slicing can avoid errors when using end-to-end network slicing 3.
  • the network slice creation request may carry the identity of the second end-to-end network slice. At this time, the network slice creation request may be used to request creation of a shared resource with the second end-to-end network slice.
  • the first end-to-end network slice That is, the network slice creation request can be used to request the creation of a first end-to-end network slice that shares resources with a particular end-to-end network slice.
  • the following describes how a proxy node creates the first core network slice.
  • the proxy node receives a network slice creation request from NSMF, and the network slice creation request carries an identifier of a second end-to-end network slice and is used to request creation of the second end-to-end network slice.
  • the proxy node may create the first core according to the network slice creation request and resource sharing slice information of a core network to which the proxy node belongs.
  • the resource sharing slice information of the core network to which the proxy node belongs includes information about core network slices that have been created in the core network and support resource sharing. In this way, the proxy node can learn the implementation details of the core network control plane according to the resource sharing slice information of the core network to which the proxy node belongs, and then can relatively accurately create the first core network slice in combination with the implementation details of the core network control plane.
  • the following describes how a proxy node creates the first core network slice according to the network slice creation request and resource sharing slice information of a core network to which the proxy node belongs.
  • the resource shared slice information of the core network to which the proxy node belongs may include information of a core network slice that has been created and supports resource sharing, and the information of the core network slice includes the core network slice. Identification and resource usage.
  • the proxy node may create the first core network slice in the following manner: the proxy node determines the core network slice with the lowest resource occupation rate in the core network slice as the second core network slice, and The network slice creation request and the identity of the second core network slice create the first core network slice.
  • the agent node creates and shares the first core network slice of the resource with the created core network slice with the lowest resource occupancy according to the resource consumption of the core network slice, so as to optimize the resource sharing effect. .
  • the resource sharing of network slices can only be determined by NSMF.
  • NSMF cannot accurately sense the resource consumption of subnet slices in the core network and the access network. Therefore, when creating a new network slice, NSMF cannot accurately Determine the network slice to be created and which network slice has been created to perform the best resource sharing.
  • the method of the present application can optimize the management of network slices.
  • the network slice creation request carries an identifier of a second end-to-end network slice, and resource sharing slice information of a core network to which the proxy node belongs includes the second end-to-end network slice.
  • the information of the core network slice, and the information of the core network slice includes an identifier of the core network slice and a resource occupation rate.
  • the proxy node may create the first core network slice in the following manner: When the resource occupation rate of the core network slice in the second end-to-end network slice is less than a preset value, the proxy node will The core network slice in the second end-to-end network slice is determined to be the second core network slice, and the first core network slice is created according to the network slice creation request and the identity of the second core network slice. . In this method, the proxy node creates the core network slice in the second end-to-end network slice only when the resource occupancy rate of the core network slice in the second end-to-end network slice is less than a preset value. The first core network slice of the resource is shared to optimize the resource sharing effect.
  • the preset value may be set according to an actual application scenario.
  • the principle for setting the preset value may be that after a core network slice with a resource occupancy rate less than the preset value shares resources with the first core network slice, the two core network slices sharing the resource can be used normally.
  • the proxy node may send an access network slice creation request to an access network device supporting a network slice proxy through a default access and mobility management entity (AMF).
  • AMF access and mobility management entity
  • the proxy node may further receive a first list from the default AMF.
  • the creation result may be the creation success or failure.
  • the proxy node may also interact with the access network device supporting the network slice proxy through other AMF (different from the default AMF), which is not limited in this application.
  • the proxy node may further send the first list to the NSMF. Then, the NSMF can make subsequent decisions according to the first list. For example, if the creation results included in the first list are all created successfully, the NSMF need not perform other operations. If there is a creation failure in the creation result included in the first list, the NSMF may re-initiate the slice creation process for the slice that failed to be created.
  • an access network device that supports a network slice proxy can be understood as that an access network slice in the access network device can be managed by the proxy node.
  • the ability of the proxy node to manage the access network slice in the access network device may be predetermined by the proxy node, the NSMF, and the access network device, or it may be the proxy. It is determined in real time through negotiation among the node, the NSMF, and the access network device.
  • the proxy node may negotiate in the following manner: the proxy node receives a slice management proxy request from a default AMF, and the slice management proxy request may carry the information of the access network to which the access network device belongs. It is identified that the slice management proxy request may be used to request the proxy node to perform a network slice proxy for an access network device in the access network. After receiving the slice management proxy request, the proxy node may further send the slice management proxy request to the NSMF.
  • NSSMF when NSSMF is not deployed in the access network, it can be determined through negotiation that the proxy node manages the access network slice in the access network to assist the NSMF to achieve the management of the end-to-end network slice. Optimize management of end-to-end network slices.
  • the proxy node sends an access network slice update request to the access network device supporting the network slice proxy, and the access network slice update request may carry second instruction information, where The second instruction information is used to indicate that the first core network slice and the created third core network slice share resources.
  • the access network device can update the resource sharing relationship between the first access network slice and the created access network slice according to the second instruction information, and ensure that the AN side and the CN side make consistent decisions. For example, if the proxy node updates the shared resources of the first core network slice and the created second core network slice to the shared resources of the first core network slice and the created third core network slice, the update content can be passed through the update
  • the second instruction information informs the AN side access network device.
  • the access network device may also update the resource sharing relationship of the first access network slice according to the decision of the CN side.
  • a network slicing management method may be performed by an access network device that supports a network slicing agent.
  • the steps of the specific method may be described as follows: receiving a connection from an agent node.
  • a network slice creation request, the access network slice creation request is used to request the creation of a first access network slice, and the access network slice creation request may carry first instruction information, where the first instruction information is used to indicate The first core network slice and the second core network slice share resources, and create the first access network slice according to the access network slice creation request, the first access network slice and the created second access Network slice shared resources, wherein the first core network slice and the first access network slice belong to a first end-to-end network slice, and the second core network slice and the second access network slice belong to The second end-to-end network slice created.
  • the access network device may learn the decision made by the CN side according to the first instruction information, and then may refer to the decision made by the CN side to make a decision consistent with the CN side.
  • the AN and the CN The created subnet slices belong to the same end-to-end network slice, which can prevent subsequent errors when using the end-to-end network slice.
  • the access network device may receive an access network slice creation request from a proxy node through a default AMF.
  • the access network device may further send a slice management proxy request to the default AMF, and the slice management proxy request carries a support slice.
  • a proxy flag bit and an identification of the access network device, and the support slice proxy flag bit is used to indicate that the access network device supports a network slice proxy.
  • the proxy node can manage the access network slice in the access network to assist the NSMF to implement the end Management of end-to-end network slices.
