WO2020119795A1 - Procédé et dispositif de communication - Google Patents

Procédé et dispositif de communication Download PDF

Info

Publication number
WO2020119795A1
WO2020119795A1 PCT/CN2019/125264 CN2019125264W WO2020119795A1 WO 2020119795 A1 WO2020119795 A1 WO 2020119795A1 CN 2019125264 W CN2019125264 W CN 2019125264W WO 2020119795 A1 WO2020119795 A1 WO 2020119795A1
Authority
WO
WIPO (PCT)
Prior art keywords
area
indication information
communication
terminal device
connected state
Prior art date
Application number
PCT/CN2019/125264
Other languages
English (en)
Chinese (zh)
Inventor
刘建宁
李岩
葛翠丽
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2020119795A1 publication Critical patent/WO2020119795A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/40Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • H04W48/10Access restriction or access information delivery, e.g. discovery data delivery using broadcasted information

Definitions

  • This application relates to the field of communication technology, and in particular, to a communication method and device.
  • UAVs unmanned aerial vehicles
  • some drones for example, drones used for agricultural operations or power inspection
  • UAVs that are close to or located in the UAV control area
  • the network side cannot detect that the drone is close to or located in the drone control area, so that the drone cannot be located.
  • the embodiments of the present application provide a communication method and device for solving the problem that the network cannot locate the drone due to the drone being in an idle state.
  • a communication method which includes: an access network device acquiring identification information of a first area; the access network device broadcasts to the first area for instructing a terminal device of a first type to enter a connected state or maintain a connected state Or enter and maintain the first indication of the connection state.
  • the access network device broadcasts the first indication information to the first area, so that the terminal device of the first type in the idle state in the first area can enter the connected state when the terminal of the first type
  • the device is a drone, it can solve the problem that the network cannot locate the drone because the drone is in an idle state.
  • the method further includes: the access network device receives the first indication information from the mobility management entity.
  • This possible implementation provides a method for the access network device to obtain the first indication information.
  • the access network device acquiring the identification information of the first area includes: the access network device receiving the identification information of the first area from the mobility management entity. This possible implementation provides a method for the access network device to obtain the identification information of the first area.
  • the method further includes: the access network device receives second indication information from the mobility management entity; the access network device stops broadcasting the first indication information to the first area according to the second indication information.
  • the second indication information may be used to indicate the first to the mobility management entity The indication information is invalid, so as to avoid unnecessary consumption of network resources.
  • the method further includes: the access network device broadcasting second indication information indicating that the first indication information is invalid to the first area.
  • the second indication information can be The terminal device of the type indicates that the first indication information is invalid, thereby avoiding unnecessary consumption of network resources.
  • the first area is a cell
  • the terminal device of the first type is in the cell.
  • a communication method including: a terminal device receiving a first broadcast from an access network device to a first area for instructing a terminal device of a first type to enter a connected state or maintain a connected state or enter and maintain a connected state An instruction message, when the terminal device is the first type of terminal device indicated by the first instruction message, the terminal device enters the connected state or maintains the connected state or enters and maintains the connected state according to the first instruction information.
  • the terminal device of the first type in the idle state in the first area can enter the connected state through the received first indication information.
  • the terminal device of the first type is an unmanned aerial vehicle, it can Solve the problem that the network cannot locate the drone because the drone is idle.
  • the terminal device receives second indication information broadcast by the access network device to the first area, and the second indication information is used to indicate that the first indication information is invalid.
  • a communication method including: a mobility management entity determining an access network device, a service area of the access network device includes a first area; and a mobility management entity sending an instruction to the access network device to indicate the first
  • the first indication information of the terminal device of the type entering the connected state or maintaining the connection state or entering and maintaining the connected state, the terminal device of the first type is in the first area.
  • the method provided in the third aspect provides a method for obtaining first indication information for an access network device.
  • the method further includes: the mobility management entity sends the identification information of the first area to the access network device.
  • the mobility management entity sends the identification information of the first area to the access network device.
  • This possible implementation provides a method for the access network device to obtain the identification information of the first area.
  • the method further includes: the mobility management entity sends second indication information indicating that the first indication information is invalid to the access network device.
  • This possible implementation provides a method for the access network device to obtain the second indication information.
  • the method further includes: the mobility management entity receives the first indication information; or, the mobility management entity receives instructions for instructing the terminal device of the first type to enter the connected state or maintain the connected state or enter and Keep the first message in the connected state, and generate first indication information according to the first message.
  • This possible implementation manner provides a method for obtaining the first indication information for the mobility management entity.
  • the method further includes: the mobility management entity receives the identification information of the second area; the mobility management entity determines the first area according to the second area, and the first area is a subset of the second area.
  • This possible implementation provides a method for the mobility management entity to determine the first area.
  • the method further includes: the mobility management entity receives second indication information; or, the mobility management entity receives a second message indicating that the first indication information is invalid, and generates according to the second message Second instructions.
  • This possible implementation manner provides a method for the mobility management entity to obtain the second indication information.
  • a communication method including: an application server determining a third area; the application server sends first indication information and identification information of the third area to a border control network element, the first indication information is used to indicate the first type Of the terminal devices enter the connected state or remain connected or enter and maintain the connected state, the terminal device of the first type is in the first area, and the first area is a subset of the third area.
  • the method provided in the fourth aspect provides a method for acquiring the first indication information and the identification information of the third area for the border control network element.
  • the method further includes: the application server sending second indication information indicating that the first indication information is invalid to the border control network element.
  • This possible implementation manner provides a method for obtaining the second indication information for the border control network element.
  • a communication method which includes: a boundary control network element receiving first indication information and identification information of a third area from an application server, where the first indication information is used to indicate a terminal device of a first type Enter the connected state or stay connected or enter and maintain the connected state, the first type of terminal device is in the first area; the border control network element determines the second area according to the third area; the border control network element acquires the mobility management entity, mobility The management entity is a mobility management entity in the mobility management entity covering the second area, and the second area is a subset of the third area; the border control network element sends the first indication information and the identification of the second area to the mobility management entity Information, the first area is a subset of the second area.
  • the method provided in the fifth aspect provides a method for the mobility management entity to obtain the first indication information and the identification information of the second area.
  • the method further includes: the border control network element receives second indication information indicating that the first indication information is invalid from the application server; the border control network element sends the second indication information to the mobility management entity .
  • This possible implementation manner provides a method for the mobility management entity to obtain the second indication information.
  • a communication method including: a terminal device sends a third message to a mobility management entity, the terminal device is a first type of terminal device, and the third message carries the type of the terminal device Information; the terminal device receives third indication information from the mobility management entity, the third indication information is used to instruct the terminal device to remain connected in the target area; the terminal device enters according to the third indication information The target area remains connected.
  • the method provided in the sixth aspect provides another method for keeping the terminal device connected in the target area, so that when the terminal device is a drone, the network locates the terminal device.
  • a communication method including: a mobility management entity receiving a third message from a terminal device, where the third message carries type information of the terminal device; if the mobility management entity is based on the third When the message determines that the terminal device is the first type of terminal device, the mobility management entity sends third indication information to the terminal device, where the third indication information is used to instruct the terminal device to remain connected in the target area state.
