WO2020199105A1 - Procédé de liaison de données, procédé et dispositif de mise à jour d'informations et terminal - Google Patents
Procédé de liaison de données, procédé et dispositif de mise à jour d'informations et terminal Download PDFInfo
- Publication number
- WO2020199105A1 WO2020199105A1 PCT/CN2019/080890 CN2019080890W WO2020199105A1 WO 2020199105 A1 WO2020199105 A1 WO 2020199105A1 CN 2019080890 W CN2019080890 W CN 2019080890W WO 2020199105 A1 WO2020199105 A1 WO 2020199105A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- terminal
- parameter
- session
- application
- data
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W40/00—Communication routing or communication path finding
- H04W40/02—Communication route or path selection, e.g. power-based or shortest path routing
Definitions
- the embodiments of the present application relate to the field of mobile communication technology, and specifically relate to a data binding method, an information update method and device, and a terminal.
- the UE Route Selection Policy (URSP) is used by the terminal to associate the application with the corresponding Protocol Data Unit (Protocol Data Unit, PDU).
- PDU Protocol Data Unit
- the embodiments of the application provide a data binding method, information update method and device, and terminal.
- the terminal performs a first operation when in an idle state, and the first operation is to implement an update operation of the binding relationship between the application and the session.
- the terminal When the network slice parameter in the terminal is updated, the terminal performs a first operation on the UE policy or all UE policies that include the updated network slice parameter, and the first operation is to implement the binding relationship between the application and the session Update operation.
- the terminal transmits at least one channel of replicated data through at least one session, where the replicated data includes multiple channels of data from the application layer, and one or more channels of the replicated data are bound to one session.
- the terminal receives the first parameter and/or the second parameter sent by the network device, where the first parameter is used to indicate the time information for performing the first operation and/or the time information for performing the second operation, and the second parameter is used to indicate Time information for performing the third operation;
- the second operation is an operation to determine the binding relationship between the application and the session
- the first operation is an operation to update the binding relationship between the application and the session
- the third operation is to manage access and mobility.
- the parameter is updated.
- the data binding device provided in the embodiment of the present application is applied to a terminal, and the device includes:
- the update unit is configured to perform a first operation when the terminal is in an idle state, and the first operation is to implement an update operation of the binding relationship between the application and the session.
- the data binding device provided in the embodiment of the present application is applied to a terminal, and the device includes:
- the update unit is used to perform a first operation on the UE policy or all UE policies including the updated network slice parameter in the case of updating the network slice parameters in the terminal, and the first operation is to implement binding between the application and the session Update operation of the relationship.
- the data binding device provided in the embodiment of the present application is applied to a terminal, and the device includes:
- the transmission unit is configured to transmit at least one channel of replicated data through at least one session, where the replicated data includes multiple channels of data from the application layer, and one or more channels of the replicated data are bound to one session.
- the information update device provided by the embodiment of the present application is applied to a terminal, and the device includes:
- the receiving unit is configured to receive a first parameter and/or a second parameter sent by a network device, where the first parameter is used to indicate time information for performing the first operation and/or time information for performing the second operation, the second The parameter is used to indicate the time information for performing the third operation;
- the second operation is an operation to determine the binding relationship between the application and the session
- the first operation is an operation to update the binding relationship between the application and the session
- the third operation is to manage access and mobility.
- the parameter is updated.
- the terminal provided in the embodiment of the present application includes a processor and a memory.
- the memory is used to store a computer program
- the processor is used to call and run the computer program stored in the memory to execute the above-mentioned data binding method or information update method.
- the chip provided in the embodiment of the present application is used to implement the above-mentioned data binding method or information update method.
- the chip includes a processor, which is used to call and run a computer program from the memory, so that the device installed with the chip executes the above-mentioned data binding method or information update method.
- the computer-readable storage medium provided by the embodiments of the present application is used to store a computer program, and the computer program enables a computer to execute the above-mentioned data binding method or information update method.
- the computer program product provided by the embodiment of the present application includes computer program instructions that cause a computer to execute the above-mentioned data binding method or information update method.
- the computer program provided in the embodiment of the present application when it runs on a computer, causes the computer to execute the aforementioned data binding method or information update method.
- the terminal itself can clarify the time when the URSP update takes effect, or coordinate the time when the URSP update takes effect and the time when the access and mobility management parameters are updated through the instructions of the network side, thereby avoiding erroneous terminal behavior .
- FIG. 1 is a schematic diagram of a communication system architecture provided by an embodiment of the present application.
- Figure 2 is a network architecture diagram provided by an embodiment of the present application.
- FIG. 3 is a configuration flowchart of a UE policy provided by an embodiment of the present application.
- Fig. 4 is a configuration flowchart of access and mobility management related parameters provided by an embodiment of the present application.
- FIG. 5 is a first flowchart of a data binding method provided by an embodiment of the present application.
- FIG. 6 is a second schematic diagram of the data binding method provided by an embodiment of the present application.
- FIG. 7 is a schematic flowchart of an information update method provided by an embodiment of the application.
- FIG. 8 is a schematic diagram 1 of the structural composition of a data binding device provided by an embodiment of the application.
- FIG. 9 is a second schematic diagram of the structural composition of the data binding device provided by an embodiment of the application.
- FIG. 10 is a schematic diagram of the structural composition of an information update apparatus provided by an embodiment of the application.
- FIG. 11 is a schematic structural diagram of a communication device provided by an embodiment of the present application.
- FIG. 12 is a schematic structural diagram of a chip of an embodiment of the present application.
- FIG. 13 is a schematic block diagram of a communication system provided by an embodiment of the present application.
- GSM Global System of Mobile Communication
- CDMA Code Division Multiple Access
- WCDMA Wideband Code Division Multiple Access
- GSM Global System of Mobile Communication
- GPRS General Packet Radio Service
- LTE Long Term Evolution
- FDD Frequency Division Duplex
- TDD Time Division Duplex
- UMTS Universal Mobile Telecommunication System
- WiMAX Worldwide Interoperability for Microwave Access
- the communication system 100 applied in the embodiment of the present application is shown in FIG. 1.