  • a network slice management method is provided.
  • the execution body of the method may be a default AMF.
  • the steps of the specific method may be described as follows: receiving an access network slice creation request from a proxy node, and the access network slice creation The request is used to request the creation of an access network slice, and the access network slice creation request carries first instruction information, where the first instruction information is used to indicate that the first core network slice and the second core network slice share resources, and The default AMF and the proxy node belong to the same core network, and send the access network slice to the access network device supporting the network slice proxy in the access network according to a pre-stored identifier of the access network device supporting the network slice proxy. Create request.
  • the default AMF after the default AMF sends the access network slice creation request to an access network device that supports a network slice proxy in the access network, it may further receive a response message from the access network device.
  • the response message includes the creation result of the access network slice, and a first list is sent to the proxy node according to the response message, where the first list includes the response message received by the default AMF within a preset time and includes Result of the creation of the access network slice.
  • the default AMF may further receive a first slice management proxy request from the access network device, the first slice
  • the management proxy request carries a support slice proxy flag and an identification of the access network device, and the support slice proxy flag is used to indicate that the access network device supports a network slice proxy.
  • the first ratio is greater than a first threshold
  • the default AMF sends a second slice management agent request to the proxy node according to the first slice management agent request, wherein the first ratio is to the access network to the access point within a preset time.
  • the second slice management proxy request is used to request the proxy node to perform a network slice proxy for the access network device in the access network.
  • a network slice management method is provided.
  • the execution body of the method may be NSSF.
  • the steps of the specific method may be as follows: receiving a slice management agent request from an agent node, and the slice management agent request carries access The network identification and the identity of the proxy node, the slice management proxy request is used to request the proxy node to perform a network slice proxy for the access network device in the access network, and send the proxy node to the proxy node to carry the proxy node
  • the identified network slice creation request is used to request the creation of an end-to-end network slice that shares resources with the created end-to-end network slice.
  • the end-to-end network slice includes a core network slice and an access. Net slice.
  • the NSMF receives a first list from the proxy node, and the first list includes a creation result of the access network slice.
  • a network slicing management device has a function of implementing the behavior of a proxy node in any of the first aspect and the first possible design of the first aspect.
  • the functions may be implemented by hardware, and may also be implemented by hardware executing corresponding software.
  • the hardware or software includes one or more modules corresponding to the functions described above.
  • the device may be a chip or an integrated circuit.
  • the device includes a memory and a processor.
  • the memory stores a set of programs.
  • the processor is configured to execute the programs stored in the memory.
  • the device may execute the first aspect and the first aspect. The method described in any of the possible designs.
  • the device further includes a transceiver for communication between the device and other network elements.
  • the device is a proxy node
  • the proxy node may be a newly added node in the CN or may be integrated on the NSSMF in the CN.
  • a network slicing management device has a function of implementing the behavior of an access network device in any one of the second aspect and the second possible design of the second aspect.
  • the functions may be implemented by hardware, and may also be implemented by hardware executing corresponding software.
  • the hardware or software includes one or more modules corresponding to the functions described above.
  • the device may be a chip or an integrated circuit.
  • the device includes a memory and a processor.
  • the memory stores a set of programs.
  • the processor is configured to execute the programs stored in the memory.
  • the device may execute the second aspect and the second aspect. The method described in any of the possible designs.
  • the device further includes a transceiver for communication between the device and other network elements.
  • the device is an access network device.
  • a network slicing management device has a function of implementing the default AMF behavior in any of the foregoing third aspect and the third possible design.
  • the functions may be implemented by hardware, and may also be implemented by hardware executing corresponding software.
  • the hardware or software includes one or more modules corresponding to the functions described above.
  • the device may be a chip or an integrated circuit.
  • the device includes a memory and a processor.
  • the memory stores a set of programs.
  • the processor is configured to execute the programs stored in the memory.
  • the device may execute the third aspect and the third aspect. The method described in any of the possible designs.
  • the device further includes a transceiver for communication between the device and other network elements.
  • the device is the default AMF.
  • a network slicing management device has a function of realizing the NSMF behavior in any one of the foregoing fourth aspect and the fourth possible design.
  • the functions may be implemented by hardware, and may also be implemented by hardware executing corresponding software.
  • the hardware or software includes one or more modules corresponding to the functions described above.
  • the device may be a chip or an integrated circuit.
  • the device includes a memory and a processor.
  • the memory stores a set of programs.
  • the processor is configured to execute the programs stored in the memory.
  • the device may execute the fourth aspect and the fourth aspect. The method described in any of the possible designs.
  • the device further includes a transceiver for communication between the device and other network elements.
  • the device is NSMF.
  • a chip is provided, the chip is connected to a memory or the chip includes a memory for reading and executing a software program stored in the memory, so as to implement the first, second, and third aspects as described above.
  • the fourth aspect any possible design of the first aspect, any possible design of the second aspect, any possible design of the third aspect, and any possible design of the fourth aspect Methods.
  • a communication system includes the devices described in any two aspects or any two or more of the first to fourth aspects.
  • a computer storage medium storing a computer program, the computer program including instructions for performing the foregoing aspects and any possible design method in each aspect.
  • a computer program product is provided.
  • the computer reads and executes the computer program product, the computer is caused to execute the method described in the foregoing aspects and any possible design of each aspect.
  • FIG. 1 is a schematic diagram of a system architecture according to an embodiment of the present application.
  • FIG. 2 is a second schematic diagram of a system architecture according to an embodiment of the present application.
  • 3a is a third schematic diagram of a system architecture provided by an embodiment of the present application.
  • 3b is a fourth schematic diagram of a system architecture according to an embodiment of the present application.
  • FIG. 4 is a flowchart of a network slice management method according to an embodiment of the present application.
  • FIG. 5 is a flowchart of another network slice management method according to an embodiment of the present application.
  • 6a is a fifth schematic diagram of a system architecture according to an embodiment of the present application.
  • 6b is a sixth schematic diagram of a system architecture according to an embodiment of the present application.
  • FIG. 7 is a flowchart of another network slice management method according to an embodiment of the present application.
  • FIG. 8 is a flowchart of another network slice management method according to an embodiment of the present application.
  • FIG. 9 is a flowchart of still another network slice management method according to an embodiment of the present application.
  • FIG. 10 is a flowchart of still another network slice management method according to an embodiment of the present application.
  • FIG. 11 is a flowchart of another network slice management method according to an embodiment of the present application.
  • FIG. 12 is one of the schematic structural diagrams of a network slice management apparatus according to an embodiment of the present application.
  • FIG. 13 is a second schematic structural diagram of a network slice management device according to an embodiment of the present application.
  • FIG. 14 is a third schematic structural diagram of a network slice management device according to an embodiment of the present application.
  • FIG. 15 is a fourth schematic structural diagram of a network slice management apparatus according to an embodiment of the present application.
  • FIG. 16 is a fifth schematic structural diagram of a network slice management apparatus according to an embodiment of the present application.
  • the present application provides a network slice management method and device, which are used to assist NSMF to optimize end-to-end network slice management through a proxy node.