  • the method provided in the seventh aspect provides another method for keeping the terminal device connected in the target area, so that when the terminal device is an unmanned aerial vehicle, the network locates the terminal device.
  • the method further includes: the mobility management entity acquiring identification information of the target area.
  • a communication device having a function of implementing any one of the methods provided in any one of the first to fourth aspects.
  • This function can be realized by hardware, and can also be realized by hardware executing corresponding software.
  • the hardware or software includes one or more units corresponding to the above functions.
  • the communication device may exist in the form of a chip product.
  • a communication device including: a communication unit and a processing unit; the communication unit is configured to receive first indication information and identification information of a third area from an application server, and the first indication information is used to Instructing a terminal device of the first type to enter a connected state or to maintain a connected state or to enter and maintain a connected state, the terminal device of the first type is in a first area; the processing unit is configured to determine a second area according to the third area; The processing unit is also used to obtain a mobility management entity, which is a mobility management entity among the mobility management entities covering the second area, and the second area is a child of the third area The communication unit is also used to send the first indication information and the identification information of the second area to the mobility management entity, where the first area is a subset of the second area.
  • the communication unit is further configured to receive second indication information from the application server, and the second indication information is used to indicate that the first indication information is invalid; the communication unit, It is also used to send the second indication information to the mobility management entity.
  • a communication device including: a communication unit and a processing unit; the communication unit is configured to send a third message to a mobility management entity, and the terminal device is a terminal device of the first type, the The third message carries the type information of the terminal device; the communication unit is also used to receive third indication information from the mobility management entity, and the third indication information is used to instruct the terminal device to remain connected in the target area
  • the processing unit is configured to maintain a connected state after entering the target area according to the third instruction information.
  • a communication device including: a communication unit and a processing unit; the communication unit is configured to receive a third message from a terminal device, and the third message carries type information of the terminal device;
  • the processing unit determines that the terminal device is a terminal device of the first type according to the third message, the communication unit is further configured to send third indication information to the terminal device, and the third indication information is used to Instructing the terminal device to remain connected in the target area.
  • the processing unit is further configured to obtain identification information of the target area.
  • a communication device includes: a memory, a processor, at least one communication interface, and a communication bus; the memory is used to store computer-executed instructions, and the processor, memory, and at least one communication interface pass through the communication bus Connected, the processor executes computer-executed instructions stored in the memory, so that the communication device implements any one of the methods provided in any one of the first aspect to the seventh aspect.
  • the device can exist in the form of a chip product.
  • a computer-readable storage medium including instructions which, when run on a computer, cause the computer to perform any one of the methods provided in any one of the first to seventh aspects.
  • a fourteenth aspect there is provided a computer program product containing instructions that, when run on a computer, cause the computer to perform any method provided in any one of the first aspect to the seventh aspect.
  • FIGS. 1 to 3 are schematic diagrams of a network architecture provided by embodiments of the present application.
  • FIG. 5 is a schematic diagram of a location of a first area and a second area provided by an embodiment of the present application
  • FIG. 6 is a schematic diagram of locations of a first area, a second area, and a third area provided by an embodiment of this application;
  • FIG. 9 is a schematic diagram of the composition of a communication device provided by an embodiment of the present application.
  • FIG. 10 is a schematic diagram of a hardware structure of a communication device provided by an embodiment of the present application.
  • the words “first” and “second” are used to distinguish the same or similar items that have substantially the same functions and functions. Those skilled in the art may understand that the words “first” and “second” do not limit the number and execution order, and the words “first” and “second” do not necessarily mean different.
  • orthogonal frequency division multiple access orthogonal frequency-division multiple access
  • OFDMA orthogonal frequency-division multiple access
  • SC-FDMA single carrier frequency division multiple access
  • system can be used interchangeably with "network”.
  • OFDMA systems can implement wireless technologies such as evolved universal wireless terrestrial access (evolved universal terrestrial radio access, E-UTRA for short), ultra mobile broadband (ultra mobile broadband, UMB for short).
  • E-UTRA is an evolved version of the Universal Mobile Telecommunications System (UMTS).
  • the 3rd Generation Partnership Project (3GPP) is a new version using E-UTRA in long term evolution (LTE) and various versions based on LTE evolution.
  • the 5th-generation (5G) communication system and new radio (NR) are the next-generation communication systems under study.
  • the communication system can also be adapted to future-oriented communication technologies, and all the technical solutions provided by the embodiments of the present application are applicable.
  • the method provided by the embodiment of the present application may be applied to the 5G system shown in FIG. 1.
  • the 5G system may include one or more of the following network function (NF) entities: Authentication server function (AUSF) entity, access and mobility management (core access and mobility management function, AMF) entity, data network (DN), unified data management (unified data management) , Referred to as UDM) entity, policy control function (PCF) entity, (radio) access network ((radio) access network (R)AN) equipment, user plane function (user plane function, UPF for short) ) Entity, terminal device, application function (application function, AF) entity, session management function (SMF) entity, network exposure function (NEF) entity, gateway mobile location center (gateway mobile location center) location, center (GMLC) entity, network function (repository function, NRF) entity, unified data (repository, UDR) entity.
  • NF network function
  • AUSF Authentication server function
  • AMF access and mobility management
  • DN data network
  • the RAN equipment is mainly responsible for radio resource management, quality of service (QoS) management, data compression, and encryption functions on the air interface side.
  • the RAN device may include various forms of base stations, such as macro base stations, micro base stations (also called small stations), relay stations, and access points.
  • the base station is called gNB.
  • the RAN equipment in the 5G system may also be called NG-RAN equipment or NG-RAN node.
  • the AMF entity belongs to the core network entity and is mainly responsible for the signaling processing part, such as: access control, mobility management, attachment and detachment, and SMF entity selection.
  • the AMF entity When the AMF entity provides a service for the session in the terminal device, it will provide control plane storage resources for the session to store the session ID, the SMF entity ID associated with the session ID, and so on.
  • NEF entities mainly support the secure interaction between 3GPP networks and third-party applications. NEF can safely expose network capabilities and events to third parties to strengthen or improve application service quality. 3GPP networks can also securely obtain relevant information from third parties. Data is used to enhance the intelligent decision-making of the network. At the same time, NEF entities support restoring structured data from UDR entities or storing structured data into UDR entities.
  • the NRF entity is mainly used to maintain the information of the network elements in the core network, support the registration and update of network elements, and provide external query services.
  • UDM entities are mainly used for the management of unified data (for example, user data, user context, etc.).
  • the UDR entity is mainly responsible for storing structured data.
  • the stored content includes contract data and strategy data, externally exposed structured data, and application-related data.
  • the GMLC entity is used to support the positioning service of the 3GPP network. There can be multiple GMLC entities in a public land mobile network (PLMN).
  • PLMN public land mobile network
  • the GMLC entity is the first node for external location programs to access the PLMN. It performs registration authorization checks and requests routing information from UDM entities. After performing registration authorization checks, it sends a positioning request to the AMF entity and receives the final position estimate ( location)estimate).
  • the method provided in the embodiment of the present application may also be applied to an evolved packet system (evolved packet system, abbreviated as EPS) network shown in FIG. 2 (that is, a so-called 4G system).
  • the EPS network may include one or more of the following network entities: terminal devices, evolved universal terrestrial radio access network (evolved universal terrestrial radio access network, E-UTRAN for short) equipment, and service gateway (serving gateway (SGW), packet data gateway (PGW), mobility management entity (mobility management entity (MME), home subscriber server (HSS), GMLC entity, open service capabilities Function (Service capability, SCEF) entity.
  • SGW serving gateway
  • PGW packet data gateway
  • MME mobility management entity
  • HSS home subscriber server
  • GMLC entity open service capabilities Function (Service capability, SCEF) entity.
  • SCEF open service capabilities Function
  • the E-UTRAN device is composed of multiple evolved base stations (evolved nodeB, referred to as eNB or eNodeB).
  • eNodeBs are interconnected via the X2 interface, and the eNodeB and evolved packet core (EPC) interact via the S1 interface.