- the communication system 100 may include a network device 110, and the network device 110 may be a device that communicates with a terminal 120 (or called a communication terminal or a terminal).
- the network device 110 may provide communication coverage for a specific geographic area, and may communicate with terminals located in the coverage area.
- the network device 110 may be a base station (Base Transceiver Station, BTS) in a GSM system or a CDMA system, a base station (NodeB, NB) in a WCDMA system, or an evolved base station in an LTE system (Evolutional Node B, eNB or eNodeB), or the wireless controller in the Cloud Radio Access Network (CRAN), or the network equipment can be a mobile switching center, a relay station, an access point, a vehicle-mounted device, Wearable devices, hubs, switches, bridges, routers, network-side devices in 5G networks, or network devices in the future evolution of the Public Land Mobile Network (PLMN), etc.
- BTS Base Transceiver Station
- NodeB, NB base station
- LTE Long Term Evolutional Node B
- eNB evolved base station
- CRAN Cloud Radio Access Network
- the network equipment can be a mobile switching center, a relay station, an access point, a vehicle-mounted device, Wearable devices, hubs, switches
- the communication system 100 also includes at least one terminal 120 located within the coverage area of the network device 110.
- the "terminal” used here includes, but is not limited to, connection via wired lines, such as public switched telephone networks (PSTN), digital subscriber lines (Digital Subscriber Line, DSL), digital cables, and direct cable connections; And/or another data connection/network; and/or via a wireless interface, such as for cellular networks, wireless local area networks (WLAN), digital TV networks such as DVB-H networks, satellite networks, AM-FM Broadcast transmitter; and/or another terminal's device configured to receive/send communication signals; and/or Internet of Things (IoT) equipment.
- a terminal set to communicate through a wireless interface may be referred to as a "wireless communication terminal", a “wireless terminal” or a “mobile terminal”.
- mobile terminals include, but are not limited to, satellites or cellular phones; Personal Communications System (PCS) terminals that can combine cellular radio phones with data processing, fax, and data communication capabilities; can include radio phones, pagers, Internet/intranet PDA with internet access, web browser, memo pad, calendar, and/or Global Positioning System (GPS) receiver; and conventional laptop and/or palmtop receivers or others including radio phone transceivers Electronic device.
- PCS Personal Communications System
- GPS Global Positioning System
- Terminal can refer to access terminal, user equipment (User Equipment, UE), user unit, user station, mobile station, mobile station, remote station, remote terminal, mobile device, user terminal, terminal, wireless communication equipment, user agent or user Device.
- the access terminal can be a cellular phone, a cordless phone, a Session Initiation Protocol (SIP) phone, a wireless local loop (Wireless Local Loop, WLL) station, a personal digital processing (Personal Digital Assistant, PDA), with wireless communication Functional handheld devices, computing devices or other processing devices connected to wireless modems, in-vehicle devices, wearable devices, terminals in 5G networks, or terminals in the future evolution of PLMN, etc.
- SIP Session Initiation Protocol
- WLL Wireless Local Loop
- PDA Personal Digital Assistant
- the terminals 120 may perform device-to-device (D2D) communication.
- D2D device-to-device
- the 5G system or 5G network may also be referred to as a New Radio (NR) system or NR network.
- NR New Radio
- FIG. 1 exemplarily shows one network device and two terminals.
- the communication system 100 may include multiple network devices and the coverage of each network device may include other numbers of terminals. This embodiment of the present application There is no restriction on this.
- the communication system 100 may also include other network entities such as a network controller and a mobility management entity, which are not limited in the embodiment of the present application.
- network entities such as a network controller and a mobility management entity, which are not limited in the embodiment of the present application.
- the devices with communication functions in the network/system in the embodiments of the present application may be referred to as communication devices.
- the communication device may include a network device 110 and a terminal 120 with communication functions, and the network device 110 and the terminal 120 may be the specific devices described above, which will not be repeated here;
- the device may also include other devices in the communication system 100, such as other network entities such as a network controller and a mobility management entity, which are not limited in the embodiment of the present application.
- the UE policy is introduced in 5G, and the UE policy can include WLAN Selection Policy (WLANSP), UE Route Selection Policy (URSP), and Internet of Vehicles policies.
- WLANSP contains multiple rules.
- the rules in WLANSP are called WLANSP rules, and WLANSP rules are used when the UE selects which WLAN access point.
- URSP contains multiple rules.
- the rules in URSP are called URSP Rules.
- Each URSP Rule is composed of a service description (Traffic Descriptor) and a set of routing description (Route Selection Descriptor, RSD). URS is used for terminals to apply specific application data.
- the flow is bound to a specific session (such as a PDU session).
- UE strategies can also be divided into vehicle networking strategies, Beijing data strategies, and Internet of Things strategies. The mechanisms are the same as URSP.
- UE associates the application (or application data stream) to the corresponding PDU session for transmission based on URSP.
- the mechanism is as follows:
- the UE uses the URSP rule in the URSP to check whether the characteristics of the application data match the Traffic Descriptor of a rule in the URSP rule.
- the order of viewing is based on the priority in the Traffic Descriptor in the URSP rule ( Precedence) to determine, that is, the UE checks the matching situation in sequence based on the order of priority.
- a URSP rule is matched, it uses the RSD list under the URSP rule to bind the PDU session.
- the UE searches for a suitable PDU session according to the Precedence order in the RSD.
- the RSD with higher priority is preferentially used here. If a parameter in the RSD has one or more values, the UE selects One of them is combined with other parameters to find whether the PDU session exists:
- the UE If it does not exist, the UE triggers the establishment of the PDU session, and the UE reports the attribute parameters of the PDU session in the establishment request message; further,
- the UE will bind the application data to the session for transmission;
- the UE searches for the existence of the PDU session again based on other parameter combinations in the RSD or using the parameter combination in the RSD of the second priority (cycle step 1));
- the UE searches for the Traffic Descriptor in the second-priority URSP rule according to the Precedence order to see if it can match the application data stream characteristics. When it matches, repeat The process described earlier.