  • the method and device are based on the same or similar concept of the same invention. Since the principle of the method and the device to solve the problem is similar, the implementation of the device and the method can be referred to each other, and the duplicates will not be repeated.
  • "and / or” describes the association relationship of the associated objects, and indicates that there can be three kinds of relationships. For example, A and / or B can mean: A exists alone, A and B exist simultaneously, and There are three cases of B.
  • the character "/" generally indicates that the related objects are an "or" relationship.
  • At least one involved in this application means one or more; multiple means two or more.
  • the words “first” and “second” are used only for the purpose of distinguishing descriptions, and cannot be understood as indicating or implying relative importance, nor as indicating Or imply order.
  • At least one means one or more; “at least one” means one or more; multiple means two or more.
  • the network slice management method provided in the embodiment of the present application may be applicable to a 5G communication system, and may also be applicable to a new communication system in the future (such as the 6th-generation (6G) mobile communication system, etc.). .
  • FIG. 1 exemplarily shows a schematic diagram of a system architecture applicable to the embodiment of the present application, and the embodiment of the present application is not limited to be applied to the system architecture shown in FIG. 1.
  • Each network element shown in FIG. 1 may be hardware, software divided in function, or a combination of the two.
  • the system architecture provided in the embodiment of the present application includes a terminal, an access network (AN) device, and an access and mobility management network element (also referred to as: access and mobility management functions).
  • the terminal establishes communication with the DN through the access network equipment and the user plane network element.
  • the network elements involved in the embodiments of the present application may also be referred to as functions or functional entities.
  • the network slice management network element may also be referred to as a network slice management function or a network slice management function entity, access and mobility.
  • the mobility management network element may be referred to as an access and mobility management function or an access and mobility management function entity.
  • the names of the various network elements are not limited in this application. Those skilled in the art may change the names of the above network elements to other names and perform the same functions, which all fall within the protection scope of this application.
  • system architecture shown in FIG. 1 may be the 5G system architecture shown in FIG. 2.
  • the functions of each network element or device are described below.
  • Terminals also known as user equipment (UE), mobile stations (MS), mobile terminals (MT), terminal equipment, etc.
  • UE user equipment
  • MS mobile stations
  • MT mobile terminals
  • terminal equipment etc.
  • the terminal includes a handheld device having a wireless connection function, a vehicle-mounted device, and the like.
  • the terminals can be: mobile phones, tablet computers, laptops, palmtop computers, mobile internet devices (MID), wearable devices, virtual reality (VR) devices, augmented reality (augmented) Reality (AR) equipment, wireless terminals in industrial control, wireless terminals in self-driving, wireless terminals in remote medical surgery, wireless in smart grid Terminals, wireless terminals in transportation safety, wireless terminals in smart cities, or wireless terminals in smart homes.
  • MID mobile internet devices
  • VR virtual reality
  • AR augmented reality
  • wireless terminals in industrial control wireless terminals in self-driving
  • wireless terminals in remote medical surgery wireless in smart grid Terminals
  • wireless terminals in transportation safety wireless terminals in smart cities, or wireless terminals in smart homes.
  • the access network equipment (also called AN equipment) is responsible for the wireless side access of the terminal.
  • Possible deployment forms include: a centralized unit (CU) and distributed unit (DU) separation scenario; and Single-site scenario.
  • Single site includes gNB / NR-NB, transmission receiving point (TRP), evolved Node B (eNB), radio network controller (RNC), and node B (Node B) NB), base station controller (BSC), base transceiver station (BTS), home base station (e.g., home NodeB, or home NodeB, HNB), baseband unit (base band unit, BBU), or wireless fidelity (Wifi) access point (AP).
  • TRP transmission receiving point
  • eNB evolved Node B
  • RNC radio network controller
  • Node B Node B
  • BSC base station controller
  • BTS base transceiver station
  • home base station e.g., home NodeB, or home NodeB, HNB
  • baseband unit base band unit, BBU
  • AP wireless
  • the CU supports radio resource control (radio resource control, RRC), packet data convergence protocol (PDCP), service data adaptation protocol (service data adaptation protocol, SDAP) and other protocols.
  • CUs are generally deployed at central offices and have relatively abundant computing resources.
  • DU mainly supports radio link control layer (radio link control, RLC), media access control layer (media access control, MAC) and physical layer (PHY) protocols.
  • DUs are generally deployed in a distributed manner. In general, more than one DU is connected to a CU.
  • the gNB has the functions of CU and DU, and is usually deployed as a single site.
  • the access and mobility management network element may be an access and mobility management function (AMF) in 5G.
  • AMF access and mobility management function
  • the access and mobility management network element is responsible for terminal access and mobility management in the mobile network.
  • the user plane network element may be a user plane function (UPF) in a 5G architecture, as shown in FIG. 2.
  • the UPF is responsible for message processing and forwarding.
  • DN which provides data transmission services for terminals
  • PDN network such as the Internet (Internet), IP Multi-media Service (IMS), and so on.
  • Internet Internet
  • IMS IP Multi-media Service
  • the network slice management network element may be a network slice management function (NSMF) in the 5G architecture, which is used to manage the network slice of the entire network.
  • NSMF network slice management function
  • the network slice subnet management network element can be a network slice subnet management function (NSSMF) in the 5G architecture. It can be deployed in each subnet, for example, it can be deployed in the CN and AN for management. Network slices within a subnet.
  • the NSSMF deployed in the CN may be referred to as the NSSMF in the CN or the NSSMF in the CN domain.
  • the NSSMF deployed in the AN may be referred to as the NSSMF in the AN or the NSSMF in the AN domain.
  • the name of the NSSMF deployed in the subnet is not limited in this application.
  • the system architecture shown in FIG. 1 may also be a 5G system architecture shown in FIG. 3a.
  • Figure 3a illustrates the deployment of NSSMF in AN and CN respectively as an example.
  • end-to-end network slices can be managed through NSMF.
  • end-to-end network slices can be created, updated, or destroyed through NSMF.
  • the NSMF can send network slice creation requests to the NSSMF in the AN and the NSSMF in the CN, respectively.
  • the NSSMF in the AN creates the access network slice according to the network slice creation request, and the NSSMF in the CN according to the network.
  • the slice creation request creates a core network slice, thereby completing the creation of an end-to-end network slice.
  • the NSMF does not understand the implementation details of the core and access network control planes, the NSMF may not be able to make accurate decisions.
  • an embodiment of the present application provides a network slice management method for optimizing management of an end-to-end network slice.
  • FIG. 4 it is a flowchart of a network slice management method according to an embodiment of the present application.
  • the method includes the following processing flow.
  • the proxy node receives a network slice creation request from the NSMF.
  • the network slice creation request may be used to request to create a first end-to-end network slice that shares resources with the created end-to-end network slice.
  • the first end-to-end network slice may include a first core network slice and a first Access network slicing.
  • shared resources may refer to sharing virtual machines or containers.
  • the proxy node may be a newly added node in the CN, or it may be integrated on the NSSMF in the CN. In the embodiment of the present application, the proxy node is a newly added node in the CN.
  • the network slice creation request may also be referred to as an end-to-end network slice creation request or a slice creation request.
  • the end-to-end network slice can be a slice that provides end-to-end network services from AN to CN for the terminal, and can also be called a network slice or slice.
  • the end-to-end network slice may include a network slice in a core network and a network slice in an access network.
  • the network slice in the core network can also be referred to as the network slice in the CN domain or the core network slice, and the network slice in the access network can also be called the network slice or access network slice in the AN domain.
  • AN and CN may be collectively referred to as a subnet, and may also be referred to as a subnetwork or a subdomain.
  • the network slices in the core network and the network slices in the access network may be collectively referred to as a sub-network slice, a sub-network slice, or a sub-domain slice.
  • the proxy node creates a first core network slice according to the network slice creation request.
  • the first core network slice shares resources with the created second core network slice.