  • EPC evolved packet core
  • eNodeB and terminal devices are interconnected through the Uu interface.
  • E-UTRAN equipment is equivalent to RAN equipment in 5G systems.
  • MME Mobility Management between nodes.
  • NAS non-access stratum
  • TA tracking area
  • PGW PGW
  • SGW PGW
  • MME Mobility Management between nodes.
  • Choice serving GPRS support node (SGSN) selection during handover to 2G/3G access system, user authentication, roaming control and bearer management, 3GPP core network of different access networks Mobility management between nodes.
  • SGSN serving GPRS support node
  • MME is equivalent to AMF entity in 5G system.
  • the HSS is a database used to store user subscription information.
  • the home network may contain one or more HSS.
  • HSS is responsible for storing information related to users, such as user identification, number and routing information, security information, location information, and profile information.
  • HSS is equivalent to UDM entity in 5G system.
  • the GMLC entity is used to support the positioning service of the 3GPP network. There can be multiple GMLC entities in a PLMN.
  • the GMLC entity is the first node for an external location program to access the PLMN. It performs registration authorization checks and requests routing information from the HSS. After performing registration authorization checks, it sends a positioning request to the MME and receives the final position estimate.
  • the SCEF entity provides the function of safely opening the services and functions provided by the 3GPP network interface and discovering public services.
  • the SCEF entity provides access to network functions through the same network application programming interface (API) defined on the T8 interface.
  • API application programming interface
  • the SCEF entity is equivalent to the NEF entity in the 5G system.
  • the network elements involved in the embodiments of the present application include an access network device, a terminal device, a mobility management entity, an application server, and a border control network element.
  • the access network device may be an access network device or a component in the access network device, and may also be a chip applied to the access network device.
  • the terminal device may be a terminal device or a component in the terminal device, or a chip applied to the terminal device.
  • the access network device is a device in the RAN that provides a wireless communication function for the terminal device.
  • it may be a base station, specifically various forms of macro base stations, micro base stations (also called small stations), relay stations, access points, etc., and may also include various forms of control nodes, such as network controllers.
  • the control node may connect multiple base stations and configure resources for multiple terminal devices covered by multiple base stations.
  • the names of devices with base station functions may be different, such as eNB or eNodeB in 4G systems and gNB in 5G or NR systems. The name of the device is not limited.
  • the terminal device may also be called a user equipment (user equipment (UE for short), terminal, access terminal, user unit, user station, mobile station, remote station, remote terminal, mobile device, user terminal, wireless communication device, user agent or User device.
  • the terminal device may be a drone, internet of things (IoT) equipment, vehicle-to-everything (V2X) equipment, wireless local area network (wireless local area networks, WLAN) station , Referred to as ST), cellular phones, cordless phones, session initiation protocol (SIP) phones, wireless local loop (wireless local loop (WLL) stations, personal digital processing (PDA) equipment) , Handheld devices with wireless communication function, computing devices or other processing devices connected to a wireless modem, in-vehicle devices, wearable devices (also called wearable smart devices).
  • IoT internet of things
  • V2X vehicle-to-everything
  • WLAN wireless local area network
  • ST wireless local area network
  • ST wireless local area network
  • ST wireless local area network
  • SIP session initiation protocol
  • the terminal device may also be a terminal device in a next-generation communication system, for example, a terminal device in a 5G system or a terminal device in a PLMN that evolves in the future, a terminal device in an NR system, or the like.
  • the mobility management entity may be AMF in the 5G system and MME in the 4G system.
  • the border control network element may be GMLC or NEF in the 5G system, and may be GMLC or SCEF in the 4G system.
  • the application server is a device that provides application services for terminal devices of the first type.
  • the application server may be an AF entity in the 5G system.
  • the border control network element may also be a UAV control function (UAV control function, UCF for short) entity.
  • the application server may specifically be a UAS server (UAS server, referred to as USS), where UAS refers to a UAV system (UAV system).
  • UAS server referred to as USS
  • UAV system UAV system
  • UCF entities are used to configure communication parameters for drones; obtain and distribute drone no-fly areas from USS; provide flight assistance authorization for drones; receive USS subscriptions for drone services and communicate with other core network elements ( (AMF, GMLC, etc.) interactively provide subscription UAS services for USS, etc.
  • the UCF entity is a network element configured to support drone communication and supervision in a mobile communication network, and is specifically used to handle drone business.
  • the USS can be a functional module in unmanned aerial traffic management (UTM for short) (for example, a third-party drone cloud), and supports functions such as flight operation authorization, flight monitoring, flight warning, and flight control.
  • UDM unmanned aerial traffic management
  • the method provided by the embodiment of the present application may be applied to a scenario where a terminal device of a first type needs to be located.
  • the method provided by the embodiments of the present application is exemplarily described by taking the terminal device of the first type as a drone as an example.
  • the embodiments of the present application are described by using the provided method as an example in an NR system or a 5G system.
  • the access network device is hereinafter referred to as a RAN node (that is, RAN nodes in the following can be replaced by access network devices);
  • the mobility management entity is denoted as AMF in the following (that is, AMF in the following can be replaced by mobility Management entity);
  • the border control network element is hereinafter referred to as NEF (that is, the NEF hereinafter can be replaced by the border control network element).
  • the network elements involved in the embodiments of the present application are all network elements in the NR system or the 5G system. It can be understood that when the method provided in the embodiment of the present application is applied to a 4G system, these network elements are replaced with the 4G system Only need to have the same or similar functions.
  • the service area of one RAN node may be understood as “all cells of the RAN node”.
  • An embodiment of the present application provides a communication method, as shown in FIG. 4, including:
  • the RAN node (denoted as the first RAN node) acquires the identification information of the first area.
  • the service area of the first RAN node includes the first area.
  • the first area may be one or more cells. Any cell in the first area may be an air cell (that is, a cell that provides air wireless signal coverage) or an ordinary cell (that is, a non-air cell).
  • the first RAN node broadcasts first indication information to the first area.
  • the first indication information is used to instruct the terminal device of the first type to enter a connected state or maintain a connected state or enter and maintain a connected state.
  • the terminal device in the first area receives the first indication information from the first RAN node.
  • the terminal device of the first type in the embodiment of the present application is located in the first area.
  • the first RAN node may determine to broadcast the first indication information to the first area according to the first indication information and the identification information of the first area.
  • the first indication information can be realized by a parameter, which can have two fields, one field can include one or more indication bits, the two fields can be set with different values, and the value of one field is used to indicate that the terminal device is the first For terminal devices of the type, the value in the other field is used to instruct the terminal device to enter the connected state or maintain the connected state or enter and maintain the connected state.
  • the first indication information may include 8 bits, and the upper 4 bits are used to indicate the type of the terminal device. For example, when the value of the upper 4 bits is 0001, the type of the terminal device indicated by the upper 4 bits is the first type , The lower 4 bits are used to indicate the actions that the terminal device needs to perform.
  • the lower 4 bits are 0001
  • the lower 4 bits are used to instruct the terminal device to enter the connected state
  • the lower 4 bits are 0010
  • the lower 4 bits are used
  • the lower 4 bits take the value of 0011
  • the lower 4 bits are used to instruct the terminal device to enter and maintain the connection state.
  • the first indication information may also be implemented by two parameters.
  • the first indication information may include a first parameter and a second parameter.
  • the first parameter is used to indicate that the terminal device is a terminal device of the first type
  • the second parameter is used It is used to instruct the terminal device to enter the connected state or maintain the connected state or enter and maintain the connected state.
  • the first RAN node may broadcast the first indication information through a system information block (system information block, SIB for short) (for example, SIB1).
  • SIB system information block
  • the terminal device When the terminal device is the first type of terminal device indicated by the first instruction information, the terminal device enters the connected state or maintains the connected state or enters and maintains the connected state according to the first instruction information.
  • the terminal device in the case where the first indication information is used to instruct the terminal device of the first type to enter the connected state, if the terminal device is in the idle state, the terminal device enters the connected state according to the first indication information; or An instruction message is used to instruct the terminal device of the first type to maintain the connection state. If the terminal device is in the connection state, the terminal device maintains the connection state according to the first instruction message; or, the first instruction message is used to instruct the first When a type of terminal device enters and maintains the connected state, if the terminal device is in the idle state, the terminal device enters and maintains the connected state according to the first instruction information.