- LADN DNN availability The data network name (LADN DNN availability) is updated
- -UE is registered to 3GPP access network or non-3GPP access network;
- the UE establishes a connection to the WLAN access network.
- the UE Configuration Update (UCU) process includes the UCU process of AMF (as shown in Figure 3) and the UCU process of PCF (as shown in Figure 4).
- the connection architecture between each network element in these processes is shown in the figure 2 shown.
- the configuration of the UE policy is implemented through the UE Configuration Update (UCU) process, as shown in Figure 3, the process includes the following steps:
- Step 0-1 When the policy control function network element (PCF) on the network side decides to update the UE policy, it will put the UE policy in the container and send it to the core access and mobility management network element (Core Access and Mobility). Management Function, AMF).
- PCF policy control function network element
- AMF Management Function
- Step 2-3 AMF uses the downlink NAS message to transparently transmit the container to the UE. If the UE is in an idle state, it needs to initiate step 2 to make the UE in a connected state.
- Step 4-5 The UE receives the UE policy backward, and transmits the transmission result (such as indicating whether the UE policy transmission is successful) to the AMF through the container, and the AMF then transparently transmits the container to the PCF.
- the transmission result such as indicating whether the UE policy transmission is successful
- the UE will send a PDU session establishment request message to the network side (such as AMF).
- the UE will report the S-NSSAI and the data network name (Data Network Name, DNN) to the network side. ), access type (Access Type), PDU session identifier and other information, the network establishes the required PDU session for the UE according to these information.
- the network side will inform the UE of the mapped EPS QoS information (EPS QoS information includes EPS bearer identification and mapped QoS parameters).
- EPS QoS information includes EPS bearer identification and mapped QoS parameters.
- the network side maps it according to the EPS QoS information previously issued to the UE. Among them, some of the existing PDU sessions/data streams may be merged into the default bearer, and some of the PDU sessions/data streams will be mapped into the dedicated load.
- the terminal needs to go through the registration process to the 5G network before it can perform related 5G services.
- the UE sends the Requested NSSAI to the RAN and AMF, and the AMF sends the Requested NSSAI to the NSSF to obtain the allowed S-NSSAI (Allowed NSSAI).
- the AMF sends the Requested NSSAI to the RAN and the AMF in the Registration Accept message. Send the Allowed NSSAI back to the UE.
- the UE will subsequently carry S-NSSAI (one of the Allowed NSSAI) in the PDU session request message, and the AMF will query the network slice selection function (Network Slice Selection Function, NSSF) for the corresponding network slice temporary identifier according to the S-NSSAI carried by the UE. (Network Slice Instance-ID, NSI-ID), then AMF sends the returned NSI-ID to the Policy Control Function (NRF) and returns the corresponding SMF network element information. AMF finds the corresponding SMF network element through this information , Generate the corresponding PDU session.
- NSF Policy Control Function
- the network slice selection assistance information (Network Slice Selection Assistance Information, NSSAI) in the network slice parameters is divided into the following three types:
- Requested NSSAI is sent in the UE registration request message. This information is used for which S-NSSAI the UE applies for.
- the RAN can also send the UE's NAS message to a specific AMF (AMF supporting Requested NSSAI) based on this information.
- AMF AMF supporting Requested NSSAI
- Subscribed NSSAI is the NSSAI information subscribed by the network for the user.
- the UDM will notify the AMF to trigger the AMF to update the NSSAI configuration for the UE.
- AMF judges which NSSAI is allowed to use according to the NSSAI requested by the UE in the registration request message, and sends the Allowed NSSAI to the UE in the Registration accept message.
- the UE's subsequent PDU session establishment request message carries an S-NSSAI in the Allowed NSSAI for establishing a corresponding PDU session.
- the configuration of parameters related to access and mobility management is implemented through the UE Configuration Update (UCU) process, as shown in Figure 4, the process includes at least the following steps:
- Step 0 AMF decides to update UE configuration.
- the AMF can indicate whether the UE needs to perform a registration procedure.
- Step 1 The AMF sends a UE configuration update command to the UE.
- Step 2 The UE sends a configuration update complete message to the AMF.
- the AMF can provide access and mobility management related parameters to the UE through step 1), and can indicate whether the UE needs to perform a registration procedure to update the network slice information.
- access and mobility management related parameters include at least one of the following: Configuration Update Indication, 5G-GUTI, TAI List (TAI List), Allowed NSSAI, Allowed NSSAI Mapping (Mapping Of Allowed NSSAI), Serving PLMN's Configured NSSAI, Configured NSSAI mapping (Mapping Of Configured NSSAI), rejected S-NSSAI (rejected S-NSSAIs), NITZ, mobility restrictions (Mobility Restrictions), LADN information, MICO, operator-defined access types Definitions (Operator-defined access category definitions), SMS subscription instructions (SMS Subscribed Indication).
- Configuration Update Indication 5G-GUTI
- TAI List TAI List
- Allowed NSSAI Allowed NSSAI Mapping
- Serving PLMN's Configured NSSAI Configured NSSAI mapping (Mapping Of Configured NSSAI), rejected S-NSSAI (rejected S-NSSAIs), NITZ, mobility restrictions (Mobility Restrictions), LADN information, MICO
- Allowed NSSAI in network slicing parameters is the NSSAI that the network allows the UE to use.
- S-NSSAI of the RSD parameters in the URSP rule is selected It is selected based on Allowed NSSAI, which means that the S-NSSAI parameter selected by the UE in RSD must be one of Allowed NSSAI.
- Fig. 5 is a schematic flow chart 1 of the data binding method provided by an embodiment of the application. As shown in Fig. 5, the data binding method includes the following steps:
- Step 501 The terminal performs a first operation when in an idle state, and the first operation is to implement an update operation of the binding relationship between the application and the session.
- the terminal may be any device capable of communicating with the network, such as a mobile phone, a tablet computer, a notebook, a vehicle-mounted terminal, and a wearable device.
- the first operation involved in the embodiment of the present application is to implement an update operation of the binding relationship between the application and the session.
- the second operation involved in the following embodiments of this application is the operation of determining the binding relationship between the application and the session.