  • the network slice creation request may carry the identity of the second end-to-end network slice.
  • the network slice creation request may be used to request the creation of a first end-to-end network slice that shares resources with the second end-to-end network slice. That is, the NSMF can request the creation of a first end-to-end network slice that shares resources with a particular end-to-end network slice.
  • the proxy node itself can determine that the first end-to-end network slice to be created shares resources with a particular created end-to-end network slice. The following section describes how the agent node creates the first core network slice in detail.
  • the proxy node can create a first end-to-end network slice that shares the resource with a second end-to-end network slice specified by NSMF, or it can create an The end-to-end network slice shares the first end-to-end network slice of the resource. Detailed examples are given below for different situations.
  • the proxy node sends an access network slice creation request to an access network device that supports a network slice proxy.
  • the access network slice creation request may be used to request creation of a first access network slice, and the access network slice creation request may carry first indication information, where the first indication information is used to indicate the first core network slice and the second core network slice.
  • Core network slices share resources.
  • the proxy node may send an access network slice creation request to the access network device through control plane signaling.
  • the following describes in detail how the proxy node creates the first end-to-end network slice.
  • the network slice creation request carries an identifier of a second end-to-end network slice
  • the second end-to-end network slice includes a second core network slice
  • the proxy node may carry the identifier in the network slice creation request. Identification of the second end-to-end network slice, to determine the second core network slice included in the second end-to-end network slice corresponding to the identification, and then to create a second core network slice included in the second end-to-end network slice
  • the first core network slice of the shared resource That is, the proxy node may create a first core network slice that shares resources with the core network slice included in the second end-to-end network slice according to the identity of the second end-to-end network slice.
  • the second end-to-end network slice includes a second core network slice. It can also be understood that the second core network slice belongs to the second end-to-end network slice.
  • the proxy node may create a first core network slice according to the network slice creation request and resource sharing slice information of a core network to which the proxy node belongs.
  • the resource sharing slice information of the core network to which the proxy node belongs may include information of a core network slice that has been created in the core network to which the proxy node belongs and supports resource sharing.
  • the information of the core network slice may include an identifier of the core network slice, a resource occupation rate, and the like.
  • the resource occupation rate of the core network slice in this application may include the resource occupation rate of a virtual machine or a container in which the core network slice is deployed.
  • the following uses core network slice information including the identifier of the core network slice or the identifier of the core network slice and the resource occupancy rate as an example to the proxy node according to the network slice creation request and the resources of the core network to which the proxy node belongs. Share slice information and create a first core network slice for illustration.
  • the resource sharing slice information of the core network to which the proxy node belongs may include the one that has been created, Moreover, the identifier of the core network slice supporting resource sharing is supported, and the proxy node may create a first core network slice of the core network slice shared resource corresponding to the identifier according to the identifier.
  • the resource sharing slice information of the core network to which the proxy node belongs may include at least two The identifier of the core network slice that has been created and supports resource sharing and the resource occupancy rate.
  • the proxy node may determine the core network slice with the lowest resource occupancy among at least two core network slices included in the core network to which the proxy node belongs, and create a second core network slice according to the network slice creation request and the first The identification of the two core network slices creates a first core network slice that shares resources with the second core network slice.
  • the core network to which the proxy node belongs includes three core network slices that have been created, namely core network slice A, core network slice B, and core network slice C
  • the resource sharing slice of the core network to which the proxy node belongs The information may include the identification and resource occupancy of core network slice A, core network slice B, and core network slice C. It is further assumed that the identification of core network slice A is identification A, the resource occupancy rate is 30%, and the identification of core network slice B is Identity B, resource occupancy rate is 70%, core network slice C is identity C, and resource occupancy rate is 50%.
  • the proxy node After receiving the network slice creation request from NSMF, the proxy node can determine the need to create and The first end-to-end network slice of the created end-to-end network slice sharing resources can be further determined to create a first core network slice that shares resources with the created core network slice. In order to ensure that the created first core network slice has With sufficient resources, the proxy node can root to create a first core network slice that shares resources with the core network slice A that has the lowest resource usage. With the method provided by this example, the proxy node can create a first core network slice that shares resources with the core network slice that has been created and has the lowest resource usage according to the resource consumption of the core network slice in the core network to which the proxy node belongs. In order to optimize the effect of resource sharing. It solves the problem of low resource utilization caused by NSMF in the prior art because it cannot sense the resource consumption of subnet slices in the core network and access network. Obviously, the method of the present application can optimize the management of network slices.
  • the network slice creation request carries the identity of the second end-to-end network slice
  • the resource sharing slice information of the core network to which the proxy node belongs includes the identity of the core network slice in the second end-to-end network slice.
  • resource usage when the proxy node determines that the resource occupation rate of the core network slice in the second end-to-end network slice is less than a preset value, the proxy node determines the core network slice in the second end-to-end network slice as the second core Network slice, and create a first core network slice according to the network slice creation request and the identity of the second core network slice.
  • a first core network slice that shares resources with the created core network slice may be created.
  • the requirements of the end-to-end network slicing may include delay requirements, isolation requirements, and the like.
  • the resource sharing slice information of the core network to which the proxy node belongs includes the identity 22 of the core network slice in the second end-to-end network slice.
  • the resource occupancy rate is 40%, assuming the preset value is 50%, after receiving the network slice creation request from NSMF, the proxy node can determine the need to create a share with the created second end-to-end network slice according to the request.
  • the first end-to-end network slice of the resource can further determine the need to create a first core network slice that shares the resource with the core network slice in the second end-to-end network slice, and the proxy node can further determine the second end-to-end network slice
  • the resource occupancy rate of the core network slice of 40% is less than a preset value of 50%, so that a first core network slice that shares resources with the core network slice in the second end-to-end network slice can be created.
  • the proxy node creates a first shared resource with the core network slice in the second end-to-end network slice when the resource occupation rate of the core network slice in the second end-to-end network slice is less than a preset value.
  • a core network slice to optimize resource sharing.
  • the preset value can be set according to the actual application scenario.
  • the principle for setting the preset value may be that after the core network slice with the resource occupancy rate less than the preset value shares resources with the first core network slice, the two core network slices sharing the resource can be used normally.
  • the network slicing management method provided by the embodiment of the present application is described in more detail below with reference to the flow shown in FIG. 4. As shown in FIG. 5, the flow of the network slice management method is as follows. The description of the new node in the CN is based on the proxy node.
  • S501-S503 can refer to the descriptions of S401-S403, which will not be repeated here.
  • the proxy node may receive the network slice creation request from the NSMF through the NSSMF in the CN, see S501a and S501b in FIG. 5.
  • the proxy node sends an access network slice creation request to an access network device supporting a network slice proxy through a default AMF, as shown in S503a-S503c in FIG. 5.