  • the first RAN node broadcasts the first indication information to the first area, so that the terminal device of the first type in the idle state in the first area can enter the connected state when the first type of When the terminal device is a drone, the problem that the network cannot locate the drone due to the drone being in an idle state can be solved.
  • the first RAN node may obtain the identification information of the first area in the following manner 1 or manner 2.
  • the first RAN node determines the identification information of all cells or air cells belonging to the first RAN node as the identification information of the first area.
  • the first RAN node receives the identification information of the first area from the AMF (denoted as the first AMF).
  • the method may further include: the first AMF receives the identification information of the second area from the USS or NEF, according to the second area Determine the first area and send the identification information of the first area to the first RAN node.
  • the first RAN node may be any one of the RAN nodes in the second area that has an N2 connection with the first AMF.
  • the first area is a subset of the second area, see FIG. 5 for details.
  • the subset is a range in which the range of the second region includes or is equal to the range of the second region.
  • the second area at least partially overlaps with the service area of the first AMF.
  • the second area may be one or more cells. Any cell in the second area may be an air cell or an ordinary cell (ie, a non-air cell).
  • the identification information of the second area may be the identification information of the RAN node in the second area or the identification information of the cell in the second area.
  • the second area may also be TA.
  • the identification information of the second area may be TA identification information.
  • the second area may also be an area enclosed by a specific shape (such as a polygon, a circle, etc.), or a three-dimensional area (such as a no-fly zone for drones), an administrative area, etc.
  • the identification of the second area The information may be latitude and longitude information of the second area, three-dimensional area description information, or an administrative area identification.
  • the second area is generally the surveillance area of drones, such as airports and important event venues.
  • the first AMF may determine the first RAN node and the first area. Specifically, the first AMF may first determine the first RAN node and then the first area (denoted as determination method 1), or may first determine the first area and then determine the first RAN node (denoted as determination method 2).
  • the two determination methods are described by way of example.
  • the identification information of the second area may be the identification information of the RAN node in the second area
  • the identification information of the second area may be the identification information of the cell in the second area .
  • the determination method 1 may specifically include: the first AMF receives the identification information of the RAN node in the second area from the USS or NEF, and the first AMF connects one RAN node in the RAN node in the second area that is N2 connected to the first AMF Determined as the first RAN node. After determining the first RAN node, the first AMF may determine the first area. Exemplarily, the first AMF may determine that the service area of the first RAN node is the first area, and may also determine that the air cell belonging to the first RAN node is the first area.
  • the determination method 2 may specifically include: the first AMF receives the identification information of the cell in the second area from the USS or NEF, and the first AMF determines one or more airspace cells (or ordinary cells) belonging to the same RAN node in the second area ) Is the first area, and the first AMF acquires the first RAN node according to the first area.
  • the process of the first AMF acquiring the first RAN node according to the first area may include: the first AMF sends a request 1 to the NRF, and the request 1 includes the identification information of the first area and the requested network function.
  • the information is of type RAN; NRF receives request 1 and feeds back information of the first RAN node to the first AMF according to request 1.
  • the NRF may include the correspondence between the RAN node and the area covered by the RAN node. Therefore, after receiving the request 1, the NRF may determine the first RAN node according to the identification information of the first area in the request 1, and feed back the information of the first RAN node to the first AMF, so that the first AMF determines the first RAN node .
  • the first AMF may be based on the identification of the second area
  • the information determines the identification information of the RAN node and/or cell in the second area.
  • the first AMF may send the identification information of the second area to operation maintenance (OAM), and the OAM determines the identification of the RAN node and/or cell in the second area according to the identification information of the second area Information and feedback to the first AMF.
  • OAM operation maintenance
  • the first AMF further determines the first RAN node and/or first area by using the above determination method 1 or determination method 2.
  • the method may further include: 11) The first AMF sends the first indication information to the first RAN node.
  • the first RAN node receives the first indication information from the first AMF.
  • the identification information of the first area sent by the first AMF to the first RAN node may be included in the same message as the first indication information, or may be included in different messages.
  • the first AMF may acquire the first indication information in the following manner 1 or manner 2.
  • the first AMF receives a first message for instructing a terminal device of the first type to enter a connected state or maintain a connected state or enter and maintain a connected state, and generates first indication information according to the first message.
  • the first message may carry information indicating the first type.
  • the first AMF may receive the first message from NEF or USS.
  • Manner 2 The first AMF receives the first indication information.
  • the first AMF may receive the first indication information from the NEF or USS.
  • the method may further include:
  • the USS sends the first indication information and the identification information of the third area to the NEF;
  • NEF receives the first indication information and the identification information of the third area from the USS
  • the NEF determines the second area according to the third area, and the second area is a subset of the third area
  • NEF obtains the first AMF
  • the NEF sends the first indication information and the identification information of the second area to the first AMF.
  • the first AMF is one of the AMFs in the third area.
  • the second area may be a subset of the third area. Exemplarily, for the relationship between the first area, the second area, and the third area, see FIG. 6.
  • the third area may be one or more cells.
  • the cell in the third area may be an airspace cell or an ordinary cell (ie, a non-spacespace cell).
  • the identification information of the third area may be the identification information of the AMF in the third area, the identification information of the RAN node or the identification information of the cell.
  • the third area may also be TA.
  • the identification information of the third area may be TA identification information.
  • the third area may also be an area enclosed by a specific shape (such as a polygon, a circle, etc.), or a three-dimensional area (such as a no-fly zone for drones), an administrative area, etc.
  • the identification of the third area may be the latitude and longitude information of the third area, the description information of the three-dimensional area or the administrative area identification.
  • the third area is generally the surveillance area of drones, such as airports and important event venues.
  • the USS may determine the third area according to the terminal device of the first type. For example, when the terminal device of the first type is a drone, the USS may determine that the third area is a surveillance area of the drone, such as an airport and an important event venue.
  • the NEF may first perform step 24) and then perform step 25) (denoted as case 1), or may perform step 25) before performing step 24) (denoted as case 2).
  • step 24) and step 25) in these two cases will be described below.
  • the identification information of the third area may be identification information of a RAN node or identification information of a cell in the third area.
  • the identification information of the third area may be the identification information of the AMF in the third area.
  • step 24) in specific implementation may include: NEF determines one or more RAN nodes in the third area that have N2 connections to the same AMF The service area of is the second area; or, the NEF determines that the air cell belonging to one or more RAN nodes with N2 connections to the same AMF in the third area is the second area.
  • step 24) in specific implementation may include: NEF determines that one or more ordinary cells covered by the same AMF in the third area are the second Area; or, the NEF determines that one or more airspace cells covered by the same AMF in the third area are the second area.
  • Step 25 it may include: the NEF determining the first AMF according to the second area.
  • the NEF determining the first AMF according to the second area may be specifically implemented in the following manner A.
  • Method A The NEF sends a request 2 to the NRF.
  • the request 2 is used to request the AMF covering the second area.
  • the NRF receives the request 2 from the NEF and sends the determined first AMF to the NEF.
  • the request 2 may include the identification information of the second area and the information that the type of the requested network function is AMF.
  • the NRF may include the correspondence between the AMF and the area covered by the AMF. Therefore, after receiving the request 2, the NRF may determine the first AMF according to the identification information of the second area in the request 2, and feed back the information of the first AMF to the NEF, so that the NEF determines the first AMF.
  • Step 25) it may include: the NEF determining that an AMF in the second area is the first AMF. After determining the first AMF, the NEF may determine the second area. Exemplarily, the first AMF may determine that the service area of the first AMF is the second area, and may also determine that the air cell covered by the first AMF is the first area.
  • the NEF may be determined according to the identification information of the third area AMF, RAN node or cell identification information in the third area.
  • the NEF may send the identification information of the third area to the OAM, and the OAM determines the identification information of the AMF, RAN node, or cell in the third area according to the identification information of the third area, and feeds back to the NEF.
  • the NEF further performs steps 24) and 25) through the methods shown in case 1 and case 2 above.