- the UE uses the URSP rule in the URSP to check whether the characteristics of the application data match the Traffic Descriptor of a rule in the URSP rule, and the viewing order is based on the priority in the Traffic Descriptor in the URP rule (Precedence) To decide, that is, the UE checks the matching situation in order based on the priority order.
- a URSP rule is matched, it uses the RSD list under the URSP rule to bind the PDU session.
- the UE searches for a suitable PDU session according to the Precedence order in the RSD.
- the RSD with higher priority is preferentially used here. If a parameter in the RSD has one or more values, the UE selects One of them is combined with other parameters to find whether the PDU session exists:
- the UE If it does not exist, the UE triggers the establishment of the PDU session, and the UE reports the attribute parameters of the PDU session in the establishment request message; further,
- the UE will bind the application data to the session for transmission;
- the UE searches for the existence of the PDU session again based on other parameter combinations in the RSD or using the parameter combination in the RSD of the second priority (cycle step 1));
- the UE searches for the Traffic Descriptor in the second-priority URSP rule according to the Precedence order to see if it can match the application data stream characteristics. When it matches, repeat The process described earlier.
- evaluation that is, the second operation
- the terminal decides when to perform the first operation by itself.
- the timing for the terminal to perform the first operation includes the following situations:
- Case 1 The terminal performs the first operation after entering the idle state and before entering the next connected state or data transmission.
- Case 2 The terminal performs the first operation after initiating the registration process.
- Case 3 The terminal implements the update operation of the binding relationship between the application and the first part of the session when in the connected state, and the terminal implements the update operation of the binding relationship between the application and the second part of the session after entering the idle state.
- the above-mentioned case 1 and case 2 all belong to the update operation of the entire binding relationship between the application and the session when the terminal is in the idle state.
- the third situation above is that the terminal implements the update operation of the first part of the binding relationship between the application and the session when in the connected state, and implements the second part of the binding relationship between the application and the session after entering the idle state (except for the first part of all binding relationships) Binding relationship other than the binding relationship) update operation.
- the terminal implements the update operation of the first part of the binding relationship between the application and the session when in the connected state, and implements the second part of the binding relationship between the application and the session after entering the idle state (except for the first part of all binding relationships) Binding relationship other than the binding relationship) update operation.
- the remaining unimplemented binding relationship is implemented after the terminal enters the idle state.
- the first partial binding relationship includes a binding relationship corresponding to a specific service.
- the specific service may be a service with a faster terminal moving speed (it is necessary to complete the update operation of the binding relationship before the terminal moves out of a certain area), such as a car networking service.
- the specific service may also be a service with low requirements for service interruption (the delay caused by the update of the binding relationship has no or small impact on the service), such as the Internet of Things service.
- the terminal determines the binding relationship between the new application and the session based on the UE policy when the terminal is in the connected state, and executes the first binding relationship based on the binding relationship between the new application and the session when the terminal is in the idle state.
- the terminal when the network slice parameter in the terminal is updated, the terminal performs a first operation on the UE policy or all UE policies that include the updated network slice parameter, and the first operation is to implement application and session binding Update operation of the relationship.
- the network slice parameter update means that the original network slice parameters are replaced by new network slice parameters, that is, the terminal starts to use the new network slice parameters.
- the new Allowed NSSAI and/or Configured NSSAI replace the original Allowed NSSAI and/or Configured NSSAI.
- the network slicing parameter includes at least one of the following: Allowed NSSAI, Configured NSSAI.
- the network slicing parameter is Allowed NSSAI.
- the binding relationship between the application and the session is obtained according to the UE policy (refer to the relevant description of the aforementioned evaluation).
- Application scenario 1 The terminal is in an idle state when performing the second operation (ie evaluation)
- Update method 1 The terminal directly implements the update operation of the binding relationship between the application and the session.
- Update method 2 Before the terminal enters the next connection state or data transmission, an update operation of the binding relationship between the application and the session is performed.
- Update method 3 The terminal implements an update operation of the binding relationship between the application and the session after the registration process is initiated.
- the above three update methods all belong to the update operation of the binding relationship between the application and the session when the terminal is in an idle state.
- Application scenario 2 The terminal is in the connected state when performing the second operation (ie evaluation)
- Update method 1 The terminal implements an update operation of the binding relationship between the application and the session after entering the idle state.
- Update method 2 The terminal implements an update operation of the binding relationship between the application and the session before entering the connected state or sending data next time.
- Update method 3 The terminal implements an update operation of the binding relationship between the application and the session after initiating a registration process (such as location update).
- the above three update methods all belong to the update operation of the binding relationship between the application and the session when the terminal is in an idle state.
- Update method 4 The terminal implements the update operation of the binding relationship between the application and the first part of the session before entering the idle state (in the connected state), and implements the update operation of the binding relationship between the application and the second part of the session after the idle state.
- the embodiment of the present application also provides a data binding method. As shown in FIG. 6, the data binding method includes the following steps:
- Step 601 The terminal transmits at least one channel of replicated data through at least one session, where the replicated data includes multiple channels of data from the application layer, and one or more channels of replicated data are bound to one session.
- replicated data refers to multiple channels of data from the application layer, and the content of the application layer data is the same.
- the transmission of replicated data can ensure the reliability of data transmission.
- the binding of one or more channels of data in the replicated data to a session is determined according to the URSP strategy. For example: one or more channels of data in the replicated data match a business of a URSP rule Description (Traffic Descriptor), and select the route corresponding to the Traffic Descriptor to describe the session corresponding to a set of parameters in the RSD for binding.
- URSP rule Description Traffic Descriptor
- FIG. 7 is a schematic flowchart of an information update method provided by an embodiment of the application. As shown in FIG. 7, the information update method includes the following steps:
- Step 701 The terminal receives a first parameter and/or a second parameter sent by a network device, where the first parameter is used to indicate time information for performing a first operation and/or time information for performing a second operation, and the second parameter Time information for indicating the execution of the third operation; wherein, the second operation is an operation for determining the binding relationship between the application and the session, and the first operation is an update operation for implementing the binding relationship between the application and the session.