  • the AMF After receiving the access network slice creation request from the proxy node by default, the AMF sends the access to the access network device supporting the network slice proxy in the access network according to the pre-stored identification of the access network device supporting the network slice proxy. Net slice creation request.
  • the access network device in FIG. 5 refers to an access network device that supports a network slicing agent.
  • the proxy node may also interact with the access network device supporting the network slice proxy through another AMF (different from the default AMF), which is not limited in this application.
  • the terminal when the terminal is not sure to access a specific AMF after registering to the network, it chooses to access the default AMF.
  • steps marked with a solid line in FIG. 5 are all steps that must be performed, such as S501, S502, and S503, and the steps marked with a dotted line are optional steps, such as S503a, S503c, S501a and S501b.
  • steps marked with a solid line in the drawings involved in this application are all steps that must be performed, and steps marked with a dotted line are optional steps.
  • the access network device supporting the network slice proxy in the access network After the access network device supporting the network slice proxy in the access network receives the access network slice creation request sent by the proxy node, it may execute S504.
  • S504 The access network device supporting the network slice proxy in the access network creates a first access network slice according to the access network slice creation request.
  • an access network device that supports a network slice proxy in the access network may create a first access network slice according to a delay requirement, an isolation requirement, etc. carried in the access network slice creation request.
  • the first access network slice and the created second access network slice share resources.
  • the second core network slice and the second access network slice belong to the created second end-to-end network slice.
  • S505 The access network device supporting the network slice proxy in the access network sends a response message to the default AMF.
  • the response message may include the creation result of the access network slice.
  • the creation result may be the creation success or failure.
  • S506 The default AMF sends the first list to the proxy node according to the response message.
  • the first list may include the creation result of the access network slice included in the response message received by the default AMF within a preset time. For example, suppose that there are 500 access network devices in the access network that support network slicing agents. Each access network device that supports the network slicing agent can create the first access network slice according to the access network slice creation request. Send a response message including the creation result of the access network slice to the default AMF, but each access network device that supports the network slice agent may not send a response message to the default AMF at the same time, the default AMF can receive each support within a preset time The response message sent by the access network device of the network slicing agent.
  • the 450 response messages can be included in the response message.
  • the creation result of the access network slice forms a first list, and sends the first list to the proxy node.
  • S507 The proxy node receives the first list from the default AMF.
  • the proxy node After the proxy node receives the first list sent by the default AMF, it can be processed by the proxy node in the CN domain. For example, if the creation result included in the first list does not include the creation failure, the first list is ignored. If the included creation result includes a creation failure, the creation process can be re-initiated for the access network slice that failed to be created.
  • S508 may be executed.
  • S508 The proxy node sends the first list to the NSMF.
  • the NSMF performs subsequent processing after receiving the first list. For example, if the creation result included in the first list does not include the creation failure, the first list is ignored, and if the creation result included in the first list includes the creation failure, the creation process may be re-initiated for the slice that failed to be created.
  • the proxy node may send the first list to the NSMF through the NSSMF in the CN in step S508, see S508a and S508b in FIG. 5.
  • an access network device supporting a network slice proxy can be understood as that an access network slice in the access network device can be managed by a proxy node.
  • the ability of the proxy node to manage the access network slice in the access network device may be predetermined by the proxy node, NSMF, and access network device, or it may be real-time negotiation between the proxy node, NSMF, and access network device. definite.
  • the capability of the proxy node to manage the access network slice in the access network device is negotiated, see S500a-S500f in FIG. 5.
  • S500a The access network device sends a first slice management proxy request to the default AMF.
  • the first slice management proxy request is used to request a network slice proxy for the access network device.
  • the first slice management agent request may carry the identifier of the access network device.
  • the first slice management agent request may further carry a slice agent support flag.
  • the support slice proxy flag bit is used to indicate that the access network device supports a network slice proxy.
  • the support slice proxy flag can be one or more bits.
  • the AMF may further confirm the first slice management agent request, and may further send an acknowledgement to the access network device to receive the first slice management agent. Requested confirmation message.
  • the number of the access network devices may be one or more.
  • the default AMF forwards the first slice management agent request to the proxy node after receiving the first slice management agent request sent by the access network device.
  • the default AMF may execute S500b after receiving the first slice management agent request sent by the access network device.
  • S500b When the first ratio is greater than the first threshold, the default AMF sends a second slice management agent request to the proxy node according to the first slice management agent request.
  • the second slice management agent request may carry the identifier of the access network to which the access network device supporting the network slice agent belongs.
  • the second slice management proxy request is used to request the proxy node to perform a network slice proxy for an access network device in the access network.
  • the second slice management proxy request may also carry the identity of the proxy node.
  • the proxy node may further confirm the second slice management agent request, and may further send a confirmation message to the default AMF to confirm receipt of the second slice management agent request .
  • the first threshold may be an empirical value, and may be preset in a default AMF. For different application scenarios, the first threshold may be different.
  • the proxy node sends the third slice management proxy request to the NSMF according to the received second slice management proxy request.
  • the NSMF can learn that the above-mentioned proxy node can manage the access network slice in the access network, and will no longer manage the access network slice in the access network through NSMF. .
  • subsequent messages that the NSMF needs to send to the access network device in the access network may be sent by the proxy node.
  • the third slice management agent request may carry the identifier of the access network to which the access network device supporting the network slice agent belongs and the identifier of the proxy node.
  • the third slice management proxy request is used to request the proxy node to perform a network slice proxy for an access network device in the access network.
  • the proxy node may send the third slice management proxy request to the NSMF through the NSSMF in the CN, refer to S500e and S500f in FIG. 5.
  • the proxy node sends the third slice management proxy request to the NSSMF in the CN.
  • S500f The NSSMF in the CN sends the third slice management agent request to the NSMF.
  • the NSMF can learn that the above-mentioned proxy node can manage the access network slice in the access network, and will no longer manage the access network slice in the access network through NSMF. .
  • the NSMF may further confirm the third slice management agent request, and may further send a confirmation message to the proxy node to confirm receipt of the third slice management agent request.
  • the following uses the proxy node and NSMF to interact with the NSSMF in the CN, the proxy node and the access network device to interact with the default AMF, the network slice creation request to carry the identity of the second end-to-end network slice, and the proxy node is receiving the network from the NSMF
  • the ability of the proxy node to manage the access network slice in the access network device is taken as an example.
  • the message names involved, the network elements involved, and the main messages The types of cells, interfaces, and protocols carried are described in Table 1.
  • a proxy node can be added in the CN through the method of the above embodiment of the application.
  • the NSMF can send a network slice creation request to the proxy node in the CN first.
  • the agent node After the agent node creates the core network slice according to the network slice creation request, the agent node sends an access network slice creation request to the access network device supporting the network slice agent in the AN, and the agent node notifies the access network device CN
  • the decision made by the side is to make the AN side refer to the decision made by the CN side, and then make a decision consistent with the CN side.
  • a proxy node can be added in the CN through the method of the above embodiment of the application.
  • the NSMF can support the network slice proxy in the AN through the proxy node
  • the access network device sends a network slice creation request to implement the creation of an end-to-end network slice.