  • the NEF can also directly determine the third area as the second area (that is, the identification information of the third area is the same as the identification information of the second area).
  • the NEF can also determine any AMF in the third area as the first AMF or obtain the information of the first AMF locally. It should be noted that, in the case where the first AMF has been obtained before the NEF, the NEF may store the information of the first AMF. In this case, the NEF may obtain the information of the first AMF locally.
  • the NEF may query the UDM/UDR whether the first AMF is an AMF serving the first type of terminal device, and if it is, the AMF continues to execute the subsequent method If not, AMF stops performing subsequent methods to reduce unnecessary signaling overhead of the network and reduce resource consumption of the network.
  • the NEF may send the first AMF information (for example, the identifier of the first AMF) to the UDM/UDR.
  • the UDM/UDR determines the terminal device's capability information or the terminal device's subscription information, and the terminal device's mobility management context.
  • the NEF can query UDM/UDR for information about the AMF currently serving the first type of terminal device, UDM/UDR through terminal device capability information or terminal device contract information, and terminal device movement
  • the sexual management context returns to the NEF information about the AMF currently serving the terminal device of the first type.
  • the NEF can determine whether the AMF information currently serving the terminal device of the first type contains the first AMF. If so, the first AMF continues to execute subsequent Method, if not, the first AMF stops performing subsequent methods to reduce unnecessary signaling overhead of the network and reduce resource consumption of the network.
  • the UDM/UDR may notify the NEF that the first AMF no longer serves the first type of terminal device, so that the NEF Notify the first AMF to stop performing subsequent methods to reduce unnecessary signaling overhead of the network and reduce resource consumption of the network.
  • the method may further include: 31) The USS determines the second area; 32) The USS obtains the second An AMF; 33) The USS sends the first indication information and the identification information of the second area to the first AMF.
  • the USS may determine the third area according to the first type of terminal device.
  • the USS may determine the second area to be a surveillance area of the drone , Such as airports, important event venues, etc.
  • Step 32) the way in which the USS obtains the first AMF is the same as the way in which the NEF obtains the first AMF.
  • the USS can also determine the first AMF according to the first AMF information reported by the NEF.
  • the above method also includes:
  • the first AMF sends second indication information to the first RAN node, and the second indication information is used to indicate that the first indication information is invalid;
  • the first RAN node receives second indication information from the first AMF, and stops broadcasting the first indication information to the first area according to the second indication information.
  • the first AMF may send a message containing the second indication information to the first RAN node, and the message may also include the identification information of the first area, so that the first RAN node determines which area has the first indication information invalid. It should be noted that the first RAN node may broadcast the first indication information to multiple areas. If the first RAN node does not receive the identification information of the first area, the first RAN node may broadcast all the first indications to all areas by default. The information is invalid.
  • the first AMF may obtain the second indication information in the following manner (1) or manner (2).
  • the first AMF receives a second message indicating that the first indication information is invalid, and generates second indication information according to the second message.
  • the second message may contain information indicating the first type, and the first AMF may receive the second message from the NEF or USS.
  • the first AMF may receive the second indication information from the NEF or USS.
  • Method (2) if the first AMF receives the second indication information from the USS, before the first AMF receives the second indication information, the method may further include: the USS sends the second indication information to the first AMF.
  • Method (2) if the first AMF receives the second indication information from the NEF, before the first AMF receives the second indication information, the method may further include: the USS sends the second indication information to the NEF; NEF Receive second indication information from the USS; NEF sends second indication information to the first AMF.
  • the above method further includes: the first RAN node broadcasts the second indication information to the first area.
  • the terminal device determines that the first indication information is invalid according to the second indication information, that is, the terminal device no longer enters the connected state or the first indication information according to the first indication information. Keep connected or enter and keep connected. In other words, the USS does not require the terminal device to enter the connected state or remain connected or enter and maintain the connected state.
  • a new state (recorded as the first state) may be added to the terminal device, and the first state refers to a state where the terminal device needs to enter the connected state or maintain the connected state or enter and maintain the connected state A state, other states than the first state may be referred to as the second state. Then, when the terminal device receives the first instruction information, the terminal device enters the first state, and when the terminal device receives the second instruction information, the terminal device switches from the first state to the second state.
  • the USS may also send a duration to the AMF through the NEF.
  • the duration refers to the effective time of the first indication information.
  • the AMF may not receive the second indication information from the NEF or USS, but instead After the duration is reached, the second instruction information is generated by itself.
  • the AMF may send a duration to the first RAN node, and the duration refers to the effective time of the first indication information.
  • the first RAN node may not receive the second indication information from the AMF, but at the duration Upon arrival, the second instruction information is generated by itself.
  • the duration can be unlimited, or it can be the length of time in units of years, months, days, hours, etc.
  • some of the surveillance areas of drones are fixed, such as airports, and some surveillance areas are temporarily changed, such as major event venues.
  • the supervision time for temporary surveillance areas is also short. By specifying the duration, the system efficiency can be improved and the waste of mobile communication network resources can be reduced.
  • the terminal device enters the connected state or remains connected or enters and remains connected as The terminal device enters a predetermined state, referring to FIG. 7, the implementation process includes:
  • the USS sends a first configuration request to the NEF.
  • the first configuration request is used to instruct the terminal device of the first type to enter a predetermined state.
  • the NEF receives the first configuration request from the USS.
  • the first configuration request may indicate that the terminal device of the first type enters a predetermined state through the information for indicating the first type contained in the first configuration request and the message type of the first configuration request, or through the first configuration request
  • the first instruction information is included to instruct the terminal device of the first type to enter a predetermined state.
  • the first configuration request may also be implemented through API.
  • the first configuration request further includes identification information and/or duration of the third area.
  • the identification information of the third area is also included in the first configuration request as an example to illustrate the foregoing embodiment.
  • the NEF determines the first AMF.
  • step 702 For the specific implementation manner of step 702, reference may be made to the foregoing, and details are not described herein again.
  • the NEF sends a second configuration request to the first AMF, where the second configuration request is used to instruct the terminal device of the first type to enter a predetermined state.
  • the first AMF receives the second configuration request from the NEF.
  • the second configuration request may indicate that the terminal device of the first type enters a predetermined state through the information for indicating the first type contained in the second configuration request and the message type of the second configuration request, or may be requested through the second configuration request
  • the first instruction information is included to instruct the terminal device of the first type to enter a predetermined state.
  • the second configuration request may further include identification information and/or duration of the second area.
  • the identification information of the second area included in the second configuration request is used as an example to describe the foregoing embodiment. It can be understood that, when the second configuration request further includes the identification information of the second area, before step 703, the NEF needs to determine the identification information of the second area according to the identification information of the third area. For the determination process, refer to the above.
  • the second area may be a subset determined by the NEF from the third area.
  • the first AMF sends a first N2 message to the first RAN node.
  • the first RAN node receives the first N2 message from the first AMF.
  • the first N2 message may include first indication information and identification information of the first area.
  • the first area may be a subset of the first AMF determined from the second area.
  • the service area of the first RAN node includes the first area.
  • the first AMF may determine the identification information of the first area according to the identification information of the second area. For the determination method, see above.
  • the first AMF may The first indication information is generated according to the message type of the second configuration request and the information included in the second configuration request for indicating the first type, and the first indication information is included in the first N2 message and sent to the first RAN node.
  • the first AMF may determine the first RAN node.
  • the first AMF may determine the first RAN node.
  • the first RAN node broadcasts the first indication information to the first area.
  • the terminal device in the first area receives the first indication information.
  • the terminal device When the terminal device is the first type of terminal device indicated by the first indication information, the terminal device enters a preset state according to the first indication information.