- the third operation is an operation of updating access and mobility management parameters.
- the terminal may be any device capable of communicating with the network, such as a mobile phone, a tablet computer, a notebook, a vehicle-mounted terminal, and a wearable device.
- the first operation involved in the embodiment of the present application is to implement an update operation of the binding relationship between the application and the session.
- the second operation involved in the embodiment of the present application is an operation of determining the binding relationship between the application and the session.
- For the specific behavior of the second operation refer to the relevant description of the aforementioned evaluation, which will not be repeated here.
- the configuration granularity of the first parameter (that is, the control granularity) includes the value of a first parameter corresponding to a strategy type, or the value of a first parameter corresponding to a strategy identifier, or the value sent to the terminal. All strategies correspond to a value of the first parameter.
- the value of the first parameter corresponding to the USRP strategy is t1
- the value of the first parameter corresponding to the V2X strategy is t2
- the value of the first parameter corresponding to the IoT strategy is t3.
- strategy types may correspond to the same value of the first parameter, or may correspond to different values of the first parameter.
- the first policy identifier (Policy Section Identifier, PSI) corresponds to the value of the first parameter t1
- the second PSI corresponds to the value of the first parameter t2
- the third PSI corresponds to the value of the first parameter t3.
- PSIs may correspond to the same value of the first parameter, or may correspond to different values of the first parameter.
- the value of the first parameter corresponding to the first strategy is t1
- the value of the first parameter corresponding to the second strategy is t2
- the value of the first parameter corresponding to the third strategy is t3.
- the time information indicated by the first parameter refers to a time period or point in time. Further, the time information includes one or a combination of the following: when the terminal is in an idle state, when the terminal is in a connected state, after the terminal is in an idle state and initiates a registration process, the terminal enters the next time Before connecting or transferring data.
- the network device is a PCF
- the first parameter is encapsulated in a container by the PCF and sent to the AMF
- the container is transparently transmitted to the terminal through the AMF.
- the container is sent to the terminal using a NAS message through the AMF.
- the NAS message here is a downlink NAS message.
- the sending of the first parameter may be sent along with the UE policy.
- the terminal receives the UE policy sent by the network device, and the UE policy carries first indication information, and the first indication The information is used to indicate the first parameter.
- the first parameter may be directly carried in the UE policy.
- the third parameter is used to indicate the time to update the access and mobility management parameters.
- the update time here means that the configured access and mobility management parameters are increased to and/ Or replace the time for the existing access and mobility management parameters of the terminal.
- the access and mobility management parameters include at least network slicing parameters.
- the network slice parameters include at least one of the following: Allowed NSSAI, Requested NSSAI, Subscribed NSSAI, and Configured NSSAI.
- the time information indicated by the second parameter refers to a time period or point in time.
- the configuration granularity (ie, control granularity) of the second parameter includes one or more access and mobility management parameters corresponding to a second parameter value, or all the access and mobility management parameters sent to the terminal.
- the management parameter corresponds to the value of a second parameter.
- the access and mobility management related parameters in the NAS message sent by the network side to the terminal include at least one of the following: Configuration Update Indication, 5G-GUTI, TAI List, Allowed NSSAI, Allowed NSSAI mapping (Mapping Of Allowed NSSAI), Serving PLMN Configured NSSAI, Configured NSSAI mapping (Mapping Of Configured NSSAI), rejected S-NSSAI (rejected S-NSSAIs), NITZ, mobility restrictions (Mobility Restrictions), LADN information , MICO, operator-defined access category definitions, and SMS subscription indication (SMS Subscribed Indication).
- Configuration Update Indication 5G-GUTI
- TAI List Allowed NSSAI
- Allowed NSSAI mapping Mapping Of Allowed NSSAI
- Serving PLMN Configured NSSAI Configured NSSAI mapping (Mapping Of Configured NSSAI)
- rejected S-NSSAI rejected S-NSSAI (rejected S-NSSAIs)
- NITZ mobility restrictions
- LADN information
- the one or more access and mobility management parameters sent to the terminal correspond to a second parameter value, or all the access and mobility management parameters sent to the terminal correspond to a second parameter value.
- the network device is AMF
- the second parameter is sent to the terminal by the AMF using a NAS message.
- the NAS message here is a downlink NAS message.
- the sending of the second parameter may be sent along with the access and mobility management parameters.
- the terminal receives the access and mobility management parameters sent by the network device, and the access and mobility management parameters Carrying second indication information, where the second indication information is used to indicate the second parameter.
- the second parameter may be directly carried in the access and mobility management parameters.
- the first parameter and/or the second parameter are determined through interaction between AMF and PCF.
- the technical solution of the embodiment of the present application can coordinate the UE strategy and the update of access and mobility management parameters.
- reuse of the existing process to the greatest extent can reduce the impact on the existing process.
- the UE policy in the embodiment of the present application is not limited to URSP, and may also be other types of policies, such as V2X policies, IoT policies, and so on.
- FIG. 8 is a schematic diagram 1 of the structural composition of a data binding device provided by an embodiment of the application.
- the data binding device is applied to a terminal, and the data binding device includes an update unit 801.
- the update unit 801 is configured to perform a first operation when the terminal is in an idle state, and the first operation is to implement an update operation of the binding relationship between the application and the session.
- the update unit 801 is configured to perform the first operation after the terminal enters the idle state and before entering the next connected state or data transmission.
- the update unit 801 is configured to perform the first operation after the terminal initiates a registration process.
- the update unit 801 is configured to perform an update operation of the binding relationship between the application and the first part of the session when the terminal is in the connected state, and implement the second part of the application and the session after the terminal enters the idle state. Update operation of binding relationship.
- the first partial binding relationship includes a binding relationship corresponding to a specific service.
- the update unit 801 is configured to determine the binding relationship between a new application and session based on the UE policy when the terminal is in the connected state, and the terminal is based on the new application and session when in the idle state.
- the updating unit 801 is used for updating network slice parameters in the terminal, performing a first operation on UE policies or all UE policies that include the updated network slice parameters.
- One operation is to implement an update operation of the binding relationship between the application and the session.