  • the AN side can also refer to the decision made by the CN side, and then make a decision consistent with the CN side.
  • FIG. 7 is a flowchart of another network slice management method according to an embodiment of the present application.
  • Figure 7 illustrates the integration of a proxy node on the NSSMF in the CN.
  • the operations performed by the proxy node can be understood as being performed by the NSSMF in the CN.
  • the operations performed by S700a-S700d in FIG. 7 can be referred to S500a-S500d in FIG. 5.
  • S701-S708 in FIG. 7 refer to S501-S508 in FIG. 5, and details are not described herein again.
  • the difference is that the operations performed by the proxy node in FIG. 5 are all performed by the NSSMF in the CN in FIG. 7.
  • the third slice management agent request in FIG. 7 may carry the identifier of the NSSMF in the CN.
  • network slice creation is used as an example for description.
  • the network slice update may also use the foregoing method embodiments, as shown in FIG. 8 and FIG. 9.
  • the operations performed by S800a-S800f can be referred to S500a-S500f in FIG. 5, and the operations performed by S900a-S900d can be referred to S500a-S500d in FIG. 5, and the proxy node in FIG. 8
  • the NSSMF in the CN can also send an access network slice update request to an access network device that supports a network slice agent.
  • the access network slice update request carries second instruction information, and the second instruction information is used to indicate the first core.
  • the network slice and the created third core network slice share resources. In this way, the access network device may update the sharing relationship between the first access network slice and the created access network slice according to the second instruction information.
  • the proxy node shares resources with the first core network slice and the second core network slice. , Updating to share resources between the first core network slice and the third core network slice, and the third core network slice and the third access network slice belong to the third end-to-end network slice, and the proxy node sends the second to the access network device Instruction information to enable the access network device to share resources of the first access network slice and the second access network slice to update the first access network slice and the third access network slice to share resources, so that after updating the network slice
  • the AN and CN subnet slices belong to the same end-to-end network slice.
  • the response message in S805 in FIG. 8 and the response message in S905 in FIG. 9 may carry the update result of the access network slice, such as the update success or failure.
  • the second lists in FIG. 8 and FIG. 9 may include the update results of the access network slices fed back by multiple access network devices.
  • the proxy node and NSMF interact through the NSSMF in the CN
  • the proxy node and the access network device interact through the default AMF
  • the ability of the proxy node to manage the access network slice in the access network device is the proxy node, NSMF, and access network device.
  • Pre-agreed and the identification of the third end-to-end network slice carried in the network slice update request is taken as an example.
  • the message names involved, the network elements involved, and the messages that are mainly carried in the message Cells, interfaces / protocol types are described in Table 2.
  • network slice destruction may also use the foregoing method embodiments, as shown in FIG. 10 and FIG. 11.
  • the operations performed by S1000a-S1000f can be referred to S500a-S500f in FIG. 5, and the operations performed by S1100a-S1100d can be referred to S500a-S500d in FIG. 5, and the proxy node in FIG. 10
  • the NSSMF in the CN may also send an access network slice destruction request to an access network device that supports a network slice agent, and the access network slice destruction request may carry the identifier of the first access network slice. For example, assuming that the proxy node destroys the first core network slice, the proxy node sends the identification of the first access network slice to the access network device, so that the access network device destroys the first access network slice.
  • the response message in S1005 in FIG. 10 and the response message in S1105 in FIG. 11 may carry the destruction result of the access network slice, such as the destruction success or failure.
  • the third list in FIG. 10 and FIG. 11 may include the destruction result of the access network slice fed back by multiple access network devices.
  • the proxy node and NSMF interact through the NSSMF in the CN
  • the proxy node and the access network device interact through the default AMF
  • the ability of the proxy node to manage the access network slice in the access network device is the proxy node, NSMF, and access network device.
  • Pre-agreed, and the identification of the first end-to-end network slice carried in the network slice destruction request is taken as an example.
  • the message names involved, the network elements involved, and the messages that are mainly carried in the message Cells, interfaces / protocol types are described in Table 3.
  • an embodiment of the present application further provides a network slice management device 1200, which is configured to perform an operation performed by a proxy node in the foregoing network slice management method.
  • the device 1200 may include a receiving unit 1201, a processing unit 1202, and a sending unit 1203.
  • a receiving unit 1201 is configured to receive a network slice creation request from the NSMF, where the network slice creation request is used to request the creation of a first end-to-end network slice that shares resources with the created end-to-end network slice, the first end
  • the end-to-end network slice includes a first core network slice and a first access network slice;
  • a processing unit 1202 configured to create the first core network slice according to the network slice creation request, and the first core network slice and the created second core network slice share resources;
  • a sending unit 1203 is configured to send an access network slice creation request to an access network device supporting a network slice proxy, where the access network slice creation request is used to request creation of the first access network slice, and the access network
  • the slice creation request carries first indication information, and the first indication information is used to instruct the first core network slice and the second core network slice to share resources.
  • the network slice creation request carries an identifier of a second end-to-end network slice, and the network slice creation request is used to request creation of a resource that is shared with the second end-to-end network slice.
  • the second end-to-end network slice includes the second core network slice.
  • the processing unit 1202 is configured to create the first core network slice according to the network slice creation request and resource sharing slice information of a core network to which the proxy node belongs, and the proxy
  • the resource sharing slice information of the core network to which the node belongs includes information of a core network slice that has been created in the core network and supports resource sharing.
  • the resource sharing slice information of the core network to which the proxy node belongs includes information of a core network slice that has been created and supports resource sharing, and the information of the core network slice includes information of the core network slice. Identification and resource usage.
  • the processing unit 1202 is configured to determine a core network slice with the lowest resource occupancy rate among the core network slices as the second core network slice; and create the request according to the network slice and the network slice. The identification of the second core network slice creates the first core network slice.
  • the network slice creation request carries an identifier of a second end-to-end network slice
  • resource sharing slice information of a core network to which the proxy node belongs includes the second end-to-end network slice.
  • Information of the core network slice, and the information of the core network slice includes an identifier of the core network slice and a resource occupation rate.
  • the processing unit 1202 is configured to, when the resource occupation rate of the core network slice in the second end-to-end network slice is less than a preset value, change the core in the second end-to-end network slice.
  • the network slice is determined as the second core network slice; and the first core network slice is created according to the network slice creation request and the identity of the second core network slice.
  • the sending unit 1203 sends an access network slice creation request to an access network device that supports a network slice proxy through a default AMF.
  • the receiving unit 1201 is further configured to receive a first list from the default AMF, and the first A list includes the creation result of the first access network slice by the access network device supporting the network slice proxy.
  • the sending unit 1203 is further configured to send the first list to the NSMF.
  • the receiving unit 1201 before receiving the network slice creation request from NSMF, is further configured to receive a slice management agent request from a default AMF, where the slice management agent request carries the access network.
  • the identifier of the access network to which the device belongs is used to request the proxy node to perform a network slice proxy for the access network device in the access network; the sending unit 1203 is further configured to send the slice management to the NSMF Proxy request.
  • the sending unit 1203 is further configured to send an access network slice update request to the access network device supporting the network slice proxy, and the access network slice update request carries a second instruction.