  • the method may further include the following steps:
  • the USS sends a third configuration request to the NEF.
  • the third configuration request is used to indicate that the first indication information is invalid.
  • the third configuration request may indicate that the first indication information is invalid by the information included in the third configuration request indicating the first type and the message type of the third configuration request, or by including the second in the third configuration request
  • the indication information indicates that the first indication information is invalid.
  • the third configuration request may further include identification information of the third area, that is, the third configuration request is specifically used to indicate that the first indication information in the third area is invalid.
  • the identification information of the third area included in the third configuration request is used as an example to describe the foregoing embodiment.
  • the NEF sends a fourth configuration request to the first AMF.
  • the fourth configuration request is used to indicate that the first indication information is invalid.
  • the fourth configuration request may indicate that the first indication information is invalid by the information included in the fourth configuration request for indicating the first type and the message type of the fourth configuration request, or by including the second in the fourth configuration request
  • the indication information indicates that the first indication information is invalid.
  • the fourth configuration request may further include identification information of the second area, that is, the fourth configuration request is specifically used to indicate that the first indication information in the second area is invalid.
  • the identification information of the second area included in the fourth configuration request is used as an example to describe the foregoing embodiment. It can be understood that, when the fourth configuration request includes the identification information of the second area, the NEF also needs to determine the identification information of the second area according to the identification information of the third area. For the determination process, refer to the above.
  • the first AMF sends a second N2 message to the first RAN node.
  • the first RAN node receives the second N2 message from the first AMF.
  • the second indication information may be included in the second N2 message.
  • the second N2 message may also include identification information of the first area, that is, the second N2 message is specifically used to indicate that the first indication information in the first area is invalid.
  • the foregoing embodiment is exemplarily described by taking the identification information of the first area included in the second N2 message as an example. It can be understood that when the second N2 message includes the identification information of the first area, the first AMF also needs to determine the identification information of the first area according to the identification information of the second area. For the determination process, see the above.
  • the first AMF may be configured according to the fourth configuration
  • the requested message type and the information included in the fourth configuration request for indicating the first type generate second indication information, and include the second indication information in the second N2 message and send it to the first RAN node.
  • the first RAN node stops broadcasting the first indication information to the first area.
  • the first RAN node broadcasts the second indication information to the first area.
  • an embodiment of the present application also provides a method for instructing a terminal device to maintain a connected state through NAS signaling, and the AMF in this method has no direct relationship with the first AMF in Embodiment 1, Referring to Figure 8, the method includes:
  • the terminal device sends a third message to the AMF, where the third message carries the type information of the terminal device.
  • the third message may be an N1NAS message, such as registration request (request), service request (service request), and so on.
  • the AMF determines that the terminal device is the first type of terminal device according to the third message, the AMF sends third indication information to the terminal device.
  • the third indication information is used to instruct the terminal device to maintain the connection state in the target area.
  • the terminal device receives the third instruction information from the AMF.
  • the third indication information may be included in the N1NAS message.
  • the target area may be an area that requires the terminal device of the first type to maintain a connection state.
  • the target area may be a cell (for example, an air cell or an ordinary cell), an area surrounded by a specific shape (for example, polygon, circle, etc.), a three-dimensional area (for example, a no-fly zone for an unmanned aerial vehicle), or an administrative area.
  • the target area may also be a tracking area (tracking area, referred to as TA).
  • TA tracking area
  • the target area may be a drone supervision area (for example, an airport).
  • the AMF may be the AMF in the target area, or it may not be the AMF in the target area.
  • the method may further include: AMF acquiring identification information of the target area.
  • AMF can receive the identification information of the target area from other devices (for example, from NEF or USS), or it can be obtained locally.
  • the identification information of the target area can be pre-configured in the AMF.
  • the terminal device determines to maintain the connection state after entering the target area according to the third instruction information.
  • the terminal device may determine whether to enter the target area through the attached cell identifier, or may determine whether to enter the target area through global positioning system (Global Positioning System, GPS) positioning.
  • Global Positioning System Global Positioning System, GPS
  • the terminal device When the terminal device is in the idle state when entering the target area, the terminal device enters the connected state and remains connected in the target area.
  • the terminal device When the terminal device is in the connected state when entering the target area, the terminal device remains in the connected state in the target area, that is, does not enter the idle state in the target area.
  • information can be exchanged between the AMF and the terminal device through the RAN node.
  • This method can enable the terminal device to remain connected after entering the target area, so as to realize the positioning of the drone when the terminal device is a drone.
  • the message interaction and information interaction between the various network elements can also be implemented through the service API.
  • the message can be regarded as a service, implemented by one or more APIs, or the message can also be regarded as an API, and the interactive information can be used as input parameters of the API, or output results.
  • the following uses the information interaction between USS and NEF as an example to illustrate.
  • NEF can provide a service for setting the first type of terminal status.
  • the service is implemented using API X.
  • the first indication information and the identification information of the third area can be used as the Input parameters of API.
  • the USS sending the first indication information and the identification information of the third area to the NEF may be understood as the USS calling the API provided by the NEF.
  • the interaction of other network elements is similar to this and will not be repeated here.
  • each network element such as an access network device, a terminal device, a mobility management entity, an application server, or a border control network element, in order to realize the above-mentioned functions, includes a hardware structure and/or a software module corresponding to performing each function .
  • the present application can be implemented in the form of hardware or a combination of hardware and computer software. Whether a function is executed by hardware or computer software driven hardware depends on the specific application and design constraints of the technical solution. Professional technicians can use different methods to implement the described functions for each specific application, but such implementation should not be considered beyond the scope of this application.
  • the embodiments of the present application may divide the functional units of the access network device, the terminal device, the mobility management entity, the application server, or the border control network element according to the above method example.
  • each functional unit may be divided corresponding to each function, or Two or more functions are integrated in one processing unit.
  • the above integrated unit may be implemented in the form of hardware or software functional unit. It should be noted that the division of the units in the embodiments of the present application is schematic, and is only a division of logical functions. In actual implementation, there may be another division manner.
  • FIG. 9 shows a possible structural schematic diagram of the communication device 90 involved in the above embodiment.
  • the communication device 90 includes a processing unit 901 and a communication unit 902, and may further include a storage unit 903.
  • the structural schematic diagram shown in FIG. 9 may be used to illustrate the access network device involved in the above embodiments (for example, the first RAN node in FIG. 4 or the first RAN node in FIG. 7 or the RAN node in FIG. 8) , Terminal device, mobility management entity (for example, the first AMF in FIG. 7 or AMF in FIG. 8), application server (for example, USS in FIG. 7), or border control network element (for example, NEF in FIG. 7) )Structure.
  • the access network device involved in the above embodiments for example, the first RAN node in FIG. 4 or the first RAN node in FIG. 7 or the RAN node in FIG. 8
  • Terminal device for example, the first AMF in FIG. 7 or AMF in FIG. 8
  • application server for example, USS
  • the processing unit 901 is used to control and manage the actions of the access network device, for example, the processing unit 901 is used to support
  • the access network device performs steps 401 to 402 in FIG. 4, steps 704 to 705 and 709 to 711 in FIG. 7, steps 801 to 802 in FIG. 8, and/or other processes described in the embodiments of the present application. Actions performed by the access network device.
  • the communication unit 902 is used to support communication between the access network device and other network entities, for example, communication with the terminal device shown in FIG. 4.
  • the storage unit 903 is used to store program codes and data of the access network device.
  • the processing unit 901 is used to control and manage the operation of the terminal device, for example, the processing unit 901 is used to support the terminal device to execute the diagram Steps 402 to 403 in FIG. 4, steps 705 to 706 and 711 in FIG. 7, steps 801 to 803 in FIG. 8, and/or actions performed by the terminal device in other processes described in the embodiments of the present application.