- the network slicing parameter is Allowed NSSAI.
- the binding relationship between the application and the session is obtained according to the UE policy.
- FIG. 9 is a second schematic diagram of the structural composition of a data binding device provided by an embodiment of the application.
- the data binding device is applied to a terminal, and the data binding device includes:
- the transmission unit 901 is configured to transmit at least one channel of replicated data through at least one session, where the replicated data includes multiple channels of data from the application layer, and one or more channels of the replicated data are bound to one session.
- binding one or more channels of data in the replication data to a session is determined according to the URSP policy; the one or more channels of data are matched to a TrafficDescriptor of a URSP rule, and the The routing description corresponding to the TrafficDescriptor describes the binding of the session corresponding to a set of parameters in the RSD.
- FIG. 10 is a schematic diagram of the structural composition of an information update device provided by an embodiment of the application.
- the information update device is applied to a terminal, and the information update device includes:
- the receiving unit 1001 is configured to receive a first parameter and/or a second parameter sent by a network device, where the first parameter is used to indicate time information for performing a first operation and/or time information for performing a second operation.
- the second parameter is used to indicate the time information for performing the third operation;
- the second operation is an operation to determine the binding relationship between the application and the session
- the first operation is an operation to update the binding relationship between the application and the session
- the third operation is to access Update operations with mobility management parameters.
- the configuration granularity of the first parameter includes a strategy type corresponding to a first parameter value, or a strategy identifier corresponding to a first parameter value, or all strategies sent to the terminal correspond to a first parameter value.
- the value of the parameter is a strategy type corresponding to a first parameter value, or a strategy identifier corresponding to a first parameter value, or all strategies sent to the terminal correspond to a first parameter value. The value of the parameter.
- the time information refers to a time period or point in time.
- the time information includes one or a combination of the following: when the terminal is in an idle state, when the terminal is in a connected state, after the terminal is in an idle state and initiates a registration process, the Before the terminal enters the connected state or transmits data next time.
- the network device is a PCF
- the first parameter is encapsulated in a container by the PCF and sent to the AMF
- the container is transparently transmitted to the terminal through the AMF.
- the container is sent to the terminal using a NAS message through the AMF.
- the receiving unit 1001 is configured to receive a UE policy sent by the network device, where the UE policy carries first indication information, and the first indication information is used to indicate the first parameter.
- the configuration granularity of the second parameter includes one or more access and mobility management parameters corresponding to a second parameter value, or all access and mobility management parameters sent to the terminal correspond to a first parameter. The value of the second parameter.
- the network device is an AMF
- the second parameter is sent to the terminal by the AMF using a NAS message.
- the receiving unit 1001 is configured to receive an access and mobility management parameter sent by the network device, where the access and mobility management parameter carries second indication information, and the second indication information Used to indicate the second parameter.
- the access and mobility management parameters include at least network slicing parameters.
- the first parameter and/or the second parameter are determined through negotiation between AMF and PCF.
- FIG. 11 is a schematic structural diagram of a communication device 1100 according to an embodiment of the present application.
- the communication device may be a terminal or a network device.
- the communication device 1100 shown in FIG. 11 includes a processor 1110.
- the processor 1110 can call and run a computer program from a memory to implement the method in the embodiment of the present application.
- the communication device 1100 may further include a memory 1120.
- the processor 1110 may call and run a computer program from the memory 1120 to implement the method in the embodiment of the present application.
- the memory 1120 may be a separate device independent of the processor 1110, or may be integrated in the processor 1110.
- the communication device 1100 may further include a transceiver 1130, and the processor 1110 may control the transceiver 1130 to communicate with other devices. Specifically, it may send information or data to other devices, or receive other devices. Information or data sent by the device.
- the transceiver 1130 may include a transmitter and a receiver.
- the transceiver 1130 may further include an antenna, and the number of antennas may be one or more.
- the communication device 1100 may specifically be a network device in an embodiment of the application, and the communication device 1100 may implement the corresponding process implemented by the network device in each method of the embodiment of the application. For the sake of brevity, details are not repeated here. .
- the communication device 1100 may specifically be a mobile terminal/terminal according to an embodiment of the application, and the communication device 1100 may implement the corresponding procedures implemented by the mobile terminal/terminal in each method of the embodiments of the application. For the sake of brevity, This will not be repeated here.
- FIG. 12 is a schematic structural diagram of a chip of an embodiment of the present application.
- the chip 1200 shown in FIG. 12 includes a processor 1210, and the processor 1210 can call and run a computer program from the memory to implement the method in the embodiment of the present application.
- the chip 1200 may further include a memory 1220.
- the processor 1210 can call and run a computer program from the memory 1220 to implement the method in the embodiment of the present application.
- the memory 1220 may be a separate device independent of the processor 1210, or it may be integrated in the processor 1210.
- the chip 1200 may further include an input interface 1230.
- the processor 1210 can control the input interface 1230 to communicate with other devices or chips, and specifically, can obtain information or data sent by other devices or chips.
- the chip 1200 may further include an output interface 1240.
- the processor 1210 can control the output interface 1240 to communicate with other devices or chips, specifically, can output information or data to other devices or chips.
- the chip can be applied to the network device in the embodiment of the present application, and the chip can implement the corresponding process implemented by the network device in the various methods of the embodiment of the present application.
- the chip can implement the corresponding process implemented by the network device in the various methods of the embodiment of the present application.
- the chip can be applied to the mobile terminal/terminal in the embodiment of the present application, and the chip can implement the corresponding process implemented by the mobile terminal/terminal in each method of the embodiment of the present application.
- the chip can implement the corresponding process implemented by the mobile terminal/terminal in each method of the embodiment of the present application.
- it will not be omitted here. Repeat.
- the chip mentioned in the embodiment of the present application may also be referred to as a system-level chip, a system-on-chip, a system-on-chip, or a system-on-chip, etc.
- FIG. 13 is a schematic block diagram of a communication system 1300 according to an embodiment of the present application. As shown in FIG. 13, the communication system 1300 includes a terminal 1310 and a network device 1320.