  • Information, and the second indication information is used to indicate that the first core network slice and the created third core network slice share resources.
  • an embodiment of the present application further provides a network slice management apparatus 1300 for performing operations performed by an access network device in the foregoing network slice management method.
  • the apparatus 1300 may include a receiving unit 1301 and a processing unit 1302.
  • it may further include a sending unit 1303.
  • a receiving unit 1301 is configured to receive an access network slice creation request from a proxy node.
  • the access network slice creation request is used to request creation of a first access network slice, and the access network slice creation request carries a first instruction.
  • Information, the first indication information is used to indicate that the first core network slice and the second core network slice share resources, and the access network device supports a network slice agent;
  • a processing unit 1302 is configured to create the first access network slice according to the access network slice creation request, and the first access network slice and the created second access network slice share resources;
  • the first core network slice and the first access network slice belong to a first end-to-end network slice, and the second core network slice and the second access network slice belong to a created second end-to-end network slice.
  • the receiving unit 1301 receives an access network slice creation request from a proxy node through a default AMF.
  • the sending unit 1303 is configured to send a slice management proxy request to the default AMF, and the slice management proxy request carries a support for a slice proxy flag Bit and the identifier of the access network device, and the support slice proxy flag bit is used to indicate that the access network device supports a network slice proxy.
  • an embodiment of the present application further provides a network slice management device 1400, which is configured to perform an operation performed by a default AMF in the foregoing network slice management method.
  • the apparatus 1400 may include a receiving unit 1401 and a sending unit 1402. Optionally, it may further include a processing unit 1403.
  • the receiving unit 1401 is configured to receive an access network slice creation request from a proxy node, where the access network slice creation request is used to request creation of an access network slice, and the access network slice creation request carries first indication information, The first indication information is used to indicate that the first core network slice and the second core network slice share resources, and the default AMF and the proxy node belong to the same core network;
  • the sending unit 1402 is configured to send the access network slice creation request to an access network device that supports the network slice proxy in the access network according to a pre-stored identifier of the access network device that supports the network slice proxy.
  • the receiving unit 1401 is further configured to receive a request from the receiving unit 1401.
  • the sending unit 1402 is configured to send a first list to the proxy node according to the received response message, and the first list
  • the creation result of the access network slice included in the response message received by the default AMF within a preset time is included.
  • the receiving unit 1401 before the receiving unit 1401 is configured to receive an access network slice creation request from a proxy node, it may also be configured to receive a first slice management proxy request from the access network device.
  • the first slice management agent request carries a support slice agent flag bit and an identifier of the access network device, and the support slice agent flag bit is used to indicate that the access network device supports a network slice agent;
  • the sending unit 1402 is further configured to send a second slice management agent request to the proxy node according to the first slice management agent request when the first ratio is greater than a first threshold, where the first ratio is within a preset time A ratio of the number of access network devices in the access network that sends the first slice management agent request to the default AMF to the number of all access network devices included in the access network, the first The two-slice management agent request carries the identifier of the access network, and is used to request the proxy node to perform a network slice proxy for the access network device in the access network.
  • an embodiment of the present application further provides a network slice management device 1500 for performing operations performed by the NSMF in the foregoing network slice management method.
  • the apparatus 1500 may include a receiving unit 1501 and a sending unit 1502.
  • a receiving unit 1501 is configured to receive a slice management proxy request from an agent node, where the slice management proxy request carries an identifier of an access network and the identity of the proxy node, and the slice management proxy request is used to request the proxy node Performing a network slice proxy for an access network device in the access network;
  • a sending unit 1502 is configured to send a network slice creation request carrying the identifier of the proxy node to the proxy node, where the network slice creation request is used to request the creation of an end-to-end shared resource with the created end-to-end network slice A network slice, which includes a core network slice and an access network slice.
  • the receiving unit 1501 is further configured to receive a first list from the proxy node, where the first list includes a creation result of the access network slice.
  • an embodiment of the present application further provides a network slice management device 1600, which is used to implement the proxy node and access in the method provided by the above embodiment.
  • the operations performed by network equipment, default AMF, or NSMF are for brief description.
  • the schematic diagram of the possible physical devices of each network element is illustrated by referring to FIG. 16. It can be understood that FIG. 16 is only a schematic diagram and can be applied to each of the foregoing. Different network elements.
  • the network slice management device 1600 includes a transceiver 1601, a processor 1602, and a memory 1603.
  • the processor 1602 is configured to call a group of programs, and when the programs are executed, cause the processor 1602 to perform operations performed by the proxy node, the access network device, the default AMF, or the NSMF in one of the methods provided by the foregoing embodiments.
  • the memory 1603 is configured to store a program executed by the processor 1602.
  • the above-mentioned sending unit and receiving unit in FIG. 11 to FIG. 14 may be implemented by the transceiver 1601, and the processing unit may be implemented by the processor 1602.
  • the processor 1602 may be a central processing unit (CPU), a network processor (NP), or a combination of a CPU and an NP.
  • CPU central processing unit
  • NP network processor
  • the processor 1602 may further include a hardware chip.
  • the hardware chip may be an application-specific integrated circuit (ASIC), a programmable logic device (PLD), or a combination thereof.
  • the PLD may be a complex programmable logic device (CPLD), a field-programmable gate array (FPGA), a generic array logic (GAL), or any combination thereof.
  • the memory 1603 may include volatile memory (for example, random-access memory (RAM); the memory 1603 may also include non-volatile memory (for example, flash memory) memory), hard disk (HDD) or solid-state drive (SSD); the memory 1603 may also include a combination of the above types of memory.
  • volatile memory for example, random-access memory (RAM)
  • non-volatile memory for example, flash memory
  • HDD hard disk
  • SSD solid-state drive
  • the memory 1603 may also include a combination of the above types of memory.
  • an embodiment of the present application further provides a chip, including a processor, for supporting the device to implement functions related to the method provided in the foregoing embodiment.
  • the chip is connected to a memory or the chip includes a memory, and the memory is used to store program instructions and data necessary for the device.
  • An embodiment of the present application provides a computer storage medium storing a computer program, where the computer program includes instructions for executing the method provided by the foregoing embodiment.
  • the embodiment of the present application provides a computer program product containing instructions, which when run on a computer, causes the computer to execute the method provided by the foregoing embodiment.
  • this application may be provided as a method, a system, or a computer program product. Therefore, this application may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Moreover, this application may take the form of a computer program product implemented on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, etc.) containing computer-usable program code.
  • computer-usable storage media including, but not limited to, disk storage, CD-ROM, optical storage, etc.
  • These computer program instructions may also be stored in a computer-readable memory capable of directing a computer or other programmable data processing device to work in a particular manner such that the instructions stored in the computer-readable memory produce a manufactured article including an instruction device, the instructions
  • the device implements the functions specified in one or more flowcharts and / or one or more blocks of the block diagram.
  • These computer program instructions can also be loaded on a computer or other programmable data processing device, so that a series of steps can be performed on the computer or other programmable device to produce a computer-implemented process, which can be executed on the computer or other programmable device.
  • the instructions provide steps for implementing the functions specified in one or more flowcharts and / or one or more blocks of the block diagrams.