  • the communication unit 902 is used to support communication between the terminal device and other network entities, for example, communication with the access network device shown in FIG. 4.
  • the storage unit 903 is used to store program codes and data of the terminal device.
  • the processing unit 901 is used to control and manage the actions of the mobility management entity, for example, the processing unit 901 is used to support The mobility management entity performs steps 703 to 704 and 708 to 709 in FIG. 7, steps 801 to 802 in FIG. 8, and/or actions performed by the mobility management entity in other processes described in the embodiments of the present application.
  • the communication unit 902 is used to support communication between the mobility management entity and other network entities, for example, with the access network device shown in FIG. 7.
  • the storage unit 903 is used to store program codes and data of the mobility management entity.
  • the processing unit 901 is used to control and manage the actions of the application server, for example, the processing unit 901 is used to support the application server execution diagram Steps 701 and 707 in 7, and/or actions performed by the application server in other processes described in the embodiments of the present application.
  • the communication unit 902 is used to support communication between the application server and other network entities, for example, communication with the border control network element shown in FIG. 7.
  • the storage unit 903 is used to store program codes and data of the application server.
  • the processing unit 901 is used to control and manage the actions of the boundary control network element, for example, the processing unit 901 is used to support The border control network element performs steps 701 to 703 and 707 to 708 in FIG. 7 and/or actions performed by the border control network element in other processes described in the embodiments of the present application.
  • the communication unit 902 is used to support communication between the border control network element and other network entities, for example, with the mobility management entity shown in FIG. 7.
  • the storage unit 903 is used to store the program code and data of the border control network element.
  • the processing unit 901 may be a processor or a controller
  • the communication unit 902 may be a communication interface, a transceiver, a transceiver circuit, etc., where the communication interface is a general term and may include one or more interfaces.
  • the storage unit 903 may be a memory.
  • the processing unit 901 is a processor
  • the communication unit 902 is a communication interface
  • the storage unit 903 is a memory
  • the communication device 90 involved in the embodiment of the present application may be the communication device 100 shown in FIG. 10.
  • the communication device 100 may be an access network device herein (for example, the first RAN node in FIG. 4 or the first in FIG. 7 RAN node or RAN node in FIG. 8), terminal device, mobility management entity (eg, first AMF in FIG. 7 or AMF in FIG. 8), application server (eg, USS in FIG. 7), or border control Network element (for example, NEF in FIG. 7).
  • the communication device 100 includes at least one processor 1001, a communication bus 1002, and at least one communication interface 1004.
  • the memory 1003 is also included.
  • the communication device 100 includes a processor 1001 and a communication interface 1004 as an example for drawing.
  • the processor 1001 may be a general-purpose central processing unit (central processing unit, CPU for short), a microprocessor, an application-specific integrated circuit (ASIC for short), or one or more programs used to control the application program Implementation of integrated circuits.
  • the processor 1001 may include one or more CPUs, such as CPU0 and CPU1 in FIG. 10.
  • the communication bus 1002 may include a path to transfer information between the above components.
  • the communication interface 1004 uses any transceiver-like device to communicate with other devices or communication networks.
  • the memory 1003 may be read-only memory (ROM) or other types of static storage devices that can store static information and instructions, random access memory (RAM) or those that can store information and instructions
  • Other types of dynamic storage devices can also be electrically erasable programmable read-only memory (electrically erasable programmable-read-only memory, EEPROM for short), compact disc-read-only memory (CD-ROM) or other optical discs Storage, optical disc storage (including compact discs, laser discs, optical discs, digital versatile discs, Blu-ray discs, etc.), magnetic disk storage media or other magnetic storage devices, or can be used to carry or store desired program code in the form of instructions or data structures And any other media that can be accessed by the computer, but not limited to this.
  • the memory may exist independently, and is connected to the processor through the communication bus 1002. The memory can also be integrated with the processor.
  • the memory 1003 is used to store computer execution instructions for executing the solution of the present application, and the processor 1001 controls execution.
  • the processor 1001 is configured to execute computer execution instructions stored in the memory 1003, so as to implement the method provided in the following embodiments of the present application.
  • the computer execution instructions in the embodiments of the present application may also be called application program codes, which are not specifically limited in the embodiments of the present application.
  • the processor 1001 is used to control and manage the actions of the access network device, for example, the processor 1001 is used to support
  • the access network device performs steps 401 to 402 in FIG. 4, steps 704 to 705 and 709 to 711 in FIG. 7, steps 801 to 802 in FIG. 8, and/or other processes described in the embodiments of the present application. Actions performed by the access network device.
  • the communication interface 1004 is used to support communication between the access network device and other network entities, for example, communication with the terminal device shown in FIG. 4.
  • the memory 1003 is used to store program codes and data of the access network device.
  • the processor 1001 is used to control and manage the operation of the terminal device, for example, the processor 1001 is used to support the terminal device to execute the diagram Steps 402 to 403 in FIG. 4, steps 705 to 706 and 711 in FIG. 7, steps 801 to 803 in FIG. 8, and/or actions performed by the terminal device in other processes described in the embodiments of the present application.
  • the communication interface 1004 is used to support communication between the terminal device and other network entities, for example, communication with the access network device shown in FIG. 4.
  • the memory 1003 is used to store program codes and data of the terminal device.
  • the processor 1001 is used to control and manage the actions of the mobility management entity, for example, the processor 1001 is used to support The mobility management entity performs steps 703 to 704 and 708 to 709 in FIG. 7, steps 801 to 802 in FIG. 8, and/or actions performed by the mobility management entity in other processes described in the embodiments of the present application.
  • the communication interface 1004 is used to support communication between the mobility management entity and other network entities, for example, with the access network device shown in FIG. 7.
  • the memory 1003 is used to store program codes and data of the mobility management entity.
  • the processor 1001 is used to control and manage the actions of the application server.
  • the processor 1001 is used to support the execution of the application server. Steps 701 and 707 in 7, and/or actions performed by the application server in other processes described in the embodiments of the present application.
  • the communication interface 1004 is used to support communication between the application server and other network entities, for example, communication with the border control network element shown in FIG. 7.
  • the memory 1003 is used to store program codes and data of the application server.
  • the processor 1001 is used to control and manage the actions of the border control network element, for example, the processor 1001 is used to support The border control network element performs steps 701 to 703 and 707 to 708 in FIG. 7 and/or actions performed by the border control network element in other processes described in the embodiments of the present application.
  • the communication interface 1004 is used to support communication between the border control network element and other network entities, for example, with the mobility management entity shown in FIG. 7.
  • the memory 1003 is used to store the program code and data of the border control network element.
  • An embodiment of the present application also provides a computer-readable storage medium, including instructions, which when executed on a computer, causes the computer to perform any of the above methods.
  • An embodiment of the present application also provides a computer program product containing instructions, which when run on a computer, causes the computer to execute any of the above methods.
  • An embodiment of the present application also provides an apparatus, which exists in the form of a chip product.
  • the apparatus includes a processor, a memory, and a transceiver component.
  • the transceiver component includes an input and output circuit.
  • the memory is used to store computer-executed instructions.
  • the computer executes instructions stored in the memory to implement any of the above methods.
  • the execution subject that executes the method provided by the embodiment of the present application may be a chip.
  • An embodiment of the present application further provides a communication system, which includes the access network device, the terminal device, and the mobility management entity in the foregoing first embodiment.
  • the communication system further includes the application server and/or border control network element in the first embodiment.
  • An embodiment of the present application also provides a communication system, which includes the terminal device and the mobility management entity in the foregoing second embodiment.
  • the computer program product includes one or more computer instructions.
  • the computer may be a general-purpose computer, a dedicated computer, a computer network, or other programmable devices.
  • the computer instructions can be stored in a computer-readable storage medium or transmitted from one computer-readable storage medium to another computer-readable storage medium.
  • the computer instructions can be transmitted from a website, computer, server, or data center by wire (e.g.
  • the computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device including one or more servers and data centers that can be integrated with the medium.
  • the usable media may be magnetic media (for example, floppy disk, hard disk, magnetic tape), optical media (for example, DVD), or semiconductor media (for example, solid state disk (SSD)).