- the terminal 1310 may be used to implement the corresponding functions implemented by the terminal in the foregoing method
- the network device 1320 may be used to implement the corresponding functions implemented by the network device in the foregoing method.
- details are not described herein again.
- the processor of the embodiment of the present application may be an integrated circuit chip with signal processing capability.
- the steps of the foregoing method embodiments can be completed by hardware integrated logic circuits in the processor or instructions in the form of software.
- the aforementioned processor may be a general-purpose processor, a digital signal processor (Digital Signal Processor, DSP), an application specific integrated circuit (ASIC), a ready-made programmable gate array (Field Programmable Gate Array, FPGA) or other Programming logic devices, discrete gates or transistor logic devices, discrete hardware components.
- DSP Digital Signal Processor
- ASIC application specific integrated circuit
- FPGA ready-made programmable gate array
- the methods, steps, and logical block diagrams disclosed in the embodiments of the present application can be implemented or executed.
- the general-purpose processor may be a microprocessor or the processor may also be any conventional processor or the like.
- the steps of the method disclosed in the embodiments of the present application may be directly embodied as being executed and completed by a hardware decoding processor, or executed and completed by a combination of hardware and software modules in the decoding processor.
- the software module can be located in a mature storage medium in the field such as random access memory, flash memory, read-only memory, programmable read-only memory, or electrically erasable programmable memory, registers.
- the storage medium is located in the memory, and the processor reads the information in the memory and completes the steps of the above method in combination with its hardware.
- the memory in the embodiment of the present application may be a volatile memory or a non-volatile memory, or may include both volatile and non-volatile memory.
- the non-volatile memory can be read-only memory (Read-Only Memory, ROM), programmable read-only memory (Programmable ROM, PROM), erasable programmable read-only memory (Erasable PROM, EPROM), and electrically available Erase programmable read-only memory (Electrically EPROM, EEPROM) or flash memory.
- the volatile memory may be a random access memory (Random Access Memory, RAM), which is used as an external cache.
- RAM random access memory
- SRAM static random access memory
- DRAM dynamic random access memory
- DRAM synchronous dynamic random access memory
- DDR SDRAM Double Data Rate Synchronous Dynamic Random Access Memory
- Enhanced SDRAM, ESDRAM Enhanced Synchronous Dynamic Random Access Memory
- Synchronous Link Dynamic Random Access Memory Synchronous Link Dynamic Random Access Memory
- DR RAM Direct Rambus RAM
- the memory in the embodiment of the present application may also be static random access memory (static RAM, SRAM), dynamic random access memory (dynamic RAM, DRAM), Synchronous dynamic random access memory (synchronous DRAM, SDRAM), double data rate synchronous dynamic random access memory (double data rate SDRAM, DDR SDRAM), enhanced synchronous dynamic random access memory (enhanced SDRAM, ESDRAM), synchronous connection Dynamic random access memory (synch link DRAM, SLDRAM) and direct memory bus random access memory (Direct Rambus RAM, DR RAM), etc. That is to say, the memory in the embodiment of the present application is intended to include but not limited to these and any other suitable types of memory.
- the embodiment of the present application also provides a computer-readable storage medium for storing computer programs.
- the computer-readable storage medium may be applied to the network device in the embodiment of the present application, and the computer program causes the computer to execute the corresponding process implemented by the network device in each method of the embodiment of the present application.
- the computer program causes the computer to execute the corresponding process implemented by the network device in each method of the embodiment of the present application.
- the computer-readable storage medium may be applied to the mobile terminal/terminal in the embodiments of the present application, and the computer program causes the computer to execute the corresponding processes implemented by the mobile terminal/terminal in the various methods of the embodiments of the present application, for It’s concise and will not be repeated here.
- the embodiments of the present application also provide a computer program product, including computer program instructions.
- the computer program product may be applied to the network device in the embodiment of the present application, and the computer program instructions cause the computer to execute the corresponding process implemented by the network device in each method of the embodiment of the present application.
- the computer program instructions cause the computer to execute the corresponding process implemented by the network device in each method of the embodiment of the present application.
- the computer program instructions cause the computer to execute the corresponding process implemented by the network device in each method of the embodiment of the present application.
- the computer program product can be applied to the mobile terminal/terminal in the embodiments of the present application, and the computer program instructions cause the computer to execute the corresponding procedures implemented by the mobile terminal/terminal in the various methods of the embodiments of the present application, for the sake of brevity , I won’t repeat it here.
- the embodiment of the present application also provides a computer program.
- the computer program can be applied to the network device in the embodiment of the present application.
- the computer program runs on the computer, the computer is caused to execute the corresponding process implemented by the network device in each method of the embodiment of the present application.
- I won’t repeat it here.
- the computer program can be applied to the mobile terminal/terminal in the embodiments of the present application.
- the computer program runs on the computer, the computer can execute the corresponding methods implemented by the mobile terminal/terminal in the various methods of the embodiments of the present application. For the sake of brevity, the process will not be repeated here.
- the disclosed system, device, and method may be implemented in other ways.
- the device embodiments described above are only illustrative.
- the division of the units is only a logical function division, and there may be other divisions in actual implementation, for example, multiple units or components can be combined or It can be integrated into another system, or some features can be ignored or not implemented.
- the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may be in electrical, mechanical or other forms.
- the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, they may be located in one place, or they may be distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the objectives of the solutions of the embodiments.
- each unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit.
- the function is implemented in the form of a software functional unit and sold or used as an independent product, it can be stored in a computer readable storage medium.
- the technical solution of this application essentially or the part that contributes to the existing technology or the part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium, including Several instructions are used to make a computer device (which may be a personal computer, a server, or a network device, etc.) execute all or part of the steps of the method described in each embodiment of the present application.
- the aforementioned storage media include: U disk, mobile hard disk, read-only memory (Read-Only Memory,) ROM, random access memory (Random Access Memory, RAM), magnetic disk or optical disk and other media that can store program code .