Abstract

L'invention concerne un procédé et appareil de gestion de tranches de réseau, destinés à optimiser la gestion de tranches de réseau de bout en bout. Ledit procédé comporte les étapes suivantes: un nœud mandataire reçoit une demande de création de tranche de réseau provenant d'une NSMF, la demande de création de tranche de réseau étant utilisée pour demander la création d'une première tranche de réseau de bout en bout partageant des ressources avec une tranche de réseau de bout en bout créée, la première tranche de réseau de bout en bout comprenant une première tranche de réseau central et une première tranche de réseau d'accès; la première tranche de réseau central est créée d'après la demande de création de tranche de réseau, la première tranche de réseau central partageant des ressources avec une seconde tranche de réseau central créée; et est envoyée une demande de création de tranche de réseau d'accès à un dispositif de réseau d'accès prenant en charge un mandataire de tranche de réseau, la demande de création de tranche de réseau d'accès étant utilisée pour demander la création de la première tranche de réseau d'accès, la demande de création de tranche de réseau d'accès transportant des premières informations d'instruction, les premières informations d'instruction étant utilisées pour donner comme consigne à la première tranche de réseau central et à la seconde tranche de réseau central de partager des ressources.
PCT/CN2019/098153 2018-08-31 2019-07-29 Procédé et appareil de gestion de tranches de réseau WO2020042848A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201811010266.9 2018-08-31
CN201811010266.9A CN110875827B (zh) 2018-08-31 2018-08-31 一种网络切片管理方法及装置

Publications (1)

Publication Number Publication Date
WO2020042848A1 true WO2020042848A1 (fr) 2020-03-05

Family

ID=69644739

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/098153 WO2020042848A1 (fr) 2018-08-31 2019-07-29 Procédé et appareil de gestion de tranches de réseau

Country Status (2)

Country Link
CN (1) CN110875827B (fr)
WO (1) WO2020042848A1 (fr)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112532445B (zh) * 2020-11-26 2022-12-30 国网江苏省电力有限公司信息通信分公司 一种用于无虚拟化能力的网络设备的网络切片方法及其系统、存储介质
CN113473562B (zh) * 2021-06-29 2022-07-22 华为技术有限公司 网络切换方法、系统及相关设备
CN114158078B (zh) * 2021-12-15 2023-06-16 中国联合网络通信集团有限公司 网络切片管理方法、装置及计算机可读存储介质
CN114338387A (zh) * 2021-12-29 2022-04-12 中国电信股份有限公司 切片配置方法及装置、电子设备和计算机可读存储介质
CN114500283B (zh) * 2022-01-05 2023-07-21 阿里巴巴(中国)有限公司 核心网的切片处理方法和系统

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090205046A1 (en) * 2008-02-13 2009-08-13 Docomo Communications Laboratories Usa, Inc. Method and apparatus for compensating for and reducing security attacks on network entities
CN106549806A (zh) * 2016-10-26 2017-03-29 清华大学 一种网络切片管理器及其管理方法
CN107317712A (zh) * 2017-06-30 2017-11-03 广东工业大学 一种网络切片的创建方法及装置
CN108023757A (zh) * 2016-11-03 2018-05-11 华为技术有限公司 管理网络切片实例的方法、装置和系统

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10536946B2 (en) * 2015-12-08 2020-01-14 Huawei Technologies Co., Ltd. Method and system for performing network slicing in a radio access network
CN108307423B (zh) * 2016-08-26 2023-03-24 中兴通讯股份有限公司 一种无线接入网络切片选择方法和装置

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090205046A1 (en) * 2008-02-13 2009-08-13 Docomo Communications Laboratories Usa, Inc. Method and apparatus for compensating for and reducing security attacks on network entities
CN106549806A (zh) * 2016-10-26 2017-03-29 清华大学 一种网络切片管理器及其管理方法
CN108023757A (zh) * 2016-11-03 2018-05-11 华为技术有限公司 管理网络切片实例的方法、装置和系统
CN107317712A (zh) * 2017-06-30 2017-11-03 广东工业大学 一种网络切片的创建方法及装置

Also Published As

Publication number Publication date
CN110875827B (zh) 2021-05-18
CN110875827A (zh) 2020-03-10

Similar Documents

Publication Publication Date Title
JP7401575B2 (ja) 通信方法、アクセスネットワークデバイス、およびコアネットワークデバイス
WO2020042848A1 (fr) Procédé et appareil de gestion de tranches de réseau
JP6923655B2 (ja) 情報伝送方法および装置
US10405246B2 (en) Method and apparatus for managing mobility of MPTCP connection
EP3836577B1 (fr) Procédé et dispositif de gestion de session pour groupes d'utilisateurs
WO2019196811A1 (fr) Procédé de communication, et appareil associé
US11963131B2 (en) Notification method, apparatus, and communications system
US20220070748A1 (en) Data transmission method and related device
WO2018202138A1 (fr) Procédé de communication et dispositif associé
WO2019185062A1 (fr) Procédé et dispositif de communication
WO2019029520A1 (fr) Procédé d'envoi de message de radiomessagerie et dispositif associé
US20190253895A1 (en) Control signaling processing method, device, and system
WO2019201017A1 (fr) Procédé et appareil de négociation pour algorithme de sécurité
WO2020001562A1 (fr) Procédé et appareil de communication
JP2023025025A (ja) データ伝送方法及び装置
JP7389225B2 (ja) セキュリティ保護モードを決定するための方法および装置
WO2021243837A1 (fr) Procédé de routage de données d'application basé sur une règle ursp, et équipement utilisateur
WO2020001257A1 (fr) Procédé et dispositif de transmission de données
WO2019223702A1 (fr) Procédé, appareil, et système de gestion de session pdu
US20200296575A1 (en) Method and apparatus for determining status of terminal device, and device
US20220369401A1 (en) Method and apparatus for admission control of sessions based on priority
US10448362B2 (en) Paging message sending method and device
EP3700291A1 (fr) Dispositif et procédé de traitement de connexion
CN110719611A (zh) 一种报文发送方法和装置
WO2020078248A1 (fr) Procédé et dispositif de communication sans fil

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19854650

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19854650

Country of ref document: EP

Kind code of ref document: A1