Abstract

La présente invention concerne un procédé et un dispositif de communication associés au domaine technique des communications, destinés à être utilisés pour résoudre le problème selon lequel un réseau ne peut pas localiser un véhicule aérien sans pilote en raison de l'état inactif du véhicule aérien sans pilote. Le procédé comprend les étapes suivantes : à acquérir, par un dispositif de réseau d'accès, des informations d'identification d'une première zone ; et à diffuser, par le dispositif de réseau d'accès et dans la première zone, des premières informations d'indication utilisées pour indiquer à un dispositif terminal de premier type d'entrer dans un état connecté ou de maintenir un état connecté ou d'entrer dans un état connecté et de maintenir l'état connecté. Le dispositif de réseau d'accès, en diffusant les premières informations d'indication dans la première zone, permet au dispositif terminal de premier type dans un état inactif dans la première zone d'entrer dans l'état connecté et, lorsque le dispositif terminal de premier type est un véhicule aérien sans pilote, résout le problème selon lequel le réseau ne peut pas localiser le véhicule aérien sans pilote en raison de l'état inactif du véhicule aérien sans pilote.
PCT/CN2019/125264 2018-12-13 2019-12-13 Procédé et dispositif de communication WO2020119795A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201811527562.6 2018-12-13
CN201811527562.6A CN111405471B (zh) 2018-12-13 2018-12-13 一种通信方法及装置

Publications (1)

Publication Number Publication Date
WO2020119795A1 true WO2020119795A1 (fr) 2020-06-18

Family

ID=71076260

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/125264 WO2020119795A1 (fr) 2018-12-13 2019-12-13 Procédé et dispositif de communication

Country Status (2)

Country Link
CN (1) CN111405471B (fr)
WO (1) WO2020119795A1 (fr)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114143702B (zh) * 2020-08-13 2023-05-12 大唐移动通信设备有限公司 无人机信息处理方法及装置、终端
CN116762367A (zh) * 2021-01-29 2023-09-15 华为技术有限公司 定位的方法和装置

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106304148A (zh) * 2016-08-11 2017-01-04 北京佰才邦技术有限公司 切换无线网接入设备的工作模式的方法
US20180063818A1 (en) * 2016-08-26 2018-03-01 Qualcomm Incorporated Control channel bandwidth determination

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104936149A (zh) * 2014-03-19 2015-09-23 中兴通讯股份有限公司 一种实现mbms最小化路测配置的方法、系统及设备

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106304148A (zh) * 2016-08-11 2017-01-04 北京佰才邦技术有限公司 切换无线网接入设备的工作模式的方法
US20180063818A1 (en) * 2016-08-26 2018-03-01 Qualcomm Incorporated Control channel bandwidth determination

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
HUAWEI ET AL.: "How to notify the eNB increased Triggering cell for the Drone UE.", 3GPP TSG-RAN WG2 #103, R2-1812087., 24 August 2018 (2018-08-24), XP051521710 *
HUAWEI ET AL.: "Introduction of drone related SIBs for Aerial Vehicles for TS 36.331.", 3GPP TSG-RAN WG2 #103, R2-1812089., 24 August 2018 (2018-08-24), XP051521712 *
LG ELECTRONICS INC.: "Zone-based Flight Path Reporting.", 3GPP TSG-RAN WG2 MEETING #103, R2-1812580., 24 August 2018 (2018-08-24), XP051522175 *

Also Published As

Publication number Publication date
CN111405471A (zh) 2020-07-10
CN111405471B (zh) 2022-04-22

Similar Documents

Publication Publication Date Title
US11943704B2 (en) Application driven dynamic network slice selection
WO2021232919A1 (fr) Procédé, appareil et système d'accès à un réseau
US20220053584A1 (en) Method for establishing communication bearer, device, and system
US11805406B2 (en) Terminal identification method and apparatus
US11729599B2 (en) Communication system
US20230189192A1 (en) Access to Second Network by Wireless Device
US20220150784A1 (en) Handover method and apparatus
US20230328821A1 (en) Modifying PDU Sessions In Underlay Networks
WO2020119795A1 (fr) Procédé et dispositif de communication
WO2020063655A1 (fr) Procédé et appareil de commande d'aéronef
US11856645B2 (en) Proximity services path selection and switching
CN116390203A (zh) 选择网络的方法和装置
US20240073848A1 (en) Network Slice in a Wireless Network
US20230115431A1 (en) Communication method and device in wireless communication system supporting unmanned aerial system service
WO2022099481A1 (fr) Procédé de sélection de réseau mobile terrestre public, et appareil associé
KR20230137998A (ko) Af 세션에 대한 외부 매개변수 프로비저닝을 위한 새로운 방법
WO2022259830A1 (fr) Procédé d'équipement utilisateur (ue) et équipement utilisateur (ue)
WO2023104153A1 (fr) Procédé d'accès au réseau et appareil de communication
US20230048220A1 (en) Method and apparatus for supporting udm update data for npn
WO2023123218A1 (fr) Procédé de demande de tranche de réseau, dispositif, support de stockage et produit-programme
WO2023215499A1 (fr) Service d'urgence
CN118056422A (zh) 支持无人驾驶空中系统服务的无线通信系统中的通信方法和设备
WO2023081344A1 (fr) Notification de données dans des systèmes sans fil
EP4324268A1 (fr) Support pour service de réseau
WO2023183414A1 (fr) Gestion d'accès à un réseau

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19896374

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19896374

Country of ref document: EP

Kind code of ref document: A1