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
La présente invention concerne, selon des modes de réalisation, un procédé de liaison de données et un procédé et un dispositif de mise à jour d'informations. Le procédé comprend les étapes suivantes : un terminal effectue une première opération dans un état inactif, la première opération étant une opération de mise à jour pour mettre en œuvre une relation de liaison entre une application et une session.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2019/080890 WO2020199105A1 (fr) | 2019-04-01 | 2019-04-01 | Procédé de liaison de données, procédé et dispositif de mise à jour d'informations et terminal |
CN201980005270.2A CN112020878B (zh) | 2019-04-01 | 2019-04-01 | 数据绑定方法、信息更新方法及装置、终端 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2019/080890 WO2020199105A1 (fr) | 2019-04-01 | 2019-04-01 | Procédé de liaison de données, procédé et dispositif de mise à jour d'informations et terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2020199105A1 true WO2020199105A1 (fr) | 2020-10-08 |
Family
ID=72664383
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2019/080890 WO2020199105A1 (fr) | 2019-04-01 | 2019-04-01 | Procédé de liaison de données, procédé et dispositif de mise à jour d'informations et terminal |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN112020878B (fr) |
WO (1) | WO2020199105A1 (fr) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113993176A (zh) * | 2021-09-26 | 2022-01-28 | 深圳市广和通无线股份有限公司 | 路由选择策略更新方法、终端及网络侧设备 |
WO2024039843A1 (fr) * | 2022-08-19 | 2024-02-22 | Interdigital Patent Holdings, Inc. | Politique de sélection de réseau local sans fil (wlan) |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109286567A (zh) * | 2018-11-23 | 2019-01-29 | 腾讯科技(深圳)有限公司 | 路由选择策略的获取方法、装置及设备 |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10856131B2 (en) * | 2017-01-16 | 2020-12-01 | Lg Electronics Inc. | Method for updating UE configuration in wireless communication system and apparatus for same |
CN109548175B (zh) * | 2017-08-15 | 2021-11-19 | 华为技术有限公司 | 一种会话处理方法及装置 |
BR112020018453A2 (pt) * | 2018-03-12 | 2020-12-29 | Guangdong Oppo Mobile Telecommunications Corp., Ltd. | Método e aparelho para atualizar uma política de equipamento de usuário |
-
2019
- 2019-04-01 WO PCT/CN2019/080890 patent/WO2020199105A1/fr active Application Filing
- 2019-04-01 CN CN201980005270.2A patent/CN112020878B/zh active Active
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109286567A (zh) * | 2018-11-23 | 2019-01-29 | 腾讯科技(深圳)有限公司 | 路由选择策略的获取方法、装置及设备 |
Non-Patent Citations (2)
Title |
---|
LG ELECTRONICS,: "3GPP TSG CT WG1 Meeting #115, C1-191639,", MAPPED CONFIGURED S-NSSAI FROM THE S-NSSAI(S) OF THE HPLMN, 1 March 2019 (2019-03-01), XP051688914, DOI: 20191227152551X * |
NOKIA ET AL.,: "3GPP TSG CT WG4 Meeting #97bis, C3-184362,", UE POLICIES, 16 July 2018 (2018-07-16), XP051471922, DOI: 20191227152818A * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113993176A (zh) * | 2021-09-26 | 2022-01-28 | 深圳市广和通无线股份有限公司 | 路由选择策略更新方法、终端及网络侧设备 |
WO2024039843A1 (fr) * | 2022-08-19 | 2024-02-22 | Interdigital Patent Holdings, Inc. | Politique de sélection de réseau local sans fil (wlan) |
Also Published As
Publication number | Publication date |
---|---|
CN112020878B (zh) | 2022-05-27 |
CN112020878A (zh) | 2020-12-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2021007785A1 (fr) | Procédé et appareil de mise en correspondance de politiques et terminal | |
WO2020014983A1 (fr) | Procédé de gestion de session, dispositif terminal et dispositif de réseau | |
US20210127317A1 (en) | Path selecting method, terminal device, and network device | |
WO2021217412A1 (fr) | Procédé et appareil de détermination de comportement de politique de terminal, et dispostif réseau | |
CN111770591B (zh) | 一种数据传输方法及装置、终端 | |
CN111787580B (zh) | 一种数据流处理方法、设备及存储介质 | |
WO2020186529A1 (fr) | Procédé et appareil de détermination de politique, et terminal | |
AU2018436187A1 (en) | Information transmission method and apparatus, and communication device | |
WO2021046825A1 (fr) | Procédé et dispositif de communication sans fil | |
WO2020252793A1 (fr) | Procédé et dispositif de sélection de réseau et support de stockage | |
WO2021022460A1 (fr) | Procédé de vérification de session, dispositif électronique et support de stockage | |
WO2021030989A1 (fr) | Procédé et appareil de sélection de trajet, et terminal | |
WO2019242712A1 (fr) | Procédé d'interaction de capacités et dispositif associé | |
WO2021056576A1 (fr) | Procédé et dispositif pour la transmission de service, et dispositif de communication | |
WO2020206677A1 (fr) | Procédé et appareil de configuration de politique, dispositif de réseau, et terminal | |
CN113412665B (zh) | 一种会话设置方法、网络设备、用户设备 | |
WO2021087910A1 (fr) | Procédé et dispositif de connexion à un réseau | |
WO2020019910A1 (fr) | Procédé de communication pour véhicule à tout, dispositif terminal et dispositif de réseau | |
US20220061075A1 (en) | Information transmission method and apparatus, and network device | |
WO2020199105A1 (fr) | Procédé de liaison de données, procédé et dispositif de mise à jour d'informations et terminal | |
US11864028B2 (en) | Data transmission method, terminal device and core network device | |
WO2020113520A1 (fr) | Procédé d'établissement de connexion, dispositif réseau et dispositif terminal | |
WO2020056587A1 (fr) | Procédé de gestion de commutation, dispositif terminal, et dispositif de réseau | |
WO2021088007A1 (fr) | Procédé de communication sans fil, dispositif terminal et dispositif réseau | |
WO2021022428A1 (fr) | Procédé de communication sans fil, dispositif terminal et dispositif de réseau |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 19922500 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 19922500 Country of ref document: EP Kind code of ref document: A1 |